Problem solve Get help with specific problems with your technologies, process and projects.

The NTFS volume and permissions

A trick to allow NTFS conversion from FAT32 in an already installed Win2K environment.

The NTFS volume and permissions
Adesh Rampat

Whether implementing Windows 2000 peer to peer networking or applying additional security permissions to files/folders on a Standalone PC the NTFS volume is always the best approach to use for the implementation of additional security permissions. In most cases, the NTFS volume is already created on personal computers with Windows 2000 pre-installed.

However, when upgrading from Windows 98 to Windows 2000 many users can easily bypass the option of converting FAT32 volumes to NTFS. Doing so may prevent you from applying security permissions to files and folders.

The good news is that a FAT32 volume can be easily converted to a NTFS volume without reinstalling Windows 2000.

The following procedure shows how this is done:

At the command line type

    convert "drive_letter": /fs:ntfs      For example convert c: /fs:ntfs

When this is done the administrator can grant additional security permissions to a user. Apart from security permissions, the user can get additional benefits such as disk quotas for home folders stored on the drive.

Adesh Rampat has 10 years experience with network and IT administration. He is a member of the Association of Internet Professionals, the Institute for Network Professionals and the International Webmasters Association. He has also lectured extensively on a variety of topics.

Whether you loved it or hated it, why not let us know? E-mail us to sound off.

Related Book

Windows 2000 Security Handbook
Author : Tom Sheldon and Phil Cox
Publisher : McGraw-Hill
Published : Dec 2000
Summary :
Deploy and administer bullet-proof Windows 2000 security policies. This book explains how to safeguard intranet, Internet, and e-commerce transactions with IPSec, defend against hacking, spoofing, sniffing, and DDS attacks, and secure your network with firewalls, proxy servers, and VPNs.

Dig Deeper on Windows systems and network management

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.