SlideShare une entreprise Scribd logo
1  sur  9
Télécharger pour lire hors ligne
HOW to share a folder in the office based on the access right
1. Create the folder which you want to share on your server driver, for instance “NIGERIA
FILES”
2. Now in the main folder that you have just created, create new folders. E.g: Finance,
Admin and Programm..
3. Now go back to the main folder and do “Right-click” on it and choose “Sharing and
Security” from the contextual menu.
4. You will have the “NIGERIA FILES” properties open on the “Sharing” tab.
5. Now, select the “Share this folder” and “APPLY” then “OK”.
6. Once you click on “OK” the windows will be closed and will have a “hand” icon on the
main folder, which means you have now shared your folders with others users.
Now we need to personalize the access right for each user within the main folder
“NIGERIA FILES”
7. Right on one of the folder in the main folder “FINANCE” and select “Sharing and
security”. On the “proprieties” of the selected folder, select the “Security” tab
Then go to “Advanced” in the bottom.
You will have the following windows open.
Now, deselect “Allow inheritable permissions from the parent to propagate………” once
you click on it the “security” windows will be opened. Please, select “REMOVE” then “apply”
and “OK”
After removing the existing permissions, you can now add users, who will access that folder and
files.
To add users, please click on the “ADD” button
When you click on the “ADD” button, you will have a windows open, which will help you to look
for users.
Type the name of the user in the blank field and click on the “Check Names” to confirm the
availability of the user within the system. (If you don’t know the complete name of the user,
you can type his first name or family name and then click on “Check Names”)
For example, if I type “Roger” and click on the “Check Names” I will have this:
Then click on “OK” to personalize the access right for such user. You will have the following
windows:
You can now personalize the access right for the user. For Full access, just to tick on the full
access case and others will be selected automatically.
After that, click on “OK” to add definitely the user and “APPLY” and “OK” to save the
modification; “OK” again to quick the properties for the selected folder.
You can add more users with specific access right by doing the same process.
Also it is the same process for adding user to access other folders within the main folder
“NIGERIA FILES”
So if you want to add user to access “Programm” folder, you go back and open the main
folder “NIGERIA FILES”
On the “PROGRAMM” folder do right-click” and select “Sharing and Security” the choose the
“security” tab on the properties of the “Programm” folder
Then choose the “Advanced” button in the bottom. You will have this window open:
As we did, untick the “Allow inheritable permissions from the parent to propagate………”
once you click on it the “security” windows will be opened.”
Please, select “REMOVE” then “apply” and add users who will access the folder and files with
this folder “PROGRAMM” as we did for the “FINANCE” folder.
Note: User must be in domain network. User must use its credential to log in the domain or to
log in while mapping the shared drive to his computer.

Contenu connexe

Tendances

Diffie hellman key exchange algorithm
Diffie hellman key exchange algorithmDiffie hellman key exchange algorithm
Diffie hellman key exchange algorithmSunita Kharayat
 
Introduction to SSH
Introduction to SSHIntroduction to SSH
Introduction to SSHHemant Shah
 
Surah Hujurat (MCNA)
Surah Hujurat (MCNA)Surah Hujurat (MCNA)
Surah Hujurat (MCNA)Binti_Nazeer
 
Man in the middle attack (mitm)
Man in the middle attack (mitm)Man in the middle attack (mitm)
Man in the middle attack (mitm)Hemal Joshi
 
Inter-Process communication in Operating System.ppt
Inter-Process communication in Operating System.pptInter-Process communication in Operating System.ppt
Inter-Process communication in Operating System.pptNitihyaAshwinC
 
Password Cracking
Password CrackingPassword Cracking
Password CrackingSagar Verma
 
Ssh (The Secure Shell)
Ssh (The Secure Shell)Ssh (The Secure Shell)
Ssh (The Secure Shell)Mehedi Farazi
 
Distributed File Systems
Distributed File Systems Distributed File Systems
Distributed File Systems Maurvi04
 
Qt002 surah-al-baqarah(1-5)
Qt002 surah-al-baqarah(1-5)Qt002 surah-al-baqarah(1-5)
Qt002 surah-al-baqarah(1-5)connectwithquran
 
Chapter 6-Consistency and Replication.ppt
Chapter 6-Consistency and Replication.pptChapter 6-Consistency and Replication.ppt
Chapter 6-Consistency and Replication.pptsirajmohammed35
 
Microsoft Windows Server 2022 Overview
Microsoft Windows Server 2022 OverviewMicrosoft Windows Server 2022 Overview
Microsoft Windows Server 2022 OverviewDavid J Rosenthal
 
Security & protection in operating system
Security & protection in operating systemSecurity & protection in operating system
Security & protection in operating systemAbou Bakr Ashraf
 
directory structure and file system mounting
directory structure and file system mountingdirectory structure and file system mounting
directory structure and file system mountingrajshreemuthiah
 
Secure shell ppt
Secure shell pptSecure shell ppt
Secure shell pptsravya raju
 
windows xp scheduling
windows xp schedulingwindows xp scheduling
windows xp schedulingshivani monga
 
Distributed file system
Distributed file systemDistributed file system
Distributed file systemAnamika Singh
 

Tendances (20)

Diffie hellman key exchange algorithm
Diffie hellman key exchange algorithmDiffie hellman key exchange algorithm
Diffie hellman key exchange algorithm
 
Asma ul husna
Asma ul husnaAsma ul husna
Asma ul husna
 
Introduction to SSH
Introduction to SSHIntroduction to SSH
Introduction to SSH
 
Surah Hujurat (MCNA)
Surah Hujurat (MCNA)Surah Hujurat (MCNA)
Surah Hujurat (MCNA)
 
Man in the middle attack (mitm)
Man in the middle attack (mitm)Man in the middle attack (mitm)
Man in the middle attack (mitm)
 
Inter-Process communication in Operating System.ppt
Inter-Process communication in Operating System.pptInter-Process communication in Operating System.ppt
Inter-Process communication in Operating System.ppt
 
Essential duas
Essential duasEssential duas
Essential duas
 
Kerberos explained
Kerberos explainedKerberos explained
Kerberos explained
 
Password Cracking
Password CrackingPassword Cracking
Password Cracking
 
Ssh (The Secure Shell)
Ssh (The Secure Shell)Ssh (The Secure Shell)
Ssh (The Secure Shell)
 
Distributed File Systems
Distributed File Systems Distributed File Systems
Distributed File Systems
 
Qt002 surah-al-baqarah(1-5)
Qt002 surah-al-baqarah(1-5)Qt002 surah-al-baqarah(1-5)
Qt002 surah-al-baqarah(1-5)
 
Chapter 6-Consistency and Replication.ppt
Chapter 6-Consistency and Replication.pptChapter 6-Consistency and Replication.ppt
Chapter 6-Consistency and Replication.ppt
 
Microsoft Windows Server 2022 Overview
Microsoft Windows Server 2022 OverviewMicrosoft Windows Server 2022 Overview
Microsoft Windows Server 2022 Overview
 
Security & protection in operating system
Security & protection in operating systemSecurity & protection in operating system
Security & protection in operating system
 
directory structure and file system mounting
directory structure and file system mountingdirectory structure and file system mounting
directory structure and file system mounting
 
Secure shell ppt
Secure shell pptSecure shell ppt
Secure shell ppt
 
Process synchronization
Process synchronizationProcess synchronization
Process synchronization
 
windows xp scheduling
windows xp schedulingwindows xp scheduling
windows xp scheduling
 
Distributed file system
Distributed file systemDistributed file system
Distributed file system
 

En vedette

Quick Installation Guide EZ Hotspot Extender Extended English
Quick Installation Guide EZ Hotspot Extender Extended EnglishQuick Installation Guide EZ Hotspot Extender Extended English
Quick Installation Guide EZ Hotspot Extender Extended EnglishEnGenius Europe
 
Wifi Password Hack v2.85 - The best software to hack the Wifi networks !
Wifi Password Hack v2.85 - The best software to hack the Wifi networks !Wifi Password Hack v2.85 - The best software to hack the Wifi networks !
Wifi Password Hack v2.85 - The best software to hack the Wifi networks !Home
 
Afternoon tea middle east
Afternoon tea middle eastAfternoon tea middle east
Afternoon tea middle eastromoshlomo44
 
ShareThis Auto Study
ShareThis Auto Study ShareThis Auto Study
ShareThis Auto Study ShareThis
 
Engaging Teens through Sprite Digital Campaign - Teen Till I Die
Engaging Teens through Sprite Digital Campaign - Teen Till I DieEngaging Teens through Sprite Digital Campaign - Teen Till I Die
Engaging Teens through Sprite Digital Campaign - Teen Till I DieNitin Karkara
 
china Medical University Power Point Presentation
china Medical University Power Point Presentationchina Medical University Power Point Presentation
china Medical University Power Point PresentationSaju Bhaskar
 

En vedette (14)

Quick Installation Guide EZ Hotspot Extender Extended English
Quick Installation Guide EZ Hotspot Extender Extended EnglishQuick Installation Guide EZ Hotspot Extender Extended English
Quick Installation Guide EZ Hotspot Extender Extended English
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Wifi Password Hack v2.85 - The best software to hack the Wifi networks !
Wifi Password Hack v2.85 - The best software to hack the Wifi networks !Wifi Password Hack v2.85 - The best software to hack the Wifi networks !
Wifi Password Hack v2.85 - The best software to hack the Wifi networks !
 
Wireless Hacking
Wireless HackingWireless Hacking
Wireless Hacking
 
WiFi Secuiry: Attack & Defence
WiFi Secuiry: Attack & DefenceWiFi Secuiry: Attack & Defence
WiFi Secuiry: Attack & Defence
 
Lecture 11 - Sex and Gender
Lecture 11 -  Sex and GenderLecture 11 -  Sex and Gender
Lecture 11 - Sex and Gender
 
ETHICAL HACKING PPT
ETHICAL HACKING PPTETHICAL HACKING PPT
ETHICAL HACKING PPT
 
CAMPUSMATE
CAMPUSMATECAMPUSMATE
CAMPUSMATE
 
Afternoon tea middle east
Afternoon tea middle eastAfternoon tea middle east
Afternoon tea middle east
 
ShareThis Auto Study
ShareThis Auto Study ShareThis Auto Study
ShareThis Auto Study
 
Engaging Teens through Sprite Digital Campaign - Teen Till I Die
Engaging Teens through Sprite Digital Campaign - Teen Till I DieEngaging Teens through Sprite Digital Campaign - Teen Till I Die
Engaging Teens through Sprite Digital Campaign - Teen Till I Die
 
1960 1969
1960 19691960 1969
1960 1969
 
Bs 9arr
Bs 9arrBs 9arr
Bs 9arr
 
china Medical University Power Point Presentation
china Medical University Power Point Presentationchina Medical University Power Point Presentation
china Medical University Power Point Presentation
 

Similaire à How to share folders within a domain network

18IF004_CNS.docx
18IF004_CNS.docx18IF004_CNS.docx
18IF004_CNS.docxRajAmbere1
 
Windows 8.1 Guide
Windows 8.1 GuideWindows 8.1 Guide
Windows 8.1 GuideCorcelll
 
eFileCabinet Secure Drawer User Manual
eFileCabinet Secure Drawer User ManualeFileCabinet Secure Drawer User Manual
eFileCabinet Secure Drawer User ManualeFileCabinet
 
The Ultimate Guide to Dropbox
The Ultimate Guide to DropboxThe Ultimate Guide to Dropbox
The Ultimate Guide to DropboxAbigail De Mesa
 
Comidor help-how_to_manage_your_documents
 Comidor help-how_to_manage_your_documents Comidor help-how_to_manage_your_documents
Comidor help-how_to_manage_your_documentsComidor
 
Ηow to manage your documents
Ηow to manage your documentsΗow to manage your documents
Ηow to manage your documentsComidor
 
Ad hoc wireless network final
Ad hoc wireless network finalAd hoc wireless network final
Ad hoc wireless network finalShiza Kokab
 
Training Computer
Training ComputerTraining Computer
Training Computercmonasmith
 
Presentación1
Presentación1Presentación1
Presentación1alexedgar
 
How to Troubleshoot QuickBooks Error 1303?
How to Troubleshoot QuickBooks Error 1303?How to Troubleshoot QuickBooks Error 1303?
How to Troubleshoot QuickBooks Error 1303?nickmosan
 
Section C Exercise Slides 1 windows 2003
Section C Exercise Slides 1 windows 2003Section C Exercise Slides 1 windows 2003
Section C Exercise Slides 1 windows 2003Spark48
 
Images And Files in PBWorks
Images And Files in PBWorksImages And Files in PBWorks
Images And Files in PBWorksDrCash
 
Eassos Recovery Manual
Eassos Recovery ManualEassos Recovery Manual
Eassos Recovery ManualEassos Ltd.
 
How to use the amazing CCK 2 tool to lock down Firefox
How to use the amazing CCK 2 tool to lock down Firefox How to use the amazing CCK 2 tool to lock down Firefox
How to use the amazing CCK 2 tool to lock down Firefox Amsys
 
Sugarsync bances
Sugarsync bancesSugarsync bances
Sugarsync bancesbrayan_2012
 
Sugarsync bances
Sugarsync bancesSugarsync bances
Sugarsync bancesbrayan_2012
 
Manually remove surfvox.com from computer step by step
Manually remove surfvox.com from computer step by stepManually remove surfvox.com from computer step by step
Manually remove surfvox.com from computer step by stepharoNaroum
 

Similaire à How to share folders within a domain network (20)

18IF004_CNS.docx
18IF004_CNS.docx18IF004_CNS.docx
18IF004_CNS.docx
 
Windows 8.1 Guide
Windows 8.1 GuideWindows 8.1 Guide
Windows 8.1 Guide
 
eFileCabinet Secure Drawer User Manual
eFileCabinet Secure Drawer User ManualeFileCabinet Secure Drawer User Manual
eFileCabinet Secure Drawer User Manual
 
The Ultimate Guide to Dropbox
The Ultimate Guide to DropboxThe Ultimate Guide to Dropbox
The Ultimate Guide to Dropbox
 
Comidor help-how_to_manage_your_documents
 Comidor help-how_to_manage_your_documents Comidor help-how_to_manage_your_documents
Comidor help-how_to_manage_your_documents
 
Ηow to manage your documents
Ηow to manage your documentsΗow to manage your documents
Ηow to manage your documents
 
Comodo presentation
Comodo presentationComodo presentation
Comodo presentation
 
Ad hoc wireless network final
Ad hoc wireless network finalAd hoc wireless network final
Ad hoc wireless network final
 
Training Computer
Training ComputerTraining Computer
Training Computer
 
Presentación1
Presentación1Presentación1
Presentación1
 
How to Troubleshoot QuickBooks Error 1303?
How to Troubleshoot QuickBooks Error 1303?How to Troubleshoot QuickBooks Error 1303?
How to Troubleshoot QuickBooks Error 1303?
 
Section C Exercise Slides 1 windows 2003
Section C Exercise Slides 1 windows 2003Section C Exercise Slides 1 windows 2003
Section C Exercise Slides 1 windows 2003
 
Proteus 8 installation
Proteus 8 installationProteus 8 installation
Proteus 8 installation
 
Images And Files in PBWorks
Images And Files in PBWorksImages And Files in PBWorks
Images And Files in PBWorks
 
Eassos Recovery Manual
Eassos Recovery ManualEassos Recovery Manual
Eassos Recovery Manual
 
SunriseCloud - Quick Start Guide
SunriseCloud - Quick Start GuideSunriseCloud - Quick Start Guide
SunriseCloud - Quick Start Guide
 
How to use the amazing CCK 2 tool to lock down Firefox
How to use the amazing CCK 2 tool to lock down Firefox How to use the amazing CCK 2 tool to lock down Firefox
How to use the amazing CCK 2 tool to lock down Firefox
 
Sugarsync bances
Sugarsync bancesSugarsync bances
Sugarsync bances
 
Sugarsync bances
Sugarsync bancesSugarsync bances
Sugarsync bances
 
Manually remove surfvox.com from computer step by step
Manually remove surfvox.com from computer step by stepManually remove surfvox.com from computer step by step
Manually remove surfvox.com from computer step by step
 

Dernier

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 

Dernier (20)

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 

How to share folders within a domain network

  • 1. HOW to share a folder in the office based on the access right 1. Create the folder which you want to share on your server driver, for instance “NIGERIA FILES” 2. Now in the main folder that you have just created, create new folders. E.g: Finance, Admin and Programm.. 3. Now go back to the main folder and do “Right-click” on it and choose “Sharing and Security” from the contextual menu.
  • 2. 4. You will have the “NIGERIA FILES” properties open on the “Sharing” tab.
  • 3. 5. Now, select the “Share this folder” and “APPLY” then “OK”. 6. Once you click on “OK” the windows will be closed and will have a “hand” icon on the main folder, which means you have now shared your folders with others users. Now we need to personalize the access right for each user within the main folder “NIGERIA FILES” 7. Right on one of the folder in the main folder “FINANCE” and select “Sharing and security”. On the “proprieties” of the selected folder, select the “Security” tab
  • 4. Then go to “Advanced” in the bottom. You will have the following windows open.
  • 5. Now, deselect “Allow inheritable permissions from the parent to propagate………” once you click on it the “security” windows will be opened. Please, select “REMOVE” then “apply” and “OK” After removing the existing permissions, you can now add users, who will access that folder and files. To add users, please click on the “ADD” button
  • 6. When you click on the “ADD” button, you will have a windows open, which will help you to look for users. Type the name of the user in the blank field and click on the “Check Names” to confirm the availability of the user within the system. (If you don’t know the complete name of the user, you can type his first name or family name and then click on “Check Names”) For example, if I type “Roger” and click on the “Check Names” I will have this:
  • 7. Then click on “OK” to personalize the access right for such user. You will have the following windows: You can now personalize the access right for the user. For Full access, just to tick on the full access case and others will be selected automatically. After that, click on “OK” to add definitely the user and “APPLY” and “OK” to save the modification; “OK” again to quick the properties for the selected folder. You can add more users with specific access right by doing the same process. Also it is the same process for adding user to access other folders within the main folder “NIGERIA FILES” So if you want to add user to access “Programm” folder, you go back and open the main folder “NIGERIA FILES”
  • 8. On the “PROGRAMM” folder do right-click” and select “Sharing and Security” the choose the “security” tab on the properties of the “Programm” folder Then choose the “Advanced” button in the bottom. You will have this window open:
  • 9. As we did, untick the “Allow inheritable permissions from the parent to propagate………” once you click on it the “security” windows will be opened.” Please, select “REMOVE” then “apply” and add users who will access the folder and files with this folder “PROGRAMM” as we did for the “FINANCE” folder. Note: User must be in domain network. User must use its credential to log in the domain or to log in while mapping the shared drive to his computer.