Solved

Event 4670: Files/Folder Audit Permission Reporting

Posted on 2012-04-11
2
1,230 Views
Last Modified: 2012-08-21
Hi,

We have a file server with more than 1000 folders and we want to generate a report from the event ID 4670:

Who changed the permission
Who changed the ownership
To Whom was the permission was given
To Whom was the ownership was given
Who took ownership
What permission was change
Compare the new and old permission

Is there a script  that can handle this? I've seen a 3rd party application named SecReport anyone knows a free application as an alternative which can provide a human-readable reports that allow for easy identification of users and groups that have various levels of access to file/folders.
0
Comment
Question by:jayrbarrios
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 17

Accepted Solution

by:
Anuroopsundd earned 500 total points
ID: 37836139
0
 
LVL 1

Author Comment

by:jayrbarrios
ID: 37836271
Thanks for the info, I tried the tool but it only gives me a general report, when I changed the permission from Read/Execute to Modify it will just give me this info:

[4/12/2012 2:44:03 PM] CHANGED->\\WS08MDT01\Share\Department 3

I'm looking for something that can analyze the logs even after the event has taken placed.
0

Featured Post

2017 Webroot Threat Report

MSPs: Get the facts you need to protect your clients.
The 2017 Webroot Threat Report provides a uniquely insightful global view into the analysis and discoveries made by the Webroot® Threat Intelligence Platform to provide insights on key trends and risks as seen by our users.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Blackberry and SMS logging 5 36
What's API gateway/firewall & how it's used 10 81
Active Directory Cleanup Report 2 50
sample of wannacry 3 210
Many businesses neglect disaster recovery and treat it as an after-thought. I can tell you first hand that data will be lost, hard drives die, servers will be hacked, and careless (or malicious) employees can ruin your data.
This article demonstrates probably the easiest way to configure domain-wide tier isolation within Active Directory. If you do not know tier isolation read https://technet.microsoft.com/en-us/windows-server-docs/security/securing-privileged-access/s…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…

734 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question