
The following screenshots show our “Current permissions” reports, which let you analyze the current permissions set on shared files and folders: Figure 4: Current permissions report With a comprehensive auditing solution like Lepide File Server Auditor in place, you can easily analyze current effective permissions held by users on files and folders, as well as modifications made to permissions. How Lepide File Server Auditor Analyze Current Effective Permissions of Users have on files and folders You can see a list of permission entries.įigure 3: Share permissions applied on a shared folder Step 7 – To view the share permissions set on a shared file or folder, switch to the “Share” tab.A list of all the effective permissions held by the user will be displayed on the bottom panel of the “Advanced Security Settings” window.įigure 2: Effective Permissions of users on a folder Step 6 – Click “Select a user” to add the user or group whose effective permissions you want to view.Step 4 – In the “Permissions” tab, you can see the permissions held by users over a particular file or folder.įigure 1: Permissions of users on a folder.Step 3 – Switch to “Security” tab and click “Advanced”.Step 2 – Right-click the folder or file and click “Properties” in the context menu.Step 1 – Locate the document for which you want to view the permissions.Let’s have a look at the steps you need to take to check who has access to what on the files or folders in your File server: To do this, event-by-event analysis is crucial. Keeping sensitive data under close surveillance helps keep your network infrastructure in a constant state of security. Steps to Track Permissions Applied on Files and Folders Speed up privacy and data subject access requests with eDiscovery. Data Classification Discover and Classify data on-premise and in the cloud.E-Discovery helps to speed up privacy and data subject access requests. Locate and Classify Sensitive Data and PIIĭata classification adds context to your security efforts.


Instant visibility on permission changes, spot users with excessive permissions and reverse unwanted changes. Threat Response Automated actions based on alerts.Threat Detection Anomaly spotting and real time alerts.

Intelligent threat detection through real time alerts, anomaly spotting and automated threat response. Learn more On-Premise & Cloud Platforms We Audit Monitor, audit and report on changes and interactions with platforms, files and folders across your on-premises and cloud environment.
