?
Solved

How would I generate a report that list ACLs and NTFS folder permissions on home directories?

Posted on 2011-09-08
7
Medium Priority
?
450 Views
Last Modified: 2013-12-07
My boss is asking that I generate a list or report from our home directory servers (2k3 systems), that will provide ACLs and or NTFS permissions detailing who has access to what. We want to run an audit on our home directories to make sure all ACLs are similiar that Administrators have Full rights, Systems have full rights, and the user who the home directory belongs to have up to modify rights on there home folder. So generating a list that will show anything out of the norm would help as well. Max points granted.
0
Comment
Question by:ksol
  • 3
  • 2
6 Comments
 
LVL 13

Expert Comment

by:connectex
ID: 36504878
A simple utility for this is Sysinternal's AccessEnum. It's available here: http://technet.microsoft.com/en-us/sysinternals/bb897332

-Matt-
0
 

Author Comment

by:ksol
ID: 36506030
The way home directories are set on my network (see attachment). every user has a home folder with up to modify rights only, and ADMINISTRATOR and SYSTEM has full control of each user's home directory folder. We want to keep in within that standards. As of late, we noticed that some user's home directory folder can be accessed by someone else (non-admin). Being that we have hundreds of users home directory folder, we need a tool that would just audit, and let us know if there is something out of the norm or standards. Maybe if there is a command we can run natively on the server like icacls commands, that would help. Something that will produce a report that is not granular.          Doc1.docx
0
 
LVL 13

Expert Comment

by:connectex
ID: 36506236
AccessEnum will dump the user rights assignments in to a printable/reviewable format. If you want something customized to your exact needs, I recommended creating script (VBScript, PowerShell, etc.) to review and report on any non-standard permissions. Basically it's recurse through all subfolders (one or multiple levels, as needed), retrieve and check rights skip over administrator, system, username. Report any other entries in the permissions list, Next folder until subfolder list is complete.

-Matt-
0
Managing Security Policy in a Changing Environment

The enterprise network environment is evolving rapidly as companies extend their physical data centers to embrace cloud computing and software-defined networking. This new reality means that the challenge of managing the security policy is much more dynamic and complex.

 
LVL 13

Expert Comment

by:connectex
ID: 36506259
Another possiblity is to use something like SetACL or icalcs in a batch file or such. To set the permissions as desired. This won't let you audit them but if ran on a regular basis it will reset them to a known state.

-Matt-
0
 

Accepted Solution

by:
ksol earned 0 total points
ID: 36589664
I found a tool called Hyena that did the job.
0
 
LVL 27

Expert Comment

by:Tolomir
ID: 37163627
This question has been classified as abandoned and is closed as part of the Cleanup Program. See the recommendation for more details.
0

Featured Post

SMB Security Just Got a Layer Stronger

WatchGuard acquires Percipient Networks to extend protection to the DNS layer, further increasing the value of Total Security Suite.  Learn more about what this means for you and how you can improve your security with WatchGuard today!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Your business may be under attack from a silent enemy that is hard to detect. It works stealthily in the shadows to access and exploit your critical business information, sensitive confidential data and intellectual property, for commercial gain. T…
Although free tools can be helpful to a limited extent, it’s better to stick to paid versions for business use.
NetCrunch network monitor is a highly extensive platform for network monitoring and alert generation. In this video you'll see a live demo of NetCrunch with most notable features explained in a walk-through manner. You'll also get to know the philos…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses

612 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question