Solved

User Share Phantom Folders Showing Up

Posted on 2010-11-11
2
381 Views
Last Modified: 2012-05-10
We currently have a file server with 6 drives 3 drives are in their own raid 5. There are 3 drive letters associated with the server C,D,F. The CD Rom is  E. We are using the F drive as a  user share and only used for users (No Other Files)

Each user is setup with a folder for example: smithj$

There are about 70 folders setup in this drive.

Here is the problem:

Lately weve been noticing that 3 or 4 of the folders have been renaming themselves "boobre" but they are still retaining the same share name. So users can still access their files.  Whats odd is that all of the folders named "boobre" have exactly the same name. How does Windows allow this.

Does anyone have a clue how this is happening? Ive sent a ticket to Microsoft and they couldn't find the issue after a week.
0
Comment
Question by:agengler11
2 Comments
 
LVL 28

Accepted Solution

by:
Michael Pfister earned 500 total points
ID: 34118402
If you really have identical folder names, NTFS has a severe issue and is corrupt.

1) Run a "chckdsk  F: /f " command while nothing else is accessing the drive/shares.

2) Run a
dir /x f:\Users > dirlist.txt
and examine the long and short file names for the folders in question.

3) run
net share > shares.txt
and examine the shares in question

4) Using regedit, examine HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\LanmanServer\Shares
for the shares in question. Best export the entire key.
0
 
LVL 2

Author Closing Comment

by:agengler11
ID: 34166017
Thanks
0

Featured Post

Netscaler Common Configuration How To guides

If you use NetScaler you will want to see these guides. The NetScaler How To Guides show administrators how to get NetScaler up and configured by providing instructions for common scenarios and some not so common ones.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Every server (virtual or physical) needs a console: and the console can be provided through hardware directly connected, software for remote connections, local connections, through a KVM, etc. This document explains the different types of consol…
This article outlines the process to identify and resolve account lockout in an Active Directory environment.
This tutorial will walk an individual through the process of configuring their Windows Server 2012 domain controller to synchronize its time with a trusted, external resource. Use Google, Bing, or other preferred search engine to locate trusted NTP …
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question