Select File Server; then click Next.

⻬ You can remove a permission by selecting the permission and then click- ing Remove. ⻬ If you’d rather not fuss with the File Server Manager, you can set the per- missions from My Computer. Right-click the shared folder, and choose Sharing and Security; then click Permissions. You can then follow the preceding procedure, picking up at Step 3. ⻬ The permissions assigned in this procedure apply only to the share itself. The underlying folder can also have permissions assigned to it. If that’s the case, whichever of the restrictions is more restrictive will always apply. For example, if the Share Permissions grant a user Full Control per- mission, but the folder permission grants the user only Read permission, the user will be given Read permission for the folder. Troubleshooting Windows Server 2003 is extremely reliable. Get it configured right in the first place, and it’ll chug along without incident. That is, at least until something goes wrong. Which is inevitable. The following sections present a couple of Windows tools you can use to help pin down and fix trouble when it shows up. Using the Event Viewer Windows has a built-in event-tracking feature that automatically logs a variety of interesting system events. Usually, when something goes wrong with your server, you can find at least one and maybe dozens — or even hundreds — of events in one of the logs. All you have to do is open the Event Viewer, and check the logs for suspicious-looking entries. To display the event logs, choose Start➪Administrative Tools➪Event Viewer. This brings up the Event Viewer, as shown in Figure 19-10. The tree on the left side of the Event Viewer lists the five categories of events that are tracked: ⻬ Application: Lists events that were generated by application programs. In most cases, these are events that the application’s developers pur- posely wrote to the event log, to inform you of error conditions or devel- oping trouble. ⻬ Security: Lists security-related events, such as unsuccessful logon attempts, changes to security policy, and so on. For information about how to change the events that are written to the security log, see Chapter 4 of this book. ⻬ System: This is where you find events related to hardware or operating- system failures. For example, if you’re having trouble with a hard drive, you should check here for events related to the hard drive. 270 Part IV: Network Operating Systems