Solved

How do you setup a password to be required to map a drive?

Posted on 2003-11-28
5
291 Views
Last Modified: 2013-12-04
Hi!

We have two computers both use XP Pro as their operating systems.
The mapped drive on computer A requires a password.
The mapped drive on computer B does not require a password.
How can I setup the mapped drive on computer B to require a password to be entered to map its drive as well?

Thank you in advance.

Chuck
0
Comment
Question by:TrueBlue
5 Comments
 
LVL 24

Accepted Solution

by:
shivsa earned 125 total points
ID: 9839004
1. Click Start, Settings, Control Panel
2. Dbl click Administrative Tools
3. Dbl click Computer Management
4. On the left side, expand the Local Users & Groups and click once on Users to highlight.
5. select properties.
6. Uncheck "Account is Disabled", click Apply, Click OK.
7. Now right click on the Guest account again, this time select "Set Password".
8. Set the password to something you will remember and click OK. Close the Windows.
9. Now click "My Computer"
10. Right click on the drives or directories to be shared and then select sharing.
11. Create the sharing criteria suitable to the situation, including naming the share iteself.
0
 

Expert Comment

by:Bluewhale042399
ID: 9844486
I'm not certain I followed this, and apologize if I'm wrong. but... by your original question it seems you wish to implement some form of file security. But the accepted answer says the group Users will be given rights to the files.  

Why bother implementing file security if all users have rights to the files??

The mapping is a separate issue.  If a 'user' has the rights to that folder/file/etc then they can map it if it is a 'root' share.  

Again: I'm not trying to be TOO much of a butthead.  Just wondering if the correct question was asked?

Regards

       Paul
0
 

Author Comment

by:TrueBlue
ID: 9844576
Hi Paul:

I just wanted to make sure that a password had to be entered in order for computer "B"s drives to be accessed from another computer on the network.

The accepted answer pointed me in the right direction.

Does this make sense?

Chuck
0
 

Expert Comment

by:VASHINEE19
ID: 9872498
hello Sir,

i would be grateful if you could advise me on the strategy to implement the following:

Current Site Definition(Scenario):
-----------------------
Compaq server with Unix installed. There are 28 PCs with Win 95 and 6 PCs with Win 98 on a LAN. Furthemore, there are 12 PCs with Win 95 and 9 PCs with Win 98 on a WAN which connects to the main server via a router (The company considers the router as their Remote Access Server).

i want to implement a solution, preferably a centralised security policy, which will allow the administrator to prevent users from manipulating the config. of the workstations on the WAN and LAN.

Awaiting a positive reply from you.
Thanks & Regards
VASHINEE19
software engineer
 
0
 

Expert Comment

by:Bluewhale042399
ID: 9877732
Hi Chuck:

     Rereading this thread I find I was applying Domain security logic to the problem.  My bad, sorry! Peer to Peer that was the correct answer.  

      Vashinee19:  You might wish to post your question as a new question: this thread is on another topic-not UNIX related. IF you have a W2K Domain set up then you could enforce such policies, however I can't say with regard to UNIX.  



         Paul
0

Featured Post

Use Case: Protecting a Hybrid Cloud Infrastructure

Microsoft Azure is rapidly becoming the norm in dynamic IT environments. This document describes the challenges that organizations face when protecting data in a hybrid cloud IT environment and presents a use case to demonstrate how Acronis Backup protects all data.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Many people tend to confuse the function of a virus with the one of adware, this misunderstanding of the basic of what each software is and how it operates causes users and organizations to take the wrong security measures that would protect them ag…
Many of us in IT utilize a combination of roaming profiles and folder redirection to ensure user information carries over from one workstation to another; in my environment, it was to enable virtualization without needing a separate desktop for each…
This Micro Tutorial will give you a basic overview how to record your screen with Microsoft Expression Encoder. This program is still free and open for the public to download. This will be demonstrated using Microsoft Expression Encoder 4.

831 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question