If you are looking at 10 copies of the FE file, each one dedicated to and only opened by one specific user, then there is an efficiency consideration but NOT a lock consideration for having a remote FE. IF, on the other hand, you have 10 distinct databases but multiple users could theoretically open the same FE at the same time, you have a potential corruption issue and potentially a much more severe locking issue. Your description is not perfectly clear on that fine point. Front-end files should NEVER be truly shared in the "simultaneously opened" sense of the word, but may be shared in the "everyone gets their own private copy" sense. This is CRUCIAL to Access FE stability.
EDITED BY THE_DOC_MAN: Your answer to Pat clarified this but I missed it. You have multiple monolithic databases. Part of my previous paragraph is still relevant so look it over.
The behavior you describe in post #17 is clearly (at least to me) a permissions problem on (hypothetical) machine #1. From your description, you are in a company that has a formal domain structure. In such a company, you can see something that in a smaller, less formal company is not so common. Each user will have a domain-based login. But in order to connect to the domain, EACH MACHINE will have an ID so that it can connect when it boots up, even before YOU log in. (Has to be that way because if your machine can't connect to the domain to validate your domain login, you can't ever log in.) Therefore, you might have to inquire of your IT people if there is an oddball setting for your machine's domain ID.
Remember my earlier discussion about user FRED, his assigned machine XDEPT003, and his domain ALLDEPT? IF you have this kind of setup, then Fred will have TWO operational logins - XDEPT003 (his machine's ID) and FRED\XDEPT003 (Fred's personal ID). And the key here is that XDEPT003 logged in first. IF for some reason Fred's machine has something different for its permissions than Fred himself has, it is POSSIBLE that the machine permissions are overriding Fred's permissions.
Were you able to use the Security control panel from Selected File (right-click) >> Properties >> Security >> Advanced to get "Effective Permissions"? That should take ALL applicable permissions into account when it reports permissions for the file or folder in question. Compare your #1 machine's effective permissions for the file and its folder with the effective permissions from any other machine.
OR a simpler thought: Using the method of Selected File (right-click) >> Properties >> Security you see a list of identifiers. Select the user's identifier for the person using that machine. Check the permissions for that identifier. NOW from that panel step into >> Advanced >> Effective Permissions (which is a tab frame) and look at the same user identifier to see effective permissions. IF the individual identifier permissions don't match the effective permissions then you have another Access Control Entry somewhere that is blocking you, OR (stated another way) the individual identifier permissions aren't being used because that user matches up with an earlier Access Control Entry (earlier in ACL order).