Solved

Windows FileSharing audit application

Posted on 2014-04-09
4
247 Views
Last Modified: 2014-04-11
I'm looking for a non-expensive solution capable of searching through a 40+ network of servers running MS Windows Server 2008 OS that will report back if Windows File Share is enabled, what folder is being shared (include the path) and if possible, what users are permitted access and their security level.

Anyone with any experience in this area?
0
Comment
Question by:casenet
  • 2
4 Comments
 
LVL 35

Accepted Solution

by:
Bembi earned 350 total points
ID: 39990108
Windows servers have a MMC snap in for this, at least for the basic funtionality, at least on a server level.
If you look for something centralized, you will end at some more expensive monitoring tools like SCOM etc. or other vendors. But as monitoring is an enterprise functionality, the prices are in such a region.

You may check solarwinds, which offers some monitoring tools, but even not a low cost solution.
0
 
LVL 27

Expert Comment

by:skullnobrains
ID: 39991207
psservice will let you check a number of machines for enables services (including the "server" service which enables file and printer sharing)

then this does not tell you which shares are actually used.

for this, you can actually browse the network
net view \\computer
will list shares you can access from your location and with your account on a remote computer

you can also use psexec to run "net view" locally on a list of computers if you are in a domain or have a valid account. like psservice, a single psexec command will check several machines
0
 

Author Closing Comment

by:casenet
ID: 39995353
Thank you.
0
 

Author Comment

by:casenet
ID: 39995355
Both worked but MMC could drill down a little deeper.  Can't afford a paid solution.
0

Featured Post

Best Practices: Disaster Recovery Testing

Besides backup, any IT division should have a disaster recovery plan. You will find a few tips below relating to the development of such a plan and to what issues one should pay special attention in the course of backup planning.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Change administrator password on server 13 93
Cisco ASA blocks some https sites. 27 44
WAN Link comparsion 3 28
SAP HANA vulnerability threat report. 2 27
How do we balance the user experience (UX) with reasonable security measures? It can be done, if you keep these fundamentals in mind.
Knowing where your website is hosted is as important as the features you receive, the monthly fee, and the support you receive. Due diligence should be done when choosing your next hosting provider.
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

828 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question