Domain Controller Share Security Questions Windows Server 2003

Posted on 2006-04-28
Last Modified: 2013-12-04
I was just curious to the fact of I read a lot of the posts about folder redirection and user profiles and such. And i notice it always says when setting permissions for the root folders it says Mark the group "everyone" as full control. Now to me that seems as it would be a huge security issue. When in fact should it not be that the group you are adding to allow full control is "Authenticated Users" I was just curious as to why it is not said to do that instead of marking "everyone"

Please excuse the ramblings. But i was just slightly confused..

Question by:DonaldLandru
    LVL 25

    Accepted Solution

    well you are basically right, but there is very little difference between the everyone group and the authenticated users group..... the problem is the giving them 'full control' however.  That is just dumb (even if you only gave them full control of the parent folders and not to the subfolders/files)(that setting is in the adv security by the way).  Since if you gave authenticated users full control of the parent folder, they could create subfolders and so no which is i doubt what you want.

    Author Comment

    I was thinking the same things along those lines but almost every post I have read or site I have visited on Folder Redirection it says set the Shared folder as Full Control and let it make the new folders automatically.

    Author Comment

    For a normal situation no I would not full control a folder for any reason other than maybe a share made for everyone to transfer files around the network.... Even then I would urge them to just use their home folders but some kind of situation always arises.

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Scale it in WD Gold

    With up to ten times the workload capacity of desktop drives, WD Gold hard drives employ advanced technology to deliver among the best in reliability, capacity, power efficiency and performance.

    The term "Bad USB" is a buzz word that is usually used when talking about attacks on computer systems that involve USB devices. In this article, I will show what possibilities modern windows systems (win8.x and win10) offer to fight these attacks wi…
    Our Group Policy work started with Small Business Server in 2000. Microsoft gave us an excellent OU and GPO model in subsequent SBS editions that utilized WMI filters, OU linking, and VBS scripts. These are some of experiences plus our spending a lo…
    Access reports are powerful and flexible. Learn how to create a query and then a grouped report using the wizard. Modify the report design after the wizard is done to make it look better. There will be another video to explain how to put the final p…
    This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor ( If you're looking for how to monitor bandwidth using netflow or packet s…

    737 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    19 Experts available now in Live!

    Get 1:1 Help Now