The security principle of single-host and multi-user is also applicable here. All single-host users should adopt the same security principle as those on the network. In addition, the security of network user resource sharing also has different management methods and skills, which deserves further research and exploration.
Here we will introduce a secure shared folder method. When you set the resource to shared, add a "$" symbol (Figure 48) after the Network Share Name, when you enable "Network neighbors", you will find that the configured shared resources do not appear. However, this shared resource actually exists. After you tell a network user with access permission to the actual Network Share Name of the resource, the user can use the "image network drive" function described above to access this hidden shared resource. In the same way, you can hide the printer and share it with the network users you want to access. This is also the best way to ensure the security of shared resources.
Finally, no matter which LAN is in, you must set "Security Settings" → "Local Policy" → "User Rights Assignment" to "Deny local Logon" on "Local Security Policy" (figure 49 ), this ensures the environment for standalone login. Similarly, the setting of "Local Security Policy" is still the biggest guarantee for the security of LAN shared resources.