By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Kludges are possible, but nothing that is bulletproof. To quote an old saying that I never understood, until now: "You can't have your cake and eat it, too." The real problem is that Windows Explorer and the application are both running in the user's security context, which controls the user's access to the file.
Dig Deeper on Enterprise infrastructure management
Related Q&A from Jerry Honeycutt
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.