?
Solved

Group Distro+Security

Posted on 2011-02-15
2
Medium Priority
?
409 Views
Last Modified: 2012-05-11
I'm trying to save myself a headache by posting how to find out what security access a distribution group may have. I know you're suppose to seperate your email groups from your security groups, but some ameatures apply both and don't use the best practice for naming conventions.

So my questions is, in order to find out who I will be affecting by removing users from the distro or deleting the distro, what will I have to do?  This group can be applied on any OU or application like sharepoint for sharepoint access and file servers exc.

I was thinking I may have to use an LDAP query or is there a built in method for doing something like this?
0
Comment
Question by:snyderkv
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 27

Accepted Solution

by:
KenMcF earned 2000 total points
ID: 34895966
There is no query that will give you the access a group has. For example if you assign a security group NTFS or ahre permissions, this is not stored in AD. One way you could try to get this information is with a product like security explorer.
Another way is to just switch the security group to a distrubtion group and see what access the users loose. You can just switch the group back to a security group to give the access back.


http://www.scriptlogic.com/products/security-explorer/
0
 

Author Closing Comment

by:snyderkv
ID: 34896416
Sweet will do thanks
0

Featured Post

Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Here's a look at newsworthy articles and community happenings during the last month.
This process allows computer passwords to be managed and secured without using LAPS. This is an improvement on an existing process, enhanced to store password encrypted, instead of clear-text files within SQL
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …
Suggested Courses
Course of the Month11 days, 13 hours left to enroll

752 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question