Will Windows allow access to anything dangerous when sharing the C drive?

Posted on 2011-03-17
Last Modified: 2012-05-11
Hi Experts,

Running a piece of software that will be hosted on a Windows 7 machine (it will be acting as the server) and shared among a handful of workstations.  The instructions for the software call for sharing the C drive on the machine acting as the server with everyone (checked with the software people and verified that's what they intended). Tried it on a test machine, doesn't seem like a huge deal because Windows 7 still seems to block access to the major folders (windows, program files, etc).  However, still thought I'd check with the experts and see if there is anything they can access potentially damaging to the Windows 7 machine acting as the server (besides obviously the data, but that's shared on the network anyway).  Any thoughts there?  


Question by:Jsmply
  • 4
  • 3
LVL 13

Assisted Solution

BCipollone earned 250 total points
ID: 35160846
Obvioulsy virus' can always cause damage and there is not much you can do to prevent that aside from freezing the OS.

You should check to see if you can create a folder to give the program access to instead of the root of c. This way you can control the permissions easily without worrying about the OS.

Or see if you can create a seperate partition and have the program use that partition instead.
LVL 32

Accepted Solution

aleghart earned 250 total points
ID: 35160861
>Will Windows allow access to anything dangerous when sharing the C drive?

Yes.  The C: drive.

I can see no reason to ever share a C: (system) drive) to users.  The C$ admin share is sufficient for administrators.  A folder-level share should be good enough for network users.

What is the software?

Author Closing Comment

ID: 35162290
Thx! Agreed, going to tell the software developer it's a no go . . . they were just prefering it because their software instructions and mapping is designed around it.  Thanks!
MIM Survival Guide for Service Desk Managers

Major incidents can send mastered service desk processes into disorder. Systems and tools produce the data needed to resolve these incidents, but your challenge is getting that information to the right people fast. Check out the Survival Guide and begin bringing order to chaos.


Author Comment

ID: 35162693
For those still following, please see this thread.  That's what I was wondering, if the machines are peer to peer and have matching logins, how is this any different than if you only share specific folders, but still have access via \\hostpc\c$?
LVL 32

Expert Comment

ID: 35163055
If you have identical logins, are using sime shares with access to everything, and are disregarding basic security...then there's little difference.

Why bother about what is/isn't accessible?  Just burn a backup image so you can restore each machine if/when it gets trashed.  And keep backups on an offline location.

Author Comment

ID: 35163097
Thanks.  Yes the important machines are fully ghosted daily so it's not a huge concern then. Thanks.

Author Comment

ID: 35163101
Thanks.  Yes the important machines are fully ghosted daily so it's not a huge concern then. Is there a way though to ONLY share certain folders to other computers even if the machines have identical logins?  Or will the c$ share always let you through?
LVL 32

Expert Comment

ID: 35165508
If all computers are peers and share administrator-level logins, then no.  Give them user-level logins, and they can't see admin-level ($) shares.

Featured Post

Guide to Performance: Optimization & Monitoring

Nowadays, monitoring is a mixture of tools, systems, and codes—making it a very complex process. And with this complexity, comes variables for failure. Get DZone’s new Guide to Performance to learn how to proactively find these variables and solve them before a disruption occurs.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you are looking at this article, you have most likely been hit by some version of ransomware and are trying to find out if there is anything you can do, or what way you should react - READ ON!
Ransomware continues to grow in reach and sophistication, putting data everywhere at risk. Learn how to avoid being caught in its sinister clutches with these 11 key tips.
This Micro Tutorial will give you a introduction in two parts how to utilize Windows Live Movie Maker to its maximum editing capability. This will be demonstrated using Windows Live Movie Maker on Windows 7 operating system.
Sending a Secure fax is easy with eFax Corporate ( First, Just open a new email message.  In the To field, type your recipient's fax number You can even send a secure international fax — just include t…

726 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question