Understanding Effective Permissions
2 minute read
Introduction
In complex IT environments, it’s not enough to know which permissions are directly assigned or inherited — what really matters is what is effectively applied. Docusnap365 determines a user’s effective permissions by compiling and evaluating all relevant influencing factors.
What Are Effective Permissions?
A user’s or group’s effective permissions result from a combination of several layers:
Share Permissions
- Control access to network shares (
\\server\share
) - Act as a limit: NTFS full control has no effect if the share only allows “Read”
- Control access to network shares (
NTFS Permissions
- Directly assigned (explicit) rights on a folder or file
- Inherited rights from parent objects
Group Memberships
- Fully resolves direct and nested group memberships
- Includes Foreign Security Principals, if resolvable
Inheritance Context
- Whether and how permissions are passed down or broken
- Combined with inheritable permissions (e.g., “This folder only,” “Folder, subfolders and files”)
Docusnap365 evaluates all these layers and calculates the actual impact — per principal and per directory level.
What Is Considered?
Included in the calculation:
- NTFS ACLs including explicit and inherited rights
- Groups and nested group memberships
- Inheritance information (including disabled inheritance)
- Share permissions
- Resolved SIDs (including Foreign Security Principals if AD data is available)
- Validity of users (e.g., disabled accounts)
Example: Different Origins, Same Effect
A user can gain the same effective rights through multiple paths:
- Direct NTFS permission (“Modify”) on a folder
- Membership in an AD group that inherits “Modify”
- Combination of “Read” via NTFS + “Write” via share
Docusnap365 calculates an effective overall right from these paths and displays it in tabular form — currently without tracing where exactly the right originated.
Note: The detailed origin of a permission — that is, the exact source of an individual right — will be added in a future release. This will reveal whether a permission originates from an AD group, inheritance, or an explicit ACL entry.
The goal is not only to present the current state — but also to provide transparent tracing of how and from where a specific permission is derived.