Solved

Looking for best reporting tool for permissions/security

Posted on 2008-06-11
2
233 Views
Last Modified: 2013-12-01
Hi
We have a server which has very deep file structures and overtime specific permissions have been applied at file and sub-folder level. It's a bit of a mess. I'm looking for advice on a good piece of software (free or paid-for) which will go through my hard drive and report back with what permissions apply at each level so we can figure out how to simplify the permissions and discover any vulnerabilities.



Thanks
0
Comment
Question by:invirl
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 38

Accepted Solution

by:
Rich Rumble earned 250 total points
ID: 21763395
0
 
LVL 37

Expert Comment

by:bbao
ID: 21767012
if you prefer using script, here is another approach:

Read a Folder DACL
http://www.microsoft.com/technet/scriptcenter/scripts/default.mspx?mfr=true

please be aware that you need to add another script to traverse the whole directory tree.

hope it helps,
bbao
0

Featured Post

VIDEO: THE CONCERTO CLOUD FOR HEALTHCARE

Modern healthcare requires a modern cloud. View this brief video to understand how the Concerto Cloud for Healthcare can help your organization.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Recovering from what the press called "the largest-ever cyber-attack", IT departments worldwide are discussing ways to defend against this in the future. In this process, many people are looking for immediate actions while, instead, they need to tho…
The conference as a whole was very interesting, although if one has to make a choice between this one and some others, you may want to check out the others.  This conference is aimed mainly at government agencies.  So it addresses the various compli…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
Finding and deleting duplicate (picture) files can be a time consuming task. My wife and I, our three kids and their families all share one dilemma: Managing our pictures. Between desktops, laptops, phones, tablets, and cameras; over the last decade…

630 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question