Well then I still say it's the wrong way to do it. Very insecure. Just because you have hidden shares means little. Sooner or later that may get you into trouble because basically anyone can go anywhere and delete or alter anything.

There are more and more users now days that starting to know more about how Windows operates and they do exploring on systems (I know they shouldn't, but they do). You've given the curious an easy way to gain access to things they shouldn't have access to.

Ever been to TechEd? Ask Microsoft how many users destroyed their "locked down systems". They had to use Ghost to reset a lot of systems that were believed to be "secure". If following Best Practices can be hazardous in the hands of knowledgable people then skipping such practices because you don't have time to set permissions yourself may sooner or later cause an issue for you or someone else.



Edited by NTDOC (2006-01-06 08:39 PM)