[2 days left] What’s wrong with your cloud strategy? Learn why multicloud solutions matter with Nimble Storage.Register Now

x
?
Solved

Securing an Access database

Posted on 2012-03-22
5
Medium Priority
?
225 Views
Last Modified: 2012-03-22
We have an Access database working across an RDP using Windows 2008 Server R2.  It has been assigned it's own drive letter "N:", with nothing else on that drive. The front-end runs on the C: drive and the back end sits on the  N: drive.

I would like to know if it is possible to lock down that drive so nobody (except Administrators) can access it (using Explorer etc), but without it having a knock on effect to the Access database & it's functionality.
0
Comment
Question by:Andy Brown
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
5 Comments
 
LVL 8

Expert Comment

by:gpizzuto
ID: 37751362
You can protect your N: root directory by deleting all users but the administrator (clearly on an NTFS partition).
Be aware that your applications needs to be run by "administrator" user (wih the same password if your client is not part of your active directory structure)

I suggest to use a SQL-server database (or other RDBMS) and if you need to use Access, link the SQLServer's tables inside it (for example by ODBC).
Hope this helps
0
 
LVL 22

Expert Comment

by:Kelvin Sparks
ID: 37751402
Or you create a new AD group and add the users you want to that group and allow access to the drive to that group only.

Kelvin
0
 

Author Comment

by:Andy Brown
ID: 37751757
Thanks guys - really appreciated.

Unfortunately SQL isn't an option for this installation.  I'll have a look into the complexity of loading/running the front-end with Admin permissions.

As for security, would this also apply to specific files.  We have one file "N:\TSDB\Data\Data.mdb", that I don't want anyone to be able to copy, open or link to.  However, the front-end still needs full access (we are not using an MDW file).
0
 
LVL 40

Accepted Solution

by:
als315 earned 2000 total points
ID: 37752082
0
 

Author Closing Comment

by:Andy Brown
ID: 37752183
That'll do it - thank you so much.

Thanks everyone for your help on this.
0

Featured Post

How to Use the Help Bell

Need to boost the visibility of your question for solutions? Use the Experts Exchange Help Bell to confirm priority levels and contact subject-matter experts for question attention.  Check out this how-to article for more information.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In this article, WatchGuard's Director of Security Strategy and Research Teri Radichel, takes a look at insider threats, the risk they can pose to your organization, and the best ways to defend against them.
What monsters are hiding in your child's room? In this article I will share with you a tech horror story that could happen to anyone, along with some tips on how you can prevent it from happening to you.
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

656 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question