Solved

access based enumeration

Posted on 2014-09-18
6
154 Views
Last Modified: 2014-10-17
Hi Experts,

on my NETAPP 2552 I have shares and the shares have AccessBasedEnumeration ABE enabled.
on one share I have set our it access right.
My test user hasn´t this access rights -> so ABE should not show the share.

But when I connect with the test user and type \\netapp\ then I see all shares. Why ?
0
Comment
Question by:Eprs_Admin
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 3
6 Comments
 
LVL 121

Accepted Solution

by:
Andrew Hancock (VMware vExpert / EE MVE^2) earned 500 total points
ID: 40329956
Make sure all your shares on the NetApp have been enabled for AccessBasedEnumeration

cifs shares -change sharename -accessbasedenum

it's not the default.
0
 

Author Comment

by:Eprs_Admin
ID: 40330299
All shares , except the default onces, are now set to ABE.

Still the same, the user with no rights can see the share under \\netapp\
But the user cannot access the share.
0
 
LVL 121
ID: 40330346
This NetApp is connected to Active Directory?
0
Retailers - Is your network secure?

With the prevalence of social media & networking tools, for retailers, reputation is critical. Have you considered the impact your network security could have in your customer's experience? Learn more in our Retail Security Resource Kit Today!

 

Author Comment

by:Eprs_Admin
ID: 40330448
yes
0
 

Author Comment

by:Eprs_Admin
ID: 40384104
any more infos ?
0
 
LVL 121

Assisted Solution

by:Andrew Hancock (VMware vExpert / EE MVE^2)
Andrew Hancock (VMware vExpert / EE MVE^2) earned 500 total points
ID: 40384161
I would escalate this issue to NetApp Support, or your Supporting party.
0

Featured Post

Best Practices: Disaster Recovery Testing

Besides backup, any IT division should have a disaster recovery plan. You will find a few tips below relating to the development of such a plan and to what issues one should pay special attention in the course of backup planning.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article aims to explain the working of CircularLogArchiver. This tool was designed to solve the buildup of log file in cases where systems do not support circular logging or where circular logging is not enabled
Keystroke loggers have been around for a very long time. While the threat is old, some of the remedies are new!
This video teaches viewers how to encrypt an external drive that requires a password to read and edit the drive. All tasks are done in Disk Utility. Plug in the external drive you wish to encrypt: Make sure all previous data on the drive has been …
How to install and configure Citrix XenApp 6.5 - Part 1. In this video tutorial we have explained step by step installation of Citrix XenApp 6.5 Server on Windows Server 2008 R2 is explained in this video. We have explained the difference between…

691 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question