Solved

I have 3 XP Pro computers in a network workgroup.  I want to limit access to certain folders.

Posted on 2004-04-20
4
121 Views
Last Modified: 2013-12-04
I have three computers (A, B & C) in a workgroup (not domain) called office.  All are running Windows XP Pro.  All have "use simple file sharing" unchecked under Windows Explorer.

Computers B & C print to a shared HP printer that is physically connected to computer A.

I want to limit Computer-C from accessing any folders on Computer-A and Computer-B.

I have created a "group" on Computer-A called "mygroup", with members UserName-1 and UserName-2 (Username-3 is not a member of the group).

I have a shared folder on Computer-A called "Billing" and have limited access to members of "mygroup".

So, in theory, only UserName-1 and UserName-2, have access to the "Billing" folder.

Am I correct in setting this up?

Thank you.

0
Comment
Question by:jimdorman
  • 4
4 Comments
 
LVL 12

Accepted Solution

by:
trywaredk earned 250 total points
ID: 10875814
Yes, as far as UserName-3 isn't member of the local admin group on computer-a and computer-b

But remember you didn't limit access from computer-c to the other computers, you limit's UserName-3 access to the other computers.

Many Regards
Jorgen Malmgren
IT-Supervisor
Denmark

:o) Your brain is like a parachute. It works best when it's open

0
 
LVL 12

Expert Comment

by:trywaredk
ID: 10875817
Builtin and predefined groups in Windows XP
http://www.microsoft.com/technet/treeview/default.asp?url=/technet/prodtechnol/winxppro/proddocs/lsm_local_groups.asp

members of the local admin group
1. Start / Run
2. Input CMD
3. Press ENTER
4. Input NET LOCALGROUP ADMINISTRATORS
5. Press ENTER
0
 
LVL 12

Expert Comment

by:trywaredk
ID: 10875820
0
 
LVL 12

Expert Comment

by:trywaredk
ID: 10906640
:o) Glad I could help you - thank you for the points
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

In today's information driven age, entrepreneurs have so many great tools and options at their disposal to help turn good ideas into a thriving business. With cloud-based online services, such as Amazon's Web Services (AWS) or Microsoft's Azure, bus…
Article by: btan
The intent is not to repeat what many has know about Ransomware but more to join its dots of what is it, who are the victims, why it exists, when and how we respond on infection. Lastly, sum up in a glance to share such information with more to help…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
This demo shows you how to set up the containerized NetScaler CPX with NetScaler Management and Analytics System in a non-routable Mesos/Marathon environment for use with Micro-Services applications.

744 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now