Solved

How would I generate a report that list ACLs and NTFS folder permissions on home directories?

Posted on 2011-09-08
7
430 Views
Last Modified: 2013-12-07
My boss is asking that I generate a list or report from our home directory servers (2k3 systems), that will provide ACLs and or NTFS permissions detailing who has access to what. We want to run an audit on our home directories to make sure all ACLs are similiar that Administrators have Full rights, Systems have full rights, and the user who the home directory belongs to have up to modify rights on there home folder. So generating a list that will show anything out of the norm would help as well. Max points granted.
0
Comment
Question by:ksol
  • 3
  • 2
7 Comments
 
LVL 13

Expert Comment

by:connectex
ID: 36504878
A simple utility for this is Sysinternal's AccessEnum. It's available here: http://technet.microsoft.com/en-us/sysinternals/bb897332

-Matt-
0
 

Author Comment

by:ksol
ID: 36506030
The way home directories are set on my network (see attachment). every user has a home folder with up to modify rights only, and ADMINISTRATOR and SYSTEM has full control of each user's home directory folder. We want to keep in within that standards. As of late, we noticed that some user's home directory folder can be accessed by someone else (non-admin). Being that we have hundreds of users home directory folder, we need a tool that would just audit, and let us know if there is something out of the norm or standards. Maybe if there is a command we can run natively on the server like icacls commands, that would help. Something that will produce a report that is not granular.          Doc1.docx
0
 
LVL 13

Expert Comment

by:connectex
ID: 36506236
AccessEnum will dump the user rights assignments in to a printable/reviewable format. If you want something customized to your exact needs, I recommended creating script (VBScript, PowerShell, etc.) to review and report on any non-standard permissions. Basically it's recurse through all subfolders (one or multiple levels, as needed), retrieve and check rights skip over administrator, system, username. Report any other entries in the permissions list, Next folder until subfolder list is complete.

-Matt-
0
What is SQL Server and how does it work?

The purpose of this paper is to provide you background on SQL Server. It’s your self-study guide for learning fundamentals. It includes both the history of SQL and its technical basics. Concepts and definitions will form the solid foundation of your future DBA expertise.

 
LVL 13

Expert Comment

by:connectex
ID: 36506259
Another possiblity is to use something like SetACL or icalcs in a batch file or such. To set the permissions as desired. This won't let you audit them but if ran on a regular basis it will reset them to a known state.

-Matt-
0
 

Accepted Solution

by:
ksol earned 0 total points
ID: 36589664
I found a tool called Hyena that did the job.
0
 
LVL 27

Expert Comment

by:Tolomir
ID: 37163627
This question has been classified as abandoned and is closed as part of the Cleanup Program. See the recommendation for more details.
0

Featured Post

Connect further...control easier

With the ATEN CE624, you can now enjoy a high-quality visual experience powered by HDBaseT technology and the convenience of a single Cat6 cable to transmit uncompressed video with zero latency and multi-streaming for dual-view applications where remote access is required.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The next five years are sure to bring developments that are just astonishing, and we will continue to try to find the balance between connectivity and security. Here are five major technological developments from the last five years and some predict…
Many businesses neglect disaster recovery and treat it as an after-thought. I can tell you first hand that data will be lost, hard drives die, servers will be hacked, and careless (or malicious) employees can ruin your data.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

809 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question