Solved

Query for ACLs on a file server

Posted on 2009-04-14
3
353 Views
Last Modified: 2013-12-04
I'm cleaning up all Windows groups associated with a SQL Server database application.  I've verified that I can safely deleted GroupX without any loss of of SQL Server functionality.  However, the application is also associated with thousands of files on the same server, and GroupX may have explicit permissions to some of these files.  Obviously, inspecting each file for GroupX permissions isn't feasible.  Is there a way to query the GroupX ACLs?
0
Comment
Question by:jdana
3 Comments
 
LVL 70

Accepted Solution

by:
Chris Dent earned 125 total points
ID: 24136381

Sure. Install Windows PowerShell (should be under Features in Server Manager), then you can run this (copy and paste after you fix the security principal and base path values.

Chris
# Object name to look for in each access control list

$SecurityPrincipal = "GroupX"

# Starting path

$BasePath = "C:\"
 

# Something to hold the results

$Entries = @()

ForEach ($Entry in (ls -r $BasePath)) {

  If ((Get-ACL -Path $Entry.FullName).Access | `

    ?{ $_.IdentityReference -match $SecurityPrincipal -And $_.IsInherited -eq $False }) { 

      $Entries += $Entry | Select-Object * 

  }

}

# Display the results as a table

$Entries | Format-Table FullName, Name, PSIsContainer, LastAccessTime

# Export Results to a CSV File

$Entries | Export-CSV "Results.csv"

Open in new window

0
 
LVL 2

Assisted Solution

by:gurpreetchhabra
gurpreetchhabra earned 125 total points
ID: 24137099
Or simply try DumpSec GUI based tool to export permissions from a specified root directory, export the result to csv file. Open in excel and filter all results for GroupX.
0
 

Author Closing Comment

by:jdana
ID: 31569822
Both option work great!  Thanks!
0

Featured Post

Want to promote your upcoming event?

Attending an event? Speaking at a conference? Or exhibiting at a tradeshow? Easily inform your contacts by using a promotional banner in your email signature. This will ensure your organization’s most important contacts are in the know.

Join & Write a Comment

Healthcare organizations in the United States must adhere to the guidance of both the HIPAA (Health Insurance Portability and Accountability Act) and HITECH (Health Information Technology for Economic and Clinical Health Act) for securing and protec…
If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
This tutorial will walk an individual through the steps necessary to join and promote the first Windows Server 2012 domain controller into an Active Directory environment running on Windows Server 2008. Determine the location of the FSMO roles by lo…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…

708 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now