Skip to content

This lab demonstrates setting up secure shared folders within a Windows Server network. I configured NTFS and Share permissions, created departmental folders, assigned user access, and tested permissions from client machines.

Notifications You must be signed in to change notification settings

harleyrussell1/Network-Shares-Permissions-Lab

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

9 Commits
 
 
 
 

Repository files navigation

Network File Shares and Permissions Lab

Overview

This lab demonstrates how to configure shared folders with various permission levels in a Windows Active Directory environment. Testing was done between a domain controller (DC-1) and a domain-joined client (Client-1) in Azure.

Technologies Used

  • Microsoft Azure (VM deployment)
  • Windows Server (Domain Controller)
  • Windows File Sharing (SMB)
  • NTFS & Share Permissions
  • Active Directory Security Groups
  • Network Pathing (\hostname)

1. Shared Folder Creation and Permissions

Logged into:

  • DC-1 as mydomain.com\jane_admin
  • Client-1 as a standard domain user (mydomain\<someuser>)

On DC-1, created four folders on the C: drive:

  • read-access
  • write-access
  • no-access
  • accounting

Applied share permissions as follows:

  • read-access: Group = Domain Users, Permission = Read
  • write-access: Group = Domain Users, Permission = Read/Write
  • no-access: Group = Domain Admins, Permission = Read/Write
  • Skipped permissions on accounting initially

2. Testing Share Access from Client-1

From Client-1, navigated to \\dc-1 using File Explorer.

  • read-access: Accessible, but no write permissions
  • write-access: Readable and writable
  • no-access: Access denied as expected due to permission restrictions
  • accounting: Access denied (no permissions yet assigned)

Results aligned with the expected permission configuration.


3. Group-Based Access Control

On DC-1:

  • Created a new Security Group: ACCOUNTANTS
  • Assigned the following share permission:
    • Folder: accounting
    • Group: ACCOUNTANTS
    • Permission: Read/Write

Back on Client-1:

  • Attempted to access the accounting share as <someuser> → Access denied
  • Logged out

On DC-1:

  • Added <someuser> to the ACCOUNTANTS security group

Back on Client-1:

  • Logged in again as <someuser>
  • Accessed \\dc-1\accounting → Access granted and verified read/write capability

Skills and Experience Gained

This lab offers practical experience with configuring and securing file shares in a Windows domain environment. Core skills developed include:

  • Creating and managing Windows file shares using both NTFS and share-level permissions
  • Testing access control from a client perspective using domain user accounts
  • Implementing role-based access with Active Directory security groups
  • Troubleshooting common access issues related to permission misconfiguration
  • Navigating shared resources using UNC paths (e.g., \\hostname\sharename)

These tasks simulate real-world responsibilities in enterprise IT environments and are vital for system administration, helpdesk support, and security operations.

Screenshots

All screenshots for this lab can be found in the screenshots folder.

About

This lab demonstrates setting up secure shared folders within a Windows Server network. I configured NTFS and Share permissions, created departmental folders, assigned user access, and tested permissions from client machines.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published