Solved

Identifying a user's access

Posted on 2008-10-02
1
149 Views
Last Modified: 2012-05-05
Is there a tool that would identify all the shares / files that a AD user account has permission to access?
0
Comment
Question by:bosn1
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 18

Accepted Solution

by:
Americom earned 250 total points
ID: 22626550
I have not come across such tool but you can use a product to do the oppsite where you can scan servers and run report of all the file and folders to identify what file and folder are were granted what access to a specific or all user etc. This product can allow you to run reports in pdf, xls, html formats.
This is not a cheap product:

http://www.scriptlogic.com/products/enterprisesecurityreporter/
http://www.experts-exchange.com/Software/Server_Software/File_Servers/Q_23777807.html
0

Featured Post

Office 365 Training for Admins - 7 Day Trial

Learn how to provision tenants, synchronize on-premise Active Directory, implement Single Sign-On, customize Office deployment, and protect your organization with eDiscovery and DLP policies.  Only from Platform Scholar.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

A project that enables an administrator to perform actions within a user session context not just at the time of login but any time later on day(s) or week(s) later.
Recently, Microsoft released a best-practice guide for securing Active Directory. It's a whopping 300+ pages long. Those of us tasked with securing our company’s databases and systems would, ideally, have time to devote to learning the ins and outs…
This Micro Tutorial hows how you can integrate  Mac OSX to a Windows Active Directory Domain. Apple has made it easy to allow users to bind their macs to a windows domain with relative ease. The following video show how to bind OSX Mavericks to …
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

729 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question