Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

Permission on AD network path

Posted on 2016-07-27
4
Medium Priority
?
40 Views
Last Modified: 2016-07-31
Hi All,

Is it possible to give network folder rights in such a way that:
user can not browse that folder from windows explorer but he can copy files from that location if he knows the filename from that path?

What I mean to say:
Suppose there is a folder at:
\\10.136.18.75\dm\abc\

Now there are couple of files at that path, say:
\\10.136.18.75\dm\abc\a.txt
\\10.136.18.75\dm\abc\b.log
\\10.136.18.75\dm\abc\c.tmp
\\10.136.18.75\dm\abc\d.dwg

etc etc

Now, I want to give user permission in such a way that, all users can not browse \\10.136.18.75\dm\abc\ from windows explorer but if he wants to copy "\\10.136.18.75\dm\abc\a.txt" file, he can do it from command line or dos window. Is it possible?

Regards,
Soumen
0
Comment
Question by:Soumen Roy
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
4 Comments
 
LVL 12

Expert Comment

by:Benjamin Voglar
ID: 41732557
That's what I tried to do some time ago. It is impossible. Sorry.
0
 

Author Comment

by:Soumen Roy
ID: 41732846
If it is not possible, is there any way to make all files invisible to someone who tries to open files from those directories from Windows explorer?

Regards,
Soumen
0
 
LVL 12

Accepted Solution

by:
Benjamin Voglar earned 2000 total points
ID: 41732865
Yes. You have to have windows server 2012 file server. The feature is Access-based Enumeration

https://technet.microsoft.com/en-us/library/dd772681(v=ws.10).aspx
1
 

Author Comment

by:Soumen Roy
ID: 41732871
@Benjamin:

Thank you for your advice. But is it possible that user will have read rights but will not view those? Whatever you suggested is close to that but not exactly. Is there any way?

Regards,
Soumen
0

Featured Post

Get your Conversational Ransomware Defense e‑book

This e-book gives you an insight into the ransomware threat and reviews the fundamentals of top-notch ransomware preparedness and recovery. To help you protect yourself and your organization. The initial infection may be inevitable, so the best protection is to be fully prepared.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This process allows computer passwords to be managed and secured without using LAPS. This is an improvement on an existing process, enhanced to store password encrypted, instead of clear-text files within SQL
Let's recap what we learned from yesterday's Skyport Systems webinar.
NetCrunch network monitor is a highly extensive platform for network monitoring and alert generation. In this video you'll see a live demo of NetCrunch with most notable features explained in a walk-through manner. You'll also get to know the philos…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

722 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question