Cannot browse Windows 7 admin disk volume shares from Windows 10

Randal Andress 1 Reputation point
2021-05-28T04:14:37.51+00:00

From computer A (Windows 10 Home), the file shares on computer B (Windows 7 Pro, laptop) can be successfully accessed by: "\b\users\<username>\desktop\<shared-folder>".

But when browsing the network from computer A by opening the Network in explorer, although computer B shows up as a computer icon, when you open it an error is displayed:

"You do not have permission to access \b."

I get the same error when entering "\b" from computer A.

On computer B, the admin shares (C$, D$, etc,) are enabled via the AutoShareServer and AutoShareWks values in the LanmanServer\Parameters and are visible after restart.

I have another Windows 7 computer on the network whose local disk shares can be browsed to and accessed by opening the computer icon in the Network explorer window but, like the Windows 10 computer A, it cannot browse the shares on computer B when beginning at the local disk volume (C$).

What should I check next?

-Randal

Windows for business | Windows Client for IT Pros | Networking | Network connectivity and file sharing
Windows for business | Windows Client for IT Pros | User experience | Other
{count} votes

4 answers

Sort by: Most helpful
  1. MotoX80 36,291 Reputation points
    2021-06-01T02:14:53.41+00:00

    One more thing... while "\b" gets a permission error, "\b\users" works!
    What I am trying to figure out is what "permission" would keep me from browsing the 'C' drive

    I have always used a local account with the same name and password on each machine. If you want to access the administrative shares, C$, then that account needs to be a member of the administrators group.

    If you open a command prompt and run "net view \b" does it display the non-administrative shares? What error do you get? Does B have an identical account? Have you checked the security eventlog on B?

    101190-capture.jpg


  2. Gary Nebbett 6,216 Reputation points
    2021-06-02T06:43:26.23+00:00

    Hello @Randal Andress ,

    I have never used a "Home" version of Windows, so I don't know what features/capabilities it is missing (compared to the "Pro" version). If what I propose below does not work then we can check for alternatives.

    In a command windows, running as an administrator, issue the command logman start why -ets -p Microsoft-Windows-SMBClient -bs 64 -nb 999 -o why.etl. This will start an ETW trace session.

    Now reproduce the problem. From what I have understood from the above messages, "net view \b" fails and "dir \b\c$\Users" works - if that is so then issue those two commands.

    Now stop the trace with the command logman stop why -ets. There should now be a file called why.etl that you could make available here by posting a link to OneDrive, Google Drive, etc. where a copy of why.etl resides.

    There is a reasonable chance (but not a guarantee) that analysing the content of why.etl would provide an indication of why the system is behaving as it is.

    Gary


  3. Gary Nebbett 6,216 Reputation points
    2021-06-02T19:31:23.243+00:00

    Hello Randal,

    Thanks for that. Here is some immediate feedback, so that you know that you efforts were (hopefully) not in vain. We might get some useful input from @MotoX80 too - someone who often has useful insights.

    This is what your network traffic looks like when examined with the (now discontinued) Microsoft Message Analyzer tool:

    101776-image.png

    I have highlighted the problematic protocol exchange in yellow. Your Windows 10 client issues a NetShareEnum request for "level 1" information and receives a response with error code 5 (ERROR_ACCESS_DENIED).

    The documentation for NetShareEnum ("NetrShareEnum" is just the name of the RPC method that transports the NetShareEnum request) says:

    For interactive users (users who are logged on locally to the machine), no special group membership is required to execute the NetShareEnum function. For non-interactive users, Administrator, Power User, Print Operator, or Server Operator group membership is required to successfully execute the NetShareEnum function at levels 2, 502, and 503. No special group membership is required for level 0 or level 1 calls.

    It seems as though the Windows 7 "server" is behaving unexpectedly/unexplainably (at the moment). I will need to do a bit of thinking about the next step...

    Gary


  4. Gary Nebbett 6,216 Reputation points
    2021-06-03T08:05:20.087+00:00

    Hello Randal,

    The software which implements this platform seems to have many weaknesses; it seems that if you leave a message open too long in a browser window, a session times out and many buttons (Preview, Post, etc.) become ineffective - this may explain your difficulties (refreshing the page helps).

    This problem is turning out to be a real mystery. To get a feel for how things should work, I traced what happens on my (Windows 10) "server" when responding to a "net view" (NetShareEnum) request. The best ETW trace that I got was:

    101960-image.png

    This shows the RPC for NetShareEnum (RPC OpNum = 15 (0xF)) to interface srvsvc (4B324FC8-1670-01D3-1278-5A47BF6EE188) arriving and some processing taking place in srvnet.sys.

    I checked the srvnet.sys routines and there is no access checking there. The only access checking takes place in the LanmanServer service process, in routine srvsvc!NetrShareEnum. Based on the "level" of the NetShareEnum request, it checks the desired access against this ACL:

    0:000> !acl poi(srvsvc!SsSharePrintSecurityObject+10)+14 1  
    ACL is:  
    ACL is: ->AclRevision: 0x2  
    ACL is: ->Sbz1       : 0x0  
    ACL is: ->AclSize    : 0xe0  
    ACL is: ->AceCount   : 0xa  
    ACL is: ->Sbz2       : 0x0  
    ACL is: ->Ace[0]: ->AceType: ACCESS_ALLOWED_ACE_TYPE  
    ACL is: ->Ace[0]: ->AceFlags: 0x0  
    ACL is: ->Ace[0]: ->AceSize: 0x18  
    ACL is: ->Ace[0]: ->Mask : 0x000f0013  
    ACL is: ->Ace[0]: ->SID: S-1-5-32-544 (Alias: BUILTIN\Administrators)  
      
    ACL is: ->Ace[1]: ->AceType: ACCESS_ALLOWED_ACE_TYPE  
    ACL is: ->Ace[1]: ->AceFlags: 0x0  
    ACL is: ->Ace[1]: ->AceSize: 0x18  
    ACL is: ->Ace[1]: ->Mask : 0x000f0013  
    ACL is: ->Ace[1]: ->SID: S-1-5-32-549 (no name mapped)  
      
    ACL is: ->Ace[2]: ->AceType: ACCESS_ALLOWED_ACE_TYPE  
    ACL is: ->Ace[2]: ->AceFlags: 0x0  
    ACL is: ->Ace[2]: ->AceSize: 0x18  
    ACL is: ->Ace[2]: ->Mask : 0x000f0013  
    ACL is: ->Ace[2]: ->SID: S-1-5-32-550 (no name mapped)  
      
    ACL is: ->Ace[3]: ->AceType: ACCESS_ALLOWED_ACE_TYPE  
    ACL is: ->Ace[3]: ->AceFlags: 0x0  
    ACL is: ->Ace[3]: ->AceSize: 0x18  
    ACL is: ->Ace[3]: ->Mask : 0x000f0013  
    ACL is: ->Ace[3]: ->SID: S-1-5-32-547 (Alias: BUILTIN\Power Users)  
      
    ACL is: ->Ace[4]: ->AceType: ACCESS_ALLOWED_ACE_TYPE  
    ACL is: ->Ace[4]: ->AceFlags: 0x0  
    ACL is: ->Ace[4]: ->AceSize: 0x14  
    ACL is: ->Ace[4]: ->Mask : 0x00000001  
    ACL is: ->Ace[4]: ->SID: S-1-1-0 (Well Known Group: localhost\Everyone)  
      
    ACL is: ->Ace[5]: ->AceType: ACCESS_ALLOWED_ACE_TYPE  
    ACL is: ->Ace[5]: ->AceFlags: 0x0  
    ACL is: ->Ace[5]: ->AceSize: 0x14  
    ACL is: ->Ace[5]: ->Mask : 0x00000001  
    ACL is: ->Ace[5]: ->SID: S-1-5-7 (Well Known Group: NT AUTHORITY\ANONYMOUS LOGON)  
      
    ACL is: ->Ace[6]: ->AceType: ACCESS_ALLOWED_ACE_TYPE  
    ACL is: ->Ace[6]: ->AceFlags: 0x0  
    ACL is: ->Ace[6]: ->AceSize: 0x14  
    ACL is: ->Ace[6]: ->Mask : 0x00000002  
    ACL is: ->Ace[6]: ->SID: S-1-5-20 (Well Known Group: NT AUTHORITY\NETWORK SERVICE)  
      
    ACL is: ->Ace[7]: ->AceType: ACCESS_ALLOWED_ACE_TYPE  
    ACL is: ->Ace[7]: ->AceFlags: 0x0  
    ACL is: ->Ace[7]: ->AceSize: 0x14  
    ACL is: ->Ace[7]: ->Mask : 0x00000002  
    ACL is: ->Ace[7]: ->SID: S-1-5-4 (Well Known Group: NT AUTHORITY\INTERACTIVE)  
      
    ACL is: ->Ace[8]: ->AceType: ACCESS_ALLOWED_ACE_TYPE  
    ACL is: ->Ace[8]: ->AceFlags: 0x0  
    ACL is: ->Ace[8]: ->AceSize: 0x14  
    ACL is: ->Ace[8]: ->Mask : 0x00000002  
    ACL is: ->Ace[8]: ->SID: S-1-5-6 (Well Known Group: NT AUTHORITY\SERVICE)  
      
    ACL is: ->Ace[9]: ->AceType: ACCESS_ALLOWED_ACE_TYPE  
    ACL is: ->Ace[9]: ->AceFlags: 0x0  
    ACL is: ->Ace[9]: ->AceSize: 0x14  
    ACL is: ->Ace[9]: ->Mask : 0x00000002  
    ACL is: ->Ace[9]: ->SID: S-1-5-3 (Well Known Group: NT AUTHORITY\BATCH)  
    

    In the case of a level 1 info request, the desired access is 1 - an access that is granted to "NT AUTHORITY\ANONYMOUS LOGON" among others.

    This ACL is created by code inside the LanmanServer and is not directly accessible to any tool. There may however by policies that influence the content of the ACL. Under Windows 10, at least, one such policy is:

    101970-image.png

    Can you check whether this policy exists in Windows 7 and, if it does exist, what its value is on B?

    Gary


Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.