Solved

Windows 2003 Server Network Share(easy)

Posted on 2004-09-26
1
168 Views
Last Modified: 2010-03-18
Ok an easy one.

I have a Windows Server 2003 installed.
It is NOT setup as a domain controller, just the base install with no roles added.
It has a number of shared folders.

I do NOT want my clients to have to type in a user name and password when they browse to the server through the network neighborhood.

I want to map network drives to each of the clients, but i don't want to have to make the client type in administrator and password upon startup on all their machines (all windows XP & 2000 machines)

How can i remove this quickly and easily?

thanks
0
Comment
Question by:RainerK2
1 Comment
 
LVL 33

Accepted Solution

by:
NJComputerNetworks earned 75 total points
ID: 12159222
The best solutions would be to make this machine a domain controller; however, I see that you do not want to do that.

So, you will have to relax the security of your Windows server.

1) make sure that you clients and the server belong to the same WORKGROUP.  Just make sure that the workgroup name is identical on all clients and servers on your network.

2) Go to the server and create local user accounts.  Create a user account for each user on your network. (bob, fran, sara, etc)  These users can be just normal users, you do not need to place these users in the administrators group.

3) on the server, find the share(s) that you want to give access for the clients to.  Right click on the folder and select Properties.  Click the security tab and make sure that you give the appropriate access to each user.  Add FRAN, BOB, SARA, etc (Note: or create a group and place all of the users into this group, then give access to the group instead of individual users) and give these users CHANGE rights.  Now click the SHARE tab and give everyone FULL CONTROL on the share.

4) logon to a client workstation as a user (FRAN, BOB, SARA, etc).  MAP a drive to the server.

Make  sure that you enter the correct username and password and also check of RECONNECT AT LOGON.

Thank you,

Joe Poandl MCSE
0

Featured Post

Maximize Your Threat Intelligence Reporting

Reporting is one of the most important and least talked about aspects of a world-class threat intelligence program. Here’s how to do it right.

Join & Write a Comment

Sometimes you might need to configure routing based not only on destination IP address, but also on a combination of destination IP address (or hostname) and destination port number. I will describe a method how to accomplish this with free tools. …
Are you one of those front-line IT Service Desk staff fielding calls, replying to emails, all-the-while working to resolve end-user technological nightmares? I am! That's why I have put together this brief overview of tools and techniques I use in o…
Internet Business Fax to Email Made Easy - With eFax Corporate (http://www.enterprise.efax.com), you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, fr…
Polish reports in Access so they look terrific. Take yourself to another level. Equations, Back Color, Alternate Back Color. Write easy VBA Code. Tighten space to use less pages. Launch report from a menu, considering criteria only when it is filled…

708 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now