How to give a temporary remote user limited access to network files

Environment is windows 2003 domain.

We have need for a temporary outside user to have access to only one set of our network folders. I have created a user ID for this user.

How can I prevent them from having access to anything else including areas that can normally be accessed by "Authenticated Users".

Or perhaps, how can I remove this user from "Authenticated Users"?
Who is Participating?
Patrick BogersConnect With a Mentor Datacenter platform engineer LindowsCommented:
Hi again,

By explaining what authenticated users define i thought you would understand you cannot alter it. Avoiding it is possible by my solution since you dont authenticate against the DC but a local machine.

About RDP, yes it can IF a) you have an RDP forward in place for this fileserver and b) if you add the new user on the fileserver to be member of the Remote Desktop Users group.

Small note, it is not very good design to have rights distributed to shares based on 'authenticated users'. You see this now.
Better design is to 'group' people in security groups like:
Accountingpeople in security group Accounting, give this group rights to accounting shares.
Helpdesk people in group Helpdeskusers and same policy applies.

This way you cover all your shares and can safely delete the 'authenticated users' permissions from all custom shares.
Patrick BogersConnect With a Mentor Datacenter platform engineer LindowsCommented:

Authenticated users are users who have authenticated to the domain controller.

This outside user does work on premises? In that case you do not create a domain users account on the DC but a local user account on the file server where the folder resides.

Create a security group on that box called 'outside users' and make the new user a member for that group.
Once done delete all memberships beside the outside users and give this group appropiate rights on th folder you want to. This pretty covers your issue i suppose.
fredvr666Connect With a Mentor Commented:
You cannot remove the user from Authenticated Users it's a builtin group.
The only way is joning the user to a group and then deny the rights on a directory or file to that group
Has Powershell sent you back into the Stone Age?

If managing Active Directory using Windows Powershell® is making you feel like you stepped back in time, you are not alone.  For nearly 20 years, AD admins around the world have used one tool for day-to-day AD management: Hyena. Discover why.

TMITECHSAuthor Commented:
To: Patricksr1972

This sounds good but will that user now be able to RDC into our network to access the files they need?

To: fredvr666

Thanks I needed that confirmation that I could not remove a user from Auth Users.
But with the method you describe I need to deny all shares at high level and then grant access at one low level folder. Does this seem right? I don' want to risk overwriting my vast array of permissions.
JullezConnect With a Mentor Network EngineerCommented:
How is the user connecting to your network, VPN or Terminal server?  Or by "temp outside user" you mean, that he is on-premise user? You did mention RDC. Please specify.
TMITECHSAuthor Commented:
Thanks I will try it.

The remote user will connect by Terminal Server.
Although, VPN is not out of the question.
Patrick BogersConnect With a Mentor Datacenter platform engineer LindowsCommented:
I need to correct myself here, 'authenticated users' are also local users accounts.

In that case i would try to configure the guest account (which never belongs to authenticated users) for this outside user.

So add guest account to the security group  'outside users'
Plus add guest to the remote desktop users (this i have never tried to do)
JullezConnect With a Mentor Network EngineerCommented:
If Terminal Server, you can lock down the shared drives. Usually on shared drives, I remove all the permissions and the assign Admin and user rights as needed, avoiding user "everyone" and "authenticated" users. You could also map specific drives just for that user when they start the terminal session, blocking browsing "up". On the terminal server you can lock that temp user in a way that he will only see the desktop, and NTFS+Share permissions will give him very minimal access.
TMITECHSAuthor Commented:
Thanks both, more good info!

J  How to block "browsing up"?
JullezNetwork EngineerCommented:
Depending on the OS you are using on the file server, you could enable Access Based Enumeration.  This is a feature, enabled at the volume level, that allows you to 'see' only things that you have access to. It should prevent the temp user from being able to get to those top level folders.
TMITECHSAuthor Commented:
I will try these things.

I will likely award points tomorrow after some testing.
Patrick BogersDatacenter platform engineer LindowsCommented:
Good luck.
TMITECHSAuthor Commented:
Although not completely resolved for me, I appreciate this info that I believe will lead to a solution that I can live with.
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

All Courses

From novice to tech pro — start learning today.