{"id":5577,"date":"2017-09-01T05:18:17","date_gmt":"2017-09-01T05:18:17","guid":{"rendered":"http:\/\/www.vyapin.com\/blog\/?p=5577"},"modified":"2021-05-12T07:18:09","modified_gmt":"2021-05-12T07:18:09","slug":"understanding-ntfs-permissions-how-to-report-effective-permissions-on-files-and-folders","status":"publish","type":"post","link":"https:\/\/www.vyapinsoftware.com\/blog\/understanding-ntfs-permissions-how-to-report-effective-permissions-on-files-and-folders","title":{"rendered":"Understanding NTFS Permissions \u2013 How to report Effective Permissions on Files and folders?"},"content":{"rendered":"<h2>What is NTFS Permissions?<\/h2>\n<p>NTFS permissions play a vital role in securing Operating system objects (Folders, Files, and Services etc). <a href=\"https:\/\/www.vyapinsoftware.com\/blog\/ntfs-permissions-a-primer\">NTFS permissions<\/a> works on the basis of what is called an <strong>Access Control Model<\/strong> which contains the following:<\/p>\n<p>\u2022 Access token<br \/>\n\u2022 Security Descriptors<\/p>\n<h3>Access token:<\/h3>\n<p>Contains information about the logged on user and their privileges.<\/p>\n<h3>Security descriptors:<\/h3>\n<p>Every object in a system has a set of regulatory information attached to it, which controls information about gaining access to the object and its attributes. These sets of regulatory information are termed as Security Descriptors. Security descriptors are created along with creation of an object and act as the backbone of the <a href=\"https:\/\/www.vyapinsoftware.com\/blog\/audit-ntfs-security-in-the-windows-network\">NTFS security<\/a>.<\/p>\n<p>A <strong>Security Descriptor<\/strong> consists of the following components:<\/p>\n<p>\u2022 Security identifier (SID) \u2013 a unique identifier (a unique value) that identifies whether the entry is a User or Group.<\/p>\n<p>\u2022 Discretionary Access Control List (DACL) &#8211; contains the Users and Groups and Permissions (Allow or Deny) on the object. Each entry in DACL is called an Access Control Entry (ACE).<\/p>\n<p>\u2022 SACL (System Access Control List) &#8211; contains the auditing details of attempts made to access the object.<\/p>\n<p>Let us review the above concepts with a simple example. Imagine a \u201cFolder\u201d as a physical File folder cabinet with an electronic lock. The various electronic lock codes for accessing the file cabinet are Permissions, which control who gains access to the file cabinet and what they can do inside the file cabinet. Such information is maintained in DACL as ACE entries. You can also put an additional Security near the File cabinet, to maintain an information log (audit) about who are accessing the file cabinet (SACL). SID is like an electronic key code that unlocks the file cabinet.<\/p>\n<p><strong>How NTFS Works?<\/strong><\/p>\n<p>Whenever a user logs into the system, the system creates a unique Access Token for the user. The Access token contains the information about the Security Identifier (SID) and the permissions held by the user. Whenever the user tries to access any object, a copy of the Access token is given to the thread executing the process. The object for which the user is requesting access contains the Security Descriptor. The object, on receiving request, compares User SID with the entries present in the Security Descriptors DACL entries. If a match is found while comparing items, applicable permissions are given to the user.<\/p>\n<h2>NTFS Permissions &#8211; Simple Example<\/h2>\n<p>Consider a user named Tom requesting Access to object as logon user.<\/p>\n<p><a href=\"https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2010\/09\/ntfs_working_img1-1.png\" data-lbwps-width=\"781\" data-lbwps-height=\"527\" data-lbwps-srcsmall=\"https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2010\/09\/ntfs_working_img1-1-300x202.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-3667 size-full\" src=\"https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2010\/09\/ntfs_working_img1-1.png\" alt=\"ntfs_working_img1\" width=\"781\" height=\"527\" srcset=\"https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2010\/09\/ntfs_working_img1-1.png 781w, https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2010\/09\/ntfs_working_img1-1-300x202.png 300w, https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2010\/09\/ntfs_working_img1-1-768x518.png 768w, https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2010\/09\/ntfs_working_img1-1-624x421.png 624w\" sizes=\"auto, (max-width: 781px) 100vw, 781px\" \/><\/a><\/p>\n<p>On receiving the Access request, DACL checks the ACE entry for \u201cTom\u201d. In this scenario Tom is given the permissions to \u201cRead, Write, Delete\u201d on the object.<\/p>\n<p><strong>Note:<\/strong> This Scenario is also applicable for users accessing \u201cShared Folders\u201d across File Servers.<\/p>\n<h2>NTFS Permissions Types<\/h2>\n<p>Permissions are of two types<\/p>\n<p>\u2022 Explicit permissions<br \/>\n\u2022 Inherited permissions<\/p>\n<h3>Explicit permissions:<\/h3>\n<p>Permissions that are listed in ACL directly.<\/p>\n<p><strong>Inherited Permissions:<\/strong> Permissions that are granted by means of group membership; the user may not be listed in the ACL directly, as we know that ACL contains permissions for users and groups, but via group membership, users may be getting some permissions. For example consider an object with the following ACE entries<\/p>\n<p><a href=\"https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2010\/09\/ntfs_working_table1-1.png\" data-lbwps-width=\"781\" data-lbwps-height=\"527\" data-lbwps-srcsmall=\"https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2010\/09\/ntfs_working_table1-1-300x202.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-3668 size-full\" src=\"https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2010\/09\/ntfs_working_table1-1.png\" alt=\"ntfs_working_table1\" width=\"781\" height=\"527\" srcset=\"https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2010\/09\/ntfs_working_table1-1.png 781w, https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2010\/09\/ntfs_working_table1-1-300x202.png 300w, https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2010\/09\/ntfs_working_table1-1-768x518.png 768w, https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2010\/09\/ntfs_working_table1-1-624x421.png 624w\" sizes=\"auto, (max-width: 781px) 100vw, 781px\" \/><\/a><\/p>\n<p><strong>Note:<\/strong> User Gary is a member of Technical Leaders group.<\/p>\n<p>For the above scenario, user Gary is getting the permission &#8220;Take Ownership&#8221; because of his membership in Technical Leaders, in addition to his existing permissions. These extra permissions are termed as Inherited Permissions. So while accessing the object, the resultant permissions that are applicable are:<\/p>\n<p><a href=\"https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2010\/09\/ntfs_working_table2-1.png\" data-lbwps-width=\"931\" data-lbwps-height=\"600\" data-lbwps-srcsmall=\"https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2010\/09\/ntfs_working_table2-1-300x193.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-3670 size-full\" src=\"https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2010\/09\/ntfs_working_table2-1.png\" alt=\"ntfs_working_table2\" width=\"931\" height=\"600\" srcset=\"https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2010\/09\/ntfs_working_table2-1.png 931w, https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2010\/09\/ntfs_working_table2-1-300x193.png 300w, https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2010\/09\/ntfs_working_table2-1-768x495.png 768w, https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2010\/09\/ntfs_working_table2-1-624x402.png 624w\" sizes=\"auto, (max-width: 931px) 100vw, 931px\" \/><\/a><\/p>\n<h3>Effective Permissions<\/h3>\n<p>Effective permissions are the resultant permissions a User or a Group has towards an object. Effective permissions are the combination of Explicit and Inherited Permission entries and the restrictive permissions apply while accessing object. The following shows the essential factors that need to be addressed while considering effective permissions:<\/p>\n<p><u>Factors:<\/u><\/p>\n<p>\u2022 Well known SID<br \/>\n\u2022 Local group membership<br \/>\n\u2022 Global group membership<\/p>\n<p>Effective permission calculation involves both direct and indirect group membership. The user may be direct member of the group or may become an indirect member of the group by-means of nested groups. For example consider the following scenario<\/p>\n<p><a href=\"https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2010\/09\/ntfs_working_table3-1.png\" data-lbwps-width=\"986\" data-lbwps-height=\"657\" data-lbwps-srcsmall=\"https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2010\/09\/ntfs_working_table3-1-300x200.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-3671 size-full\" src=\"https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2010\/09\/ntfs_working_table3-1.png\" alt=\"ntfs_working_table3\" width=\"986\" height=\"657\" srcset=\"https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2010\/09\/ntfs_working_table3-1.png 986w, https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2010\/09\/ntfs_working_table3-1-300x200.png 300w, https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2010\/09\/ntfs_working_table3-1-768x512.png 768w\" sizes=\"auto, (max-width: 986px) 100vw, 986px\" \/><\/a><\/p>\n<p>Even though User Gary is not a direct member of the Team Leaders group, by means of nested group Team Leader -&gt; Team Auditing, Gary is somewhat of an \u201cindirect\u201d member of Team Leaders. That is, the permissions of Team Leaders are also applicable for user Gary along with the other permissions.<\/p>\n<p>If the user is a member of more than one group, effective permissions are calculated by taking all the groups\u2019 membership into account and the approximating them.<\/p>\n<p>Effective permissions for groups do not involve group membership. It shows only the explicitly assigned permissions in the ACL.<\/p>\n<h2>How Admin Report Kit For Windows Enterprise (ARKWE) address effective permissions reporting?<\/h2>\n<blockquote><p>ARKWE has the provision to <a href=\"https:\/\/www.vyapinsoftware.com\/products\/ntfs-security-auditor\/ntfs-permissions-reporting\"><strong>report about Share folders and Files NTFS permissions<\/strong><\/a> in all dimensions. It has the ability to report the permissions information about the Users and groups that may or may not present in the Share Folders across File servers and domains.<\/p>\n<p>It has provision to Export \/ Print reports in various formats (HTML \/ CSV \/ MDB \/ PDF \/ TIFF \/ XLS) and also to schedule reports at required Time intervals without any user interaction.<\/p>\n<p><a href=\"https:\/\/www.vyapinsoftware.com\/products\/windows-audit\/windows-network-audit-and-software-inventory-reports\">ARKWE<\/a> addresses the effective permissions reporting pain, by taking all the necessary factors such as Group membership, Well Known Sid etc into account.<\/p><\/blockquote>\n<p>The following summarizes the advantages of ARKWE over the Windows Effective Permissions Tool.<\/p>\n<p><a href=\"https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2010\/09\/ntfs_working_table4-1.png\" data-lbwps-width=\"973\" data-lbwps-height=\"497\" data-lbwps-srcsmall=\"https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2010\/09\/ntfs_working_table4-1-300x153.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-3672 size-full\" src=\"https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2010\/09\/ntfs_working_table4-1.png\" alt=\"ntfs_working_table4\" width=\"973\" height=\"497\" srcset=\"https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2010\/09\/ntfs_working_table4-1.png 973w, https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2010\/09\/ntfs_working_table4-1-300x153.png 300w, https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2010\/09\/ntfs_working_table4-1-768x392.png 768w, https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2010\/09\/ntfs_working_table4-1-624x319.png 624w\" sizes=\"auto, (max-width: 973px) 100vw, 973px\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>What is NTFS Permissions? NTFS permissions play a vital role in securing Operating system objects (Folders, Files, and Services etc). NTFS permissions works on the basis of what is called an Access Control Model which contains the following: \u2022 Access token \u2022 Security Descriptors Access token: Contains information about the logged on user and their [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":3667,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[86,119],"class_list":["post-5577","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ntfs-security-audit","tag-ntfs-permissions","tag-ntfs-security-reports"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.vyapinsoftware.com\/blog\/wp-json\/wp\/v2\/posts\/5577","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.vyapinsoftware.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.vyapinsoftware.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.vyapinsoftware.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.vyapinsoftware.com\/blog\/wp-json\/wp\/v2\/comments?post=5577"}],"version-history":[{"count":15,"href":"https:\/\/www.vyapinsoftware.com\/blog\/wp-json\/wp\/v2\/posts\/5577\/revisions"}],"predecessor-version":[{"id":7861,"href":"https:\/\/www.vyapinsoftware.com\/blog\/wp-json\/wp\/v2\/posts\/5577\/revisions\/7861"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.vyapinsoftware.com\/blog\/wp-json\/wp\/v2\/media\/3667"}],"wp:attachment":[{"href":"https:\/\/www.vyapinsoftware.com\/blog\/wp-json\/wp\/v2\/media?parent=5577"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.vyapinsoftware.com\/blog\/wp-json\/wp\/v2\/categories?post=5577"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.vyapinsoftware.com\/blog\/wp-json\/wp\/v2\/tags?post=5577"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}