IT tutorials
 
Windows
 

Windows Small Business Server 2011 : Special Shares

- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019
11/29/2012 9:26:51 AM
In addition to shares created by a user or administrator, the system creates a number of special shares that shouldn’t be modified or deleted. These include the administrative shares: the ADMIN$ share and the hidden shares for each hard drive volume (C$, D$, E$, and so on). These shares allow administrators to connect to drives that are otherwise not shared. These shares are not visible by default and can be connected to only by administrators.

Special shares exist as part of the operating system’s installation. Depending on the computer’s configuration, some or all of the following special shares might be present (and none should be modified or deleted):

  • ADMIN$ Used during the remote administration of a computer. The path is always the location of the folder in which Windows was installed (that is, the system root). Only Administrators can connect to this share.

  • driveletter$ The root folder of the named drive. Only Administrators can connect to these shares on Windows SBS servers or clients.

  • IPC$ Used during remote administration and when viewing shared resources. This share is essential to communication and can’t be deleted.

  • NETLOGON Used while processing domain logon requests. Do not remove.

  • SYSVOL Required on domain controllers. Do not remove.

  • PRINT$ A resource that supports shared printers.

To connect to an unshared drive on another computer, you need to be logged on using an account with the necessary rights. Use the address bar in any window, and type the address using the following syntax:

\\computer_name\[driveletter]$

To connect to the system root folder (the folder in which Windows SBS is installed) on another computer, use the following syntax:

\\computer_name\admin$

1. Ownership and How It Works

Every object on an NTFS volume has an owner. By default, the owner is the person who created the file or folder. The owner controls how permissions are set on the object and to whom permissions are granted. Even if the owner is denied access, the owner can always change permissions on an object. The only way to prevent this is for the ownership to change.

Ownership of an object can change in any of the following ways:

  • An administrator can take ownership.

  • Any user or group with administrative rights on the computer where the object resides can take ownership.

  • The owner can transfer ownership to another user if the owner has administrative rights or User Account Control is turned off.

1.1. Taking Ownership of an Object

To take ownership of an object, you must be logged on as an Administrator or as a remote user with administrative rights, and then follow these steps:

  1. Right-click the object and select Properties. Click the Security tab.

  2. Click Advanced and then click the Owner tab. Click Edit.

    To change the owner to a user or group that is not listed, click Other Users And Groups. In the Select User, Computer, Or Group dialog box, type the name of the user or group, click Check Names, and then click OK.

    To change the owner to a user or group that is listed, in the Change Owner To box, click the new owner.

  3. To change the owner of all subcontainers, select the Replace Owner On Subcontainers And Objects check box.

1.2. Transferring Ownership

Users with administrative credentials can transfer ownership of an object by following these steps:

  1. Right-click the object and select Properties. Click the Security tab.

  2. Click Advanced and then click the Owner tab. Click Edit.

  3. If the proposed new owner is in the Change Owner To list, select the name as shown in Figure 1 and click OK.

    Figure 1. Transferring ownership

  4. If the proposed new owner isn’t listed, click Other Users Or Groups to open the Select User, Computer Or Group dialog box.

  5. Locate the new owner and click OK.

  6. Select the new owner in the Change Owner To list and click OK.

REAL WORLD: Uses for Share Permissions

It’s generally best to use NTFS file permissions instead of share-level permissions to control access to shared resources over the network. Using share-level permissions alone gives you significantly less control over the specific permissions being granted, and they’re less secure than file system permissions because they apply only to users connecting over the network.

However, there are some exceptions to this rule. For example, you might want to permit all authenticated users to access a volume in a certain subfolder but allow only a certain group to access the root directory. In this instance, you can create two file shares: one at the subfolder level with no share-level security (Full Control For Everyone), and one at the root folder level with share-level security to allow only the specified group access.

Somewhat more useful is the ability to hide file shares by adding the dollar sign character ($) to the end of the share name. This notation allows any user to connect to the share—provided that she knows the share name. After users connect, they’re still bound by NTFS security permissions, but this approach can be handy for storing advanced tools so that an administrator can access them from a user’s system or user account. File security isn’t really an issue—you just don’t want users messing around with the files.

 
Others
 
- Windows Small Business Server 2011 : Adding a Shared Folder
- Windows Vista : Mastering File Types - Working with Existing File Types
- Windows Vista : Mastering File Types - Understanding File Types
- Windows Server : Planning for Data Sharing and Collaboration (part 2) - DFS Replication Advanced Settings and Features, Planning a SharePoint Infrastructure
- Windows Server : Planning for Data Sharing and Collaboration (part 1) - Planning a DFS Deployment, DFS Namespaces Advanced Settings and Features
- Exploring Windows 8 Apps : Working with Apps (part 2) - Displaying the Apps Panel,Tiling Apps
- Exploring Windows 8 Apps : Working with Apps (part 1) - Exploring a Program “Window”, Checking Out a Metro App
- Exploring Windows 8 Apps : Finding and Starting Apps
- Windows 7 : Running Programs and Gadgets - Composing a Document
- Windows 7 : Running Programs and Gadgets - Using the Ribbon
 
 
Top 10
 
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
Technology FAQ
- Is possible to just to use a wireless router to extend wireless access to wireless access points?
- Ruby - Insert Struct to MySql
- how to find my Symantec pcAnywhere serial number
- About direct X / Open GL issue
- How to determine eclipse version?
- What SAN cert Exchange 2010 for UM, OA?
- How do I populate a SQL Express table from Excel file?
- code for express check out with Paypal.
- Problem with Templated User Control
- ShellExecute SW_HIDE
programming4us programming4us