Solved

Windows FileSharing audit application

Posted on 2014-04-09
4
242 Views
Last Modified: 2014-04-11
I'm looking for a non-expensive solution capable of searching through a 40+ network of servers running MS Windows Server 2008 OS that will report back if Windows File Share is enabled, what folder is being shared (include the path) and if possible, what users are permitted access and their security level.

Anyone with any experience in this area?
0
Comment
Question by:casenet
  • 2
4 Comments
 
LVL 35

Accepted Solution

by:
Bembi earned 350 total points
ID: 39990108
Windows servers have a MMC snap in for this, at least for the basic funtionality, at least on a server level.
If you look for something centralized, you will end at some more expensive monitoring tools like SCOM etc. or other vendors. But as monitoring is an enterprise functionality, the prices are in such a region.

You may check solarwinds, which offers some monitoring tools, but even not a low cost solution.
0
 
LVL 26

Expert Comment

by:skullnobrains
ID: 39991207
psservice will let you check a number of machines for enables services (including the "server" service which enables file and printer sharing)

then this does not tell you which shares are actually used.

for this, you can actually browse the network
net view \\computer
will list shares you can access from your location and with your account on a remote computer

you can also use psexec to run "net view" locally on a list of computers if you are in a domain or have a valid account. like psservice, a single psexec command will check several machines
0
 

Author Closing Comment

by:casenet
ID: 39995353
Thank you.
0
 

Author Comment

by:casenet
ID: 39995355
Both worked but MMC could drill down a little deeper.  Can't afford a paid solution.
0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

Big data transfers via information superhighways require special attention and protection. Learn more about the IT-regulations of the country where your server is located. Analyze cloud providers and their encryption systems for safe data transit. S…
Find out what Office 365 Transport Rules are, how they work and their limitations managing Office 365 signatures.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
In this seventh video of the Xpdf series, we discuss and demonstrate the PDFfonts utility, which lists all the fonts used in a PDF file. It does this via a command line interface, making it suitable for use in programs, scripts, batch files — any pl…

760 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

24 Experts available now in Live!

Get 1:1 Help Now