Solved

domain users or everyone group

Posted on 2013-06-05
7
289 Views
Last Modified: 2013-07-15
If you have a large file server (56 shares) and you want to see what directories groups like everyone and domain users can access, how could you do this? i..e for this server, this domain group can access xyz
0
Comment
Question by:pma111
  • 3
  • 2
  • 2
7 Comments
 
LVL 22

Accepted Solution

by:
Haresh Nikumbh earned 250 total points
ID: 39222527
0
 
LVL 3

Author Comment

by:pma111
ID: 39222578
I am not sure shareEnum is enough is it. Dont access and share permissions compete? I.e. most restrictive wins? If thats just reporting on shares inst that only half the story? And do they only report on root folders, i..e \\server\share, what about if your main interest is \\server\share\directory 1 \\server\share\directory 2
0
 
LVL 3

Author Comment

by:pma111
ID: 39222637
accesschk looks promising, however I just ran it against a server I was interested in, and specified a group, but it is a bit vague, it just lists certain folders I can access, but doesnt report what access I have to them, i.e. it could be just "list folder contents" which wouldnt be as much of a concern.
0
IT, Stop Being Called Into Every Meeting

Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

 
LVL 22

Expert Comment

by:Haresh Nikumbh
ID: 39222806
run following command from powershell

icacls \\server\share /t /c > outfile.txt

and check if this what you are looking?
0
 
LVL 7

Assisted Solution

by:dec0mpile
dec0mpile earned 250 total points
ID: 39223298
The tool that takecoffe mentioned (icacls) is the only way that i know to do this the Microsoft way. Unfortunately, the report is not very friendly.

At my company I need to do reports and generate them in user readable Excel format for auditing purposes. I used a tool called Hyena and it worked great for this purpose.

http://www.systemtools.com/hyena/
0
 
LVL 3

Author Comment

by:pma111
ID: 39225204
does icalcs report on both share and directory permissions, or just directory permissions? My understanding was the more restrictive of the 2 comes into effect.
0
 
LVL 7

Expert Comment

by:dec0mpile
ID: 39263664
Here is another tool you can try. I have used this in the past to generate reports of large number of shares, and permissions for each down to the file level (it's free).

DumpSec: http://www.systemtools.com/somarsoft/

SomarSoft's DumpSec is a security auditing program for Microsoft Windows® NT/XP/200x. It dumps the permissions (DACLs) and audit settings (SACLs) for the file system, registry, printers and shares in a concise, readable format, so that holes in system security are readily apparent. DumpSec also dumps user, group and replication information.
0

Featured Post

Backup Your Microsoft Windows Server®

Backup all your Microsoft Windows Server – on-premises, in remote locations, in private and hybrid clouds. Your entire Windows Server will be backed up in one easy step with patented, block-level disk imaging. We achieve RTOs (recovery time objectives) as low as 15 seconds.

Join & Write a Comment

I had a question today where the user wanted to know how to delete an SSL Certificate, so I thought that I would quickly add this How to! Article for your reference. WHY WOULD YOU WANT TO DELETE A CERTIFICATE? 1. If an incorrect certificate was …
You might have come across a situation when you have Exchange 2013 server in two different sites (Production and DR). After adding the Database copy in ECP console it displays Database copy status unknown for the DR exchange server. Issue is strange…
This tutorial will show how to push an installation of Backup Exec to an additional server in both 2012 and 2014 versions of the software. Click on the Backup Exec button in the upper left corner. From here, select Installation and Licensing, then I…
This tutorial will walk an individual through locating and launching the BEUtility application and how to execute it on the appropriate database. Log onto the server running the Backup Exec database. In a larger environment, this would generally be …

743 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now