Using Object Permissions to Control AccessObject permissions determine the type of access that is granted to an object or an object property. Objects are files, folders, registry keys, printers, and Active Directory objects. The type of access granted is dependent on the type of object. File permissions, for example, include permissions such as read, write, execute, and delete, while Active Directory object permissions might include things such as Reset Password, Create Object, or Modify the Membership of a Group. This chapter includes a general discussion about how permissions are defined and how inheritance affects permissions, and it includes an example of defining printer permissions.Chapter 5 and Chapter 7. Permission BasicsWho can assign object permissions? Administrators, object owners, and any user or group given the Permission right on an object can assign permissions. Users given object control over objects in the Active Directory can assign permissions on those objects.In addition to explicit (those assigned directly on an object) object permissions, inherited permissions are also used to determine the effective permissions on an object. Inherited permissions are permissions that are not assigned directly to an object; instead, they are assigned to a parent object and passed on to their children. Inheritable permission can be blocked, so it may be quite confusing to attempt to figure out exactly what permissions are applied to an object. A child object is one that exists in a subcontainer. For example, files are child objects of folders, and subfolders are child objects of other folders. In the file system, all first-level folders are considered child folders of the root.For example, file and folder permissions and Active Directory object permissions can be inherited from the object above them in the hierarchy. So a file in a subfolder of the volume root may inherit the permissions placed on the root. Figure 3-6 shows the C:\Accounting folder security property page. Notice that the permission boxes are shaded. This means that they are inherited permissions. Figure 3-6. The accounting folder inherits its permissions from the drive root permissions.![]() Figure 3-7. Selection of a check box controls inheritance on a folder.[View full size image] ![]() Figure 3-8. Folders can be protected from inheritance. Unshaded boxes mean that the permissions shown are not inherited but explicitly set on the object.![]() Figure 3-9. The Advanced property page will show you what permissions are inherited, and the Apply To column of the page shows if and when the current permissions will be inherited.[View full size image] ![]() Combining PermissionsA folder or file can have both inherited and explicit settings. Figure 3-10 indicates that permissions on myfolder for Joe Smith are "not inherited." Figure 3-11 shows the special permissions page for the user Joe Smith of the myfolder\temp folder, indicating that he has been given the Create Files/Write Data permission on this folder. He has inherited the Read and Execute permissions from the myfolder folder. The effective permissions on any folder are calculated for any user by combining explicit and inherited permissions. You can see in Figure 3-12 the effective permissions on the myfolder\temp folder for the user Joe Smith. Note that the effective permissions are a combination of the permissions explicitly given Joe on the temp folder and those inherited from the myfolder folder. Figure 3-10. Permission may be inherited or, as is the case for the myfolder folder for Joe Smith, not.[View full size image] ![]() Figure 3-11. Explicit permissions can also be granted.![]() Figure 3-12. Effective permissions are the combination of inherited and explicit permissions.[View full size image] ![]() Best Practices for Assigning Object PermissionsAssigning object permissions requires careful planning to ensure that the access a user ultimately has is correct. Best practices for object permissions are as follows:Use deny permission to exclude a subset of a group that has allowed permissions or to exclude a special permission when full control has been granted.Use security templates.Avoid chaining default permissions on file system objects.Don't deny the Everyone group access to an object.Apply permissions high in the tree and use inheritance to propagate. Printer Permissions and OwnershipA logical printer is the GUI representation of the physical device, and you can create as many as you want for each physical printer. Printer permissions and printer ownership are configured directly on the printer object. In Windows Server 2003, as in Windows 2000 and Windows NT, printer permissions are allowed or denied. Permissions are discussed in the next sections: Manage PrinterStop, pause, or start printing; delete an item from the printer queue; change the priority of print jobs; read and change permissions. In other words, this permission gives the owner complete control.Manage DocumentsPause printing; delete an item from the printer queue.To set printer permissions, follow these steps:
Making Choices and Restricting PermissionsThe default permissions applied to printers may be okay in some environments. While printer access is not generally perceived to be an area for security concern, you need to evaluate the risk based on what the printer is used for and whether or not you believe the printer is accessible to a hostile environment.Restrict Printer AccessIf a printer is used to print checks, securities, or other documents with monetary value, it may be appropriate to restrict the ability to print to authorized personnel. Color printers and plotters and other printers that are expensive to operate are another class of devices to which access should be restricted. If these printers are expensive to operate, then it makes sense to restrict print access to reduce cost.Modify Default PermissionsThe CREATOR OWNER group (meaning the one who created the object and owns it) has, by default, the read, manage documents, and change permissions and takes ownership permission on documents only. This is a reasonable setting because it allows the person sending a document to the printer to see the document in the queue and delete the document, pause, and restart printing of the document. They cannot manage documents that are not theirs. They cannot change the document's priority, eitherthat is, they cannot make their document print before another in the queue. However, users do not need this setting to print, so you could argue that they should not have it. In this case, a print operator takes responsibility for managing all documents.The Everyone group has the right to print. This is fine in a trusted environment for generic document printers, but in an untrustworthy or hostile environment, it should be removed. However, you must ensure that all groups of users that do need to print have permission to do so.Administrators, server operators, and print operators have the manage printer right. They can manage all documents, change priority, load new drivers, and so forth. In a restricted environment, create custom groups for classes of printers, assign these groups the right to manage printers, and remove the defaults. For example, just as you may not want all users to be able to print to the check printer, you may not want all administrators, server operators, and print operators to be able to manage the check printer. |