programming4us
           
 
 
Windows

Windows 7 : Setting Security Permissions on Files and Folders (part 5) - Assigning Special Permissions

- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019
12/16/2010 5:38:03 PM

Assigning Special Permissions

In some situations, you might want more fine-tuned control over a user’s or group’s permissions. For example, you may want to allow a user to add new files to a folder, but not new subfolders. Similarly, you may want to give a user full control over a file or folder, but deny that user the ability to change permissions or take ownership of the object.

For these more specific situations, Windows 7 offers a set of 14 special permissions for folders, and 13 special permissions for files:

  • Full Control— A user or group can perform any of the actions listed below.

  • Traverse Folder / Execute File— A user or group can open the folder to get to another folder, or can execute a program file.

  • List Folder / Read Data— A user or group can view the folder contents or can read the contents of a file.

  • Read Attributes— A user or group can read the folder’s or file’s attributes, such as Read-Only or Hidden.

    Note

    To see a file’s or folder’s attributes, right-click the item, click Properties, and then display the General tab.


  • Read Extended Attributes— A user or group can read the folder’s or file’s extended attributes. (These are extra attributes assigned by certain programs.)

  • Create File / Write Data— A user or group can create new files within a folder, or can make changes to a file.

  • Create Folders / Append Data— A user or group can create new subfolders within a folder, or can add new data to the end of a file (but can’t change any existing file data).

  • Write Attributes— A user or group can change the folder’s or file’s attributes.

  • Write Extended Attributes— A user or group can change the folder’s or file’s extended attributes.

  • Delete Subfolders and Files (folders only)— A user or group can delete subfolders and files within the folder.

  • Delete— A user or group can delete the folders or file.

  • Read Permissions— A user or group can read the folder’s or file’s permissions.

  • Change Permissions— A user or group can edit the folder’s or file’s permissions.

  • Take Ownership— A user or group can take ownership of the folder or file.

Here are the steps to follow to assign special permissions to a file or folder:

1.
In Windows Explorer, display the file or folder you want to secure.

2.
Right-click the file or folder, and then click Properties. (If you have the folder open, you can select Organize, Properties, instead.)

3.
Display the Security tab.

4.
Click Advanced. The Advanced Security Settings for Object dialog box appears, where Object is the name of the file or folder.

5.
In the Permissions tab, click Change Permissions.

6.
Click the existing permission you want to edit.

7.
Click Edit. The Permission Entry for Object dialog box appears.

8.
Use the check boxes in the Allow and Deny columns to assign the permissions you want for this user or group, as shown in Figure 4.

Figure 4. Use a file or folder’s Permission Entry dialog box to assign special permissions for a user or security group.


9.
Click OK in all the open dialog boxes.
Other -----------------
- Cloud-Enabling the ESB with Windows Azure (part 2) - Sending Messages to Azure’s AppFabric Service Bus
- Cloud-Enabling the ESB with Windows Azure (part 1) - Receiving Messages from Azure’s AppFabric Service Bus
- Windows 7 : Sending and Receiving Secure Email (part 2) - Obtaining Another Person’s Public Key
- Windows 7 : Sending and Receiving Secure Email (part 1) - Setting Up an Email Account with a Digital ID
- Windows 7 : Maintaining Your Privacy While Reading Email
- Windows 7 : Email Phishing Protection
- SOA with .NET and Windows Azure : Service Hosting with WCF (part 3) - Managed Windows Services
- SOA with .NET and Windows Azure : Service Hosting with WCF (part 2) - Self-Hosted Services
- SOA with .NET and Windows Azure : Service Hosting with WCF (part 1)
- SOA with .NET and Windows Azure : Service Implementation with WCF (part 2)
- SOA with .NET and Windows Azure : Service Implementation with WCF (part 1)
- Windows 7 : Thwarting Spam with Windows Live Mail’s Junk Filter (part 2) - Blocking Countries and Languages
- Windows 7 : Thwarting Spam with Windows Live Mail’s Junk Filter (part 1)
- Windows 7 : Configuring Windows Defender to Scan Email
- Windows 7 : Protecting Yourself Against Email Viruses
- Windows 7 : Understand Internet Explorer’s Advanced Security Options
- SOA with .NET and Windows Azure : WCF Services - Overview
- SOA with .NET and Windows Azure : Web Services (ASMX and WSE)
- Windows 7 : Enhancing Your Browsing Security (part 6) - Managing Add-Ons
- Windows 7 : Enhancing Your Browsing Security (part 5) - Encoding Addresses to Prevent IDN Spoofing
 
 
 
Top 10
 
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
- First look: Apple Watch

- 3 Tips for Maintaining Your Cell Phone Battery (part 1)

- 3 Tips for Maintaining Your Cell Phone Battery (part 2)
programming4us programming4us