NTFS Permission Auditing

Who has access to what?
Now you'll actually know.

Walk any directory tree, report full NTFS permissions at every level — explicit, inherited, effective. Flag world-readable shares, Everyone with write, broken inheritance, and orphaned SIDs. Hand the report to your auditor.

Your quarterly permission review shouldn't take a week.

PowerShell Get-Acl dumps raw SDDL

Unreadable, not audit-ready, and your compliance team has no idea what they're looking at.

Netwrix and Varonis cost thousands

$5K+ per year for agent-based platforms. You don't need continuous monitoring. You need a quarterly audit report.

Permissions Reporter has no risk scoring

CJWDEV's tool reports permissions but doesn't flag the risky ones. You still have to manually sift through thousands of ACEs to find problems.

SOC2/HIPAA/ISO need evidence

Compliance auditors ask "who has access to what?" and you need a formatted, timestamped answer — not a screenshot of folder properties.

What gets flagged

Critical

Everyone or Authenticated Users has FullControl or Write access to a directory.

High

Inheritance broken without clear justification. Orphaned SIDs (deleted accounts with ACEs remaining).

Medium

Domain Users has modify rights to sensitive paths. SYSTEM with explicit FullControl on user data.

Low

Permission depth exceeds 5 levels of explicit overrides. Complex but not necessarily dangerous.

Your auditor asks. You answer.

Trial scans up to 500 paths. Pro scans everything with full risk flagging.