<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to monitor Windows access control lists at the NTFS level in Security</title>
    <link>https://community.splunk.com/t5/Security/How-to-monitor-Windows-access-control-lists-at-the-NTFS-level/m-p/69419#M2263</link>
    <description>&lt;P&gt;"Best" is very subjective.  If you can build a scripted input using Powershell that tells you what to you want to know, then that should work fine.  &lt;/P&gt;

&lt;P&gt;As I understand your requirement, you're not looking to index audit data (as in who accessed which file when), but rather who, based on permissions, has the potential to access.  You might be able to do this simply by running xcacls or a similar NTFS permissions dumptool -- but a powershell script could be more robust.&lt;/P&gt;

&lt;P&gt;Ultimately, you may need a small amount of python glue to launch your powershell script, but this should work.&lt;/P&gt;</description>
    <pubDate>Tue, 29 Mar 2011 04:25:29 GMT</pubDate>
    <dc:creator>dwaddle</dc:creator>
    <dc:date>2011-03-29T04:25:29Z</dc:date>
    <item>
      <title>How to monitor Windows access control lists at the NTFS level</title>
      <link>https://community.splunk.com/t5/Security/How-to-monitor-Windows-access-control-lists-at-the-NTFS-level/m-p/69418#M2262</link>
      <description>&lt;P&gt;I want to build a security report that lists what directories and files a specified user account has access to by NTFS permission level (Read, Change, Full Control, etc.). &lt;/P&gt;

&lt;P&gt;I am looking at running a scripted input using MS Powershell. Is this the right approach?&lt;/P&gt;</description>
      <pubDate>Tue, 29 Mar 2011 03:51:19 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/How-to-monitor-Windows-access-control-lists-at-the-NTFS-level/m-p/69418#M2262</guid>
      <dc:creator>tgow</dc:creator>
      <dc:date>2011-03-29T03:51:19Z</dc:date>
    </item>
    <item>
      <title>Re: How to monitor Windows access control lists at the NTFS level</title>
      <link>https://community.splunk.com/t5/Security/How-to-monitor-Windows-access-control-lists-at-the-NTFS-level/m-p/69419#M2263</link>
      <description>&lt;P&gt;"Best" is very subjective.  If you can build a scripted input using Powershell that tells you what to you want to know, then that should work fine.  &lt;/P&gt;

&lt;P&gt;As I understand your requirement, you're not looking to index audit data (as in who accessed which file when), but rather who, based on permissions, has the potential to access.  You might be able to do this simply by running xcacls or a similar NTFS permissions dumptool -- but a powershell script could be more robust.&lt;/P&gt;

&lt;P&gt;Ultimately, you may need a small amount of python glue to launch your powershell script, but this should work.&lt;/P&gt;</description>
      <pubDate>Tue, 29 Mar 2011 04:25:29 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/How-to-monitor-Windows-access-control-lists-at-the-NTFS-level/m-p/69419#M2263</guid>
      <dc:creator>dwaddle</dc:creator>
      <dc:date>2011-03-29T04:25:29Z</dc:date>
    </item>
  </channel>
</rss>

