Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

How would I generate a report that list ACLs and NTFS folder permissions on home directories?

Posted on 2011-09-08
7
Medium Priority
?
448 Views
Last Modified: 2013-12-07
My boss is asking that I generate a list or report from our home directory servers (2k3 systems), that will provide ACLs and or NTFS permissions detailing who has access to what. We want to run an audit on our home directories to make sure all ACLs are similiar that Administrators have Full rights, Systems have full rights, and the user who the home directory belongs to have up to modify rights on there home folder. So generating a list that will show anything out of the norm would help as well. Max points granted.
0
Comment
Question by:ksol
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2
7 Comments
 
LVL 13

Expert Comment

by:connectex
ID: 36504878
A simple utility for this is Sysinternal's AccessEnum. It's available here: http://technet.microsoft.com/en-us/sysinternals/bb897332

-Matt-
0
 

Author Comment

by:ksol
ID: 36506030
The way home directories are set on my network (see attachment). every user has a home folder with up to modify rights only, and ADMINISTRATOR and SYSTEM has full control of each user's home directory folder. We want to keep in within that standards. As of late, we noticed that some user's home directory folder can be accessed by someone else (non-admin). Being that we have hundreds of users home directory folder, we need a tool that would just audit, and let us know if there is something out of the norm or standards. Maybe if there is a command we can run natively on the server like icacls commands, that would help. Something that will produce a report that is not granular.          Doc1.docx
0
 
LVL 13

Expert Comment

by:connectex
ID: 36506236
AccessEnum will dump the user rights assignments in to a printable/reviewable format. If you want something customized to your exact needs, I recommended creating script (VBScript, PowerShell, etc.) to review and report on any non-standard permissions. Basically it's recurse through all subfolders (one or multiple levels, as needed), retrieve and check rights skip over administrator, system, username. Report any other entries in the permissions list, Next folder until subfolder list is complete.

-Matt-
0
Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

 
LVL 13

Expert Comment

by:connectex
ID: 36506259
Another possiblity is to use something like SetACL or icalcs in a batch file or such. To set the permissions as desired. This won't let you audit them but if ran on a regular basis it will reset them to a known state.

-Matt-
0
 

Accepted Solution

by:
ksol earned 0 total points
ID: 36589664
I found a tool called Hyena that did the job.
0
 
LVL 27

Expert Comment

by:Tolomir
ID: 37163627
This question has been classified as abandoned and is closed as part of the Cleanup Program. See the recommendation for more details.
0

Featured Post

2017 Webroot Threat Report

MSPs: Get the facts you need to protect your clients.
The 2017 Webroot Threat Report provides a uniquely insightful global view into the analysis and discoveries made by the Webroot® Threat Intelligence Platform to provide insights on key trends and risks as seen by our users.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

What's worse than having your data encrypted by ransomware? Getting attacked by a so-called "wiper," which simply destroys the data and offers you no hope of ever seeing it again.
Tech spooks aren't just for those who are tech savvy, it also happens to those of us running a business. Check out the top tech spooks for business owners.
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …

650 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question