This lab demonstrates how to configure shared folders with various permission levels in a Windows Active Directory environment. Testing was done between a domain controller (DC-1) and a domain-joined client (Client-1) in Azure.
- Microsoft Azure (VM deployment)
- Windows Server (Domain Controller)
- Windows File Sharing (SMB)
- NTFS & Share Permissions
- Active Directory Security Groups
- Network Pathing (\hostname)
Logged into:
- DC-1 as
mydomain.com\jane_admin
- Client-1 as a standard domain user (
mydomain\<someuser>
)
On DC-1, created four folders on the C: drive:
read-access
write-access
no-access
accounting
Applied share permissions as follows:
read-access
: Group = Domain Users, Permission = Readwrite-access
: Group = Domain Users, Permission = Read/Writeno-access
: Group = Domain Admins, Permission = Read/Write- Skipped permissions on
accounting
initially
From Client-1, navigated to \\dc-1
using File Explorer.
- read-access: Accessible, but no write permissions
- write-access: Readable and writable
- no-access: Access denied as expected due to permission restrictions
- accounting: Access denied (no permissions yet assigned)
Results aligned with the expected permission configuration.
On DC-1:
- Created a new Security Group:
ACCOUNTANTS
- Assigned the following share permission:
- Folder:
accounting
- Group:
ACCOUNTANTS
- Permission: Read/Write
- Folder:
Back on Client-1:
- Attempted to access the
accounting
share as<someuser>
→ Access denied - Logged out
On DC-1:
- Added
<someuser>
to theACCOUNTANTS
security group
Back on Client-1:
- Logged in again as
<someuser>
- Accessed
\\dc-1\accounting
→ Access granted and verified read/write capability
This lab offers practical experience with configuring and securing file shares in a Windows domain environment. Core skills developed include:
- Creating and managing Windows file shares using both NTFS and share-level permissions
- Testing access control from a client perspective using domain user accounts
- Implementing role-based access with Active Directory security groups
- Troubleshooting common access issues related to permission misconfiguration
- Navigating shared resources using UNC paths (e.g.,
\\hostname\sharename
)
These tasks simulate real-world responsibilities in enterprise IT environments and are vital for system administration, helpdesk support, and security operations.
All screenshots for this lab can be found in the screenshots folder.