O'Reilly logo

Windows PowerShell™ Scripting Guide by Ed Wilson

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Auditing Shares

Shares, particularly user-configured shares, can be a source of insecure computing. Therefore, it is incumbent upon network administrators to periodically audit shares on both workstations and servers to ensure that only authorized, properly configured shares are in use.

Depending on your auditing needs, you may inspect shares by producing a report from the Access database examined earlier in this chapter to save your share information. Such a report is shown in Figure 5-8.

One of the strengths of Access is the ease of creating reports, such as this Shares report.

Figure 5-8. One of the strengths of Access is the ease of creating reports, such as this Shares report.

Another way to audit shares is to maintain a text file that ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required