Creating an NTFS Security Report
The first step is to select the list of systems to report on. Next, specify the directory paths to enumerate (list) and those to exclude, as shown below. Note that complex wildcard options are available for both inclusion and exclusion.
Dialog to select the report data type and where to retrieve NTFS information.
Reviewing the Retrieved NTFS Data
NTFS data retrieval can be done on a scheduled basis or immediately (manual report) through the user interface. In the manual case, we see the result as a pop-up dialog that appears as soon as the data has been retrieved.
The retrieved data can be sorted immediately by clicking on the headings, and then exporting to HTML, CSV, or other data formats. You can also highlight entries of interest for export.
Exporting Formatted Data
The data immediately returned can be sorted and exported. Reports can be emailed, an arbitrary program can be run on the data, or the data can be analyzed using our Web Reporting module.
This is an example of a static web page generated manually from the previous data set. This report can be emailed or viewed interactively.
Dynamic Ad-hoc Reporting on NTFS Data
Because the data sets collected are large and complex, you would normally use the scheduled report generation option. In this case, your large permission data sets would populate your SQL Server database overnight while your systems are lightly loaded. During the day, you can select any of the data sets via a web interface and do ad-hoc queries on the collected data from the previous night, or any previous security data capture.
An example of an interactive query of a previously captured NTFS security data set. This report tells you who has access to what resources.