[Okta Webinar] Learn how to a build a cloud-first strategyRegister Now

x
?
Solved

Report on ntfs permissions

Posted on 2007-11-26
5
Medium Priority
?
5,555 Views
Last Modified: 2012-05-05
Hi, I have been given an exercise to document the allocation of permissions across the company and files. and check there phsically set at the lowest needed for staff to do there job.

where to start? any software to help?

cheers

windows 2003 ad
0
Comment
Question by:mhamer
5 Comments
 
LVL 70

Accepted Solution

by:
KCTS earned 1500 total points
ID: 20349007
There are some tools from Microsoft Sysinternals that may help

AccessChk
This tool shows you the accesses the user or group you specify has to files, Registry keys or Windows services.
 
AccessEnum
This simple yet powerful security tool shows you who has what access to directories, files and Registry keys on your systems. Use it to find holes in your permissions.

see http://www.microsoft.com/technet/sysinternals/fileanddiskutilities.mspx?wt.svl=featured
 
0
 

Author Comment

by:mhamer
ID: 20349023
thank you
0
 
LVL 7

Expert Comment

by:ALNMOO
ID: 20356166
Also, if you want to script the process, you can benefit from this link

http://www.microsoft.com/technet/scriptcenter/scripts/default.mspx?mfr=true
0
 

Author Closing Comment

by:mhamer
ID: 31410943
just what i needed thanks you
0
 
LVL 1

Expert Comment

by:AsafG
ID: 25270354
There is a nice utility available for generating nice PDF / XLS / RTF based readable reports.

Try http://www.smart-x.com
0

Featured Post

New Tabletop Appliances Blow Competitors Away!

WatchGuard’s new T15, T35 and T55 tabletop UTMs provide the highest-performing security inspection in their class, allowing users at small offices, home offices and distributed enterprises to experience blazing-fast Internet speeds without sacrificing enterprise-grade security.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Tech spooks aren't just for those who are tech savvy, it also happens to those of us running a business. Check out the top tech spooks for business owners.
Last month Marc Laliberte, WatchGuard’s Senior Threat Analyst, contributed reviewed the three major email authentication anti-phishing technology standards: SPF, DKIM, and DMARC. Learn more in part 2 of the series originally posted in Cyber Defense …
This Micro Tutorial hows how you can integrate  Mac OSX to a Windows Active Directory Domain. Apple has made it easy to allow users to bind their macs to a windows domain with relative ease. The following video show how to bind OSX Mavericks to …
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…

868 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question