Report to list securities for users in active directory

Posted on 2006-03-21
Last Modified: 2013-12-04
Hello Experts!  Does anyone know of a Windows or 3rd party software that will alow me to create a report that will list securities of a specified user or organizatioanl unit in my office network (Active Dirextory)?  I have tried DempSec but that only gives me the option to list Folders and the securities that the folder contains.  Any help is greatly appreciated!  (I do know how to check them one by one in the properties section of AD but that takes a very long time with no printing capabilities)
Question by:E-Risk
    LVL 11

    Expert Comment

    wot do u mean by "check securities" ??? Do you actually mean "permissions" ? Permissions are assigned to each user, for each specific resource. So, one user may have a read permission for a folder, and no permission at all for another resource. Therefore, having a users' permission report, sounds to me a lil' bit vague. Could you please give some more detail about what you are trying to achieve??

    LVL 2

    Author Comment

    Yes, i do mean permissions.  It is vaugue as you said but due to audit procedures here at my company I need a record of all permissions.  If I had set up AD from start to finish I would have been able to keep better track, but I came apon my position here 3 years after AD was configured.  Thanks!
    LVL 11

    Expert Comment

    So, for ALL RESOURCES (AD objects, folders, files) on the system, you want to know what permissions EACH USER HAVE??? I guess not? For what specific resources you whish to know that??

    LVL 23

    Accepted Solution

    You want ScriptLogic's Security Explorer -

    It does NTFS permissions, AD permissions, etc.
    LVL 23

    Expert Comment

    Thank you for the points!

    Featured Post

    Courses: Start Training Online With Pros, Today

    Brush up on the basics or master the advanced techniques required to earn essential industry certifications, with Courses. Enroll in a course and start learning today. Training topics range from Android App Dev to the Xen Virtualization Platform.

    Join & Write a Comment

    SHARE your personal details only on a NEED to basis. Take CHARGE and SECURE your IDENTITY. How do I then PROTECT myself and stay in charge of my own Personal details (and) - MY own WAY...
    Article by: btan
    The intent is not to repeat what many has know about Ransomware but more to join its dots of what is it, who are the victims, why it exists, when and how we respond on infection. Lastly, sum up in a glance to share such information with more to help…
    how to add IIS SMTP to handle application/Scanner relays into office 365.
    This video is in connection to the article "The case of a missing mobile phone (". It will help one to understand clearly the steps to track a lost android phone.

    746 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    15 Experts available now in Live!

    Get 1:1 Help Now