Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

access hardrive

Posted on 2006-10-20
7
Medium Priority
?
159 Views
Last Modified: 2013-12-04
My machine is running on windows based domain network. Operating system is XP.
Everytime, I log into the machine, I get logged into the network, operating system runs few scripts to map the important hard drive.

Now, I can access other machine's D$(Shared D Drive or C Drive - C$)  by just typing in as
\\othermachine\d$ and putting in the administrator password.

Is it possible that I can get a message that somebody in the network is accessing my harddrive in this way? How can I know that? I dont have access to firewall - I cannot change firewall settings on my machine, I dont want people to stop accessing my machine, but I want to know when they are accessing and what they are accessing!!

Thanks a lot

0
Comment
Question by:at999
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 4
  • 3
7 Comments
 
LVL 15

Expert Comment

by:plimpias
ID: 17774794


Go to My computer
Right clic the D drive and go to prpperties.
Click the sharing tab
Click do not share
hit apply

Another alternative is to enable auditing on the folder so it will log who has accesssed it, I don' t think there is a way to display a message when someone connected without using third party apps.
0
 
LVL 15

Accepted Solution

by:
plimpias earned 2000 total points
ID: 17774811
Here is how to enable auditing

http://support.microsoft.com/kb/310399
0
 

Author Comment

by:at999
ID: 17775979
thanks plimpias
are there options that users can escape from being caught by the 'Auditor' and they are not displayed in my event log eventhough they have logged into my machine and checked the hard disk?
0
Threat Trends for MSPs to Watch

See the findings.
Despite its humble beginnings, phishing has come a long way since those first crudely constructed emails. Today, phishing sites can appear and disappear in the length of a coffee break, and it takes more than a little know-how to keep your clients secure.

 
LVL 15

Expert Comment

by:plimpias
ID: 17777857
not unless they modify your policy on your computer, otherwise no.
0
 

Author Comment

by:at999
ID: 17783772
Thanks a lot..
0
 

Author Comment

by:at999
ID: 17783792
How much memory this auditing would occupy? - my c:\ has @ 15 Gigs
0
 
LVL 15

Expert Comment

by:plimpias
ID: 17784000
not much at all, that will be plenty. It is going to just use up space on the event log. YOu can control the size by going to the properties of the security log. I don't see it geting 1 GB for a couple of years..but im guessing
0

Featured Post

Looking for the Wi-Fi vendor that's right for you?

We know how difficult it can be to evaluate Wi-Fi vendors, so we created this helpful Wi-Fi Buyer's Guide to help you find the Wi-Fi vendor that's right for your business! Download the guide and get started on our checklist today!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

As I write this article, I am finishing cleanup from the Qakbot virus variant found in the wild on April 18, 2011.  It was a messy beast that had varying levels of infection, speculated as being dependent on how long it resided on the infected syste…
OfficeMate Freezes on login or does not load after login credentials are input.
In this video, Percona Solution Engineer Dimitri Vanoverbeke discusses why you want to use at least three nodes in a database cluster. To discuss how Percona Consulting can help with your design and architecture needs for your database and infras…
Are you ready to place your question in front of subject-matter experts for more timely responses? With the release of Priority Question, Premium Members, Team Accounts and Qualified Experts can now identify the emergent level of their issue, signal…
Suggested Courses

636 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question