|By Keith Mayer||
|October 26, 2012 08:30 AM EDT||
In the past, managing and sharing NTFS folders could be a real ordeal – there were different tools for managing NTFS permissions vs shared folders and most IT Pros generally used these tools on a server-by-server basis from each server’s console.
Server Manager to the rescue!
In Windows Server 2012, Server Manager provides a management facelift on top of the disconnected process that we’ve used in the past for sharing folders and setting NTFS permissions. In addition, Server Manager can easily manage these folders on a local server or any remote servers that you’ve previously added to the Server Manager dashboard.
NOTE: For details on using and customizing Server Manager for your servers and network environment, check out this post on that topic.
Along with the new SMB 3.0 performance and availability features for shared folders, Server Manager provides a powerful management tool for taking advantages of these features in your network environment.
How can I share new folders with Server Manager?
You can start the process of sharing NTFS folders in Server Manager by launching the New Share Wizard from the File and Storage Services details page. This new wizard integrates the steps involved with creating a new folder, sharing the folder and setting NTFS permissions into a single continuous workstream for local and remote servers.
- On the File and Storage Services page, select Shares and then click Tasks –> New Share … to begin the New Share Wizard.
- On the Select the profile for this share page, select SMB Share – Quick and click the Next button. Note that in addition to creating new SMB shares for NTFS folders that are sharing documents, we also have options for creating shared folders for applications, such as SQL databases or Hyper-V virtual machines, as well as creating new NFS shares for non-Windows client devices.
- On the Select the server and path for this share page, select the server on which to create the new share ( local or remote server ) and the volume on which to create the new shared folder. Click the Next button to continue.
- On the Specify share name page, type the name of your new Share name and click the Next button to continue.
- On the Configure share settings page, you will find advanced options for configuring Access-Based Enumeration (ABE), Offline folder caching, and Encryption of end-to-end SMB network traffic. Let’s select all three options and then click the Next button.
NOTE: If BranchCache is enabled on your server to optimize shared folder access over a WAN, you can also enable BranchCache for this new folder on this page. To learn more about the new simplified BranchCache features in Windows Server 2012 … check out Brian Lewis’ My Thoughts on IT blog.
- On the Specify permissions to control access page, review the default permissions for the new NTFS folder and click the Customize permissions… button to further customize these permissions as necessary. When finished, click the Next button to continue.
- On the Confirm selections page, review the currently selected settings for sharing the new folder and click the Create button to begin the process of creating the new folder, applying NTFS permissions, and sharing the folder with the selected share settings.
How can I automate the process of sharing new folders?
You can automate the process of sharing new folders using PowerShell 3.0 and the new SMB Share Cmdlets. For example, to create and share the same folder as demonstrated above, we could use the following commands in PowerShell:
New-SMBShare -Name Documents -Path D:\Shares\Documents -FolderEnumerationMode AccessBased
-CachingMode Documents -EncryptData $True -FullAccess Everyone
Has anything changed with NTFS permissions in Windows Server 2012?
NTFS access list permissions work the same in Windows Server 2012, but there is an improved user interface for setting and viewing NTFS permissions that can make implementing advanced security scenarios much easier.
What is an NTFS “advanced security scenario”?
For example, a common NTFS folder requirement in many organizations is to set permissions such that users can create, update, delete and rename files, but not delete or rename folders or sub-folders. Many organizations implement this approach to provide a consistent network folder structure for users to store their files, without being concerned about users inadvertently moving or renaming (ie., pruning and grafting) whole sections of that folder structure. In the past, this custom combination of file and folder permissions was confusing and difficult to implement.
To implement this scenario in Windows Server 2012, we can click on the Customize permissions… button referenced above in Step 6 and walk through the following process:
- In the Advanced Security Settings dialog box, click the Disable Inheritance button to disable inherited permissions from the parent folder in preparation of setting an explicit set of folder permissions.
- When prompted, click the option to Convert inherited permissions into explicit permissions on this object. This will create a copy of each inherited permission access list entry into an explicit entry for this folder that we’ll be able to edit or remove.
- In this case, we want to modify the default permissions granted to the Users group for this folder. Use the Remove button to remove each of the existing access list entries granted to the Users group.
- Then use the Add button to grant a new set of file permissions to the Users group. In this scenario, we want users to have read, write and delete permissions to files ( and only files ) inside this folder, so we’ll select the following permission options for files:
- Once we’re done adding file permissions, we’ll use the Add button again to grant a new set of folder permissions to the Users group. In this scenario, we want users to have the ability to see folders and create new files, so we’ll select the following permission options for folders:
That’s it! Now we’ve got our shared folder all set for this advanced security scenario in just a few clicks! Of course, if we wanted to automate this process, we could’ve used the Set-Acl and Get-Acl PowerShell Cmdlets to set NTFS permissions via a script as well.
Are there any other changes related to NTFS permissions?
As we were working through the last set of steps, you may have noticed a few new tabs in the new NTFS Advanced Security Settings dialog.
The tabs that are new or improved for the NTFS Security Dialog in Windows Server 2012 include:
- Share – integrates Share permissions into a separate tab on the NTFS security dialog, so that NTFS and Share permissions can be compared side-by-side
- Effective Access – improved to provide an easier user interface to work with for evaluating the effective permissions for a user, group, device or claim.
- Central Policy – used with the new Dynamic Access Control (DAC) feature of Windows Server 2012 to centralize folder permissions into security policies that can be dynamically applied to files and folders based on Active Directory claims.
Dynamic Access Control (DAC), in particular, is a powerful feature in Windows Server 2012 to reduce the administrative load of managing standard permission access lists across lots of file servers. I’ll be writing a separate article in the near future that steps through the process of using DAC.
Do It: Implementing Shared Folders and NTFS Permissions
Your turn! Build your own Windows Server 2012 server lab and use the steps outlined above to create and share your own shared folder with the following properties:
- Shared folder path: C:\Shares\Documents
- Shared folder name: Documents
- Shared folder settings: Access-based Enumeration
- NTFS Permissions: Use the permissions shown in the example above.
In this article, we've walked through the benefits of the improvements offered by Windows Server 2012 for sharing and configuring NTFS folders using Server Manager and PowerShell 3.0
Learn more! To gain more experience with Windows Server 2012 in your lab, feel free to join our FREE Windows Server 2012 "Early Experts" Challenge online study group and become one of the 1,000+ IT Pros that are now studying as "Early Experts" on Windows Server 2012.
What do you think of Server Manager in Windows Server 2012?
Are you excited about using Server Manager in your environment for shared folder scenarios? Feel free to share your feedback and stories in the comments below!
Hope this helps,
|Build Your Lab! Download Windows Server 2012|
|Don’t Have a Lab? Build Your Lab in the Cloud with Windows Azure Virtual Machines|
|Want to Get Certified? Join our Windows Server 2012 "Early Experts" Study Group|
What are the successful IoT innovations from emerging markets? What are the unique challenges and opportunities from these markets? How did the constraints in connectivity among others lead to groundbreaking insights? In her session at @ThingsExpo, Carmen Feliciano, a Principal at AMDG, will answer all these questions and share how you can apply IoT best practices and frameworks from the emerging markets to your own business.
Jul. 24, 2016 04:15 PM EDT Reads: 1,532
Ask someone to architect an Internet of Things (IoT) solution and you are guaranteed to see a reference to the cloud. This would lead you to believe that IoT requires the cloud to exist. However, there are many IoT use cases where the cloud is not feasible or desirable. In his session at @ThingsExpo, Dave McCarthy, Director of Products at Bsquare Corporation, will discuss the strategies that exist to extend intelligence directly to IoT devices and sensors, freeing them from the constraints of ...
Jul. 24, 2016 03:45 PM EDT Reads: 1,713
You think you know what’s in your data. But do you? Most organizations are now aware of the business intelligence represented by their data. Data science stands to take this to a level you never thought of – literally. The techniques of data science, when used with the capabilities of Big Data technologies, can make connections you had not yet imagined, helping you discover new insights and ask new questions of your data. In his session at @ThingsExpo, Sarbjit Sarkaria, data science team lead ...
Jul. 24, 2016 03:30 PM EDT Reads: 880
Extracting business value from Internet of Things (IoT) data doesn’t happen overnight. There are several requirements that must be satisfied, including IoT device enablement, data analysis, real-time detection of complex events and automated orchestration of actions. Unfortunately, too many companies fall short in achieving their business goals by implementing incomplete solutions or not focusing on tangible use cases. In his general session at @ThingsExpo, Dave McCarthy, Director of Products...
Jul. 24, 2016 03:15 PM EDT Reads: 1,663
Traditional IT, great for stable systems of record, is struggling to cope with newer, agile systems of engagement requirements coming straight from the business. In his session at 18th Cloud Expo, William Morrish, General Manager of Product Sales at Interoute, outlined ways of exploiting new architectures to enable both systems and building them to support your existing platforms, with an eye for the future. Technologies such as Docker and the hyper-convergence of computing, networking and sto...
Jul. 24, 2016 03:00 PM EDT Reads: 995
WebRTC is bringing significant change to the communications landscape that will bridge the worlds of web and telephony, making the Internet the new standard for communications. Cloud9 took the road less traveled and used WebRTC to create a downloadable enterprise-grade communications platform that is changing the communication dynamic in the financial sector. In his session at @ThingsExpo, Leo Papadopoulos, CTO of Cloud9, discussed the importance of WebRTC and how it enables companies to focus...
Jul. 24, 2016 02:30 PM EDT Reads: 738
With an estimated 50 billion devices connected to the Internet by 2020, several industries will begin to expand their capabilities for retaining end point data at the edge to better utilize the range of data types and sheer volume of M2M data generated by the Internet of Things. In his session at @ThingsExpo, Don DeLoach, CEO and President of Infobright, discussed the infrastructures businesses will need to implement to handle this explosion of data by providing specific use cases for filterin...
Jul. 24, 2016 02:00 PM EDT Reads: 1,183
IoT generates lots of temporal data. But how do you unlock its value? You need to discover patterns that are repeatable in vast quantities of data, understand their meaning, and implement scalable monitoring across multiple data streams in order to monetize the discoveries and insights. Motif discovery and deep learning platforms are emerging to visualize sensor data, to search for patterns and to build application that can monitor real time streams efficiently. In his session at @ThingsExpo, ...
Jul. 24, 2016 01:30 PM EDT Reads: 793
Early adopters of IoT viewed it mainly as a different term for machine-to-machine connectivity or M2M. This is understandable since a prerequisite for any IoT solution is the ability to collect and aggregate device data, which is most often presented in a dashboard. The problem is that viewing data in a dashboard requires a human to interpret the results and take manual action, which doesn’t scale to the needs of IoT.
Jul. 24, 2016 12:00 PM EDT Reads: 1,865
Internet of @ThingsExpo has announced today that Chris Matthieu has been named tech chair of Internet of @ThingsExpo 2016 Silicon Valley. The 6thInternet of @ThingsExpo will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Jul. 24, 2016 12:00 PM EDT Reads: 1,881
Much of IT terminology is often misused and misapplied. Modernization and transformation are two such terms. They are often used interchangeably even though they mean different things and have very different connotations. Indeed, it is somewhat safe to assume that in IT any transformative effort is likely to also have a modernizing effect, and thus, we can see these as levels of improvement efforts. However, many businesses are being led to believe if they don’t transform now they risk becoming ...
Jul. 24, 2016 11:00 AM EDT Reads: 1,104
CenturyLink has announced that application server solutions from GENBAND are now available as part of CenturyLink’s Networx contracts. The General Services Administration (GSA)’s Networx program includes the largest telecommunications contract vehicles ever awarded by the federal government. CenturyLink recently secured an extension through spring 2020 of its offerings available to federal government agencies via GSA’s Networx Universal and Enterprise contracts. GENBAND’s EXPERiUS™ Application...
Jul. 24, 2016 11:00 AM EDT Reads: 1,790
What does it look like when you have access to cloud infrastructure and platform under the same roof? Let’s talk about the different layers of Technology as a Service: who cares, what runs where, and how does it all fit together. In his session at 18th Cloud Expo, Phil Jackson, Lead Technology Evangelist at SoftLayer, an IBM company, spoke about the picture being painted by IBM Cloud and how the tools being crafted can help fill the gaps in your IT infrastructure.
Jul. 24, 2016 11:00 AM EDT Reads: 2,022
SYS-CON Events announced today the Enterprise IoT Bootcamp, being held November 1-2, 2016, in conjunction with 19th Cloud Expo | @ThingsExpo at the Santa Clara Convention Center in Santa Clara, CA. Combined with real-world scenarios and use cases, the Enterprise IoT Bootcamp is not just based on presentations but with hands-on demos and detailed walkthroughs. We will introduce you to a variety of real world use cases prototyped using Arduino, Raspberry Pi, BeagleBone, Spark, and Intel Edison. Y...
Jul. 24, 2016 11:00 AM EDT Reads: 1,305
SYS-CON Events announced today that LeaseWeb USA, a cloud Infrastructure-as-a-Service (IaaS) provider, will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. LeaseWeb is one of the world's largest hosting brands. The company helps customers define, develop and deploy IT infrastructure tailored to their exact business needs, by combining various kinds cloud solutions.
Jul. 24, 2016 09:30 AM EDT Reads: 1,074
The best-practices for building IoT applications with Go Code that attendees can use to build their own IoT applications. In his session at @ThingsExpo, Indraneel Mitra, Senior Solutions Architect & Technology Evangelist at Cognizant, provided valuable information and resources for both novice and experienced developers on how to get started with IoT and Golang in a day. He also provided information on how to use Intel Arduino Kit, Go Robotics API and AWS IoT stack to build an application tha...
Jul. 24, 2016 08:45 AM EDT Reads: 905
Whether your IoT service is connecting cars, homes, appliances, wearable, cameras or other devices, one question hangs in the balance – how do you actually make money from this service? The ability to turn your IoT service into profit requires the ability to create a monetization strategy that is flexible, scalable and working for you in real-time. It must be a transparent, smoothly implemented strategy that all stakeholders – from customers to the board – will be able to understand and comprehe...
Jul. 24, 2016 08:30 AM EDT Reads: 2,066
It’s 2016: buildings are smart, connected and the IoT is fundamentally altering how control and operating systems work and speak to each other. Platforms across the enterprise are networked via inexpensive sensors to collect massive amounts of data for analytics, information management, and insights that can be used to continuously improve operations. In his session at @ThingsExpo, Brian Chemel, Co-Founder and CTO of Digital Lumens, will explore: The benefits sensor-networked systems bring to ...
Jul. 24, 2016 08:30 AM EDT Reads: 1,473
Identity is in everything and customers are looking to their providers to ensure the security of their identities, transactions and data. With the increased reliance on cloud-based services, service providers must build security and trust into their offerings, adding value to customers and improving the user experience. Making identity, security and privacy easy for customers provides a unique advantage over the competition.
Jul. 24, 2016 08:15 AM EDT Reads: 1,063
SYS-CON Events announced today that Venafi, the Immune System for the Internet™ and the leading provider of Next Generation Trust Protection, will exhibit at @DevOpsSummit at 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Venafi is the Immune System for the Internet™ that protects the foundation of all cybersecurity – cryptographic keys and digital certificates – so they can’t be misused by bad guys in attacks...
Jul. 24, 2016 08:15 AM EDT Reads: 1,190