Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

How come users can see other users home folder?

Posted on 2009-04-07
3
261 Views
Last Modified: 2013-11-21
How come users can see other users home folder?
0
Comment
Question by:JoyceN
3 Comments
 
LVL 1

Expert Comment

by:Joemonkey
ID: 24091187
Most likely the folder above the home folders has a security permission that the home folders are inheriting that is allowing either Everyone or Domain Users rights to all the home folders.
0
 
LVL 32

Accepted Solution

by:
Rodney Barnhardt earned 125 total points
ID: 24091595
Or, if you want to make the folder a "hidden share", place "$" on the end of the share name. This hides each users indivivual folder from all other users. Plus, as mentioned above, check the permissions on the upper level folder.
0
 
LVL 6

Expert Comment

by:mickeyfan
ID: 24099578
Change the sharing to the actual users root folder (\\server\user$) and add the $ to the share. map the user to that share. Also take Domain Users out of the sharing permissions and add domain admins and the actual user.
0

Featured Post

Comprehensive Backup Solutions for Microsoft

Acronis protects the complete Microsoft technology stack: Windows Server, Windows PC, laptop and Surface data; Microsoft business applications; Microsoft Hyper-V; Azure VMs; Microsoft Windows Server 2016; Microsoft Exchange 2016 and SQL Server 2016.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Welcome to my series of short tips on migrations. Whilst based on Microsoft migrations the same principles can be applied to any type of migration. My first tip Migration Tip #1 – Source Server Health can be found listed in my profile here: http:…
Remote Apps is a feature in server 2008 which allows users to run applications off Remote Desktop Servers without having to log into them to run the applications.  The user can either have a desktop shortcut installed or go through the web portal to…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

809 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question