Workgroup access

  • Thread starter Thread starter Guest
  • Start date Start date
G

Guest

I have a workgroup set up for my office, which is part of a larger network.
How can I restrict who can join the workgroup?
 
jswafa said:
I have a workgroup set up for my office, which is part of a larger
network. How can I restrict who can join the workgroup?

You can't. You would need to have a domain. You can restrict who can
share files/printers in a Workgroup by disabling the Guest account and
making identical user accounts/passwords for all the users who you do
want to access the lan's resources.

If you want more specific answers, please post back with full details of
your setup, including number of computers, what operating systems (and
Service Pack levels) they are running, and details of what you would
like to accomplish.

Malke
 
I have a similar situation, except that I want to allow an XP Pro (w/SP2)
computer to wirelessly connect to my network (workgroup) but be excluded from
sharing any other resources except the internet. From what little research
I've done, it appears that if I disable the Guest account in the computer in
question, my computers and printers will be invisible - correct? In addition,
can I give this computer a different workgroup name and still have it access
the internet as described.

Thanks in advance for any feedback.
 
You can change the workgroup name but beware that workgroups are NOT
security boundaries! A user from one workgroup can potentially access a
share on a computer in another workgroup. Do as Malke says and create user
accounts for those that you want to access shares being sure that users you
do not want to access shares do not know the user logon/passwords. Enabling
the guest account does not make anything "invisible" it just requires [in XP
Pro] that users authenticate [know logon/password] to access a share
assuming that simple file sharing is also disabled. You also can configure
the XP Windows Firewall to only allow access to file shares from IP
addresses that you specify in exceptions/edit - change scope. That will not
stop someone who tries to reconfigure their computer to have an IP address
that is allowed but is another layer of security in addition to requiring
authentication. --- Steve
 
Back
Top