Solved

access based enumeration

Posted on 2014-09-18
6
153 Views
Last Modified: 2014-10-17
Hi Experts,

on my NETAPP 2552 I have shares and the shares have AccessBasedEnumeration ABE enabled.
on one share I have set our it access right.
My test user hasn´t this access rights -> so ABE should not show the share.

But when I connect with the test user and type \\netapp\ then I see all shares. Why ?
0
Comment
Question by:Eprs_Admin
  • 3
  • 3
6 Comments
 
LVL 120

Accepted Solution

by:
Andrew Hancock (VMware vExpert / EE MVE^2) earned 500 total points
ID: 40329956
Make sure all your shares on the NetApp have been enabled for AccessBasedEnumeration

cifs shares -change sharename -accessbasedenum

it's not the default.
0
 

Author Comment

by:Eprs_Admin
ID: 40330299
All shares , except the default onces, are now set to ABE.

Still the same, the user with no rights can see the share under \\netapp\
But the user cannot access the share.
0
 
LVL 120
ID: 40330346
This NetApp is connected to Active Directory?
0
Visualize your virtual and backup environments

Create well-organized and polished visualizations of your virtual and backup environments when planning VMware vSphere, Microsoft Hyper-V or Veeam deployments. It helps you to gain better visibility and valuable business insights.

 

Author Comment

by:Eprs_Admin
ID: 40330448
yes
0
 

Author Comment

by:Eprs_Admin
ID: 40384104
any more infos ?
0
 
LVL 120

Assisted Solution

by:Andrew Hancock (VMware vExpert / EE MVE^2)
Andrew Hancock (VMware vExpert / EE MVE^2) earned 500 total points
ID: 40384161
I would escalate this issue to NetApp Support, or your Supporting party.
0

Featured Post

Now Available: Firebox Cloud for AWS and FireboxV

Firebox Cloud brings the protection of WatchGuard’s leading Firebox UTM appliances to public cloud environments. It enables organizations to extend their security perimeter to protect business-critical assets in Amazon Web Services (AWS).

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Most of the applications these days are on Cloud. Cloud is ubiquitous with many service providers in the market. Since it has many benefits such as cost reduction, software updates, remote access, disaster recovery and much more.
Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks.  Concludes by examining the means of securing and protecting critical systems and inf…
This Micro Tutorial will teach you how to reformat your flash drive. Sometimes your flash drive may have issues carrying files so this will completely restore it to manufacturing settings. Make sure to backup all files before reformatting. This w…
In this video tutorial I show you the main steps to install and configure  a VMware ESXi6.0 server. The video has my comments as text on the screen and you can pause anytime when needed. Hope this will be helpful. Verify that your hardware and BIO…

697 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question