NTFS Tutorial #2: Working With NTFS Permissions

Download “NTFS #2 – Working with NTFS Permissions” as an eBook


In previous chapters, we covered how to visualize an ACL (the current permissions of a filer or folder). Now you are going to learn how to manage these permissions. Throughout this section, we will continue to use MyFolder as our example folder.

How to Assign or Remove NTFS Permissions

First, locate the folder or file you want to grant permissions to. Right click that folder. Then click on Properties.

Menu options relating to a file or folder in Windows

Click on the security tab to view the ACL for the folder. Under Groups or user names click the Edit button.

MyFolder ACL Properties Page

To remove a user, simply click on that user and press the Remove button followed by the OK button.

To add a user, click the Add button:

An access control list (ACL) in the Windows Server 2012 R2 / 2016

Now you can select the User/Groups you wish to grant access to MyFolder. The options within the Select Users or Groups form are as follows:

  • Object Types: Allows you to filter what type of object you want to assign, in order to narrow your search.
  • Locations: If you are on a Windows Network, you can choose between the local computer or Active Directory to search for network users in your organization.

For our example, we are going to type “FileShare-Operatoren” in the Enter the object names to select textbox and then click the Check Names button, followed by the OK button.

Adding users or groups to ACL

“FileShare-Operatoren” now appears on the “Permissions for MyFolder” page. Here you can choose which permissions to grant the user. Once you assign these permissions, click the OK button. For this exercise, we assigned the “Full Control” permission to the user from the “FileShare-Operatoren” group. You can also deny permissions using the “Deny” column. As a reminder, we do not recommend denying permissions to users. Instead, it is best to control user access through the groups which they belong to.

Assigning Permissions to the FileShare-Operatoren Group

Group now has “Full Control” permissions within the ACL.

MyFolder ACL After Assigning Permissions to FileShare-Operatoren


How to Assign Special Permissions

First, locate the folder or file you want to grant permissions to. Right click that folder. Then click on Properties.

 

Menu options relating to a file or folder in Windows

Click on the security tab to view the ACL for the folder. Then click on Advanced.

This is the Advanced Security Settings tab, which changed in Windows Server 2012 to provide an interface that is easier to understand and manage.

In the permissions tab, click on the Add button.

Advanced Security Settings for MyFolder

On the permissions entry page, click on Select a principal.

Permission Entry Property Page for MyFolder

Choose the user or group you want to grant special permissions to. We will use group “FSV_Change” for our example. Then click the OK button.

Adding users or groups to ACL

Once you have selected your user or group, by default, you are presented with the list of basic permissions. To see the list of advanced permissions, click on Show advanced permissions.

Enabling Advanced Permissions in the Permission Entry for the MyFolder Property Page

Select the proper advanced permissions for the user and click the OK button. For more details about each advanced permission type, please refer to the previous chapter.

Choosing Advanced Permissions

You will now see the advanced permissions assigned on the Advanced Security Settings page. Click the OK button to complete the process.

View of Advanced Permissions Set for FSV_Change group


How to Disable Inheritance

You can disable inheritance for any given file or folder by going to the Security tab within the properties of that file/folder and clicking on Advanced followed by Disable inheritance.

Disabling inheritance and replacing child object permissions in the Advanced Security Settings tab

In next step you have to choose one of the following options. The first option Convert inherited permissions into explicit permissions on this object will copy all inherited permissions and set them explicitly on this level. This would be the same as if you set all of these permissions manually.

The second option Remove all inherited permissions from this object will remove any permissions. You must be aware that you have to set permissions now by your own. Otherwise no permissions will be set on this folder anyway.

Block Inheritance Settings

When administrators and users start changing permissions regularly, some files or folders can become inaccessible to users and groups that should have access. For this reason, you can, at any time, go back to the default inherited state by choosing Replace all child object permission entries with inheritable permission entries from this object as seen in next image.

Advanced Security Settings


How to Override Folder Permissions with File Permissions

It is possible to override access to a file within a folder that you do not have access to. In our example, let’s say that you do not have access to “MyFolder”, but there is a specific file within MyFolder called “MyFile” that you need access to. You can receive access to only this specific file if you use the “Bypass Traverse Checking” security setting permission.

Bypass Traverse Checking is a setting that is assigned through Group Policy Settings. Therefore, we won’t cover it in detail in this article.


How to Override Folder Permissions with Deny Permission

It is possible to override any permissions with a Deny Permission. In our example, lets say that you do have modify access to “MyFolder” because of your membership in a specific security group, and you are a member of a group that is denying permissions to a specific file in that folder, you will not get access to this file.

Denying permissions overrides any other permissions a user might have. Consider, this is not the recommended method of controlling access to resources.

Example with Deny Permissions

In Figure above:

  • John is member of Group Sales_W and Group Sales_File2_DW.
  • For folder Sales John will inherit Write permissions from Group Sales_W.
  • And John will inherit Deny Write permissions for File2 from Group Sales_File2_DW.

The results are:

  • John can read and write to File1.
  • He can also read File2, but cannot write to this file because he is a member of Group Sales_File2_DW, which grants Deny Write permission to this file.

Download “NTFS #2 – Working with NTFS Permissions” as an eBook

 

 

 

Prevent Unauthorized Access to Sensitive Windows Folders!

Get your free edition of the easiest and fastest NTFS Permission Reporter now!