当前位置:网站首页>NTFS security permissions
NTFS security permissions
2022-07-04 04:58:00 【Liang Chenxing】
List of articles
NTFS Summary of permissions
1. By setting NTFS Authority , Realization ( Limit ) Different users have different permissions to access different objects .
2. After assigning the correct access rights , Users can access their resources .
3. Set permissions to prevent resources from being tampered with , Delete .
File System Overview
A file system is a method of organizing files on an external storage device .
Common file systems :
- FAT windows
- NTFS windows
- EXT Linux common
NTFS characteristic
1. Improve disk read and write performance .
2. reliability .
Encrypted file system
Access control list ( Set the permissions )
3. Disk utilization .
Compress
Disk quota
4. Support single file larger than 4 individual G.
modify NTFS jurisdiction
Cancel permission inheritance
effect : After the cancellation , You can modify the permission list at will .
Method : Folder right click Properties —— Security —— senior —— Remove the first check mark — Select copy .
File and folder permissions
File permissions :
Folder permissions :
Case study :
establish jimi Folder , And set up NTFS jurisdiction , requirement a Users can only read files in folders , Can't be in jimi Create a new file in the folder ,b Users can only use jimi Create a new file in the folder , Can't read file .
Authority accumulation
When users belong to multiple groups at the same time , Permissions are cumulative !
Case study :
user a Belong to at the same time IT and HR Group ,IT Groups can pair folders jimi Read ,HR Groups can write to folders , be a The final permissions of the user are read and write .
Refuse maximum
When user permissions accumulate , If permission is denied , Refuse maximum !
Case study :
user a It belongs to the finance department , The members of the finance department are 10 Users , The finance department organizes the documents xxx Have access to , Current requirements a Users cannot leave the financial department group , Simultaneous requirements a No access to folder xxx Authority .
Take ownership
Only by default administrator You have the right to !
effect : You can change the owner of any folder to administrator.
Case study :
user a Resigned , but xxx The folder belongs to a, because a The user to xxx Permission modification has been made to the folder , Cause other users to xxx The folder does not have any permissions , Now you need an administrator administrator Users will xxx Modify folder permissions again .
Forced inheritance
effect : Forced inheritance of parent-child relationship !
Method : Right click folder properties – Security – senior – Tick the second check mark , that will do !
Case study :
xxx How high are subfolders and files in a folder , Due to long-time permission management , The permissions of multiple subfolders have been modified differently , Now we need xxx The permissions of all sub files and folders under are unified .
Impact of file replication on permissions
After the file is copied , The permissions of the file will be overwritten by the permissions of the target folder .
This chapter exercises :
1. Create a folder , Realization tom Users can only create new files ,jack Users can only read and download files .
2. Will the user a Add to ceo Group , And cannot be deleted from this group , For folder jimi Grant authority , requirement ceo The group can completely control jimi Folder , but a Cannot access this folder .
3. Ordinary users create files , And set permissions , And the administrator is not given any permission , After the administrator logs in to the system , The file can be deleted successfully ,
4. Practice forced inheritance , And verify the success .
边栏推荐
- YoloV6实战:手把手教你使用Yolov6进行物体检测(附数据集)
- Annex III: scoring standard of the defender docx
- laravel 中获取刚刚插入的记录的id
- Annex II: confidentiality agreement for offensive and defensive drills docx
- 分享一些我的远程办公经验
- First knowledge of batch processing
- How do good test / development programmers practice? Where to go
- 【MATLAB】MATLAB 仿真模拟调制系统 — VSB 系统
- Yolov6 practice: teach you to use yolov6 for object detection (with data set)
- STM32F1与STM32CubeIDE编程实例-74HC595驱动4位7段数码管
猜你喜欢

Beipiao programmer, 20K monthly salary, 15W a year, normal?

在代碼中使用度量單比特,從而生活更美好

郑州正清园文化传播有限公司:针对小企业的7种营销技巧
![[Yugong series] go teaching course 001 in July 2022 - Introduction to go language premise](/img/f2/3b95f53d67cd1d1979163910dbeeb8.png)
[Yugong series] go teaching course 001 in July 2022 - Introduction to go language premise

海力士EMMC5.0及5.1系列对比详解

MySQL indexes and transactions
![[cloud native] those lines of code that look awesome but have a very simple principle](/img/6d/220c51a643263f431fb57c97c4b8ff.png)
[cloud native] those lines of code that look awesome but have a very simple principle

Annex V: briefing on the attack process docx

Use units of measure in your code for a better life

RPC - grpc simple demo - learn / practice
随机推荐
YoloV6实战:手把手教你使用Yolov6进行物体检测(附数据集)
Niuke Xiaobai monthly race 49
定制一个自己项目里需要的分页器
Test cs4344 stereo DA converter
STM32F1与STM32CubeIDE编程实例-74HC595驱动4位7段数码管
Flutter 调用高德地图APP实现位置搜索、路线规划、逆地理编码
附件三:防守方评分标准.docx
令人头痛的延时双删
Capturing and sorting out external Fiddler -- Conversation bar and filter
自动化测试selenium基础篇——webdriverAPI
RPC - grpc simple demo - learn / practice
Drozer tool
Deep parsing structured exception handling (SEH) - by Matt Pietrek
Download kicad on Alibaba cloud image station
Dp83848+ network cable hot plug
@Feignclient comments and parameters
LeetCode136+128+152+148
Operate the server remotely more gracefully: the practice of paramiko Library
Several smart watch related chips Bluetooth chip low power consumption
Formatted text of Kivy tutorial (tutorial includes source code)