Solved

Setting correct shared folder security

Posted on 2009-03-30
4
257 Views
Last Modified: 2013-12-04
Hello,

I have a share on a windows server 2003 machine which is mapped as F on all company computers.  There is various folders within this which all have varied security on them.  At the moment anyone can save a file to the root of the F drive which i want to stop happening.  What is the best way of going about this?  I need to be careful as I don't want to change a setting and lose the security settings on other folders

Many Thanks
0
Comment
Question by:rsquibb
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
4 Comments
 
LVL 16

Accepted Solution

by:
speshalyst earned 500 total points
ID: 24021085
If you do not want anyone to write to the Root of F:\ you should then set permissions on the other subfolder folders  individually..
 also note that you should NOT "inherit" any permissions from F:\( parent folder) as this will revoke all write access to the subfolders.
 
 
0
 
LVL 3

Author Comment

by:rsquibb
ID: 24037263
Hello,

What permissions should i set on the other folders?  Do I need to set "everyone" a specific permission?

Thanks
0
 
LVL 16

Assisted Solution

by:speshalyst
speshalyst earned 500 total points
ID: 24038404
0
 
LVL 3

Author Comment

by:rsquibb
ID: 24085639
Thanks for that but I am still unsure about doing this and messing up all the other security settings
0

Featured Post

SharePoint Admin?

Enable Your Employees To Focus On The Core With Intuitive Onscreen Guidance That is With You At The Moment of Need.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Article by: btan
The intent is not to repeat what many has know about Ransomware but more to join its dots of what is it, who are the victims, why it exists, when and how we respond on infection. Lastly, sum up in a glance to share such information with more to help…
Security measures require Windows be logged in using Standard User login (not Administrator).  Yet, sometimes an application has to be run “As Administrator” from a Standard User login.  This paper describes how to create a shortcut icon to launch a…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…
Do you want to know how to make a graph with Microsoft Access? First, create a query with the data for the chart. Then make a blank form and add a chart control. This video also shows how to change what data is displayed on the graph as well as form…
Suggested Courses

623 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question