TIP: Click on subject to list as thread! ANSI
echo: nthelp
to: John Beckett
from: Hrvoje Mesing
date: 2006-01-27 20:51:42
subject: Re: Win2K3 AD Domain, NTFS, permissions.

From: "Hrvoje Mesing" 


"John Beckett"  wrote
in message news:sj0jt1h1cqqnd4jbpdipfc4b4doh5ntnvg{at}4ax.com...
>
> I don't know whether mucking around with permissions would cause problems
> with support from Microsoft, but if you read a little in newsgroups etc
> you would see suggestions that there really is no benefit to changing the
> default XP or W2003 permissions, and that making such changes often leads
> to unforseen problems.


-+-

weird! :)

Because, I understand that if the server is Terminal Application server,
users would need read access (traverse if nothing!) to tools like
notepad.exxe, calc.exe, etc.
But!, I do not understand, if I have a user which IS Domain user and I want
him to be able to use Remote Administration Terminal services (like
Built-in Backup Operator), why would I give him the option to browse my
windows folder ? Or see how my boot.ini look like ? Or to locally check
..\SYSVOL\ ? or to READ my wbem logs ?
Sorry, but I see no sense in this.
I see sense that SYSTEM and designated Admin have Full Perms on all of the
objectes, but everything else on mentioned Domain Controller I see as HUGE
security risk.

Just to mention, I saw no problems with only SYSTEM, Administrators group
having permissions and everything else Out, but I'm still interested why
would something break ? What is that ? Is there a possible problem with MS
SLA ? And how there is no benefit ?!?!

*hum*


-+-
M.

--- BBBS/NT v4.01 Flag-5
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/45)
SEEN-BY: 633/267 270 5030/786
@PATH: 379/45 1 106/2000 633/267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.