Solved

Automatically Look who is sharing file to Everyone

Posted on 2002-06-14
9
198 Views
Last Modified: 2010-04-13
We asks users DO NOT share private/confidential files to "EVERYONE" and we need to make sure that.

Is there any program can scan and create a list of "Everyone Accessible" files on the whole network? This will make my lift much easier.
0
Comment
Question by:anguslai
9 Comments
 
LVL 86

Expert Comment

by:jkr
ID: 7078216
You could use cacls.exe to do that, it even works recursively in directory trees...
0
 
LVL 2

Author Comment

by:anguslai
ID: 7078331
Thanks JKR,

But I may need to make my target clear:
I would like a tool to check all shared file/folder on the whole network. A sample report on my mind is like this:
-----------
The following folders are opened to Everyone Access:

[Machine A]
\share
\Confidential
\Photo

[Machine B]
\TeamFile

[Macine C]
  :
  :
0
 
LVL 7

Expert Comment

by:jmiller47
ID: 7078994
I would have to say no. Even a third party application would probably not do that "out of the box". You would need the application to be very open-ended and make a lot of modifications yourself...

Hyena from www.systemtools.com might be your best place to start though.
0
Best Practices: Disaster Recovery Testing

Besides backup, any IT division should have a disaster recovery plan. You will find a few tips below relating to the development of such a plan and to what issues one should pay special attention in the course of backup planning.

 
LVL 3

Expert Comment

by:mrwolf
ID: 7080114
use a SMB scanner like the one made by zyklon & scan your subnets
0
 
LVL 7

Expert Comment

by:jmiller47
ID: 7080136
mrwolf,
Can you expand on that? Can you post the name of the application and where to get it?

Thanks
0
 
LVL 3

Expert Comment

by:mrwolf
ID: 7080147
use a SMB scanner like the one made by zyklon & scan your subnets
0
 
LVL 3

Expert Comment

by:mrwolf
ID: 7080150
oops sorry , double post (stupid open window refresh)
I once found a SMB scanner floating about on the net, it basicly scans subnets for file shares & documents what it finds as it goes , I am trying to find a live link to it now but i am having a trouble finding one , I will post it when i find a working one...btw im not sure if it tested the permsions but it might have as I used it for basicly the same thing you want it for , this was back in 99
0
 
LVL 1

Accepted Solution

by:
luvshak earned 100 total points
ID: 7090422
Please goto the below site

http://www.megasecurity.org/Scanners.html

and download SMB scanner.  The SMB scanner will scan your entire network by ip address.  It will give you all the shares but no securiy/permission.  I hope this helps.
0
 
LVL 7

Expert Comment

by:jmiller47
ID: 7093887
This showed you who has Everyone rights on each computer?
0

Featured Post

Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
demote crashed domain controller (server 2000) 3 1,004
Migrate DFS role 3 853
WMI Uptime Script Reporting Incorrect Number on W2k Server 16 770
how to run this deletion request 4 22
NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
Google always has something new and amazing up its sleeve, and the most current thing that they have been working on is another step in the evolution of Google Search, from machine learning to its brilliant successor, deep learning.
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

832 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question