expensive to license clients rather than an individual servers. At any rate, when the user limit is set to Maximum Allowed, it means that an unlimited number of clients canconnect to the share until the number of connections meets the number of licenses thatyou have purchased. If you're using a per client licensing model, then access to the shareis technically unlimited, but it's still up to use make sure that you have a license for everyclient.Your other option is to allow a specific number of users to connect to the share. Thisoption has a lot less to do with licensing than it does performance. Lower end hardwaremay not be able to support a large number of client connections. Therefore, Microsoftgives you the option of limiting the number of simultaneous connections to the share, soas not to overwhelm your hardware.
In this article, I have begun talking about the ways in which resources are shared on anetwork. In the next article in this series, when you how to set permissions on the sharethat you're creating.
Securing a Share
Although the entire point of creating a share is to allow users on your network to accessthe resources contained within the share, you still have to be careful about what level of access the users are given to those resources. For example, suppose that your humanresources department has created a spreadsheet that lists the salary information for everyemployee in your company. Now suppose that everybody in human resources needs to beable to access the spreadsheet, and to make updates to it. Since the finance department isresponsible for printing paychecks, they need to have access to the spreadsheet too, butyou probably do not want them to be making any changes to it. Given the sensitive natureof the information in the spreadsheet, you probably would not want anyone else in thecompany to have access to it. With that in mind, let us take a look at how this type of security could be implemented.The first thing that you need to understand about the share that you have created, is thatthere are two different types of security that you can apply to it. You have a choice of using share level security, file level security, or both.Share level security applies directly to the share point that you have created. When theusers connect to the SharePoint to access the files, the share level permissions that youhave set are applied. In contrast, file level permissions are applied directly to files andfolders rather than to the share.The reason why there are two different types of permissions has a little bit to do with theevolution of Windows. The Windows operating system supports two different hard driveformats; FAT and NTFS. FAT is a legacy file system that has been around since the early