NTFSSecurity 4.2.3

Rating:        Based on 9 ratings
Reviewed:  8 reviews
Downloads: 45341
Released: May 19, 2016
Updated: May 19, 2016 by raandree
Dev status: Stable Help Icon

Recommended Download

Source Code NTFSSecurity.zip
source code, 177K, uploaded May 19, 2016 - 45341 downloads

Release Notes

  • 4.2.3
    • Added Cmdlet Get-FileHash2
    • Bug Fixes
  • 4.2.2
    • Added the cmdlet Test-Path2
    • Fixed parameter sets of Add-NTFSAudit
    • NTFSSecurity did not handle permissions that are only propagated to the next level when using the ApplyTo parameter. The ApplyTo enum now supports *OneLevel names.
  • 4.2.1
    • Added the cmdlets Get-NTFSHardLink, New-NTFSHardLink, New-NTFSSymbolicLink
  • 4.2
    • Added cmdlets Move-Item2 and Copy-Item2
    • Remove-Item2, Move-Item2 and Copy-Item2 now support the WhatIf and Confirm
  • 4.1
    • The Attributes parameter for Get-ChildItem2 works the same like he one on the standard cmdlets Get-ChildItem as requested
    • Remoce-NTFSAccess can no remove access from existing Access Control Entries. The old behaviour is still available using the -RemoveSpecific switch parameter
  • 4.0
    • The NTFSAccess cmdlets can now work on Security descriptors to allow bulk processes
    • Code cleanup for better performance and maintainability
    • Bug Fixes
  • 3.2.3
    • Fixed a bug that resulted in "path not found" errors
  • 3.2
    • Bugfixing managing auditing
    • Fixed various Bugs reported on CodePlex
  • 3.1
    • All cmdlets have the prefix NTFS now. There are aliases for backward compatibility
    • The new version of Get-NTFSEffectivePermission uses AuthzAccessCheck instead of GetEffectiveRightsFromAcl Previous Get-NTFSEffectivePermission cmdlet has been renamed to Get-NTFSEffectivePermissionOld
    • Added FileSystemAuditRule2 to the PowerShell formatters
    • Added InheritedFrom information to FileSystemAuditRule2
  • 3.0
    • This version leverages the AlphaFS (http://alphafs.codeplex.com) to work around the MAX_PATH limitation of 260 characters
      • This requires new *-Item commands to be able to discover items with a log path
        • GetChildItem2 (dir2)
        • Get-Item2 (gi2)
        • Remove-Item2 (del2, rm2)
    • For inherited ACEs the InheritedFrom is displayed
    • Generic access rights are supported
    • Performance Improvements
    • Bug Fixes
  • 2.4
    • Remove-Access did not remove Deny ACEs when using the pipeline (for example: Import-Csv .\access.txt | Remove-Access)
    • Add-Access did not remove Deny ACEs when using the pipeline (for example: Import-Csv .\access.txt | Add-Access)
    • The parameter Account was undiscoverable when using the pipeline
  • 2.3
    • The module now makes full use of the Backup, Restore privilege and TakeOwnership so as an administrator you can edit permissions on objects that you do not have explicitly access to. Privileges are enabled by default if the value 'EnablePrivileges' is true in the NTFSSecurity.psd1. The new cmdlets Get, Disable and Enable-Privileges are for manual control.
    • The Path parameter now works consistently
  • 2.1
    • Fixed bugs with Set-Owner
    • Added support for also managing auditing (SACL)
  • 2.0 Beta
    • A bunch of new commands: Get-SimpleAccess, Get-SimpleEffectiveAccess, Show-SimpleAccess, Show-SimpleEffectiveAccess, Copy-Access
    • All cmdlets are now written in C#
    • Fixed a number of bugs
  • 1.3 (NTFSSecurity 1.3.zip)
    • Fixed an issue with parameter handling
    • Now works with PowerShell V3
  • 1.2
    • Fixed some issues with path validation
    • Fixed documentation bugs
  • 1.1
    • Fixed the issue with square brackets in paths
    • Performance improvements
  • 1.0
    • Last tests did not reveal any issue. PowerShell has a problem handling files that have square brackets in the file name. Therefore this module inherits the issue.
  • 0.9 (Beta)
    • Fixed some bugs
    • Updated documentation
  • 0.8 (Beta)
    • Initial Release

Reviews for this release

Excellent module. Very well written.
by meanaverage on Dec 28, 2015 at 10:25 PM
The script seems well written, however, it does not work properly with a network share on a NetApp running the latest OS cDot (Ontap 8). It works perfectly with OnTap 7, with cDot though it only sets the permissions, it does not apply them. For example, I want to add a folder to a share and assign permissions to a user. After running the script the desired folder and permissions are visible though access to the share by the user is denied. If I make the slightest change to the permissions that require them to be applied the permissions work as expected.
by jsgriest on Nov 2, 2015 at 6:00 PM
This software does not seem to work on network NTFS shares that belong to me, whereas get-ACL does. pointing to h:\mydocs: PS H:\mydocs> get-ntfsaccess -path . Get-NTFSAccess : The filename, directory name, or volume label syntax is incorrect At line:1 char:15 + get-ntfsaccess <<<< -path . + CategoryInfo : OpenError: (.:String) [Get-NTFSAccess], Win32Exception + FullyQualifiedErrorId : ReadError,NTFSSecurity.GetAccess ____________________________________________________________________________________________________________________________________________________________________________________________________________________
by ccchips on Feb 3, 2015 at 5:27 PM
Thanks for reporting this. The issue is fixed in the release 3.2.3.
Reply by raandree (N/A) on Feb 18, 2015 at 8:49 AM
This was number two on my list to try out for a task I had, and it worked great! Thank you so much for the excellent tool!
by tacom6 on May 17, 2014 at 6:38 AM
Just needs some verbosity but is really a must have for admins... specially for setting bulk permissions on a fileserver
by guido_oliveira on Apr 21, 2014 at 3:01 AM
Extremely useful utility that easily integrates into my scripts. I just wish there was a documentation or better error messages. If you're looking to use Powershell to discover NTFS permissions, you NEED this module.
by zarberg on Apr 1, 2014 at 9:10 PM
Thanks, that makes live much easier!
by samoskaa on Jan 16, 2014 at 12:29 PM
by dnsvip on Oct 30, 2013 at 11:12 PM