NTFS Permission Auditing

Who has access to what?
Now you'll actually know.

Walk any directory tree, report full NTFS permissions at every level — explicit, inherited, effective. Flag world-readable shares, Everyone with write, broken inheritance, and orphaned SIDs. Hand the report to your auditor.

Your quarterly permission review shouldn't take a week.

PowerShell Get-Acl dumps raw SDDL

Unreadable, not audit-ready, and your compliance team has no idea what they're looking at.

Enterprise platforms cost thousands

$5K+ per year for agent-based tools with complex deployments. You don't need continuous monitoring. You need a quarterly audit report.

Most permissions tools stop at reporting

They dump raw ACLs and call it done. You still have to manually sift through thousands of entries to find the ones that are actually dangerous.

SOC2/HIPAA/ISO need evidence

Compliance auditors ask "who has access to what?" and you need a formatted, timestamped answer — not a screenshot of folder properties.

What gets flagged

Critical

Everyone or Authenticated Users has FullControl or Write access to a directory.

High

Inheritance broken without clear justification. Orphaned SIDs (deleted accounts with ACEs remaining).

Medium

Domain Users has modify rights to sensitive paths. SYSTEM with explicit FullControl on user data.

Low

Permission depth exceeds 5 levels of explicit overrides. Complex but not necessarily dangerous.

Your auditor asks. You answer.

Trial scans up to 100 paths. Pro scans everything with full risk flagging.

45-day money-back guarantee. No questions asked.