Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

CD drives as open shares

Posted on 2011-09-20
9
Medium Priority
?
296 Views
Last Modified: 2012-05-12
I ran a tool called "shareenum" which basically lists all shares in the domain. On a load of workstations it lists the D drive which on closer inspection seems to be the CD/DVD drive as readable by the everyone group. I also noticed a lot of shares called stuff like "OLD PC" on users machines that again open to everyone? Why would this be? Is this a security problem or have I misread the data? Is this a common issue? Most the machines are still running XP
0
Comment
Question by:pma111
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
9 Comments
 
LVL 9

Accepted Solution

by:
Lester_Clayton earned 1000 total points
ID: 36566323
If you find shares on the network, it's because people have shared them.  The only kinds of shares which are automatically created are Administrative shares - like c$.

The share permission "Everyone" does not mean everybody has access to it.  The share permission allows people to connect to or open the share - but they still need directory permissions to list the contents of it.  They'll get the most restricted rights from the two combined.

This is a common issue if your users are all administrators of their local machines.  It means they can share stuff willy nilly :)
0
 
LVL 3

Author Comment

by:pma111
ID: 36566353
I cant see why a CD/DVD drive would need to be a "share" anyway?  Can anyone think of a reason why? Another thing that confuses me is such users dont have admin rights on there machines, some have power user but I didnt think they could amend ACL's for that.
0
 
LVL 8

Assisted Solution

by:subhashchy
subhashchy earned 1000 total points
ID: 36566459
The reason for sharing CD drives is to, Put a Media in one of the PC and all network users (your users are most often Friends who likes to share stuff between each other) and then access it. that;s what we do in our organization :P.
 
Should not be a problem, as the users which are not part of the domain,will not be able to access it anyway.
0
Looking for the Wi-Fi vendor that's right for you?

We know how difficult it can be to evaluate Wi-Fi vendors, so we created this helpful Wi-Fi Buyer's Guide to help you find the Wi-Fi vendor that's right for your business! Download the guide and get started on our checklist today!

 
LVL 3

Author Comment

by:pma111
ID: 36566534
What if they put sensitive data in there disk drive and then 5000 people could potentially open it, of which probably 5 would know the user and have a genuine business need for accessing it.
0
 
LVL 9

Expert Comment

by:Lester_Clayton
ID: 36567264
These are all very valid points yes, but it doesn't change the fact that users who have administrative rights on their machines can do things like this.

You should consider finding a more secure business model - for example, users should be regular users and not administrators - which means they can't start sharing drives or folders at will.
0
 
LVL 3

Author Comment

by:pma111
ID: 36567273
They are not administrators though - there is probably a handful of 5000 who have local admin rights the rest dont have this permission. Some may have power user rights - is that enough?
0
 
LVL 59

Expert Comment

by:LeeTutor
ID: 36991641
I've requested that this question be deleted for the following reason:

This question has been classified as abandoned and is closed as part of the Cleanup Program. See the recommendation for more details.
0
 
LVL 3

Author Comment

by:pma111
ID: 36991642
will split points
0

Featured Post

Q2 2017 - Latest Malware & Internet Attacks

WatchGuard’s Threat Lab is a group of dedicated threat researchers committed to helping you stay ahead of the bad guys by providing in-depth analysis of the top security threats to your network.  Check out our latest Quarterly Internet Security Report!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Configuring Remote Assistance for use with SCCM
Ever visit a website where you spotted a really cool looking Font, yet couldn't figure out which font family it belonged to, or how to get a copy of it for your own use? This article explains the process of doing exactly that, as well as showing how…
This is used to tweak the memory usage for your computer, it is used for servers more so than workstations but just be careful editing registry settings as it may cause irreversible results. I hold no responsibility for anything you do to the regist…
Two types of users will appreciate AOMEI Backupper Pro: 1 - Those with PCIe drives (and haven't found cloning software that works on them). 2 - Those who want a fast clone of their boot drive (no re-boots needed) and it can clone your drive wh…

609 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question