Skip to main content

FS_ShareAudit Job

The FS_ShareAudit Job is designed to report on shares from targeted file servers based on user input.

Analysis Tasks for the FS_ShareAudit Job

View the analysis tasks by navigating to the FileSystem > Ad Hoc Audits > FS_ShareAudit > Configure node and select Analysis.

warning

Do not modify or deselect the last three selected analysis tasks. The analysis tasks are preconfigured for this job.

Analysis Selection

The following analysis tasks are selected by default:

  • 1. Identify Selected Shares – Creates the SA_FS_ShareAudit_ShareSummary table accessible under the job’s Results node
    • Parameter is blank by default.
    • #UNC parameter must be configured by clicking Analysis Configuration with this task selected then selecting the #UNC table in the SQL Script Editor window and clicking Edit Table.
      • This brings up the Edit Table window where the user can manually enter UNC paths of each share to be audited or upload a CSV file containing one row for each share to be audited. See the SQLscripting Analysis Module section for additional information.
    • List one shared folder per row, using the format: \HOST\SHARE.
  • 2. Direct Permissions – Creates the SA_FS_ShareAudit_DirectPermissions table accessible under the job’s Results node
  • 3. Calculate Effective Access – Creates the SA_FS_ShareAudit_ShareAccess table accessible under the job’s Results node
  • 4. Identify Broken Inheritance
    • Creates a temporary table in the database for use by downstream analysis and report generation.
    • Creates the SA_FS_ShareAudit_UniqueTrustees table accessible under the job’s Results node.

In addition to the tables and views created by the analysis tasks, the FS_ShareAudit Job produces the following pre-configured report:

ReportDescriptionDefault TagsReport Elements
Share AuditThis report displays permission information for the selected shares.NoneThis report is comprised of four elements:
  • Table – Provides details on selected shares
  • Table – Provides details on permissions
  • Table – Provides details on effective access
  • Table – Provides details on broken inheritance