How to grant read-only access of a drive to a user?

Bradex

New Member
Messages
16
I have a admin account and a normal user account say XXX.

I have a drive (say Z), to which I want to restrict access to the user XXX. The user should be able to read the documents and view the videos in the drive. However, he should not be able to delete/modify the files in the drive or write new files to the drive.

I have gone through: Permissions - Allow or Deny Access to Users and Groups in Windows 8. I'm not comfortable with command prompts or registry keys, so I tried option three (Change Access Permissions in Advanced Security Properties).

By default, the user had permission for "Read, Read & execute, List folder contents" only. However, even with these I found that the user could delete and modify the files/folders in drive Z. So, I denied the following: "Create file/folders, write attributes/extended attributes, delete subfolders/files". This seems to serve my purpose.

Now I wish to know two things:
1) Am I doing the right thing or messing up something?
2) There was a radio button "Only apply these permissions to objects and/or containers within this container". This I had left unchecked. Should I check this? The window (see attachment) clearly states that these permissions apply to "this folder, subfolder and files". Is this just a redundant option?

Thanks!
 

Attachments

  • Capture.PNG
    Capture.PNG
    19 KB · Views: 96

My Computer

System One

  • OS
    Win 8
I'm still having problems.

The user is able to delete some files within some folders. I don't know why. This seems to occur randomly.

Is this because the user is part of the group 'PC/users' created by default by windows? I don't think so because by default this group has only read-only permissions and deny permissions should override them.

PS: I learnt that, if the radio button "Only apply these permissions to objects and/or containers within this container" is checked then permissions will be applied only to current folders and subfolders and not to subsequently created folders and files. Hence I had left it unchecked.
 

My Computer

System One

  • OS
    Win 8
You could try:
  1. right click on Z: drive ->Properties->Security
  2. If there is a user: Everyone on the list, click edit and change permission to read or to read & execute only and List folder contents
 

My Computer

System One

  • OS
    8.1x64PWMC Ubuntu14.04x64 MintMate17x64
    Computer type
    PC/Desktop
    System Manufacturer/Model
    Home Brewed
    CPU
    I7 4970K OC'ed @4.7 GHz
    Motherboard
    MSI-Z97
    Memory
    16 GB G-Skill Trident X @2400MHZ
    Graphics Card(s)
    NVIDIA GeForce GTS 450
    Sound Card
    X-Fi Titanium Fatal1ty Professional Series
    Monitor(s) Displays
    Dual HP-W2408
    Screen Resolution
    1920X1200
    Hard Drives
    256 GB M2 sm951, (2) 500GB 850EVO, 5TB, 2 TB Seagate
    PSU
    Antec 850W
    Case
    Antec 1200
    Cooling
    Danger Den H20
    Keyboard
    Logitech
    Mouse
    Logitech Performance Mouse MX
    Internet Speed
    35/12mbps
    Browser
    Firefox
I'm still having problems.

PS: I learnt that, if the radio button "Only apply these permissions to objects and/or containers within this container" is checked then permissions will be applied only to current folders and subfolders and not to subsequently created folders and files. Hence I had left it unchecked.

I don't believe that is correct about subsequently created folders and files.

Folders and files inherit permissions from their parent unless overwritten by settings in a lower folder. It would make no sense to restrict settings and then ignore them during later operations. I have never seen that behavior.

The intent of the checkbox is to propagate the settings to all files and folder beneath the one you are in. You should check it and let it change all the settings. Depending on the number of files and folders, it may take awhile, but thank god it's a lot faster than it used to be.

Here's a couple of Microsoft TechNet pages on permissions:

Permissions for files and folders: User Rights; Security Policy; Security Services

Changing inherited permissions: User Rights; Security Policy; Security Services
 

My Computer

System One

  • OS
    Windows 8.1 Pro with Media Center
    Computer type
    PC/Desktop
    System Manufacturer/Model
    Self Built
    CPU
    Intel I-7 860
    Motherboard
    Asus P7B
    Memory
    8GB
    Graphics Card(s)
    Nvidia 580
    Monitor(s) Displays
    Acer (Primary), Asus (secondary), Sony TV (third)
    Screen Resolution
    1920 x 1080
    Hard Drives
    Kingston 128GB SSD Windows 8 Boot Drive
    WD Black 1 TB (2 ea)
    WD Red 3 TB
    WD Black 500GB
    Keyboard
    MS 1000
    Mouse
    MS Flip
    Internet Speed
    Verizon FIOS 35/35
    Browser
    IE 11, Google Chrome, Firefox, Opera, Safari
    Antivirus
    Windows 8 Defender (MS Security Essentials)
topgundcp:

Those permissions you have mentioned are present by default for every user. Then I singled out this user XXX, and added the 'deny' permissions which I have mentioned above. Still facing problems. Some files within the drive Z could still be deleted! :(
 

My Computer

System One

  • OS
    Win 8
Such a simple task has been made so painful by MS! :mad:

I wanted all my subfolders to inherit the same permissions. Hence, as described here 'To set, view, change, or remove special permissions for files and folders' I checked 'replace all child object permission entries with inheritable permission entries from this object'. Then windows started applying the permissions. While doing so it gave me an error message saying that 'Failed to enumerate objects in that container'. This was followed by 'Recycle bin is corrupt' message.

Now, I found that user XXX could still delete the files. But now, in addition the deleted files became unrecoverable!!! There was no option to undo delete!!!

Then I tried ticking: 'Only apply these permissions to objects and/or containers within this container' as per instructions from the same article.

This also produce the same results.

Pretty mad and frustrated. I'm going to delete the user altogether.

Anybody, is there no way to do this simple thing: "Having a user rights to view the files in a drive but deny rights to delete/modify/write files in the drive".

Will a guest user account able to do this?
OR
Is there any simple way to do this for a standard user account?

Please help! :cry:
 

My Computer

System One

  • OS
    Win 8
Frustrated with everything, I deleted the standard user XXX and am now using a guest account. The problem still persists though. Guest users are able to delete some files but not others.

Done with windows and its UAC! Phew!
 

My Computer

System One

  • OS
    Win 8
What directory are you trying to protect? If it is a user's default directory, like Documents, Pictures, Videos (you mentioned videos) under a user directory, you may be having additional problems because of that. Especially if you are trying to restrict the Public directories.

Can you give the exact pathname, like D:\Backup\Videos or whatever.
 

My Computer

System One

  • OS
    Windows 8.1 Pro with Media Center
    Computer type
    PC/Desktop
    System Manufacturer/Model
    Self Built
    CPU
    Intel I-7 860
    Motherboard
    Asus P7B
    Memory
    8GB
    Graphics Card(s)
    Nvidia 580
    Monitor(s) Displays
    Acer (Primary), Asus (secondary), Sony TV (third)
    Screen Resolution
    1920 x 1080
    Hard Drives
    Kingston 128GB SSD Windows 8 Boot Drive
    WD Black 1 TB (2 ea)
    WD Red 3 TB
    WD Black 500GB
    Keyboard
    MS 1000
    Mouse
    MS Flip
    Internet Speed
    Verizon FIOS 35/35
    Browser
    IE 11, Google Chrome, Firefox, Opera, Safari
    Antivirus
    Windows 8 Defender (MS Security Essentials)
It's not a user's directory. It's one of the partitions in my PC (not C drive). It's contents includes videos, pictures, documents, etc. each organized into a folder. E.g. D:\Pictures folder.
 

My Computer

System One

  • OS
    Win 8
Back
Top