Solved

How to properly setup a file share

Posted on 2004-04-28
3
477 Views
Last Modified: 2010-04-11
What is the commonly used method to setup a share?  What are all the needed steps to create a share so that only the people you want to access it can?  How should you handle a request to tighten a subfolder in a share so that only some people can get into it?  When should you consider assigned access to an account instead of a group (if Ever)?

I have been able to do the things I've asked above but would like to see how others handle these scenarios to see if I am doing it the right way or just getting it done.

Any information and guidance will be greatly appreciated.

Thanks
0
Comment
Question by:amj1
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 1

Expert Comment

by:daviddief
ID: 10944732
Hope this helps...

By default, file sharing is enabled on Windows NT workstation and server.  However, you must be at least a Power User to share files. If you are unable to share files, contact your computers administrator and ask them to upgrade your user classification to Power User.

On Window 95/98 file sharing is disabled by default. To enable file sharing on a Windows 95/98 machine, do these steps:

Open the Windows Control Panel by pressing the Start button and select Settings | Control Panel from the menu.

Double-click the Network applet. The Network dialog should appear.

On the Configuration tab of the Network dialog, click button File and Print Sharing . The File and Print Sharing dialog will appear.

Check the box for I want to be able to give other access to my files. Then click the OK button.

On the Network dialog select tab Identification. Make a note of the computer name.

Press the OK button on the Network dialog to apply the changes. You will probably be asked to reboot your computer afterwards.

After rebooting the computer verify that sharing has indeed been enabled by right-clicking any folder. If sharing is enabled the popup menu will have Sharing... as an option.
 
Good Luck!
0
 
LVL 1

Assisted Solution

by:daviddief
daviddief earned 200 total points
ID: 10944748
A great site for advice is below, I would have pasted the article but that would be stealing and a little too long.

http://www.theeldergeek.com/quick_guide_to_simple_file_sharing.htm

0
 
LVL 38

Accepted Solution

by:
Rich Rumble earned 200 total points
ID: 10945122
Another great article, explains how windows File Share permissions and NTFS permission work in concert with one another:
http://www.practicallynetworked.com/sharing/xp_filesharing/index.htm

You've not specified OS, windows is typically assumed- so I'll try to cover more- Samba can do quite a bit more than windows with reguard to access permissions, samba can use IP or DNS to deny or allow access as well as file or folder permissions. NFS http://www.bresink.de/osx/DocsNFSManager/Share.html

GL!
-rich
0

Featured Post

10 Questions to Ask when Buying Backup Software

Choosing the right backup solution for your organization can be a daunting task. To make the selection process easier, ask solution providers these 10 key questions.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Article by: Justin
In light of the WannaCry ransomware attack that affected millions of Windows machines, you might wonder if your Mac needs protecting. Yes, it does and here is how to do it.
In this blog we highlight approaches to managed security as a service.  We also look into ConnectWise’s value in aiding MSPs’ security management and indicate why critical alerting is a necessary integration.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
Suggested Courses
Course of the Month8 days, 7 hours left to enroll

615 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question