Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

Displaying Permissions on NTFS Folders - Need to match my other file

Posted on 2007-11-14
6
243 Views
Last Modified: 2010-03-17
I have a file that i pulled off this server just a few weeks ago.  Same OS, same everything, was never reformatted, just DC Promo'd down then up.  I have a file that shows my permissions like the following:

c:\DOMAIN-Material-Control
  RW DOMAIN\administrator
  R  DOMAIN\alyx.schmid
  R  DOMAIN\anh.le
  R  DOMAIN\anh.pham
  R  DOMAIN\ben.escobedo
  R  DOMAIN\brandy.ton
  R  DOMAIN\candace.wilson
  R  DOMAIN\carmen.contine
  R  DOMAIN\catherine.tran
  RW DOMAIN\cecile.le
  R  DOMAIN\emmy.laolagi
  R  DOMAIN\hien.nguyen
  R  DOMAIN\hoa.dang

Now, I need to compare the new permissions to the old permissions and I cant remember what I used to get this list.  I KNOW it was microsoft, not a 3rd party app.  Can someone help???  Thanks!!!
0
Comment
Question by:nickkershner
  • 3
  • 2
6 Comments
 
LVL 48

Expert Comment

by:Jay_Jay70
ID: 20285191
calcs? xacls?
0
 

Author Comment

by:nickkershner
ID: 20285259
No, those are giving me a different output.  Unfortunatly i need the output to match perfectly (i know, I know.. I am a pain) the output from those looks like this:
cacls -
C:\Documents and Settings\sbalderrama>cacls c:\windows
c:\WINDOWS BUILTIN\Users:R
           BUILTIN\Users:(OI)(CI)(IO)(special access:)
                                     GENERIC_READ
                                     GENERIC_EXECUTE

           BUILTIN\Power Users:C
           BUILTIN\Power Users:(OI)(CI)(IO)C
           BUILTIN\Administrators:F
           BUILTIN\Administrators:(OI)(CI)(IO)F
           NT AUTHORITY\SYSTEM:F
           NT AUTHORITY\SYSTEM:(OI)(CI)(IO)F
           BUILTIN\Administrators:F
           CREATOR OWNER:(OI)(CI)(IO)F
xcacls-
c:\WINDOWS BUILTIN\Users:R
           BUILTIN\Users:(OI)(CI)(IO)(special access:)
                                     GENERIC_READ
                                     GENERIC_EXECUTE

           BUILTIN\Power Users:C
           BUILTIN\Power Users:(OI)(CI)(IO)C
           BUILTIN\Administrators:F
           BUILTIN\Administrators:(OI)(CI)(IO)F
           NT AUTHORITY\SYSTEM:F
           NT AUTHORITY\SYSTEM:(OI)(CI)(IO)F
           BUILTIN\Administrators:F
           CREATOR OWNER:(OI)(CI)(IO)F
0
 
LVL 48

Expert Comment

by:Jay_Jay70
ID: 20285643
i think you are looking for the ATTRIB command :)
0
Netscaler Common Configuration How To guides

If you use NetScaler you will want to see these guides. The NetScaler How To Guides show administrators how to get NetScaler up and configured by providing instructions for common scenarios and some not so common ones.

 

Author Comment

by:nickkershner
ID: 20285713
Doesnt appear to be it.  It doesnt show the ntfs permissions, unless I am missing a switch or something.
0
 
LVL 48

Expert Comment

by:Jay_Jay70
ID: 20285733
I thought you wanted it to match the output above-
0
 
LVL 31

Accepted Solution

by:
Toni Uranjek earned 125 total points
ID: 20286114
0

Featured Post

Free Tool: ZipGrep

ZipGrep is a utility that can list and search zip (.war, .ear, .jar, etc) archives for text patterns, without the need to extract the archive's contents.

One of a set of tools we're offering as a way to say thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Resolve DNS query failed errors for Exchange
Last week, our Skyport webinar on “How to secure your Active Directory” (https://www.experts-exchange.com/videos/5810/Webinar-Is-Your-Active-Directory-as-Secure-as-You-Think.html?cid=Gene_Skyport) provided 218 attendees with a step-by-step guide for…
This tutorial will walk an individual through the process of configuring their Windows Server 2012 domain controller to synchronize its time with a trusted, external resource. Use Google, Bing, or other preferred search engine to locate trusted NTP …
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

840 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question