ALL >> System-Network-Administration >> View Article
Assigning Standard Permissions
Standard permissions are assigned in the Security tab in the Properties dialog box for the Project+ object, which is accessed by using the Active Directory Users And Computers console.
To assign standard permissions for an object, complete the following steps:
1. Click Start, point to Administrative Tools, and then click Active Directory Users And Computers. On the View menu, ensure that Advanced Features is selected. Right-click the object for which you want to assign permissions and click Properties.
important You must select Advanced Features on the View menu to be able to access the Security tab and assign standard permissions for an object.
2.In the Properties dialog box for the object, click the Security tab, shown previously in Figure 9-6. Note that the permissions provided in the Properties dialog box are different for each object type. Click Add.
3.In the Select Users, Computers, Or Groups dialog box, type the name of the security principal for which you want to set permissions in the Enter The Object Names
To Select box, then click OK.
...
... In the Permissions For Security Principal box, select the Allow check box or the Deny check box for each permission you want to add, change, or deny. Refer
to the procedure "To set inheritance for a standard or special permission," on page 9-25 in this lesson, for details on setting inheritance. Click OK.
To set inheritance for a standard or special a certification cost permission, complete the following steps:
1.In the Advanced Security Settings dialog box for the object, do one of the following:
If you want this object to inherit permissions from its parent object, proceed to the next step.
If you don't want this object to inherit any permissions from its parent object, clear the Allow Inheritable Permissions From The Parent To Propagate To This Object And All Child Objects. Include These With Entries Explicitly Defined Here check box. Then select Copy to copy the permissions or Remove to remove the permissions.
2.Select the permission in the Permission Entries box, then click Edit.
3.In the Permission Entry dialog box for the object, do one of the following:
If you don't want child objects to inherit this permission, ensure that the Apply Onto list is set to This Object Only. Click OK.
If you want only child objects to inherit this permission, ensure that the Apply Onto list is set to This Object And All Child Objects. At this point, you have two options.
If you want permissions inheritance to flow past the immediate child objects of this object to other containers within the parent, click OK.
If you want only the immediate child objects of this object to inherit this permission, select the Apply These Permissions To Objects And/Or Containers Within This Container Only check box. Click OK.
4.In the Advanced Security Settings dialog box for thefree practice IT questions object, click OK.In the Properties dialog box for the object, click OK.
Add Comment
System/Network Administration Articles
1. The Real Difference Between Ai Tools And Ai SystemsAuthor: Orson Amiri
2. Document Manager Software: Tools To Organize Business Files
Author: DocSmart Solutions
3. Best Online Cybersecurity Training Institute In India
Author: securium Academy
4. Mechanical Optical Switch: Reliable Light Routing For Optical Networks
Author: Ryan
5. Optical Switches: Enabling Fast And Flexible Optical Networks
Author: Ryan
6. Fiber Cable Stripping Machine: Precision And Efficiency In Fiber Optic Processing
Author: Ryan
7. 20% Off PmpĀ® Certification: Turn This Christmas Into A Career Milestone
Author: securium Academy
8. The Fiber Jumper Production Line: Streamlining The Manufacturing Of High-quality Fiber Optic Cables
Author: Ryan
9. The Fiber Coupler Production Line: Enabling Efficient Signal Distribution In Fiber Optic Networks
Author: Ryan
10. Top 10 Cyber Threats Of 2026 And How To Prepare For Them
Author: securium Academy
11. Cloud Technology Solutions For Businesses: Improve Efficiency & Growth
Author: Venttech
12. Ethical Hacking Training Institute Building Future Ready Cybersecurity Experts
Author: Hanna Vahab
13. How Oscp Certification Opens Doors To Global Cybersecurity Roles?
Author: securium Academy
14. Fiber Optic Cable Production Line: The Backbone Of Modern Connectivity
Author: Ryan
15. Fiber Cable Production Line: Revolutionizing Connectivity
Author: Ryan






