?
Solved

List/Audit of security ACLs

Posted on 2005-03-24
2
Medium Priority
?
374 Views
Last Modified: 2013-12-04
I have a customer that is looking for a report of what users have access to what files and/or directories on the server.  Is there any kind of automated tool to go out and do an audit on the server?  All I am finding are utilities to do an ongoing audit of who's touching what - not what we're looking for.

Thanks!
0
Comment
Question by:dipersp
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 4

Accepted Solution

by:
boywaja earned 200 total points
ID: 13746014
depending on how your permissions are configured, Sommersoft Dumpsec from http://www.systemtools.com/somarsoft/ could be of help.  Its what we use.
0
 
LVL 9

Author Comment

by:dipersp
ID: 13961003
That worked great.  Thanks!
0

Featured Post

Ransomware Attacks Keeping You Up at Night?

Will your organization be ransomware's next victim?  The good news is that these attacks are predicable and therefore preventable. Learn more about how you can  stop a ransomware attacks before encryption takes place with our Ransomware Prevention Kit!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Recently, I read that Microsoft has analysed statistics for their security intelligence report. It revealed: still, the clear majority of windows users do their daily work as administrator. An administrative account is a burden, security-wise. My ar…
Our Group Policy work started with Small Business Server in 2000. Microsoft gave us an excellent OU and GPO model in subsequent SBS editions that utilized WMI filters, OU linking, and VBS scripts. These are some of experiences plus our spending a lo…
Add bar graphs to Access queries using Unicode block characters. Graphs appear on every record in the color you want. Give life to numbers. Hopes this gives you ideas on visualizing your data in new ways ~ Create a calculated field in a query: …
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses
Course of the Month9 days, 1 hour left to enroll

764 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question