At the end of this video, the student will learn how to look at how much access a user has to a file or folder shared on a network server. We will do this using the Effective Permissions utility. This utility also has an easy-to-follow wizard for finding out who has access to resources.
- [Instructor] All administrators should be able to see…how much access a user has to a shared resource.…This can be easily done using the effective file access tab…in each folder on the server.…This can help troubleshoot an issue…when the user says they don't have access when they should,…and it can also be a way of spot auditing user access…when checking the server.…NTFS folders, which is the standard way…of formatting a drive,…are used to give access to users in two different ways,…Share and Security permissions.…
There are Share and Security permission tabs…at the top of each folder.…When we share a folder, the Shared permissions…are added together and the least restriction is applied.…Likewise, Security permissions are added together…and the least restrictions are applied as well.…Share and security permissions are then added together,…and the most restrictive access is applied.…The Effective Access tab helps us see…the results of these permissions.…We can certainly manually calculate the effective access,…
Author
Released
1/19/2017- Working with the Computer Management interface
- Formatting disks and editing files from the command line
- Configuring advanced file services such as BranchCache, auditing, and permissions
- Configuring Dynamic Access Control (DAC)
- Data deduplication
- Storage on Hyper-V
- Setting up Distributed File System (DFS)
- Understanding Volume Shadow Copy Service (VSS) and RAID storage options
Skill Level Intermediate
Duration
Views
Related Courses
-
Windows Server 2016 New Features
with Ed Liberman1h 14m Beginner
-
Introduction
-
Welcome43s
-
-
1. Introduction to File and Storage Services in Windows Server 2016
-
Command-line disk formatting7m 55s
-
Command-line file utilities5m 26s
-
Volumes and disks8m 1s
-
2. Configure Advanced File Services
-
Configure BranchCache5m 14s
-
Resource Monitor4m 43s
-
3. Implement Dynamic Access Control (DAC)
-
4. Configure and Optimize Storage
-
Configure an iSCSI target4m 34s
-
Configure an iSCSI initiator3m 37s
-
Configure tiered storage4m 26s
-
-
5. Additional Storage Roles
-
Data deduplication intro2m 59s
-
Practical deduplication6m 33s
-
Storage on Hyper-V7m 48s
-
-
6. Distributed File System
-
Installation of DFS role3m 14s
-
DFS namespace5m 57s
-
DFS replication7m 47s
-
DFS drive mapping3m 2s
-
Scripting DFS mapping5m 43s
-
-
7. Other Storage Options
-
Volume Shadow Copy3m 52s
-
-
Conclusion
-
Next steps49s
-
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.
CancelTake notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.
Share this video
Embed this video
Video: View effective file access permissions