Solved

Permissions for scan to file

Posted on 2011-03-14
6
837 Views
Last Modified: 2012-05-11
I am currently trying to setup our office scanner/copier/printer to be able to use the scan to file function that it supports. I have created a network share that has everyone - full control on the folder. I have setup the "shared" scan folder in the menu of the scanner and the scanner uses SMB to use our netwrok path. This function works fine if we provide credentials, is there a way that we do not need to have the machine provide credentials since "everyone" has full control on the network location folder? Our client machines are using Windows 7 and our copier is a Toshiba e-studio 233 series.
0
Comment
Question by:cmartineau
  • 3
  • 3
6 Comments
 
LVL 27

Expert Comment

by:Thomas Zucker-Scharff
ID: 35131268
This is not an answer to your question, but something to be aware of if you are not already.  Our university policy disallows saving documents on the internal harddrive of the office scanner/copier/printer when using scan to file (you must use scan to email instead).  This is due to security concerns - any file saved to the hard drive is a potential leak - anyone can simply pull the harddrive.
0
 

Author Comment

by:cmartineau
ID: 35131410
Yeah we are going to disable that option to save to local hard drive, thank you for the heads up though! I was just wondering if we have to create a domain user name for the device to access the network path.
0
 
LVL 27

Accepted Solution

by:
Thomas Zucker-Scharff earned 500 total points
ID: 35131629
Ours has an http interface and uses our mail system to send all files.
0
VMware Disaster Recovery and Data Protection

In this expert guide, you’ll learn about the components of a Modern Data Center. You will use cases for the value-added capabilities of Veeam®, including combining backup and replication for VMware disaster recovery and using replication for data center migration.

 

Author Comment

by:cmartineau
ID: 35131846
yeah i might just use the scan to email and avoid the whole permissions thing.
0
 
LVL 27

Expert Comment

by:Thomas Zucker-Scharff
ID: 35131869
Good Luck!
0
 

Author Comment

by:cmartineau
ID: 35131873
thank you
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Not many admins are aware that GPOs can be activated and deactivated time-based. Time to change that :)
Scenario: Your operations manager has discovered an anomaly in your security system. The business will start to suffer within 15 minutes if it is a major IT incident. What should she do? We have 6 recommendations for managing major incidents (https:…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
In an interesting question (https://www.experts-exchange.com/questions/29008360/) here at Experts Exchange, a member asked how to split a single image into multiple images. The primary usage for this is to place many photographs on a flatbed scanner…

828 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question