Compare Options, Security

<< Click to Display Table of Contents >>

Navigation:  Using SyncBackPro > Expert Mode >

Compare Options, Security

 

File and folder security can be copied and compared. File system security can only be used with NTFS and ReFS file systems. It cannot be used with FTP, the cloud, etc.

 

To only copy the security when a file or folder is copied or created then enable the option Copy sub-directory and file security permissions on the Copy/Delete->Folders settings page and disable the option Compare file and folder security. If Backup read/write file copying or Windows File Explorer method of file copying is being used then all the security settings for files and folders will be copied regardless of the settings below.

 

To detect changes to the security of files and folders enable the option Compare file and folder security. When a file or folders security is changed, SyncBackPro will copy the security settings to the opposite file or folder. Which file or folders security is copied depends upon the "What to do if the properties or the case of the directories are different" setting on the Decision - Folders page. For an Intelligent Synchronization profile which security settings are copied depends upon the "What to do if..." setting.

 

Compare file and folder security: If enabled then file and folder security is compared to detect changes. This option can only be enabled if the option Copy sub-directory and file security permissions on the Copy/Delete->Folders settings page is also enabled, i.e. you cannot compare security if you're not also copying the security.

 

The following check-boxes define what security is copied and compared:

 

Owner: The owner of the file or folder.

 

Primary Group: The primary group of the file or folder.

 

Discretionary Access Control List (DACL): The discretionary access control list identifies the trustees that are allowed or denied access to a securable object.

 

System Access Control List (SACL): The system access control list enables administrators to log attempts to access a secured object. It is recommended that you leave this unchecked.

 

 

All Content: 2BrightSparks Pte Ltd © 2003-2024