Risk: Access to system directories through mapped drives

This topic describes security risks to system directories and provides recommendations for reducing these risks.

Assume that a PC is connected to your server with an IBM® iSeries™ Access for Windows® session. The session set up mapped drives to link to the system's integrated file system. For example, the PC’s G drive might map to the integrated file system of the SYSTEM1 server in the network.

Now assume that the same PC user has a browser and can access the Internet. The user requests a Web page that runs a mischievous "program" such as a Java™ applet or an Active-X control. Conceivably, the program could attempt to erase everything on the PC’s G drive.

You have several protections against damage to mapped drives: