ALL >> System-Network-Administration >> View Article
Permissions Set For The Parent Objects Can Be Inherited By Child Objects
After you set permissions on a parent object, child objects created in the parent object can inherit these Network+ certification permissions. There are three indicators of inherited permissions:
Shaded permissions check boxes These check boxes are located in the Security tab in the Properties dialog box for an object, shown previously in Figure 9-6, and in the Permission Entry dialog box for an object, shown previously in Figure 9-7.
If a permission is inherited, a permissions check box is shaded. However, shaded special permissions check boxes do not indicate inherited permissions. These shaded check boxes merely indicate that a special permission exists.
The Inherited From column This column is located in the Permission Entries list in the Advanced Security Settings dialog box for an object, shown in Figure 9-9-If a permission is inherited, the distinguished name of the parent object is displayed. This is a new feature in Windows Server 2003.
Unavailable Remove button for a permission This button is located in the Advanced Security Settings dialog box, ...
... shown in Figure 9-9. If a permission is inherited, the Remove button is unavailable, because the Network+ exam permission must be removed at the parent object.
Effective Permissions
Effective permissions are the overall permissions that a security principal has for an object, including group membership and inheritance from parent objects. A new fea-ture in Windows Server 2003 enables you to view the effective permissions granted to a selected security principal for an object.
To view effective permissions granted to a security principal for an object, complete the following steps:
1. Click Start, point to Administrative Tools, and then click Active Directory Users And Computers. On the View menu, ensure that Advanced Features is selected. Right-click the object for which you want to view effective permissions and click Properties.
2.In the Properties dialog box for the object, click the Security tab, and then click Advanced.
3.In the Advanced Security Settings dialog box for the object, click the Effective Permissions tab. Click Select.
In the Select User, Computer, Or Group dialog box, type the name of a user or group in the Enter The Object Name To Select box, and then click OK. The
selected check boxes indicate the effective permissions of the user or group for the object, as shown in Figure 9-10.
The information displayed in the Effective Permissions tab is read-only. Therefore, you cannot change a CCNA certification user's permissions by selecting or clearing permission check boxes in this tab.
Add Comment
System/Network Administration Articles
1. The Fiber Jumper Production Line: Streamlining The Manufacturing Of High-quality Fiber Optic CablesAuthor: Ryan
2. The Fiber Coupler Production Line: Enabling Efficient Signal Distribution In Fiber Optic Networks
Author: Ryan
3. Top 10 Cyber Threats Of 2026 And How To Prepare For Them
Author: securium Academy
4. Cloud Technology Solutions For Businesses: Improve Efficiency & Growth
Author: Venttech
5. Ethical Hacking Training Institute Building Future Ready Cybersecurity Experts
Author: Hanna Vahab
6. How Oscp Certification Opens Doors To Global Cybersecurity Roles?
Author: securium Academy
7. Fiber Optic Cable Production Line: The Backbone Of Modern Connectivity
Author: Ryan
8. Fiber Cable Production Line: Revolutionizing Connectivity
Author: Ryan
9. The Role Of Optical Waveguide Alignment Systems In Precision Optics And Telecommunications
Author: Ryan
10. When Every Access Decision Matters, How Smart Identity Can Make Hipaa Compliance A Reality
Author: Tushar Pansare
11. Fibre Optic Pigtail Cables: Designs, Connectors, And Use Cases
Author: Ryan
12. Exploring Optical Circulators: Categories, Functionality, And Benefits
Author: Ryan
13. Precision In Fiber Optics: Polarization Maintaining Axis And Fiber Rotation Systems
Author: Ryan
14. Fiber Optic Polishing Machines: Types, Applications, And When They Are Needed
Author: Ryan
15. Fiber Optic Pigtails: Types, Specifications, And Applications Explained
Author: Ryan






