Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

How to hide network drives but still use them for apps

Posted on 2010-09-14
6
Medium Priority
?
634 Views
Last Modified: 2012-06-27
Hi,
I am wondering how I can hide network drives for users but still have them available for applications.
If someone can help that will be appreciated.
Regards,
Joe
0
Comment
Question by:joestramandinoli
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
6 Comments
 
LVL 65

Accepted Solution

by:
rockiroads earned 400 total points
ID: 33679173
something here (registry hack) which might work, dont know as I have not tried it myself http://www.mombu.com/microsoft/certification-networking/t-how-to-hide-a-network-drive-on-xp-321111.html

and here is the ms article about it http://support.microsoft.com/kb/231289
0
 
LVL 8

Assisted Solution

by:thetmanvn
thetmanvn earned 400 total points
ID: 33679184
http://www.online-tech-tips.com/computer-tips/hide-a-drive-in-windows-the-easy-way/

Here you are, but remember this way, user still try all the drive letter if they know about it.
0
 
LVL 4

Assisted Solution

by:Malajlo
Malajlo earned 400 total points
ID: 33680018
Disable share mapping and use hidden shares. Network drive is only for easyier use (and old applications using drive letters only)
0
Manage your data center from practically anywhere

The KN8164V features HD resolution of 1920 x 1200, FIPS 140-2 with level 1 security standards and virtual media transmissions at twice the speed. Built for reliability, the KN series provides local console and remote over IP access, ensuring 24/7 availability to all servers.

 
LVL 8

Assisted Solution

by:Bill
Bill earned 400 total points
ID: 33685638
I use these ALL the time and especially for applications, scripts, etc.

Put a "$" after the share name and it will be hidden from Network Browsing.

Example...
Server Name:     BigFileServer
Visible Share:     d:\shares\Accounting    Shared as "Accounting"
UNC path:          \\BigFileServer\Accounting

Hidden Share:     d:\shares\Accounting    Shared as "Accounting$"
UNC path:          \\BigFileServer\Accounting$

For security best practices:
Create a custom security group (say, "AccountingBatchUpload" for example) to grant Share level and NTFS level access
Then create a service account for your application (add it to the group) and use to authenticate, say "zAccountingBatchUpload" for example.  ( I prefix all my service accounts with a "z" so that they always show up at the end of the alphabet in the AD user list.
0
 
LVL 10

Assisted Solution

by:3_S
3_S earned 400 total points
ID: 33685797
First of all I use the $ sign to create drives that users don't have to see.
Then from your application you can make the connection using shell
net use \\server\share$ /user:domain\user password

In the net use command no drive letter is specified. (not need else it will show up in windows explorer)
You can also specify other user then the logged in user.
Now you can access the files with the UNC path.

At the end of the application use
net use \\server\share$ /delete
this disconnects the drive and if you used other credentials the user will not be able to connect back to this drive with his credentials even if he knows the UNC path.

I mostly embed this in the application itself.
0
 

Author Closing Comment

by:joestramandinoli
ID: 33837900
Solution not needed anymore
0

Featured Post

Get your Disaster Recovery as a Service basics

Disaster Recovery as a Service is one go-to solution that revolutionizes DR planning. Implementing DRaaS could be an efficient process, easily accessible to non-DR experts. Learn about monitoring, testing, executing failovers and failbacks to ensure a "healthy" DR environment.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The Need In an Active Directory enviroment, the PDC emulator provide time synchronization for the domain. This is important since Active Directory uses Kerberos for authentication.  By default, if the time difference between systems is off by more …
It’s been over a month into 2017, and there is already a sophisticated Gmail phishing email making it rounds. New techniques and tactics, have given hackers a way to authentically impersonate your contacts.How it Works The attack works by targeti…
With the advent of Windows 10, Microsoft is pushing a Get Windows 10 icon into the notification area (system tray) of qualifying computers. There are many reasons for wanting to remove this icon. This two-part Experts Exchange video Micro Tutorial s…
With the advent of Windows 10, Microsoft is pushing a Get Windows 10 icon into the notification area (system tray) of qualifying computers. There are many reasons for wanting to remove this icon. This two-part Experts Exchange video Micro Tutorial s…

715 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question