Solved

Report on ntfs permissions

Posted on 2007-11-26
5
5,543 Views
Last Modified: 2012-05-05
Hi, I have been given an exercise to document the allocation of permissions across the company and files. and check there phsically set at the lowest needed for staff to do there job.

where to start? any software to help?

cheers

windows 2003 ad
0
Comment
Question by:mhamer
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
5 Comments
 
LVL 70

Accepted Solution

by:
KCTS earned 500 total points
ID: 20349007
There are some tools from Microsoft Sysinternals that may help

AccessChk
This tool shows you the accesses the user or group you specify has to files, Registry keys or Windows services.
 
AccessEnum
This simple yet powerful security tool shows you who has what access to directories, files and Registry keys on your systems. Use it to find holes in your permissions.

see http://www.microsoft.com/technet/sysinternals/fileanddiskutilities.mspx?wt.svl=featured
 
0
 

Author Comment

by:mhamer
ID: 20349023
thank you
0
 
LVL 7

Expert Comment

by:ALNMOO
ID: 20356166
Also, if you want to script the process, you can benefit from this link

http://www.microsoft.com/technet/scriptcenter/scripts/default.mspx?mfr=true
0
 

Author Closing Comment

by:mhamer
ID: 31410943
just what i needed thanks you
0
 
LVL 1

Expert Comment

by:AsafG
ID: 25270354
There is a nice utility available for generating nice PDF / XLS / RTF based readable reports.

Try http://www.smart-x.com
0

Featured Post

Threat Trends for MSPs to Watch

See the findings.
Despite its humble beginnings, phishing has come a long way since those first crudely constructed emails. Today, phishing sites can appear and disappear in the length of a coffee break, and it takes more than a little know-how to keep your clients secure.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Recovering from what the press called "the largest-ever cyber-attack", IT departments worldwide are discussing ways to defend against this in the future. In this process, many people are looking for immediate actions while, instead, they need to tho…
There is a lot to be said for protecting yourself and your accounts with 2 factor authentication.  I found to my own chagrin, that there is a big downside as well.
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …

695 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question