Hi Gordon I've been using SecurityExpression from Pedestal for a number of years now, I haven't looked at the pricing recently but it used to be really cheap, as it's very good I imagine there will have been a few price increases. However, it should be noted that it does so much more than file permissions you can set host policy with trivial ease from registry values to password policy. I have been told that the latest version will also deploy hotfixes - but verify that first.
check it out here http://www.networkintrusion.co.uk/h_scan.htm#SecurityExpressions PS ANYONE GOING TO DEFCON ?? take care -andy Taliskers Network Security Tools http://www.networkintrusion.co.uk ----- Original Message ----- From: "Gordon Govender" <[EMAIL PROTECTED]> To: <[EMAIL PROTECTED]> Sent: Thursday, July 10, 2003 7:23 AM Subject: RE: File permission scanner > Hello ! > > I am looking for a scanner that would drill down into folders and extract > the Administrative priveleges on them. > > This is aimed at checking my network servers to prevent users from > successfully escalating their privileges and working as Administrators. > > As anyone worked with such a scanner ? > > > Gordon > > > ******************************************************************* > > The e-mail and attachments are confidential and intended only for selected > recipients. If you have received it in error, you may not in any way > disclose or rely on the contents. You may not keep, copy or distribute the > e-mail. Should you receive it, immediately notify the sender of the error > and delete the e-mail.Also note that this form of communication is not > secure, it can be intercepted, and may not necessarily be free of errors and > viruses in spite of reasonable efforts to secure this medium. > > ******************************************************************* > > > > ******************************************************************* > > The e-mail and attachments are confidential and intended only for selected recipients. If you have received it in error, you may not in any way disclose or rely on the contents. You may not keep, copy or distribute the e-mail. Should you receive it, immediately notify the sender of the error and delete the e-mail.Also note that this form of communication is not secure, it can be intercepted, and may not necessarily be free of errors and viruses in spite of reasonable efforts to secure this medium. > > ******************************************************************* > > > -------------------------------------------------------------------------- - > Evaluating SSL VPNs' Consider NEOTERIS, chosen as leader by top analysts! > The Gartner Group just put Neoteris in the top of its Magic Quadrant, > while InStat has confirmed Neoteris as the leader in marketshare. > > Find out why, and see how you can get plug-n-play secure remote access in > about an hour, with no client, server changes, or ongoing maintenance. > > Visit us at: http://www.neoteris.com/promos/sf-6-9.htm > -------------------------------------------------------------------------- -- > --------------------------------------------------------------------------- Evaluating SSL VPNs' Consider NEOTERIS, chosen as leader by top analysts! The Gartner Group just put Neoteris in the top of its Magic Quadrant, while InStat has confirmed Neoteris as the leader in marketshare. Find out why, and see how you can get plug-n-play secure remote access in about an hour, with no client, server changes, or ongoing maintenance. Visit us at: http://www.neoteris.com/promos/sf-6-9.htm ----------------------------------------------------------------------------