In our company, this type of handyman is the file sharing server ..... this is the top priority of the company. We hope that the leaders of the company will be able to pay attention to the following issues !!!!
The role of shared files is to facilitate mutual ownership.
Files on the shared server can only be temporarily stored, rather than being permanently stored...
It may be that people are lazy, so employees in every company prefer to work directly in shared files (such as editing ), in fact, this is the most important thing about server resources and dangers.
Eg:
After you edit the file and save it, you will find that the original error has been corrected. Do you want to restore it? It is really a tragedy (I cannot find the required information, and at the same time, it also makes my colleagues unable to possess relevant information resources...
If you copy, paste to the local hard disk, edit, and other operations, and then copy and paste them to the shared disk, this is the safest practice.
But it is counterproductive, so we have to find a way to wipe their ass ....
Sadly, we:
Well, they think it should be done. There is also a rational saying: Do you want to do it ?? (As if we took the money in his pocket ...)
If they suffer losses due to their misoperations, they will also say, "help me find them quickly, I can't find the files I want (they won't say they lost, deleted, or changed )...
Due to the various situations above, we are forced to make ourselves more comfortable. We can only set some specific settings for the above work. The setting requirements are as follows:
Each department sets its own permissions (this department can only delete, edit, and change the files of this department, and other departments cannot access the files)
Set shadow copies and quotas
The Shared Server maps to the local disk.
The following is the test environment of our experiment (operations can only be performed on virtual machines due to machine problems .) The figure is as follows:
650) This. width = 650; "src =" http://s3.51cto.com/wyfs02/M01/49/21/wKiom1QPyz-CZ6OSAAGmVXBlORM348.jpg "Title =" 1.png" alt = "wKiom1QPyz-CZ6OSAAGmVXBlORM348.jpg"/>
After the topology is set up, we start to work...
Step 1: Set the respective permissions of each department (this department can only delete, edit, and change the files of this department, and other departments cannot access the files)
A. Create a folder to be shared:
Next I will create a file on the file server ), keep file folder for sharing settings, and then in the shared file, give the corresponding folders (HR/IT/Finance Department) to the three departments, for example:
650) This. width = 650; "src =" http://s3.51cto.com/wyfs02/M00/49/3A/wKioL1QRGuySKO5HAAyMhDRfClA169.png "style =" float: none; "Title =" 1.png" alt = "wkiol1qrguysko5haaymhdrfcla169.png"/>
Note:
1: If your system is not a server system, remember to use simple file sharing in "Folder Options". Remove the check box before this option, or you cannot perform advanced settings.
The method to cancel is as follows: Tools, Folder Options, view, and simple Folder Options.
650) This. width = 650; "src =" http://s3.51cto.com/wyfs02/M01/49/38/wKiom1QRGt_hYv1YAA66eJ0PY9A966.png "Title =" 2.png" alt = "wkiom1qrgt_hyv1yaa66ej0py9a966.png"/>
2: By default, the computer will share the disk, but the previous $ (the dollar symbol represents the hidden meaning) is usually added, so we need to cancel the sharing first, confirm and then perform the sharing operation.
650) This. width = 650; "src =" http://s3.51cto.com/wyfs02/M02/49/3A/wKioL1QRGu_BVDL_AA4BPEAXXE4227.png "Title =" 3.png" alt = "wkiol1qrgu_bvdl_aa4bpeaxxe4227.png"/>
3. Generally, we do not want to share the entire disk. just share the folder on the disk ....
650) This. width = 650; "src =" http://s3.51cto.com/wyfs02/M00/49/38/wKiom1QRGuPwmabwAAL9rl1kbvk518.jpg "Title =" 4.png" alt = "wkiom1qrgupwmabwaal9rl1kbvk518.jpg"/>
In general, we will delete all the other users in the security options. However, when deleting the security options, we need to select relevant settings. If it is not possible to delete the security options, the operations are as follows:
650) This. width = 650; "src =" http://s3.51cto.com/wyfs02/M01/49/38/wKiom1QRGuXSBuX-AANZQ4ukBKA194.jpg "Title =" 5.png" alt = "wKiom1QRGuXSBuX-AANZQ4ukBKA194.jpg"/>
Note: You must select copy.
650) This. width = 650; "src =" http://s3.51cto.com/wyfs02/M00/49/38/wKiom1QRGujg2eqoAAMlEaYS3kU808.jpg "Title =" 6.png" alt = "wkiom1qrgujg2eqoaamleays3ku808.jpg"/>
650) This. width = 650; "src =" http://s3.51cto.com/wyfs02/M01/49/38/wKiom1QRGuzhse7tAAOTjDcF1m4689.jpg "Title =" 7.png" alt = "wkiom1qrguzhse7taaotjdcf1m4689.jpg"/>
650) This. width = 650; "src =" http://s3.51cto.com/wyfs02/M02/49/38/wKiom1QRGu7CgpfbAA4BPOTwlU4487.png "Title =" 8.png" alt = "wkiom1qrgu7cgpfbaa4bpotwlu4487.png"/>
After a series of operations, we can delete other users in the security, and delete unnecessary users, then add the corresponding user group in the folder of each department. OK ....
Because of the domain control settings, you only need to add user groups without adding them one by one. This is the convenience of domain control.
650) This. width = 650; "src =" http://s3.51cto.com/wyfs02/M00/49/3A/wKioL1QRGv2gjufIAA4QODt7zcQ860.png "Title =" 9.png" alt = "wkiol1qrgv2gjufiaa4qodt7zcq860.png"/>
650) This. width = 650; "src =" http://s3.51cto.com/wyfs02/M00/49/38/wKiom1QRGvDjeq55AA4BOI5w_qg527.png "Title =" 10.png" alt = "wkiom1qrgvdjeq55aa4boi5w_qg527.png"/>
650) This. width = 650; "src =" http://s3.51cto.com/wyfs02/M01/49/3A/wKioL1QRGwDQZkGCAA4XuO6z7Bc197.png "Title =" 11.png" alt = "wkiol1qrgwdqzkgcaa4xuo6z7bc197.png"/>
650) This. width = 650; "src =" http://s3.51cto.com/wyfs02/M01/49/38/wKiom1QRGvKDHcxYAA35wIstvfc308.png "Title =" 12.png" alt = "wkiom1qrgvkdhcxyaa351_vfc308.png"/>
After we perform the above operations on the server, all we need to do now is to directly use the corresponding group members for testing. Now we will use the HR department users to perform relevant tests on the client.
For example:
650) This. width = 650; "src =" http://s3.51cto.com/wyfs02/M02/49/3A/wKioL1QRGwLSJV5eAA3q0N0KIg0726.png "Title =" 13.png" alt = "wkiol1qrgwlsjv5eaa3q0n0kig0w.png"/>
From the above we can see that we can normally browse and edit the content in the folder of this department, but what about folders of other departments?
For example
650) This. width = 650; "src =" http://s3.51cto.com/wyfs02/M02/49/38/wKiom1QRGvXCx92tAA3UdDFnZhU918.png "Title =" 14.png" alt = "wkiom1qrgvxcx92taa3uddfnzhu918.png"/>
The test shows that access is denied.
By now, we can achieve our desired effect: members of the department can perform operations on the folders of the Department, but cannot perform operations on the folders shared by other departments (directly deny access)
Step 2: Set shadow copies and quotas
To set a Shadow Copy, follow these steps:
A. You can find the configuration shadow copy in the file server management office.
B. You can also right-click the disk (such as an e-disk), select properties, and copy the shadow.
650) This. width = 650; "src =" http://s3.51cto.com/wyfs02/M00/49/3A/wKioL1QRGwajpjirAALfble_F6s499.jpg "Title =" 15.png" alt = "wkiol1qrgwajpjiraalfble_f6s499.jpg"/>
Here, you only need to set it according to your own needs ....
650) This. width = 650; "src =" http://s3.51cto.com/wyfs02/M01/49/3A/wKioL1QRGwnDLio6AALBSiXc_7E495.jpg "Title =" 16.png" alt = "wkiol1qrgwndlio6aalbsixc_7e495.jpg"/>
Settings in the plan: This depends on the start time and end time.
It is recommended that you set the parameter value twice a day...
650) This. width = 650; "src =" http://s3.51cto.com/wyfs02/M00/49/38/wKiom1QRGvyAkVHbAAHkQeU3uZ0604.jpg "Title =" 17.png" alt = "wkiom1qrgvyakv1_ahkqeu3uz0604.jpg"/>
650) This. width = 650; "src =" http://s3.51cto.com/wyfs02/M01/49/3A/wKioL1QRGw7D0RUiAAOocuBHLPc702.jpg "Title =" 18.png" alt = "wkiol1qrgw7d0ruiaaoocubhlpc702.jpg"/>
Step 3: map the shared server to a local disk.
In general, we will map the shared disk to the computer on the client, where I will directly use the batch processing method to operate:
Create a notebook on your computer and write the following content in it:
-------------------------------------------------------------------------
@ Eacho off
@ Tiele disk ing _ hznethome // here is the title
CD ..
CD ..
CD .. // here is returned to C:>
CLS // here is to clear the screen
@ Color a // set the color of the output font.
Net use I:/del/y // Delete the existing F disk first to prevent duplication.
Net use I: \ s0301 \ shared file // here, the shared folder is mapped to the local computer (in the form of an I disk)
Pause // here is the prompt to press any key to exit (to facilitate the confirmation that the command runs successfully)
---------------------------------------------------------------------------
Note: change the above path to your file path ....
Save the text as. bat, and double-click it to run it ......
For example:
650) This. width = 650; "src =" http://s3.51cto.com/wyfs02/M01/49/3B/wKiom1QRR32ynKpcAAJYL_0WhmE704.jpg "Title =" 19.png" alt = "wkiom1qrr32ynkpcaajyl_0whme704.jpg"/>
650) This. width = 650; "src =" http://s3.51cto.com/wyfs02/M01/49/3B/wKiom1QRR4Cjk_4PAAI4Wu4oNF0472.jpg "Title =" 20.png" alt = "wkiom1qrr4cjk_4paai4wu4onf0472.jpg"/>
650) This. width = 650; "src =" http://s3.51cto.com/wyfs02/M02/49/3D/wKioL1QRR5LjeK7AAANkbJAaMhs550.jpg "Title =" 21.png" alt = "wkiol1qrr5ljek7aaankbjaamhs550.jpg"/>
This article is from "last bus !!!" Blog, please be sure to keep this source http://hznethome.blog.51cto.com/722914/1551172
Domain control for enterprise O & M (14)-domain shared files (server and client) settings