Programming4us
         
 
 
Windows

Windows 7 : Setting Security Permissions on Files and Folders (part 5) - Assigning Special Permissions

12/16/2010 5:38:03 PM

Assigning Special Permissions

In some situations, you might want more fine-tuned control over a user’s or group’s permissions. For example, you may want to allow a user to add new files to a folder, but not new subfolders. Similarly, you may want to give a user full control over a file or folder, but deny that user the ability to change permissions or take ownership of the object.

For these more specific situations, Windows 7 offers a set of 14 special permissions for folders, and 13 special permissions for files:

  • Full Control— A user or group can perform any of the actions listed below.

  • Traverse Folder / Execute File— A user or group can open the folder to get to another folder, or can execute a program file.

  • List Folder / Read Data— A user or group can view the folder contents or can read the contents of a file.

  • Read Attributes— A user or group can read the folder’s or file’s attributes, such as Read-Only or Hidden.

    Note

    To see a file’s or folder’s attributes, right-click the item, click Properties, and then display the General tab.


  • Read Extended Attributes— A user or group can read the folder’s or file’s extended attributes. (These are extra attributes assigned by certain programs.)

  • Create File / Write Data— A user or group can create new files within a folder, or can make changes to a file.

  • Create Folders / Append Data— A user or group can create new subfolders within a folder, or can add new data to the end of a file (but can’t change any existing file data).

  • Write Attributes— A user or group can change the folder’s or file’s attributes.

  • Write Extended Attributes— A user or group can change the folder’s or file’s extended attributes.

  • Delete Subfolders and Files (folders only)— A user or group can delete subfolders and files within the folder.

  • Delete— A user or group can delete the folders or file.

  • Read Permissions— A user or group can read the folder’s or file’s permissions.

  • Change Permissions— A user or group can edit the folder’s or file’s permissions.

  • Take Ownership— A user or group can take ownership of the folder or file.

Here are the steps to follow to assign special permissions to a file or folder:

1.
In Windows Explorer, display the file or folder you want to secure.

2.
Right-click the file or folder, and then click Properties. (If you have the folder open, you can select Organize, Properties, instead.)

3.
Display the Security tab.

4.
Click Advanced. The Advanced Security Settings for Object dialog box appears, where Object is the name of the file or folder.

5.
In the Permissions tab, click Change Permissions.

6.
Click the existing permission you want to edit.

7.
Click Edit. The Permission Entry for Object dialog box appears.

8.
Use the check boxes in the Allow and Deny columns to assign the permissions you want for this user or group, as shown in Figure 4.

Figure 4. Use a file or folder’s Permission Entry dialog box to assign special permissions for a user or security group.


9.
Click OK in all the open dialog boxes.
Other -----------------
- Windows 7 : Setting Security Permissions on Files and Folders (part 4) - Assigning Standard Permissions
- Windows 7 : Setting Security Permissions on Files and Folders (part 3) - Assigning a User to Multiple Security Groups
- Windows 7 : Setting Security Permissions on Files and Folders (part 2) - Assigning a User to a Security Group
- Windows 7 : Setting Security Permissions on Files and Folders (part 1) -
- Cloud-Enabling the ESB with Windows Azure (part 2) - Sending Messages to Azure’s AppFabric Service Bus
- Cloud-Enabling the ESB with Windows Azure (part 1) - Receiving Messages from Azure’s AppFabric Service Bus
- Windows 7 : Sending and Receiving Secure Email (part 2) - Obtaining Another Person’s Public Key
- Windows 7 : Sending and Receiving Secure Email (part 1) - Setting Up an Email Account with a Digital ID
- Windows 7 : Maintaining Your Privacy While Reading Email
- Windows 7 : Email Phishing Protection
- SOA with .NET and Windows Azure : Service Hosting with WCF (part 3) - Managed Windows Services
- SOA with .NET and Windows Azure : Service Hosting with WCF (part 2) - Self-Hosted Services
- SOA with .NET and Windows Azure : Service Hosting with WCF (part 1)
- SOA with .NET and Windows Azure : Service Implementation with WCF (part 2)
- SOA with .NET and Windows Azure : Service Implementation with WCF (part 1)
- Windows 7 : Thwarting Spam with Windows Live Mail’s Junk Filter (part 2) - Blocking Countries and Languages
- Windows 7 : Thwarting Spam with Windows Live Mail’s Junk Filter (part 1)
- Windows 7 : Configuring Windows Defender to Scan Email
- Windows 7 : Protecting Yourself Against Email Viruses
- Windows 7 : Understand Internet Explorer’s Advanced Security Options
 
 
Most View
- Microsoft Dynamics GP 2010 : Populating Initial Data - Customers
- Windows Server 2008 : Configuring Terminal Services (part 3)
- Developing for Windows Phone and Xbox Live : Game Loop
- BizTalk Server 2009 : Service-oriented schema patterns (part 1) - Designing schemas based on service type
- Windows Server 2008 : Configuring Windows Media Services (part 8) - Using the Unicast Announcement Wizard
- SharePoint Server 2010 Business Intelligence Platform (part 1) - Business Intelligence Web Parts
- Windows Server 2003 : Managing Security Configuration with Security Templates (part 1)
- Exchange Server 2010 : Upgrading from and Coexisting with Exchange Server 2003 (part 4)
- System Center Configuration Manager 2007 : Architecture Design Planning - Site Planning
- BizTalk Server 2009 : Types of services
Top 10
- Implementing Edge Services for an Exchange Server 2007 Environment : Utilizing the Basic Sender and Recipient Connection Filters (part 3) - Configuring Recipient Filtering
- Implementing Edge Services for an Exchange Server 2007 Environment : Utilizing the Basic Sender and Recipient Connection Filters (part 2)
- Implementing Edge Services for an Exchange Server 2007 Environment : Utilizing the Basic Sender and Recipient Connection Filters (part 1)
- Implementing Edge Services for an Exchange Server 2007 Environment : Installing and Configuring the Edge Transport Server Components
- What's New in SharePoint 2013 (part 7) - BCS
- What's New in SharePoint 2013 (part 6) - SEARCH
- What's New in SharePoint 2013 (part 6) - WEB CONTENT MANAGEMENT
- What's New in SharePoint 2013 (part 5) - ENTERPRISE CONTENT MANAGEMENT
- What's New in SharePoint 2013 (part 4) - WORKFLOWS
- What's New in SharePoint 2013 (part 3) - REMOTE EVENTS