You do not have the appropriate access rights for this server????

Posted on 2004-11-26
Last Modified: 2008-01-09
I recently purchased a new laptop and added it to my home network.  Everything worked fine for a week and a half.  Yesterday I found out I could no longer access the new laptop from the desktop.  When I click on "View Workgroup Computers" it shows up as "newlaptop" but when I try to access it I get the following message;

\\newlaptop is not accessible. You might not have permission to use this network resource. Contact the administrator of the server to find out if you have access permissions.  Access is denied.

  If I right click on the newlaptop icon and then click on "properties", I get the following message;

You do not have the appropriate access rights for this server.  For more information, contact your network adminstrator.

I can still access the desktop from the newlaptop.  Both machines are running WinXP SP2.  My network runs through a Linksys Wireless Access Point(802.11b) with a 4 port switch.  The desktop is hard wired and the laptop is wireless.  I installed Password Agent on the laptop 2 days ago.  As far as I can tell, none of the settings on any of the network configuration windows have changed.  Any ideas?

Question by:jondough
    LVL 41

    Expert Comment

    Pro or home?
    first and foremost, make sure any/all firewalls are configured correctly (including the built in one on XP)
    now if Pro
    Run local security policy editor from control panel admin tools and set the local policy, Network Access: Let everyone permissions apply to anonymous users, to enabled and make sure guest account is enabled

    on the XP machine

    Start | Programs | Administrative Tools | Local Security Policy

    Security Settings

    Sharing Mode- Change this to "Classic Mode - Local users Authenticate as Themselves" (as opposed to "Guest only" the default model)

    this fix will be applied after a restart


    Use the classic mode only if you have added the other(machines) username and password to the newlaptop (they must match, both username and password)

    Author Comment

    XP home. Start | Programs |  does not contain  Administrative Tools | Local Security Policy.   Turning the firewalls on or off does not affect on the results. It looks like the microsoft link only deals with XP Pro.
    LVL 41

    Expert Comment

    OK, home that makes a difference. I posted if Pro
    did you enable file and printer sharing? did you share something?
    Windows XP Simple File Sharing

    Windows XP lets you share a computer's disks and folders with other computers on the network, using

    a method called Simple File Sharing. And it really is simple. If a disk or folder is shared, everyone

    on the network can access it. There are no user permissions and no passwords.;en-us;Q307874

    This article describes how to disable simplified sharing.


    By default, simplified sharing is enabled on a Windows XP-based computer if the computer is not a member

    of a domain. Simplified sharing lets you easily share folders with everyone on your workgroup or network

    and make folders in your user profile private. However, if simplified sharing is enabled, you cannot

    prevent specific users and groups from gaining access to your shared folders. If you disable simplified

    sharing, you can allow specific users and groups to gain access to a shared folder; those users must

    provide a password to gain access to your shared folder.

    Sentinel is an interesting security utility you can use to apply very specific restrictions to files

    on your PC. It runs from the system tray, enforcing restictions you've imposed on selected files and

    folders. The specific security options are available from a new tab the program adds to the Properties

    dialog box you can access by right-clicking any file or folder in Explorer. You can log and/or deny

    access to any unauthorized user that attempts to open, read, and/or write to files, and you can deny

    access to the contents of selected folders. An available control panel allows you to toggle this functionality

    on and off, and turn it off for a specific period of time. Other features include stealth mode and logging

    support. Sentinel is a snap to use, and provides the power and versatility you need to protect your

    sensitive data files.


    Windows Security Toolkit


    Restrict Access to Passwords Settings, Restrict Access to Network Settings, Restrict Access to Display

    Settings, Restrict Access to Device Manager, Restrict Access to Hardware Profiles , Restrict Access

    to Virtual Memory Setting, Restrict Access to File System Setting, Restrict Access to Printer Setting,

    Restrict User from adding Printer, Restrict User from deleting Printer, Hide Printers General and Details

    Pages, Hide System Settings Control Panel, Restrict Access to Modem Settings, Restrict Access to Regional

    Settings, Restrict Access to Internet Settings, Restrict Access to Multimedia Settings, Restrict Access

    to Add/Remove Programs, Restrict Access to Power Management, Hide All items on the desktop, Remove Favorites

    Folder from the Start Menu, Remove Documents Folder from the Start Menu, Hide the task bar settings

    from the Start Menu, Remove Find Command from the Start Menu, Restrict changes to enabled Active Desktop,

    Disable use of Active Desktop Feature, Clear the recent Documents when Windows Exits, Disable Modification

    of Start Menu, Remove the Run Command from the Start Menu, Remove the Folders from the Start Menu, Remove

    the Help Option from the Start Menu, Disable File Sharing over the network, Disable Printer Sharing

    over the network, Hide Shared Passwords With Asterisk, Disable Save Password Option in DUN-NT, Don't

    display Username on logging in NT, Disable Caching of NT Domain Password, Hide Workgroup Content from

    Network Neighborhood, Remove Entire Network from Network Neighborhood,Fix DHCP Security Bug in Windows

    9x/NT/2000 to stop hackers from accessing your system, Hacker Guard - Disables Hackers from using a

    modem to access the Internal Network, Disable MS-DOS mode in windows, Disable use of real mode Dos

    Applications, Reset the Content Advisor and Ratings Password, Disable Internet Explorer Content and

    Ratings Advisor, Restrict User from changing Internet Explorer Advanced Settings, Restrict User from

    Accessing your personal profiles in Internet Explorer, Restrict User from Accessing Information from

    your Internet Explorer Wallet, Disable ability to run registry editing tools, Disable Windows Password

    caching ability, Restrict access to event logs in Windows NT and 2000, Disable use of Windows Hot Keys.




    One software package supports the whole range of authentication methods, for your local machine or your

    domain. SecureSuite™ is an integrated software package that provides a suite of security applications

    for Microsoft Windows 98, Me, NT 4.0 and 2000. These applications include logon, file and folder encryption,

    a password bank utility, application execution control, and Entrust PKI support.

    This suite of applications offers added security for users of Microsoft Windows 98, Me, NT 4.0 and 2000.

    SecureLogon™ enhances the normal logon procedure for Windows, enabling users to log on securely and

    easily using one of the many authentication devices supported by SecureSuite.

    SecureSession™ stores user name, password and other personal information for any Windows-based application

    or Web-based form, and releases it upon authenticating the user.

    SecureFolder™ allows you to easily protect your files, folders and Web page bookmarks with strong encryption.

    The locking/unlocking of folders and encryption/decryption of files is activated by a SecureSuite-compatible

    authentication device.

    SecureApp™ prevents unauthorized users from running Windows applications. Great for accounting software

    and databases that contain sensitive or confidential information.

    SecureEntrust™ provides Entrust Technologies' Public-Key Infrastructure (PKI) support.

    General Features

    Five security programs in one suite: SecureLogon, SecureFolder, SecureSession, SecureApp and SecureEntrust

    Compatible with Windows 98, ME, NT 4.0 and 2000 (see Detailed Features)

    Increases the security and convenience of using a PC

    Multiple authentication methods, including a combination of different methods

    Support for workstation only and client/server systems

    System and network can be administered from the server and/or client

    "On-the-fly" folder and file encryption with "drag-and-drop" convenience

    Interactive logon guides users with animation or video clips tailored to their profile

    "Last User" support: the last user logged on to a computer need only place his/her finger on the scanner

    to log on again without hitting any keys

    Locked screen saver can be activated at any time via the "Pause" key (where supported)

    Maintains the "look and feel" of standard Microsoft Windows interface

    Easy to use wizard-based installation, setup and enrollment

    Customizable features including animation, logos, graphics, audio and visual feedback

    Multi-language support

    Biometric API (BAPI) standard compliant


    iProtect Offers Serious PC Protection


    Upgraded software locks, encrypts, hides, and even shreds your files. But don't not forget your password.

    To paraphrase an old saying, just because you're paranoid doesn't mean someone's not after you. Or your


    Whether you are paranoid or just being cautious, a company called International Software Solutions wants

    to help. It offers a product called iProtect, a Windows-based software utility that can, with a couple

    of clicks, lock, encrypt, hide or shred files right on your desktop computer. iProtect keeps them confidential

    and prevents accidental deletion. "It's a good little tool for the end user," says Diana Kelley, senior

    security analyst at the Hurwitz Group.


    Steganos 3 Security Suite


    02-23-2001 - The Steganos 3 Security Suite is a complete, easy to use security package. Steganos encrypts

    and conceals your data. The Steganos Safe is your secure hard drive, which disappears at the click of

    a button. Includes: Internet Trace Destructor, file shredder, e-mail encryption, password manager, and

    computer locking


    Winlock is now freeware


    Major features of WinLock:

    Lock Windows at system boot

    Lock Windows at suspend

    Lock, Suspend or Shutdown easily with once click

    Powerful schedule Shutdown/Restart/Suspend system

    Autosave applications on Shutdown time

    Autorun saved applications when system start

    Autorun any applications when system start

    Advanced power management

    Windows List with Show/Minimize/Maximize/Hide functions

    Process list with Icon/ID/Type/Priority/Kill functions

    Powerful administration tools


    Panda Secure


    ARMORED PROTECTION for desktop and laptop computers. If you share your computer with other users, if

    your children waste time playing computer games, if you store confidential data on your laptop... then

    you need Panda Security.

    Panda Security is Panda Software's NEW Security program. With this software you will turn your computer

    into an armor-plated vault, preventing unauthorized operations and even data loss and theft (with hard

    disk encryption).

    All the conceivable security threats that desktop and laptop computers may be subject to can be controlled

    through Panda Security. Benefit from a reliable, intruder-proof system thanks to its access control,

    login/logout, user ID and audit report features, which guarantee you total privacy at all times.

    Panda Security allows you to:

    Restrict the use of your computers to specific users and time frames.

    Prevent the installation of inappropriate software (games, illegal applications, etc.).

    Block access to established configuration settings (Autoexec, Config, etc.).

    Protect specific files to prevent unauthorized operations (deletion, renaming, saving to a floppy disk,

    printing, etc.).

    Encrypt your e-mail messages and hard disk data.

    Control Internet and e-mail use.

    Keep track of exactly what is done on your computers.


    Icon Lock-iT 2000


    Icon Lock-iT 2000 gives you the flexibility to lock an individual file or the entire contents of a folder.

    The process is very similar with both functions. When locking the contents of a folder, you simply right

    click on the folder name rather than an individual file name and select "Lock Files".

    As this screen shot indicates, multiple files are listed rather than one. As an added convenience, you

    can review the files to be locked at this time and selectively uncheck any files that you do not wish

    to lock.




    "SecureUp is the ultimate security system for your desktop, laptop and network computers. With this

    software you will turn your computer into a secured lock, preventing unauthorized operations and data

    loss. All the conceivable security threats that desktop, laptop and network computers may be subject

    to can be controlled through SecureUp. Benefit from a reliable, intruder-proof system and install it

    today. SecureUp=99 allows you to restrict the use of your computers, block access to established configuration

    settings such as Autoexec.bat, etc, lock all files to prevent unauthorized operations deletion, renaming,

    saving to a floppy disk, printing etc"



    With Power Administrator, you can have absolute control over your computer's functions and restrictions.

    From blocking the access to certain folders or disabling programs of your choice, Power Administrator

    gives you the most out of your PC & network with incredible convenience. Whether you are a home user,

    business user, or network administrator, Power Administrator is designed around your needs, enabling

    you to perform a vast number of administrative changes with the click of a button.


    Other considerations


    Author Comment

    Until 2 days ago I could share in both directions; laptop to desktop, desktop to laptop.  Full sharing is enabled on both machines for drive c: and I can still open and gain full access to all files on the desktop from the laptop.  I can ping the laptop from the desktop but I cannot open or gain access to anything on the laptop from the desktop.  This situation is true whether or not the firewall on each is enabled or disabled.  It's also true whether or not I've enabled WEP on the router and the wireless adapter.
    LVL 41

    Accepted Solution

    >>Until 2 days ago I could share in both directions
    what changed? any new software? updates?
    you can always do a system restore to go back (if it doesn't work you can come back forward to today)

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Why You Should Analyze Threat Actor TTPs

    After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

    FIPS stands for the Federal Information Processing Standardisation and FIPS 140-2 is a collection of standards that are generically associated with hardware and software cryptography. In most cases, people can refer to this as the method of encrypti…
    Trying to figure out group policy inheritance and which settings apply where can be a chore.  Here's a very simple summary I've written which might help.  Keep in mind, this is just a high-level conceptual overview where I try to avoid getting bogge…
    To add imagery to an HTML email signature, you have two options available to you. You can either add a logo/image by embedding it directly into the signature or hosting it externally and linking to it. The vast majority of email clients display l…
    Illustrator's Shape Builder tool will let you combine shapes visually and interactively. This video shows the Mac version, but the tool works the same way in Windows. To follow along with this video, you can draw your own shapes or download the file…

    759 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    9 Experts available now in Live!

    Get 1:1 Help Now