fwiw, +1 on all counts from me as far as best practices go. -- Espi
On Mon, Nov 27, 2017 at 11:14 PM, Kurt Buff <[email protected]> wrote: > My apologies up front for the long ramble. Take this with the usual > pinch/tablespoon/pound/kilo of salt. This is what works for me - you > might need something different. Actually, I'd wager money that you do, > as you seem to be in an educational environment, which most assuredly > has different requirements than a business. > > However, up front, I'll just say this: Breaking inheritance for > permissions in any environment is like telling lies - it's a bad idea, > because you have to keep track of it all, and the more lies you tell > (and the more places you break inheritance), the less likely you are > to be able to keep track of the situation. > > So, mostly, the answer to your question depends on what you mean by > "departmental folder", and where each lives in the directory > structure. We have a Groups directory which is shared (i.e., G:\Groups > (I don't create shares at the root of a drive for several reasons)), > and which contains a subdirectory for each department (G:\Groups\HR), > and other subdirectories at the same level as needed for > cross-departmental efforts (G:\Groups\9001ISOAuditDocuments). > > However, the first thing I'd do is document the permissions as > currently applied, then peruse them carefully. If there are any places > where inheritance is broken, figure out why. If there's a defensible > reason (there are no "good" reason for this, IMHO), then look for ways > to fix it - with my favorite way being to move the directory that has > inheritance blocked somewhere up the directory structure, to a point > where inheritance no longer needs to be blocked. > > If there isn't a defensible reason for inheritance to be > broken/blocked, refactor your permissions and re-enable inheritance. > > It will help to do a few other things: > - take a careful look at the groups for which permissions are > applied. If any individual accounts have explicit permissions, replace > those with group permissions > - create a dummy directory structure (possibly empty, or with only > some zero-length files in it), and practice your script-fu on that, > before tackling production directories > - set up a dummy departmental directory as a model in your > production structure, with a readme file in it to document how you > want new departmental directories created > > The Groups directory is shared with Full Control to Everyone, and with > NTFS permissions of read-only to all employees for that folder only > (Admins get read-write, with full inheritance). > > Each departmental directory at its top level has read-only access to > all employees, for that folder only. This gets everyone transit to its > subdirectories. > > Each departmental directory has only three subdirectories: > Public (read-only for all employees, read-write for department > employees, with full inheritance ) > Private (read-write for department/project employees only, no > access to other employees, with full inheritance) > Manager (read-write for the department/project manager only, no > access to other employees, with full inheritance) > > Permissions are not applied any further down the tree than that. If a > directory needs different permissions, it is moved to the root of the > departmental directory, and relevant permissions are applied to it > there. > > A couple of other things I do: > - Each departmental directory gets three groups of its own in AD: > non-departmental read-only, departmental read-write and department > manager owner(s). > - I create an AD OU into which I stuff all of the groups for the > server (file, SQL or other), and it's a sub-OU of the OU in which that > server resides, and is named <server>-permissions. Modify this as > needed for DFSR environments. > - I name each group explicitly for the directory to which it is > applied, so it's obvious where and why it's used (USFSGroupsHR-RO - > which means the US file server, the Groups Directory, the HR > subdirectory, read-only permissions) > > This doesn't address SharePoint directly (although I think the general > approach on how permissions are applied would translate fairly well), > but I consider SP not a fit replacement for a file server. SP is a > collaboration/workflow tool, IMHO, not a file repository - stashing > massive amounts of files into a SQL Server makes me itch all over. > Others disagree, I'm sure. > > Kurt > > On Mon, Nov 27, 2017 at 7:34 AM, Tammy George <[email protected]> > wrote: > > Our directory structure does need refactoring and as a solution to this, > we're strongly encouraging our users to move their files to SharePoint > Online. Once we have departmental buy-in, we plan to "flip" all user > permissions to read-only. We have a mess of permissions - everything from > group based, explicit, broken inheritance, etc. Each top level folder on > our network share is a departmental folder with folders within it a few > levels deep. We will be working with each department individually, one at > a time. > > > > From your experience, what is the best/easiest/cleanest way to "flip" > permissions to read-only for all users one departmental folder at a time? > > > > Options I've considered thus far - > > > > Run a report of the current permissions and then using icacls, > modify all to read-only. (stumbled on this today - > https://gallery.technet.microsoft.com/scriptcenter/ > PowerShellAccessControl-d3be7b83) > > I just downloaded Quest's Security Explorer and plan to test it > out. > > > > Many thanks. > > - Tammy > > > > > > > > > > > > -----Original Message----- > > From: [email protected] [mailto:listsadmin@lists. > myitforum.com] On Behalf Of Kurt Buff > > Sent: Tuesday, November 14, 2017 2:51 PM > > To: ntsysadm <[email protected]> > > Subject: Re: [NTSysADM] Accessing only a lower level folder in a share > > > > You need to adjust the permissions in the directory tree, and breaking > inheritance is the wrong way of doing it. > > > > Change the permissions at each level so that they are explicitly defined > to allow "This Folder and Files" for those who only need to see the files > in that directory, but not other subdirectories. > > > > Also, it seems as if your directory structure needs refactoring - it's > way too complex if you're running into these kinds of permission problems. > > > > Kurt > > > > On Tue, Nov 14, 2017 at 8:51 AM, Michael Leone <[email protected]> > wrote: > >> It's been so long since I've had to do this, I need a check. I'm doing > >> something fundamentally wrong, I think. > >> > >> We use groups to set share/ACLs on folders. I got a request to share a > >> 4th level sub-folder with other employees not in the ACL. So what I > >> have is: > >> > >> Folder A1 (shared) > >> -->>B2 > >> -->>C3 > >> -->> D4 (this is the one I want to allow access to) > >> > >> Now, the share permissions on A1 is for DevelopmentGroup, and the NTFS > >> permissions are the same. Those permissions just flow down to B2, C3 > >> and D4 (i.e., normal inheritance). > >> > >> Now, I'm pretty sure the only way to allow access to only D4, and not > >> allow access to B2 and C3 or even see files there, is to enable ABE. > >> But I've never done that, and am leery of enabling it in production, > >> without a whole more testing and forethought (I shudder to think of > >> all the help desk calls, if I get something wrong). > >> > >> Am I correct that only ABE will do what I am thinking of (allow access > >> only to D4 and hide contents of A1, B2, C3)? > >> > >> Barring ABE, there's nothing I can do, short of granting a new group > >> access to D4, and living with the consequences? > >> > >> Thoughts? At this point, I want to just add the new group to the NTFS > >> permissions of D4 only, and live with the fact that these new group > >> members can see everything higher up. > >> > >> > > > > > > >

