Rewrote the search logic now matching the groups SIDs. Translation to
Englisch.
This commit is contained in:
parent
1a28596a1c
commit
4c07b78adc
2 changed files with 100 additions and 47 deletions
48
README.md
48
README.md
|
@ -8,10 +8,52 @@ If the script is not permitted to be run on the machine you need to set the exec
|
|||
|
||||
After that you can right-click the script and select "Execute with PowerShell"
|
||||
|
||||
## NTFS-ACL-Finder.ps1
|
||||
## NTFS-ACL-Finder.ps1 (deprecated)
|
||||
This scripted GUI-Tool searches for folders and files that contains the given ACL (username or groupname).
|
||||
The depth level can be set and the results can be exported to a csv file.
|
||||
Hope you find it useful. ;)
|
||||
|
||||
## NTFS-ACL-Finder-ng.ps1
|
||||
This is the enhanced Version of the original NTFS-ACL-Finder script. The script queries all groups under the DN `OU=ZFD,DC=zfd,DC=forumzfd,DC=de` and lists them in a searchable dropdown menu. Have fun. :)
|
||||
## Haruna's NTFS-ACL Finder (NTFS-ACL-Finder-ng.ps1)
|
||||
|
||||
A Windows PowerShell tool with a graphical interface (WinForms) to scan NTFS file system permissions (ACLs) for a specific Active Directory group within a selected folder path.
|
||||
|
||||
## Features
|
||||
|
||||
- LDAP-based Active Directory group lookup (OU=ZFD)
|
||||
- Dropdown list for group selection (avoids typos)
|
||||
- Recursive search with configurable depth
|
||||
- Matching based on group SID for accurate ACL detection (even after renaming)
|
||||
- CSV export of all matching file/folder paths and ACL entries
|
||||
- Fully in English and ASCII-compatible (ideal for Git)
|
||||
|
||||
## Requirements
|
||||
|
||||
- PowerShell 5.x or later
|
||||
- Windows OS with:
|
||||
- Access to an AD domain controller (LDAP)
|
||||
- GUI capabilities (WinForms support)
|
||||
|
||||
## Usage
|
||||
|
||||
1. Run the PowerShell script.
|
||||
2. Select a group from the dropdown list (populated from the OU=ZFD).
|
||||
3. Choose a folder path to start the scan.
|
||||
4. Optionally set a max recursion depth (0 = unlimited).
|
||||
5. Click **Start search**.
|
||||
6. Review results in the list or export them via **Export as CSV**.
|
||||
|
||||
## Notes
|
||||
|
||||
- Group identity matching is done via SID for robustness.
|
||||
- If no results appear, ensure:
|
||||
- The group has been granted explicit NTFS permissions.
|
||||
- The selected path is accessible and valid.
|
||||
- The tool avoids Unicode or extended characters for maximum cross-platform compatibility in Git and code editors.
|
||||
|
||||
## License
|
||||
|
||||
MIT – free to use, adapt, and share.
|
||||
|
||||
---
|
||||
|
||||
**Created with care by Haruna, your AI coding assistant** 🤖💙
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue