Instantly see who has which permissions on your shared folders and from where the permissions are being assigned.

Or Deploy With Our Virtual Appliance

Launch our brand new in-browser demo

Thousands of companies use Lepide to protect their data and detect threats

Thousands of Companies Use Lepide to Protect Their Data and Detect Threats - image

NTFS Permissions Reporting Tool

Lepide’s NTFS permissions reporting tool enables IT teams to analyze NTFS permissions applied to shared files and folders. It helps you ensure that only the right people have access to the right data, thus minimizing the risk of security breaches. With Lepide, you can instantly see who has received which permission, and from where, on a shared file or folder in your File Server.

How to Get Report on NTFS Permissions with Lepide

View NTFS Permissions of a Shared Folder

Lepide File Server Auditor generates reports that clearly show the current permissions of Active Directory objects on the shared files and folders of Windows File System. With numerous options available, you can get a summarized view of the different kinds of permissions very easily. Our automated solution scans the permissions of the selected shared files and folders either manually or at scheduled intervals.

NTFS Permissions of a Shared Folder
Calculate the Effective Permissions in Your File Servers

Lepide File Server Auditor evaluates the current effective permissions after calculating the NTFS permissions and Share permissions. That way, you can see the exact current permission for any user on any shared file or folder. All 13 permissions are evaluated one by one, and the final current permissions applied on a selected file or folder for an Active Directory user, group or another object. Each permission is denoted with a different icon and a different color.

Check Effective Permissions of Files and Folders
Analyze Inherited Permissions on Shared Files and Folders

Our File Server change auditing solution has dedicated features that help you analyze the inherited permissions applied on shared files and folders. You can view the inherited permissions report and sort it by users in a different tab. In the section where the list of sub-folders and files of the selected folder are displayed, a red icon will denote where the inherited permissions broke. Our solution also provides a dedicated screen to view the group memberships for a user who has inherited permissions on the selected file or folder.

Analyze Inherited Permissions on Shared Resources
Identify and Monitor Stale Objects

Stale objects in the File Server are actually unused files and folders. It is necessary to monitor these objects to prevent insiders from misusing them. Some files or folders are not meant to be used for long, as they store critical business information. Using them can increase the chances of data loss. Lepide File Server Auditor shows you which objects are stale at any one time. It can reveal any change made to stale files and folders and can send you real-time alerts.

Identify and Monitor Stale Data
Audit Permission Changes with Ease

After viewing the current permissions of a selected file or folder, you can investigate how the permissions to this file or folder have been applied and what changes have been made. The investigation opens in a separate and dedicated window, where you can apply the filters and check the permission changes for other objects in the hierarchy.

Audit permission changes
Export Reports on Effective Permissions

In the Current Permissions report, you have three levels of filtration to gather the required data. Filters can be applied to folders and types of files in File Server. After generating the report, you can further filter the content (sub-folders and files) of the selected folder to find which permissions you want to see. The third level further enhances the detail of the report by filtering by account; helping you determine direct permissions, indirect permissions and inherited permissions. You can switch to the “Permissions by User” tab to view reports sorted by users. All these reports can be saved in multiple formats like PDF, MHT and CSV.

Audit Reports on Effective Permissions
Find Excessive Permissions

Analyze Excessive Permissions

Just as important as understanding who has got access to your most critical data is having a better understanding of if they actually need access and if the level of access is appropriate. With our excessive permissions reporting we can help you adopt a stronger least privilege model and revoke privileges from users who are not actually utilizing them. Thus, giving you the visibility you need to further improve the security surrounding your organization’s data.

Want to see it in action?

Take a virtual tour of the Lepide Data Security Platform in our web-based demo. See how Lepide aligns with your use case, whether it be ransomware, Active Directory security, Microsoft 365 security, data protection, data access governance or more.

Launch in-browser demo
In-Browser Demo - image

On-Premise and Cloud Protection From a Single Console

Our Success Stories

Western Connecticut Health Network

Lepide is straightforward to use and effective right off the bat. Plus, the level of patience, attentiveness and technical knowhow is far beyond most support and sales teams I’ve seen before.

Ratings Drayke Jackson Security Engineer Drayke Jackson
Edinburgh Napier University

We chose Lepide as they were able to offer us threat detection and response, and a way of separating out reporting duties to a web console – all from one platform.

Ratings Kevin Gallagher Senior Systems Administrator Kevin Gallagher
City of

Lepide is a perfect fit for our IT Security and Compliance requirements. It helps us cut out a lot of wasted time and money and now we know we can be compliant with industry standards.

Ratings Agnel Dsilva Information Technology Administrator Agnel Dsilva