Solved

How do you setup a password to be required to map a drive?

Posted on 2003-11-28
5
295 Views
Last Modified: 2013-12-04
Hi!

We have two computers both use XP Pro as their operating systems.
The mapped drive on computer A requires a password.
The mapped drive on computer B does not require a password.
How can I setup the mapped drive on computer B to require a password to be entered to map its drive as well?

Thank you in advance.

Chuck
0
Comment
Question by:TrueBlue
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
5 Comments
 
LVL 24

Accepted Solution

by:
shivsa earned 125 total points
ID: 9839004
1. Click Start, Settings, Control Panel
2. Dbl click Administrative Tools
3. Dbl click Computer Management
4. On the left side, expand the Local Users & Groups and click once on Users to highlight.
5. select properties.
6. Uncheck "Account is Disabled", click Apply, Click OK.
7. Now right click on the Guest account again, this time select "Set Password".
8. Set the password to something you will remember and click OK. Close the Windows.
9. Now click "My Computer"
10. Right click on the drives or directories to be shared and then select sharing.
11. Create the sharing criteria suitable to the situation, including naming the share iteself.
0
 

Expert Comment

by:Bluewhale042399
ID: 9844486
I'm not certain I followed this, and apologize if I'm wrong. but... by your original question it seems you wish to implement some form of file security. But the accepted answer says the group Users will be given rights to the files.  

Why bother implementing file security if all users have rights to the files??

The mapping is a separate issue.  If a 'user' has the rights to that folder/file/etc then they can map it if it is a 'root' share.  

Again: I'm not trying to be TOO much of a butthead.  Just wondering if the correct question was asked?

Regards

       Paul
0
 

Author Comment

by:TrueBlue
ID: 9844576
Hi Paul:

I just wanted to make sure that a password had to be entered in order for computer "B"s drives to be accessed from another computer on the network.

The accepted answer pointed me in the right direction.

Does this make sense?

Chuck
0
 

Expert Comment

by:VASHINEE19
ID: 9872498
hello Sir,

i would be grateful if you could advise me on the strategy to implement the following:

Current Site Definition(Scenario):
-----------------------
Compaq server with Unix installed. There are 28 PCs with Win 95 and 6 PCs with Win 98 on a LAN. Furthemore, there are 12 PCs with Win 95 and 9 PCs with Win 98 on a WAN which connects to the main server via a router (The company considers the router as their Remote Access Server).

i want to implement a solution, preferably a centralised security policy, which will allow the administrator to prevent users from manipulating the config. of the workstations on the WAN and LAN.

Awaiting a positive reply from you.
Thanks & Regards
VASHINEE19
software engineer
 
0
 

Expert Comment

by:Bluewhale042399
ID: 9877732
Hi Chuck:

     Rereading this thread I find I was applying Domain security logic to the problem.  My bad, sorry! Peer to Peer that was the correct answer.  

      Vashinee19:  You might wish to post your question as a new question: this thread is on another topic-not UNIX related. IF you have a W2K Domain set up then you could enforce such policies, however I can't say with regard to UNIX.  



         Paul
0

Featured Post

Get HTML5 Certified

Want to be a web developer? You'll need to know HTML. Prepare for HTML5 certification by enrolling in July's Course of the Month! It's free for Premium Members, Team Accounts, and Qualified Experts.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

As I write this article, I am finishing cleanup from the Qakbot virus variant found in the wild on April 18, 2011.  It was a messy beast that had varying levels of infection, speculated as being dependent on how long it resided on the infected syste…
SHARE your personal details only on a NEED to basis. Take CHARGE and SECURE your IDENTITY. How do I then PROTECT myself and stay in charge of my own Personal details (and) - MY own WAY...
In this video, viewers will be given step by step instructions on adjusting mouse, pointer and cursor visibility in Microsoft Windows 10. The video seeks to educate those who are struggling with the new Windows 10 Graphical User Interface. Change Cu…
This tutorial will teach you the special effect of super speed similar to the fictional character Wally West aka "The Flash" After Shake : http://www.videocopilot.net/presets/after_shake/ All lightning effects with instructions : http://www.mediaf…
Suggested Courses

617 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question