I think you are going to run into issues until the users log off and back on. What's going to happen is that the files that have already been accessed and in use won't need to be checked again, but new files will. The new files will have a different security descriptor than it did before and it won't align with the users current access token until they log off and back on. this might shed some light on the issue:
http://technet.microsoft.com/en-us/library/cc759267(WS.10).aspx How big is the user base? I would make sure that there is very clear communication, and time, before doing this. YMMV Chris Bodnar, MCSE Systems Engineer Distributed Systems Service Delivery - Intel Services Guardian Life Insurance Company of America Email: christopher_bod...@glic.com Phone: 610-807-6459 Fax: 610-807-6003 From: Todd Lemmiksoo <tlemmik...@gmail.com> To: "NT System Admin Issues" <ntsysadmin@lyris.sunbelt-software.com> Date: 12/27/2010 10:32 AM Subject: Share permissions question I am planning on making changes to a network file share that will impact a set of health users. I will be removing inherited permissions and assigning group permissions to the share and child folders. My question is .....will the users have to logout and login to get access back after the changes are applied? I am not sure if the security token assigned to the users before the change will still be good. As the security permissions will not change for the users access to the share and child folders. The change is to assign access by group instead of individual user ID. -- T. Todd Lemmiksoo ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin ----------------------------------------- This message, and any attachments to it, may contain information that is privileged, confidential, and exempt from disclosure under applicable law. If the reader of this message is not the intended recipient, you are notified that any use, dissemination, distribution, copying, or communication of this message is strictly prohibited. If you have received this message in error, please notify the sender immediately by return e-mail and delete the message and any attachments. Thank you. ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin