Solved

Potential virus

Posted on 2014-09-19
7
157 Views
Last Modified: 2014-09-24
I was going to add/remove a user from one of our shares and it seems that the root of the folder's name was changed to "Saved Games".  Seems like the users who connect to this share have not had any issues as far as not being able to connect; however, we wanted to know what is going on with this and needed assistance on where to start as far making sure this was not done to hurt us.

Any ideas?
0
Comment
Question by:uppercut7141
  • 4
  • 3
7 Comments
 
LVL 1

Expert Comment

by:jscott337
ID: 40333171
0
 

Author Comment

by:uppercut7141
ID: 40333234
don't see a desktop.ini under this directory.
0
 
LVL 1

Expert Comment

by:jscott337
ID: 40333246
0
Enterprise Mobility and BYOD For Dummies

Like “For Dummies” books, you can read this in whatever order you choose and learn about mobility and BYOD; and how to put a competitive mobile infrastructure in place. Developed for SMBs and large enterprises alike, you will find helpful use cases, planning, and implementation.

 

Author Comment

by:uppercut7141
ID: 40333259
Yes, I did do this.
0
 
LVL 1

Accepted Solution

by:
jscott337 earned 500 total points
ID: 40333298
Sorry about that, it's a hidden protected operating system file. Uncheck it and you should be able to see it.
0
 

Author Comment

by:uppercut7141
ID: 40336768
Hello,  

I've done this, but still no luch.
0
 

Author Comment

by:uppercut7141
ID: 40336861
luck.
0

Featured Post

Windows Server 2016: All you need to know

Learn about Hyper-V features that increase functionality and usability of Microsoft Windows Server 2016. Also, throughout this eBook, you’ll find some basic PowerShell examples that will help you leverage the scripts in your environments!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Phishing is at the top of most security top 10 efforts you should be pursuing in 2016 and beyond. If you don't have phishing incorporated into your Security Awareness Program yet, now is the time. Phishers, and the scams they use, are only going to …
How to set-up an On Demand, IPSec, Site to SIte, VPN from a Draytek Vigor Router to a Cyberoam UTM Appliance. A concise guide to the settings required on both devices
This tutorial gives a high-level tour of the interface of Marketo (a marketing automation tool to help businesses track and engage prospective customers and drive them to purchase). You will see the main areas including Marketing Activities, Design …
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

773 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question