Solved

AD Security Groups (Win 2003)

Posted on 2006-11-04
5
330 Views
Last Modified: 2010-04-18
I started in this network that has about 120 users and about 90 security groups and I want to know what each group has access to, is there a utility, tool or command that let do it.
0
Comment
Question by:nourben
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
5 Comments
 
LVL 31

Accepted Solution

by:
Toni Uranjek earned 168 total points
ID: 17875662
Hi!

You could use Security Explorer: http://www.scriptlogic.com/products/securityexplorer/
0
 
LVL 85

Assisted Solution

by:oBdA
oBdA earned 166 total points
ID: 17876176
If this is not documented anywhere, you can only look through all the machines and check the group policies, file system, registry keys, printers, etc. whether and which groups have been used to control access.
Some tools that might help with this: Somarsoft's DumpSec (http://www.somarsoft.com/), Sysinternal's AccessCheck (http://www.sysinternals.com/Utilities/AccessChk.html), AccessEnum (http://www.sysinternals.com/Utilities/AccessEnum.html), and ShareEnum (http://www.sysinternals.com/Utilities/ShareEnum.html).
0
 
LVL 48

Assisted Solution

by:Jay_Jay70
Jay_Jay70 earned 166 total points
ID: 17877720
from memory, dumpsec is basically a cut down version of Hyena - if you need the full version its here

http://www.systemtools.com/hyena/user.htm
0

Featured Post

Instantly Create Instructional Tutorials

Contextual Guidance at the moment of need helps your employees adopt to new software or processes instantly. Boost knowledge retention and employee engagement step-by-step with one easy solution.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Organizations create, modify, and maintain huge amounts of data to help their businesses earn money and generally function.  Typically every network user within an organization has a bit of disk space to store in process items and personal files.   …
I've always wanted to allow a user to have a printer no matter where they login. The steps below will show you how to achieve just that. In this Article I'll show how to deploy printers automatically with group policy and then using security fil…
Come and listen to Percona CEO Peter Zaitsev discuss what’s new in Percona open source software, including Percona Server for MySQL (https://www.percona.com/software/mysql-database/percona-server) and MongoDB (https://www.percona.com/software/mongo-…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…

690 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question