A
Andrew Hodgson
Guest
Hi all,
I have a question about permissions on a large file server we have at
the office.
We set up the server with a large drive (d, and have the default
permissions on the root of the volume. We created directories in the
volume, and defined explicit permissions, blocking inheritance, and
removed all the default permissions barring the domain administrator,
the groups that need access to the relevant folder, and the local
administrator. We then shared the relevant directories out using
share permissions as the relevant groups that need access.
In the directories holding user profiles and the folders for the My
Documents redirection, we created the relevant folders and added the
relevant admin accounts to the list. We then added the domain users
group to be able to view directories under this folder, but defined
that this should only apply to the folder and nothing underneath it.
This works well - when we create a user, we create the folder, and
give the relevant user full control of the folder. The domain users
group does not appear in this folder, and the parent permissions are
inherited.
We are now wanting to take this a step further, by looking at how
specific users can gain access to the relevant folders for
administrative purposes, such as to change permissions on the relevant
folders (all folders on the server), without having to log in as the
domain administrator. We are quite happy if they could log in under
another domain account which has the relevant rights to do this, we
just need them to log in under an account which will be audited,
unlike the domain admin account, where anyone who knows the relevant
passwords can gain access therein.
Also, if there is a more secure way of doing the permissions for the
relevant profile/redirection directories, I would be interested to
know. We have seen for example that Vista (if left to create the
relevant directories) seems to set explicit permissions to the user,
barring the administrator or anyone else from accessing the files
underneath (unless the admin takes ownership of the folder).
We are using Windows Server 2003 R2 (SP2). Our domain is Windows
Server 2008 native, so if there would be any advantage in us upgrading
the file server to that, we would be interested to know.
Looking forward to anyone's thoughts in this matter,
Thanks,
Andrew.
I have a question about permissions on a large file server we have at
the office.
We set up the server with a large drive (d, and have the default
permissions on the root of the volume. We created directories in the
volume, and defined explicit permissions, blocking inheritance, and
removed all the default permissions barring the domain administrator,
the groups that need access to the relevant folder, and the local
administrator. We then shared the relevant directories out using
share permissions as the relevant groups that need access.
In the directories holding user profiles and the folders for the My
Documents redirection, we created the relevant folders and added the
relevant admin accounts to the list. We then added the domain users
group to be able to view directories under this folder, but defined
that this should only apply to the folder and nothing underneath it.
This works well - when we create a user, we create the folder, and
give the relevant user full control of the folder. The domain users
group does not appear in this folder, and the parent permissions are
inherited.
We are now wanting to take this a step further, by looking at how
specific users can gain access to the relevant folders for
administrative purposes, such as to change permissions on the relevant
folders (all folders on the server), without having to log in as the
domain administrator. We are quite happy if they could log in under
another domain account which has the relevant rights to do this, we
just need them to log in under an account which will be audited,
unlike the domain admin account, where anyone who knows the relevant
passwords can gain access therein.
Also, if there is a more secure way of doing the permissions for the
relevant profile/redirection directories, I would be interested to
know. We have seen for example that Vista (if left to create the
relevant directories) seems to set explicit permissions to the user,
barring the administrator or anyone else from accessing the files
underneath (unless the admin takes ownership of the folder).
We are using Windows Server 2003 R2 (SP2). Our domain is Windows
Server 2008 native, so if there would be any advantage in us upgrading
the file server to that, we would be interested to know.
Looking forward to anyone's thoughts in this matter,
Thanks,
Andrew.