Most people are familiar with the concept of “oversharing” in social settings (i.e. While you don’t want too much information about your private life, it is important to be cautious about what you share with Windows Server. What does this mean? It’s a joke, but it makes sense when you think about creating a Windows Share without enough permissions.
It shouldn’t surprise that some people are still unsure how to manage share permissions and NTFS permissions. Window Server permissions can be set in a few simple steps. These can be used to prevent permissions from becoming too complicated or messy, while still ensuring security.

A Brief History of Windows Server Permissions
Let’s start by looking at the source of permissions for sharing. At the time of Windows networking, sharing and storage, there were no permissions for NTFS. FAT16 was the file format. The file system didn’t have any underlying permissions. Only permissions on the share, the entry point that allows access to the content, could be granted.
NTFS permissions were first introduced with the NTFS Filesystem, which was introduced with Windows NT 3.1. However, not all users adopted NTFS immediately. Some prefer the FAT or HPFS file system, which are more compatible with older systems. NTFS was finally established in 1996 with the release of Windows NT 4.0.

What are NTFS Permissions? How do they work?
NTFS permissions allow you to have granular access to Microsoft Windows NT and later operating systems files. They allow users to access data at multiple levels. They allow access to specific users at the Windows Logon page, regardless if they are located in a different location or using a network. You can assign permissions to NTFS:
You have complete control. You have full control. Users have full control over files and directories. Users can also change the permissions of files or directories. They can grant permission to others, or take control over files and directories.
Modify. View and modify files as well as their properties. They can view and modify files. They can also add or remove properties. They cannot grant permissions to other users.
Read and execute. Users can read and execute executables as well as scripts. However, they cannot modify files or their properties.
You can list the contents and folders. Users can view, list, and execute files. This permission cannot be inherited by folders.
Read. Read.
Write. Write.

Limitations on Share Permissions
The share permission structure is subject to many limitations.
It has only three levels of control.
Read. Users can view, modify, and read files and directories. They can also run executables.
Change. Users have all permissions, including the ability modify files and folders, create and delete files, and to change them.
Full Control. This is the same as NTFS Full Control. Users can add, move, delete, modify, and modify files and directories. They can also modify properties and set permissions.

Share permissions don’t allow for granular control. Once permissions are granted to a share they will apply files, folders, and sub-folders that are below the point. Without creating another share, you cannot be more specific or less.

What about the Authenticated Users Group?
Another issue is the “Everyone account”. From Windows NT 3.1 to Windows NT 4.0, the Guest account was automatically enabled. Even guests had the same access rights that authenticated users in everyone group. Windows 2000 offers the Guest option.