Apply ACL permissions from text file.

Posted on 2004-11-30
Last Modified: 2013-12-04
I've seen some utilities that will dump a NTFS ACL permission list into some sort of flat file.  What I am looking for is a way to take a snapshot of the ACL permissions on a particular drive of all files and folders, and then some way to take that dump and reapply those permissions back to those same files.  I have yet to see anything that can accomplish this.  

You are welcome to use any methods or tools (free or otherwise) to accomplish this.  If any tools are used it would be preferable to keep the cost under $200 or so.  

Any help would be greatly appreciated.  
Question by:joel2600
    LVL 11

    Accepted Solution

    Security Explorer is an awesome product, but it's $419.  I'm looking for other options.
    LVL 11

    Expert Comment

    LVL 38

    Assisted Solution

    by:Rich Rumble (requires perl to be installed, activestate has an easy perl install) but really only manages file attributes.
    as cfairly's link suggests
    xcalc's can be scripted to do what you wish. Cacls.exe can also do this.

    c:\program files\resourse kit\xcalcs.exe < your-text-file.txt
    your-text-file.txt would contain the commands you wish to feed into xcalcs.


    Author Comment

    thanks for the help.  I actually used the original program suggested by cfairley as it was the easiest and most cost effective for me.  I thought I would give some points to rich as well because I believe using xcalcs and cacls would do what i need with a little bit of scripting, even thought i have no need to go down this road myself this time, someone else looking for this solution may wish to.  thanks!
    LVL 11

    Expert Comment

    Excellent!  Glad we could assist, Joel!

    Thanks for using EE!

    Featured Post

    Enabling OSINT in Activity Based Intelligence

    Activity based intelligence (ABI) requires access to all available sources of data. Recorded Future allows analysts to observe structured data on the open, deep, and dark web.

    Join & Write a Comment

    Many people tend to confuse the function of a virus with the one of adware, this misunderstanding of the basic of what each software is and how it operates causes users and organizations to take the wrong security measures that would protect them ag…
    Many of us in IT utilize a combination of roaming profiles and folder redirection to ensure user information carries over from one workstation to another; in my environment, it was to enable virtualization without needing a separate desktop for each…
    This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor ( If you're looking for how to monitor bandwidth using netflow or packet s…
    Polish reports in Access so they look terrific. Take yourself to another level. Equations, Back Color, Alternate Back Color. Write easy VBA Code. Tighten space to use less pages. Launch report from a menu, considering criteria only when it is filled…

    755 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    24 Experts available now in Live!

    Get 1:1 Help Now