?
Solved

cacls tool

Posted on 2009-05-19
2
Medium Priority
?
347 Views
Last Modified: 2012-05-07
I understand this tool can use to Use view and manage Windows ACLs.  The output list is user's IDs.  Is there a way to display user's full name instead of Windows accounts?

Thanks.
0
Comment
Question by:nav2567
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 85

Accepted Solution

by:
oBdA earned 2000 total points
ID: 24429014
Nope, all the tools I know display the samid. To display the full name would be kind of difficult: groups and computers can have permissions as well, as well as some built-in groups and special accounts, and neither of those has a "full name" attribute.
If you're looking to generate security reports, check this from SystemTools/Somarsoft (my favorite tool):
DumpSec (http://www.systemtools.com/somarsoft)
Or these tools from Sysinternals:
AccessEnum (http://technet.microsoft.com/en-us/sysinternals/bb897332.aspx)
AccessChk (http://technet.microsoft.com/en-us/sysinternals/bb664922.aspx)
ShareEnum (http://technet.microsoft.com/en-us/sysinternals/bb897442.aspx)
Or this one from Scriptlogic:
Security Explorer (http://www.scriptlogic.com/products/securityexplorer/)
0

Featured Post

Fill in the form and get your FREE NFR key NOW!

Veeam® is happy to provide a FREE NFR server license to certified engineers, trainers, and bloggers.  It allows for the non‑production use of Veeam Agent for Microsoft Windows. This license is valid for five workstations and two servers.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Organizations create, modify, and maintain huge amounts of data to help their businesses earn money and generally function.  Typically every network user within an organization has a bit of disk space to store in process items and personal files.   …
Restoring deleted objects in Active Directory has been a standard feature in Active Directory for many years, yet some admins may not know what is available.
This course is ideal for IT System Administrators working with VMware vSphere and its associated products in their company infrastructure. This course teaches you how to install and maintain this virtualization technology to store data, prevent vuln…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

719 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question