Time
8 hours 33 minutes
Difficulty
Beginner
CEU/CPE
9

Video Transcription

00:06
In this demonstration, I will create a volume assigned to drive letter,
00:10
create a folder on a volume and share the folder.
00:14
You will also learn about optic rights,
00:17
NT F s permissions and share permissions.
00:29
Let's begin by looking at the share volume itself.
00:35
We'll go to start
00:37
computer
00:40
right click to manage
00:43
and click on storage
00:48
within storage. We're gonna go to disk management.
00:56
Just management will bring up
00:58
graphic of all the images and all the drives you should see
01:02
on your system.
01:03
I'm gonna slide this up so we can see everything.
01:07
And right now you can see we have a disc zero,
01:11
which has the C drive,
01:15
a disc one which is blank on Ella allocated,
01:19
and a disc to which is an external hard drive.
01:23
Actually, USB drive in this map to F
01:27
also a CD rahm. But it's not manageable because it's not loaded.
01:34
So
01:36
up here you see a system
01:38
partition and a boot partition.
01:42
The system partitions starts
01:46
the computer up,
01:48
and the boot partition is the partition that boots into
01:52
when system tells it where to go.
01:55
Normally, you only have one system and one boot partition. And that's why you don't see a menu. If you had a multi boot system, you would actually see a menu
02:04
for which boot partition to select.
02:09
So Disc zero and disc one
02:13
our representative single drives. That's how the operating system sees them
02:17
in reality. In this situation,
02:21
each disc zero and this one have three hard drives in a raid array.
02:29
But that's handled at the drive controller card level.
02:32
And the operating system only sees the output from the controller card
02:38
in the output from the controller Card
02:40
announces this as a single Dr.
02:45
So we see disclosure was a single drive, and this one is a single Dr.
02:52
So go to the disc one drive and I've prepared for use
02:57
right click.
02:59
In this case,
03:00
we don't have
03:01
the other options. So it's calling a new, simple volume.
03:08
Size wise,
03:10
we could
03:14
make this smaller.
03:16
So just to show that let's make it
03:23
30,000 megabytes or 30
03:27
gigabytes,
03:30
what next?
03:32
Let's call it is where we sign and drive later.
03:37
Let's for this case. Let's call it tea for temporary
03:43
next,
03:47
and we're going to format it. We're going to format. It is NT F s.
03:53
Give the volume label of temper
03:59
and do a quick format.
04:01
When we do that, it reads everything back to us
04:05
and then you had finished.
04:12
Now you see it's his formatting,
04:19
and as soon as it's formatted,
04:23
you don't show up with Dr Water. We assigned to it with the volume name we gave it.
04:28
So here we are tempted
04:30
the T Value
04:32
noticed the rest of the space here is unallocated,
04:35
and I could create another
04:40
Dr Leiter
04:42
with the remaining space.
04:46
So
04:47
instead of doing that, however, let's cancel.
04:50
And let's cancel this
04:54
because let's assume that we want the entire disc to be a single volume
05:00
so we could go here didn't elite volume
05:02
when you delete a volume and erases all data on that volume, so make sure that you don't have any data
05:10
or that the data is okay to lose,
05:13
so we'll say Yes,
05:17
I am going to force the deletion
05:20
and now so unallocated again.
05:26
So let's go back now and make
05:28
the entire volume one
05:30
simple volume
05:31
notice here, by the way, minimums, disk space and megabytes is eight,
05:35
and maximum is the size of the entire disc
05:40
array,
05:42
and we're going to excite. It
05:44
knows that will allow you to sign it. D you know D is already in use
05:50
because at the moment D isn't active.
05:57
So let's assign it g and said
06:04
or in this case,
06:06
let's assign it s
06:09
and we can make that stand for share.
06:23
Yeah, let's see if it'll take a name with a space in it.
06:28
Just a case. You curious?
06:32
And it will.
06:38
So now we're the drivers being formatted and in t f s is gonna be assigned to drive letter,
06:44
and it's gonna be made available.
06:46
So as soon as that's done,
06:48
we should be able to go to
06:53
computer
06:57
and refresh
07:10
Scuse me,
07:12
go to computer
07:15
and see the S. Dr.
07:20
So from the S drive Now
07:24
we can open it
07:26
and see that the folder is empty.
07:30
So now let's make a new folder
07:42
Cognitive one s
07:45
and let's make another new folder.
07:57
So now we've created two folders.
08:01
Let's take a look at the permissions on the folder.
08:05
Now we talk about rights and we talk about permissions and we talked about share permissions.
08:11
Rights has to do with who gets to make changes
08:15
to the properties of this folder,
08:18
not the changes himself, but who has permission to make them
08:24
of the go to security.
08:28
We see the folder has an optic name,
08:33
and these users
08:35
have object permissions
08:39
to make changes.
08:45
So since we're the creator owner,
08:48
we get full control.
08:56
But let's change one. Let's go into
09:01
properties.
09:05
It's going to security.
09:11
And let's say the users
09:15
down here show that they have
09:20
read execute list
09:22
read and some special permissions.
09:28
Let's give them read only
09:39
he'll come here.
09:43
Excuse me. Take users Go.
09:46
Come here and notice that the
09:50
folder
09:52
permissions have grade boxes.
09:54
Gray boxes means see permissions are inherited from a parent.
10:00
So if I come back here
10:03
and we go back
10:05
and go to the volume itself, Dr s
10:09
and look at the properties,
10:11
look at security
10:15
looking users
10:16
and edit
10:18
Here they have the permissions,
10:22
and all they have are special permissions. Because everyone,
10:26
the good and the users
10:28
the user's this time have
10:31
read executing list folder contents and read.
10:35
And they're not great this time. They're not inherited.
10:39
They actually came from the drive itself.
10:43
We go back, look at the same thing
10:48
in attempt to efs
10:52
properties, security
10:54
users
10:58
held other permissions.
11:01
They have the same permissions. But they're gray now, which means they've been inherited.
11:07
Which means I can change them.
11:09
I can take away their reading, reading, execute
11:22
and give them.
11:37
Let's give them full control.
11:46
So now we're going to see users have full control
11:52
over attempt to s
11:54
go back in. And look,
12:05
the full control we gave them
12:07
is not inherited because
12:11
those permissions are not gray.
12:18
Now we can create a file attempt to s.
12:20
And if we created filing him to us by saying new
12:26
text document
12:35
and we now we'll get the permissions for the text document
12:45
I had it
12:46
for Users
12:48
noticed they have full control over the file because they have full control over the folder in which it's created.
13:03
So here's a question. What happens if we copy this file
13:13
and put it in temp one?
13:22
He did this
13:24
permission changes we made.
13:26
Stay with the folder,
13:28
Stay with the file.
13:30
Let's take a look
13:39
and the answer will be
13:41
No, they did not. They do not have full control.
13:45
What happens is Thebe permissions are actually part of
13:48
the file storage and the written to the file storage area.
13:54
So when you
13:56
copy and paste a file, you making a second copy, so it's a new right
14:01
and it gets new permissions.
14:05
So now let's watch a different behavior.
14:09
We're gonna take
14:11
Tim
14:13
to reopen it,
14:22
and we're gonna create another filing temp to we're gonna call a test move
14:30
and we try to move a file from
14:33
attempt to
14:35
to temp one.
14:37
You're supposed to
14:39
be able to retain the permissions that were originally set
14:50
here We have temp one
14:52
and tempt to
15:01
his temper
15:03
one.
15:05
And here's attempt to.
15:13
So
15:15
let's create a
15:16
text document called Test move.
15:24
Test move.
15:26
Attempt to users had full control. So I would expect
15:31
if I go in here and look at users
15:35
that I see full control and I do,
15:43
it's like you can see it here.
15:46
So if I take test move
15:50
and they do it, Microsoft says to do
15:54
and I grab it and I move it.
16:00
Move here.
16:03
I should be able to retain permissions.
16:07
In other words, over here, users only have
16:11
read, execute,
16:14
read and write.
16:17
I go over here and take a look.
16:22
My users should have full control if he kept the same for missions from attempt to,
16:30
strangely enough, how they did it,
16:33
even though he used to move back.
16:38
So let's try it a different way.
16:47
Let's make a new text document
16:53
and it's hollow. Test move to
16:59
test moved to
17:02
security users
17:04
full control.
17:11
This time,
17:14
let's want to command prompt.
17:18
And how would I go to his s dr
17:22
Type s colon? Enter?
17:25
And if I want to go to a folder name,
17:30
I change directory or CD,
17:33
and I'm gonna go to camp
17:37
to Dad.
17:38
Yes.
17:41
Now, did I have to capitalize that
17:45
if Iran Lennox the answer be Yes. In Windows,
17:52
the answer is no.
17:56
And of a type directory or D i r.
17:59
There's test move to.
18:03
So if I use the move command
18:30
you can see here I'm going to move is to command the sources. Test
18:34
source file is test moved to dock text, and I'm in
18:38
attempt to directory. I'm going to move it to the temp. One
18:41
factory,
18:45
one file moved.
18:48
So let's close the command problem.
18:52
It was test moved to
18:56
and
18:59
security
19:00
lo and behold, users now still have full control.
19:04
That's a quirk in windows.
19:07
If you use
19:10
the graphical interface, even when you tell it to move, it does a cut and then a paste,
19:17
which means it writes a new file.
19:19
If you use the command line, it doesn't write a new file. It actually keeps the exact same
19:26
bits and bytes on the drive,
19:29
and he goes into the file tables
19:32
and tells
19:33
the file tables that this file should now be in a different folder.
19:38
So when you use the move Commanded doesn't get re written. Since the file doesn't get rewritten, the permissions don't change.
19:48
So cancel this out.
19:52
Close these out,
19:53
Henry. We'll get one more piece share permissions
20:00
so we close out.
20:03
Go back to
20:11
computer.
20:14
Yes, Dr.
20:17
And let's share this
20:22
fear with
20:26
in the safe, specific people,
20:30
I notice I'm getting to pick people here.
20:33
I can pick individuals acting pick groups.
20:37
I can even say
20:41
everyone that should work
20:45
and everyone
20:47
by default has read control.
20:49
Or I could give them read right
20:56
Pelican administrators. They have read right by the fall.
21:00
And if I could share,
21:06
it's now shared using this string
21:11
Win 2008 Dash P. H. Y, which is the name of this
21:15
computer and in the name of the cold.
21:21
So if I go up here
21:23
and I go and I hit run
21:26
and a tape
21:36
notice again, I don't have to capitalize.
21:49
I get a share.
21:52
William opening up.
21:55
It doesn't say s drive anymore, says server name
21:59
and share name.
22:03
So what happens is if you think of this as two different
22:07
*** to have to go through or two different
22:10
checkpoints to cross,
22:12
you get the least of the two permissions.
22:17
So if I have full control with the file level,
22:19
then I have full control if I access to file directly.
22:26
But if I have read only at this level,
22:32
so if I look a test moved to
22:34
which we know just a minute ago I had full control of
22:44
now I haven't read.
22:48
And the difference is when I accessed it directly,
22:52
right off the hard drive,
22:55
I got the hard drive permissions.
22:57
Now, when I access it via the share,
23:00
I get the hard drive permissions. But then they're filtered by what the share allows and this share only allowed read.
23:08
So if I access the director, I have full control.
23:12
But if I access it via a share. My full control is changed by whatever Mason's affair has,
23:22
because I can't have any greater permissions than the least of the two.
23:26
If I have read only on the file and full control on the share,
23:32
I'll still have read only
23:33
because when I get to the file, I'll still have just read only even though the fear, so they could have
23:40
up to full control.
23:45
So last point.
23:47
I now have created the share
23:56
called Temp one s.
24:00
So now I've closed off everything except the shared volume, and you can see it says Win 2000 p h. Y
24:07
and then
24:08
the share name.
24:11
So let's go back and let's click on
24:14
Server
24:15
and you click on the server. We see there's actually three shares on this.
24:19
Two of them existed already, and we created the third.
24:23
If we wanted to make this permanent and give it a drive letter,
24:27
right click
24:30
say map Network drive.
24:36
We can give it a drive letter and let's say em,
24:41
and if we tell it to reconnect and log on
24:44
every time the system boots up, it will go back and look for this same
24:48
system again based on the
24:52
backslash backslash server name, back slash share name construction.
24:59
So if I see finish
25:04
now, it says that the EM drive.
25:08
So I have mapped a share to a Dr letter. So now I can run commands based on the drive letter.
25:15
And if I go to
25:18
computer,
25:19
I now see
25:23
the share
25:25
map to the EM drive.
25:29
So now, on this computer, that share name is this Dr Leiter?

Up Next