Actually, that doesn't work for me.
The only thing I see about security is under sharing and it's for local sharing.
There is no security option under Network Sharing and Security
First you need to disable simple file sharing.
From an explorer window :
1) tools - folder options
2) select views tab
3) scroll to the bottom
4) remove checkmark from simple file sharing.
Now you're playing with power.
You can right-click on the folder or drive to share, and select sharing and security.
click on the New Share button and create a new share with the desired name.
Don't touch the one above (C$) it's an admin share and you shouldn't bother mucking with it.
You can also create a local group in the manage option for windows.
Right click my computer and select manage.
Click on local users and groups, and create a group called Driveshare
You can also create id's for the co-workers and set up passwords.
Add the users to the Driveshare local group.
Then go to the properties of your shared folder and give the appropriate permissions to the Driveshare group.
If only one person should be able to change content, then repeat the group creation with something like driveshareModify or something, and add them to it as well.
Give the Drivesharemodify the enhanced permission on the share, and they will inherit the better permissions, even though they are in both groups.
I'll spell this crap out if ya need it, I'm too tired to do it right now.
Now everyone should have a username and password, belong to the Driveshare group(s), and the drive has been shared and Driveshare group(s) have been given appropriate permissions. Get the other users (while logged into their machine to map the drive, and be sure to have them enter Computer\username where computer is the destination PC, and the username is the one you created for them.
Someone above mentioned using NTFS file permissions, and you are welcome to do so. I'd advise using groups on the share for security.
It's not a good idea to use the admin shares for users, so you're going to have to worry about administering share permissions anyways... no need to lock it twice. Plus, since we're talking about the drive itself if they ever log into your PC natively (from your desk) they could have a hard time depending on the NTFS permissions granted to them. To add the NTFS (file level) permissions might be taking it farther than you need to, and it can add a whole new layer of complexity with conflicting rules.
Since you may go this way, I might as well give you an idea as to how it works :
User over network Permissions= (Share permission(s) ) + (File Permission (s) ). Between the share and file permissions you always get the most restrictive based on the combination of both.
Basically, if you have L_User who needs to get to Server\Share\Folder1, and the Folder1 gives them Read/Write and Share gives them Read Only, they get Read Only. If it's reversed, it's the same thing. The R/W permission of the share is pointless as the directory is going to force read only, so they effectively only have Read.
If they belong to two groups and either the share or the folder includes both groups, they will gain the better of the two. using the example above:
L_User is part of Driveshare (read only on share, full access on NTFS)
L_User is ALSO part of Driveshare modify (read/write on share, full access NTFS)
L_User gets Read/Write on that share, as the combination of share permissions is (at best) R/W. The file permissions are FULL access, but the Share restricts it to only R/W.
And one other thing, do NOT use deny permissions. That can really mess you up unnecessarily. Deny permissions take precedence over allow permissions.
PM or email me if you need assistance. Like I said, I'm tired right now, so I'm kinda jumping all over.