SlideShare uma empresa Scribd logo
1 de 12
NTFS Security Manager
from
Vyapin Software Systems Private Limited

Managing permissions of
Users/Groups/Shares/Folders/Files

on Windows Servers
www.vyapin.com
NTFS Security Manager Highlights
• Set permissions in bulk for multiple accounts and folders
• Assign role based permissions in bulk on multiple accounts and
folders
• Secure your Shares, Folders and Files on servers & workstations
• Grant, revoke, modify and copy NTFS permissions across servers &
workstations in multiple domains
• Apply / revoke Central Access Policies (CAPs) on shares & folders
across servers & workstations in a domain
• Restore broken inheritance
• Restore administrative permissions
• Use conditions/rules to control how you grant, revoke, copy
permissions
• Replace existing set of permissions with a new set of permissions
• Perform a granular search of various types of permissions on
specific files and folders
Some of the important features of the
NTFS Security Manager
Grant permissions for multiple Accounts to your Files, Folders, and
Shares in your File servers using a rule-based assignment approach.
Highly effective in controlling different types of access
based on the different Organizational Roles for users and groups
Replace existing NTFS permissions for multiple accounts with a
completely new set of permissions
Remove permissions clutter accumulated over a period of time.
Remove Accounts completely along with all associated
permissions from the Files, Folders and Shares permissions list
Revoke central access policies from the Files, Folders and Shares.
You can revoke central access policies from shares only if the
selected central access policy is applied on the selected shares
Apply selected central access policy from domain to multiple Files,
Folders and Shares in a single operation to centrally manage shares in
a domain
Assign explicit permissions for multiple accounts with the option to
break or retain inheritance from the parent, following the standard
windows behavior of Copy or Remove when inheritance is broken
Copy permissions from a selected share to multiple shares in your file
servers using a rule-based assignment approach
Review all changes made to permissions using Change History
For more on the
NTFS Security Manager

visit
http://www.vyapin.com/products/ntfs-securitymanager/ntfs-permissions-management.htm

Mais conteúdo relacionado

Destaque

Say no to face wrinkles
Say no to face wrinklesSay no to face wrinkles
Say no to face wrinklesBellaplex
 
2015 Goodwill Community Impact Report - Printed
2015 Goodwill Community Impact Report - Printed2015 Goodwill Community Impact Report - Printed
2015 Goodwill Community Impact Report - PrintedKelly Marie Dudzinski
 
Phillips_Eurotransport Issue 5 2015
Phillips_Eurotransport Issue 5 2015Phillips_Eurotransport Issue 5 2015
Phillips_Eurotransport Issue 5 2015Nick Phillips
 
This Way Out Feb16
This Way Out Feb16This Way Out Feb16
This Way Out Feb16Sim Wie Boon
 
2016 Solar Business Opportunity
2016 Solar Business Opportunity2016 Solar Business Opportunity
2016 Solar Business OpportunityJohnMFreeborn
 
How to use your brand ambassador properly for events
How to use your brand ambassador properly for eventsHow to use your brand ambassador properly for events
How to use your brand ambassador properly for eventsSakar Mishra
 

Destaque (6)

Say no to face wrinkles
Say no to face wrinklesSay no to face wrinkles
Say no to face wrinkles
 
2015 Goodwill Community Impact Report - Printed
2015 Goodwill Community Impact Report - Printed2015 Goodwill Community Impact Report - Printed
2015 Goodwill Community Impact Report - Printed
 
Phillips_Eurotransport Issue 5 2015
Phillips_Eurotransport Issue 5 2015Phillips_Eurotransport Issue 5 2015
Phillips_Eurotransport Issue 5 2015
 
This Way Out Feb16
This Way Out Feb16This Way Out Feb16
This Way Out Feb16
 
2016 Solar Business Opportunity
2016 Solar Business Opportunity2016 Solar Business Opportunity
2016 Solar Business Opportunity
 
How to use your brand ambassador properly for events
How to use your brand ambassador properly for eventsHow to use your brand ambassador properly for events
How to use your brand ambassador properly for events
 

Semelhante a NTFS Security and Permissions Management Solution

2dvm kp 2.pptx
2dvm kp 2.pptx2dvm kp 2.pptx
2dvm kp 2.pptxnoorazuwa2
 
Itt operating systems unit 05 lesson 06
Itt operating systems unit 05 lesson 06Itt operating systems unit 05 lesson 06
Itt operating systems unit 05 lesson 06blusmurfydot1
 
IT109 Microsoft Operating Systems Unit 05 lesson 06
IT109 Microsoft Operating Systems Unit 05 lesson 06IT109 Microsoft Operating Systems Unit 05 lesson 06
IT109 Microsoft Operating Systems Unit 05 lesson 06blusmurfydot1
 
Chapter05 Managing File Access
Chapter05      Managing  File  AccessChapter05      Managing  File  Access
Chapter05 Managing File AccessRaja Waseem Akhtar
 
Using Adapters and Mediation to Integrate Systems 3.7
Using Adapters and Mediation to Integrate Systems 3.7Using Adapters and Mediation to Integrate Systems 3.7
Using Adapters and Mediation to Integrate Systems 3.7StephenKardian
 
Unit+six+ +windows+file+protections+and+monitoring
Unit+six+ +windows+file+protections+and+monitoringUnit+six+ +windows+file+protections+and+monitoring
Unit+six+ +windows+file+protections+and+monitoringErdo Deshiant Garnaby
 
Users and groups in xp
Users and groups in xpUsers and groups in xp
Users and groups in xpRauf Wani
 
Basics of IBM Tivoli Storage Manager
Basics of IBM Tivoli Storage ManagerBasics of IBM Tivoli Storage Manager
Basics of IBM Tivoli Storage Managerimagineers7
 
Cloud File System with GFS and HDFS
Cloud File System with GFS and HDFS  Cloud File System with GFS and HDFS
Cloud File System with GFS and HDFS Dr Neelesh Jain
 
PROACT SYNC 2013 - Breakout - CommVault OnePass Eén centrale interface voor s...
PROACT SYNC 2013 - Breakout - CommVault OnePass Eén centrale interface voor s...PROACT SYNC 2013 - Breakout - CommVault OnePass Eén centrale interface voor s...
PROACT SYNC 2013 - Breakout - CommVault OnePass Eén centrale interface voor s...Proact Netherlands B.V.
 
Ibmtsm 100325083335-phpapp01
Ibmtsm 100325083335-phpapp01Ibmtsm 100325083335-phpapp01
Ibmtsm 100325083335-phpapp01Andrew Adam
 

Semelhante a NTFS Security and Permissions Management Solution (20)

2dvm kp 2.pptx
2dvm kp 2.pptx2dvm kp 2.pptx
2dvm kp 2.pptx
 
NTFS Permissions Auditing and Reporting Solution
NTFS Permissions Auditing and Reporting SolutionNTFS Permissions Auditing and Reporting Solution
NTFS Permissions Auditing and Reporting Solution
 
G Mac Chapter05
G Mac Chapter05G Mac Chapter05
G Mac Chapter05
 
Itt operating systems unit 05 lesson 06
Itt operating systems unit 05 lesson 06Itt operating systems unit 05 lesson 06
Itt operating systems unit 05 lesson 06
 
IT109 Microsoft Operating Systems Unit 05 lesson 06
IT109 Microsoft Operating Systems Unit 05 lesson 06IT109 Microsoft Operating Systems Unit 05 lesson 06
IT109 Microsoft Operating Systems Unit 05 lesson 06
 
70-272 Chapter09
70-272 Chapter0970-272 Chapter09
70-272 Chapter09
 
70 640 Lesson08 Ppt 041009
70 640 Lesson08 Ppt 04100970 640 Lesson08 Ppt 041009
70 640 Lesson08 Ppt 041009
 
Rh413
Rh413Rh413
Rh413
 
06 File System
06 File System06 File System
06 File System
 
Chapter05 Managing File Access
Chapter05      Managing  File  AccessChapter05      Managing  File  Access
Chapter05 Managing File Access
 
Using Adapters and Mediation to Integrate Systems 3.7
Using Adapters and Mediation to Integrate Systems 3.7Using Adapters and Mediation to Integrate Systems 3.7
Using Adapters and Mediation to Integrate Systems 3.7
 
Unit+six+ +windows+file+protections+and+monitoring
Unit+six+ +windows+file+protections+and+monitoringUnit+six+ +windows+file+protections+and+monitoring
Unit+six+ +windows+file+protections+and+monitoring
 
Mcts chapter 6
Mcts chapter 6Mcts chapter 6
Mcts chapter 6
 
Users and groups in xp
Users and groups in xpUsers and groups in xp
Users and groups in xp
 
Basics of IBM Tivoli Storage Manager
Basics of IBM Tivoli Storage ManagerBasics of IBM Tivoli Storage Manager
Basics of IBM Tivoli Storage Manager
 
Virtualization session 8
Virtualization session 8Virtualization session 8
Virtualization session 8
 
Cloud File System with GFS and HDFS
Cloud File System with GFS and HDFS  Cloud File System with GFS and HDFS
Cloud File System with GFS and HDFS
 
PROACT SYNC 2013 - Breakout - CommVault OnePass Eén centrale interface voor s...
PROACT SYNC 2013 - Breakout - CommVault OnePass Eén centrale interface voor s...PROACT SYNC 2013 - Breakout - CommVault OnePass Eén centrale interface voor s...
PROACT SYNC 2013 - Breakout - CommVault OnePass Eén centrale interface voor s...
 
70 271 Stu Chap05
70 271 Stu Chap0570 271 Stu Chap05
70 271 Stu Chap05
 
Ibmtsm 100325083335-phpapp01
Ibmtsm 100325083335-phpapp01Ibmtsm 100325083335-phpapp01
Ibmtsm 100325083335-phpapp01
 

Mais de Vyapin Software Systems Private Limited

How to upgrade from SharePoint 2010 to SharePoint 2013 – a quick guide
How to upgrade from SharePoint 2010 to SharePoint 2013 – a quick guideHow to upgrade from SharePoint 2010 to SharePoint 2013 – a quick guide
How to upgrade from SharePoint 2010 to SharePoint 2013 – a quick guideVyapin Software Systems Private Limited
 

Mais de Vyapin Software Systems Private Limited (15)

How to Migrate from SharePoint to Office 365?
How to Migrate from SharePoint to Office 365?How to Migrate from SharePoint to Office 365?
How to Migrate from SharePoint to Office 365?
 
Office 365 Reporting and Licenses Management Tool
Office 365 Reporting and Licenses Management ToolOffice 365 Reporting and Licenses Management Tool
Office 365 Reporting and Licenses Management Tool
 
Hyper V - Audit & gather reports, improve functioning
Hyper V - Audit & gather reports, improve functioningHyper V - Audit & gather reports, improve functioning
Hyper V - Audit & gather reports, improve functioning
 
Monitoring changes to your Windows servers and systems
Monitoring changes to your Windows servers and systemsMonitoring changes to your Windows servers and systems
Monitoring changes to your Windows servers and systems
 
Import external data and files to SharePoint Lists & Libraries
Import external data and files to SharePoint Lists & LibrariesImport external data and files to SharePoint Lists & Libraries
Import external data and files to SharePoint Lists & Libraries
 
Classify Organize & Manage SharePoint Content
Classify Organize & Manage SharePoint ContentClassify Organize & Manage SharePoint Content
Classify Organize & Manage SharePoint Content
 
Active Directory Auditing and Reporting Tool
Active Directory Auditing and Reporting ToolActive Directory Auditing and Reporting Tool
Active Directory Auditing and Reporting Tool
 
SharePoint to File Share Migration Tool
SharePoint to File Share Migration ToolSharePoint to File Share Migration Tool
SharePoint to File Share Migration Tool
 
Microsoft Windows Network Auditing and Reporting Solution
Microsoft Windows Network Auditing and Reporting SolutionMicrosoft Windows Network Auditing and Reporting Solution
Microsoft Windows Network Auditing and Reporting Solution
 
SharePoint to SharePoint Migration Tool
SharePoint to SharePoint Migration ToolSharePoint to SharePoint Migration Tool
SharePoint to SharePoint Migration Tool
 
Tracking Active Directory Changes
Tracking Active Directory ChangesTracking Active Directory Changes
Tracking Active Directory Changes
 
File Share to SharePoint Migration solution
File Share to SharePoint Migration solutionFile Share to SharePoint Migration solution
File Share to SharePoint Migration solution
 
What’s new in SharePoint 2013
What’s new in SharePoint 2013What’s new in SharePoint 2013
What’s new in SharePoint 2013
 
How to upgrade from SharePoint 2010 to SharePoint 2013 – a quick guide
How to upgrade from SharePoint 2010 to SharePoint 2013 – a quick guideHow to upgrade from SharePoint 2010 to SharePoint 2013 – a quick guide
How to upgrade from SharePoint 2010 to SharePoint 2013 – a quick guide
 
Content classification & organization in SharePoint
Content classification & organization in SharePointContent classification & organization in SharePoint
Content classification & organization in SharePoint
 

Último

Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 

Último (20)

Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 

NTFS Security and Permissions Management Solution

  • 1. NTFS Security Manager from Vyapin Software Systems Private Limited Managing permissions of Users/Groups/Shares/Folders/Files on Windows Servers www.vyapin.com
  • 2. NTFS Security Manager Highlights • Set permissions in bulk for multiple accounts and folders • Assign role based permissions in bulk on multiple accounts and folders • Secure your Shares, Folders and Files on servers & workstations • Grant, revoke, modify and copy NTFS permissions across servers & workstations in multiple domains • Apply / revoke Central Access Policies (CAPs) on shares & folders across servers & workstations in a domain • Restore broken inheritance • Restore administrative permissions • Use conditions/rules to control how you grant, revoke, copy permissions • Replace existing set of permissions with a new set of permissions • Perform a granular search of various types of permissions on specific files and folders
  • 3. Some of the important features of the NTFS Security Manager
  • 4. Grant permissions for multiple Accounts to your Files, Folders, and Shares in your File servers using a rule-based assignment approach. Highly effective in controlling different types of access based on the different Organizational Roles for users and groups
  • 5. Replace existing NTFS permissions for multiple accounts with a completely new set of permissions
  • 6. Remove permissions clutter accumulated over a period of time. Remove Accounts completely along with all associated permissions from the Files, Folders and Shares permissions list
  • 7. Revoke central access policies from the Files, Folders and Shares. You can revoke central access policies from shares only if the selected central access policy is applied on the selected shares
  • 8. Apply selected central access policy from domain to multiple Files, Folders and Shares in a single operation to centrally manage shares in a domain
  • 9. Assign explicit permissions for multiple accounts with the option to break or retain inheritance from the parent, following the standard windows behavior of Copy or Remove when inheritance is broken
  • 10. Copy permissions from a selected share to multiple shares in your file servers using a rule-based assignment approach
  • 11. Review all changes made to permissions using Change History
  • 12. For more on the NTFS Security Manager visit http://www.vyapin.com/products/ntfs-securitymanager/ntfs-permissions-management.htm