Current Permission Analysis

Instantly see who has which permissions on your shared folders and their content.

Start Free Trial

Analyze Current Permissions on Shared Files and Folders

LepideAuditor for File Server enables IT teams to analyze current permissions applied to shared files and folders. It helps you ensure that only the right people have access to the right data, thus minimizing the risk of security breaches. With LepideAuditor, you can instantly see who has received which permission, and from where, on a shared file or folder in your File Server.

Over 5,000 Organizations Use LepideAuditor to Protect Their Businesses Against Data Breaches

How We Help in Current Permission Analysis

View Current Permissions of a Shared Folder

LepideAuditor generates reports that clearly show the current permissions of Active Directory objects on the shared files and folders of Windows File System. With numerous options available, you can get a summarized view of the different kinds of permissions very easily. Our automated solution scans the permissions of the selected shared files and folders either manually or at scheduled intervals.

Calculate the Current Permissions in Your File Servers

LepideAuditor for File Server evaluates the current effective permissions after calculating the NTFS permissions and Share permissions. That way, you can see the exact current permission for any user on any shared file or folder. All 13 permissions are evaluated one by one, and the final current permissions applied on a selected file or folder for an Active Directory user, group or another object. Each permission is denoted with a different icon and a different color.

Analyze Inherited Permissions on Shared Files and Folders

Our File Server change auditing solution has dedicated features that help you analyze the inherited permissions applied on shared files and folders. You can view the inherited permissions report and sort it by users in a different tab. In the section where the list of sub-folders and files of the selected folder are displayed, a red icon will denote where the inherited permissions broke. Our solution also provides a dedicated screen to view the group memberships for a user who has inherited permissions on the selected file or folder.

Identify and Monitor Stale Objects

Stale objects in the File Server are actually unused files and folders. It is necessary to monitor these objects to prevent insiders from misusing them. Some files or folders are not meant to be used for long, as they store critical business information. Using them can increase the chances of data loss. Lepide File Server Auditor shows you which objects are stale at any one time. It can reveal any change made to stale files and folders and can send you real-time alerts.

Investigate Permission Changes with Ease

After viewing the current permissions of a selected file or folder, you can investigate how the permissions to this file or folder have been applied and what changes have been made. The investigation opens in a separate and dedicated window, where you can apply the filters and check the permission changes for other objects in the hierarchy.

Permission Reports

In the Current Permissions report, you have three levels of filtration to gather the required data. Filters can be applied to folders and types of files in File Server. After generating the report, you can further filter the content (sub-folders and files) of the selected folder to find which permissions you want to see. The third level further enhances the detail of the report by filtering by account; helping you determine direct permissions, indirect permissions and inherited permissions. You can switch to the “Permissions by User” tab to view reports sorted by users. All these reports can be saved in multiple formats like PDF, MHT and CSV.

Analyze Excessive Permissions

Just as important as understanding who has got access to your most critical data is having a better understanding of if they actually need access and if the level of access is appropriate. With our excessive permissions reporting we can help you adopt a stronger least privilege model and revoke privileges from users who are not actually utilizing them. Thus, giving you the visibility you need to further improve the security surrounding your organization’s data.

Read all reviews

Read all stories

More from Lepide

Why the Real Estate Industry Could Do More to Secure Data
Learn More ->
Identifying and Protecting PHI Within Legacy Healthcare Systems
Learn More ->
Lepide Now Covers the Broadest Range of Platforms on the Market
Learn More ->
  • +1(0)-800-814-0578
  • |