?
Solved

access hardrive

Posted on 2006-10-20
7
Medium Priority
?
160 Views
Last Modified: 2013-12-04
My machine is running on windows based domain network. Operating system is XP.
Everytime, I log into the machine, I get logged into the network, operating system runs few scripts to map the important hard drive.

Now, I can access other machine's D$(Shared D Drive or C Drive - C$)  by just typing in as
\\othermachine\d$ and putting in the administrator password.

Is it possible that I can get a message that somebody in the network is accessing my harddrive in this way? How can I know that? I dont have access to firewall - I cannot change firewall settings on my machine, I dont want people to stop accessing my machine, but I want to know when they are accessing and what they are accessing!!

Thanks a lot

0
Comment
Question by:at999
  • 4
  • 3
7 Comments
 
LVL 15

Expert Comment

by:plimpias
ID: 17774794


Go to My computer
Right clic the D drive and go to prpperties.
Click the sharing tab
Click do not share
hit apply

Another alternative is to enable auditing on the folder so it will log who has accesssed it, I don' t think there is a way to display a message when someone connected without using third party apps.
0
 
LVL 15

Accepted Solution

by:
plimpias earned 2000 total points
ID: 17774811
Here is how to enable auditing

http://support.microsoft.com/kb/310399
0
 

Author Comment

by:at999
ID: 17775979
thanks plimpias
are there options that users can escape from being caught by the 'Auditor' and they are not displayed in my event log eventhough they have logged into my machine and checked the hard disk?
0
Concerto Cloud for Software Providers & ISVs

Can Concerto Cloud Services help you focus on evolving your application offerings, while delivering the best cloud experience to your customers? From DevOps to revenue models and customer support, the answer is yes!

Learn how Concerto can help you.

 
LVL 15

Expert Comment

by:plimpias
ID: 17777857
not unless they modify your policy on your computer, otherwise no.
0
 

Author Comment

by:at999
ID: 17783772
Thanks a lot..
0
 

Author Comment

by:at999
ID: 17783792
How much memory this auditing would occupy? - my c:\ has @ 15 Gigs
0
 
LVL 15

Expert Comment

by:plimpias
ID: 17784000
not much at all, that will be plenty. It is going to just use up space on the event log. YOu can control the size by going to the properties of the security log. I don't see it geting 1 GB for a couple of years..but im guessing
0

Featured Post

Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Many of us in IT utilize a combination of roaming profiles and folder redirection to ensure user information carries over from one workstation to another; in my environment, it was to enable virtualization without needing a separate desktop for each…
Our Group Policy work started with Small Business Server in 2000. Microsoft gave us an excellent OU and GPO model in subsequent SBS editions that utilized WMI filters, OU linking, and VBS scripts. These are some of experiences plus our spending a lo…
Loops Section Overview
As many of you are aware about Scanpst.exe utility which is owned by Microsoft itself to repair inaccessible or damaged PST files, but the question is do you really think Scanpst.exe is capable to repair all sorts of PST related corruption issues?
Suggested Courses
Course of the Month15 days, 2 hours left to enroll

840 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question