Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

Checking NTFS Permissions by Username

Posted on 2008-10-29
3
Medium Priority
?
202 Views
Last Modified: 2013-12-04
Hi everyone,

Is there a utility I could use to enumerate what NTFS permissions an individual user has?  

Note:  I need to check the NTFS permissions for a user on several volumes of folders and subfolders.

Thank you.
0
Comment
Question by:oxburger
3 Comments
 
LVL 1

Expert Comment

by:all_experts
ID: 22832328
This utility is very powerful.
http://support.microsoft.com/kb/825751
I believe it can do what you need
0
 

Author Comment

by:oxburger
ID: 22832488
The xcacls is close, but I was hoping I could input a username, point it at a volume, and the output would be all folders, subfolders, and files a user has permissions to.

A little more background on what I'm facing:  Users were allowed to assign permissions to various folders.  I've been finding users were giving other users permissions were there should have been restricted access.  

Thanks again.
0
 
LVL 31

Accepted Solution

by:
Toni Uranjek earned 375 total points
ID: 22834878
Hi!

You should use Scriptlogic's Security Explorer: http://www.scriptlogic.com/products/securityexplorer/

Shareware is limited to 2 servers, 2500 users and 30 days, if I remember correctly.

Or the following free tools:
DumpSec (http://www.somarsoft.com/):
AccessChk (http://www.microsoft.com/technet/sysinternals/Security/AccessChk.mspx)
AccessEnum (http://www.microsoft.com/technet/sysinternals/Security/AccessEnum.mspx)
ShareEnum (http://www.microsoft.com/technet/sysinternals/Security/ShareEnum.mspx)

HTH

Toni
0

Featured Post

When ransomware hits your clients, what do you do?

MSPs: Endpoint security isn’t enough to prevent ransomware.
As the impact and severity of crypto ransomware attacks has grown, Webroot has fought back, not just by building a next-gen endpoint solution capable of preventing ransomware attacks but also by being a thought leader.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Recently, a new law in my state forced us to get a top-to-bottom analysis of all of our contract client's networks. While we have documentation, it was spotty at best for some - and in any event it needed to be checked against reality. That was m…
SHARE your personal details only on a NEED to basis. Take CHARGE and SECURE your IDENTITY. How do I then PROTECT myself and stay in charge of my own Personal details (and) - MY own WAY...
this video summaries big data hadoop online training demo (http://onlineitguru.com/big-data-hadoop-online-training-placement.html) , and covers basics in big data hadoop .
Exchange organizations may use the Journaling Agent of the Transport Service to archive messages going through Exchange. However, if the Transport Service is integrated with some email content management application (such as an anti-spam), the admin…
Suggested Courses
Course of the Month10 days, 4 hours left to enroll

926 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question