Go Premium for a chance to win a PS4. Enter to Win

x
  • Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 1432
  • Last Modified:

AccessChk

Has anyone every run the AccessChk utility from Sys internals?

I am a bit perplexed by the findings?

I've run accesschk "domain users" across my H:\profile\desktop folder, and it returns lots of entries (i.e. indicating domain users can access my H:\profile\desktop folder".

It I run CACLS over the same folder, theres no entry for "domain users", so all I can imagine is CACLS is purely NTFS (directory) permissions, whereas accesschk is a cumulative of share/directory permissions?

Any ideas?
0
pma111
Asked:
pma111
  • 4
  • 3
1 Solution
 
McKnifeCommented:
> i.e. indicating domain users can access my H:\profile\desktop folder
Oh yeah? So how does it indicate that? accesscheck would list the permission type to the left of the filename (like "R" for read).
0
 
pma111Author Commented:
My impression was it only lists results where the user or group has permission on a specific file/folder? Is this not true? Does it also cover 'list folder contents' only entries? Or only read and write?
0
 
pma111Author Commented:
It seems a bit pointless if you have to supply a username or group over a directory your interested in (say 200 files) and you have to view each file to see what's to the left of the file name. Is there no way to filter down to only those files or directories a user or group can actually access ?
0
New Tabletop Appliances Blow Competitors Away!

WatchGuard’s new T15, T35 and T55 tabletop UTMs provide the highest-performing security inspection in their class, allowing users at small offices, home offices and distributed enterprises to experience blazing-fast Internet speeds without sacrificing enterprise-grade security.

 
McKnifeCommented:
Did you look at the parameters? There are P's for all your needs.
0
 
pma111Author Commented:
Can you provide some example syntax to just list files that a specific user can access in a specific directory (and leave out those they can't ? )
0
 
McKnifeCommented:
For example this shows all files with read or write access
accesschk -rw username path
0
 
pma111Author Commented:
Many thanks
0

Featured Post

Cyber Threats to Small Businesses (Part 2)

The evolving cybersecurity landscape presents SMBs with a host of new threats to their clients, their data, and their bottom line. In part 2 of this blog series, learn three quick processes Webroot’s CISO, Gary Hayslip, recommends to help small businesses beat modern threats.

  • 4
  • 3
Tackle projects and never again get stuck behind a technical roadblock.
Join Now