Solved

Configuring System Security Settings

Posted on 2009-05-09
2
249 Views
Last Modified: 2012-05-06
What is the easiest way to set up file permissions for security relevant objects?  I have to set specific permissions to c:\program files\symantec, c:\windows\repair, and c:\windows\system32\config.  I know what type of user (i.e., system, user, administrator) has what type of file permission is Allowed (i.e., Full Control, Modify, Read, Write, etc).  I have to set this up for many standalone laptops and would love to have a script I can run for each computer than setting each of these up manually.  
0
Comment
Question by:myoutback
2 Comments
 
LVL 5

Expert Comment

by:DTAHARLEV
ID: 24346523
just run CACLS.EXE. it has a very simple interface. ideally also copy XCACLS which has even more functionality; using these, you can create a text file that'll do all of the work for you.
0
 
LVL 50

Accepted Solution

by:
jcimarron earned 125 total points
ID: 24349411
0

Featured Post

Free Tool: SSL Checker

Scans your site and returns information about your SSL implementation and certificate. Helpful for debugging and validating your SSL configuration.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you thought ransomware was bad, think again! Doxware has the potential to be even more damaging.
Knowing where your website is hosted is as important as the features you receive, the monthly fee, and the support you receive. Due diligence should be done when choosing your next hosting provider.
Two types of users will appreciate AOMEI Backupper Pro: 1 - Those with PCIe drives (and haven't found cloning software that works on them). 2 - Those who want a fast clone of their boot drive (no re-boots needed) and it can clone your drive wh…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

829 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question