
This approach centralizes the administration of share permissions. Have users log on using domain user accounts rather than local accounts.For example, if a you need to give someone Read/Write permissions for all of the \Finance folder but not \Finance\Budget, you're gonna have a bad time later. If something would break inheritance, then it either needs to move up a level or you need to reassess who's got what permissions on the parent folder. There will be a few folders where this may be necessary, but generally avoid it. Avoid breaking permissions inheritance as much as possible.Create a Global Deny group so that when employees leave the company, you can quickly remove all their file server access by making them members of that group.Remove the Everyone permission from every resource except the global folder designated for file exchanges.For example, if users need only to read information in a folder and not to change, delete or create files, assign the Read permission only. Assign the most restrictive permissions that still allow users to perform their jobs.Modify rights should be all that's necessary for most users.
#Testout lab 6.3.9 configure share permissions full
Full Control enables users to change NTFS permissions, which average users should not need to do.


For this share, create the following domain local groups in your AD with the permissions shown:.

For example, suppose you have a share named HR on fileserver1.
