ADACLScanner v6.0 releases: create reports of DACLs and SACLs in Active Directory
AD ACL Scanner
- A tool completely is written in PowerShell.
- A tool with GUI used to create reports of access control lists (DACLs) and system access control lists (SACLs) in Active Directory.
It has the following features:
- View HTML reports of DACLs/SACLs and save it to disk.
- Export DACLs/SACLs on Active Directory objects in a CSV format.
- Export DACLs/SACLs on Active Directory objects in a Excel sheet.
- Connect and browse you default domain, schema , configuration or a naming context defined by distinguishedname.
- Browse naming context by clicking you way around, either by OU�s or all types of objects.
- Report only explicitly assigned DACLs/SACLs.
- Report on OUs , OUs and Container Objects or all object types.
- Filter DACLs/SACLs for a specific access type.. Where does �Deny� permission exists?
- Filter DACLs/SACLs for a specific identity. Where does “Domain\Client Admins” have explicit access? Or use wildcards like “jdoe”.
- Filter DACLs/SACLs for permission on the specific object. Where are permissions set on computer objects?
- Skip default permissions (defaultSecurityDescriptor) in report. Makes it easier to find custom permissions.
- Report owner of the object.
- Compare previous results with the current configuration and see the differences by colour scheme (Green=matching permissions, Yellow= new permissions, Red= missing permissions).
- Report when permissions were modified
- Can use AD replication metadata when comparing.
- Can convert a previously created CSV file to an HTML report.
- Effective rights, select a security principal and match it against the permissions in AD.
- Colour-coded permissions based on criticality when using effective rights scan.
- List your domains and select one from the list.
- Get the size of the security descriptor (bytes).
- Rerporting on disabled inheritance .
- Get all inherited permissions in report.
- HTLM reports contain headers.
- Summary of criticality for all report types.
- Refresh Nodes by right-click container object.
- Exclude of objects from report by matching string to distinguishedName
- You can take a CSV file from one domain and use it for another. With replacing the old DN with the current domains you can resuse reports between domains. You can also replace the (Short domain name)Netbios name security principals.
- Reporting on modified default security descriptors in Schema.
- Verifying the format of the CSV files used in convert and compare functions.
- When comparing with CSV file Nodes missing in AD will be reported as “Node does not exist in AD”
- The progress bar can be disabled to gain speed in creating reports.
- If the first node in the CSV file used for comparing can’t be connected the scan will stop.
- Display group members in groups in the HTML report.
- Present the value of the true SDDL in NTsecurityDescriptor, bypassing Object-Specific ACE merge done when a new instance of the ObjectSecurity class is initialized.
This is a major update to the UI. Most of the functions have been made available through the command line.
A new thing is that it is possible to scan linked Group Policy Objects.
To simplify the assessment and the hunt for high privileged accounts it is possible to filter on the criticality of the ACE’s. If the builtin groups is not of interest it’s possible to filter them out.
Normally only the objects in the ACL’s that are shown in the report, but now you can perform a recursive find on group members too. This will show all principals that have the permission in the report.
.\ADACLScan.ps1 -b “ou=corp,dc=contoso,dc=com” -RecursiveFind | ft
if you like you can filter the group members to only user objects:
.\ADACLScan.ps1 -b “ou=corp,dc=contoso,dc=com” -RecursiveFind -RecursiveObjectType User | ft
git clone https://github.com/canix1/ADACLScanner.git
Copyright (C) 2017 canix1