Wishlist 0 ¥0.00

智能管理的前11个 NTFS 权限工具

Top 11 NTFS Permissions Tools for Smarter Administration

智能管理的前11个 NTFS 权限工具

Managers and compliance auditors often ask IT admins to present a report listing file share permissions granted to a group or a particular user. Here are a few paid and free tools that will help you save time on generating these reports.

经理和法规遵循审核员经常要求 IT 管理员提交一份报告,列出授予某个组或某个特定用户的文件共享权限。这里有一些付费和免费的工具,可以帮助您节省生成这些报告的时间。

Free Tools for NTFS Reporting and Management

免费的 NTFS 报告和管理工具

1. NTFS Permissions Reporter Free Edition from Cjwdev

1. Cjwdev 的 NTFS 权限报告免费版

Cjwdev’s NTFS Permissions Reporter is a good tool that helps you export file and folder permissions. It displays group members (direct and nested) right in the report; plus, you can pick the report format (a tree or table) as well as highlight different permissions in different colors. The tool is highly customizable and is rather easy to use, but at first, the interface may look a little overloaded, and permission scanning may take additional time. The tool enables you to easily export report results to an HTML file. However, it creates reports on NTFS permissions only for a folder; it cannot show the permissions of a user.

Cjwdev 的 NTFS 权限报告是一个很好的工具,可以帮助您导出文件和文件夹权限。它在报表中显示组成员(直接的和嵌套的) ; 另外,您可以选择报表格式(树或表格)以及以不同的颜色突出显示不同的权限。这个工具是高度可定制的,并且相当容易使用,但是首先,界面可能看起来有点过载,并且权限扫描可能需要额外的时间。该工具使您能够轻松地将报告结果导出到 HTML 文件。但是,它只为文件夹创建 NTFS 权限报告; 它不能显示用户的权限。

NTFS Permissions Tools Reporter1

NTFS Permissions Tools Reporter2

2. Netwrix Effective Permissions Reporting Tool

2. netrix 有效权限报告工具

Netwrix Effective Permissions Reporting Tool helps you make sure that employees’ permissions align with their roles in the organization. IT delivers a file share and Active Directory permissions report that details who has access to what and how that access was gained. This freeware tool is very simple and easy to use: You just need to enter the name of a user or group to check its permissions. The scan is very fast and the HTML export functionality is straightforward. It doesn’t show folder permissions, however; such a report is available in Netwrix Auditor for File Servers (20-day free trial).

Netwrix 有效权限报告工具可以帮助您确保员工的权限与他们在组织中的角色相一致。IT 提供了一个文件共享和 activedirectory 权限报告,其中详细说明了谁可以访问哪些内容以及如何访问。这个免费软件工具非常简单易用: 您只需输入一个用户或组的名称,以检查其权限。扫描速度非常快,HTML 导出功能非常简单。但是,它不显示文件夹权限; 这样的报告可以在 netwright Auditor for File Servers (20天免费试用期)中获得。

NTFS Permissions Tools NERP1

NTFS Permissions Tools NERP2.

3. Microsoft’s Access Enum 3. 微软的 Access Enum

As there’s no built-in way to quickly view user accesses to a tree of directories or keys, Microsoft Windows SysInternals tools may come handy. AccessEnum is one of SysInternals tools which gives you a full view of your file system and Registry security settings in seconds, and provides a table view of all permissions on your file share or registry. However, you can export only to .txt format, which is rather complicated to read. If you want the information in .xls format, you’ll need to copy it from the .txt file manually.

由于没有快速查看用户访问目录树或键的内置方法,Microsoft Windows SysInternals 工具可能会派上用场。AccessEnum 是 SysInternals 工具之一,它可以在几秒钟内提供文件系统和注册表安全设置的全景,并提供文件共享或注册表上所有权限的表格视图。但是,您只能将。格式,这是相当复杂的阅读。如果你想要这些信息。Xls 格式,你需要从。Txt 文件手动。

NTFS Permissions Tools Enum1

NTFS Permissions Tools Enum2

4. Permissions Reporter from Key Metric Software

4. 来自关键度量软件的权限报告

Permissions Reporter is a very good Windows NTFS permissions reporting tool. It has the same functionality as Cjwdev’s NTFS Permissions Reporter tool, but has a prettier interface. It’s also easy to create and download repots. However, permission scanning takes some time, and you can report on only NTFS permissions to a folder or a HTML file, not the permissions of a user.

权限报告是一个非常好的 Windows NTFS 权限报告工具。它具有与 Cjwdev 的 NTFS 权限报告工具相同的功能,但界面更加漂亮。创建和下载 repots 也很容易。但是,权限扫描需要一些时间,您只能报告对文件夹或 HTML 文件的 NTFS 权限,而不能报告用户的权限。

NTFS Permissions Tools Key Metric1

NTFS Permissions Tools Key Metric2.

5. Permissions Analyzer from SolarWinds 5. SolarWinds 的权限分析器

Some users might not be fond of Permissions Analyzer because you cannot export information from it, but for those who just need detailed information about user permissions, it can be rather handy. It quickly identifies how users’ permissions were inherited, browses permissions by group or by individual user, and analyzes them based on group membership and permissions.

有些用户可能不喜欢 Permissions Analyzer,因为您无法从它导出信息,但对于那些只需要关于用户权限的详细信息的用户来说,它可能相当方便。它快速识别用户的权限是如何继承的,按组或单个用户浏览权限,并根据组成员和权限分析这些权限。

NTFS Permissions Tools SolarWinds1

6. NTFS Permissions Tools from MajorGeeks.com

6. majorgeeks 网站的 NTFS 权限工具

NTFS Permissions Tools offers file permissions management for NTFS file systems. This handy tool was made for admins who need a lightweight access rights manager — it enables you to make a lot of permissions and security changes at once. Its main advantage over Window’s built-in permission and security tool is that it takes less time to change permissions and security settings.

NTFS 权限工具为 NTFS 文件系统提供文件权限管理。这个方便的工具是为需要轻量级访问权限管理器的管理员开发的ー它使您能够同时进行许多权限和安全更改。与 Window 的内置权限和安全工具相比,它的主要优势在于更改权限和安全设置所需的时间更少。

NTFS Permissions Tools MajorGeeks1

BONUS Free Tool: Microsoft PowerShell 免费工具: Microsoft PowerShell

If you prefer, you can always rely on your old friend PowerShell. Here are ready-to-use scripts for exporting folder permissions and user permissions into .csv format.

如果你愿意,你可以依靠你的老朋友 PowerShell。下面是用于导出文件夹权限和用户权限的现成脚本。Csv 格式。

PowerShell code for exporting folder permissions

用于导出文件夹权限的 PowerShell 代码

$OutFile = "C:\Temp\permissions.csv"
$Header = "Folder Path,IdentityReference,AccessControlType,IsInherited,InheritanceFlags,PropagationFlags"
Del $OutFile
Add-Content -Value $Header -Path $OutFile

$RootPath = "\\fs1\shared"

$Folders = dir $RootPath -recurse | where {$_.psiscontainer -eq $true}

foreach ($Folder in $Folders){
$ACLs = get-acl $Folder.fullname | ForEach-Object { $_.Access }
Foreach ($ACL in $ACLs){
$OutInfo = $Folder.Fullname + "," + $ACL.IdentityReference + "," + $ACL.AccessControlType + "," + $ACL.IsInherited + "," + $ACL.InheritanceFlags + "," + $ACL.PropagationFlags
Add-Content -Value $OutInfo -Path $OutFile
}}

Sample report:

样本报告:

NTFS Permissions Tools PowerShell

PowerShell code for exporting user permissions

用于导出用户权限的 PowerShell 代码

"ENTERPRISE\J.Carter" } | Add-Member -MemberType NoteProperty -name "\\fs1\shared\" -Value $path1 -passthru }} | export-csv "C:\temp\permissions.csv"

Sample report:

样本报告:

NTFS Permissions Tools PowerShell2

用于 NTFS 报告和管理的付费工具

1. Jam Software’s TreeSize

Jam Software’s TreeSize is focused on storage analysis. There is a limited freemium licensing option and a 30-day free trial of the full version.

Jam Software 的 TreeSize 专注于存储分析。有一个有限的免费增值许可选项和30天的完整版免费试用。

The free edition is highly praised by IT admins for its high scan speeds, ability to process and analyze storage (including network drives and locally synchronized cloud drives), and option to break down scan results according to owner, file type, size, etc., throughout the entire file system. For instance, this tool can help admins find largest files, the oldest files and the files with long paths.

免费版本因其高速的扫描速度、处理和分析存储(包括网络驱动器和本地同步云驱动器)的能力以及根据所有者、文件类型、大小等在整个文件系统中分解扫描结果的选项而受到 IT 管理员的高度赞扬。例如,这个工具可以帮助管理员找到最大的文件、最旧的文件和路径较长的文件。

The paid version also analyses file owners and permissions, NTFS compression rate, and much more. It can also process NTFS Alternate Data Streams and NTFS Hardlinks, will export scan results to various file formats, and provides command-line automation options.

付费版本还分析文件所有者和权限,NTFS 压缩率,等等。它还可以处理 NTFS 备用数据流和 NTFS 硬链接,将扫描结果导出到各种文件格式,并提供命令行自动化选项。

Paid NTFS Permissions Tools_TreeSize

2. Netwrix Auditor for File Servers

2. 文件服务器网络审计员

Netwrix Auditor for Windows File Servers delivers deep visibility into your Windows file servers, including permissions. Its various state-in-time reports provide a complete picture of effective permissions, duplicate files and stale data across your Windows file servers. It delivers visibility into all changes and all access events (both successful and failed) across your file storages, so you can compare your settings against your privacy policy and detect privilege escalation before any damage is done. Its ready-to-use reports streamline NTFS permissions audits and compliance reporting for requirements such as PCI DSS, SOX and HIPAA.

用于 Windows 文件服务器的 netrixauditor 提供了对 Windows 文件服务器的深度可见性,包括权限。它的各种状态实时报告提供了有效权限、重复文件和 Windows 文件服务器上的陈旧数据的完整图片。它提供了所有更改和所有访问事件的可见性(包括成功和失败的) ,所以你可以比较你的设置和你的隐私政策,并在任何损害发生之前检测权限提升。其随时可用的报告简化了 NTFS 权限审计和符合性报告,例如 PCI DSS、 SOX 和 HIPAA。

In conjunction with file analysis technology, it also helps you to stay aware of all changes to Windows Server file permissions; determine effective permissions by user and by object across multiple file servers and shares; and understand whether those file permissions were assigned directly or via group membership.

结合文件分析技术,它还可以帮助您了解 Windows Server 文件权限的所有更改; 确定跨多个文件服务器和共享的用户和对象的有效权限; 以及了解这些文件权限是直接分配的还是通过组成员身份分配的。

There is a 20-day free trial.

免费试用20天。

Paid NTFS Permissions Tools_Netwrix

Paid NTFS Permissions Tools_Netwrix2

3. AlbusBit’s NTFS Permissions Auditor

3. AlbusBit 的 NTFS 权限审计员

NTFS Permissions Auditor allows you to review and analyze any NTFS folder permissions. While the free version provides you with audit data, such as full path, owner, last modified, inherited flag and a full list of permissions in hierarchical folder view or account view, the pro version offers additional features such as report filtering by fields such as account name, SID or department; permission change analysis; export to various formats; report customization; automation; and more.

NTFS 权限审核允许您查看和分析任何 NTFS 文件夹权限。免费版本提供审计数据,比如完整路径、所有者、最后修改、继承标志以及分层文件夹视图或帐户视图中的完整权限列表,而专业版本提供其他特性,比如按帐户名、 SID 或部门等字段进行报告过滤; 权限更改分析; 导出到各种格式; 报告定制; 自动化; 等等。

Paid NTFS Permissions Tools_AlbusFit

4. Vyapin’s NTFS Security Management Suite

4. Vyapin 的 NTFS 安全管理套件

NTFS Security Management Suite is more like a full-fledged NTFS management system than single-task NTFS permission tool. It consists of three modules:

NTFS 安全管理套件比单任务 NTFS 权限工具更像是一个成熟的 NTFS 管理系统。它由三个单元组成:

  • NTFS Security Auditor enables you to scan shares, folders and files in your network, perform an automated inventory of permissions at regular intervals, and compare ACLs. There are a variety of built-in reports for system administrators and compliance
  • NTFS 安全审计员使您能够扫描共享,文件夹和文件在您的网络,执行一个定期的权限自动清单,并比较 acl。对于系统管理员和遵从性,有各种内置的报告
  • NTFS Change Auditor collects and analyses permission changes on specified locations.
  • NTFS 变更审核员收集和分析指定位置的许可变更。
  • NTFS Security Manager is designed to simplify native permission management.
  • NTFS 安全管理器旨在简化本机权限管理。

Vyapin provides a 15-day evaluation copy of NTFS Security Management Suite.

Vyapin 提供一个 NTFS 安全管理套件的15天评估副本。

Paid NTFS Permissions Tools_Vyapin

5. DSRAZOR from Visual Click Software

5. 来自 Visual Click Software 的 DSRAZOR

DSRAZOR is a versatile and customizable reporting tool for administrators and compliance auditors. You can analyze permissions for a particular file or folder. Reports are customizable and can include specific Active Directory attributes for each trustee, so auditors can tailor reports to their particular needs. There are comprehensive reports on past due, blocked or deactivated Active Directory accounts, and you can find out which accounts are not in use during a particular period, where the last login failed, and much more. However, while DSRASOR praised by many for its versatility, there is a fairly steep learning curve — the report design tool is rather clunky, and overall setup process is not super user-friendly.

DSRAZOR 是一个面向管理员和合规审计员的多功能和可定制的报告工具。您可以分析特定文件或文件夹的权限。报告是可定制的,可以为每个受托人包含特定的 activedirectory 属性,因此审计员可以根据自己的特定需求定制报告。这里有关于过期、被阻止或停用的活动目录帐户的综合报告,你可以找出哪些帐户在某个特定的时间段内没有使用,哪些帐户上次登录失败,等等。然而,尽管 DSRASOR 的多功能性受到了许多人的称赞,但它的学习曲线却相当陡峭ーー报表设计工具相当笨拙,整个设置过程也不是非常用户友好。

Paid NTFS Permissions Tools_DSRAZOR

Paid NTFS Permissions Tools_DSRAZOR2

如何使用 icacls 命令设置或重置文件或文件夹的 NTFS 权限

icalcs

In this article, we will learn how to set or reset NTFS permissions of a file or folder in a Windows operating system, with icacls command.

在本文中,我们将学习如何使用 icacl 命令设置或重置 Windows 操作系统中文件或文件夹的 NTFS 权限。

It can happen that, in some cases, we may lose sight of files or directories permissions, and when we try to access a specific file we have no result because we don’t have the rights to do so.
Or we may have to run a software that, for permission issue, does not work as it should.

在某些情况下,我们可能会忽略文件或目录的权限,当我们尝试访问一个特定的文件时,我们没有结果,因为我们没有这样做的权限。或者我们可能不得不运行一个软件,为了获得许可,它不能正常工作。

We may also need to access a file that came from an old backup or another computer and was therefore created with a different user; even then, it will not be possible to access it.

我们还可能需要访问一个来自旧备份或其他计算机的文件,因此是用不同的用户创建的; 即使这样,也不可能访问它。

In all these cases, Icacls command comes to help.

在所有这些情况下,Icacls 命令都会提供帮助。

What is Icacls?

什么是 Icacls?

Icacls is the replacement for cacls (Change Access Control Lists), a command-line utility that allows you to show and perform some operations on ACL for files or directories.

Icacls 是 cacls (更改访问控制列表)的替代品,这是一个命令行实用程序,允许您在 ACL 上显示和执行文件或目录的一些操作。

ACL (Access Control List) is a list of permissions for a filesystem object and defines how its security is controlled by managing who and how it can be accessed.

ACL (访问控制列表)是文件系统对象的权限列表,通过管理访问者和访问方式,定义了如何控制其安全性。

Actually, operations on ACL are not the only ones possible with this tool.
What makes it a powerful tool is also the ability to perform backup and restore operations on ACL for files or directories, or to search for files that have a specific user as owner.
And in addition, in the event that an ACL is damaged or destroyed, with icacls you can restore it by resetting it and setting default permissions or inheriting those of the parent.

实际上,ACL 上的操作并不是这个工具唯一可能的操作。它之所以是一个强大的工具,还因为它能够对 ACL 执行文件或目录的备份和恢复操作,或者搜索具有特定用户作为所有者的文件。另外,如果 ACL 损坏或销毁,您可以通过重置 icacl 并设置默认权限或继承父权限来恢复它。

Icacls: the reset and grant functions

Icacls: 重置和授予函数

Reset

重置

Icacls is a native Windows command that runs on Windows Vista, Windows 7, Windows 8 and Windows 10.
Imagine that we have an external hard disk on which a study made in 2018 was stored, and we want to recover it, but we do not have complete control.

Icacls 是一个本地 Windows 命令,可以在 Windows Vista,Windows 7,Windows 8和 Windows 10上运行。想象一下,我们有一个外部硬盘,上面存有2018年的一项研究,我们想要恢复它,但是我们没有完全的控制权。

As soon as we try to open the folder, we will have the following alert message.

一旦我们尝试打开文件夹,我们将得到以下警告消息。

openfolder deny

One solution is, therefore, to use the reset function of Icacls.
But pay attention to the following steps.

因此,一个解决方案是使用 Icacls 的重置功能。

Let’s open the command terminal in administrator mode.

让我们以管理员模式打开命令终端。

command prompt

Let’s move to the folder and type the reset command as follows:

让我们移动到文件夹并键入 reset 命令如下:

 $> icacls * /t /q /c /reset

And again, we’ll have “Access is denied” as a response.

同样,我们会用“拒绝访问”作为回应。

reset and noaccess

We must therefore first become the owner of the folder with the takeown command:

因此,我们必须首先使用 takeown 命令成为文件夹的所有者:

$> takeown / R / F *

takeown permission

By clicking Yes, you will now have a reset of ACL, and the permission state will be as follows:

通过单击 Yes,您现在将有一个 ACL 重置,并且权限状态如下:

advanced security settings

Grant

格兰特

Now, imagine being in the following situation:

现在,想象一下这样的情况:

other advanced security settings

Only the user named Peter has access to the folder, and we want to give grants also to the federica user.

只有名为 Peter 的用户可以访问该文件夹,我们还希望向 federica 用户提供补助。

With the previous command, we can become the owner of the folder

使用前面的命令,我们可以成为文件夹的所有者

$> takeown / R / F *

and then type the following command:

然后输入以下命令:

$> icacls "E:\Study2018" /t /grant:F

In this case, I have inserted the options /t, that means recursive, and F that means “full access” for the user on which we want to give grants.

在这个例子中,我插入了选项/t,这意味着递归,而 f 意味着我们想要授予的用户的“完全访问权”。

grant full access

For more options, see the official page.

有关更多选项,请参阅官方页面。

Other icacls functions

其他 icacls 功能

If you need to save ACLs in a file for a later restore, you can do by using a couple of “save and restore” commands.
A very simple operation from a point of view: information about the ACLs are saved in a file that can be used in case of need to restore a previous situation.
However, it should be noted that data on access rights, especially in shared folders, can be very variable over time.
We could then find ourselves in a situation where we are going to restore a situation that is different from reality or even inconsistent.
Moreover, the file that is created, openable and readable with a common text editor, seems to be a Unicode text.
But beware, because it isn’t.

如果您需要在文件中保存 acl 以便以后进行恢复,可以使用两个“保存和恢复”命令。从某种角度来看,这是一个非常简单的操作: 有关 acl 的信息保存在一个文件中,在需要恢复以前的情况时可以使用这个文件。然而,应该注意的是,访问权限数据,尤其是共享文件夹中的访问权限数据,随着时间的推移可能变化很大。然后,我们可能会发现自己处于这样一种情况,即我们要恢复一种与现实不同甚至不一致的局面。此外,使用通用文本编辑器创建、可开启和可读的文件似乎是 Unicode 文本。但是要小心,因为它不是。

Open the file and save it with some changes will make it unusable in Restore operations.

打开文件并通过一些更改将其保存,这将使其在“还原”操作中无法使用。

The couple of “save and restore” commands is as follows:

“保存和恢复”命令如下:

icacls FILE_O_DIRECTORY /save aclfile /t

icacls DIRECTORY /restore aclfile

Icacls DIRECTORY/restore aclfile

You will immediately notice a difference between the two commands.

您将立即注意到这两个命令之间的差异。

The save command can be executed both on file and on directories (FILE_O_O_DIRECTORY must be replaced with the name of the file or directory for which we want to save the ACL).

可以在文件和目录上执行 save 命令(FILE _ o _ o _ directory 必须替换为我们要为其保存 ACL 的文件或目录的名称)。

While the restore command only works on directories.

而 restore 命令只对目录有效。

An example of use is as follows:

使用的一个例子如下:

E:\> icacls filediprova.txt /save aclfile /t
E:\>icacls . /restore aclfile

As you can see, in restore command case we will not use filediprova.txt but the directory in which it is contained.

正如您所看到的,在 restore 命令情况下,我们将不使用 filediprova.txt,而是使用包含它的目录。

Conclusions

结论

In Windows systems, the ability managing access control lists is a strength that allows users and processes to make the best use of resources.
In some cases, it can be complicated, but with icacls tool, we can have many functions that help to ensure security.

在 Windows 系统中,管理访问控制列表的能力是允许用户和进程最佳利用资源的一个优点。在某些情况下,它可能比较复杂,但是使用 icacl 工具,我们可以使用许多功能来帮助确保安全性。

windows下批量修改文件(或文件夹)权限或所有者

简介:

强制将当前目录下的所有文件及文件夹、子文件夹下的所有者更改为管理员组(administrators)命令:

takeown /f * /a /r /d y

 

将所有d:\documents目录下的文件、子文件夹的NTFS权限修改为仅管理员组(administrators)完全控制(删除原有所有NTFS权限设置):

cacls d:\documents\*.* /T /G administrators:F

 

在原有d:\documents目录下的文件、子文件夹的NTFS权限上添加管理员组(administrators)完全控制权限(并不删除原有所有NTFS权限设置):

cacls d:\documents\*.* /T /E /G administrators:F

 

取消管理员组(administrators)完全控制权限(并不删除原有所有NTFS权限设置):

cacls \Server\Documents\%username%\我的文档 /t /e /r "mddq\domain admins"

cacls \Server\Documents\%username%\桌面 /t /e /r "mddq\domain admins"

如何通过组策略为文件和文件夹分配权限

How to Assign Permissions to Files and Folders through Group Policy

如何通过组策略为文件和文件夹分配权限

件夹分配权限

 

Assigning permissions for each file and folder individually can be complex and time consuming. To avoid going through the annoyances of changing permissions for a bunch of folders individually, we can use Group Policy to do it. In this article, you will see the process of assigning file and folder permissions across a domain through GPO. These instructions can be extremely helpful, and save your time if you have to assign permissions to a large number of systems with a common setup. Later in the article, you will also see the way to audit permission changes and to audit other changes in File Server through Lepide File Server Auditor (part of Lepide Data Security Platform).

为每个文件和文件夹单独分配权限可能是复杂和耗时的。为了避免为一堆文件夹单独更改权限的烦恼,我们可以使用组策略来完成。在本文中,您将看到通过 GPO 在整个域中分配文件和文件夹权限的过程。这些说明非常有用,如果您必须使用通用设置为大量系统分配权限,则可以节省时间。在本文的后面,您还将看到如何通过 Lepide File Server Auditor (Lepide Data Security Platform 的一部分)审计权限更改和审计 File Server 中的其他更改。

Steps to Assign File/Folder Permissions

分配文件/文件夹权限的步骤

  1. Go to “Start Menu” -> “Administrative Tools”, and click “Group Policy Management” to access its console.
  2. 转到“开始菜单”-> “管理工具”,然后单击“组策略管理”来访问控制台。
  3. In left panel of “Group Policy Management Console”, you have to create a new Group Policy Object or edit an existing Group Policy Object.
  4. 在“组策略管理控制台”的左侧面板中,必须创建新的组策略对象或编辑现有的组策略对象。
  5. To create a new GPO, right click “Group Policy Objects”, and select “New” from the context menu. It shows “New GPO” window. 要创建一个新的 GPO,右键单击“组策略对象”,然后从上下文菜单中选择“ New”。它显示“新 GPO”窗口
    Figure 1: Creating a new GPO
    图1: 创建一个新的 GPO
  6. Enter a name for the Group Policy Object (GPO) (in this case it is Assigning Folder Permissions), leave “Source Starter GPO” as “(none)”.
  7. 输入组策略对象(GPO)的名称(在本例中为 assignment Folder Permissions) ,保留“ Source Starter GPO”为“(none)”。
  8. Right-click on the newly created “User Folder Permissions” GPO, and select “Edit GPO”. Group Policy Management Editor window appears on the screen
  9. 右键单击新创建的“用户文件夹权限”GPO,并选择“编辑 GPO”。“组策略管理编辑器”窗口将显示在屏幕上
  10. Navigate to “Computer Configuration” -> “Policies” -> “Windows Settings” -> “Security Settings” -> “File System” 点击”计算机配置”->”策略”->”Windows 设置”->”安全设置”->”文件系统”
    Figure 2: Navigate to File System
    图2: 导航到文件系统
  11. Right-click on “File System” in the left pane and select “Add File…” It shows the following dialog box. 右键单击左窗格中的“文件系统”,然后选择“添加文件...”,它将显示以下对话框
    Figure 3: Select file or folder which you want to assign permissions on
    图3: 选择要分配权限的文件或文件夹
  12. Browse the folder or file that you wish to assign permissions on, and left click to select it. Click “OK”.
  13. 浏览您希望分配权限的文件夹或文件,然后左击选择它。单击“确定”。
  14. “Database Security” window appears on the screen “数据库安全”窗口出现在屏幕上
    Figure 4: Database security window 图4: 数据库安全窗口
  15. Click “Advanced” button to access “Advanced Security Settings” window. Stay on the “Permissions” tab that appears by default. 单击“高级”按钮进入“高级安全设置”窗口。停留在默认出现的“权限”选项卡上
    Figure 5: Advanced security settings window
    图5: 高级安全设置窗口
  16. On this tab, either select an existing user and click “Edit…” or click “Add…” to add a new user to the permissions.
  17. 在此选项卡上,选择一个现有用户并单击“编辑...”或单击“添加...”以向权限添加一个新用户。
  18. “Permissions Entry for…” dialog box opens up. Here, you will see that there is a list of permissions available for your users, and you can also choose where you want to apply those permissions. “权限项为...”对话框打开。在这里,您将看到有一个可用于您的用户的权限列表,您还可以选择要应用这些权限的位置
    Figure 6: Permissions entry folders 图6: 权限条目文件夹
  19. Use the drop-down menu in the “Apply to” field to assign selected permissions to desired folders.
  20. 使用“ Apply to”字段中的下拉菜单将选定的权限分配给所需的文件夹。
  21. Check the permissions as needed. These are self-explanatory.
  22. 根据需要检查权限。这些是不言自明的。
  23. Click “OK” to apply the permissions. It takes you back to “Advanced Security” window.
  24. 单击“确定”应用权限。它会将您带回到“高级安全”窗口。
  25. Now, move to the “Auditing” tab. Under this tab, you can do audit settings for the folder, so that any change done to this folder or its permission will be audited. Configure the auditing settings as per requirement.
  26. 现在,移动到“稽核”选项卡。在此选项卡下,您可以对该文件夹进行审计设置,以便对该文件夹或其权限所做的任何更改都会进行审计。根据需求配置审核设置。
  27. Similarly, you can do ownership settings for the folder under “Owner” tab.
  28. 类似地,您可以为“ Owner”选项卡下的文件夹进行所有权设置。
  29. Once you have done “Permission”, “Auditing” and “Ownership” settings, click “OK” to close “Advanced Security…” window.
  30. 完成“权限”、“审计”和“所有权”设置后,单击“确定”关闭“高级安全...”窗口。
  31. Click “OK” to close “Database Security…” window. Next, you will see “Add Object” window. 点击“确定”关闭“数据库安全...”窗口。下一步,您将看到“添加对象”窗口
    Figure 7: Add object window 图7: 添加对象窗口
  32. There are following options on the “Add Object” window: “添加对象”窗口有以下选项:
    1. Configure this file or folder then:配置该文件或文件夹,然后: Select this option to apply the settings. It contains the following two options. 选择此选项以应用设置。它包含以下两个选项
      1. Propagate inheritable permissions to all subfolders and files: Selecting this option means, all the subfolders and files will inherit permissions from the parent folder. In case of a mismatch or conflict, explicit permissions that were assigned to the subfolders or files will override the inherited permissions.
      2. 将可继承权限传播到所有子文件夹和文件: 选择此选项意味着,所有子文件夹和文件将继承来自父文件夹的权限。如果发生不匹配或冲突,分配给子文件夹或文件的显式权限将覆盖继承的权限。
      3. Replace existing permissions on all subfolders and files with inheritable permissions: This option will overwrite all the settings on all subfolders and files with the ones on the parent, so ultimately they will have identical permissions to the parent folder.
      4. 用可继承的权限替换所有子文件夹和文件上的现有权限: 这个选项将覆盖所有子文件夹和文件上的所有设置和父文件夹上的设置,因此最终它们对父文件夹拥有相同的权限。
    2. Do not allow permissions on this file or folder to be replaced: Use this setting for subfolders and files that you do not want to inherit permissions. For this, make an additional entry for those subfolders and files that will not inherit permissions e.g. let’s say you want the “A” folder to inherit permission but don’t want “B” folder to inherit permissions, in that case create an entry for the “B” folder.
    3. 不允许替换此文件或文件夹上的权限: 对不希望继承权限的子文件夹和文件使用此设置。为此,为那些不会继承权限的子文件夹和文件创建一个额外的条目,例如,假设你希望“ a”文件夹继承权限,但不希望“ b”文件夹继承权限,在这种情况下为“ b”文件夹创建一个条目。

    NOTE: In this case, option “a” has been selected. Click “OK” to close the “Add Object” window.

    注意: 在这种情况下,选项“ a”已经被选中。单击“确定”关闭“添加对象”窗口。

  33. Close “Group Policy Management Editor” window.
  34. 关闭“组策略管理编辑器”窗口。
  35. Right-click the domain you want to apply this GPO to, and then select “Link an Existing GPO…” option from the context menu. “Select GPO” window opens up. 右键单击要应用此 GPO 的域,然后从上下文菜单中选择“链接现有 GPO...”选项。“选择 GPO”窗口打开
    Figure 8: Select the new GPO
    图8: 选择新的 GPO
  36. Select the new “Assigning Folder Permissions” GPO, then click OK.
  37. 选择新的“分配文件夹权限”GPO,然后单击确定。
  38. In the right pane, stay on the “Linked Group Policy Objects” tab that appears by default.
  39. 在右窗格中,保持在默认出现的“链接组策略对象”选项卡上。
  40. Right-click on the “Assigning Folder Permissions”, and select “Enforced” from the context menu. A confirmation message appears on the screen.
  41. 右键单击“分配文件夹权限”,然后从上下文菜单中选择“强制”。屏幕上会出现一条确认消息。
  42. Click “OK” to close the dialog box.
  43. 单击“确定”关闭对话框。

Using Lepide File Server Auditor to audit files and folders changes

使用 Lepide File Server Auditor 审计文件和文件夹更改

To audit files and folders using Lepide File Server Auditor, at first add the file server to the application, and configure audit settings.

要使用 Lepide File Server Auditor 审计文件和文件夹,首先将文件服务器添加到应用程序中,并配置审计设置。

In the following screen, you can see the report on all modifications made in file server that shows all changes made to files and folders including their permissions. All the relevant information about auditing like who changed what, when and where is shown in a single record. Details pane gives further information about the record.

在下面的屏幕中,您可以看到关于在文件服务器中所做的所有修改的报告,其中显示了对文件和文件夹所做的所有修改,包括它们的权限。有关审计的所有相关信息,如谁更改了什么、何时、何地显示在单个记录中。“详细信息”窗格提供有关记录的进一步信息。

Figure 9: All modifications in a file server
图9: 文件服务器中的所有修改

Conclusion

总结

In this article, you have seen the way to assign files and folders permissions through GPO. You have also seen the auditing of changes made to files and folders using Lepide File Server Auditor. The solution has pre-defined file and folders modification and permission modification reports that make enterprises safe and compliance-ready.

在本文中,您已经看到了通过 GPO 分配文件和文件夹权限的方法。您还看到了使用 Lepide File Server Auditor 对文件和文件夹所做更改的审计。该解决方案具有预定义的文件和文件夹修改和权限修改报告,使企业能够安全和遵从。

About Us

Since 1996, our company has been focusing on domain name registration, web hosting, server hosting, website construction, e-commerce and other Internet services, and constantly practicing the concept of "providing enterprise-level solutions and providing personalized service support". As a Dell Authorized Solution Provider, we also provide hardware product solutions associated with the company's services.
 

Contact Us

Address: No. 2, Jingwu Road, Zhengzhou City, Henan Province

Phone: 0086-371-63520088 

QQ:76257322

Website: 800188.com

E-mail: This email address is being protected from spambots. You need JavaScript enabled to view it.