Chapter 23. Accounts & Logging On

For years, teachers, parents, tech directors, and computer lab instructors struggled to answer two difficult questions: How do you rig one PC so several different people can use it throughout the day, without interfering with one another’s files and settings? And how do you protect a PC from getting fouled up by mischievous (or bumbling) students and employees?

Windows 7 was designed from the ground up to be a multiple-user operating system. Anyone who uses the computer must log on—click (or type) your name and type in a password—when the computer turns on. Upon doing so, you discover the Windows universe just as you left it, including these elements:

Behind the scenes, Windows stores all these files and settings in a single folder—your Personal folder, the one that bears your name. You can open it easily enough; it’s at the top right of the Start menu. (Technically, your Personal folder is in the Computer→Local Disk (C:)→Users folder.)

This feature makes sharing the PC much more convenient, because you don’t have to look at everybody else’s files (and endure their desktop design schemes). It also adds a layer of security, making it less likely that a marauding 6-year-old will throw away your files.

Since the day you installed Windows 7 or fired up a new Win7 machine, you may have made a number of changes to your desktop—fiddled with your Start menu, changed the desktop wallpaper, added some favorites to your Web browser, downloaded files onto your desktop, and so on—without realizing that you were actually making these changes only to your account.

Accordingly, if you create an account for a second person, then when she turns on the computer and signs in, she’ll find the desktop exactly the way it was as factory-installed by Microsoft: basic Start menu, standard desktop picture, default Web browser home page, and so on. She can make the same kinds of changes to the PC that you’ve made, but nothing she does will affect your environment the next time you log on.

In other words, the multiple-accounts feature has two benefits: first, the convenience of hiding everyone else’s junk; and second, security that protects both the PC’s system software and everyone’s work.

If you’re content simply to use Windows, that’s really all you need to know about accounts. If, on the other hand, you have shouldered some of the responsibility for administering Windows machines—if it’s your job to add and remove accounts, for example—read on.

Windows is designed to handle either of two different kinds of networks: workgroups (small, informal home or small-business networks) and domains (corporate networks, professionally and centrally administered).

This distinction becomes particularly important when it comes to user accounts.

This chapter tackles these two broad feature categories—the workgroup scenario and the domain scenario—one at a time.

This section is dedicated to computers in a workgroup network—or no network at all. Corporate networks (domains) are described later in this chapter.

To see what accounts are already on your PC, open the Start menu. Start typing accounts until you see User Accounts in the results list; click it. The User Accounts and Family Safety control panel opens (Figure 23-1).

What you see here depends on which kind of account you have: Administrator or Standard. Read on.

It’s important to understand the phrase that appears just under your name in the panel shown in Figure 23-2. On your own personal PC, the word “Administrator” probably appears here.

Because you’re the person who installed Windows 7, the PC assumes that you’re one of its administrators—the technical wizards who will be in charge of it. You’re the teacher, the parent, the resident guru. You’re the one who will maintain this PC and who will be permitted to make system-wide changes to it.

You’ll find settings all over Windows (and all over this book) that only people with Administrator accounts can change. For example, only an administrator is allowed to:

There’s another kind of account, too, for people who don’t have to make those kinds of changes: the Standard account.

Now, for years, people doled out Administrator accounts pretty freely. You know: The parents got Administrator accounts, the kids got Standard ones.

The trouble is, an Administrator account itself is a kind of security hole. Any time you’re logged in with this kind of account, any nasty software you may have caught from the Internet is also, in effect, logged in—and can make changes to important underlying settings on your PC, just the way a human administrator can.

Put another way: A virus you’ve downloaded will have a much harder time infecting the rest of the machine if you were running a Standard account than an Administrator account.

Today, therefore, Microsoft recommends that everyone use Standard accounts—even you, the wise master and owner of the computer!

So how are you supposed to make important Control Panel changes, install new programs, and so on?

That’s gotten a lot easier in Windows 7. Using a Standard account no longer means that you can’t make important changes. In fact, you can do just about everything on the PC that an Administrator account can—if you know the password of a true Administrator account.

Whenever you try to make a big change, you’re asked to authenticate yourself. As described on Authenticate Yourself: User Account Control, that means supplying an Administrator account’s password, even though you, the currently logged-in person, are a lowly Standard account holder.

If you have a Standard account because you’re a student, a child, or an employee, you’re supposed to call an administrator over to your PC to approve the change you’re making. (If you’re the PC’s owner, but you’re using a Standard account for security purposes, you know an administrator password, so it’s no big deal.)

Now, making broad changes to a PC when you’re an administrator still presents you with those “prove yourself worthy” authentication dialog boxes. The only difference is that you, the administrator, can click Continue to bypass them, rather than having to type in a password.

You’ll have to weigh this security/convenience tradeoff. But you’ve been warned: The least vulnerable PC is one where everyone uses Standard accounts.

All of this is a long-winded way of explaining why, when you open User Accounts, you may see one of two different things.

It’s easy to create a new account in the User Accounts panel: Click “Manage another account.” Authenticate yourself.

You arrive on the master list of accounts (Figure 23-2). If you’re new at this, there’s probably just one account listed here: yours. This is the account Windows created when you installed it.

If you see more than one account here—not just yours—then one of these situations probably applies:

  • You created them when you installed Windows 7, as described in Appendix A.

  • You bought a new computer with Windows 7 preinstalled and created several accounts when asked to do so the first time you turned on the machine.

  • You upgraded the machine from an earlier version of Windows, and Windows 7 gracefully imported all your existing accounts.

To add another one, click “Create a new account.” The next screen asks you to name the account and choose an account type: Administrator or Standard (Figure 23-3).

When you’re finished with the settings, click Create Account (or press Enter). After a moment, you return to the User Accounts screen, where the new person’s name joins whatever names were already there. You can continue adding new accounts forever or until your hard drive is full, whichever comes first.

Although the process of creating a new account is swift and simple, it doesn’t offer you much in the way of flexibility. You don’t even have a chance to specify the new person’s password, let alone the tiny picture that appears next to the person’s name and at the top of the Start menu (rubber ducky, flower, or whatever).

That’s why the next step in creating an account is usually editing the one you just set up. To do so, once you’ve returned to the main User Accounts screen (Figure 23-2), click the name or icon of the freshly created account. You arrive at the screen shown at the top in Figure 23-4, where—if you are an administrator—you can choose from any of these options:

You’re free to make any of these changes to any account at any time; you don’t have to do it immediately after creating the account.

As described above, Windows contains a handy hint mechanism for helping you recall your password if you’ve forgotten it.

But what if, having walked into a low-hanging branch, you’ve forgotten both your password and the correct interpretation of your hint? In that disastrous situation, your entire world of work and email would be locked inside the computer forever. (Yes, an administrator could issue you a new password—but as noted in the box on Passwords Within Passwords, you’d lose all your secondary passwords in the process.)

Fortunately, Windows offers a clever solution-in-advance: the Password Reset Disk. It’s a USB flash drive or a floppy disk (remember those?) that you can use like a physical key to unlock your account in the event of a forgotten password. The catch: You have to make this disk now, while you still remember your password.

To create this disk, insert a blank floppy or a USB flash drive. Then open the Start menu and click your picture (top right). The “Make changes to your user account” window opens (Figure 23-1).

The second link in the task pane says, “Create a password reset disk.” Click that to open the Forgotten Password Wizard shown in Figure 23-6. Click through it, supplying your current password when you’re asked for it. When you click Finish, remove the disk or flash drive. Label it, and don’t lose it!

When the day comes that you can’t remember your password, leave the Password box empty and hit Enter. You wind up back at the login screen; this time, in addition to your password hint, you see a link called “Reset password.” Insert your Password Reset floppy or flash drive and then click that link.

A Password Reset Wizard now helps you create a new password (and a new hint to remind you of it). You’re in.

Even though you now have a new password, your existing Password Reset Disk is still good. Keep it in a drawer somewhere for use the next time you experience a temporarily blank brain.

It happens—somebody graduates, somebody gets fired, somebody dumps you. Sooner or later, you may need to delete an account from your PC.

To delete a user account, open User Accounts, click the appropriate account name, and then click “Delete the account.”

Windows asks if you want to preserve the contents of this person’s Documents folder. If you click the Keep Files button, you find a new folder, named for the dearly departed, on your desktop. (As noted in the dialog box, only the documents, the contents of the desktop, and the Documents folder are preserved—but not programs, email, or even Web favorites.) If that person ever returns to your life, you can create a new account for him and copy these files into the appropriate folder locations.

If you click the Delete Files button, though, the documents are gone forever.

A few more important points about deleting accounts:

Believe it or not, Administrator and Standard aren’t the only kinds of accounts you can set up on your PC.

A third kind, called the Guest account, is ideal for situations where somebody is just visiting you for the day. Rather than create an entire account for this person, complete with password, hint, little picture, and so on, you can just switch on the Guest account.

To find the on/off switch, open the Start menu and type guest; click “Turn guest account on or off” in the results list. Authenticate yourself if necessary.

In the Manage Accounts window, click Guest, and then click Turn On.

Now, when the visitor tries to log in, she can choose Guest as the account. She can use the computer but can’t see anyone else’s files or make any changes to your settings.

When the visitor to your office is finally out of your hair, healthy paranoia suggests that you turn off the Guest account once again. (To do so, follow precisely the same steps, except click “Turn off the guest account” in the final step.)

You can’t work in Windows 7 very long before encountering the dialog box shown in Figure 23-7. It appears any time you install a new program or try to change an important setting on your PC. (Throughout Windows, a colorful icon next to a button or link indicates a change that will produce this message box.)

Clearly, Microsoft chose the name User Account Control (UAC) to put a positive spin on a fairly intrusive security feature; calling it the IYW (Interrupt Your Work) box probably wouldn’t have sounded like so much fun.

Why do these boxes pop up? In the olden days, nasties like spyware and viruses could install themselves invisibly, behind your back. That’s because Windows ran in Administrative mode all the time, meaning it left the door open for anyone and anything to make important changes to your PC. Unfortunately, that included viruses.

Windows 7, on the other hand, runs in Standard mode all the time. Whenever somebody or some program wants to make a big change to your system—something that ought to have the permission of an administrator (Administrator vs. Standard Accounts)—the UAC box alerts you. If you click Continue, Windows elevates (opens) the program’s permissions settings just long enough to make the change.

Most of the time, you are the one making the changes, which can make the UAC box a bit annoying. But if that UAC dialog box ever appears by itself, you’ll know something evil is afoot on your PC, and you’ll have the chance to shut it down.

How you get past the UAC box—how you authenticate yourself—depends on the kind of account you have:

Questions? Yes, you in the back?

When your computer is a member of a corporate domain, the controls you use to create and manage user accounts are quite a bit different.

In this case, when you choose Start→Control Panel, you see a category called “User Accounts” instead of “User Accounts and Family Safety.” And the option called “Add or remove user accounts” on a workgroup PC is now called “Give other users access to this computer.”

When you click that option, you see the dialog box shown in Figure 23-8. The layout is different, but the idea is the same: You can see all the accounts on the computer.

This dialog box lets you create local accounts—accounts stored only on your computer, and not on the corporate domain machine—for existing citizens of the domain.

Why would you need a local account, if all your files and settings are actually stored elsewhere on the network? Because certain tasks, like installing drivers for new hardware, require you to log on using a local Administrator account.

When you click the Add button (Figure 23-8), an Add New User Wizard appears. It lets you specify the person’s name and the name of the domain that already stores his account. (You can also click the Browse button to search your domain for a specific person.)

When you click Next, the wizard prompts you to specify what level of access you want to grant this person. You have three choices:

  • Standard user. This person will be allowed to change certain system settings and install programs that don’t affect Windows settings for other users.

  • Administrator. This person gets the same privileges as a local administrative user.

  • Other. If you choose this option, you’ll be allowed to specify what local group this person belongs to, as described later in this chapter.

Once the account you selected appears in the User Accounts list, that person is now ready to log into your PC using the local account.

The control panels you’ve read about so far in this chapter are designed for simplicity and convenience, but not for power. Windows offers a second way to create, edit, and delete accounts: an alternative window that, depending on your taste for technical sophistication, is either intimidating and technical or liberating and flexible.

It’s called the Local Users and Groups console.

The quickest way to open up the Local Users and Groups window is to press +R to open the Run dialog box, type out Lusrmgr.msc, and authenticate yourself if necessary. (Microsoft swears that “Lusrmgr.msc” is not short for “loser manager,” even though network administrators might hear that in their heads.)

The Local Users and Groups console appears, as shown in Figure 23-9.

In this console, you have complete control over the local accounts (and groups, as described in a moment) on your computer. This is the real, raw, unshielded command center, intended for power users who aren’t easily frightened.

The truth is, you probably won’t use these controls much on a domain computer. After all, most people’s accounts live on the domain computer, not the local machine. You might occasionally have to log in using the local Administrator account to perform system maintenance and upgrade tasks, but you’ll rarely have to create new accounts.

Workgroup computers (on a small network) are another story. Remember that you’ll have to create a new account for each person who might want to use this computer—or even to access its files from across the network. If you use the Local Users and Groups console to create and edit these accounts, you have much more control over the new account holder’s freedom than you do with the User Accounts control panel.

To create a new account in the Local Users and Groups console, start by double-clicking the Users folder in the middle of the window. It opens to show you a list of the accounts already on the machine. It includes not only the accounts you created during the Win7 installation (and thereafter), but also the Guest and secret Administrator accounts described earlier in this chapter.

To create a new account, choose Action→New User. In the New User dialog box (Figure 23-10), type a name for the account, the person’s full name, and, if you like, a description. (The description can be anything you like, although Microsoft no doubt has in mind “Shipping manager” rather than “Short and balding.”)

In the Password and Confirm Password text boxes, specify the password your new colleague will need to access the account. Its complexity and length are up to your innate sense of paranoia.

If you turn off the “User must change password at next logon” checkbox, then you can turn on options like these:

When you click the Create button, you add the new account to the console, and you make the dialog box blank again, ready for you to create another new account, if necessary. When you’re finished creating accounts, click Close to return to the main console window.

As you may have guessed from its name, you can also use the Local Users and Groups window to create groups—named collections of account holders.

Suppose you work for a small company that uses a workgroup network. You want to be able to share various files on your computer with certain other people on the network. You’d like to be able to permit them to access some folders but not others. Smooth network operator that you are, you solve this problem by assigning permissions to the appropriate files and folders.

In fact, you can specify different access permissions to each file for each person. But if you had to set up these access privileges manually for every file on your hard drive, for every account holder on the network, you’d go out of your mind.

That’s where groups come in. You can create one group—called Trusted Comrades, for example—and fill it with the names of every account holder who should be allowed to access your files. Thereafter, it’s a piece of cake to give everybody in that group access to a certain folder, in one swift step. You end up having to create only one permission assignment for each file, instead of one for each person for each file.

Furthermore, if a new employee joins the company, you can simply add her to the group. Instantly, she has exactly the right access to the right files and folders, without your having to do any additional work.

You may have noticed that even the first time you opened the Users and Groups window, a few group names appeared there already. That’s because Windows comes with a canned list of ready-made groups that Microsoft hopes will save you some time.

For example, when you use the User Accounts control panel program to set up a new account, Windows automatically places that person into the Standard or Administrators group, depending on whether or not you made him an administrator (Administrator vs. Standard Accounts). In fact, that’s how Windows knows what powers and freedom this person is supposed to have.

Here are some of the built-in groups on a Windows 7 computer:

In addition to these basic groups, there are some special-purpose groups like Backup Operators, Replicator, Cryptographic Operators, Event Log Readers, and so on. These are all groups with specialized privileges, designed for high-end network administration. You can double-click one (or widen its Description column) to read all about it.

Suppose you’re signed in and you’ve got things just the way you like them. You have 11 programs open in carefully arranged windows, your Web browser is downloading some gigantic file, and you’re composing an important speech in Microsoft Word. Now Robin, a coworker/family member/fellow student, wants to duck in to do a quick email check.

In the old days, you might have rewarded Robin with eye-rolling and heavy sighs, or worse. If you chose to accommodate the request, you would have had to shut down your whole ecosystem—interrupting the download, closing your windows, saving your work, and exiting your programs. You would have had to log off completely.

Thanks to Fast User Switching, however, none of that is necessary. All you have to do is press the magic keystroke, +L (which locks the screen), and then click Switch User. (Maybe it’s more direct to just choose Start→“Shut down”→“Switch user.”)

Now the list of accounts appears (Figure 23-13), ready for the next person to sign in.

The words “Logged on” beneath your name indicate that you haven’t actually logged off. Instead, Windows has memorized the state of affairs in your account—complete with all open windows, documents, and programs—and shoved it into the background.

Robin can now click the Robin button to sign in normally, do a little work, or look something up. When Robin logs out, the accounts screen comes back once again, at which point you can log on again. Without having to wait more than a couple of seconds, you find yourself exactly where you began, with all your programs and documents still open and running—an enormous timesaver.

When it comes to the screens you encounter when you log onto a Windows computer, your mileage may vary. What you see depends on how your PC has been set up. For example:

This is what people on standalone or workgroup computers see most of the time (Figure 23-13).

To sign in, click your account name in the list. If no password is required for your account, you proceed to your Windows desktop with no further interruption.

If there is a password associated with your account, you see a place for it. Type your password and then press Enter (or click the blue arrow button).

There’s no limit to the number of times you can try to type in a password. With each incorrect guess, you’re told, “The user name or password is incorrect,” and an OK button appears to let you try again. The second time you try, your password hint appears, too (Editing an Account).

If you’re the only account holder, and you’ve set up no password for yourself, you can cruise all the way to the desktop without any stops. The setup steps appear in the box on The Secret, Fully Automatic Logon Trick

This password-free scenario, of course, is not very secure; any evildoer who walks by your machine when you’re in the bathroom has complete access to all your files (and protected Web sites). But if you work in a home office, for example, where the threat of privacy invasion isn’t very great, it’s by far the most convenient arrangement.

You or your friendly network geek has added your PC to a domain while installing Windows 7 and activated the “Require Users to Press Ctrl-Alt-Delete” option. This is the most secure configuration, and also the least convenient.

Tip

Even when you’re looking at the standard, friendly Accounts screen (Figure 23-13), you can switch to the older, Classic logon screen: Just press Ctrl+Alt+Delete. (If you’re having trouble making it work, try pressing down the Alt key before the other ones.)

You may be used to using the Ctrl+Alt+Delete keystroke for summoning the box where you can open the Task Manager or lock your computer; but at the Accounts screen, it means something else entirely.

As you’ve read earlier in this chapter, every document, icon, and preference setting related to your account resides in a single folder: By default, it’s the one bearing your name in the Local Disk (C:)→Users folder. This folder’s friendly name is your Personal folder, but to network geeks, it’s known as your user profile.

Each account holder has a user profile. But your PC also has a couple of profiles that aren’t linked to human beings’ accounts.

Have you ever noticed, for example, that not everything you actually see in your Start menu and on your desktop is, in fact, in your user profile folder?

Part of the solution to this mystery is the Public profile, which also lurks in the Users folder (Figure 23-14). As you can probably tell by its name, this folder stores many of the same kinds of settings your profile folder does—except that anything in (C:)→Users→Public→Desktop appears on everybody’s desktop.

All of this is a long-winded way of suggesting another way to make some icon available to everybody with an account on your machine. Drag it into the Desktop folder in the Public profile folder.

But if you’re wondering where the common Start menu items are, you’ll have to look somewhere else. If you’re prowling around your hard drive, you’ll find them in (C:)→ProgramData→Microsoft→Windows→Start Menu. But the ProgramData folder is ordinarily hidden, so here’s a faster way: Open the Start menu, right-click All Programs, and then choose Open All Users.

These locations also offer a handy solution to the “Whose software is it, anyway?” conundrum, the burning question of whose Start menu and desktop reflect new software that you’ve installed using your own account.

As noted in Chapter 6, some software installers ask if you’d like the new program to show up only in your Start menu, or in everybody’s Start menu. But not every installer is this thoughtful. Some installers automatically deposit their new software into the ProgramData and Public folders, thereby making its Start menu and desktop icons available to everybody when they log on.

On the other hand, some installers may deposit a new software program only into your account (or that of whoever is logged in at the moment). In that case, other account holders won’t be able to use the program at all, even if they know it’s been installed, because their own Start Menu and Desktop folders won’t reflect the installation. Worse, some people, not seeing the program’s name on their Start menus, might not realize that you’ve already installed it—and may well install it again.

One possible solution is to open the Start Menu→Programs folder in your user profile folder (open the Start menu, right-click All Programs, and choose Open). Copy the newly installed icon, and then paste it into the “everybody” profile folder (open the Start menu, right-click All Programs, and then choose Open All Users.)

Repeat with the Desktop folder, if you’d like everyone to see a desktop icon for the new program. To open the shared desktop folder, open (C:)→Users→Public→Desktop. (You’ll have to make the Desktop folder visible first—see “Show hidden files, folders, and drives” on The “Folder Options” Options—and then make it invisible again afterward.) You’ve just made that software available and visible to everybody who logs onto the computer.

There’s one final aspect of user accounts that’s worth mentioning: NTFS permissions, a technology that’s a core part of Windows 7’s security system. Using this feature, you can specify exactly which coworkers are allowed to open which files and folders on your machine. In fact, you can also specify how much access each person has. You can dictate, for example, that Gomez and Morticia aren’t allowed to open your Fourth-Quarter Projections spreadsheet at all, that Fred and Ginger can open it but not make changes, and George and Gracie can both open it and make changes.

Your colleagues will encounter the permissions you’ve set up like this in two different situations: when tapping into your machine from across the network, or when sitting down at it and logging in using their own names and passwords. In either case, the NTFS permissions you set up protect your files and folders equally well.

Using NTFS permissions is most decidedly a power-user technique because of the added complexity it introduces. Entire books have been written on the topic of NTFS permissions alone.

You’ve been warned.

To change the permissions for an NTFS file or folder, you open its Properties dialog box by right-clicking its icon and then choosing Properties from the shortcut menu. Click the Security tab (Figure 23-15).

The top of the Security tab lists the people and groups that have been granted or denied permissions to the selected file or folder. When you click a name in the list, the Permissions box at the bottom of the dialog box shows you how much access that person or group has.

The first step in assigning permissions, then, is to click Edit. You see an editable version of the dialog box shown in Figure 23-15.

If the person or group isn’t listed, click the Add button to display the Select Users or Groups dialog box, where you can type them in (Figure 23-16).

Once you’ve added the users and groups you need to the list on the Security tab, you can highlight each one and set permissions for it. You do that by turning on the Allow or Deny checkboxes at the bottom half of the dialog box.

The different degrees of freedom break down as follows (they’re listed here from least to most control, even though that’s not how they’re listed in the dialog box):

Of course, turning on Allow grants that level of freedom to the specified user or group, and turning it off takes away that freedom. (For details on the Deny checkbox, see the box on the facing page.)

Once you understand the concept of permissions, and you’ve enjoyed a thorough shudder contemplating the complexity of a network administrator’s job (six levels of permissions x thousands of files x thousands of employees = way too many permutations), one other mystery of Windows will fully snap into focus: the purpose of groups, introduced on Groups.

On those pages, you can read about groups as canned categories, complete with predefined powers over the PC, into which you can put different individuals to save yourself the time of adjusting their permissions and privileges individually. As it turns out, each of the ready-made groups also comes with predefined permissions over the files and folders on your hard drive.

Here, for example, is how the system grants permissions to the items in your Windows folder for the Users and Administrators groups:

 

Users

Administrators

Full control

 

X

Modify

 

X

Read & Execute

X

X

List folder contents

X

X

Read

X

X

Write

 

X

If you belong to the Users group, you have the List Folder Contents permission, which means you can see what’s in the Windows folder; the Read permission, which means you can open up anything you find inside; and the Read & Execute permission, which means you can run programs in that folder (which is essential for Windows itself to run). But people in the Users group aren’t allowed to change or delete anything in the Windows folder, or to put anything else inside. Windows is protecting itself against the mischievous and the clueless.

Members of the Administrators group have all those abilities and more—they also have Modify and Write permissions, which let them add new files and folders to the Windows folder (so that, for example, they can install a new software program on the machine).

If you successfully absorbed all this information about permissions, one thing should be clear: People in the Administrators group ought to be able to change or delete any file in your Windows folder. After all, they have the Modify permission, which ought to give them that power.

In fact, they can move or delete anything in any folder in the Windows folder, because the first cardinal rule of NTFS permissions is this:

Now suppose your sister has given you the Read and List Folder Contents permissions to her Documents folder—a “look, but don’t touch” policy. Thanks to the first cardinal rule, you automatically get the same permissions to every file and folder inside Documents.

Suppose one of these inner folders is called Grocery Lists. If she grants you the Modify and Write permissions to the Grocery Lists folder so you can add items to the shopping list, you end up having Read, Modify, and Write permissions for every file in that folder. Those files have accumulated permissions—they got the Read permission from Documents, and the Modify and Write permissions from the Grocery Lists folder.

Because these layers of inherited permissions can get dizzyingly complex, Microsoft has prepared for you a little cheat sheet, a dialog box that tells you the bottom line, the net result—the effective permissions. To see it, follow these steps: