?
Solved

Dumpsec Missing User Rights Assignments

Posted on 2010-09-14
2
Medium Priority
?
790 Views
Last Modified: 2013-12-04
I have started using Dumpsec again after being away from it for several years.  I have already noticed that when you run dumpec to return a report on User Rights Assignments it does not return all the available rights.  Most notable is all the Deny... User Rights are missing.  I could list them all out but I am thinking what is preventing the Deny... User Rights is the same issue for the other few that are missing as well.  Any idea how to make Dumpsec collect them all?  Or is there another answer for retrieving User Rights Assignments.  I already know VBS and PS cannot do it natively, need some sort of third party utility like a Dumpsec.
0
Comment
Question by:riskmanagement
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 42

Accepted Solution

by:
Adam Brown earned 200 total points
ID: 33749255
There isn't a way to get those rights to show up in Dumpsec, unfortunately. I'm guessing the folks at Somarsoft decided that rights that deny access to stuff weren't worth gathering and instead focused on the rights that grant access. Retrieving user rights assignments, as far as I know, is done through gpedit.msc. You can export the list in there, but beyond that I don't know another way to get all the rights you need.
0
 

Author Closing Comment

by:riskmanagement
ID: 33863758
Answer confirmed what I suspected.
0

Featured Post

The Eight Noble Truths of Backup and Recovery

How can IT departments tackle the challenges of a Big Data world? This white paper provides a roadmap to success and helps companies ensure that all their data is safe and secure, no matter if it resides on-premise with physical or virtual machines or in the cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Many of us in IT utilize a combination of roaming profiles and folder redirection to ensure user information carries over from one workstation to another; in my environment, it was to enable virtualization without needing a separate desktop for each…
Article by: btan
The intent is not to repeat what many has know about Ransomware but more to join its dots of what is it, who are the victims, why it exists, when and how we respond on infection. Lastly, sum up in a glance to share such information with more to help…
In this video we outline the Physical Segments view of NetCrunch network monitor. By following this brief how-to video, you will be able to learn how NetCrunch visualizes your network, how granular is the information collected, as well as where to f…
In this video, Percona Solution Engineer Dimitri Vanoverbeke discusses why you want to use at least three nodes in a database cluster. To discuss how Percona Consulting can help with your design and architecture needs for your database and infras…
Suggested Courses
Course of the Month11 days, 18 hours left to enroll

752 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question