Administrative Share


Definition of administrative share in Network Encyclopedia.

What is Administrative Share

Administrative Share is a share created during setup by Microsoft Windows NT or Windows 2000 for system purposes and remote administration. These shares usually end in the «$» character, which makes them hidden shares. You cannot modify the permissions on these shares and you cannot remove the shares.

Administrative Share

Here are some examples of administrative shares:

  • C$, D$, and so on: The shares used by administrators to connect to the root of each volume on a network server and perform remote administration such as creating and deleting files and folders 
  • ADMIN$: The share name for the %SystemRoot% folder, used by the system during remote administration 
  • IPC$: A share used by interprocess communication (IPC) resources for sharing the named pipe interface, which allows applications running on different computers to communicate over the network 
  • PRINT$: A share used to support shared printers 
  • REPL$: A share used by the Directory Replicator Service that allows directory trees to be exported 
  • NETLOGON: A share used by the NetLogon service that enables the processing of domain requests

Editor

Articles posted after being checked by editors.

Recent Content

link to Public Key Infrastructure (PKI)

Public Key Infrastructure (PKI)

Public Key Infrastructure, also known as PKI, is a set of services that support the use of public-key cryptography in a corporate or public setting. A public key infrastructure (PKI) enables key pairs to be generated, securely stored, and securely transmitted to users so that users can send encrypted transmissions and digital signatures over distrusted public networks such as the Internet.
link to Digital Signature

Digital Signature

Digital Signature is an electronic signature that you can use to sign a document being transmitted by electronic means such as e-mail. Digital signatures validate the identity of the sender and ensure that the document they are attached to has not been altered by unauthorized parties during the transmission.