Solved

NAS device and CIFS regarding confidentiality

Posted on 2011-09-21
4
276 Views
Last Modified: 2012-05-12
Currently, their private$ folder has unrestricted access to all employees that know how to get it.  The concern of managers is that it's not password protected.  Is moving to CIFS the only way to remedy this situation?
0
Comment
Question by:mgedlaman
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
4 Comments
 
LVL 32

Expert Comment

by:Rodney Barnhardt
ID: 36579981
If you look under the security tab, you should be able to remove all users except the owner's ID. That would limit permission to the folder.
0
 

Author Comment

by:mgedlaman
ID: 36584924
ty for responding rbarnhardt, however, because the folders are not in the root...i.e. it's like this on the NAS:

NAS created folder "private$"

users are as follows: "private$\john", "private$\david" etc.

all the users folders were created in the folder "private$" without using the NAS file/folder management...i.e. I "UNC'ed" to the \\192.168.1.5\private$ share and added users one at a time in there
0
 
LVL 32

Accepted Solution

by:
Rodney Barnhardt earned 500 total points
ID: 36587265
Are you accessing from a Windows client? If so, then you will need CIFS to set permissions.
0
 

Author Closing Comment

by:mgedlaman
ID: 36601115
yep, all windows clients :(
I was afraid you were going to say that.  Thanks for the heads up rbarnhardt!  You're awesome!
0

Featured Post

Don't Cry: How Liquid Web is Ensuring Security

WannaCry is just the start. Read how Liquid Web is protecting itself and its customers against new threats.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The business world is becoming increasingly integrated with tech. It’s not just for a select few anymore — but what about if you have a small business? It may be easier than you think to integrate technology into your small business, and it’s likely…
Group policies can be applied selectively to specific devices with the help of groups. Utilising this, it is possible to phase-in group policies, over a period of time, by randomly adding non-members user or computers at a set interval, to a group f…
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles to another domain controller. Log onto the new domain controller with a user account t…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

687 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question