Solved

Security Matrix for user and group permissions

Posted on 2009-04-07
2
2,078 Views
Last Modified: 2012-05-06
I have been looking for a way to show clients/managers an easy to read visualization of what users belong to what groups and what permissions they have for their folders.

In the past I would just create an excel spreadsheet and update it by hand but it seems there would be an easier way to really show this to someone who may or may not have much technical knowledge.

I am looking for any tools or templates that would allow me to get this information and/or generate a report for a good way to show this.

2003 based file shares with active directory permissions.

0
Comment
Question by:mgthomas0
2 Comments
 
LVL 15

Assisted Solution

by:zelron22
zelron22 earned 50 total points
ID: 24093618
Access Enum and Share Enum will give you what users/groups have permission to what.
http://technet.microsoft.com/en-us/sysinternals/bb545046.aspx

0
 
LVL 18

Accepted Solution

by:
Americom earned 75 total points
ID: 24094159
See if these tools help. The one that you need to pay gives you more option such as report permission in excel, html, and pdf formats etc.

You can use a free tool "SubInACL" from Microsoft:
http://www.microsoft.com/DownLoads/details.aspx?familyid=E8BA3E56-D8FE-4A91-93CF-ED6985E3927B&displaylang=en
SubInACL is a command-line tool that enables administrators to obtain security information about files, registry keys, and services, and transfer this information from user to user, from local or global group to group, and from domain to domain.

http://technet.microsoft.com/en-us/sysinternals/bb664922.aspx
This tool shows you the accesses the user or group you specify has to files, Registry keys or Windows services

or if you want to spend some $ on another product specifically for file server from ScriptLogic:
http://www.scriptlogic.com/products/security-explorer/

Or if you have the more $ to spend, you can get the ESR from ScriptLogic:
http://www.scriptlogic.com/products/enterprisesecurityreporter/
This product is more than just for file/folder permission, it is also to report Active Directory object status etc.
0

Featured Post

Best Practices: Disaster Recovery Testing

Besides backup, any IT division should have a disaster recovery plan. You will find a few tips below relating to the development of such a plan and to what issues one should pay special attention in the course of backup planning.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Pop culture is prime bait for hackers seeking to infect user’s computers and mobile devices with malicious malware. Hackers know exactly what the latest trends are online and know how to use them to their advantage.
How do we balance the user experience (UX) with reasonable security measures? It can be done, if you keep these fundamentals in mind.
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles to another domain controller. Log onto the new domain controller with a user account t…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

810 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question