Solved

login process status - special?

Posted on 2004-09-23
4
144 Views
Last Modified: 2010-04-14
We have a login script launched backup program that collects some local files and
save them on the server.   Does it, via the login process,
have some special status that we could use that would allow
us to tighten down the backup destination share?

Right now everyone who logs in is a beloings to a RAY-User group and that
share is open to them.  We'd like to
deny access to this share after the login is complete.    Anyway?
0
Comment
Question by:hank1
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
4 Comments
 
LVL 16

Expert Comment

by:robrandon
ID: 12136464
Can you setup the script to use the Net Use command and log in with another account?  Then when the script is over, disconnect.  The share should only allow access for the account in your script, not regular users.

0
 
LVL 1

Author Comment

by:hank1
ID: 12136516
Hummm....
what about runas then?  How would you get a password in there?
0
 
LVL 16

Accepted Solution

by:
robrandon earned 50 total points
ID: 12136617
I'm not sure if you need to use Runas in the script.  You can do something like this:

Net Use s: \\server\share password /user:scriptaccount@domain.com
Do your copy to S:
Net Use /delete

I'm not sure how to hide this information from the users though....
0
 
LVL 1

Author Comment

by:hank1
ID: 12138891
To bad this windows doesn't have a unix sticky bit - oh well
0

Featured Post

Transaction Monitoring Vs. Real User Monitoring

Synthetic Transaction Monitoring Vs. Real User Monitoring: When To Use Each Approach? In this article, we will discuss two major monitoring approaches: Synthetic Transaction and Real User Monitoring.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
In this blog post, we’ll look at how ClickHouse performs in a general analytical workload using the star schema benchmark test.
In this video we outline the Physical Segments view of NetCrunch network monitor. By following this brief how-to video, you will be able to learn how NetCrunch visualizes your network, how granular is the information collected, as well as where to f…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …

726 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question