Solved

Permission on AD network path

Posted on 2016-07-27
4
36 Views
Last Modified: 2016-07-31
Hi All,

Is it possible to give network folder rights in such a way that:
user can not browse that folder from windows explorer but he can copy files from that location if he knows the filename from that path?

What I mean to say:
Suppose there is a folder at:
\\10.136.18.75\dm\abc\

Now there are couple of files at that path, say:
\\10.136.18.75\dm\abc\a.txt
\\10.136.18.75\dm\abc\b.log
\\10.136.18.75\dm\abc\c.tmp
\\10.136.18.75\dm\abc\d.dwg

etc etc

Now, I want to give user permission in such a way that, all users can not browse \\10.136.18.75\dm\abc\ from windows explorer but if he wants to copy "\\10.136.18.75\dm\abc\a.txt" file, he can do it from command line or dos window. Is it possible?

Regards,
Soumen
0
Comment
Question by:Soumen Roy
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
4 Comments
 
LVL 12

Expert Comment

by:Benjamin Voglar
ID: 41732557
That's what I tried to do some time ago. It is impossible. Sorry.
0
 

Author Comment

by:Soumen Roy
ID: 41732846
If it is not possible, is there any way to make all files invisible to someone who tries to open files from those directories from Windows explorer?

Regards,
Soumen
0
 
LVL 12

Accepted Solution

by:
Benjamin Voglar earned 500 total points
ID: 41732865
Yes. You have to have windows server 2012 file server. The feature is Access-based Enumeration

https://technet.microsoft.com/en-us/library/dd772681(v=ws.10).aspx
1
 

Author Comment

by:Soumen Roy
ID: 41732871
@Benjamin:

Thank you for your advice. But is it possible that user will have read rights but will not view those? Whatever you suggested is close to that but not exactly. Is there any way?

Regards,
Soumen
0

Featured Post

Creating Instructional Tutorials  

For Any Use & On Any Platform

Contextual Guidance at the moment of need helps your employees/users adopt software o& achieve even the most complex tasks instantly. Boost knowledge retention, software adoption & employee engagement with easy solution.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Group policies can be applied selectively to specific devices with the help of groups. Utilising this, it is possible to phase-in group policies, over a period of time, by randomly adding non-members user or computers at a set interval, to a group f…
This article explains the fundamentals of industrial networking which ultimately is the backbone network which is providing communications for process devices like robots and other not so interesting stuff.
This video shows how to use Hyena, from SystemTools Software, to update 100 user accounts from an external text file. View in 1080p for best video quality.
In this video we outline the Physical Segments view of NetCrunch network monitor. By following this brief how-to video, you will be able to learn how NetCrunch visualizes your network, how granular is the information collected, as well as where to f…

626 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question