Managing File Sharing

  • Mike Halsey
  • Andrew Bettany


In the last chapter, we explored many of the features that New Technology File System (NTFS) provides to secure files and folders from a local environment. The most common (and easiest) type of unauthorized attack seeks to gain access directly to a computer on the network from within an office. With the knowledge and tips gained from the last chapter, your local files should be relatively safe. However, we will now explore the possibility that the intruder has managed to infiltrate your network, or has hacked through your firewall, perhaps via a stolen laptop, and now is searching your network for any vulnerabilities.


Special Identity Computer Management Physical Security File Server Network Discovery 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Copyright information

© Mike Halsey and Andrew Bettany 2015

Authors and Affiliations

  • Mike Halsey
    • 1
  • Andrew Bettany
    • 2
  1. 1.Microsoft MVPSheffieldUK
  2. 2.Microsoft MVPYorkUK

Personalised recommendations