Solved

A way to scan a NTFS tree for non-inheritable permissions

Posted on 2008-10-16
4
776 Views
Last Modified: 2011-09-20
I need a way to scan a NTFS tree for non-inheritable permissions, and list them and the path out. Any ideas?
0
Comment
Question by:itnifl
  • 2
4 Comments
 
LVL 83

Accepted Solution

by:
oBdA earned 200 total points
ID: 22730819
There are several tools that will create (more or less) concise lists of NTFS permissions, check this from SystemTools/Somarsoft (my favorite tool):
DumpSec (http://www.systemtools.com/somarsoft)
In the Report -> Options menu, uncheck "Show owner", and set it to "Show directories (but not files) whose permissions differ ..."
The generated report will then only contain folders whose permissions differ in any way from their parent folder.

Or these tools from Sysinternals:
AccessEnum (http://technet.microsoft.com/en-us/sysinternals/bb897332.aspx)
AccessChk (http://technet.microsoft.com/en-us/sysinternals/bb664922.aspx)
ShareEnum (http://technet.microsoft.com/en-us/sysinternals/bb897442.aspx)

Or this one from Scriptlogic:
Security Explorer (http://www.scriptlogic.com/products/securityexplorer/)
0
 
LVL 4

Assisted Solution

by:ckozloski
ckozloski earned 50 total points
ID: 22730938
I'm not sure if you want code to do this or not but there is a software package called Emco Permissions Audit.
http://www.download.com/EMCO-Permissions-Audit/3000-2085_4-10427652.html
It's a pretty slick piece of software.
0
 
LVL 2

Author Comment

by:itnifl
ID: 22738369
I will be taking a look at the solutions now. Maybe I am mistaking, but it looks as if Emco Permissions Audit handles SQL databases? Or can it work with scanning NTFS trees also?
0
 
LVL 4

Expert Comment

by:ckozloski
ID: 22740579
It doesn't handle SQL Databases. It reads permissions for any open shares and folders on your systems.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

This article describes how to set permissions to allow a limited-permissions user to start and stop a particular System Service.   It is always best to give users only the permissions that they need to perform their job, so tweaking particular permi…
Citrix XenApp, Internet Explorer 11 set to Enterprise Mode and using central hosted sites.xml file.
This video Micro Tutorial explains how to clone a hard drive using a commercial software product for Windows systems called Casper from Future Systems Solutions (FSS). Cloning makes an exact, complete copy of one hard disk drive (HDD) onto another d…
Windows 8 came with a dramatically different user interface known as Metro. Notably missing from that interface was a Start button and Start Menu. Microsoft responded to negative user feedback of the Metro interface, bringing back the Start button a…

863 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now