Features
- Home
- Features
Our features
Why you choose Permission Analyzer
Scanning the file system and AD
Specify directories, network shares or server names to scan and configure depth. Select particular AD Organizational Units to scan.
Filters and overviews
Create filters and include or exclude particular members, simple or special permissions and folders or files. Save your filters as Selection or save and re-use them as report.
Tracing permissions
Zoom in on your search results and trace the origin of permissions that have been found. See if permissions are inherited from a (indirect) group membership or parent folder.
Reports and export
Save your filters as report and export them to HTML or CSV and e-mail. Use different report types, such as permissions tracing and group memberships, effective permissions or plain Access Control List information of your directories. Compare past reports and track changes!.
Defining audit policies
Save your filters as policies and receive e-mail notifications if your policy report contains unwanted permissions.
Scheduling jobs
Use command-line parameters to run a network scan or report export automatically. Let Permission Analyzer check all your policies and send out e-mail notifications by running the application with parameters and Windows Scheduler.
Modifying permissions
Change the permissions of a directory directly from within the application. Changes are directly applied to the file system and the database is updated with the changes made.
Data protection
Permission Analyzer can be secured with an application password. The password is required to open up the application and may be used to encrypt the local database using strong AES encryption.
External database
Permission Analyzer is supplied with an embedded database to store directory and group membership information. It supports a central company database, so that workstations can use the same information source or so you can create your own queries and integration.
Testimonial
What our customers are saying
We needed an overview of all the access rights in our network. I am now able to run reports to give to the department director so that they can see who has what permissions and to either add or remove users. This is what I am truly after. Permission Analyzer helps me by doing the initial scan and letting me know what is out there now.
E. Martin
An ECR International spokespersonWe are currently trying to analyze our user rights on the network, but have not found a tool that displays easy-to-read report data. I have downloaded your demo and have found it much easier to use, and seems much faster than Hyena when it comes to collecting data from our servers.
C. North
Park CommunityI have been looking for just this type of tool to use in the many conversions and acquisitions that we are involved with. Some small and some very large.
K. Hoggatt
HP Enterprise ServicesI ran the program and I liked it; I think it will work for what I need which is to find out who has what permissions, and where.
Brad R. Willett
United States Air ForceThank you it is looking correct now. I would like to say the support from you has been fantastic!! Thank you very much. I will be strongly recommending this software to any organisation requiring high security around folders permissions.