There are two kinds of permission settings for file share permissions, which can be used flexibly in domain control as long as you understand the two permissions settings.
The first is network share Permissions
Share permissions are the means by which a user accesses a shared folder over the network, and the shared permissions are valid only when the user is accessed over the network, and the local user is not restricted by this permission.
The settings for sharing permissions are much simpler than NTFS permissions (security permissions), with only three sharing permissions: Full Control, change, read.
When users access folders directly over the network, they are not constrained by NTFS permissions (security permissions) and are restricted only by shared permissions.
The second type is NTFS permissions
NTFS permissions (security permissions) are a means of restricting local user folders, and NTFS permissions (security permissions) are valid only when the user is accessed locally, and the network share user is not restricted by this permission.
NTFS permissions (security permissions) are more complex than shared permissions, and NTFS permissions (security permissions) are six: Full Control, modify, Read and Execute, List Folder contents, read, write, special permissions.
When a user accesses a folder directly from the local computer, it is not constrained by the share permissions, but only by NTFS permissions (security permissions).
In the above permission process, as long as you grasp these three points to note:
One, the user through the Network Access folder sharing effective permissions for sharing permissions and the intersection of NTFS permissions, that is, share permissions all three kinds of permissions all tick (Full control, change, read), and then set the NTFS permissions is the effective sharing permissions.
Second, remove the users and Creator owner groups that exist by default in the shared Folder security permissions (this group may appear in the win server system), or many unplanned users may get some unexpected permissions from that group.
Third, if you want subfolders to not inherit the permissions of the parent folder, You can change permissions in the subfolders right-click Property---Security---High group------Select the user or group---include the permissions that can be inherited from the object's parent option to remove---Select Add---Delete the permissions for the user or group that the parent folder inherits from in the permission entries list.
Windows Server network share permissions settings