Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

Mapped share error: Access denied

Posted on 2010-09-17
7
Medium Priority
?
944 Views
Last Modified: 2012-08-14
Hi,

I have a strange one....

I have 10 users in an AD security group called DataM.
I have a share on a Server, root of D, called SQLDATA
SQLDATA Share permissions is set to give full controll to the DataM group, no ther settings

9 out of the 10 users in the group map the share and it works fine. The 10th user gets the share mapped but when he tries to explore the mapped drive gets ACCESS DENIED error.

Any thoughts before i delete his profile and start him again?
0
Comment
Question by:Neil Russell
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
7 Comments
 
LVL 29

Expert Comment

by:QPR
ID: 33699033
is he a member of a group that does not have have NTFS permissions of the folder (structure)?
Share/NTFS - least privaledged wins.
Check to see if he has (doesn't) have something in common with the other 9
0
 
LVL 11

Expert Comment

by:Coast-IT
ID: 33699181
Ask him to try it from another PC, make sure it isnt a problem with the PC accountt he is trying to access from.

What do his "effective permissions" say?

To view effective permissions on files and folders.

1.  Open Windows Explorer, and then locate the file or folder for which you would like to view effective permissions.

2.  Right-click the file or folder, click Properties, and then click the Security tab.

3.  Click Advanced, and then click the Effective Permissions tab.

4.  Click the Select button.

5.  In Name, enter the name of a user or group and then click OK. The selected check boxes indicate the effective permissions of the user or group for that file or folder.


0
 
LVL 37

Author Comment

by:Neil Russell
ID: 33699372
They all New users in the domain and belong to no other groups at all.
 
0
Concerto's Cloud Advisory Services

Want to avoid the missteps to gaining all the benefits of the cloud? Learn more about the different assessment options from our Cloud Advisory team.

 
LVL 2

Expert Comment

by:brammer90
ID: 33699510
Hi
assuming all the members have the correct permissions

check to properties of the share to make sure you are not exceeding the max allowed connections.
Regards
a common mistake is to allow 10 connections for 10 people but done forget the server connects as well meaning 11 connections in total.

Dave
0
 
LVL 11

Expert Comment

by:Coast-IT
ID: 33699994
Did you look at my comment and try the suggestions?
0
 
LVL 37

Accepted Solution

by:
Neil Russell earned 0 total points
ID: 33703161
Found the problem!!
The user had mapped another drive to the same server location but by IP address and using different credentials. Even after deletion it would not map. Used control userpass..... deleted stored credentials and hey presto
 
0
 
LVL 4

Expert Comment

by:Nice-Ghaza
ID: 33707957
Dear,
          Please try to that option
start click on the Run
\\192.168.1.3  like your ip of server
then ask the User Name and Password
after that you are Select Allway Allow sign yes click on there and



than your problem will be solved
0

Featured Post

Does Powershell have you tied up in knots?

Managing Active Directory does not always have to be complicated.  If you are spending more time trying instead of doing, then it's time to look at something else. For nearly 20 years, AD admins around the world have used one tool for day-to-day AD management: Hyena. Discover why

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Recently, Microsoft released a best-practice guide for securing Active Directory. It's a whopping 300+ pages long. Those of us tasked with securing our company’s databases and systems would, ideally, have time to devote to learning the ins and outs…
Group policies can be applied selectively to specific devices with the help of groups. Utilising this, it is possible to phase-in group policies, over a period of time, by randomly adding non-members user or computers at a set interval, to a group f…
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles to another domain controller. Log onto the new domain controller with a user account t…
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …

721 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question