[Webinar] Streamline your web hosting managementRegister Today

x
?
Solved

Looking for best reporting tool for permissions/security

Posted on 2008-06-11
2
Medium Priority
?
244 Views
Last Modified: 2013-12-01
Hi
We have a server which has very deep file structures and overtime specific permissions have been applied at file and sub-folder level. It's a bit of a mess. I'm looking for advice on a good piece of software (free or paid-for) which will go through my hard drive and report back with what permissions apply at each level so we can figure out how to simplify the permissions and discover any vulnerabilities.



Thanks
0
Comment
Question by:invirl
2 Comments
 
LVL 38

Accepted Solution

by:
Rich Rumble earned 750 total points
ID: 21763395
0
 
LVL 37

Expert Comment

by:bbao
ID: 21767012
if you prefer using script, here is another approach:

Read a Folder DACL
http://www.microsoft.com/technet/scriptcenter/scripts/default.mspx?mfr=true

please be aware that you need to add another script to traverse the whole directory tree.

hope it helps,
bbao
0

Featured Post

Evaluating UTMs? Here's what you need to know!

Evaluating a UTM appliance and vendor can prove to be an overwhelming exercise.  How can you make sure that you're getting the security that your organization needs without breaking the bank? Check out our UTM Buyer's Guide for more information on what you should be looking for!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Last month Marc Laliberte, WatchGuard’s Senior Threat Analyst, contributed reviewed the three major email authentication anti-phishing technology standards: SPF, DKIM, and DMARC. Learn more in part 2 of the series originally posted in Cyber Defense …
You do not need to be a security expert to make the RIGHT security. You just need some 3D guidance, to help lay out an action plan to secure your business operations. It does not happen overnight. You just need to start now and do the first thin…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Is your data getting by on basic protection measures? In today’s climate of debilitating malware and ransomware—like WannaCry—that may not be enough. You need to establish more than basics, like a recovery plan that protects both data and endpoints.…
Suggested Courses

590 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question