Solved

File permissions and security under mapped drive windows 2003

Posted on 2008-10-14
2
487 Views
Last Modified: 2013-12-04
I am running Windows 2003 R2 and have a directory mapped for all users to R.  Some users need access to 1 directory in the mapped drive, and others need access to several.  How do I assign file security rights and share permissions so individuals can access the directories they should, and not see directories to which they should have no access.
0
Comment
Question by:contralto
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 70

Accepted Solution

by:
KCTS earned 125 total points
ID: 22716482
If you don't want people to see the stuff they do not have access to then you need to use access based enumeration, see http://www.windowsnetworking.com/articles_tutorials/Implementing-Access-Based-Enumeration-Windows-Server-2003.html
0
 
LVL 12

Assisted Solution

by:dlan75
dlan75 earned 125 total points
ID: 22716485
Hi,
They will see all directories within the mapped (shared) drive
Now you can restrict access to specific directories by going to the properties of the folders, go to the security tab and delete all the users within there except for an admin (just in case) and add either groups or users allowed to go in the folder. Make sure you give proper rights to each user.
Do a test on an empty folder to see how it works.
0

Featured Post

2017 Webroot Threat Report

MSPs: Get the facts you need to protect your clients.
The 2017 Webroot Threat Report provides a uniquely insightful global view into the analysis and discoveries made by the Webroot® Threat Intelligence Platform to provide insights on key trends and risks as seen by our users.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Always backup Domain, SYSVOL etc.using processes according to Microsoft Best Practices. This is meant as a disaster recovery process for small environments that did not implement backup processes and did not run a secondary domain controller that ne…
Auditing domain password hashes is a commonly overlooked but critical requirement to ensuring secure passwords practices are followed. Methods exist to extract hashes directly for a live domain however this article describes a process to extract u…
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles to another domain controller. Log onto the new domain controller with a user account t…
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …

690 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question