Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

File Sharing question.

Posted on 2006-10-22
7
Medium Priority
?
282 Views
Last Modified: 2010-04-18
Hi experts,
Now I have a group of users who are in a workgroup (not in my domain) wish to use my file server share folder.
My server is a Windows 2003 clustered server.
Assuming I have six folders in this file share, how can I configured it such that folder A,B,C is read/write to users in my domain and the users in the workgroup and folder D,E,F is read only to user in the workgroup?
Thanks.
0
Comment
Question by:michellechan57
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 4
  • 3
7 Comments
 
LVL 48

Accepted Solution

by:
Jay_Jay70 earned 2000 total points
ID: 17786109
under the NTFS permissions TAB, give authenticated users (for domain users) whatever permissions, and then the everyone group (for non domain) approp permissions

make sure you put your share permissions to everyone full control and then nail down with NTFS
0
 

Author Comment

by:michellechan57
ID: 17786232
Thanks Jay_Jay70, I get back to you in two days time.
0
 
LVL 48

Expert Comment

by:Jay_Jay70
ID: 17786236
no worries, have fun :)
0
Complete VMware vSphere® ESX(i) & Hyper-V Backup

Capture your entire system, including the host, with patented disk imaging integrated with VMware VADP / Microsoft VSS and RCT. RTOs is as low as 15 seconds with Acronis Active Restore™. You can enjoy unlimited P2V/V2V migrations from any source (even from a different hypervisor)

 

Author Comment

by:michellechan57
ID: 17800992
Hi, Jay_Jay70
I have created same account (user id and password for each user in the workgroup) in my domain.
I suspect when they have mapped into my shared folder, they are authenticated user as well?
Because these workgroup users have read/write access to all six folders when
they are supposed to have only read access to folder D,E,F.

Some questions:
1) If I removed the account from the domain, how should the workgroup user mapped
into my shared folder?
2) How can I check the effective permission of the user that has mapped into my shared
folder to verify if my setting is correct?

Your help is appreciated.
Thanks.

0
 
LVL 48

Expert Comment

by:Jay_Jay70
ID: 17801011
having those accounts makes no difference at all, they have different SID's thus they are entirely unique....you have effectivle created accounts that do nothing :)

anonymous access usually falls into the everyone group - check the advanced security settings and look at "effective permissions" for the everyone group
0
 

Author Comment

by:michellechan57
ID: 17801042
Hi, Jay_Jay70
So how should the workgroup user mapped into my shared folder in this case to gain
access as anonymous?
Thanks.
0
 
LVL 48

Expert Comment

by:Jay_Jay70
ID: 17801052
thats what the everyone group allows...the everyone group contains the "guest" group which allows the anonymous access
0

Featured Post

10 Questions to Ask when Buying Backup Software

Choosing the right backup solution for your organization can be a daunting task. To make the selection process easier, ask solution providers these 10 key questions.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I guess it is not common knowledge to most Wintel engineers/administrators: If you have an SNMP-based monitoring system in your environment (and it's common to have SNMP or Syslog) it's reasonably easy to enable monitoring of the Windows Event logs,…
This may not be a text book method to resolve VSS backup issues but it seemed to have worked on few of the Windows 2003 servers we had issues while performing a Volume Shadow Copy backup. If you have issues while performing a shadow copy backup usin…
In this video, Percona Solution Engineer Dimitri Vanoverbeke discusses why you want to use at least three nodes in a database cluster. To discuss how Percona Consulting can help with your design and architecture needs for your database and infras…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…

705 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question