Solved

How do you setup a password to be required to map a drive?

Posted on 2003-11-28
5
288 Views
Last Modified: 2013-12-04
Hi!

We have two computers both use XP Pro as their operating systems.
The mapped drive on computer A requires a password.
The mapped drive on computer B does not require a password.
How can I setup the mapped drive on computer B to require a password to be entered to map its drive as well?

Thank you in advance.

Chuck
0
Comment
Question by:TrueBlue
5 Comments
 
LVL 24

Accepted Solution

by:
shivsa earned 125 total points
Comment Utility
1. Click Start, Settings, Control Panel
2. Dbl click Administrative Tools
3. Dbl click Computer Management
4. On the left side, expand the Local Users & Groups and click once on Users to highlight.
5. select properties.
6. Uncheck "Account is Disabled", click Apply, Click OK.
7. Now right click on the Guest account again, this time select "Set Password".
8. Set the password to something you will remember and click OK. Close the Windows.
9. Now click "My Computer"
10. Right click on the drives or directories to be shared and then select sharing.
11. Create the sharing criteria suitable to the situation, including naming the share iteself.
0
 

Expert Comment

by:Bluewhale042399
Comment Utility
I'm not certain I followed this, and apologize if I'm wrong. but... by your original question it seems you wish to implement some form of file security. But the accepted answer says the group Users will be given rights to the files.  

Why bother implementing file security if all users have rights to the files??

The mapping is a separate issue.  If a 'user' has the rights to that folder/file/etc then they can map it if it is a 'root' share.  

Again: I'm not trying to be TOO much of a butthead.  Just wondering if the correct question was asked?

Regards

       Paul
0
 

Author Comment

by:TrueBlue
Comment Utility
Hi Paul:

I just wanted to make sure that a password had to be entered in order for computer "B"s drives to be accessed from another computer on the network.

The accepted answer pointed me in the right direction.

Does this make sense?

Chuck
0
 

Expert Comment

by:VASHINEE19
Comment Utility
hello Sir,

i would be grateful if you could advise me on the strategy to implement the following:

Current Site Definition(Scenario):
-----------------------
Compaq server with Unix installed. There are 28 PCs with Win 95 and 6 PCs with Win 98 on a LAN. Furthemore, there are 12 PCs with Win 95 and 9 PCs with Win 98 on a WAN which connects to the main server via a router (The company considers the router as their Remote Access Server).

i want to implement a solution, preferably a centralised security policy, which will allow the administrator to prevent users from manipulating the config. of the workstations on the WAN and LAN.

Awaiting a positive reply from you.
Thanks & Regards
VASHINEE19
software engineer
 
0
 

Expert Comment

by:Bluewhale042399
Comment Utility
Hi Chuck:

     Rereading this thread I find I was applying Domain security logic to the problem.  My bad, sorry! Peer to Peer that was the correct answer.  

      Vashinee19:  You might wish to post your question as a new question: this thread is on another topic-not UNIX related. IF you have a W2K Domain set up then you could enforce such policies, however I can't say with regard to UNIX.  



         Paul
0

Featured Post

What Security Threats Are You Missing?

Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

Join & Write a Comment

No security measures warrant 100% as a "silver bullet". The truth is we also cannot assume anything but a defensive and vigilance posture. Adopt no trust by default and reveal in assumption. Only assume anonymity or invisibility in the reverse. Safe…
Our Group Policy work started with Small Business Server in 2000. Microsoft gave us an excellent OU and GPO model in subsequent SBS editions that utilized WMI filters, OU linking, and VBS scripts. These are some of experiences plus our spending a lo…
This video discusses moving either the default database or any database to a new volume.
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

771 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now