How to set the access permission for shared files on the LAN and record the access logs of shared files on the LAN

Source: Internet
Author: User
Tags password protection to domain

How to set the access permission for shared files on the LAN and record the access logs of shared files on the LAN
Currently, many local networks have file servers, which usually share files for access by LAN users. However, to protect the security of shared files and prevent arbitrary access to shared files, sometimes we often need to prohibit copying shared file content, saving shared files as local disks, and printing shared files. How can this problem be solved?

The author believes that the following two aspects can be implemented:
Method 1: Enable password to protect the security of shared files, prevent unauthorized access to shared files, and delete shared files.

After the "enable password protection sharing" setting is enabled, when users attempt to access your computer, they must first enter a credential, this credential is the username and password of an account on your computer (this account must have a password to access ). After the credential is verified, you can see the available shared folder. When you further access a folder, you also need to match the creden。 you just entered with the shared access permission of the folder. If you have the permission to access the folder, you can continue. (Enabling password protection sharing does not apply to domain networks)
Figure: Enable password protection sharing. Therefore, to smoothly access the shared folder and its content, in addition to ensuring that the computer is located in the same working group and can communicate with each other on the same network segment, you also need to specify an appropriate account for the folder and assign permissions, and ask the visitor to enter the creden。 (username and password) for the account when the credential input box pops up for the first time ). Next we will use an instance to see how to correctly share and access.
Assume there are two PCs, named A and B. You are going to create A shared folder on A and use Eric's local account for protection, then, let the user on B use the creden。 of user Eric on computer A to access. So we need to do this:
1. prepare the folder to be shared on A. For example, create A folder named "Share", right-click it, select "properties", and switch to the "Share" tab.
 
In fact, in the lower part of this tab, we can clearly see that the current computer is in the password protection sharing state, users must have the user account and password of this computer to list shared folders.
2. Click "Advanced sharing" to bring up the advanced sharing configuration dialog box. Select the check box before "share this folder" and click "permission.
3. In the displayed permission configuration dialog box, select and delete the default "Everyone" group.
Note: if you do not follow these steps, you can use the "Everyone" group by default, only visitors can access this shared folder after entering any creden。 of your local account with a password and passing the verification. Then, follow these steps to access the shared content only after the creden。 of the specified account are provided and verified.
4. click "add". In the "select user or group" dialog box that appears, enter the account name of a local user account with a password, click "Check name" on the right. If the name you entered is correct, the computer name is automatically added to the front-end of the name, and the name is underlined. For example, enter "Eric" here. Check the name as follows:
Note: you must add a user name with a password and have the right to access the file (folder) You want to share, because when you enter creden for remote access, empty passwords are not accepted. Of course, you can also add the username of the account currently logged on to computer A (this account also requires A logon password ).
5. in the "select user or group" dialog box, click "OK" and return to the permission Settings dialog box. We can further select this option, it is determined whether the remote user can read-only or change the files in the shared access. For example, we want this password-protected sharing to allow authorized users to change, delete, and so on, you can check the box in the "allow" column corresponding to "full control" and click "OK ".
6. Return to the "advanced sharing" configuration dialog box and click "OK" to apply permission settings. Then, we can close the Properties dialog box for this shared folder. Here, we have created a specific user to access the sharing of its content.
7. log on to A user on computer B, open the resource manager, and enter the UNC path in the address bar to access computer. Of course, this requires that both computers be in the Working Group and in the same network segment, and enable network discovery and other related settings. If you want to check or change these settings, go to network and Internet-network and sharing center-advanced sharing settings under control panel ". Assume that the computer name of computer A is "Eric-PC" and the IP address is "192.168.2.102 ", you can either type "Eric-pc" in the address bar of the resource manager or "192.168.2.102" and press enter to access the service.
8. At this time, the credential input box should pop up. You can enter the authorized user name and password in the upper and lower boxes. The user name must be in the form of "computer name username. For example, if we previously only authorized access to the Share folder for Eric users on computer A, we need to enter "Eric-PCEric" and the corresponding user password.
Note: If you want to enter a password every time you re-connect to the share, make sure that the check box before "remember my creden。" is in the clear state. Otherwise, the next time you connect to the sharing, because Windows saves your creden。, you will not be prompted to type the creden. If you accidentally remember the creden, you can go to "creden manager" under "User Account and home security" in "Control Panel" to delete the saved creden.
Method 2: deploy dedicated LAN shared access permission setting software, lan shared software, and shared folder set password software.
Although enabling password protection for sharing can greatly protect the security of shared files on the server, however, you cannot copy shared files, modify shared files, delete shared files, open shared files, and save shared files as local files. If the aforementioned access to shared files cannot be prevented, the security of shared files will face huge risks. Therefore, in this case, it is best to deploy a dedicated shared folder permission setting software, LAN file server sharing software, and shared folder Setting Password software.

For example, there is a copy-to-share folder management software (: http://www.grabsun.com/gxwjjm.html), is a B/S-based architecture of server shared folder encryption software, you only need to deploy it on the computer or server where shared files are set, and then you can set access permissions for shared files, you can set the shared file to be read-only, prohibit the copying of shared files, prohibit the deletion of shared files only by modifying shared files, prohibit the opening of shared files and save shared files as local disks, this greatly protects the security of shared files. As shown in:
Figure: Shared Folder monitoring software and Shared File Permission setting software
In addition, you can also set a shared file access password through "browse to shared folder management software" to prevent external personnel or persons without the shared file access permission from accessing shared files. In addition, users who access shared files can be added, and different users can be configured with different permissions to access shared files to fully protect the security of shared files on the server.

In short, both the file permission management and user permission assignment functions of the operating system and the software for setting File Permission sharing through a third-party LAN can achieve shared file access control and management, the specific measures can be selected by enterprises and institutions based on their own needs.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.