设为首页 收藏本站
查看: 617|回复: 0

NT4.0 Migration to Windows 2003: Using PERMS.EXE

[复制链接]

尚未签到

发表于 2015-5-4 09:20:34 | 显示全部楼层 |阅读模式
PERMS.EXE  

1.1         Perms.exe: User File Permissions

User File Permissions (Perms) is a command-line tool that displays user access permissions for a file or directory on an NTFS file system volume.  Perms queries the permissions associated with a specific access control entry (ACE)
(ACE)
An entry in an object's discretionary access control list (DACL) that grants permissions to a user or group.  An ACE is also an entry in an object's system access control list (SACL) that specifies the security events to be audited for a user or group, displaying only those permissions granted by that particular access control entry ACE.

1.1.1              Corresponding Operating System Features

  You can also use Windows Explorer to view effective permissions on files and folders.
To view permissions with Windows Explorer:
1.      Right-click the file or folder, and then click Properties.  
2.      Click Security.  
3.      Click Advanced to view the Advanced Security Settings dialog box.  
4.      Click Effective Permissions.  
5.      Click Select to open the Select User or Group dialog box.  
6.      Type the name of the user name or group name for which you would like to view permissions and click OK.  

1.1.2              Concepts

The ability of an operating system to access files on a volume depends on the file system with which the volume was formatted.  The major types of formatting are File Allocation Table (FAT)16, FAT32, and NTFS.
The file allocation table in the FAT file system is located at the beginning of a logical volume.  FAT was designed for small disks and simple folder structures.  Two copies of the file allocation table are stored in the volume.  In the event that one copy of the file allocation table is corrupt, the other file allocation table is used.
The NTFS file system provides performance, reliability, and functionality not found in FAT.  Some of the new features are Active Directory directory service and the storage features based on reparse points.  NTFS also includes security features required for file servers and high-end personal computers in a corporate environment, and data access control and ownership privileges important for data integrity.

1.2        System Requirements

There is one system requirement for this tool: Windows Server 2003
Permissions:
·         Membership in the Administrators group for the domain or computer where the account of the user is defined.  
·         Backup files and folders privileges on the computer where the files are stored.  

1.3        File Required

·         Perms.exe
For more information on file systems, see File Systems in Microsoft Windows 2000 Server Operations Guide in the Microsoft Windows 2000 Server Resource Kit (or see "File Systems"(http://go.microsoft.com/fwlink/?LinkID=12636) at http://www.microsoft.com/reskit).  

1.4        Perms Remarks

1.4.1              Setting Permissions

NTFS is the primary Windows Server 2003 file system.  Partitions formatted with NTFS can have their files and folders secured using NTFS permissions.  You can set file permissions on files and folders that specify which groups and users have access to them, and what level of access is permitted.  NTFS file and folder permissions apply both to users working at the computer where the file is stored and to users accessing the file over the network where the file is in a shared folder.  You can also use file attributes (read-only, hidden, system) to limit file access.
Yet another feature for managing security is the use of inheritable permissions.  The Security dialog box offers the option to Allow inheritable permissions from parent to propagate to this file object and it is enabled by default.  This feature significantly reduces the time and input and output work required to change the permissions of many files and subfolders.  For example, suppose a user wants to change the permissions on a tree consisting of several thousand files.  With Windows NT 4.0, each file and folder needs to be individually changed.  However, with subsequent releases of Windows, if the folders and files inherit permissions, they only need to be set for the top-level folder.
Note: The FAT16 and FAT32 file system are not recommended for most purposes because they lack the permissions feature.  
To configure NTFS permissions on a file, folder, or NTFS volume, you must be a member of the Administrators group, have full control permission or be the owner of the file, folder, or volume.  NTFS permissions must be explicitly applied to a file or folder to grant a user access to it.  If a file has no permissions specified for a particular user or for the groups to which the user belongs, the user does not have access to the file.
When you assign permissions to an existing folder, all subfolders and files within the parent folder inherit, by default, the permissions assigned to the parent.  When you create a new file or folder on an NTFS volume, the new file or folder automatically inherits the permissions assigned to its parent folder.  If you assign a user or group permission on a folder, the user of group is granted, by default, read and execute, List Folder Contents, and Read permissions for the folder.  You can then change these permissions to whatever kind of access you want the user or group to have.  Similarly, if you assign a user or group permission on a file, the user or group is granted, by default, two permissions for the file: Read, and Execute and Read.  You can change these permissions to whatever kind of access you want the user or group to have.  When you assign a particular NTFS permission to a file or folder, you can either explicitly allow the permission to grant the user or group access to the object, or you can explicitly deny the permission to prevent the user or group from accessing it.  For more information on permissions, see "File Systems" in Microsoft Windows 2000 Server Operations Guide in the Microsoft Windows 2000 Server Resource Kit (or see "File Systems(http://go.microsoft.com/fwlink/?LinkID=12636)" on the Web at http://www.microsoft.com/reskit).

1.4.2              Interpreting Access Masks in Perms Output

The following masks are used in Perms output:


Access Mask


Description


R


Read.  Allows or denies the viewing of attributes of a file or folder, such as read-only and hidden.  Attributes are defined by NTFS.

W


Write.  Allows or denies changes to attributes of a file or folder, such as read-only or hidden.  Attributes are defined by NTFS.

X


Execute.  Allows or denies the running of program files (applies to files only).

D


Delete.  Allows or denies deletion of a file or folder.  If you do not have Delete permission on a file or folder, you can still delete it if you have been granted the Delete Subfolders and Files permission on the parent folder.

P


Change Permissions.  Allows or denies changes to permissions for the file or folder, such as Full Control, Read, and Write.

O


Take Ownership.  Allows or denies the taking of ownership of the file or folder.  The owner of a file or folder can always change permissions on it, regardless of any existing permissions that protect the file or folder.

A


General All.

-


No Access.

*


The specified user is the owner of the file or directory.

#


A group the user is a member of owns the file or directory.

?


The access permissions of the user cannot be determined.

1.5        Perms Syntax

Perms uses the following syntax:
·         perms [Domain\|Computer\]UserName [Path\]FileName [/?]

Parameters

Domain\|Computer\UserName
Specifies the name of user whose permissions are to be checked, in the Domain\Username or Computer\UserName or local UserName format.  
[Path\]FileName
Specifies the path and name of a file or folder in any legal format, including the Universal Naming Convention (UNC)(\\) .  You can use the * or ? wildcard characters.  
/i
Indicates that the specified user is logged on interactively to the computer where the file or folder resides.  If the /i parameter is omitted, Perms assumes that the user is a logged on over the network and is a member of the Network security group.  
/s
Checks permissions on files in subdirectories.  
/?
Displays command-line usage.  

1.6        Perms Examples

1.6.1          Example: View Permissions for a File

  To view the permissions granted by the ACE to rkt-harndom\administrator, type the following at the command line:
  perms rkt-harndom\administrator "C:\Program Files\Windows Server 2003 Resource Kit\tmp"
  Press ENTER.  The following output is displayed:
C:\Program Files\Windows Server 2003 Resource Kit\tmp\         perms: #-------
  This output means that another member of a group, of which rkt-harndom\administrator is a member, owns the file, but that rkt-harndom\administrator does not have access to the file.

运维网声明 1、欢迎大家加入本站运维交流群:群②:261659950 群⑤:202807635 群⑦870801961 群⑧679858003
2、本站所有主题由该帖子作者发表,该帖子作者与运维网享有帖子相关版权
3、所有作品的著作权均归原作者享有,请您和我们一样尊重他人的著作权等合法权益。如果您对作品感到满意,请购买正版
4、禁止制作、复制、发布和传播具有反动、淫秽、色情、暴力、凶杀等内容的信息,一经发现立即删除。若您因此触犯法律,一切后果自负,我们对此不承担任何责任
5、所有资源均系网友上传或者通过网络收集,我们仅提供一个展示、介绍、观摩学习的平台,我们不对其内容的准确性、可靠性、正当性、安全性、合法性等负责,亦不承担任何法律责任
6、所有作品仅供您个人学习、研究或欣赏,不得用于商业或者其他用途,否则,一切后果均由您自己承担,我们对此不承担任何法律责任
7、如涉及侵犯版权等问题,请您及时通知我们,我们将立即采取措施予以解决
8、联系人Email:admin@iyunv.com 网址:www.yunweiku.com

所有资源均系网友上传或者通过网络收集,我们仅提供一个展示、介绍、观摩学习的平台,我们不对其承担任何法律责任,如涉及侵犯版权等问题,请您及时通知我们,我们将立即处理,联系人Email:kefu@iyunv.com,QQ:1061981298 本贴地址:https://www.yunweiku.com/thread-63411-1-1.html 上篇帖子: Windows Server 2003可靠的多播协议组件 下篇帖子: Windows Server 2003安全七则
您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

扫码加入运维网微信交流群X

扫码加入运维网微信交流群

扫描二维码加入运维网微信交流群,最新一手资源尽在官方微信交流群!快快加入我们吧...

扫描微信二维码查看详情

客服E-mail:kefu@iyunv.com 客服QQ:1061981298


QQ群⑦:运维网交流群⑦ QQ群⑧:运维网交流群⑧ k8s群:运维网kubernetes交流群


提醒:禁止发布任何违反国家法律、法规的言论与图片等内容;本站内容均来自个人观点与网络等信息,非本站认同之观点.


本站大部分资源是网友从网上搜集分享而来,其版权均归原作者及其网站所有,我们尊重他人的合法权益,如有内容侵犯您的合法权益,请及时与我们联系进行核实删除!



合作伙伴: 青云cloud

快速回复 返回顶部 返回列表