Skip to main content

FS_ShareAudit Job

The FS_ShareAudit Job is designed to report on shares from targeted file servers based on user input.

Analysis Tasks for the FS_ShareAudit Job

View the analysis tasks by navigating to the FileSystem > Ad Hoc Audits > FS_ShareAudit > Configure node and select Analysis.

CAUTION: Do not modify or deselect the last three selected analysis tasks. The analysis tasks are preconfigured for this job.

Analysis Selection

The following analysis tasks are selected by default:

    1. Identify Selected Shares – Creates the SA_FS_ShareAudit_ShareSummary table accessible under the job’s Results node
    • Parameter is blank by default.
    • #UNC parameter must be configured by clicking Analysis Configuration with this task selected then selecting the #UNC table in the SQL Script Editor window and clicking Edit Table.
      • This brings up the Edit Table window where the user can manually enter UNC paths of each share to be audited or upload a CSV file containing one row for each share to be audited. See the SQLscripting Analysis Module section for additional information.
    • List one shared folder per row, using the format: \HOST\SHARE.
    1. Direct Permissions – Creates the SA_FS_ShareAudit_DirectPermissions table accessible under the job’s Results node
    1. Calculate Effective Access – Creates the SA_FS_ShareAudit_ShareAccess table accessible under the job’s Results node
    1. Identify Broken Inheritance
    • Creates a temporary table in the database for use by downstream analysis and report generation.
    • Creates the SA_FS_ShareAudit_UniqueTrustees table accessible under the job’s Results node.

In addition to the tables and views created by the analysis tasks, the FS_ShareAudit Job produces the following pre-configured report:

ReportDescriptionDefault TagsReport Elements
Share AuditThis report displays permission information for the selected shares.NoneThis report is comprised of four elements: - Table – Provides details on selected shares - Table – Provides details on permissions - Table – Provides details on effective access - Table – Provides details on broken inheritance