CHAPTER 5
SECURING NETWORK RESOURCES WITH
SHARE PERMISSIONS
Lesson 1: Introduction to Shared Folders ……………..
174
Lesson 2: Guildelines for
Planning Shared Folders …… 181
Lesson 3: Sharing Folders ………………………………
192
Lesson 4: Connecting to Shared folders ………………. 200
Shared Folders give users centralized access to network files. This chapter explains how to share
folders and how to assign permission for gaining access to the shared folder to user and group
accounts.
Lesson 1:
Introduction to Shared Folders
Windows NT enables you to designate disk resources that you want to share with others. For
example, when a folder is shared, authorized users can make connections to the folder (and
access it files) from their own computers.
What are Shared Folders?
Shared folders give network users centralized access to network files. When a folder is shared,
all users by default can connect to the shared folder and gain access to the folder’s content.
You can assign share permissions to user and group accounts to control what users can do with
the content of a shared folder. For example, if you want a user to only view files, you can assign
the user’s account (or a group of which the user is a member) the Read permission; if you want a
user to modify and add new files and folders, you can assign the Change permission.
Read = Read only
Change = Modify and add files and folders
A shared folder appears in Windows NT Explorer and My computer as an icon of a hand holding
the shared folder and is often referred to simply as a share.
NOTE: By default, the built-in Everyone group is automatically assigned Full Control permission
to all shared folders.
=====================================================================
wntadm5.html PAGE
2
2001/10/27
Why Share folders?
Shared folders are used to give users access to network programs, data and user home folders:
Network program folders centralize administration by designating one location for configuring and
upgrading software.
Data folders provide a central location for users to store and access common files.
User home folders provide a central location for users to store their own files. If home folders are
stored on a network server, they provide a central location for maintaining and backing up users’ data.
NOTE: If the volume where the folder is located is formatted as FAT (file allocation table), share
permissions are the only way to secure disk resources. If the volume is formatted with the Windows
NT File System (NTFS), NTFS permissions can be assigned for additional security.
Share Permissions
To control how users access a shared folder, you can assign share permissions to users, groups, or both.
The following illustration shows the hierarchy of share permissions, from most restrictive at the bottom to
least restrictive at the top.
LEAST
FULL CONTROL
RESTRICTIVE
CHANGE
READ
MOST
RESTRICTIVE
NO ACCESS
=====================================================================
wntadm5.html PAGE
3
2001/10/27
The following table describes the four share permissions.
=====================================================================
This permission Gives users the ability to
=====================================================================
Full Control Modify file permissions
(default permission Take Ownership of files on NTFS volumes.
for the Everyone Perform all tasks permitted by the Change and
Group) Read permissions.
Change Create folder and add files
Change data in files.
Append data to files.
Change file attributes.
Delete folders and files.
Perform all tasks permitted by the Read
permissions.
Read Display folder names and file names.
(execute) Display the data and attributes of files.
Run program files.
Access other folders within that folder.
No Access Establish only a connection to the shared folder.
Access to the folder is denied and the contents
Do not appear. This the most restrictive permission,
and is useful for high security. The No Access
permission overrides other permissions.
=====================================================================
Limitations of share Permissions
Share permissions are effective only when a user connects to the folder over the network. They do
not prevent users from gaining access to the folder while sitting at the computer where the folder
resides.
On Computes running Windows NT Server, where users do not have the Log on locally user right,
this is not a problem. However, on computers running Windows NT Workstations, users are
automatically assigned this user right that can bypass share permissions on their local computer.
If the volume where the folder resides is formatted with NTFS, you can secure local resources with
NTFS permissions.
=====================================================================
wntadm5.html PAGE
4
2001/10/27
How share Permissions are Applied
You can assign a user permissions to access a shared folder directly or as a member of a group.
If you assign different permissions to multiple groups of which the user is a member, the user gets all
the permissions, unless one of the permissions is the No Access permission.
There are two rules for how share permissions are applied:
effective permissions are the least restrictive permissions that result from the combination of the
user and group permissions.
permissions that are assigned to the user or to the groups of which the user is a member. No
access always becomes the effective permission.
Video Summary on Permissions:
There are two kinds of folder permissions, they are Shared Folder Permissions and NTFS Permissions.
NTFS Permissions combined with Shared Folder Permissions the effective permissions are the
combination of the user and group permissions. If No Access is either the user or group permissions,
then the most restrictive or No access becomes the effective permission. No Access always
overrides.
Shared folder Permissions FAT Only:
Share permissions are used with FAT. They only apply across the network, they do not apply
locally, the least restrictive will apply, unless it is NO ACCESS.
NTFS Permissions:
NOTE: Unlike “Shared Folder Permissions”, NTFS permissions can be assigned to other folders
and files in the same hierarchy for additional security.
=====================================================================
wntadm5.html PAGE
5
2001/10/27
Summary:
When shared folder permissions are combined with NTFS permissions, the most restrictive
permission becomes the effective permission.
Together, they provide the highest level of security for folders and files.
Multiple Permissions
(page 177)
In the following illustration, User 1 is assigned Full Control permission to the shared folder named
Public. Full Control is the least restrictive permission, User1 is also a member of the Everyone
group to which a different permission, Read, is assigned. User1 ‘s effective permissions are the
combination of the user and group permissions, in this case, Full Control (Full control includes
the permissions Read and change. Full control has almost no restrictions, so therefore it is the
least restrictive.
The No Access Permission
In the following illustration, User 1 is assigned Read permission to the shared folder named Public.
User 1 is also a member of the Sales group to which a different permission, No Access, is
assigned. Therefore, User1’s effective permissions are none because the No Access permission
overrides any other permissions assigned to a user or to groups to which the user belongs.
Example of Applied Permissions (page 178)
The following two illustrations show two examples of applied share permissions. Examine each
illustration and determine the effective permissions for User 1.
Example A shows that User1 is a member of Group1, Group2, Group3, and Group4. Group1
does not have any permissions for Folder-A. Group2 has read permissions, Group3 has Change
permission, and Group4 has Full Control permission for shared Folder-A.
The Answer is Full control is the effective permission for User’1. Full Control already included
Read and Change. Don’t forget the effective permissions are the least restrictive.
Example B shows that User1 is a member of Group1, Group2, and Group3. Group1 does not
have any permissions for Folder-B. Group2 has Change permission and Group3 has Read
permission. Additionally, User 1 is assigned the No Access permission.
In Example B, No Access is the effective permission, to Folder-B. No Access over-rides all
other permissions.
=====================================================================
wntadm5.html PAGE
6
2001/10/27
Lesson 2:
Guidelines for Planning Shared Folders
Before you begin sharing folders, you need to determine what resources to share and to whom.
For a network to be successful, network programs, public and working data, and user home
folders must be easily accessible to authorized users.
When Sharing folders consider the following:
that folders with the same security requirements are located within one folder hierarchy.
For example, if users require Read permission to several program folders, store those
folders within the same folder.
For example, of the folder Application, use the share name Apps.
The following table describes share and folder naming conventions.
=====================================================================
Client Share
Name Folder Name
=====================================================================
Windows 95 and up, Windows 9X 12 characters 255 characters
Windows NT 80 character 255 characters
MS-DOS, Windows 3.x and 8.3 characters 8.3 characters
Windows for
Workgroups
=====================================================================
NOTE: For client operating systems that can only read 8.3 characters, Windows NT
provides 8.3 character equivalent names, but the resulting names are not always intuitive
for users. For example, a folder named Accountants Database, would appear as
Accoun~1 to clients running MS-DOS, Windows 3.x and Windows for Workgroups.
Examples of Shared Folders
How you organize folders may help you to secure data. For example, if you group folders
with the same security requirements in one hierarchy, you only have to share the top-level
=====================================================================
wntadm5.html PAGE
7 2001/10/27
folder. Users with the appropriate permissions have the same level of access to the contents
of the shared folder, but cannot access folders that are at the higher level or at the same level
as the shared folder.(look at the example on page 182)
Guidelines for Assigning Permissions:
When you assign share permissions to users and groups, use the following general guidelines:
Sales may only require read, Administrators group may require Full Control etc.
member server or computer running Windows NT Workstation, the local group for the resource
is created on that computer. If the resource resides on a domain controller, the local group is
created from any computer running User Manager for Domains.
the resource to the local group. For example, if users need only to read information in a folder,
and they will never delete or create files, then assign the Read permission for those users.
Everyone group contains all user accounts who have access to your network, and Everyone
includes the Guest account. If you want all users to have access to the resource, use the Users
group instead. In a domain, the users group only contains domain user accounts that you created.
In a workgroup, the Users group contains local user accounts.
Guidelines for Sharing Network Program Folders:
In a large network, one or more servers may be dedicated to storing programs. In a small
network, one server may be used for both programs and data. The program folders that you
share will vary with each network.
=====================================================================
wntadm5.html PAGE
8
2001/10/27
Consider the following guidelines when planning network program
folders:
(see page 184)
access.
the Users group to provide tighter security.
to those folders. For example, to give members of Group1 access to only the spreadsheet
program, share the folder for the spreadsheet program and assign Group1 the appropriate
permission.
Guidelines for Sharing Data Folders
Data folders are used by network users to exchange or share common files. In planning shared data
folders, consider creating shared folders for keeping information that is public to employees of the
company.
If your hard disk has more than one volume, create and share a data folders on a volume separate
from the operating system and programs. Having data folders in one location streamlines backup
procedures. Additionally, in the unlikely event that the operating system volume needs to be
reformatted, public data will remain intact.
Public Data Folders
Public data folders contain files that employees need to gain access to for reading purposes only,
for example benefits information or blank expense report forms.
folders and to the Administrators group
Working Data Folders
Working data folders give employees a central location for storing and exchanging working files.
Most employees need the ability to add and remove files from common working data folders.
=====================================================================
wntadm5.html PAGE
9 2001/10/27
access to those folders.
For example, to protect data in the Accountants folder, share that folder to only the Accountants
group and assign that group Change permission. Then, members of the Accounts group can
access the Accountants shared folder. Administrators have access by connecting to the Data
shared folder.
Guidelines for Sharing Home Folders
On FAT volumes, when you create a user account and you want that user to have a home folder,
you must first create a home folder structure on the server. You share individual home folders on
a FAT volume because share permissions are the only way to restrict access.
programs. This streamlines backup and restore procedures. If the operating system volume
requires reformatting, the volume containing the home folders will remain intact.
her user name. For example, for the user name Ericb, create a folder named Ericb.
NOTE: On a FAT volume, you need to create and share home folders before you specify
the home folder path in User Manager for Domains. On an NTFS volume, this step is not
necessary.
his or her home folder. This guarantees privacy to the user because he or she is the only
person who can connect to his or her home folder. This is the only way to protect users’
folder on a FAT volume.
You will also be able to perform administrative tasks on home folders by logging on to the
server locally, or by connecting to an administrative share (C$, D$, and so on), which
provides access to the root of the respective volume.
=====================================================================
wntadm5.html PAGE
10
2001/10/27
Lesson 3:
Sharing Folders
To share a folder, you must be a member of the built-in Administrators, Server Operators or Power
User group on the computer where the shared folder is being shared.
NOTE: On NTFS volumes, you can give a user the ability to share folders by assigning the user the
List permission to the folder.
Administrative Shares
Windows NT provides administrative share to make it easy to gain access to the root of a volume.
The root of each volume on a hard disk is automatically shared, using the drive letter appended with
a dollar sign ($) for example, C$ and D$ and E$ etc. The dollar sign hides the shared folder from
users who browse the computer. When you connect to this folder, you have access to the entire
volume. You use the administrative shares to remotely connect to the computer to perform
administrative tasks.
NOTE: Windows NT also shares the systemroot folder as Admin$. This is a special shared
folder that is required by the system only during remote administration.
Sharing a Folders
The first step in sharing a folder is to assign it a share name. Share names are assigned on the
Sharing tab in the folder_name Properties.
Assigning Share Permissions
After you assign a share name, the next step is to specify which users can access the shared folder
by assigning permissions to selected users or groups. By default, when a folder is shared, the
Everyone group is assigned the Full Control permission. For most folders, you will want to
remove the Full control permission from Everyone and assign permissions to specific user and
group accounts.
=====================================================================
wntadm5.html PAGE
11
2001/10/27
If you want to assign permissions to a user or group in a
different domain:
verify that your computer fits this criteria, log off, press CTRL+ALT+DELETE, and then view
the names that appear in the Domain box. If more than one name exits, then the trust is set-up.
perform administration tasks in other domains, add the global group Domain Admins to the local
Administrators group on the computer in the domain that you want Administrators to administer.
Modifying Shared Folders
You can modify all shared folder options on the folder_name Properties dialog box.
Lesson 4:
Connecting to Shared Folders
There are two ways to locate and connect to shared folders. Once you share a folder, network
users can connect to it using the Map Network Drive command in Windows NT Explorer or the
RUN command.
Using the Map Network Drive Command
When you connect to a shared folder using the Map Network Drive command, the shared
folder appears as a drive on your computer, and the contents of the shared folder can be viewed
as if they were on your computer. Because the drive letter is saved in a user profile, you can have
the connection re-established each time you log on.
Using the Run Command
Using the Run command the user can browse all shared folders on a computer without knowing the
share name assigned to a specific shared folder. You only need to know the name of the computer.
The run command does not assign a drive letter to the shared folder, so the connection does not
appear within a program.