The initial security configuration of all disks on a Plesk-managed server is performed during Plesk installation. Plesk applies its own security settings to all existing Windows objects on the server according to the disk and hosting security policies.
Once security has been configured, you have several options to manage
security settings for Windows objects. We recommend that you use Plesk’s
security metadata files to set and edit security settings for Windows
objects on Plesk-managed servers. The changes made in the files can be
then applied to Windows objects by running the
plesk bin repair
You can also modify the security settings for each object individually
either through Plesk GUI or Windows Explorer directly by going to
Security tab in the object’s Properties. However, the latter
option is not recommended, because while changes made to the security
settings via the Plesk GUI are included in the .security file, those
made via the native Windows means are not, and will be overwritten by
plesk bin repair utility, or the
The following advantages are afforded by using the security metadata files to configure security settings for Windows objects:
- The ability to apply security rules to multiple objects at once.
- Easy track of security settings changes.
- Easy portability of customized security settings between domains and servers.