Solved

User Share Phantom Folders Showing Up

Posted on 2010-11-11
2
385 Views
Last Modified: 2012-05-10
We currently have a file server with 6 drives 3 drives are in their own raid 5. There are 3 drive letters associated with the server C,D,F. The CD Rom is  E. We are using the F drive as a  user share and only used for users (No Other Files)

Each user is setup with a folder for example: smithj$

There are about 70 folders setup in this drive.

Here is the problem:

Lately weve been noticing that 3 or 4 of the folders have been renaming themselves "boobre" but they are still retaining the same share name. So users can still access their files.  Whats odd is that all of the folders named "boobre" have exactly the same name. How does Windows allow this.

Does anyone have a clue how this is happening? Ive sent a ticket to Microsoft and they couldn't find the issue after a week.
0
Comment
Question by:agengler11
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 29

Accepted Solution

by:
Michael Pfister earned 500 total points
ID: 34118402
If you really have identical folder names, NTFS has a severe issue and is corrupt.

1) Run a "chckdsk  F: /f " command while nothing else is accessing the drive/shares.

2) Run a
dir /x f:\Users > dirlist.txt
and examine the long and short file names for the folders in question.

3) run
net share > shares.txt
and examine the shares in question

4) Using regedit, examine HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\LanmanServer\Shares
for the shares in question. Best export the entire key.
0
 
LVL 2

Author Closing Comment

by:agengler11
ID: 34166017
Thanks
0

Featured Post

Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Active Directory security has been a hot topic of late, and for good reason. With 90% of the world’s organization using this system to manage access to all parts of their IT infrastructure, knowing how to protect against threats and keep vulnerabil…
Recently, Microsoft released a best-practice guide for securing Active Directory. It's a whopping 300+ pages long. Those of us tasked with securing our company’s databases and systems would, ideally, have time to devote to learning the ins and outs…
This tutorial will walk an individual through the process of configuring their Windows Server 2012 domain controller to synchronize its time with a trusted, external resource. Use Google, Bing, or other preferred search engine to locate trusted NTP …
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Suggested Courses

634 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question