?
Solved

Displaying Permissions on NTFS Folders - Need to match my other file

Posted on 2007-11-14
6
Medium Priority
?
249 Views
Last Modified: 2010-03-17
I have a file that i pulled off this server just a few weeks ago.  Same OS, same everything, was never reformatted, just DC Promo'd down then up.  I have a file that shows my permissions like the following:

c:\DOMAIN-Material-Control
  RW DOMAIN\administrator
  R  DOMAIN\alyx.schmid
  R  DOMAIN\anh.le
  R  DOMAIN\anh.pham
  R  DOMAIN\ben.escobedo
  R  DOMAIN\brandy.ton
  R  DOMAIN\candace.wilson
  R  DOMAIN\carmen.contine
  R  DOMAIN\catherine.tran
  RW DOMAIN\cecile.le
  R  DOMAIN\emmy.laolagi
  R  DOMAIN\hien.nguyen
  R  DOMAIN\hoa.dang

Now, I need to compare the new permissions to the old permissions and I cant remember what I used to get this list.  I KNOW it was microsoft, not a 3rd party app.  Can someone help???  Thanks!!!
0
Comment
Question by:nickkershner
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2
6 Comments
 
LVL 48

Expert Comment

by:Jay_Jay70
ID: 20285191
calcs? xacls?
0
 

Author Comment

by:nickkershner
ID: 20285259
No, those are giving me a different output.  Unfortunatly i need the output to match perfectly (i know, I know.. I am a pain) the output from those looks like this:
cacls -
C:\Documents and Settings\sbalderrama>cacls c:\windows
c:\WINDOWS BUILTIN\Users:R
           BUILTIN\Users:(OI)(CI)(IO)(special access:)
                                     GENERIC_READ
                                     GENERIC_EXECUTE

           BUILTIN\Power Users:C
           BUILTIN\Power Users:(OI)(CI)(IO)C
           BUILTIN\Administrators:F
           BUILTIN\Administrators:(OI)(CI)(IO)F
           NT AUTHORITY\SYSTEM:F
           NT AUTHORITY\SYSTEM:(OI)(CI)(IO)F
           BUILTIN\Administrators:F
           CREATOR OWNER:(OI)(CI)(IO)F
xcacls-
c:\WINDOWS BUILTIN\Users:R
           BUILTIN\Users:(OI)(CI)(IO)(special access:)
                                     GENERIC_READ
                                     GENERIC_EXECUTE

           BUILTIN\Power Users:C
           BUILTIN\Power Users:(OI)(CI)(IO)C
           BUILTIN\Administrators:F
           BUILTIN\Administrators:(OI)(CI)(IO)F
           NT AUTHORITY\SYSTEM:F
           NT AUTHORITY\SYSTEM:(OI)(CI)(IO)F
           BUILTIN\Administrators:F
           CREATOR OWNER:(OI)(CI)(IO)F
0
 
LVL 48

Expert Comment

by:Jay_Jay70
ID: 20285643
i think you are looking for the ATTRIB command :)
0
Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

 

Author Comment

by:nickkershner
ID: 20285713
Doesnt appear to be it.  It doesnt show the ntfs permissions, unless I am missing a switch or something.
0
 
LVL 48

Expert Comment

by:Jay_Jay70
ID: 20285733
I thought you wanted it to match the output above-
0
 
LVL 31

Accepted Solution

by:
Toni Uranjek earned 500 total points
ID: 20286114
0

Featured Post

What does it mean to be "Always On"?

Is your cloud always on? With an Always On cloud you won't have to worry about downtime for maintenance or software application code updates, ensuring that your bottom line isn't affected.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

A company’s centralized system that manages user data, security, and distributed resources is often a focus of criminal attention. Active Directory (AD) is no exception. In truth, it’s even more likely to be targeted due to the number of companies …
Auditing domain password hashes is a commonly overlooked but critical requirement to ensuring secure passwords practices are followed. Methods exist to extract hashes directly for a live domain however this article describes a process to extract u…
This tutorial will walk an individual through the steps necessary to join and promote the first Windows Server 2012 domain controller into an Active Directory environment running on Windows Server 2008. Determine the location of the FSMO roles by lo…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses
Course of the Month12 days, 13 hours left to enroll

777 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question