Hello, I brought this up before but I didnt really explain it well I think was the case. So here goes..
So I can log onto a machine using a proprietary user account that has limited access within AD. However, they can navigate to other user machines and access the administrative share by just entering in the machine name and \c$ I know this is terribly bad, and as a stopgap we have just enabled the firewall service, I know that when we disable file and print sharing (which we should have done anyway) it goes away. What I am wondering is since I cannot get this implemented (not the decision maker) what (or if) is the security setting that would be set to disable this horrible security flaw.
I have looked up and down in local users and groups and cannot find a set of users that should possibly have access to this feature. Maybe I am just way off. Thanks in advance fellers
So I can log onto a machine using a proprietary user account that has limited access within AD. However, they can navigate to other user machines and access the administrative share by just entering in the machine name and \c$ I know this is terribly bad, and as a stopgap we have just enabled the firewall service, I know that when we disable file and print sharing (which we should have done anyway) it goes away. What I am wondering is since I cannot get this implemented (not the decision maker) what (or if) is the security setting that would be set to disable this horrible security flaw.
I have looked up and down in local users and groups and cannot find a set of users that should possibly have access to this feature. Maybe I am just way off. Thanks in advance fellers