?
Solved

Audit server user groups and file permissions

Posted on 2007-04-09
4
Medium Priority
?
195 Views
Last Modified: 2013-12-04
I would like to find some software that will give me a good searchable way to quickly tell what users and group poermissions are on each folder on our storage server.  I have been using the command line programs such as showacls.exe to get this information, but I would like to find a way to get the information in a better format than a txt file.  
0
Comment
Question by:VoodooFrog
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
4 Comments
 
LVL 67

Accepted Solution

by:
sirbounty earned 1000 total points
ID: 18876529
0
 
LVL 77

Assisted Solution

by:Rob Williams
Rob Williams earned 1000 total points
ID: 18876535
Dumpsec is a free utility that allows you to create primarily custom users permissions and account information. You might want to have a look at it. You can also export the results to .csv for editing in Excel or similar
http://www.somarsoft.com/
0

Featured Post

Four New Appliances. Same Industry-leading Speeds.

But don't take it from us.  The Firebox M370 is Miercom tested and Miercom approved, outperforming its competitors for stateless and stateful traffic throughput scenarios.  Learn more about the M370, M470, M570 and M670 and find the right solution for your organization today!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Getting to know the threat landscape in which DDoS has evolved, and making the right choice to get ourselves geared up to defend against  DDoS attacks effectively. Get the necessary preparation works done and focus on Doing the First Things Right.
Check out the latest tech news, community articles, and expert highlights in August's newsletter.
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses
Course of the Month12 days, 9 hours left to enroll

777 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question