[2 days left] What’s wrong with your cloud strategy? Learn why multicloud solutions matter with Nimble Storage.Register Now

x
?
Solved

Map of NTFS folder security

Posted on 2009-03-29
3
Medium Priority
?
2,122 Views
Last Modified: 2013-12-04
Moving data from SBS 2003 to SBS 2008 on a different domain, all users and groups have been recreated, just got an issue on files...

Any way of getting a map of NTFS permissios applied on FOLDER level, I'm aware that there is a utility called AccessEnum, gave it a go however produced pages and pages of results for the permissions on all files.

Files inherit from folder permissions, anyone know of fine tuning AccessEnum or an alternative.
0
Comment
Question by:pccorrect
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 85

Accepted Solution

by:
oBdA earned 1000 total points
ID: 24014432
My favorite tool for this is DumpSec (http://www.systemtools.com/somarsoft/).
Configure the NTFS Report Options to not show the owner, and to only show folders (but not files) where permissions differ from the parent.
An alternative might be ScriptLogic's Security Explorer (http://www.scriptlogic.com/) (not free).
0
 
LVL 56

Assisted Solution

by:McKnife
McKnife earned 1000 total points
ID: 24014452
0
 

Author Comment

by:pccorrect
ID: 24017092
Thanks guys for your comments, when I have a moment I shall test it out.
0

Featured Post

Cyber Threats to Small Businesses (Part 1)

This past May, Webroot surveyed more than 600 IT decision-makers at medium-sized companies to see how these small businesses perceived new threats facing their organizations.  Read what Webroot CISO, Gary Hayslip, has to say about the survey in part 1 of this 2-part blog series.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Article by: btan
The intent is not to repeat what many has know about Ransomware but more to join its dots of what is it, who are the victims, why it exists, when and how we respond on infection. Lastly, sum up in a glance to share such information with more to help…
Container Orchestration platforms empower organizations to scale their apps at an exceptional rate. This is the reason numerous innovation-driven companies are moving apps to an appropriated datacenter wide platform that empowers them to scale at a …
This course is ideal for IT System Administrators working with VMware vSphere and its associated products in their company infrastructure. This course teaches you how to install and maintain this virtualization technology to store data, prevent vuln…
Is your data getting by on basic protection measures? In today’s climate of debilitating malware and ransomware—like WannaCry—that may not be enough. You need to establish more than basics, like a recovery plan that protects both data and endpoints.…
Suggested Courses

649 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question