Each object has a set of effective permissions associated with it. The Effective Permissions tab of the Advanced Security Settings property page lists the permissions that would be granted to the selected group or user based solely on the permissions granted directly through group membership. If you want to find out what permissions a user or group has on an object, you can use the Effective Permissions Tool.
Factors that are used to determine effective permissions
The following are used to determine effective permissions:
- Global group membership
- Local group membership
- Local permissions
- Local privileges
- Universal group membership
Factors that are not used to determine effective permissions
The following well-known security identifiers (SIDs) are not used to determine effective permissions:
- Anonymous Logon
- Batch, Creator Group
- Dialup
- Enterprise Domain Controllers
- Interactive
- Network
- Proxy
- Restricted
- Remote
- Service
- System
- Terminal Server User
- Other Organization
- This Organization
Also, share permissions are not part of the effective permissions calculation. Access to shares can be denied through share permissions even when access is allowed through NTFS permissions.
Factors that are not used for objects that are accessed remotely
The following are not used to determine effective permissions for objects that are accessed remotely:
- Local group membership
- Local privileges
- Share permissions
Effective permissions are based on a local evaluation of the user's group membership, user privileges, and permissions. If the resource being queried is on a remote computer, the effective permissions displayed will not include permissions granted or denied to the user through the use of a local group on the remote computer.
Retrieving effective permissions
Accurate retrieval of the above information requires permission to read the membership information. If the specified user or group is a domain object, you must have permission to read the object's group information about the domain.
Important | |
|
Here are some relevant default domain permissions:
- Domain administrators have permission to read
membership information about all objects.
- Local administrators on a workstation or
stand-alone server cannot read membership information for a domain
user.
Effective Permissions tool
If you want to find out what permissions a user or group has on an object, you can use the Effective Permissions tool. It calculates the permissions that are granted to the specified user or group. The calculation includes the permissions in effect from group membership and any permissions inherited from the parent object. It looks up all domain and local groups in which the user or group is a member.
The Everyone group will always be included, as long as the selected user or group is not a member of the Anonymous Logon group.
Important | |
|
For information about using the Effective Permissions tool, see View Effective Permissions on Files and Folders.
Additional references