Will Windows allow access to anything dangerous when sharing the C drive?

Posted on 2011-03-17
Last Modified: 2012-05-11
Hi Experts,

Running a piece of software that will be hosted on a Windows 7 machine (it will be acting as the server) and shared among a handful of workstations.  The instructions for the software call for sharing the C drive on the machine acting as the server with everyone (checked with the software people and verified that's what they intended). Tried it on a test machine, doesn't seem like a huge deal because Windows 7 still seems to block access to the major folders (windows, program files, etc).  However, still thought I'd check with the experts and see if there is anything they can access potentially damaging to the Windows 7 machine acting as the server (besides obviously the data, but that's shared on the network anyway).  Any thoughts there?  


Question by:Jsmply
  • 4
  • 3
LVL 13

Assisted Solution

BCipollone earned 250 total points
ID: 35160846
Obvioulsy virus' can always cause damage and there is not much you can do to prevent that aside from freezing the OS.

You should check to see if you can create a folder to give the program access to instead of the root of c. This way you can control the permissions easily without worrying about the OS.

Or see if you can create a seperate partition and have the program use that partition instead.
LVL 32

Accepted Solution

aleghart earned 250 total points
ID: 35160861
>Will Windows allow access to anything dangerous when sharing the C drive?

Yes.  The C: drive.

I can see no reason to ever share a C: (system) drive) to users.  The C$ admin share is sufficient for administrators.  A folder-level share should be good enough for network users.

What is the software?

Author Closing Comment

ID: 35162290
Thx! Agreed, going to tell the software developer it's a no go . . . they were just prefering it because their software instructions and mapping is designed around it.  Thanks!
Netscaler Common Configuration How To guides

If you use NetScaler you will want to see these guides. The NetScaler How To Guides show administrators how to get NetScaler up and configured by providing instructions for common scenarios and some not so common ones.


Author Comment

ID: 35162693
For those still following, please see this thread.  That's what I was wondering, if the machines are peer to peer and have matching logins, how is this any different than if you only share specific folders, but still have access via \\hostpc\c$?
LVL 32

Expert Comment

ID: 35163055
If you have identical logins, are using sime shares with access to everything, and are disregarding basic security...then there's little difference.

Why bother about what is/isn't accessible?  Just burn a backup image so you can restore each machine if/when it gets trashed.  And keep backups on an offline location.

Author Comment

ID: 35163097
Thanks.  Yes the important machines are fully ghosted daily so it's not a huge concern then. Thanks.

Author Comment

ID: 35163101
Thanks.  Yes the important machines are fully ghosted daily so it's not a huge concern then. Is there a way though to ONLY share certain folders to other computers even if the machines have identical logins?  Or will the c$ share always let you through?
LVL 32

Expert Comment

ID: 35165508
If all computers are peers and share administrator-level logins, then no.  Give them user-level logins, and they can't see admin-level ($) shares.

Featured Post

Use Case: Protecting a Hybrid Cloud Infrastructure

Microsoft Azure is rapidly becoming the norm in dynamic IT environments. This document describes the challenges that organizations face when protecting data in a hybrid cloud IT environment and presents a use case to demonstrate how Acronis Backup protects all data.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Knowing where your website is hosted is as important as the features you receive, the monthly fee, and the support you receive. Due diligence should be done when choosing your next hosting provider.
If you are looking at this article, you have most likely been hit by some version of ransomware and are trying to find out if there is anything you can do, or what way you should react - READ ON!
This Micro Tutorial will teach you the basics of configuring your computer to improve its speed. It will also teach you how to disable programs that are running in the background simultaneously. This will be demonstrated using Windows 7 operating…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

808 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question