|

FEATURED POSTS

How to Change Outlook Password in 3 Different Ways

How to Change Outlook Password in 2 Easy Steps

Introduction Before you change your Outlook Password you have to first change it with your email provider. The reason...
spotify web player not working

Spotify Web Player Not Working [Fixed]

Introduction Spotify Web Player may stop working for you with the following error messages: "Spotify Web Player an Error...
DISM.exe /Online /Cleanup-Image /Restorehealth

DISM.exe /Online /Cleanup-Image /Restorehealth Explained

What is DISM.EXE /Online /Cleanup-image /RestoreHealth? "DISM.exe /Online /Cleanup-Image /Restorehealth" is a DISM command that repairs issue with the...
DHCP Relay agent

DHCP Relay Agent: Configuration in Windows Server 2016

What is a DHCP Relay Agent? A DHCP Relay Agent allows DHCP clients in a different network subnet to...
ForEach-Powershell

PowerShell ForEach: Syntax, Parameters, Examples

What is PowerShell ForEach? PowerShell ForEach (ForEach PowerShell) is a PowerShell construct used in iterating through values in a...

TRENDING POSTS

Remote Desktop Connection

Remote Desktop Connection an Internal Error Has Occurred [Fixed]

Introduction I recently received the error message "Remote Desktop Connection an Internal Error Has Occurred". It was strange because...

Find My Samsung: Register and Use Samsung Find my Mobile

Introduction Ever wondered how you could find your Samsung phone if you lost it? Find my Samsung or Samsung...
PowerShell vs CMD

Powershell vs CMD: Differences and Similarities Compared

Introduction This short guide compares PowerShell vs CMD (Windows command prompt). I will cover the history and nature of...
Spotify No Longer Supports this Version of Microsoft Edge

Spotify No Longer Supports this Version of Microsoft Edge [Fixed]

Introduction When you open Spotify web player on Microsoft Edge, you may receive the error message "Spotify No Longer...
Windows 10 Won't Boot

Windows 10 Won’t Boot With Black Screen? 3 Ways to Fix It

Why Won't Windows 10 Boot Up? If your Windows 10 stops with a black screen, the first question in...

BEST OF ITECHGUIDES

Powershell For Loop Explained: Syntax and Examples

Introduction "Powershell For Loop" (or Statement) is a construct that is used to run a command in a...
Windows defender blocked by Group Policy

Windows Defender Blocked by Group Policy [Fixed]

Introduction If you receive the error message Windows Defender is blocked by group policy, your computer may have been...
active directory interview questions

35 Active Directory Interview Questions and Answers

I have compiled 35 Active Directory interview questions and answers. Where necessary, I have also provided additional information to help you understand...
concatenate excel

Concatenate in Excel: How to Concatenate Columns and Strings

What is Concatenate in Excel? Concatenate in Excel is joining two strings into one continuous string. You can join...
SysWOW64 and File System Redirector Explained

SysWOW64 and File System Redirector Explained

Introduction A Windows 64-bits OS has a SysWOW64 folder. It also has a System32 folder. These folders contain OS...

RECENT POSTS

how to merge cells in excel

How to Merge Cells in Excel in 2 Easy Ways

Introduction You can merge two Cells in Excel using CONCATENATE function or the “&” (ampersand) operator. Though Excel has...
How to Make a Pivot Table in Google Sheets

How to Make a Pivot Table in Google Sheets

Introduction You can make a Pivot Table in Google Sheets to simplify analysis of complex data. A Pivot Table...
how to make Pivot Table

How to Make a Pivot Table in Excel

Introduction A Pivot Table allows you to analyze, summarize and calculate large data to help find relationships. With a...
RAID 3 (Redundant Array of Independent Disks) Explained

RAID 3 (Redundant Array of Independent Disks) Explained

What is RAID 3? RAID 3 is a RAID implementation that uses striping with a dedicated parity disk....
RAID 5 vs RAID 6

RAID 5 vs RAID 6: Differences, Benefits and Disadvantages

What is RAID 5 vs RAID 6? RAID 5 and RAID 6 uses striping with distributed parity technique. However,...
concatenate excel

Concatenate in Excel: How to Concatenate Columns and Strings

What is Concatenate in Excel? Concatenate in Excel is joining two strings into one continuous string. You can join...

How to Add in Excel (Excel Sum) with Examples

Introduction There are different ways to add numbers in Excel. You could simply select the cells containing the data....
Excel Count

Excel Count: How to Count in Excel With Examples

Introduction Excel COUNT Function is used for counting items in a worksheet. Excel COUNT also has the conditional function,...
powershell.exe -command

Powershell.exe Command: Syntax, Parameters and Examples

Introduction You may be wondering why write on Powershell.exe Command. Are there special commands for Powershell.exe? Yes! When you...
how to move columns in excel

How to Move Columns to Rows and Rows to Columns in Excel

Introduction If you receive some Excel data in columns, you can easily move the columns to rows in Excel...

MUST READ

WSUS

WSUS (Windows Server Update Service): Installation and Configuration

What is WSUS Server? WSUS (Windows Server Update Service) is a Microsoft Server role that allows download and installation...

DHCP vs Static IP: How to Set a Static IP or Enable DHCP in...

What is DHCP vs Static IP Address? This tutorial will compare the difference between DHCP vs Static IP addressing....

Powershell If Else Explained: Syntax and Examples

Introduction PowerShell If Else statement runs a command if a specified condition is met. The Else part of PowerShell...
DISM Host Servicing Process (DismHost.exe)

Dism Host Servicing Process (DismHost.exe), a Malware?

Introduction There are conflicting information about Dism Host Servicing Process (DismHost.exe). Some say it is a genuine Windows process,...
Walmart Baby Registry

Walmart Baby Registry: Your Definitive Guide

Introduction Walmart Baby Registry gives expectant mothers a place to create a list of items they need for their...

NTFS Permissions with Share Permissions Compared

-

Introduction

Combing NTFS permissions with share Permissions increases folder security within a network. Every Windows Administrator should have a detailed understanding of the two types of permissions and how to use them effectively.

What Are NTFS Permissions and Share Permissions?

NTFS Permissions are used to control access to files and folders on a local computer and over the network. NTFS permissions can only apply to files and folders on volumes formatted with NTFS file systems.

Important Tip
NTFS means New Technology File System. It was introduced in Microsoft’s Windows NT and have been used in subsequent Windows Operating Systems.

Share permissions control access to shared folders and only applies when a user accesses a folder over the network. This type of permission do not apply to users logged on to the local computer. Share permissions applies to folders in volumes formatted with both NTFS, FAT and FAT32 file systems.

Sponsored Content


In this tutorial you will learn:

  • Features of NTFS Permissions
  • Features of Shared folder Permissions
  • NTFS Permissions vs Share Permissions: How they Interact
  • Configure NTFS and Share Permissions
  • How to Configure NTFS Permission Inheritance

Features of NTFS Permissions

NTFS Permissions with Share Permissions - NTFS permission features

NTSF permissions are controlled via the Security tab of the folder’s properties settings. Refer to the image above. The part labelled “A” lists users that have access to the folder. Part “B” lists the permissions these users have.

Available NTFS Permissions

As shown in the previous image, a user can be granted 6 permissions. I have described each below

“Full Control” Permissions

Grants the user ability to crate, modify or delete files and subfolders within the folder. Full Control permission also enables the user to traverse folders and execute programs in the folder. Finally, this also grants the user ability to modify the permissions for the folder and all subfolders and files

“Modify” Permissions

A user granted the “Modify” NTFS permission will be able to create and delete folders. The user can also modify the properties of the folder.

Read & execute” Permissions

This permission grants a user the right to view files and folders. The user is also able to run executable files, including scripts.

“List folder contents” Permissions

“List folder contents” permission grants the user the ability to view and list the contents of a folder. The user can also execute files and view the folder’s attributes.

“Read” Permissions

Allows a user to view the contents of the folder, including files and subfolders.

“Write” NTFS Permissions

Grants the access to add new files and subfolders to the folder. A user with “Write” permission will also be able to write to a file within the folder.

Sponsored Content


Features of Share folder Permissions

NTFS Permissions with Share Permissions - features of a share permission

The image above shows the share permission of a folder. It is available via the Sharing tab of a folder’s Properties settings. In the image, the part labelled “A” is where you add users that require access. “B” is where you modify the permission you wish to grant or deny the users.

Later in this tutorial, I will show you how to share a folder and modify share permissions. In this section I will explore the various types of permissions you can grant a user.

Available Share Permissions

Below are the various permissions you can grant or deny a user when you share a folder.

“Read” Permissions

“Read” share permission allows a user to view the contents of a folder. By default, the “Everyone” group is assigned “Read” permissions.

“Change” Permissions

A user granted the “Change” permission has all the permissions granted by “Read”. The user can also create and delete files and subfolders in the folder.

“Full Control” Permissions

The “Full Control” share permission grants users the access granted by “Read” and “Change”. However, it also grants edit permissions and ability to take ownership of files. By default, the “Administrators” group is granted “Full Control” permissions.

NTFS Permissions vs Share Permissions: How they Interact

One question in the minds of entry-level admins is this “When you configure NTFS permissions and Share permissions, which one takes precedence”. This section will answer that question.

The table below highlights the key features of both permissions and how they work together.

S/NFeaturesNTFS Permissions Share Permissions
1Permissions PrecedenceIf a folder has both NTFS permissions and share permissions, the most restrictive permission applies
2Application to File SystemsCan only apply to folders on volumes formatted with NTFS file systemCan apply to folders on volumes formatted with FAT, FAT32 and NTFS file systems
3Permissions ControlAllows more granular control – like configure subfolder permission inheritanceEasy to manage but does not allow granular control
4Concurrent connections RestrictionsNTFS permissions does not have the option to restrict the maximum allowed concurrent connections.You can specify how many connects allowed concurrently.
5Location of Configuration settingsAccessed via the Security tab of the folders Properties settings.Share permissions can be configured via the Sharing tab of a folders Properties – by either using the Share or Advanced Share button
6Application to network or local usersApplies to users logged on to the local computer.Does not apply to users logged on to the local computer.

Sponsored Content


Configure NTFS and Share Permissions

In this section, I will walk you through the steps to configure NTFS permissions and Share permissions. The section will conclude by walking you through NTFS Permission Inheritance configuration.

How to Configure NTFS Permissions

  • Right-click the folder and click Properties.
  • To modify the NTFS permissions of the folder, click the Security tab.
NTFS Permissions with Share Permissions
  • Click Edit (labelled “A” in the image below). The part labelled “B” opens for editing. You can add a new user using the Add button. You then need to check the box beside the permission type you wish to grant the user (“Allow” or “Deny”).

How to Configure Share Permissions

There are two ways you can configure share permissions. In this section I will cover both.

As both options are accessed via the folder “Sharing” tab, from the properties of the folder, click the Sharing tab.

Configure Share Using the “Share” Button

  • Click the “Share” button.
  • The option to share the folder opens (see image below).
  • If you wish to share the folder with the default permissions, click the Share button. Otherwise, to add other users click the drop-down on the highlighted portion of the image. Select Everyone or Find people. Finally, click Add.
Important Tip
If you select Find people, the system will open the option to search for specific users or groups. See the second image below.
  • When you are done adding users or groups and granting the permission you desire, click Share. Review the share information then click Done.

Sponsored Content


Configure Share Using the “Advanced Sharing” Button

NTFS Permissions with Share Permissions

To share using the Advanced Sharing button:

  • Click Advanced Sharing button.
  • When the Advanced Sharing option loads, check the “Share this folder” box. Accept the default share name or modify it.
NTFS Permissions with Share Permissions
  • Then click Permissions. The steps from this point is very similar to the task you performed when you configured NTFS permissions. Add or Remove a user, then check the box beside the permission you wish to grant or deny the user (“Allow” or “Deny”). When you finish, click Ok to share the folder.
NTFS Permissions with Share Permissions - configure share permissions
  • When you click Ok, above you will be returned to the “Advanced Sharing” page. Here you can configure the number of simultaneous users (concurrent connections). When you finish, click Ok.
  • The folder is now shared with the permissions you configured!

How to Configure NTFS Permission Inheritance

  • From the properties page of the folder, click Security.
  • To enable NTFS Permissions inheritance, click Enable inheritance. To force the permissions on the top level folder to propagate to all child items, check the box beside Replace all child object permissions entries with inheritable permission entry from this object. Click Ok to apply your changes.

Sponsored Content


Use the “Replace all child object permission…” carefully. For folders with very large subfolders, it could take very long to apply the permissions.

Conclusion

There you have it! NTFS Permissions simplified. I hope you have added to your knowledge of NTFS and share permissions.

If you have any question or comment, kindly use the “Leave a Reply” form at the end of this tutorial. You could also share your experience so other readers can benefit from it.

Other Helpful Tutorials

Additional Resources and References

YOU MAY ALSO LIKE:

LEAVE A REPLY

Please enter your comment!
Please enter your name here

By using this website you agree to accept our Privacy Policy and Terms & Conditions