Solved

Securing an Access database

Posted on 2012-03-22
5
219 Views
Last Modified: 2012-03-22
We have an Access database working across an RDP using Windows 2008 Server R2.  It has been assigned it's own drive letter "N:", with nothing else on that drive. The front-end runs on the C: drive and the back end sits on the  N: drive.

I would like to know if it is possible to lock down that drive so nobody (except Administrators) can access it (using Explorer etc), but without it having a knock on effect to the Access database & it's functionality.
0
Comment
Question by:Andy Brown
5 Comments
 
LVL 8

Expert Comment

by:gpizzuto
ID: 37751362
You can protect your N: root directory by deleting all users but the administrator (clearly on an NTFS partition).
Be aware that your applications needs to be run by "administrator" user (wih the same password if your client is not part of your active directory structure)

I suggest to use a SQL-server database (or other RDBMS) and if you need to use Access, link the SQLServer's tables inside it (for example by ODBC).
Hope this helps
0
 
LVL 22

Expert Comment

by:Kelvin Sparks
ID: 37751402
Or you create a new AD group and add the users you want to that group and allow access to the drive to that group only.

Kelvin
0
 

Author Comment

by:Andy Brown
ID: 37751757
Thanks guys - really appreciated.

Unfortunately SQL isn't an option for this installation.  I'll have a look into the complexity of loading/running the front-end with Admin permissions.

As for security, would this also apply to specific files.  We have one file "N:\TSDB\Data\Data.mdb", that I don't want anyone to be able to copy, open or link to.  However, the front-end still needs full access (we are not using an MDW file).
0
 
LVL 39

Accepted Solution

by:
als315 earned 500 total points
ID: 37752082
0
 

Author Closing Comment

by:Andy Brown
ID: 37752183
That'll do it - thank you so much.

Thanks everyone for your help on this.
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Data breaches are on the rise, and companies are preparing by boosting their cybersecurity budgets. According to the Cybersecurity Market Report (http://www.cybersecurityventures.com/cybersecurity-market-report), worldwide spending on cybersecurity …
In this increasingly digital world, security hacks are no longer just a threat, but a reality. As we've witnessed with Target's big identity hack 2013, Heartbleed in 2015, and now Cloudbleed, companies and their leaders need to prepare for the unthi…
Learn how to number pages in an Access report over each group. Activate two pass printing by referencing the pages property: Add code to the Page Footers OnFormat event to capture the pages as there occur for each group. Use the pages property to …
This Micro Tutorial hows how you can integrate  Mac OSX to a Windows Active Directory Domain. Apple has made it easy to allow users to bind their macs to a windows domain with relative ease. The following video show how to bind OSX Mavericks to …

831 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question