Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
?
Solved

View/list access control from AD

Posted on 2010-01-12
3
Medium Priority
?
468 Views
Last Modified: 2013-12-04
Hi,

We recntly accuired a company where they have an win server 2003 Enterprise.
Is there a way to see in AD which users has access to what.

There are 40 pc's and about 72 users.
Is there an esay way to see which user can access what share and from what pc users can access?
Can this be displayed in a list or a table or graphical in an easy way?
I know you can check premission on every folder/file but this is a huge time consuming task.
Please advice us in this matter
0
Comment
Question by:osa2
2 Comments
 
LVL 70

Accepted Solution

by:
KCTS earned 2000 total points
ID: 26291683
There are some tools that can help
DumpSec http://www.systemtools.com/somarsoft/?somarsoft.com

and

AccessChk/AccessEnum  - http://technet.microsoft.com/en-us/sysinternals/bb795534.aspx
0
 
LVL 1

Author Comment

by:osa2
ID: 26321108
I guess the FreeBSD zone isn't the right one. The rest is. Don't know why it is in the FreeBSD zone as well. You can change it.

Altough KCTS did provide me with a good result I'm still looking for a way to view wich your can access what shares.

The tools provide let you select a directory and then see who can access this directory.
But I want to slect a user and see in what directory's or shares he can access.

So, I select for instance. User bob who works in the financial dep. And I can see what user bob can access. I als want to select user Maurice. Who works in the warehouse and see what share's Maurice can access.

I don't want to select a folder let's say
\\OURSERVER\share1
 and the see that this can be accessed by Danny, Freddy, Wilma, Ronny, Bruno, Johnny, BOB

I want to select user BOB

And see Bob has access to
\\OURSERVER\share1
\\OURSERVER\share2
\\OURSERVER\share3
\\OURSERVER\share4

Then select user Maurice

And see Maurice has access to

\\OURSERVER\share3 only


Thanks for a solution





0

Featured Post

Evaluating UTMs? Here's what you need to know!

Evaluating a UTM appliance and vendor can prove to be an overwhelming exercise.  How can you make sure that you're getting the security that your organization needs without breaking the bank? Check out our UTM Buyer's Guide for more information on what you should be looking for!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

How to deal with a specific error when using the Enable-RemoteMailbox cmdlet to create a mailbox in the cloud-based service, for an existing user in an on-premises Active Directory.
High user turnover can cause old/redundant user data to consume valuable space. UserResourceCleanup was developed to address this by automatically deleting user folders when the user account is deleted.
This video shows how to use Hyena, from SystemTools Software, to bulk import 100 user accounts from an external text file. View in 1080p for best video quality.
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses

564 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question