tailieunhanh - exam 70 290 managing and maintaining a microsoft windows server 2003 environment phần 8

Quyền thay đổi Tạo tập tin / xuất dữ liệu Tạo các thư mục / Nối dữ liệu Xóa Xóa thư mục con và tập tin danh sách thư mục / Đọc dữ liệu đọc thuộc tính đọc thuộc tính mở rộng. Đồng bộ hóa Hãy sở hữu Traverse Folder / Execute File thuộc tính Viết Viết thuộc tính mở rộng | 302 PART 3 MANAGING AND MAINTAINING SHARED RESOURCES Table 9-2 NTFS Standard Permissions and Their Special Permission Equivalents Standard Permission Special Permissions Full Control Change Permissions Create Files Write Data Create Folders Append Data Delete Delete Subfolders and Files List Folder Read Data Read Attributes Read Extended Attributes Read Permissions Synchronize Take Ownership Traverse Folder Execute File Write Attributes Write Extended Attributes When you edit a permission entry you can change any of the following parameters Name Specifies the name of the security principal that receives the permission assignment. When you want to switch permissions from one principal to another rather than create an entirely new ACE you can use this interface to change the name of the assignee. Apply Onto Specifies which objects should receive the permission assignment using the options shown in Figure 9-17. This selector provides the most complete control over the inheritance of the assigned permissions available you can limit inheritance to any combination of files folders subfolders and child files. Figure 9-17 The Apply Onto options Permissions Specifies the special permissions to be assigned to the security principal. The Permissions list box includes all of the applicable special permissions listed earlier plus the Full Control standard permission. CHAPTER 9 SHARING FILE SYSTEM RESOURCES 303 NOTE Using the Apply Onto Option When you use the Apply Onto selector to limit the targets for permission inheritance all of the child folders and files still receive the ACE from the parent. Excluding certain child objects from inheritance just prevents those objects from enforcing the permissions in the ACE. In situations where the ACE is inherited by a large number of child objects possibly causing network performance problems using the Apply Onto option to limit the inheritance of the permissions is no help. Viewing Effective Permissions Considering the complexities .

TỪ KHÓA LIÊN QUAN