Hi rightSpace Support,
Here is a check list to work through, it was written by AI so I hope it helps.
- NTFS Permissions
[ ] Right-click folder → Properties → Security tab → Confirm user/group has Write or Modify.
[ ] Use icacls
or Get-Acl
to audit permissions:
powershell
icacls "D:\SharedFolder"
Get-Acl "D:\SharedFolder" | Format-List
[ ] Check for Deny entries or inherited restrictions.
[ ] Confirm group membership propagation (logoff/logon or klist purge
).
🌐 2. Share Permissions
[ ] Right-click folder → Properties → Sharing tab → Advanced Sharing → Permissions.
[ ] Ensure “Everyone” or specific users/groups have Change or Full Control.
[ ] Avoid relying solely on “Everyone”—use domain groups if possible.
🧠 3. Effective Access
[ ] Use Advanced Security Settings → Effective Access tab to simulate user access.
[ ] Confirm actual permissions match expectations.
🔄 4. SMB Protocol & Session Info
[ ] Check SMB dialect negotiation:
powershell
Get-SmbSession | Select ClientComputerName, Dialect
[ ] Confirm SMB1 is disabled (unless legacy clients require it):
powershell
Get-SmbServerConfiguration | Select EnableSMB1Protocol
[ ] Ensure SMB signing/encryption policies aren’t interfering.
🔑 5. Credential Conflicts
[ ] Confirm remote user is authenticating with correct domain account.
[ ] Use net use
to inspect active connections and credentials.
[ ] Clear stale mappings:
cmd
net use * /delete
🧱 6. Firewall & Network Restrictions
[ ] Ensure TCP ports 445 and 139 are open between client and server.
[ ] Check Windows Defender Firewall rules for File and Printer Sharing.
🛡️ 7. Antivirus / Endpoint Protection
[ ] Review logs for blocked write attempts.
[ ] Temporarily disable protection to test write access.
🧭 8. Group Policy & Security Settings
[ ] Audit GPOs that affect network shares, SMB, or user rights.
[ ] Check for lockdown policies or restricted access tokens.
🧪 9. Test from Alternate Client
[ ] Try accessing the share from a different machine or user account.
- [ ] Compare behavior to isolate client-side vs server-side issues. 1. NTFS Permissions
- [ ] Right-click folder → Properties → Security tab → Confirm user/group has Write or Modify.
- [ ] Use
icacls
orGet-Acl
to audit permissions: powershellicacls "D:\SharedFolder"
Get-Acl "D:\SharedFolder" | Format-List ```
- [ ] Check for Deny entries or inherited restrictions.
- [ ] Confirm group membership propagation (logoff/logon or
klist purge
).
🌐 2. Share Permissions
- [ ] Right-click folder → Properties → Sharing tab → Advanced Sharing → Permissions.
- [ ] Ensure “Everyone” or specific users/groups have Change or Full Control.
- [ ] Avoid relying solely on “Everyone”—use domain groups if possible.
🧠 3. Effective Access
- [ ] Use Advanced Security Settings → Effective Access tab to simulate user access.
- [ ] Confirm actual permissions match expectations.
🔄 4. SMB Protocol & Session Info
- [ ] Check SMB dialect negotiation: powershell
Get-SmbSession | Select ClientComputerName, Dialect
- [ ] Confirm SMB1 is disabled (unless legacy clients require it): powershell
Get-SmbServerConfiguration | Select EnableSMB1Protocol
- [ ] Ensure SMB signing/encryption policies aren’t interfering.
🔑 5. Credential Conflicts
- [ ] Confirm remote user is authenticating with correct domain account.
- [ ] Use
net use
to inspect active connections and credentials. - [ ] Clear stale mappings: cmd
net use * /delete
🧱 6. Firewall & Network Restrictions
- [ ] Ensure TCP ports 445 and 139 are open between client and server.
- [ ] Check Windows Defender Firewall rules for File and Printer Sharing.
🛡️ 7. Antivirus / Endpoint Protection
- [ ] Review logs for blocked write attempts.
- [ ] Temporarily disable protection to test write access.
🧭 8. Group Policy & Security Settings
- [ ] Audit GPOs that affect network shares, SMB, or user rights.
- [ ] Check for lockdown policies or restricted access tokens.
🧪 9. Test from Alternate Client
- [ ] Try accessing the share from a different machine or user account.
- [ ] Compare behavior to isolate client-side vs server-side issues.