How to hide a application folder in window 2012. Will the application work if it is hidden.

Posted on 2014-09-01
Last Modified: 2014-09-18

We use windows 2012 sever as a file server. When users login into windows 7 PCs , there is a shared drive that gets mapped  in the users PC. Within this mapped drive there is a folder called SOSM and there is Data in this folder.

There is a application on the client PCs  and when they load up the application, the application looks into the SOSM folder to retrieve the Data.

Firstly is it possible to hide SOSM folder and if I hide will the application access the data.

The reason I want to hide is when this drive is mapped, the domain users  have access to the SOSM folder and I don't want them to see the data in the SOSM folder \ accidently delete.

Can this be achieved, please suggest.
Question by:lianne143
    LVL 24

    Assisted Solution

    by:Sekar Chinnakannu
    Yes you can and application can access the mapped drive by creating the registry value, to configure same follow this step
    Also you hide the same through group policy too User Configurations -> Administrative Template -> Windows Components -> Windows Explorer -> enabled settings as per screenshot
    LVL 23

    Accepted Solution

    Do you actually need to hide only the folder or the entire drive?
    If you only need to hide the drive or mapped folder do as Sekar suggest (either just hide the drive using a policy or just share hidden).

    If you however need the drive to be there for the user but you only want to hide that specific folder it is gonna be a bit more difficult. You could use ABE which is a feature of server 2012 (Acces Based Enumeration). What it does is only show the folders you  actually have access to. If the users however need access to the folder it will not be hidden. You might be able to remove rights from the top folder SOSM and add permissions to the subfolder Data, it might just work.

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Top 6 Sources for Identifying Threat Actor TTPs

    Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

    I don't know if many of you have made the great mistake of using the Cisco Thin Client model with the management software VXC. If you have then you are probably more then familiar with the incredibly clunky interface, the numerous work arounds, and …
    Sometimes drives fill up and we don't know why.  If you don't understand the best way to use the tools available, you may end up being stumped as to why your drive says it's not full when you have no space left!  Here's how you can find out...
    In this Micro Tutorial viewers will learn how to use Windows Server Backup to create full image of their system. Tutorial shows how to install Windows Server Backup Feature on Windows 2012R2 and how to configure scheduled Bare Metal Recovery backup.…
    This tutorial will walk an individual through the process of installing of Data Protection Manager on a server running Windows Server 2012 R2, including the prerequisites. Microsoft .Net 3.5 is required. To install this feature, go to Server Manager…

    779 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    11 Experts available now in Live!

    Get 1:1 Help Now