18
The company has sensitive information that only a few
employees in the company can view.
Establish a
read only with password
Share. This will ensure that
people who do not know the password will not be able to view
the information. People with the password will be able to view it
but not change it.
Various employees in the company require different access
to a Share. Some people need to be able to edit the Share;
others only to read it and a small majority should not be
able to view it at all.
For this configuration use of the
depends on user
Share is
recommended. With this you can define Groups of Users who
should be able to
read and write
to the Share; Groups for
read only access
and Groups for
no access.
User accounts for the
employees can be created and moved inside the Groups. Also
individual User configuration can be carried out by specifying
permissions for sole Users, instead of Groups.
Share Icons Explained
This section shows the icons most likely to be seen when
creating a Share.
User
This symbol represents a User set up on the Network
Storage Server.
A User can be assigned a specific amount of personal
Hard Disk space so that only they may use it. Users
can be combined to form a Group.
Group
This symbol represents a Group of Users set up on
the Network Storage Server.
A Group is a quick and simple way for setting up
multiple access rights for a cluster of Users for a
specific Share.
Full Access
All Users have
read and write
access to this Share
without needing a password. Any User can create,
modify or delete any file or Share. Users do not need
to be set up for this option. This option makes it easy
to share information but provides minimal protection.