title
Introduction to File and Share Permissions in Windows Server 2012

description
Info Level: Intermediate Presenter: Eli the Computer Guy Date Created: April 17, 2013 Length of Class: 35:11 Research Assistance: Tracks Windows Server 2012 Prerequisites Comfortably be able to use Windows Server 2012 and Windows 8. Be able to create Users and Groups on Windows Server 2012 Purpose of Class This class teaches students about the basic concepts of File and NTFS Permissions in a Windows Server 2012 Environment. Class Notes Permissions and Security are different things Permissions allow Users, or Groups access to Resources such as Files, Folders and Printers It is best to assign Permissions to Groups and not to Individual Users Share and NTFS Permissions are different Share Permissions only matter when Resources are being accessed over the network. If a User is Local the Permissions are ignored. NTFS Permissions are used whether Resources are access over the Network or Locally. Over the Network is there are both Share and NTFS permissions set on a Resource then the Most Restrictive Permission is the one that will be applied. In General it is best to set Share Permissions to a resource to Everyone with Full Control, and then use NTFS Permissions to grant or restrict access. Share Permissions allow you to access Resource through UNC (Universal naming Convention) \\SERVERNAME\SHARE The FAT, FAT 16 and FAT 32 file systems used in Windows 95 and 98 could only use Share Permissions. Inheritance means that Permissions set to parent Folders will be inherited by Child Resources Log in and Out for New Permissions to be applied By Default Creators of Resources are the Owners. Resource Owners can set permissions to Resources. Corrections Lab Setup Used in Demonstration The ETCG Host Computer Specs are: ASUS Model: CM6870US01 16 GB of RAM 1 TB 7200 RPM Hard Drive i7 3.4 GHz Intel Processor Windows Server 2012 Machine Virtual Machine AD, DNS and DHCP have been setup Domain ETCG.com has been created Created 2 Users and 2 Groups Networking Configuration in VirtualBox = Internal Windows 8 Machine Virtual Machine Already a member of the Domain (Etcg.com) Networking Configuration in VirtualBox = Internal Resources

detail
{'title': 'Introduction to File and Share Permissions in Windows Server 2012', 'heatmap': [{'end': 1993.387, 'start': 1963.203, 'weight': 1}], 'summary': "'introduction to file and share permissions in windows server 2012' covers the importance of permissions in active directory, emphasizing access control to files, folders, and printers. it highlights the significance of understanding it permissions, sharing folders, and the role of permissions in user interactions with resources.", 'chapters': [{'end': 142.904, 'segs': [{'end': 61.029, 'src': 'embed', 'start': 5.814, 'weight': 0, 'content': [{'end': 13.358, 'text': 'Hello again, as you know I am Eli the Computer Guy and this is the next class in the Windows Server 2012 track.', 'start': 5.814, 'duration': 7.544}, {'end': 20.081, 'text': 'This is Introduction to File and Share Permissions on Windows Server 2012.', 'start': 13.678, 'duration': 6.403}, {'end': 30.366, 'text': 'So, as I talked about before, where Active Directory is one of the main components, one of the main reasons why enterprises use Microsoft Servers,', 'start': 20.081, 'duration': 10.285}, {'end': 40.132, 'text': 'the File and Share Permissions is one of the main pieces of functionality that makes Active Directory so cool and useful.', 'start': 30.366, 'duration': 9.766}, {'end': 49.3, 'text': 'Basically, using file and share permissions, you can very easily give access to files, folders,', 'start': 40.633, 'duration': 8.667}, {'end': 59.868, 'text': "printers to the users that you want to have access to those items and restrict that access from the users you don't want to be able to have access.", 'start': 49.3, 'duration': 10.568}, {'end': 61.029, 'text': 'Not only that,', 'start': 60.288, 'duration': 0.741}], 'summary': 'Introduction to file and share permissions on windows server 2012 track with eli the computer guy.', 'duration': 55.215, 'max_score': 5.814, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/fJHFmt6F0Rc/pics/fJHFmt6F0Rc5814.jpg'}], 'start': 5.814, 'title': 'Windows server 2012 file and share permissions', 'summary': 'On introduction to file and share permissions on windows server 2012 emphasizes the importance of this functionality in active directory, allowing easy access control to files, folders, and printers, and detailing the various levels of access that can be granted to individual users.', 'chapters': [{'end': 142.904, 'start': 5.814, 'title': 'Windows server 2012 file and share permissions', 'summary': 'On introduction to file and share permissions on windows server 2012 emphasizes the importance of this functionality in active directory, allowing easy access control to files, folders, and printers, and detailing the various levels of access that can be granted to individual users.', 'duration': 137.09, 'highlights': ['File and Share Permissions in Windows Server 2012 are a cornerstone of enterprise environments, allowing easy access control to files, folders, and printers, and enabling granular control over user access levels.', 'The functionality of File and Share Permissions in Windows Server 2012 makes Active Directory useful, as it allows for the restriction of access to specific users and defines their level of access, such as read, write, execute, and listing contents in a folder.', 'To work effectively in enterprise environments, it is crucial to understand Windows Server 2012 File and Share Permissions, regardless of personal preferences for operating systems, as it is a fundamental aspect encountered in real-world scenarios.']}], 'duration': 137.09, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/fJHFmt6F0Rc/pics/fJHFmt6F0Rc5814.jpg', 'highlights': ['File and Share Permissions in Windows Server 2012 are a cornerstone of enterprise environments, allowing easy access control to files, folders, and printers, and enabling granular control over user access levels.', 'The functionality of File and Share Permissions in Windows Server 2012 makes Active Directory useful, as it allows for the restriction of access to specific users and defines their level of access, such as read, write, execute, and listing contents in a folder.', 'To work effectively in enterprise environments, it is crucial to understand Windows Server 2012 File and Share Permissions, regardless of personal preferences for operating systems, as it is a fundamental aspect encountered in real-world scenarios.']}, {'end': 369.338, 'segs': [{'end': 173.224, 'src': 'embed', 'start': 143.225, 'weight': 0, 'content': [{'end': 149.49, 'text': 'Whatever you do, though, go out and buy a book, especially once you get into dealing with these permissions,', 'start': 143.225, 'duration': 6.265}, {'end': 152.752, 'text': 'because permissions is kind of how do you explain permissions?', 'start': 149.49, 'duration': 3.262}, {'end': 155.554, 'text': 'Permissions is a bit like algebra.', 'start': 153.052, 'duration': 2.502}, {'end': 160.498, 'text': "It's one of those things that, once you understand it, darn it easy.", 'start': 155.655, 'duration': 4.843}, {'end': 163.539, 'text': 'Wow, how could anybody not understand this stuff?', 'start': 160.498, 'duration': 3.041}, {'end': 173.224, 'text': 'right, but until you, you do understand it, yeah, it can just seem like the most esoteric, stupid thing in the world.', 'start': 163.539, 'duration': 9.685}], 'summary': 'Understanding permissions is like learning algebra, initially complex but easy once grasped.', 'duration': 29.999, 'max_score': 143.225, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/fJHFmt6F0Rc/pics/fJHFmt6F0Rc143225.jpg'}, {'end': 223.841, 'src': 'embed', 'start': 199.833, 'weight': 1, 'content': [{'end': 207.021, 'text': 'You need to create multiple groups, you need to create multiple users, multiple computers, and actually start playing with this.', 'start': 199.833, 'duration': 7.188}, {'end': 211.226, 'text': "This is one of those, again, the skill sets that's very tactile.", 'start': 207.342, 'duration': 3.884}, {'end': 215.651, 'text': "This is not like subnetting where you kind of either know it or you don't know it.", 'start': 211.266, 'duration': 4.385}, {'end': 218.194, 'text': "This is one of those things that you've got to play with.", 'start': 215.691, 'duration': 2.503}, {'end': 219.616, 'text': "You've got to fool around with.", 'start': 218.234, 'duration': 1.382}, {'end': 220.577, 'text': "You've got to break.", 'start': 219.636, 'duration': 0.941}, {'end': 221.518, 'text': "You've got to fix.", 'start': 220.637, 'duration': 0.881}, {'end': 223.841, 'text': "And then, once you do, you'll be like again.", 'start': 222.119, 'duration': 1.722}], 'summary': 'To master the skill of creating groups, users, and computers, it requires hands-on practice, experimentation, and troubleshooting.', 'duration': 24.008, 'max_score': 199.833, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/fJHFmt6F0Rc/pics/fJHFmt6F0Rc199833.jpg'}, {'end': 348.647, 'src': 'embed', 'start': 300.302, 'weight': 2, 'content': [{'end': 309.765, 'text': 'So shared permissions only come into play when people are accessing the resource from another computer, device, whatever, on the network.', 'start': 300.302, 'duration': 9.463}, {'end': 315.167, 'text': 'NTFS permissions, are always in effect.', 'start': 310.525, 'duration': 4.642}, {'end': 324.594, 'text': 'So basically, if you try to access the file folder resource over the network, the permissions will be in effect.', 'start': 315.808, 'duration': 8.786}, {'end': 329.697, 'text': 'And if you sit down locally at the computer, the permissions will be in effect.', 'start': 325.074, 'duration': 4.623}, {'end': 331.378, 'text': "So that's the first thing to realize.", 'start': 330.097, 'duration': 1.281}, {'end': 333.199, 'text': 'And there are two separate sets of permissions.', 'start': 331.398, 'duration': 1.801}, {'end': 336.661, 'text': "There's share permissions, and then there are NTFS permissions.", 'start': 333.239, 'duration': 3.422}, {'end': 343.884, 'text': 'And they are two separate things that kind of meet and do a whole bunch of messy, messy, ugly, nasty stuff.', 'start': 337.001, 'duration': 6.883}, {'end': 348.647, 'text': "Now, as I talk about this when I'm talking about permissions again.", 'start': 344.285, 'duration': 4.362}], 'summary': 'Shared and ntfs permissions apply when accessing resources locally or over the network.', 'duration': 48.345, 'max_score': 300.302, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/fJHFmt6F0Rc/pics/fJHFmt6F0Rc300302.jpg'}], 'start': 143.225, 'title': 'It permissions', 'summary': 'Highlights the significance of understanding permissions in it, comparing it to algebra and stressing hands-on practice. it also explains the difference between share and ntfs permissions to prevent confusion and frustration among new technology users.', 'chapters': [{'end': 220.577, 'start': 143.225, 'title': 'Understanding permissions in it', 'summary': 'Emphasizes the importance of buying a book to understand permissions, comparing it to algebra and stressing the need for hands-on practice with creating multiple groups, users, and computers.', 'duration': 77.352, 'highlights': ['The importance of buying a book to understand permissions, likening it to algebra and stressing the need for hands-on practice.', 'The need for hands-on practice with creating multiple groups, users, and computers to understand permissions.']}, {'end': 369.338, 'start': 220.637, 'title': 'Understanding share and ntfs permissions', 'summary': 'Explains the difference between share and ntfs permissions, highlighting that share permissions are only effective when accessing resources over the network, while ntfs permissions are always in effect, aiming to prevent confusion and frustration among new technology users.', 'duration': 148.701, 'highlights': ['Share permissions are only applicable when accessing resources over the network, while NTFS permissions are always in effect, ensuring that accessing resources locally or over the network is subjected to permissions.', 'New technology users often confuse and conflate concepts, leading to frustration and giving up, emphasizing the importance of understanding the distinction between share and NTFS permissions to prevent confusion and frustration.', 'It is crucial to realize that share permissions and NTFS permissions are separate sets of permissions that intersect and have different effects, helping to avoid confusion among new technology users.']}], 'duration': 226.113, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/fJHFmt6F0Rc/pics/fJHFmt6F0Rc143225.jpg', 'highlights': ['Understanding permissions is crucial, likened to algebra, and requires hands-on practice.', 'Hands-on practice with creating multiple groups, users, and computers is essential for understanding permissions.', 'NTFS permissions are always in effect, while share permissions are only applicable over the network.', 'Distinguishing between share and NTFS permissions is crucial to prevent confusion and frustration among new technology users.', 'Share and NTFS permissions are separate sets that intersect and have different effects, helping to avoid confusion.']}, {'end': 1207.378, 'segs': [{'end': 398, 'src': 'embed', 'start': 369.338, 'weight': 0, 'content': [{'end': 372.76, 'text': 'well, one of the big, important things to remember with permissions.', 'start': 369.338, 'duration': 3.422}, {'end': 375.942, 'text': 'we are currently talking about permissions.', 'start': 372.76, 'duration': 3.182}, {'end': 386.83, 'text': 'permissions are how users can deal with resources on computers or on the network files, folders, printers and such.', 'start': 375.942, 'duration': 10.888}, {'end': 398, 'text': 'we are not not talking about security, so you will hear about group policy objects, local security policies, security.', 'start': 386.83, 'duration': 11.17}], 'summary': 'Permissions control user access to resources on computers or network, including files, folders, and printers.', 'duration': 28.662, 'max_score': 369.338, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/fJHFmt6F0Rc/pics/fJHFmt6F0Rc369338.jpg'}, {'end': 629.879, 'src': 'embed', 'start': 605.611, 'weight': 1, 'content': [{'end': 612.018, 'text': 'The executive group, the C-level group, figure out what they need access to and assign permissions based on that.', 'start': 605.611, 'duration': 6.407}, {'end': 625.496, 'text': 'So you want to always, almost always, 99.99999% of the time, be assigning permissions to groups not to individual users.', 'start': 612.298, 'duration': 13.198}, {'end': 629.879, 'text': "Very important to remember in the real world, even if it's a group of one.", 'start': 625.657, 'duration': 4.222}], 'summary': 'Assign permissions to groups, not individual users, 99.99999% of the time.', 'duration': 24.268, 'max_score': 605.611, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/fJHFmt6F0Rc/pics/fJHFmt6F0Rc605611.jpg'}, {'end': 759.765, 'src': 'embed', 'start': 732.125, 'weight': 2, 'content': [{'end': 738.669, 'text': 'it is cumulative and therefore they will get read and write permission to that resource.', 'start': 732.125, 'duration': 6.544}, {'end': 743.914, 'text': "So it's very important to remember that as you put people into multiple groups,", 'start': 738.689, 'duration': 5.225}, {'end': 753.522, 'text': 'their access becomes cumulative for whatever permissions you have given to that file, folder or resource.', 'start': 743.914, 'duration': 9.608}, {'end': 759.765, 'text': 'The only time this is not the case is if you do the deny permission.', 'start': 753.942, 'duration': 5.823}], 'summary': 'Cumulative group access grants read and write permissions, except for deny permission.', 'duration': 27.64, 'max_score': 732.125, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/fJHFmt6F0Rc/pics/fJHFmt6F0Rc732125.jpg'}, {'end': 970.002, 'src': 'embed', 'start': 942.127, 'weight': 3, 'content': [{'end': 948.351, 'text': "So, essentially, all you're going to be doing with the share permission is you are going to use it to share a file,", 'start': 942.127, 'duration': 6.224}, {'end': 950.653, 'text': 'folder or resource over the network.', 'start': 948.351, 'duration': 2.302}, {'end': 965.861, 'text': 'And then what I would say to make your life easier is give everyone, everyone, the group everyone, the permission to read and write to the folder.', 'start': 951.413, 'duration': 14.448}, {'end': 970.002, 'text': 'So if you give everyone the read write permission to the folder,', 'start': 966.321, 'duration': 3.681}], 'summary': 'Share files/folders over network, grant everyone permission to read and write.', 'duration': 27.875, 'max_score': 942.127, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/fJHFmt6F0Rc/pics/fJHFmt6F0Rc942127.jpg'}, {'end': 1093.619, 'src': 'embed', 'start': 1066.644, 'weight': 4, 'content': [{'end': 1075.049, 'text': 'So the first thing that we are going to do is we are going to go up to Tools and then we are going to go to Active Directory Users and Computers,', 'start': 1066.644, 'duration': 8.405}, {'end': 1082.233, 'text': "because we are going to need to play with individual users and we're going to need to play with groups.", 'start': 1075.049, 'duration': 7.184}, {'end': 1083.953, 'text': 'So we might as well create those now.', 'start': 1082.433, 'duration': 1.52}, {'end': 1093.619, 'text': "So basically for this little lab, I have already created all these things just so you don't have to watch me slog through this stuff.", 'start': 1085.534, 'duration': 8.085}], 'summary': 'Setting up active directory users and computers for user and group management.', 'duration': 26.975, 'max_score': 1066.644, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/fJHFmt6F0Rc/pics/fJHFmt6F0Rc1066644.jpg'}], 'start': 369.338, 'title': 'Importance of permissions and security', 'summary': 'Discusses the significance of permissions, emphasizing their role in user interactions with resources, and the importance of assigning permissions to groups rather than individual users. it also covers the role of share permissions in file sharing over the network with a practical demonstration using active directory users and computers.', 'chapters': [{'end': 424.523, 'start': 369.338, 'title': 'Understanding permissions and security', 'summary': 'Discusses the important aspects of permissions, emphasizing that permissions determine how users interact with resources on computers or the network, such as files, folders, and printers, while distinguishing it from the concept of security, which encompasses the actions users can perform on devices and computers. security will be covered in a separate class.', 'duration': 55.185, 'highlights': ['Permissions dictate how users interact with resources on computers or the network, such as files, folders, and printers.', 'Security encompasses actions such as accessing the control panel, CD drive, registry editor, and changing the background on devices and computers.', 'Security will be covered in a separate class.']}, {'end': 1207.378, 'start': 424.903, 'title': 'Understanding permissions and security', 'summary': 'Discusses the importance of assigning permissions to groups rather than individual users, emphasizing the cumulative nature of group permissions and the role of share permissions in file sharing over the network, with a practical demonstration using active directory users and computers.', 'duration': 782.475, 'highlights': ['The importance of assigning permissions to groups rather than individual users It is crucial to assign permissions to groups rather than individual users to simplify administrative changes and avoid managing individual user permissions in environments with a large number of users.', "Cumulative nature of group permissions Group permissions are cumulative, meaning that a user's access becomes cumulative for the permissions given to the groups they belong to, except when deny permission is explicitly set.", "Role of share permissions in file sharing over the network Share permissions are essential for sharing files, folders, and resources over the network, and giving 'everyone' group read and write permission can simplify access and minimize conflicts between share and NTFS permissions.", 'Practical demonstration using Active Directory Users and Computers The explanation is supported by a practical demonstration using Active Directory Users and Computers to create users, groups, and showcase the usage of permissions in a lab environment.']}], 'duration': 838.04, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/fJHFmt6F0Rc/pics/fJHFmt6F0Rc369338.jpg', 'highlights': ['Permissions dictate user interactions with resources on computers or the network.', 'Importance of assigning permissions to groups rather than individual users for administrative simplicity.', 'Group permissions are cumulative, simplifying access and administrative changes.', 'Share permissions are essential for file sharing over the network.', 'Practical demonstration using Active Directory Users and Computers for showcasing permissions.']}, {'end': 1671.716, 'segs': [{'end': 1254.066, 'src': 'embed', 'start': 1207.378, 'weight': 0, 'content': [{'end': 1217.425, 'text': "now what we're going to do is we're going to go to file explorer and we are going to go to computer and then we are going to go to our C drive.", 'start': 1207.378, 'duration': 10.047}, {'end': 1223.709, 'text': "Now, basically, whenever you're sharing out folders off of a server, such as a file server,", 'start': 1217.845, 'duration': 5.864}, {'end': 1229.993, 'text': 'most of us consider it best practice to share the folder from the root directory.', 'start': 1223.709, 'duration': 6.284}, {'end': 1239.338, 'text': "now, if you created different partitions on the server, you may have a file share partition, and that's where you would share the folder out from.", 'start': 1230.333, 'duration': 9.005}, {'end': 1246.802, 'text': "but for me generally I find it's just easiest to share from the root just right up here in the C drive.", 'start': 1239.338, 'duration': 7.464}, {'end': 1250.984, 'text': 'so I have created a folder called share.', 'start': 1246.802, 'duration': 4.182}, {'end': 1254.066, 'text': 'then what I did was I shared this folder out.', 'start': 1250.984, 'duration': 3.082}], 'summary': 'Best practice is to share folders from the root directory, like c drive.', 'duration': 46.688, 'max_score': 1207.378, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/fJHFmt6F0Rc/pics/fJHFmt6F0Rc1207378.jpg'}, {'end': 1348.667, 'src': 'embed', 'start': 1281.105, 'weight': 3, 'content': [{'end': 1288.597, 'text': 'So what you would do is you would create a folder, you would come here, you would click share, you would type in everyone,', 'start': 1281.105, 'duration': 7.492}, {'end': 1293.473, 'text': 'you would add it and then you would give them the read write permission.', 'start': 1289.67, 'duration': 3.803}, {'end': 1296.875, 'text': 'So that is what will actually share this thing out over the network.', 'start': 1293.513, 'duration': 3.362}, {'end': 1307.042, 'text': "So once we have done that, then what we can do is we can go into the folder and we can see that I've created two different folders in here.", 'start': 1297.375, 'duration': 9.667}, {'end': 1310.345, 'text': 'Now these are protected by NTFS permission.', 'start': 1307.563, 'duration': 2.782}, {'end': 1312.426, 'text': 'So that first one is the share out.', 'start': 1310.405, 'duration': 2.021}, {'end': 1315.068, 'text': 'These are now protected by NTFS permissions.', 'start': 1312.826, 'duration': 2.242}, {'end': 1319.591, 'text': 'So if I right click on private, I can go to properties.', 'start': 1315.548, 'duration': 4.043}, {'end': 1322.392, 'text': "Now I'm going to go to security.", 'start': 1320.291, 'duration': 2.101}, {'end': 1331.597, 'text': 'And what we can see here is that different groups or users have been given access to this particular folder.', 'start': 1323.453, 'duration': 8.144}, {'end': 1335.119, 'text': 'So what I can do is I can go here to edit just so I can show you.', 'start': 1331.978, 'duration': 3.141}, {'end': 1340.782, 'text': 'So system has full control, has all access to the files and folders in here.', 'start': 1335.58, 'duration': 5.202}, {'end': 1341.483, 'text': "That's what we want.", 'start': 1340.842, 'duration': 0.641}, {'end': 1348.667, 'text': "Now what we've done is we've said employees, anybody in the employees group has full control of the folder.", 'start': 1342.063, 'duration': 6.604}], 'summary': 'Instruction on sharing folder: give read write permission, protect with ntfs, grant access to specific users.', 'duration': 67.562, 'max_score': 1281.105, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/fJHFmt6F0Rc/pics/fJHFmt6F0Rc1281105.jpg'}, {'end': 1467.437, 'src': 'embed', 'start': 1441.142, 'weight': 5, 'content': [{'end': 1449.971, 'text': 'So basically administrators are allowed to take ownership of files and folders willy-nilly, whereas average users are not.', 'start': 1441.142, 'duration': 8.829}, {'end': 1458.159, 'text': "So then we can see, as we've seen, so bad is deny, system is allow, administrator, administrator, employee.", 'start': 1451.192, 'duration': 6.967}, {'end': 1460.522, 'text': 'So this is basically like what we were seeing before.', 'start': 1458.199, 'duration': 2.323}, {'end': 1467.437, 'text': 'Now the one thing down here that you should take into account, you should look at, is this inheritance.', 'start': 1461.212, 'duration': 6.225}], 'summary': 'Administrators have unrestricted ownership, while average users do not. inheritance is a key consideration.', 'duration': 26.295, 'max_score': 1441.142, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/fJHFmt6F0Rc/pics/fJHFmt6F0Rc1441142.jpg'}, {'end': 1543.874, 'src': 'embed', 'start': 1519.233, 'weight': 6, 'content': [{'end': 1528.201, 'text': 'Sometime most of the time, 90% of the time, you want the files or folders to inherit, the permissions from the parent, 10% of the time,', 'start': 1519.233, 'duration': 8.968}, {'end': 1531.103, 'text': "for whatever reason you don't want them to inherit.", 'start': 1528.201, 'duration': 2.902}, {'end': 1539.691, 'text': 'So but what the inheritance does is it says the files and folders within this folder? Have the exact same permissions as that parent folder.', 'start': 1531.103, 'duration': 8.588}, {'end': 1543.874, 'text': "So that's something to keep in mind again Play with it.", 'start': 1540.391, 'duration': 3.483}], 'summary': "90% of the time, files/folders inherit permissions, 10% they don't.", 'duration': 24.641, 'max_score': 1519.233, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/fJHFmt6F0Rc/pics/fJHFmt6F0Rc1519233.jpg'}], 'start': 1207.378, 'title': 'Folder sharing and permissions', 'summary': 'Covers best practices for sharing folders from the root directory, granting read-write permissions, using ntfs permissions, managing folder permissions, and understanding inheritance, with an emphasis on 90% inheritance from the parent folder.', 'chapters': [{'end': 1254.066, 'start': 1207.378, 'title': 'File sharing best practices', 'summary': "Discusses best practices for sharing folders off a file server, emphasizing the preference for sharing folders from the root directory, as it's considered easiest and most common, without the need for multiple partitions.", 'duration': 46.688, 'highlights': ['Sharing folders from the root directory on a file server is considered best practice, as it is easiest and most common.', 'Using the C drive as the root directory for sharing folders is highlighted as a preferred method for simplicity and ease of access.', 'Emphasizing the preference for sharing from the root directory rather than from different partitions on the server.']}, {'end': 1385.967, 'start': 1254.066, 'title': 'Sharing and protecting folders in windows', 'summary': 'Discusses sharing folders, granting read-write permissions, and protecting folders using ntfs permissions, including showing the access rights for different user groups and denying permissions for specified groups.', 'duration': 131.901, 'highlights': ['Shared folder has read-write permission for everyone, facilitating network sharing.', "Creation of folders, granting read-write permissions to 'everyone' and sharing over network.", 'Protection of folders using NTFS permissions, with examples of access rights for different user groups.', "Denial of permissions for the 'bad' group, ensuring restricted access to the folder."]}, {'end': 1671.716, 'start': 1386.027, 'title': 'Folder permissions and inheritance', 'summary': 'Explains how to manage folder permissions, including changing ownership, understanding inheritance, and granting specific permissions to user groups, ensuring that 90% of the time files and folders inherit permissions from the parent folder.', 'duration': 285.689, 'highlights': ['Understanding ownership is important; administrators can take ownership of files and folders, while average users cannot. Ownership can be changed by administrators, allowing them to take control of files and folders as per security policy.', 'Inheritance is a crucial concept in managing permissions, with child resources typically inheriting permissions from the parent folder 90% of the time. Inheritance ensures that child files and folders within a folder have the same permissions as the parent folder, except when specifically disabled.', 'Setting permissions for user groups, such as granting full control access to the employees group, ensures specific access to folders. Specific permissions can be granted to user groups, such as employees, allowing them to access and control specific folders as required.']}], 'duration': 464.338, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/fJHFmt6F0Rc/pics/fJHFmt6F0Rc1207378.jpg', 'highlights': ['Sharing folders from the root directory on a file server is considered best practice.', 'Using the C drive as the root directory for sharing folders is highlighted as a preferred method.', 'Emphasizing the preference for sharing from the root directory rather than from different partitions on the server.', 'Shared folder has read-write permission for everyone, facilitating network sharing.', 'Protection of folders using NTFS permissions, with examples of access rights for different user groups.', 'Understanding ownership is important; administrators can take ownership of files and folders.', 'Inheritance is a crucial concept in managing permissions, with child resources typically inheriting permissions from the parent folder 90% of the time.', 'Setting permissions for user groups, such as granting full control access to the employees group, ensures specific access to folders.']}, {'end': 2102.591, 'segs': [{'end': 1869.639, 'src': 'embed', 'start': 1787.372, 'weight': 0, 'content': [{'end': 1790.255, 'text': 'And again, I have full access to do whatever I want.', 'start': 1787.372, 'duration': 2.883}, {'end': 1800.408, 'text': "but the private folder isn't even shown because I don't have permission to do anything to that private folder.", 'start': 1791.559, 'duration': 8.849}, {'end': 1809.117, 'text': "So that's the basic concept behind how this permission works.", 'start': 1800.828, 'duration': 8.289}, {'end': 1818.023, 'text': "So that's what there is to the share permissions and the NTFS permissions.", 'start': 1810.939, 'duration': 7.084}, {'end': 1824.507, 'text': 'So the share permissions are what allow you to actually share the files and folders over the network.', 'start': 1818.564, 'duration': 5.943}, {'end': 1828.57, 'text': 'Generally, you just give everyone the read-write permission.', 'start': 1824.887, 'duration': 3.683}, {'end': 1832.652, 'text': 'Then the NTFS permissions are what you can go down.', 'start': 1828.87, 'duration': 3.782}, {'end': 1840.798, 'text': 'you can drill down and say do I want to give somebody the ability to read, to write, to execute, to list?, to do all of that kind of stuff?', 'start': 1832.652, 'duration': 8.146}, {'end': 1849.885, 'text': "Now the important thing that I haven't said up till now that I have to say I have to scream at the top of my lungs I think I've said this before in other classes,", 'start': 1840.978, 'duration': 8.907}, {'end': 1857.732, 'text': 'but got to remind you here is that whenever you make any modifications to either permissions or security in the future,', 'start': 1849.885, 'duration': 7.847}, {'end': 1869.639, 'text': 'Many times those changes do not come into effect until the user has logged off and logged back in.', 'start': 1858.713, 'duration': 10.926}], 'summary': 'Share and ntfs permissions dictate access to files and folders, with recommendations for read-write permission and the reminder that changes may require users to log off and back in.', 'duration': 82.267, 'max_score': 1787.372, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/fJHFmt6F0Rc/pics/fJHFmt6F0Rc1787372.jpg'}, {'end': 1993.387, 'src': 'heatmap', 'start': 1946.171, 'weight': 4, 'content': [{'end': 1950.714, 'text': 'things that you can do to improve security and whatnot.', 'start': 1946.171, 'duration': 4.543}, {'end': 1956.418, 'text': 'But this is the basic idea for the share and NTFS permissions.', 'start': 1951.055, 'duration': 5.363}, {'end': 1961.642, 'text': "Again, if you're confused, I'm telling you, permissions are one of those things.", 'start': 1956.779, 'duration': 4.863}, {'end': 1963.163, 'text': 'It is the cornerstone.', 'start': 1961.762, 'duration': 1.401}, {'end': 1968.047, 'text': "It's one of the bedrocks enterprise Microsoft environments.", 'start': 1963.203, 'duration': 4.844}, {'end': 1974.772, 'text': "so so go out, spend the 40 bucks 50 bucks on the book so you can read it to make sure what's going on.", 'start': 1968.047, 'duration': 6.725}, {'end': 1982.058, 'text': "because make sure, if you're confused one, go out and read about it and then to just play with it for a day.", 'start': 1974.772, 'duration': 7.286}, {'end': 1993.387, 'text': "if you spend a five hours just hammering out permissions and playing around and trying to figure this stuff out, it'll seem easy.", 'start': 1982.058, 'duration': 11.329}], 'summary': 'Understanding permissions is crucial for securing microsoft environments. invest time and resources for better grasp.', 'duration': 28.601, 'max_score': 1946.171, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/fJHFmt6F0Rc/pics/fJHFmt6F0Rc1946171.jpg'}, {'end': 2094.757, 'src': 'embed', 'start': 2069.268, 'weight': 5, 'content': [{'end': 2076.851, 'text': 'so the files and folders will inherit the same permissions as the parent folder has 10% of the time.', 'start': 2069.268, 'duration': 7.583}, {'end': 2086.657, 'text': 'this is absolutely not what you want to have happen, and so you have to make sure to disable inheritance and then go from there again.', 'start': 2076.851, 'duration': 9.806}, {'end': 2088.998, 'text': 'play, play with, play with.', 'start': 2086.657, 'duration': 2.341}, {'end': 2091.292, 'text': "once you play with it, It'll be very easy.", 'start': 2088.998, 'duration': 2.294}, {'end': 2094.757, 'text': 'So, as you know, I am Eli the Computer Guy.', 'start': 2091.913, 'duration': 2.844}], 'summary': 'Files and folders inherit 10% of the time, but disable inheritance for control.', 'duration': 25.489, 'max_score': 2069.268, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/fJHFmt6F0Rc/pics/fJHFmt6F0Rc2069268.jpg'}], 'start': 1672.076, 'title': 'Understanding file and share permissions', 'summary': "Explains accessing shared files using unc, demonstrates differences between full control and restricted access, outlines share and ntfs permissions, emphasizes logging off and back in after modifying permissions, distinguishes between share and ntfs permissions, and highlights inheritance's significance.", 'chapters': [{'end': 1840.798, 'start': 1672.076, 'title': 'Understanding share and ntfs permissions', 'summary': 'Explains how to access shared files on a server using unc, demonstrates the difference between full control and restricted access for different users, and outlines the concepts of share permissions and ntfs permissions.', 'duration': 168.722, 'highlights': ['The chapter explains the process of accessing shared files on a server using UNC, and the demonstration includes navigating through shared folders and creating, renaming, and deleting folders, showcasing the full control access (test user in the employees group) with specific permissions.', 'It further illustrates restricted access for another user, demonstrating that only the public folder is shown for the user, and the private folder is not accessible due to lack of permissions, highlighting the difference in access based on user permissions.', 'An overview of share permissions is provided, emphasizing the importance of these permissions for sharing files and folders over the network, typically granting everyone read-write permission.', 'The concept of NTFS permissions is introduced, emphasizing the ability to specify detailed permissions for reading, writing, executing, and listing, providing a comprehensive understanding of the different levels of control that can be granted.']}, {'end': 2102.591, 'start': 1840.978, 'title': 'Introduction to file and share permissions', 'summary': 'Emphasizes the importance of logging off and logging back in after making modifications to permissions for them to take effect, recommends hands-on practice and reading to understand permissions, distinguishes between share and ntfs permissions, and highlights the significance of inheritance.', 'duration': 261.613, 'highlights': ['The key point is that whenever modifications are made to permissions or security, changes may not take effect until the user logs off and logs back in.', 'It is recommended to spend time reading about permissions and engaging in hands-on practice to understand and effectively manage permissions for files and shares.', 'Distinguishing between share permissions and NTFS permissions is crucial, as they serve different purposes and should be used in combination for refined security.', 'The significance of inheritance is emphasized, with the recommendation to allow inheritance for 90% of the time and to disable it when necessary.', 'Owners of the folder have the ability to change permissions for other users to access the resource, and it is important to understand and manage inheritance effectively.']}], 'duration': 430.515, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/fJHFmt6F0Rc/pics/fJHFmt6F0Rc1672076.jpg', 'highlights': ['The chapter explains accessing shared files using UNC and demonstrates differences between full control and restricted access.', 'An overview of share permissions is provided, emphasizing the importance of these permissions for sharing files and folders over the network.', 'The concept of NTFS permissions is introduced, emphasizing the ability to specify detailed permissions for reading, writing, executing, and listing.', 'The key point is that changes in permissions may not take effect until the user logs off and logs back in.', 'Distinguishing between share permissions and NTFS permissions is crucial for refined security.', 'The significance of inheritance is emphasized, with the recommendation to allow inheritance for 90% of the time and to disable it when necessary.']}], 'highlights': ['File and Share Permissions in Windows Server 2012 are a cornerstone of enterprise environments, allowing easy access control to files, folders, and printers, and enabling granular control over user access levels.', 'Understanding permissions is crucial, likened to algebra, and requires hands-on practice.', 'Permissions dictate user interactions with resources on computers or the network.', 'Sharing folders from the root directory on a file server is considered best practice.', 'The chapter explains accessing shared files using UNC and demonstrates differences between full control and restricted access.']}