1

Context

Windows 2008 R2 infrastructure.

We manage network share permissions by AD security groups and put user objects in those groups.

Objective

I want to see what security groups are currently assigned to each folder on a particular server. I don't want to check each folder individually by right click > Properties > Security tab.

I want to perform some function recursively so I get a result something like this:

C:\                      - (DOMAIN\Group1)
C:\Folder1               - (DOMAIN\Group1)
C:\Folder1\subFolder1    - (DOMAIN\Group2)
C:\Folder2               - (DOMAIN\Group1)
codaamok
  • 186
  • 1
  • 13

2 Answers2

1

If you only want the permissions on folders then this powershell command will give show you

 Get-ChildItem -Recurse | Where { $_.PSIsContainer } | Get-Acl | Format-Table -Wrap
Mass Nerder
  • 1,007
  • 5
  • 6
1

There's a pretty nice GUI tool for this called AccessEnum from SysInternals.

While the flexible security model employed by Windows NT-based systems allows full control over security and file permissions, managing permissions so that users have appropriate access to files, directories and Registry keys can be difficult. There's no built-in way to quickly view user accesses to a tree of directories or keys. AccessEnum gives you a full view of your file system and Registry security settings in seconds, making it the ideal tool for helping you for security holes and lock down permissions where necessary.

enter image description here

Ryan Bolger
  • 16,755
  • 4
  • 42
  • 64