Hi Gordon
I've been using SecurityExpression from Pedestal for a number of years now,
I haven't looked at the pricing recently but it used to be really cheap, as
it's very good I imagine there will have been a few price increases.
However, it should be noted that it does so much more than file permissions
you can set host policy with trivial ease from registry values to password
policy.  I have been told that the latest version will also deploy
hotfixes - but verify that first.

check it out here
http://www.networkintrusion.co.uk/h_scan.htm#SecurityExpressions

PS ANYONE GOING TO DEFCON ??

take care
-andy
Taliskers Network Security Tools
http://www.networkintrusion.co.uk
----- Original Message ----- 
From: "Gordon Govender" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Thursday, July 10, 2003 7:23 AM
Subject: RE: File permission scanner


> Hello !
>
> I am looking for a scanner that would drill down into folders and extract
> the Administrative priveleges on them.
>
> This is aimed at checking my network servers to prevent users from
> successfully escalating their privileges and working as Administrators.
>
> As anyone worked with such a scanner ?
>
>
> Gordon
>
>
> *******************************************************************
>
> The e-mail and attachments are confidential and intended only for selected
> recipients.  If you have received it in error, you may not in any way
> disclose or rely on the contents.  You may not keep, copy or distribute
the
> e-mail. Should you receive it, immediately notify the sender of the error
> and delete the e-mail.Also note that this form of communication is not
> secure, it can be intercepted, and may not necessarily be free of errors
and
> viruses in spite of reasonable efforts to secure this medium.
>
> *******************************************************************
>
>
>
> *******************************************************************
>
> The e-mail and attachments are confidential and intended only for selected
recipients.  If you have received it in error, you may not in any way
disclose or rely on the contents.  You may not keep, copy or distribute the
e-mail. Should you receive it, immediately notify the sender of the error
and delete the e-mail.Also note that this form of communication is not
secure, it can be intercepted, and may not necessarily be free of errors and
viruses in spite of reasonable efforts to secure this medium.
>
> *******************************************************************
>
>
> --------------------------------------------------------------------------
-
> Evaluating SSL VPNs' Consider NEOTERIS, chosen as leader by top analysts!
> The Gartner Group just put Neoteris in the top of its Magic Quadrant,
> while InStat has confirmed Neoteris as the leader in marketshare.
>
> Find out why, and see how you can get plug-n-play secure remote access in
> about an hour, with no client, server changes, or ongoing maintenance.
>
> Visit us at: http://www.neoteris.com/promos/sf-6-9.htm
> --------------------------------------------------------------------------
--
>


---------------------------------------------------------------------------
Evaluating SSL VPNs' Consider NEOTERIS, chosen as leader by top analysts!
The Gartner Group just put Neoteris in the top of its Magic Quadrant,
while InStat has confirmed Neoteris as the leader in marketshare.
     
Find out why, and see how you can get plug-n-play secure remote access in
about an hour, with no client, server changes, or ongoing maintenance.
          
Visit us at: http://www.neoteris.com/promos/sf-6-9.htm
----------------------------------------------------------------------------

Reply via email to