Thanks, 

The security team that I am working with is of the opinion that Everyone : READ 
permission should be deleted and only Authenticated users : FULL CONTROL shoule 
be applied.

Theoretically it seems that nothing will break.. because these shares will only 
be accessed after successful authentication is completed.. 

Anyone has faced similar argument and what should be the response. 

Thanks,

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

Reply via email to