Viewing the share control list, Viewing share control details, Adding a share control – H3C Technologies H3C Intelligent Management Center User Manual

Page 115

Advertising
background image

99

A new share control uses the default action you configured for share control check failure. When

you select Global Security Mode in Security Level configuration, the default action of the share
control failure is invalid.

Description—Description for the associated registry control.

Allow Share—Allows an access user to use the share function.

Forbid Default Share—Prohibit an access user from using default sharing. This option is available
only when the access user is allowed to use the share function.

Forbid Windows XP Simple Share—Prohibit an access user from using Windows XP simple share.
The option is available only when the access user is allowed to use the share function.

Exclude Groups or Users from Sharing—Folder sharing rights are not assigned to Windows users
and groups. Enter the user name and group name to which the share right cannot be assigned.

Domain user names are in the format domain name\user name. User names are separated by

commas and are case-sensitive.

Viewing the share control list

1.

Click the User tab.

2.

From the navigation tree, select User Security Policy > Share Control.
The share control list displays all share controls.

3.

Click Refresh to refresh the share control list.

Viewing share control details

1.

Click the User tab.

2.

From the navigation tree, select User Security Policy > Share Control.
The share control list displays all share controls.

3.

Click the name of the share control you want to view.

4.

Click Back to return to the share control list.

Adding a share control

1.

Click the User tab.

2.

From the navigation tree, select User Security Policy > Share Control.
The share control list displays all share controls.

3.

Click Add.
The Add Share Control page appears.

4.

Configure the basic information.

5.

Click OK.

The share control appears in the configuration options when you configure the security policy. For more

information, see "

Managing security policies

."

Advertising