Permission.psm1
function ConvertTo-ClassExclusionDiv { param ( <# Accounts whose objectClass property is in this list are excluded from the HTML report Note on the 'group' class: By default, a group with members is replaced in the report by its members unless the -NoGroupMembers switch is used. Any remaining groups are empty and not useful to see in the middle of a list of users/job titles/departments/etc). So the 'group' class is excluded here by default. #> [string[]]$ExcludeClass, # In-process cache to reduce calls to other processes or disk, and store repetitive parameters for better readability of code and logs [Parameter(Mandatory)] [ref]$Cache ) if ($ExcludeClass) { $ListGroup = $ExcludeClass | ConvertTo-HtmlList | ConvertTo-BootstrapListGroup $Content = "Accounts whose objectClass property is in this list were excluded from the report.$ListGroup" } else { $Content = 'No accounts were excluded based on objectClass.' } Write-LogMsg -Cache $Cache -Text "New-BootstrapDivWithHeading -HeadingText 'Accounts Excluded by Class' -Content `$Content" return New-BootstrapDivWithHeading -HeadingText 'Accounts Excluded by Class' -Content $Content -HeadingLevel 6 } function ConvertTo-FileList { param ( [string[]]$Format, # Path to the folder to save the logs and reports generated by this script $OutputDir, [cultureinfo]$Culture = (Get-Culture), <# Level of detail to export to file 0 Item paths $TargetPath 1 Resolved item paths (server names resolved, DFS targets resolved) $Parents 2 Expanded resolved item paths (parent paths expanded into children) $ACLsByPath.Keys 3 Access rules $ACLsByPath.Values 4 Resolved access rules (server names resolved, inheritance flags resolved) $ACEsByGUID.Values | %{$_} | Sort Path,IdentityReferenceResolved 5 Accounts with access $PrincipalsByResolvedID.Values | %{$_} | Sort ResolvedAccountName 6 Expanded resolved access rules (expanded with account info) $Permissions 7 Formatted permissions $FormattedPermissions 8 Best Practice issues $BestPracticeIssues 9 XML custom sensor output for Paessler PRTG Network Monitor $PrtgXml 10 Permission Report #> [int[]]$Detail = @(0..10), [String]$FileName ) $FileList = @{} ForEach ($ThisFormat in $Format) { # String translations indexed by value in the $Detail parameter # TODO: Move to i18n $DetailStrings = @( 'Target paths', 'Network paths (target path servers and DFS targets resolved)', 'Item paths (network paths expanded into their children)', 'Access lists', 'Access rules (resolved identity references and inheritance flags)', 'Accounts with access', 'Expanded access rules (expanded with account info)', # #ToDo: Expand DirectoryEntry objects in the DirectoryEntry and Members properties 'Formatted permissions', 'Best Practice issues', 'Custom sensor output for Paessler PRTG Network Monitor' 'Permission report' ) $FileList[$ThisFormat] = switch ($ThisFormat) { 'csv' { $Suffix = '.csv' ForEach ($Level in $Detail) { # Currently no CSV reports are generated for detail levels 8/9/10 if ($Detail -lt 8) { # Get shorter versions of the detail strings to use in file names $ShortDetail = $DetailStrings[$Level] -replace '\([^\)]*\)', '' # Convert the shorter strings to Title Case $TitleCaseDetail = $Culture.TextInfo.ToTitleCase($ShortDetail) # Remove spaces from the shorter strings $SpacelessDetail = $TitleCaseDetail -replace '\s', '' # Build the file path "$OutputDir\$Level`_$SpacelessDetail$Suffix" } } break } 'html' { $Suffix = "_$FileName.htm" ForEach ($Level in $Detail) { # Currently no HTML reports are generated for detail levels 8/9 if ($Level -notin 8, 9) { # Get shorter versions of the detail strings to use in file names $ShortDetail = $DetailStrings[$Level] -replace '\([^\)]*\)', '' # Convert the shorter strings to Title Case $TitleCaseDetail = $Culture.TextInfo.ToTitleCase($ShortDetail) # Remove spaces from the shorter strings $SpacelessDetail = $TitleCaseDetail -replace '\s', '' # Build the file path "$OutputDir\$Level`_$SpacelessDetail$Suffix" } } break } 'js' { $Suffix = "_js_$FileName.htm" ForEach ($Level in $Detail) { # Currently no JS reports are generated for detail levels 8/9 if ($Level -notin 8, 9) { # Get shorter versions of the detail strings to use in file names $ShortDetail = $DetailStrings[$Level] -replace '\([^\)]*\)', '' # Convert the shorter strings to Title Case $TitleCaseDetail = $Culture.TextInfo.ToTitleCase($ShortDetail) # Remove spaces from the shorter strings $SpacelessDetail = $TitleCaseDetail -replace '\s', '' # Build the file path "$OutputDir\$Level`_$SpacelessDetail$Suffix" } } break } 'prtgxml' { $Suffix = '.xml' $Level = 9 # Level 9 is the only level applicable for the PrtgXml format if ($Detail -contains $Level) { # Get shorter versions of the detail strings to use in file names $ShortDetail = $DetailStrings[$Level] -replace '\([^\)]*\)', '' # Convert the shorter strings to Title Case $TitleCaseDetail = $Culture.TextInfo.ToTitleCase($ShortDetail) # Remove spaces from the shorter strings $SpacelessDetail = $TitleCaseDetail -replace '\s', '' # Build the file path "$OutputDir\$Level`_$SpacelessDetail$Suffix" } break } 'json' { $Suffix = "_$FileName.json" #TODO break } 'xml' { $Suffix = '.xml' #TODO break } } } return $FileList } function ConvertTo-FileListDiv { param ( [Hashtable]$FileList ) ForEach ($Format in ($FileList.Keys | Sort-Object)) { $Files = $FileList[$Format] if ($Files) { New-BootstrapAlert -Text $Format -Class Dark -Padding ' p-2 mb-0 mt-2' $Files | Sort-Object | Split-Path -Leaf | ConvertTo-HtmlList | ConvertTo-BootstrapListGroup } } } function ConvertTo-IgnoredDomainDiv { param ( <# Domain(s) to ignore (they will be removed from the username) Can be used: to ensure accounts only appear once on the report when they have matching SamAccountNames in multiple domains. when the domain is often the same and doesn't need to be displayed #> [string[]]$IgnoreDomain, # In-process cache to reduce calls to other processes or disk, and store repetitive parameters for better readability of code and logs [Parameter(Mandatory)] [ref]$Cache ) if ($IgnoreDomain) { $ListGroup = $IgnoreDomain | ConvertTo-HtmlList | ConvertTo-BootstrapListGroup $Content = "Accounts from these domains are listed in the report without their domain.$ListGroup" } else { $Content = 'No domains were ignored. All accounts have their domain listed.' } Write-LogMsg -Cache $Cache -Text "New-BootstrapDivWithHeading -HeadingText 'Domains Ignored by Name' -Content `$Content" return New-BootstrapDivWithHeading -HeadingText 'Domains Ignored by Name' -Content $Content -HeadingLevel 6 } function ConvertTo-MemberExclusionDiv { param ( <# Do not get group members (only report the groups themselves) Note: By default, the -ExcludeClass parameter will exclude groups from the report. If using -NoGroupMembers, you most likely want to modify the value of -ExcludeClass. Remove the 'group' class from ExcludeClass in order to see groups on the report. #> [switch]$NoMembers, # In-process cache to reduce calls to other processes or disk, and store repetitive parameters for better readability of code and logs [Parameter(Mandatory)] [ref]$Cache ) if ($NoMembers) { $Content = 'Group members were excluded from the report.<br />Only accounts directly from the ACLs are included in the report.' } else { $Content = 'No accounts were excluded based on group membership.<br />Members of groups from the ACLs are included in the report.' } Write-LogMsg -Cache $Cache -Text "New-BootstrapDivWithHeading -HeadingText 'Group Members' -Content '$Content'" return New-BootstrapDivWithHeading -HeadingText 'Group Members' -Content $Content -HeadingLevel 6 } function ConvertTo-NameExclusionDiv { param ( # Regular expressions matching names of security principals to exclude from the HTML report [string[]]$ExcludeAccount, # In-process cache to reduce calls to other processes or disk, and store repetitive parameters for better readability of code and logs [Parameter(Mandatory)] [ref]$Cache ) if ($ExcludeAccount) { $ListGroup = $ExcludeAccount | ConvertTo-HtmlList | ConvertTo-BootstrapListGroup $Content = "Accounts whose names match these regular expressions were excluded from the report.$ListGroup" } else { $Content = 'No accounts were excluded based on name.' } Write-LogMsg -Cache $Cache -Text "New-BootstrapDivWithHeading -HeadingText 'Accounts Excluded by Name' -Content `$Content" return New-BootstrapDivWithHeading -HeadingText 'Accounts Excluded by Name' -Content $Content -HeadingLevel 6 } function ConvertTo-PermissionGroup { [CmdletBinding()] param ( # Permission object from Expand-Permission [PSCustomObject[]]$Permission, # Type of output returned to the output stream [ValidateSet('csv', 'html', 'js', 'json', 'prtgxml', 'xml')] [String]$Format, # How to group the permissions in the output stream and within each exported file [ValidateSet('account', 'item', 'none', 'target')] [String]$GroupBy = 'item', # Properties of each Account to display on the report (left out: managedby) [string[]]$AccountProperty = @('DisplayName', 'Company', 'Department', 'Title', 'Description'), [string[]]$ItemProperty = @('Folder', 'Inheritance'), [Hashtable]$HowToSplit ) $OutputObject = @{} if ( $GroupBy -eq 'none' -or $HowToSplit[$GroupBy] ) { return } switch ($Format) { 'csv' { $OutputObject['Data'] = $Permission | ConvertTo-Csv break } 'html' { $Html = $Permission | ConvertTo-Html -Fragment $OutputObject['Data'] = $Html $OutputObject['Table'] = $Html | New-BootstrapTable break } 'js' { #TODO: Change table id to "Groupings" instead of Folders to allow for Grouping by Account $JavaScriptTable = @{ ID = 'Folders' } switch ($GroupBy) { 'account' { [string[]]$OrderedProperties = @('Account', 'Name') + $AccountProperty $JavaScriptTable['SearchableColumn'] = $OrderedProperties break } 'item' { $OrderedProperties = $ItemProperty $JavaScriptTable['SearchableColumn'] = 'Folder' $JavaScriptTable['DropdownColumn'] = 'Inheritance' break } } # Wrap input in a array because output must be a JSON array for jquery to work properly. $OutputObject['Data'] = ConvertTo-Json -Compress -InputObject @($Permission) $OutputObject['Columns'] = Get-ColumnJson -InputObject $Permission -PropNames $OrderedProperties $OutputObject['Table'] = ConvertTo-BootstrapJavaScriptTable -InputObject $Permission -PropNames $OrderedProperties -DataFilterControl -PageSize 25 @JavaScriptTable break } 'xml' { $OutputObject['Data'] = ($Permission | ConvertTo-Xml).InnerXml break } default {} } return [PSCustomObject]$OutputObject } function ConvertTo-PermissionList { param ( # Permission object from Expand-Permission [Hashtable]$Permission, [PSCustomObject[]]$PermissionGrouping, # Type of output returned to the output stream [ValidateSet('csv', 'html', 'js', 'json', 'prtgxml', 'xml')] [String]$Format, [String]$ShortestPath, [String]$NetworkPath, # How to group the permissions in the output stream and within each exported file [ValidateSet('account', 'item', 'none', 'target')] [String]$GroupBy = 'item', [Hashtable]$HowToSplit, # Object output from Invoke-PermissionAnalyzer [PSCustomObject]$Analysis, # Properties of each Account to display on the report (left out: managedby) [string[]]$AccountProperty = @('DisplayName', 'Company', 'Department', 'Title', 'Description') ) switch ($Format) { 'csv' { if ( $GroupBy -eq 'none' -or $HowToSplit[$GroupBy] ) { $Sorted = $Permission.Values | Sort-Object -Property Item, Account [PSCustomObject]@{ PSTypeName = 'Permission.PermissionList' Data = $Sorted | ConvertTo-Csv PassThru = $Sorted } } else { switch ($GroupBy) { 'account' { ForEach ($Group in $PermissionGrouping) { [PSCustomObject]@{ PSTypeName = 'Permission.PermissionList' Data = $Permission[$Group.Account.ResolvedAccountName] | ConvertTo-Csv PassThru = $Permission[$Group.Account.ResolvedAccountName] Grouping = $Group.Account.ResolvedAccountName } } break } 'item' { ForEach ($Group in $PermissionGrouping) { [PSCustomObject]@{ PSTypeName = 'Permission.PermissionList' Data = $Permission[$Group.Item.Path] | ConvertTo-Csv PassThru = $Permission[$Group.Item.Path] Grouping = $Group.Item.Path } } break } 'target' { ForEach ($Group in $PermissionGrouping) { $Perm = $Permission[$Group.Path] if ($Perm) { [PSCustomObject]@{ PSTypeName = 'Permission.PermissionList' Data = $Perm | ConvertTo-Csv Grouping = $Group.Path PassThru = $Perm } } } break } } } break } 'html' { if ( $GroupBy -eq 'none' -or $HowToSplit[$GroupBy] ) { $Heading = New-HtmlHeading "Permissions in $NetworkPath" -Level 6 $Sorted = $Permission.Values | Sort-Object -Property Item, Account $Html = $Sorted | ConvertTo-Html -Fragment $Table = $Html | New-BootstrapTable [PSCustomObject]@{ PSTypeName = 'Permission.PermissionList' Data = $Html Div = New-BootstrapDiv -Text ($Heading + $Table) -Class 'h-100 p-1 bg-light border rounded-3 table-responsive' PassThru = $Sorted } } else { switch ($GroupBy) { 'account' { ##ForEach ($Group in $PermissionGrouping) { ForEach ($GroupID in $Permission.Keys) { ##$GroupID = $Group.Account.ResolvedAccountName $Heading = New-HtmlHeading "Folders accessible to $GroupID" -Level 6 $StartingPermissions = $Permission[$GroupID] $Html = $StartingPermissions | ConvertTo-Html -Fragment $Table = $Html | New-BootstrapTable [PSCustomObject]@{ PSTypeName = 'Permission.PermissionList' Data = $Html Div = New-BootstrapDiv -Text ($Heading + $Table) -Class 'h-100 p-1 bg-light border rounded-3 table-responsive' Grouping = $GroupID PassThru = $StartingPermissions } } break } 'item' { ForEach ($Group in $PermissionGrouping) { $GroupID = $Group.Item.Path $Heading = New-HtmlHeading "Accounts with access to $GroupID" -Level 6 $SubHeading = Get-FolderPermissionTableHeader -Group $Group -GroupID $GroupID -ShortestFolderPath $ShortestPath $StartingPermissions = $Permission[$GroupID] $Html = $StartingPermissions | ConvertTo-Html -Fragment $Table = $Html | New-BootstrapTable [PSCustomObject]@{ PSTypeName = 'Permission.PermissionList' Data = $Html Div = New-BootstrapDiv -Text ($Heading + $SubHeading + $Table) -Class 'h-100 p-1 bg-light border rounded-3 table-responsive' Grouping = $GroupID PassThru = $StartingPermissions } } break } 'target' { ForEach ($Group in $PermissionGrouping) { $GroupID = $Group.Path $Heading = New-HtmlHeading "Permissions in $GroupID" -Level 5 $StartingPermissions = $Permission[$GroupID] $Html = $StartingPermissions | ConvertTo-Html -Fragment $Table = $Html | New-BootstrapTable [PSCustomObject]@{ PSTypeName = 'Permission.PermissionList' Data = $Html Div = New-BootstrapDiv -Text ($Heading + $Table) -Class 'h-100 p-1 bg-light border rounded-3 table-responsive' Grouping = $GroupID PassThru = $StartingPermissions } } break } } } break } 'js' { if ( $GroupBy -eq 'none' -or $HowToSplit[$GroupBy] ) { $Heading = New-HtmlHeading "Permissions in $NetworkPath" -Level 6 $StartingPermissions = $Permission.Values | Sort-Object -Property Item, Account # Remove spaces from property titles $ObjectsForJsonData = ForEach ($Obj in $StartingPermissions) { $Props = [ordered]@{ Item = $Obj.Item Account = $Obj.Account Access = $Obj.Access DuetoMembershipIn = $Obj.'Due to Membership In' SourceofAccess = $Obj.'Source of Access' Name = $Obj.Name } ForEach ($PropName in $AccountProperty) { $Props[$PropName] = $Obj.$PropName } [PSCustomObject]$Props } $TableId = 'Perms' $Table = ConvertTo-BootstrapJavaScriptTable -Id $TableId -InputObject $StartingPermissions -DataFilterControl -AllColumnsSearchable -PageSize 25 [string[]]$PropNames = @('Item', 'Account', 'Access', 'Due to Membership In', 'Source of Access', 'Name') + $AccountProperty [PSCustomObject]@{ PSTypeName = 'Permission.PermissionList' Columns = Get-ColumnJson -InputObject $StartingPermissions -PropNames $PropNames Data = ConvertTo-Json -Compress -InputObject @($ObjectsForJsonData) Div = New-BootstrapDiv -Text ($Heading + $Table) -Class 'h-100 p-1 bg-light border rounded-3 table-responsive' PassThru = $ObjectsForJsonData Table = $TableId } } else { switch ($GroupBy) { 'account' { ##ForEach ($Group in $PermissionGrouping) { ForEach ($GroupID in $Permission.Keys) { # TODO: $Permission.Keys | Sort-Object would result in this being sorted, but this wasn't needed previously. Investigate to avoid redundant sorting. ##$GroupID = $Group.Account.ResolvedAccountName $Heading = New-HtmlHeading "Items accessible to $GroupID" -Level 6 $StartingPermissions = $Permission[$GroupID] # Remove spaces from property titles $ObjectsForJsonData = ForEach ($Obj in $StartingPermissions) { [PSCustomObject]@{ Path = $Obj.Path Access = $Obj.Access DuetoMembershipIn = $Obj.'Due to Membership In' SourceofAccess = $Obj.'Source of Access' } } $TableId = "Perms_$($GroupID -replace '[^A-Za-z0-9\-_]', '-')" $Table = ConvertTo-BootstrapJavaScriptTable -Id $TableId -InputObject $StartingPermissions -DataFilterControl -AllColumnsSearchable $DivId = $TableId.Replace('Perms', 'Div') [PSCustomObject]@{ PSTypeName = 'Permission.AccountPermissionList' Columns = Get-ColumnJson -InputObject $StartingPermissions-PropNames Path, Access, 'Due to Membership In', 'Source of Access' Data = ConvertTo-Json -Compress -InputObject @($ObjectsForJsonData) Div = New-BootstrapDiv -Id $DivId -Text ($Heading + $Table) -Class 'h-100 p-1 bg-light border rounded-3 table-responsive' PassThru = $ObjectsForJsonData Grouping = $GroupID Table = $TableId } } break } 'item' { ForEach ($Group in $PermissionGrouping) { if ($null -ne $Group.Account) { $GroupID = $Group.Account.ResolvedAccountName $Heading = New-HtmlHeading "Access to $GroupID" -Level 6 $SubHeading = 'This account has the following access to this item and its, except where inheritance is disabled on the child.' Pause $StartingPermissions = $Permission[$GroupID] if ($StartingPermissions) { # Remove spaces from property titles $ObjectsForJsonData = ForEach ($Obj in $StartingPermissions) { $Props = [ordered]@{ Account = $Obj.Account Access = $Obj.Access DuetoMembershipIn = $Obj.'Due to Membership In' SourceofAccess = $Obj.'Source of Access' Name = $Obj.Name } ForEach ($PropName in $AccountProperty) { $Props[$PropName] = $Obj.$PropName } [PSCustomObject]$Props } $TableId = "Perms_$($GroupID -replace '[^A-Za-z0-9\-_]', '-')" $DivId = $TableId.Replace('Perms', 'Div') $Table = ConvertTo-BootstrapJavaScriptTable -Id $TableId -InputObject $StartingPermissions -DataFilterControl -AllColumnsSearchable [string[]]$PropNames = @('Account', 'Access', 'Due to Membership In', 'Source of Access', 'Name') + $AccountProperty [PSCustomObject]@{ PSTypeName = 'Permission.ItemPermissionList' Columns = Get-ColumnJson -InputObject $StartingPermissions -PropNames $PropNames Data = ConvertTo-Json -Compress -InputObject @($ObjectsForJsonData) Div = New-BootstrapDiv -Id $DivId -Text ($Heading + $SubHeading + $Table) -Class 'h-100 p-1 bg-light border rounded-3 table-responsive' Grouping = $GroupID PassThru = $ObjectsForJsonData Table = $TableId } } } else { $GroupID = $Group.Item.Path $Heading = New-HtmlHeading "Accounts with access to $GroupID" -Level 6 $SubHeading = Get-FolderPermissionTableHeader -Group $Group -GroupID $GroupID -ShortestFolderPath $ShortestPath $StartingPermissions = $Permission[$GroupID] if ($StartingPermissions) { # Remove spaces from property titles $ObjectsForJsonData = ForEach ($Obj in $StartingPermissions) { $Props = [ordered]@{ Account = $Obj.Account Access = $Obj.Access DuetoMembershipIn = $Obj.'Due to Membership In' SourceofAccess = $Obj.'Source of Access' Name = $Obj.Name } ForEach ($PropName in $AccountProperty) { $Props[$PropName] = $Obj.$PropName } [PSCustomObject]$Props } $TableId = "Perms_$($GroupID -replace '[^A-Za-z0-9\-_]', '-')" $DivId = $TableId.Replace('Perms', 'Div') $Table = ConvertTo-BootstrapJavaScriptTable -Id $TableId -InputObject $StartingPermissions -DataFilterControl -AllColumnsSearchable [string[]]$PropNames = @('Account', 'Access', 'Due to Membership In', 'Source of Access', 'Name') + $AccountProperty [PSCustomObject]@{ PSTypeName = 'Permission.ItemPermissionList' Columns = Get-ColumnJson -InputObject $StartingPermissions -PropNames $PropNames Data = ConvertTo-Json -Compress -InputObject @($ObjectsForJsonData) Div = New-BootstrapDiv -Id $DivId -Text ($Heading + $SubHeading + $Table) -Class 'h-100 p-1 bg-light border rounded-3 table-responsive' Grouping = $GroupID PassThru = $ObjectsForJsonData Table = $TableId } } } } break } 'target' { ForEach ($Group in $PermissionGrouping) { $GroupID = $Group.Path $Heading = New-HtmlHeading "Permissions in $GroupID" -Level 5 $StartingPermissions = $Permission[$GroupID] # Remove spaces from property titles $ObjectsForJsonData = ForEach ($Obj in $StartingPermissions) { $Props = [ordered]@{ Item = $Obj.Item Account = $Obj.Account Access = $Obj.Access DuetoMembershipIn = $Obj.'Due to Membership In' SourceofAccess = $Obj.'Source of Access' Name = $Obj.Name } ForEach ($PropName in $AccountProperty) { $Props[$PropName] = $Obj.$PropName } [PSCustomObject]$Props } $TableId = "Perms_$($GroupID -replace '[^A-Za-z0-9\-_]', '-')" $DivId = $TableId.Replace('Perms', 'Div') $Table = ConvertTo-BootstrapJavaScriptTable -Id $TableId -InputObject $StartingPermissions -DataFilterControl -AllColumnsSearchable -PageSize 25 [string[]]$PropNames = @('Item', 'Account', 'Access', 'Due to Membership In', 'Source of Access', 'Name') + $AccountProperty [PSCustomObject]@{ PSTypeName = 'Permission.TargetPermissionList' Columns = Get-ColumnJson -InputObject $StartingPermissions -PropNames $PropNames Data = ConvertTo-Json -Compress -InputObject @($ObjectsForJsonData) Div = New-BootstrapDiv -Id $DivId -Text ($Heading + $Table) -Class 'h-100 p-1 bg-light border rounded-3 table-responsive' Grouping = $GroupID PassThru = $ObjectsForJsonData Table = $TableId } } break } } } break } 'prtgxml' { # Format the issues as a custom XML sensor for Paessler PRTG Network Monitor [PSCustomObject]@{ PSTypeName = 'Permission.BestPracticeAnalysisPrtg' Data = ConvertTo-PermissionPrtgXml -Analysis $Analysis PassThru = $Analysis } break } 'xml' { if ( $GroupBy -eq 'none' -or $HowToSplit[$GroupBy] ) { [PSCustomObject]@{ PSTypeName = 'Permission.PermissionList' Data = ($Permission.Values | ConvertTo-Xml).InnerXml PassThru = $Permission.Values } } else { switch ($GroupBy) { 'account' { ForEach ($Group in $PermissionGrouping) { [PSCustomObject]@{ PSTypeName = 'Permission.AccountPermissionList' Data = ($Permission[$Group.Account.ResolvedAccountName] | ConvertTo-Xml).InnerXml PassThru = $Permission[$Account.ResolvedAccountName] Grouping = $Account.ResolvedAccountName } } break } 'item' { ForEach ($Group in $PermissionGrouping) { [PSCustomObject]@{ PSTypeName = 'Permission.ItemPermissionList' Data = ($Permission[$Group.Item.Path] | ConvertTo-Xml).InnerXml PassThru = $Permission[$Group.Item.Path] Grouping = $Group.Item.Path } } break } 'target' { ForEach ($Group in $PermissionGrouping) { [PSCustomObject]@{ PSTypeName = 'Permission.TargetPermissionList' Data = ($Permission[$Group.Path] | ConvertTo-Xml).InnerXml PassThru = $Permission[$Group.Path] Grouping = $Group.Path } } break } } } break } } } function ConvertTo-PermissionPrtgXml { param ( [PSCustomObject]$Analysis ) $IssuesDetected = $false # Group by item rather than by ACE # TODO: Do this for some of the other issue types $ItemsWithCreatorOwner = $Analysis.ACEsWithCreatorOwner.Path | Sort-Object -Unique # Count occurrences of each issue $CountItemsWithBrokenInheritance = $Analysis.ItemsWithBrokenInheritance.Count $CountACEsWithNonCompliantAccounts = $Analysis.ACEsWithNonCompliantAccounts.Count $CountACEsWithUsers = $Analysis.ACEsWithUsers.Count $CountACEsWithUnresolvedSIDs = $Analysis.ACEsWithUnresolvedSIDs.Count $CountItemsWithCreatorOwner = $ItemsWithCreatorOwner.Count # Use the counts to determine whether any issues occurred if ( ( $CountItemsWithBrokenInheritance + $CountACEsWithNonCompliantAccounts + $CountACEsWithUsers + $CountACEsWithUnresolvedSIDs + $CountItemsWithCreatorOwner ) -gt 0 ) { $IssuesDetected = $true } $Channels = [System.Collections.Generic.List[String]]::new() # Build our XML output formatted for PRTG. $ChannelParams = @{ MaxError = 0.5 Channel = 'Folders with inheritance disabled' Value = $CountItemsWithBrokenInheritance CustomUnit = 'folders' } $null = $Channels.Add((Format-PrtgXmlResult @ChannelParams)) $ChannelParams = @{ MaxError = 0.5 Channel = 'ACEs for groups breaking naming convention' Value = $CountACEsWithNonCompliantAccounts CustomUnit = 'ACEs' } $null = $Channels.Add((Format-PrtgXmlResult @ChannelParams)) $ChannelParams = @{ MaxError = 0.5 Channel = 'ACEs for users instead of groups' Value = $CountACEsWithUsers CustomUnit = 'ACEs' } $null = $Channels.Add((Format-PrtgXmlResult @ChannelParams)) $ChannelParams = @{ MaxError = 0.5 Channel = 'ACEs for unresolvable SIDs' Value = $CountACEsWithUnresolvedSIDs CustomUnit = 'ACEs' } $null = $Channels.Add((Format-PrtgXmlResult @ChannelParams)) $ChannelParams = @{ MaxError = 0.5 Channel = "Folders with 'CREATOR OWNER' access" Value = $CountItemsWithCreatorOwner CustomUnit = 'folders' } $null = $Channels.Add((Format-PrtgXmlResult @ChannelParams)) Format-PrtgXmlSensorOutput -PrtgXmlResult $Channels -IssueDetected:$IssuesDetected } function ConvertTo-ScriptHtml { param ( $Permission, $PermissionGrouping, [String]$GroupBy, [String]$Split ) $ScriptHtmlBuilder = [System.Text.StringBuilder]::new() ForEach ($Group in $Permission) { $null = $ScriptHtmlBuilder.AppendLine((ConvertTo-BootstrapTableScript -TableId "#$($Group.Table)" -ColumnJson $Group.Columns -DataJson $Group.Data)) } if ($GroupBy -ne 'none' -and $GroupBy -ne $Split) { $null = $ScriptHtmlBuilder.AppendLine((ConvertTo-BootstrapTableScript -TableId '#Folders' -ColumnJson $PermissionGrouping.Columns -DataJson $PermissionGrouping.Data)) } return $ScriptHtmlBuilder.ToString() } function Expand-AccountPermissionItemAccessReference { param ( $Reference, [ref]$AceByGUID, [ref]$AclByPath ) if ($Reference) { if ($Reference -is [System.Collections.IEnumerable]) { $FirstRef = $Reference[0] } else { $FirstRef = $Reference } if ($FirstRef) { if ($FirstRef.AceGUIDs -is [System.Collections.IEnumerable]) { $FirstACEGuid = $FirstRef.AceGUIDs[0] } else { $FirstACEGuid = $FirstRef.AceGUIDs } } if ($FirstACEGuid) { $ACEList = $AceByGUID.Value[$FirstACEGuid] } if ($ACEList -is [System.Collections.IEnumerable]) { $FirstACE = $ACEList[0] } else { $FirstACE = $ACEList } $ACEProps = $FirstACE.PSObject.Properties.GetEnumerator().Name } ForEach ($PermissionRef in $Reference) { $Item = $AclByPath.Value[$PermissionRef.Path] [PSCustomObject]@{ Access = ForEach ($GuidList in $PermissionRef.AceGUIDs) { ForEach ($Guid in $GuidList) { $ACE = $AceByGUID.Value[$Guid] $OutputProperties = @{ Item = $Item } ForEach ($Prop in $ACEProps) { $OutputProperties[$Prop] = $ACE.$Prop } [PSCustomObject]$OutputProperties } } Item = $Item ItemPath = $PermissionRef.Path PSTypeName = 'Permission.AccountPermissionItemAccess' } } } function Expand-AccountPermissionReference { param ( $Reference, [ref]$PrincipalsByResolvedID, [ref]$ACEsByGUID, [ref]$ACLsByPath ) ForEach ($Account in $Reference) { [PSCustomObject]@{ Account = $PrincipalsByResolvedID.Value[$Account.Account] Access = Expand-AccountPermissionItemAccessReference -Reference $Account.Access -AceByGUID $ACEsByGUID -AclByPath $ACLsByPath PSTypeName = 'Permission.AccountPermission' } } } function Expand-FlatPermissionReference { # Expand each Access Control Entry with the Security Principal for the resolved IdentityReference. param ( $SortedPath, [ref]$PrincipalsByResolvedID, [ref]$ACEsByGUID, [ref]$AceGUIDsByPath ) ForEach ($Item in $SortedPath) { $AceGUIDs = $AceGUIDsByPath.Value[$Item] if (-not $AceGUIDs) { continue } ForEach ($ACE in $ACEsByGUID.Value[$AceGUIDs]) { Merge-AceAndPrincipal -ACE $ACE -Principal $PrincipalsByResolvedID.Value[$ACE.IdentityReferenceResolved] -PrincipalByResolvedID $PrincipalsByResolvedID } } } function Expand-ItemPermissionAccountAccessReference { param ( $Reference, [ref]$PrincipalByResolvedID, [ref]$AceByGUID ) if ($Reference) { if ($Reference -is [System.Collections.IEnumerable]) { $FirstRef = $Reference[0] } else { $FirstRef = $Reference } if ($FirstRef) { if ($FirstRef.AceGUIDs -is [System.Collections.IEnumerable]) { $FirstACEGuid = $FirstRef.AceGUIDs[0] } else { $FirstACEGuid = $FirstRef.AceGUIDs } } if ($FirstACEGuid) { $ACEList = $AceByGUID.Value[$FirstACEGuid] } if ($ACEList -is [System.Collections.IEnumerable]) { $FirstACE = $ACEList[0] } else { $FirstACE = $ACEList } $ACEProps = $FirstACE.PSObject.Properties.GetEnumerator().Name } ForEach ($PermissionRef in $Reference) { $Account = $PrincipalByResolvedID.Value[$PermissionRef.Account] [PSCustomObject]@{ Account = $Account AccountName = $PermissionRef.Account Access = ForEach ($GuidList in $PermissionRef.AceGUIDs) { ForEach ($Guid in $GuidList) { $ACE = $AceByGUID.Value[$Guid] $OutputProperties = @{ Account = $Account } ForEach ($Prop in $ACEProps) { $OutputProperties[$Prop] = $ACE.$Prop } [pscustomobject]$OutputProperties } } PSTypeName = 'Permission.ItemPermissionAccountAccess' } } } function Expand-ItemPermissionReference { param ( $Reference, [ref]$PrincipalsByResolvedID, [ref]$ACEsByGUID, [ref]$ACLsByPath ) ForEach ($Item in $Reference) { [PSCustomObject]@{ Item = $ACLsByPath.Value[$Item.Path] Access = Expand-ItemPermissionAccountAccessReference -Reference $Item.Access -AceByGUID $ACEsByGUID -PrincipalByResolvedID $PrincipalsByResolvedID PSTypeName = 'Permission.ItemPermission' } } } function Expand-TargetPermissionReference { # Expand each Access Control Entry with the Security Principal for the resolved IdentityReference. param ( $Reference, [ref]$PrincipalsByResolvedID, [ref]$ACEsByGUID, [ref]$ACLsByPath, [ref]$AceGuidByPath, # How to group the permissions in the output stream and within each exported file [ValidateSet('account', 'item', 'none', 'target')] [String]$GroupBy = 'item' ) switch ($GroupBy) { 'account' { ForEach ($Target in $Reference) { $TargetProperties = @{ PSTypeName = 'Permission.TargetPermission' Path = $Target.Path } # Expand reference GUIDs into their associated Access Control Entries and Security Principals. $TargetProperties['NetworkPaths'] = ForEach ($NetworkPath in $Target.NetworkPaths) { [pscustomobject]@{ Item = $AclsByPath.Value[$NetworkPath.Path] PSTypeName = 'Permission.ParentItemPermission' Accounts = Expand-AccountPermissionReference -Reference $NetworkPath.Accounts -ACEsByGUID $ACEsByGUID -PrincipalsByResolvedID $PrincipalsByResolvedID -ACLsByPath $ACLsByPath } } [pscustomobject]$TargetProperties } break } 'item' { ForEach ($Target in $Reference) { $TargetProperties = @{ Path = $Target.Path } # Expand reference GUIDs into their associated Access Control Entries and Security Principals. $TargetProperties['NetworkPaths'] = ForEach ($NetworkPath in $Target.NetworkPaths) { [pscustomobject]@{ Access = Expand-ItemPermissionAccountAccessReference -Reference $NetworkPath.Access -AceByGUID $ACEsByGUID -PrincipalByResolvedID $PrincipalsByResolvedID Item = $AclsByPath.Value[$NetworkPath.Path] Items = ForEach ($TargetChild in $NetworkPath.Items) { $Access = Expand-ItemPermissionAccountAccessReference -Reference $TargetChild.Access -AceByGUID $ACEsByGUID -PrincipalByResolvedID $PrincipalsByResolvedID if ($Access) { [pscustomobject]@{ Access = $Access Item = $AclsByPath.Value[$TargetChild.Path] PSTypeName = 'Permission.ChildItemPermission' } } } } } [pscustomobject]$TargetProperties } break } # 'none' and 'target' behave the same default { $ExpansionParameters = @{ AceGUIDsByPath = $AceGuidByPath ACEsByGUID = $ACEsByGUID PrincipalsByResolvedID = $PrincipalsByResolvedID } ForEach ($Target in $Reference) { $TargetProperties = @{ PSTypeName = 'Permission.TargetPermission' Path = $Target.Path } # Expand reference GUIDs into their associated Access Control Entries and Security Principals. $TargetProperties['NetworkPaths'] = ForEach ($NetworkPath in $Target.NetworkPaths) { [pscustomobject]@{ Access = Expand-FlatPermissionReference -SortedPath $SortedPaths @ExpansionParameters Item = $AclsByPath[$NetworkPath.Path] PSTypeName = 'Permission.FlatPermission' } } [pscustomobject]$TargetProperties } break } } } function Get-ColumnJson { # For the JSON that will be used by JavaScript to generate the table param ( $InputObject, [string[]]$PropNames, [Hashtable]$ColumnDefinition = @{ 'Inheritance' = @{ 'width' = '1' } } ) if (-not $PSBoundParameters.ContainsKey('PropNames')) { if ($InputObject -is [System.Collections.IEnumerable]) { $FirstInputObject = $InputObject[0] } else { $FirstInputObject = $InputObject } $PropNames = $FirstInputObject.PSObject.Properties.GetEnumerator().Name } $Columns = ForEach ($Prop in $PropNames) { $Props = $ColumnDefinition[$Prop] if ($Props) { $Props['field'] = $Prop -replace '\s', '' $Props['title'] = $Prop } else { $Props = @{ 'field' = $Prop -replace '\s', '' 'title' = $Prop } } [PSCustomObject]$Props } $Columns | ConvertTo-Json -Compress } function Get-DetailDivHeader { param ( [String]$GroupBy, [String]$Split ) if ( $GroupBy -eq $Split ) { 'Permissions' } else { switch ($GroupBy) { 'account' { 'Folders Included in Those Permissions'; break } 'item' { 'Accounts Included in Those Permissions'; break } 'target' { 'Target Paths'; break } 'none' { 'Permissions'; break } } } } function Get-FolderPermissionTableHeader { [OutputType([String])] param ( $Group, [String]$GroupID, [String]$ShortestFolderPath ) $Parent = $GroupID | Split-Path -Parent $Leaf = $Parent | Split-Path -Leaf -ErrorAction SilentlyContinue if ($Leaf) { $ParentLeaf = $Leaf } else { $ParentLeaf = $Parent } if ('' -ne $ParentLeaf) { if ($Group.Item.AreAccessRulesProtected) { return "Inheritance is disabled on this folder. Accounts with access to the parent ($ParentLeaf) and its subfolders cannot access this folder unless they are listed here:" } else { if ($Group.Item.Path -eq $ShortestFolderPath) { return "Inherited permissions from the parent ($ParentLeaf) are included. This folder can only be accessed by the accounts listed here:" } else { return "Inheritance is enabled on this folder. Accounts with access to the parent ($ParentLeaf) and its subfolders can access this folder. So can the accounts listed here:" } } } else { return 'This is the top-level folder. It can only be accessed by the accounts listed here:' } } function Get-HtmlBody { param ( $NetworkPathDiv, $TableOfContents, $HtmlFolderPermissions, $ReportFooter, $HtmlFileList, $HtmlExclusions, $SummaryDivHeader, $DetailDivHeader ) $StringBuilder = [System.Text.StringBuilder]::new() $null = $StringBuilder.Append((New-HtmlHeading 'Network Paths' -Level 5)) $null = $StringBuilder.Append($NetworkPathDiv) if ($TableOfContents) { $null = $StringBuilder.Append((New-HtmlHeading $SummaryDivHeader -Level 5)) $null = $StringBuilder.Append($TableOfContents) } $null = $StringBuilder.Append((New-HtmlHeading $DetailDivHeader -Level 5)) ForEach ($Perm in $HtmlFolderPermissions) { $null = $StringBuilder.Append($Perm) } if ($HtmlExclusions) { $null = $StringBuilder.Append((New-HtmlHeading "Exclusions from This Report" -Level 5)) $null = $StringBuilder.Append($HtmlExclusions) } $null = $StringBuilder.Append((New-HtmlHeading "Files Generated" -Level 5)) $null = $StringBuilder.Append($HtmlFileList) $null = $StringBuilder.Append($ReportFooter) return $StringBuilder.ToString() } function Get-HtmlReportElements { # missing param ( # Regular expressions matching names of security principals to exclude from the HTML report [string[]]$ExcludeAccount, # Accounts whose objectClass property is in this list are excluded from the HTML report [string[]]$ExcludeClass = @('group', 'computer'), <# Domain(s) to ignore (they will be removed from the username) Intended when a user has matching SamAccountNames in multiple domains but you only want them to appear once on the report. Can also be used to remove all domains simply for brevity in the report. #> $IgnoreDomain, # Path to the NTFS folder whose permissions are being exported [string[]]$TargetPath, # Network Path to the NTFS folder whose permissions are being exported $NetworkPath, # Group members are not being exported (only the groups themselves) [switch]$NoMembers, # Path to the folder to save the logs and reports generated by this script $OutputDir, # NTAccount caption of the user running the script $WhoAmI, # FQDN of the computer running the script $ThisFqdn, # Timer to measure progress and performance $StopWatch, # Title at the top of the HTML report $Title, $Permission, $RecurseDepth, $LogFileList, $ReportInstanceId, [Hashtable]$AceByGUID, <# Level of detail to export to file 0 Item paths $TargetPath 1 Resolved item paths (server names resolved, DFS targets resolved) $Parents 2 Expanded resolved item paths (parent paths expanded into children) $AclByPath.Keys 3 Access rules $AclByPath.Values 4 Resolved access rules (server names resolved, inheritance flags resolved) $AceByGUID.Values | %{$_} | Sort Path,IdentityReferenceResolved 5 Accounts with access $PrincipalByID.Values | %{$_} | Sort ResolvedAccountName 6 Expanded resolved access rules (expanded with account info) $Permissions 7 Formatted permissions $FormattedPermissions 8 Best Practice issues $BestPracticeIssues 9 XML custom sensor output for Paessler PRTG Network Monitor $PrtgXml 10 Permission Report #> [int[]]$Detail = @(0..10), <# Information about the current culture settings. This includes information about the current language settings on the system, such as the keyboard layout, and the display format of items such as numbers, currency, and dates. #> [cultureinfo]$Culture = $Cache.Value['Culture'], # Unused. Here so that the @PSBoundParameters hashtable in Out-PermissionReport can be used as a splat for this function. [String]$GroupBy = 'item', <# How to split up the exported files: none generate 1 file with all permissions target generate 1 file per target item generate 1 file per item account generate 1 file per account all generate 1 file per target and 1 file per item and 1 file per account and 1 file with all permissions. #> [string[]]$SplitBy = 'target', [String]$Split, [String]$FileName, # Unused. Here so that the @PSBoundParameters hashtable in Out-PermissionReport can be used as a splat for this function. $FormattedPermission, # Unused. Here so that the @PSBoundParameters hashtable in Out-PermissionReport can be used as a splat for this function. $Analysis, # Unused. Here so that the @PSBoundParameters hashtable in Out-PermissionReport can be used as a splat for this function. [string[]]$FileFormat, # Unused. Here so that the @PSBoundParameters hashtable in Out-PermissionReport can be used as a splat for this function. [String]$OutputFormat, [uint64]$TargetCount, [uint64]$ParentCount, [uint64]$ChildCount, [uint64]$ItemCount, [uint64]$FqdnCount, [uint64]$AclCount, [uint64]$AceCount, [uint64]$IdCount, [UInt64]$PrincipalCount, # In-process cache to reduce calls to other processes or disk, and store repetitive parameters for better readability of code and logs [Parameter(Mandatory)] [ref]$Cache ) Write-LogMsg -Cache $Cache -Text "Get-ReportDescription -RecurseDepth $RecurseDepth" $ReportDescription = Get-ReportDescription -RecurseDepth $RecurseDepth $NetworkPathTable = Select-ItemTableProperty -InputObject $NetworkPath -Culture $Culture -SkipFilterCheck | ConvertTo-Html -Fragment | New-BootstrapTable $NetworkPathDivHeader = 'Local paths were resolved to UNC paths, and UNC paths were resolved to all DFS folder targets' Write-LogMsg -Cache $Cache -Text "New-BootstrapDivWithHeading -HeadingText '$NetworkPathDivHeader' -Content `$NetworkPathTable" $NetworkPathDiv = New-BootstrapDivWithHeading -HeadingText $NetworkPathDivHeader -Content $NetworkPathTable -Class 'h-100 p-1 bg-light border rounded-3 table-responsive' -HeadingLevel 6 Write-LogMsg -Cache $Cache -Text "Get-SummaryDivHeader -GroupBy $GroupBy" $SummaryDivHeader = Get-SummaryDivHeader -GroupBy $GroupBy -Split $Split Write-LogMsg -Cache $Cache -Text "Get-SummaryTableHeader -RecurseDepth $RecurseDepth -GroupBy $GroupBy" $SummaryTableHeader = Get-SummaryTableHeader -RecurseDepth $RecurseDepth -GroupBy $GroupBy Write-LogMsg -Cache $Cache -Text "Get-DetailDivHeader -GroupBy $GroupBy" $DetailDivHeader = Get-DetailDivHeader -GroupBy $GroupBy -Split $Split Write-LogMsg -Cache $Cache -Text "New-HtmlHeading 'Target Paths' -Level 5" $TargetHeading = New-HtmlHeading 'Target Paths' -Level 5 # Convert the target path(s) to a Bootstrap alert div $TargetPathString = $TargetPath -join '<br />' Write-LogMsg -Cache $Cache -Text "New-BootstrapAlert -Class Dark -Text '$TargetPathString'" $TargetAlert = New-BootstrapAlert -Class Dark -Text $TargetPathString -AdditionalClasses ' small' # Add the target path div to the parameter splat for New-BootstrapReport $ReportParameters = @{ Title = $Title Description = "$TargetHeading $TargetAlert $ReportDescription" } # Build the divs showing the exclusions specified in the report parameters $ExcludedNames = ConvertTo-NameExclusionDiv -ExcludeAccount $ExcludeAccount -Cache $Cache $ExcludedClasses = ConvertTo-ClassExclusionDiv -ExcludeClass $ExcludeClass -Cache $Cache $IgnoredDomains = ConvertTo-IgnoredDomainDiv -IgnoreDomain $IgnoreDomain -Cache $Cache $ExcludedMembers = ConvertTo-MemberExclusionDiv -NoMembers:$NoMembers -Cache $Cache # Arrange the exclusion divs into two Bootstrap columns Write-LogMsg -Cache $Cache -Text "New-BootstrapColumn -Html '`$ExcludedMembers`$ExcludedClasses',`$IgnoredDomains`$ExcludedNames" $ExclusionsDiv = New-BootstrapColumn -Html "$ExcludedMembers$ExcludedClasses", "$IgnoredDomains$ExcludedNames" -Width 6 # Convert the list of generated log files to a Bootstrap list group $HtmlListOfLogs = $LogFileList | Split-Path -Leaf | # the output directory will already be shown in a Bootstrap alert above the list, so this row removes the path from the file names ConvertTo-HtmlList | ConvertTo-BootstrapListGroup # Prepare headings for 2 columns listing report and log files generated, respectively $HtmlReportsHeading = New-HtmlHeading -Text 'Reports' -Level 6 $HtmlLogsHeading = New-HtmlHeading -Text 'Logs' -Level 6 # Convert the output directory path to a Boostrap alert $HtmlOutputDir = New-BootstrapAlert -Text $OutputDir -Class 'secondary' -AdditionalClasses ' small' # Convert the list of detail levels and file formats to a hashtable of report files that will be generated $ReportFileList = ConvertTo-FileList -Detail $Detail -Format $Formats -FileName $FileName # Convert the hashtable of generated report files to a Bootstrap list group $HtmlReportsDiv = (ConvertTo-FileListDiv -FileList $ReportFileList) -join "`r`n" # Arrange the lists of generated files in two Bootstrap columns Write-LogMsg -Cache $Cache -Text "New-BootstrapColumn -Html '`$HtmlReportsHeading`$HtmlReportsDiv',`$HtmlLogsHeading`$HtmlListOfLogs" $HtmlDivOfFileColumns = New-BootstrapColumn -Html "$HtmlReportsHeading$HtmlReportsDiv", "$HtmlLogsHeading$HtmlListOfLogs" -Width 6 # Combine the alert and the columns of generated files inside a Bootstrap div Write-LogMsg -Cache $Cache -Text "New-BootstrapDivWithHeading -HeadingText 'Output Folder:' -Content '`$HtmlOutputDir`$HtmlDivOfFileColumns'" $HtmlDivOfFiles = New-BootstrapDivWithHeading -HeadingText 'Output Folder:' -Content "$HtmlOutputDir$HtmlDivOfFileColumns" -HeadingLevel 6 # Generate a footer to include at the bottom of the report Write-LogMsg -Cache $Cache -Text "Get-ReportFooter -StopWatch `$StopWatch -ReportInstanceId '$ReportInstanceId' -WhoAmI '$WhoAmI' -ThisFqdn '$ThisFqdn'" $FooterParams = @{ 'ItemCount' = $ItemCount 'FormattedPermissionCount' = ( @('csv', 'html', 'js', 'json', 'prtgxml', 'xml') | ForEach-Object { $FormattedPermission.Values.NetworkPaths.$_.PassThru.Count } | Measure-Object -Sum ).Sum 'PermissionCount' = ( @( $Permission.AccountPermissions.Access.Access.Count, #SplitBy Account $Permission.ItemPermissions.Access.Access.Count, $Permission.TargetPermissions.NetworkPaths.Accounts.Access.Access.Count, # -SplitBy target -GroupBy account ($Permission.TargetPermissions.NetworkPaths.Items.Access.Access.Count + $Permission.TargetPermissions.NetworkPaths.Access.Access.Count), # -SplitBy target -GroupBy item $Permission.TargetPermissions.NetworkPaths.Access.Count, # -SplitBy target -GroupBy target/none $AceByGUID.Keys.Count ) | Measure-Object -Maximum ).Maximum 'ReportInstanceId' = $ReportInstanceId 'StopWatch' = $StopWatch 'ThisFqdn' = $ThisFqdn 'WhoAmI' = $WhoAmI 'TargetCount' = $TargetCount 'ParentCount' = $ParentCount 'ChildCount' = $ChildCount 'FqdnCount' = $FqdnCount 'AclCount' = $AclCount 'AceCount' = $AceCount 'PrincipalCount' = $PrincipalCount 'IdCount' = $IdCount } $ReportFooter = Get-HtmlReportFooter @FooterParams [PSCustomObject]@{ 'ReportFooter' = $ReportFooter 'HtmlDivOfFiles' = $HtmlDivOfFiles 'ExclusionsDiv' = $ExclusionsDiv 'ReportParameters' = $ReportParameters 'DetailDivHeader' = $DetailDivHeader 'SummaryTableHeader' = $SummaryTableHeader 'SummaryDivHeader' = $SummaryDivHeader 'NetworkPathDiv' = $NetworkPathDiv } } function Get-HtmlReportFooter { param ( # Stopwatch that was started when report generation began [System.Diagnostics.Stopwatch]$StopWatch, # NT Account caption (CONTOSO\User) of the account running this function [String]$WhoAmI = (whoami.EXE), <# FQDN of the computer running this function Can be provided as a string to avoid calls to HOSTNAME.EXE and [System.Net.Dns]::GetHostByName() #> [String]$ThisFqdn = ([System.Net.Dns]::GetHostByName((HOSTNAME.EXE)).HostName), [uint64]$TargetCount, [uint64]$ParentCount, [uint64]$ChildCount, [uint64]$ItemCount, [uint64]$FqdnCount, [uint64]$AclCount, [uint64]$AceCount, [uint64]$IdCount, [UInt64]$PrincipalCount, [UInt64]$PermissionCount, [uint64]$FormattedPermissionCount, [uint64]$TotalBytes, [String]$ReportInstanceId, [string[]]$UnitsToResolve = @('day', 'hour', 'minute', 'second') ) $null = $StopWatch.Stop() $FinishTime = Get-Date $StartTime = $FinishTime.AddTicks(-$StopWatch.ElapsedTicks) $TimeZoneName = Get-TimeZoneName -Time $FinishTime $Duration = Format-TimeSpan -TimeSpan $StopWatch.Elapsed -UnitsToResolve $UnitsToResolve if ($TotalBytes) { $TiB = $TotalBytes / 1TB $Size = " ($TiB TiB)" } $AllUnits = @('day', 'hour', 'minute', 'second') #excluded millisecond $CompletionTime = @( @{ 'Name' = 'Target paths (specified in report parameters)' 'Count' = $TargetCount 'Average Time Each' = if ($TargetCount -gt 0) { Format-TimeSpan -TimeSpan ( New-TimeSpan -Milliseconds ( $StopWatch.Elapsed.TotalMilliseconds / $TargetCount ) ) -UnitsToResolve $AllUnits } }, @{ 'Name' = 'Parents (resolved from target paths)' 'Count' = $ParentCount 'Average Time Each' = if ($ParentCount -gt 0) { Format-TimeSpan -TimeSpan ( New-TimeSpan -Milliseconds ( $StopWatch.Elapsed.TotalMilliseconds / $ParentCount ) ) -UnitsToResolve $AllUnits } }, @{ 'Name' = 'Children (found beneath parent paths)' 'Count' = $ChildCount 'Average Time Each' = if ($ChildCount -gt 0) { Format-TimeSpan -TimeSpan ( New-TimeSpan -Milliseconds ( $StopWatch.Elapsed.TotalMilliseconds / $ChildCount ) ) -UnitsToResolve $AllUnits } }, @{ 'Name' = 'Items (parents and children)' 'Count' = $ItemCount 'Average Time Each' = if ($ItemCount -gt 0) { Format-TimeSpan -TimeSpan ( New-TimeSpan -Milliseconds ( $StopWatch.Elapsed.TotalMilliseconds / $ItemCount ) ) -UnitsToResolve $AllUnits } }, @{ 'Name' = 'Servers (hosting items)' 'Count' = $FqdnCount 'Average Time Each' = if ($FqdnCount -gt 0) { Format-TimeSpan -TimeSpan ( New-TimeSpan -Milliseconds ( $StopWatch.Elapsed.TotalMilliseconds / $FqdnCount ) ) -UnitsToResolve $AllUnits } }, @{ 'Name' = 'ACLs (found on items)' 'Count' = $AclCount 'Average Time Each' = if ($AclCount -gt 0) { Format-TimeSpan -TimeSpan ( New-TimeSpan -Milliseconds ( $StopWatch.Elapsed.TotalMilliseconds / $AclCount ) ) -UnitsToResolve $AllUnits } }, @{ 'Name' = 'ACEs (in ACLs)' 'Count' = $AceCount 'Average Time Each' = if ($AceCount -gt 0) { Format-TimeSpan -TimeSpan ( New-TimeSpan -Milliseconds ( $StopWatch.Elapsed.TotalMilliseconds / $AceCount ) ) -UnitsToResolve $AllUnits } }, @{ 'Name' = 'IDs (in ACEs)' 'Count' = $IdCount 'Average Time Each' = if ($IdCount -gt 0) { Format-TimeSpan -TimeSpan ( New-TimeSpan -Milliseconds ( $StopWatch.Elapsed.TotalMilliseconds / $IdCount ) ) -UnitsToResolve $AllUnits } }, @{ 'Name' = 'Security Principals (represented by IDs, including group members)' 'Count' = $PrincipalCount 'Average Time Each' = if ($PrincipalCount -gt 0) { Format-TimeSpan -TimeSpan ( New-TimeSpan -Milliseconds ( $StopWatch.Elapsed.TotalMilliseconds / $PrincipalCount ) ) -UnitsToResolve $AllUnits } }, @{ 'Name' = 'Unique Permissions for those security principals (non-inherited)' 'Count' = $PermissionCount 'Average Time Each' = if ($PermissionCount -gt 0) { Format-TimeSpan -TimeSpan ( New-TimeSpan -Milliseconds ( $StopWatch.Elapsed.TotalMilliseconds / $PermissionCount ) ) -UnitsToResolve $AllUnits } }, @{ 'Name' = 'Formatted Permissions (according to report parameters)' 'Count' = $FormattedPermissionCount 'Average Time Each' = if ($FormattedPermissionCount -gt 0) { Format-TimeSpan -TimeSpan ( New-TimeSpan -Milliseconds ( $StopWatch.Elapsed.TotalMilliseconds / $FormattedPermissionCount ) ) -UnitsToResolve $AllUnits } }, #@{ # 'Name' = 'Data Size' # 'Count' = $TiB # 'Average Time Each' = Format-TimeSpan -TimeSpan ( New-TimeSpan -Milliseconds ( $StopWatch.Elapsed.TotalMilliseconds / $TiB ) ) -UnitsToResolve $AllUnits #}, @{ 'Name' = 'TOTAL REPORT TIME' 'Count' = 1 'Average Time Each' = Format-TimeSpan -TimeSpan $StopWatch.Elapsed -UnitsToResolve $AllUnits } ) $Heading = New-HtmlHeading 'Performance' -Level 6 $Html = $CompletionTime | Select-Object -Property Name, Count, 'Average Time Each' | ConvertTo-Html -Fragment $Table = $Html | New-BootstrapTable $Div = New-BootstrapDiv -Text ($Heading + $Table) -Class 'h-100 p-1 bg-light border rounded-3 table-responsive' $Text = @" Report generated by $WhoAmI on $ThisFQDN starting at $StartTime and ending at $FinishTime $TimeZoneName (elapsed: $Duration)<br /> Report instance: $ReportInstanceId "@ $Alert = New-BootstrapAlert -Class Light -Text $Text -AdditionalClasses ' small' "$Div<br />$Alert" } <# $TagetPath.Count parent folders $ItemCount total folders including children $FolderPermissions folders with unique permissions $Permissions.Count access control entries on those folders $Identities.Count identities in those access control entries $FormattedSecurityPrincipals principals represented by those identities $UniqueAccountPermissions.Count unique accounts after filtering out any specified domain names $ExpandedAccountPermissions.Count effective permissions belonging to those principals and applying to those folders #> function Get-PermissionProgress { param ( [string]$Activity, [ref]$Cache ) $Progress = @{ Activity = $Activity } $ProgressParentId = $Cache.Value['ProgressParentId'].Value if ($null -ne $ProgressParentId) { $Progress['ParentId'] = $ProgressParentId $Progress['Id'] = $ProgressParentId + 1 } else { $Progress['Id'] = 0 } return $Progress } function Get-ReportDescription { param ( [int]$RecurseDepth ) switch ($RecurseDepth ) { 0 { 'Does not include permissions on subfolders (option was declined)'; break } -1 { 'Includes all subfolders with unique permissions (including ∞ levels of subfolders)'; break } default { "Includes all subfolders with unique permissions (down to $RecurseDepth levels of subfolders)"; break } } } function Get-SummaryDivHeader { param ( [String]$GroupBy, [String]$Split ) if ( $GroupBy -eq $Split ) { 'Permissions' } else { switch ($GroupBy) { 'account' { 'Accounts With Permissions'; break } 'item' { 'Items in Those Paths with Unique Permissions'; break } 'target' { 'Target Paths'; break } 'none' { 'Permissions'; break } } } } function Get-SummaryTableHeader { param ( [int]$RecurseDepth, [String]$GroupBy ) switch ($GroupBy) { 'account' { if ($NoMembers) { 'Includes accounts directly listed in the permissions only (option to include group members was declined)' } else { 'Includes accounts in the permissions, and their group members' } break } 'item' { switch ($RecurseDepth ) { 0 { 'Includes the target folder only (option to report on subfolders was declined)' break } -1 { 'Includes the target folder and all subfolders with unique permissions' break } default { "Includes the target folder and $RecurseDepth levels of subfolders with unique permissions" break } } break } 'target' { break } } } function Group-AccountPermissionReference { param ( [string[]]$ID, [ref]$AceGuidByID, [ref]$AceByGuid ) $GuidType = [guid] ForEach ($Identity in ($ID | Sort-Object)) { $ItemPaths = New-PermissionCacheRef -Key ([string]) -Value ([System.Collections.Generic.List[guid]]) ForEach ($Guid in $AceGuidByID.Value[$Identity]) { Add-PermissionCacheItem -Cache $ItemPaths -Key $AceByGuid.Value[$Guid].Path -Value $Guid -Type $GuidType } [PSCustomObject]@{ Account = $Identity Access = ForEach ($Item in ($ItemPaths.Value.Keys | Sort-Object)) { [PSCustomObject]@{ Path = $Item AceGUIDs = $ItemPaths.Value[$Item] } } } } } function Group-ItemPermissionReference { param ( $SortedPath, [ref]$AceGUIDsByPath, [ref]$ACEsByGUID, [ref]$PrincipalsByResolvedID, [Hashtable]$Property = @{} ) ForEach ($ItemPath in $SortedPath) { $Property['Path'] = $ItemPath $IDsWithAccess = Find-ResolvedIDsWithAccess -ItemPath $ItemPath -AceGUIDsByPath $AceGUIDsByPath -ACEsByGUID $ACEsByGUID -PrincipalsByResolvedID $PrincipalsByResolvedID $Property['Access'] = ForEach ($ID in ($IDsWithAccess.Value.Keys | Sort-Object)) { [PSCustomObject]@{ Account = $ID AceGUIDs = $IDsWithAccess.Value[$ID] } } [PSCustomObject]$Property } } function Group-TargetPermissionReference { # Expand each Access Control Entry with the Security Principal for the resolved IdentityReference. param ( [ref]$TargetPath, [Hashtable]$Children, [ref]$PrincipalsByResolvedID, [ref]$AceGuidByID, [ref]$ACEsByGUID, [ref]$AceGUIDsByPath, [ref]$ACLsByPath, # How to group the permissions in the output stream and within each exported file [ValidateSet('account', 'item', 'none', 'target')] [String]$GroupBy = 'item' ) $CommonParams = @{ AceGUIDsByPath = $AceGUIDsByPath ACEsByGUID = $ACEsByGUID PrincipalsByResolvedID = $PrincipalsByResolvedID } switch ($GroupBy) { 'account' { ForEach ($Target in ($TargetPath.Value.Keys | Sort-Object)) { $TargetProperties = @{ Path = $Target } $NetworkPaths = $TargetPath.Value[$Target] | Sort-Object $TargetProperties['NetworkPaths'] = ForEach ($NetworkPath in $NetworkPaths) { $ItemsForThisNetworkPath = [System.Collections.Generic.List[String]]::new() $ItemsForThisNetworkPath.Add($NetworkPath) $Kids = [string[]]$Children[$NetworkPath] if ($Kids) { $ItemsForThisNetworkPath.AddRange($Kids) } $IDsWithAccess = Find-ResolvedIDsWithAccess -ItemPath $ItemsForThisNetworkPath @CommonParams # Prepare a dictionary for quick lookup of ACE GUIDs for this target $AceGuidsForThisNetworkPath = @{} # Enumerate the collection of ACE GUIDs for this target ForEach ($Item in $ItemsForThisNetworkPath) { ForEach ($Guid in $AceGUIDsByPath.Value[$Item]) { # The returned dictionary value is a lists of guids, so we need to enumerate the list ForEach ($ListItem in $Guid) { # Add each GUID to the dictionary for quick lookups $AceGuidsForThisNetworkPath[$ListItem] = $null } } } $AceGuidByIDForThisNetworkPath = @{} ForEach ($ID in $IDsWithAccess.Value.Keys) { $GuidsForThisIDAndNetworkPath = [System.Collections.Generic.List[guid]]::new() ForEach ($Guid in $AceGuidByID.Value[$ID]) { if ($AceGuidsForThisNetworkPath.ContainsKey($Guid)) { $GuidsForThisIDAndNetworkPath.Add($Guid) } } $AceGuidByIDForThisNetworkPath[$ID] = $GuidsForThisIDAndNetworkPath } [PSCustomObject]@{ Path = $NetworkPath Accounts = Group-AccountPermissionReference -ID $IDsWithAccess.Value.Keys -AceGuidByID ([ref]$AceGuidByIDForThisNetworkPath) -AceByGuid $ACEsByGUID } } [pscustomobject]$TargetProperties } break } 'item' { ForEach ($Target in ($TargetPath.Value.Keys | Sort-Object)) { $TargetProperties = @{ Path = $Target } $NetworkPaths = $TargetPath.Value[$Target] | Sort-Object $TargetProperties['NetworkPaths'] = ForEach ($NetworkPath in $NetworkPaths) { $TopLevelItemProperties = @{ 'Items' = Group-ItemPermissionReference -SortedPath ($Children[$NetworkPath] | Sort-Object) -ACLsByPath $ACLsByPath @CommonParams } Group-ItemPermissionReference -SortedPath $NetworkPath -Property $TopLevelItemProperties -ACLsByPath $ACLsByPath @CommonParams } [pscustomobject]$TargetProperties } break } # 'none' and 'target' behave the same default { ForEach ($Target in ($TargetPath.Value.Keys | Sort-Object)) { $TargetProperties = @{ Path = $Target } $NetworkPaths = $TargetPath.Value[$Target] | Sort-Object $TargetProperties['NetworkPaths'] = ForEach ($NetworkPath in $NetworkPaths) { $ItemsForThisNetworkPath = [System.Collections.Generic.List[String]]::new() $ItemsForThisNetworkPath.Add($NetworkPath) $ItemsForThisNetworkPath.AddRange([string[]]$Children[$NetworkPath]) [PSCustomObject]@{ Path = $NetworkPath Access = Expand-FlatPermissionReference -SortedPath $ItemsForThisNetworkPath @CommonParams } } [pscustomobject]$TargetProperties } break } } } function Memory { <# function SizeOfObj { param ([Type]$T, [Object]$thevalue, [System.Runtime.Serialization.ObjectIDGenerator]$gen) $type = $T [int]$returnval = 0 if ($type.IsValueType) { $nulltype = [Nullable]::GetUnderlyingType($type) $returnval = [System.Runtime.InteropServices.Marshal]::SizeOf($nulltype ?? $type) } elseif ($null -eq $thevalue) { return 0 } elseif ($thevalue.GetType().Name -eq 'String') { $returnval = ([System.Text.Encoding]::Default).GetByteCount([String]$thevalue) } elseif ( $type.IsArray -and $type.GetElementType().IsValueType ) { $returnval = $thevalue.GetLength(0) * [System.Runtime.InteropServices.Marshal]::SizeOf($type.GetElementType()) } elseif ($thevalue.GetType.Name -eq 'Stream') { [System.IO.Stream]$stream = [System.IO.Stream]$thevalue $returnval = [int]($stream.Length) } elseif ($type.IsSerializable) { try { [System.IO.MemoryStream]$s = [System.IO.MemoryStream]::new() [System.Runtime.Serialization.Formatters.Binary.BinaryFormatter]$formatter = [System.Runtime.Serialization.Formatters.Binary.BinaryFormatter]::new() $formatter.Serialize($s, $thevalue) $returnval = [int]($s.Length) } catch { } } elseif ($type.IsClass) { $returnval += SizeOfClass -thevalue $thevalue -gen ($gen ?? [System.Runtime.Serialization.ObjectIDGenerator]::new()) } if ($returnval -eq 0) { try { $returnval = [System.Runtime.InteropServices.Marshal]::SizeOf($thevalue) } catch { } } return $returnval } function SizeOf { param ($T, $value) SizeOfObj -T ($T.GetType()) -thevalue $value -gen $null } function SizeOfClass { param ( [Object]$thevalue, [System.Runtime.Serialization.ObjectIDGenerator]$gen ) [bool]$isfirstTime = $null $gen.GetId($thevalue, [ref]$isfirstTime) if (-not $isfirstTime) { return 0 } $fields = $thevalue.GetType().GetFields([System.Reflection.BindingFlags]::NonPublic -bor [System.Reflection.BindingFlags]::Instance) [int]$returnval = 0 for ($i = 0; $i -lt $fields.Length; $i++) { [Type]$t = $fields[$i].FieldType [Object]$v = $fields[$i].GetValue($thevalue) $returnval += 4 + (SizeOfObj -T $t -thevalue $v -gen $gen) } return $returnval } $Test = @{} $n = 1000000 $i = 0 while ($i -lt $n) { $Test[$i] = [pscustomobject]@{prop1 = 'blah'} $i++ } $Size = (SizeOf -t [Hashtable] -value $Test)/1KB "$Size KiB" #> } function Merge-AceAndPrincipal { param ( $Principal, $ACE, [ref]$PrincipalByResolvedID ) ForEach ($Member in $Principal.Members) { Merge-AceAndPrincipal -ACE $ACE -Principal $PrincipalByResolvedID.Value[$Member] -PrincipalByResolvedID $PrincipalByResolvedID } $OutputProperties = @{ PSTypeName = 'Permission.FlatPermission' ItemPath = $ACE.Path AdsiPath = $Principal.Path AccountName = $Principal.ResolvedAccountName } ForEach ($Prop in $ACE.PSObject.Properties.GetEnumerator().Name) { $OutputProperties[$Prop] = $ACE.$Prop } ForEach ($Prop in $Principal.PSObject.Properties.GetEnumerator().Name) { $OutputProperties[$Prop] = $Principal.$Prop } return [pscustomobject]$OutputProperties } function New-PermissionCacheRef { param ( # Type of the keys [type]$Key = [System.String], # Type of the values [type]$Value = [System.Collections.Generic.List[System.Object]], [StringComparer]$Comparer = [StringComparer]::OrdinalIgnoreCase ) $genericTypeDefinition = [System.Collections.Concurrent.ConcurrentDictionary`2] $genericType = $genericTypeDefinition.MakeGenericType($Key, $Value) if ($Key -eq [System.String]) { return [ref][Activator]::CreateInstance($genericType, $Comparer) } return [ref][Activator]::CreateInstance($genericType) } function Out-PermissionDetailReport { param ( [int[]]$Detail, [Hashtable]$ReportObject, [scriptblock[]]$DetailExport, [String]$Format, [String]$OutputDir, [cultureinfo]$Culture, [string[]]$DetailString, [String]$FileName, [String]$FormatToReturn = 'js', [int]$LevelToReturn = 10 ) switch ($Format) { 'csv' { $Suffix = '.csv' ; break } 'html' { $Suffix = "_$FileName.htm" ; break } 'js' { $Suffix = "_$Format`_$FileName.htm" ; break } 'json' { $Suffix = "_$FileName.json" ; break } 'prtgxml' { $Suffix = '.xml' ; break } 'xml' { $Suffix = '.xml' ; break } } ForEach ($Level in $Detail) { # Get shorter versions of the detail strings to use in file names $ShortDetail = $DetailString[$Level] -replace '\([^\)]*\)', '' # Convert the shorter strings to Title Case $TitleCaseDetail = $Culture.TextInfo.ToTitleCase($ShortDetail) # Remove spaces from the shorter strings $SpacelessDetail = $TitleCaseDetail -replace '\s', '' # Build the file path $ThisReportFile = "$OutputDir\$Level`_$SpacelessDetail$Suffix" # Generate the report $Report = $ReportObject[$Level] # Save the report $null = Invoke-Command -ScriptBlock $DetailExport[$Level] -ArgumentList $Report, $ThisReportFile # Output the name of the report file to the Information stream Write-Information $ThisReportFile # Return the report file path of the highest level for the Interactive switch of Export-Permission if ($Level -eq $LevelToReturn -and $Format -eq $FormatToReturn) { $ThisReportFile } } } function Resolve-Ace { <# .SYNOPSIS Use ADSI to lookup info about IdentityReferences from Authorization Rule Collections that came from Discretionary Access Control Lists .DESCRIPTION Based on the IdentityReference proprety of each Access Control Entry: Resolve SID to NT account name and vise-versa Resolve well-known SIDs Resolve generic defaults like 'NT AUTHORITY' and 'BUILTIN' to the applicable computer or domain name Add these properties (IdentityReferenceSID,IdentityReferenceResolved) to the object and return it .INPUTS [System.Security.AccessControl.AuthorizationRuleCollection]$ACE .OUTPUTS [PSCustomObject] Original object plus IdentityReferenceSID,IdentityReferenceResolved, and AdsiProvider properties .EXAMPLE Get-Acl | Expand-Acl | Resolve-Ace Use Get-Acl from the Microsoft.PowerShell.Security module as the source of the access list This works in either Windows Powershell or in Powershell Get-Acl does not support long paths (>256 characters) That was why I originally used the .Net Framework method .EXAMPLE Get-FolderAce -LiteralPath C:\Test -IncludeInherited | Resolve-Ace .EXAMPLE [String]$FolderPath = 'C:\Test' [System.IO.DirectoryInfo]$DirectoryInfo = Get-Item -LiteralPath $FolderPath $Sections = [System.Security.AccessControl.AccessControlSections]::Access -bor [System.Security.AccessControl.AccessControlSections]::Owner $FileSecurity = [System.Security.AccessControl.FileSecurity]::new($DirectoryInfo,$Sections) $IncludeExplicitRules = $true $IncludeInheritedRules = $true $AccountType = [System.Security.Principal.SecurityIdentifier] $FileSecurity.GetAccessRules($IncludeExplicitRules,$IncludeInheritedRules,$AccountType) | Resolve-Ace This uses .Net Core as the source of the access list It uses the GetAccessRules method on the [System.Security.AccessControl.FileSecurity] class The targetType parameter of the method is used to specify that the accounts in the ACL are returned as SIDs .EXAMPLE [String]$FolderPath = 'C:\Test' [System.IO.DirectoryInfo]$DirectoryInfo = Get-Item -LiteralPath $FolderPath $Sections = [System.Security.AccessControl.AccessControlSections]::Access -bor [System.Security.AccessControl.AccessControlSections]::Owner -bor [System.Security.AccessControl.AccessControlSections]::Group $DirectorySecurity = [System.Security.AccessControl.DirectorySecurity]::new($DirectoryInfo,$Sections) $IncludeExplicitRules = $true $IncludeInheritedRules = $true $AccountType = [System.Security.Principal.NTAccount] $FileSecurity.GetAccessRules($IncludeExplicitRules,$IncludeInheritedRules,$AccountType) | Resolve-Ace This uses .Net Core as the source of the access list It uses the GetAccessRules method on the [System.Security.AccessControl.FileSecurity] class The targetType parameter of the method is used to specify that the accounts in the ACL are returned as NT account names (DOMAIN\User) .EXAMPLE [String]$FolderPath = 'C:\Test' [System.IO.DirectoryInfo]$DirectoryInfo = Get-Item -LiteralPath $FolderPath [System.Security.AccessControl.DirectorySecurity]$DirectorySecurity = $DirectoryInfo.GetAccessControl('Access') [System.Security.AccessControl.AuthorizationRuleCollection]$AuthRules = $DirectorySecurity.Access $AuthRules | Resolve-Ace Use the .Net Framework (or legacy .Net Core up to 2.2) as the source of the access list Only works in Windows PowerShell Those versions of .Net had a GetAccessControl method on the [System.IO.DirectoryInfo] class This method is removed in modern versions of .Net Core .EXAMPLE [String]$FolderPath = 'C:\Test' [System.IO.DirectoryInfo]$DirectoryInfo = Get-Item -LiteralPath $FolderPath $Sections = [System.Security.AccessControl.AccessControlSections]::Access -bor [System.Security.AccessControl.AccessControlSections]::Owner $FileSecurity = [System.IO.FileSystemAclExtensions]::GetAccessControl($DirectoryInfo,$Sections) The [System.IO.FileSystemAclExtensions] class is a Windows-specific implementation It provides no known benefit over the cross-platform equivalent [System.Security.AccessControl.FileSecurity] .NOTES Dependencies: Get-DirectoryEntry Add-SidInfo Get-TrustedDomain Find-AdsiProvider if ($FolderPath.Length -gt 255) { $FolderPath = "\\?\$FolderPath" } TODO: add a param to offer DNS instead of or in addition to NetBIOS #> [OutputType([void])] param ( # Authorization Rule Collection of Access Control Entries from Discretionary Access Control Lists [object]$ACE, [object]$ItemPath, [string[]]$ACEPropertyName = $ACE.PSObject.Properties.GetEnumerator().Name, # Will be set as the Source property of the output object. # Intended to reflect permissions resulting from Ownership rather than Discretionary Access Lists [String]$Source, # In-process cache to reduce calls to other processes or disk, and store repetitive parameters for better readability of code and logs [Parameter(Mandatory)] [ref]$Cache, # GUID type (can be provided to avoid repetitive instantiation) [type]$Type = [guid], # Properties of each Account to display on the report [string[]]$AccountProperty = @('DisplayName', 'Company', 'Department', 'Title', 'Description') ) #$Log = @{ 'Cache' = $Cache } #Write-LogMsg @Log -Text "Resolve-IdentityReferenceDomainDNS -IdentityReference '$($ACE.IdentityReference)' -ItemPath '$ItemPath' -Cache `$Cache" -Suffix " # For ACE IdentityReference '$($ACE.IdentityReference)' # For ItemPath '$ItemPath'" $DomainDNS = Resolve-IdentityReferenceDomainDNS -IdentityReference $ACE.IdentityReference -ItemPath $ItemPath -Cache $Cache #Write-LogMsg @Log -Text "`$AdsiServer = Get-AdsiServer -Fqdn '$DomainDNS' -Cache `$Cache" -Suffix " # For ACE IdentityReference '$($ACE.IdentityReference)' # For ItemPath '$ItemPath'" $AdsiServer = Get-AdsiServer -Fqdn $DomainDNS -Cache $Cache #Write-LogMsg @Log -Text "Resolve-IdentityReference -IdentityReference '$($ACE.IdentityReference)' -AdsiServer `$AdsiServer -AccountProperty @('$($AccountProperty -join "','")' -Cache `$Cache" -Suffix " # ADSI server '$($AdsiServer.AdsiProvider)://$($AdsiServer.Dns)' # For ACE IdentityReference '$($ACE.IdentityReference)' # For ItemPath '$ItemPath'" $ResolvedIdentityReference = Resolve-IdentityReference -IdentityReference $ACE.IdentityReference -AdsiServer $AdsiServer -AccountProperty $AccountProperty -Cache $Cache $ObjectProperties = @{ Access = "$($ACE.AccessControlType) $($ACE.FileSystemRights) $($Cache.Value['InheritanceFlagResolved'].Value[$ACE.InheritanceFlags])" AdsiProvider = $AdsiServer.AdsiProvider AdsiServer = $DomainDNS IdentityReferenceSID = $ResolvedIdentityReference.SIDString IdentityReferenceResolved = $ResolvedIdentityReference.IdentityReferenceNetBios Path = $ItemPath SourceOfAccess = $Source PSTypeName = 'Permission.AccessControlEntry' } ForEach ($ThisProperty in $ACEPropertyName) { $ObjectProperties[$ThisProperty] = $ACE.$ThisProperty } $OutputObject = [PSCustomObject]$ObjectProperties $Guid = [guid]::NewGuid() Add-PermissionCacheItem -Cache $Cache.Value['AceByGuid'] -Key $Guid -Value $OutputObject -Type ([object]) Add-PermissionCacheItem -Cache $Cache.Value['AceGuidById'] -Key $OutputObject.IdentityReferenceResolved -Value $Guid -Type $Type Add-PermissionCacheItem -Cache $Cache.Value['AceGuidByPath'] -Key $OutputObject.Path -Value $Guid -Type $Type } function Resolve-Acl { <# .SYNOPSIS Use ADSI to lookup info about IdentityReferences from Authorization Rule Collections that came from Discretionary Access Control Lists .DESCRIPTION Based on the IdentityReference proprety of each Access Control Entry: Resolve SID to NT account name and vise-versa Resolve well-known SIDs Resolve generic defaults like 'NT AUTHORITY' and 'BUILTIN' to the applicable computer or domain name Add these properties (IdentityReferenceSID,IdentityReferenceName,IdentityReferenceResolved) to the object and return it .INPUTS [System.Security.AccessControl.AuthorizationRuleCollection]$ItemPath .OUTPUTS [PSCustomObject] Original object plus IdentityReferenceSID,IdentityReferenceName,IdentityReferenceResolved, and AdsiProvider properties .EXAMPLE Get-Acl | Expand-Acl | Resolve-Ace Use Get-Acl from the Microsoft.PowerShell.Security module as the source of the access list This works in either Windows Powershell or in Powershell Get-Acl does not support long paths (>256 characters) That was why I originally used the .Net Framework method .EXAMPLE Get-FolderAce -LiteralPath C:\Test -IncludeInherited | Resolve-Ace .EXAMPLE [String]$FolderPath = 'C:\Test' [System.IO.DirectoryInfo]$DirectoryInfo = Get-Item -LiteralPath $FolderPath $Sections = [System.Security.AccessControl.AccessControlSections]::Access -bor [System.Security.AccessControl.AccessControlSections]::Owner $FileSecurity = [System.Security.AccessControl.FileSecurity]::new($DirectoryInfo,$Sections) $IncludeExplicitRules = $true $IncludeInheritedRules = $true $AccountType = [System.Security.Principal.SecurityIdentifier] $FileSecurity.GetAccessRules($IncludeExplicitRules,$IncludeInheritedRules,$AccountType) | Resolve-Ace This uses .Net Core as the source of the access list It uses the GetAccessRules method on the [System.Security.AccessControl.FileSecurity] class The targetType parameter of the method is used to specify that the accounts in the ACL are returned as SIDs .EXAMPLE [String]$FolderPath = 'C:\Test' [System.IO.DirectoryInfo]$DirectoryInfo = Get-Item -LiteralPath $FolderPath $Sections = [System.Security.AccessControl.AccessControlSections]::Access -bor [System.Security.AccessControl.AccessControlSections]::Owner -bor [System.Security.AccessControl.AccessControlSections]::Group $DirectorySecurity = [System.Security.AccessControl.DirectorySecurity]::new($DirectoryInfo,$Sections) $IncludeExplicitRules = $true $IncludeInheritedRules = $true $AccountType = [System.Security.Principal.NTAccount] $FileSecurity.GetAccessRules($IncludeExplicitRules,$IncludeInheritedRules,$AccountType) | Resolve-Ace This uses .Net Core as the source of the access list It uses the GetAccessRules method on the [System.Security.AccessControl.FileSecurity] class The targetType parameter of the method is used to specify that the accounts in the ACL are returned as NT account names (DOMAIN\User) .EXAMPLE [String]$FolderPath = 'C:\Test' [System.IO.DirectoryInfo]$DirectoryInfo = Get-Item -LiteralPath $FolderPath [System.Security.AccessControl.DirectorySecurity]$DirectorySecurity = $DirectoryInfo.GetAccessControl('Access') [System.Security.AccessControl.AuthorizationRuleCollection]$AuthRules = $DirectorySecurity.Access $AuthRules | Resolve-Ace Use the .Net Framework (or legacy .Net Core up to 2.2) as the source of the access list Only works in Windows PowerShell Those versions of .Net had a GetAccessControl method on the [System.IO.DirectoryInfo] class This method is removed in modern versions of .Net Core .EXAMPLE [String]$FolderPath = 'C:\Test' [System.IO.DirectoryInfo]$DirectoryInfo = Get-Item -LiteralPath $FolderPath $Sections = [System.Security.AccessControl.AccessControlSections]::Access -bor [System.Security.AccessControl.AccessControlSections]::Owner $FileSecurity = [System.IO.FileSystemAclExtensions]::GetAccessControl($DirectoryInfo,$Sections) The [System.IO.FileSystemAclExtensions] class is a Windows-specific implementation It provides no known benefit over the cross-platform equivalent [System.Security.AccessControl.FileSecurity] .NOTES Dependencies: Get-DirectoryEntry Add-SidInfo Get-TrustedDomain Find-AdsiProvider if ($FolderPath.Length -gt 255) { $FolderPath = "\\?\$FolderPath" } #> [OutputType([PSCustomObject])] param ( # Authorization Rule Collection of Access Control Entries from Discretionary Access Control Lists [object]$ItemPath, [string[]]$ACEPropertyName = $ItemPath.PSObject.Properties.GetEnumerator().Name, # In-process cache to reduce calls to other processes or disk, and store repetitive parameters for better readability of code and logs [Parameter(Mandatory)] [ref]$Cache, # Properties of each Account to display on the report [string[]]$AccountProperty = @('DisplayName', 'Company', 'Department', 'Title', 'Description') ) #$Log = @{ 'Cache' = $Cache } $AceParams = @{ AccountProperty = $AccountProperty ; Cache = $Cache ; Type = [guid] ; ItemPath = $ItemPath ; ACEPropertyName = $ACEPropertyName } $ACL = $Cache.Value['AclByPath'].Value[$ItemPath] if ($ACL.Owner.IdentityReference) { #Write-LogMsg @Log -Text "Resolve-Ace -ACE `$ACL.Owner -ACEPropertyName @('$($ACEPropertyName -join "','")') @AceParams # For Owner IdentityReference '$($ACL.Owner.IdentityReference)' # For ItemPath '$ItemPath'" Resolve-Ace -ACE $ACL.Owner -Source 'Ownership' @AceParams } ForEach ($ACE in $ACL.Access) { #Write-LogMsg @Log -Text "Resolve-Ace -ACE `$ACE -ACEPropertyName @('$($ACEPropertyName -join "','")') @AceParams # For ACE IdentityReference '$($ACE.IdentityReference)' # For ItemPath '$ItemPath'" Resolve-Ace -ACE $ACE -Source 'Discretionary ACL' @AceParams } } function Resolve-Folder { # Resolve the provided FolderPath to all of its associated UNC paths, including all DFS folder targets param ( # Path of the folder(s) to resolve to all their associated UNC paths [String]$TargetPath, # In-process cache to reduce calls to other processes or disk, and store repetitive parameters for better readability of code and logs [Parameter(Mandatory)] [ref]$Cache ) $RegEx = '^(?<DriveLetter>\w):' $ComputerName = $Cache.Value['ThisHostname'].Value if ($TargetPath -match $RegEx) { $CimParams = @{ Cache = $Cache ClassName = 'Win32_MappedLogicalDisk' KeyProperty = 'DeviceID' } Write-LogMsg -Text "Get-CachedCimInstance -ComputerName '$ComputerName'" -Expand $CimParams -Cache $Cache -ExpansionMap $Cache.Value['LogCacheMap'].Value $MappedNetworkDrives = Get-CachedCimInstance -ComputerName $ComputerName @CimParams $MatchingNetworkDrive = $MappedNetworkDrives | Where-Object -FilterScript { $_.DeviceID -eq "$($Matches.DriveLetter):" } if ($MatchingNetworkDrive) { # Resolve mapped network drives to their UNC path $UNC = $MatchingNetworkDrive.ProviderName } else { # Resolve local drive letters to their UNC paths using administrative shares $UNC = $TargetPath -replace $RegEx, "\\$(hostname)\$($Matches.DriveLetter)$" } if ($UNC) { # Replace hostname with FQDN in the path $Server = $UNC.split('\')[2] Write-LogMsg -Text "ConvertTo-PermissionFqdn -ComputerName '$Server' -Cache `$Cache" -Cache $Cache $FQDN = ConvertTo-PermissionFqdn -ComputerName $Server -Cache $Cache $UNC -replace "^\\\\$Server\\", "\\$FQDN\" } } else { ## Workaround in place: Get-NetDfsEnum -Verbose parameter is not used due to errors when it is used with the PsRunspace module for multithreading ## https://github.com/IMJLA/Export-Permission/issues/46 ## https://github.com/IMJLA/PsNtfs/issues/1 Write-LogMsg -Text "Get-NetDfsEnum -FolderPath '$TargetPath'" -Cache $Cache $AllDfs = Get-NetDfsEnum -FolderPath $TargetPath -ErrorAction SilentlyContinue if ($AllDfs) { $MatchingDfsEntryPaths = $AllDfs | Group-Object -Property DfsEntryPath | Where-Object -FilterScript { $TargetPath -match [regex]::Escape($_.Name) } # Filter out the DFS Namespace # TODO: I know this is an inefficient n2 algorithm, but my brain is fried...plez...halp...leeloo dallas multipass $RemainingDfsEntryPaths = $MatchingDfsEntryPaths | Where-Object -FilterScript { -not [bool]$( ForEach ($ThisEntryPath in $MatchingDfsEntryPaths) { if ($ThisEntryPath.Name -match "$([regex]::Escape("$($_.Name)")).+") { $true } } ) } | Sort-Object -Property Name $RemainingDfsEntryPaths | Select-Object -Last 1 -ExpandProperty Group | ForEach-Object { $_.FullOriginalQueryPath -replace [regex]::Escape($_.DfsEntryPath), $_.DfsTarget } } else { $Server = $TargetPath.split('\')[2] $FQDN = ConvertTo-PermissionFqdn -ComputerName $Server -Cache $Cache $TargetPath -replace "^\\\\$Server\\", "\\$FQDN\" } } } function Resolve-FormatParameter { param ( # File formats to export [ValidateSet('csv', 'html', 'js', 'json', 'prtgxml', 'xml')] [string[]]$FileFormat = @('csv', 'html', 'js', 'json', 'prtgxml', 'xml'), # Type of output returned to the output stream [ValidateSet('passthru', 'none', 'csv', 'html', 'js', 'json', 'prtgxml', 'xml')] [String]$OutputFormat = 'passthru' ) $AllFormats = @{} ForEach ($Format in $FileFormat) { $AllFormats[$Format] = $null } if ($OutputFormat -ne 'passthru' -and $OutputFormat -ne 'none') { $AllFormats[$OutputFormat] = $null } # Sort the results in descending order to ensure json comes before js. # This is because the js report uses the json formatted data # So, in Format-Permission, the objects in the output hashtable are formatted with json properties rather than js properties even for the js report format # However, ConvertTo-PermissionGroup/List are exclusive to js but not json reports so they output nothing for json # Having json run first means that the "nothing" results will then be overwritten by the valid json results $Sorted = [string[]]$AllFormats.Keys | Sort-Object -Descending return $Sorted } function Resolve-GroupByParameter { param ( # How to group the permissions in the output stream and within each exported file [ValidateSet('account', 'item', 'none', 'target')] [String]$GroupBy = 'item', [Hashtable]$HowToSplit ) if ( $GroupBy -eq 'none' -or $HowToSplit[$GroupBy] ) { return @{ Property = 'Access' Script = [scriptblock]::create("Select-PermissionTableProperty -InputObject `$args[0] -ShortNameById `$args[2] -IncludeFilterContents `$args[3] -ExcludeClassFilterContents `$args[4]") } } else { return @{ Property = "$GroupBy`s" Script = [scriptblock]::create("Select-$GroupBy`TableProperty -InputObject `$args[0] -Culture `$args[1] -ShortNameById `$args[2]") } } } function Resolve-IdentityReferenceDomainDNS { param ( # An NTAccount caption string, or similarly-formatted SID from an item's ACL. [String]$IdentityReference, # Network path of the item whose ACL the IdentityReference parameter value is from. [object]$ItemPath, # In-process cache to reduce calls to other processes or disk, and store repetitive parameters for better readability of code and logs [Parameter(Mandatory)] [ref]$Cache ) $Log = @{ 'Cache' = $Cache } if ($Cache.Value['WellKnownSidBySid'].Value[$IdentityReference]) { # IdentityReference is a well-known SID of a local account. # For local accounts, the domain is the computer hosting the network resource. # This can be extracted from the network path of the item whose ACL IdentityReference is from. $DomainDNS = Find-ServerNameInPath -LiteralPath $ItemPath -Cache $Cache return $DomainDNS } if ($IdentityReference.Substring(0, 4) -eq 'S-1-') { # IdentityReference should be a SID (Revision 1). $IndexOfLastHyphen = $IdentityReference.LastIndexOf('-') $DomainSid = $IdentityReference.Substring(0, $IndexOfLastHyphen) if ($DomainSid) { # IdentityReference appears to be a properly-formatted SID. Its domain SID was able to be parsed. $DomainCacheResult = $Cache.Value['DomainBySid'].Value[$DomainSid] if ($DomainCacheResult) { # IdentityReference belongs to a known domain. #Write-LogMsg @Log -Text " # IdentityReference '$IdentityReference' # Domain SID '$DomainSid' # Domain SID cache hit" return $DomainCacheResult.Dns } #Write-LogMsg @Log -Text " # IdentityReference '$IdentityReference' # Domain SID '$DomainSid' # Domain SID cache miss" $KnownSid = Get-KnownSid -SID $IdentityReference if ($KnownSid) { #Write-LogMsg @Log -Text " # IdentityReference '$IdentityReference' # Domain SID '$DomainSid' # Known SID pattern match" $DomainDNS = Find-ServerNameInPath -LiteralPath $ItemPath -Cache $Cache return $DomainDNS } # IdentityReference belongs to an unknown domain. $StartingLogType = $Cache.Value['LogType'].Value $Cache.Value['LogType'].Value = 'Warning' Write-LogMsg @Log -Text " # IdentityReference '$IdentityReference' # Domain SID '$DomainSid' # Unknown domain (possibly offline). Unable to resolve domain FQDN" $Cache.Value['LogType'].Value = $StartingLogType return $DomainSid } # IdentityReference is not a properly-formatted SID. $StartingLogType = $Cache.Value['LogType'].Value $Cache.Value['LogType'].Value = 'Error' Write-LogMsg @Log -Text " # IdentityReference '$IdentityReference' # Bug before Resolve-IdentityReferenceDomainDNS. Unable to resolve a DNS FQDN due to malformed SID" $Cache.Value['LogType'].Value = $StartingLogType return $IdentityReference } # IdentityReference should be an NTAccount caption $DomainNetBIOS = ($IdentityReference.Split('\'))[0] if ($DomainNetBIOS) { # IdentityReference appears to be a properly-formatted NTAccount caption. Its domain was able to be parsed. $KnownLocalDomains = @{ 'NT SERVICE' = $true 'BUILTIN' = $true 'NT AUTHORITY' = $true } $DomainCacheResult = $KnownLocalDomains[$DomainNetBIOS] if ($DomainCacheResult) { # IdentityReference belongs to a well-known local domain. # For local accounts, the domain is the computer hosting the network resource. # This can be extracted from the network path of the item whose ACL IdentityReference is from. $DomainDNS = Find-ServerNameInPath -LiteralPath $ItemPath -Cache $Cache return $DomainDNS } $DomainCacheResult = $Cache.Value['DomainByNetbios'].Value[$DomainNetBIOS] if ($CDomainCacheResult) { # IdentityReference belongs to a known domain. return $DomainCacheResult.Dns } # IdentityReference belongs to an unnown domain. # Attempt live translation to the domain's DistinguishedName then convert that to FQDN. $ThisServerDn = ConvertTo-DistinguishedName -Domain $DomainNetBIOS -Cache $Cache $DomainDNS = ConvertTo-Fqdn -DistinguishedName $ThisServerDn -Cache $Cache return $DomainDNS } $StartingLogType = $Cache.Value['LogType'].Value $Cache.Value['LogType'].Value = 'Error' Write-LogMsg @Log -Text " # IdentityReference '$IdentityReference' # Bug before Resolve-IdentityReferenceDomainDNS. Unexpectedly unable to resolve a DNS FQDN due to malformed NTAccount caption" $Cache.Value['LogType'].Value = $StartingLogType return $IdentityReference } function Resolve-SplitByParameter { param ( <# How to split up the exported files: none generate a single file with all permissions target generate a file per target item generate a file per item account generate a file per account all generate 1 file per target and 1 file per item and 1 file per account and 1 file with all permissions. #> [ValidateSet('none', 'all', 'target', 'item', 'account')] [string[]]$SplitBy = 'all' ) $result = @{} foreach ($Split in $SplitBy) { if ($Split -eq 'none') { return @{'none' = $true } } elseif ($Split -eq 'all') { return @{ 'target' = $true 'none' = $true 'item' = $true 'account' = $true } } else { $result[$Split] = $true } } return $result } function Select-AccountTableProperty { # This may appear unused but that is because the name of the function to call is generated dynamically e.g. Select-___TableProperty # For the HTML table param ( $InputObject, [cultureinfo]$Culture = (Get-Culture), #Unused but exists here for parameter consistency with Select-AccountTableProperty [Hashtable]$ShortNameByID = [Hashtable]::Synchronized(@{}), # Properties of each Account to display on the report (left out: managedby) [string[]]$AccountProperty = @('DisplayName', 'Company', 'Department', 'Title', 'Description') ) ForEach ($Object in $InputObject) { $AccountName = $ShortNameByID[$Object.Account.ResolvedAccountName] if ($AccountName) { $Props = [ordered]@{ Account = $AccountName Name = $Object.Account.Name DisplayName = $Object.Account.DisplayName Description = $Object.Account.Description } ForEach ($PropName in $AccountProperty) { $Props[$PropName] = $Object.Account.$PropName } [PSCustomObject]$Props } } } function Select-ItemTableProperty { # This may appear unused but that is because the name of the function to call is generated dynamically e.g. Select-___TableProperty # For the HTML table param ( $InputObject, [cultureinfo]$Culture = (Get-Culture), [Hashtable]$ShortNameByID = [Hashtable]::Synchronized(@{}), #Unused but exists here for parameter consistency with Select-AccountTableProperty and Select-PermissionTableProperty [switch]$SkipFilterCheck ) ForEach ($Object in $InputObject) { if (-not $SkipFilterCheck) { if ($null -ne $Object.Account) { $ResolvedAccountName = $Object.Account.ResolvedAccountName $Item = $Object.Access.Item } else { # seems to vary based on splitby target vs account but I don't know why $ResolvedAccountName = $Object.Access.Account.ResolvedAccountName $Item = $Object.Item } $AccountNames = $ShortNameByID[$ResolvedAccountName] if (-not $AccountNames) { continue } $GroupString = $ShortNameByID[$Object.Access.Access.IdentityReferenceResolved] if (-not $GroupString) { continue } } [PSCustomObject]@{ Folder = $Item.Path Inheritance = $Culture.TextInfo.ToTitleCase(-not $Item.AreAccessRulesProtected) } } } function Select-PermissionTableProperty { # For the HTML table param ( $InputObject, [String]$GroupBy, # Dictionary of shortened account IDs keyed by full resolved account IDs # Populated by Select-PermissionPrincipal [ref]$ShortNameByID = @{}, [hashtable]$OutputHash = @{}, [ref]$ExcludeClassFilterContents = @{}, [ref]$IncludeAccountFilterContents = @{}, # Properties of each Account to display on the report (left out: managedby) [string[]]$AccountProperty = @('DisplayName', 'Company', 'Department', 'Title', 'Description') ) $Type = [PSCustomObject] $IncludeFilterCount = $IncludeAccountFilterContents.Value.Keys.Count switch ($GroupBy) { 'account' { ForEach ($Object in $InputObject) { # Determine whether the account should be included according to inclusion/exclusion parameters $AccountName = $ShortNameByID.Value[$Object.Account.ResolvedAccountName] if ($AccountName) { ForEach ($AceList in $Object.Access) { ForEach ($ACE in $AceList.Access) { if ($ACE.IdentityReferenceResolved -eq $Object.Account.ResolvedAccountName) { # In this case the ACE's account is directly referenced in the DACL; it is merely a member of a group from the DACL $GroupString = '' } else { # In this case the ACE contains the original IdentityReference representing the group the virtual ACE's account is a member of $GroupString = $ShortNameByID.Value[$ACE.IdentityReferenceResolved] if ( -not $GroupString ) { if ( $ExcludeClassFilterContents.Value[$ACE.IdentityReferenceResolved] -or ( $IncludeFilterCount -gt 0 -and -not $IncludeAccountFilterContents.Value[$Object.Account.ResolvedAccountName] ) ) { $GroupString = $ACE.IdentityReferenceResolved #TODO - Apply IgnoreDomain here. Put that .Replace logic into a function. } } } # Use '$null -ne' to avoid treating an empty string '' as $null if ($null -ne $GroupString) { $Value = [pscustomobject]@{ 'Path' = $ACE.Path 'Access' = $ACE.Access 'Due to Membership In' = $GroupString 'Source of Access' = $ACE.SourceOfAccess } Add-CacheItem -Cache $OutputHash -Key $AccountName -Value $Value -Type $Type } } } } } break } 'item' { ForEach ($Object in $InputObject) { $Accounts = @{} $Account = $null if ($null -ne $Object.Account) { $Account = $Object.Account $Item = $Object.Access.Item } else { $Item = $Object.Item } # Apply the -IgnoreDomain parameter ForEach ($AceList in $Object.Access) { if ($null -eq $Account) { $Account = $AceList.Account } $AccountName = $ShortNameByID.Value[$Account.ResolvedAccountName] if ($AccountName) { ForEach ($ACE in $AceList.Access) { Add-CacheItem -Cache $Accounts -Key $AccountName -Value $ACE -Type $Type } } } $OutputHash[$Item.Path] = ForEach ($AccountName in $Accounts.Keys) { ForEach ($AceList in $Accounts[$AccountName]) { ForEach ($ACE in $AceList) { if ($ACE.IdentityReferenceResolved -eq $AccountName) { # In this case the ACE's account is directly referenced in the DACL $GroupString = '' } else { # In this case the account is merely a member of a group from the DACL # Exclude the ACEs whose account names match the regular expressions specified in the -ExcludeAccount parameter # Include the ACEs whose account names match the regular expressions specified in the -IncludeAccount parameter # Exclude the ACEs whose account classes were included in the -ExcludeClass parameter # Each ACE contains the original IdentityReference representing the group the Object is a member of $GroupString = $ShortNameByID.Value[$ACE.IdentityReferenceResolved] if ( -not $GroupString ) { if ( $ExcludeClassFilterContents.Value[$ACE.IdentityReferenceResolved] -or ( $IncludeFilterCount -gt 0 -and -not $IncludeAccountFilterContents.Value[$AccountName] ) ) { $GroupString = $ACE.IdentityReferenceResolved #TODO - Apply IgnoreDomain here. Put that .Replace logic into a function. } } } # Exclude the virtual ACEs for members of groups whose group names match the regular expressions specified in the -ExcludeAccount parameter # Include the virtual ACEs for members of groups whose group names match the regular expressions specified in the -IncludeAccount parameter # Exclude the virtual ACEs for members of groups whose group classes were included in the -ExcludeClass parameter # Use '$null -ne' to avoid treating an empty string '' as $null if ($null -ne $GroupString) { # this indicates SplitBy Account GroupBy Item if ($null -ne $Object.Account) { $Props = [ordered]@{ 'Item' = $ACE.Path 'Access' = $ACE.Access #($ACE.Access.Access | Sort-Object -Unique) -join ' ; ' 'Due to Membership In' = $GroupString 'Source of Access' = $ACE.SourceOfAccess #($ACE.Access.SourceOfAccess | Sort-Object -Unique) -join ' ; ' } [PSCustomObject]$Props } else { $Props = [ordered]@{ 'Account' = $AccountName 'Access' = $ACE.Access #($ACE.Access.Access | Sort-Object -Unique) -join ' ; ' 'Due to Membership In' = $GroupString 'Source of Access' = $ACE.SourceOfAccess #($ACE.Access.SourceOfAccess | Sort-Object -Unique) -join ' ; ' 'Name' = $AceList.Account.Name } ForEach ($PropName in $AccountProperty) { $Props[$PropName] = $AceList.Account.$PropName } [PSCustomObject]$Props } } } } } } break } # 'none' and 'target' behave the same default { $i = 0 ForEach ($Object in $InputObject) { $OutputHash[$i] = ForEach ($ACE in $Object) { $AccountName = $ShortNameByID.Value[$ACE.ResolvedAccountName] # Exclude the ACEs whose account names match the regular expressions specified in the -ExcludeAccount parameter # Include the ACEs whose account names match the regular expressions specified in the -IncludeAccount parameter # Exclude the ACEs whose account classes were included in the -ExcludeClass parameter if ($AccountName) { if ($ACE.IdentityReferenceResolved -eq $ACE.ResolvedAccountName) { $GroupString = '' } else { # Each ACE contains the original IdentityReference representing the group the Object is a member of $GroupString = $ShortNameByID.Value[$ACE.IdentityReferenceResolved] if ( -not $GroupString ) { if ( $ExcludeClassFilterContents.Value[$ACE.IdentityReferenceResolved] -or ( $IncludeFilterCount -gt 0 -and -not $IncludeAccountFilterContents.Value[$ACE.ResolvedAccountName] ) ) { $GroupString = $ACE.IdentityReferenceResolved #TODO - Apply IgnoreDomain here. Put that .Replace logic into a function. } } } # Exclude the virtual ACEs for members of groups whose group names match the regular expressions specified in the -ExcludeAccount parameter # Include the virtual ACEs for members of groups whose group names match the regular expressions specified in the -IncludeAccount parameter # Exclude the virtual ACEs for members of groups whose group classes were included in the -ExcludeClass parameter # Use '$null -ne' to avoid treating an empty string '' as $null if ($null -ne $GroupString) { $Props = [ordered]@{ 'Item' = $Object.ItemPath 'Account' = $AccountName 'Access' = $ACE.Access 'Due to Membership In' = $GroupString 'Source of Access' = $ACE.SourceOfAccess 'Name' = $ACE.Name } ForEach ($PropName in $AccountProperty) { $Props[$PropName] = $ACE.$PropName } [PSCustomObject]$Props } } } $i = $i + 1 } break } } return $OutputHash } function Add-CachedCimInstance { param ( # CIM Instance(s) to add to the cache [Parameter(ValueFromPipeline)] $InputObject, # Name of the computer to query via CIM [String]$ComputerName, # Name of the CIM class whose instances to return [String]$ClassName, # CIM query to run. Overrides ClassName if used (but not efficiently, so don't use both) [String]$Query, # Cache of CIM sessions and instances to reduce connections and queries [Hashtable]$CimCache = ([Hashtable]::Synchronized(@{})), # Output stream to send the log messages to [ValidateSet('Silent', 'Quiet', 'Success', 'Debug', 'Verbose', 'Output', 'Host', 'Warning', 'Error', 'Information', $null)] [String]$DebugOutputStream = 'Debug', <# Hostname of the computer running this function. Can be provided as a string to avoid calls to HOSTNAME.EXE #> [String]$ThisHostName = (HOSTNAME.EXE), # Username to record in log messages (can be passed to Write-LogMsg as a parameter to avoid calling an external process) [String]$WhoAmI = (whoami.EXE), # Log messages which have not yet been written to disk [Parameter(Mandatory)] [ref]$LogBuffer, # Properties by which to key the cache [string[]]$CacheByProperty ) begin { $Log = @{ Buffer = $LogBuffer ThisHostname = $ThisHostname Type = $DebugOutputStream WhoAmI = $WhoAmI } $ComputerCache = $CimCache[$ComputerName] if (-not $ComputerCache) { #Write-LogMsg @Log -Text " # CIM server cache miss for '$ComputerName'" $ComputerCache = [Hashtable]::Synchronized(@{}) } } process { ForEach ($Prop in $CacheByProperty) { if ($PSBoundParameters.ContainsKey('ClassName')) { $InstanceCacheKey = "$ClassName`By$Prop" } else { if ($PSBoundParameters.ContainsKey('Query')) { $InstanceCacheKey = "$Query`By$Prop" } else { $ClassName = @($InputObject)[0].CimClass.CimClassName $InstanceCacheKey = "$ClassName`By$Prop" } } #Write-LogMsg @Log -Text " # CIM server cache hit for '$ComputerName'" $InstanceCache = $ComputerCache[$InstanceCacheKey] if (-not $InstanceCache) { #Write-LogMsg @Log -Text " # CIM instance cache miss for '$InstanceCacheKey' on '$ComputerName'" $InstanceCache = [Hashtable]::Synchronized(@{}) } ForEach ($Instance in $InputObject) { $InstancePropertyValue = $Instance.$Prop Write-LogMsg @Log -Text " # Add '$InstancePropertyValue' to the '$InstanceCacheKey' cache for '$ComputerName'" $InstanceCache[$InstancePropertyValue] = $Instance } $ComputerCache[$InstanceCacheKey] = $InstanceCache } } end { $CimCache[$ComputerName] = $ComputerCache } } function Add-CacheItem { # Use a key to get a generic list from a hashtable # If it does not exist, create an empty list # Add the new item param ( [Parameter(Mandatory)] [Hashtable]$Cache, [Parameter(Mandatory)] $Key, $Value, [type]$Type = [System.Object] ) if ($key.Count -gt 1) { Pause } # Older, less efficient method $CacheResult = $Cache[$Key] if ($CacheResult) { $List = $CacheResult } else { $Command = "`$List = [System.Collections.Generic.List[$($Type.ToString())]]::new()" Invoke-Expression $Command } $List.Add($Value) $Cache[$Key] = $List } function Add-PermissionCacheItem { # Use a key to get a generic list from a hashtable # If it does not exist, create an empty list # Add the new item param ( # Must be a Dictionary or ConcurrentDictionary [Parameter(Mandatory)] [ref]$Cache, [Parameter(Mandatory)] $Key, $Value, [type]$Type = [System.Object] ) $List = $Cache.Value[$Key] if ( -not $List ) { $genericTypeDefinition = [System.Collections.Generic.List`1] $genericType = $genericTypeDefinition.MakeGenericType($Type) $List = [Activator]::CreateInstance($genericType) $Cache.Value[$Key] = $List } $List.Add($Value) } function ConvertTo-ItemBlock { # TODO - Investigate. Possibly unused. param ( $ItemPermissions, # In-process cache to reduce calls to other processes or disk, and store repetitive parameters for better readability of code and logs [Parameter(Mandatory)] [ref]$Cache, $Culture = $Cache.Value['Culture'] ) Write-LogMsg -Cache $Cache -Text "`$ObjectsForTable = Select-ItemTableProperty -InputObject `$ItemPermissions -Culture '$Culture'" $ObjectsForTable = Select-ItemTableProperty -InputObject $ItemPermissions -Culture $Culture Write-LogMsg -Cache $Cache -Text "`$ObjectsForTable | ConvertTo-Html -Fragment | New-BootstrapTable" $HtmlTable = $ObjectsForTable | ConvertTo-Html -Fragment | New-BootstrapTable $JsonData = $ObjectsForTable | ConvertTo-Json -Compress Write-LogMsg -Cache $Cache -Text "Get-ColumnJson -InputObject `$ObjectsForTable" $JsonColumns = Get-ColumnJson -InputObject $ObjectsForTable Write-LogMsg -Cache $Cache -Text "ConvertTo-BootstrapJavaScriptTable -Id 'Folders' -InputObject `$ObjectsForTable -DataFilterControl -SearchableColumn 'Folder' -DropdownColumn 'Inheritance'" $JsonTable = ConvertTo-BootstrapJavaScriptTable -Id 'Folders' -InputObject $ObjectsForTable -DataFilterControl -SearchableColumn 'Folder' -DropdownColumn 'Inheritance' return [pscustomobject]@{ HtmlDiv = $HtmlTable JsonDiv = $JsonTable JsonData = $JsonData JsonColumns = $JsonColumns } } function ConvertTo-PermissionFqdn { param ( # DNS or NetBIOS hostname whose DNS FQDN to lookup [Parameter(Mandatory)] [string]$ComputerName, # Update the ThisFqdn cache instead of returning the Fqdn [switch]$ThisFqdn, # In-process cache to reduce calls to other processes or disk, and store repetitive parameters for better readability of code and logs [Parameter(Mandatory)] [ref]$Cache ) Write-LogMsg -Text "ConvertTo-DnsFqdn -ComputerName '$ComputerName' -Cache `$Cache -ThisFqdn:`$$ThisFqdn" -Cache $Cache ConvertTo-DnsFqdn -ComputerName $ComputerName -Cache $Cache -ThisFqdn:$ThisFqdn } function Expand-Permission { # TODO: If SplitBy account or item, each file needs to include inherited permissions (with default $SplitBy = 'none', the parent folder's inherited permissions are already included) param ( <# How to split up the exported files: none generate 1 report file with all permissions target generate 1 report file per target (default) item generate 1 report file per item account generate 1 report file per account all generate 1 report file per target and 1 file per item and 1 file per account and 1 file with all permissions. #> [ValidateSet('account', 'item', 'none', 'target')] [string[]]$SplitBy = 'target', <# How to group the permissions in the output stream and within each exported file SplitBy GroupBy none none $FlatPermissions all in 1 file none account $AccountPermissions all in 1 file none item $ItemPermissions all in 1 file account none 1 file per item in $AccountPermissions. In each file, $_.Access | sort path account account (same as -SplitBy account -GroupBy none) account item 1 file per item in $AccountPermissions. In each file, $_.Access | group item | sort name item none 1 file per item in $ItemPermissions. In each file, $_.Access | sort account item account 1 file per item in $ItemPermissions. In each file, $_.Access | group account | sort name item item (same as -SplitBy item -GroupBy none) target none 1 file per $TargetPath. In each file, sort ACEs by item path then account name target account 1 file per $TargetPath. In each file, group ACEs by account and sort by account name target item 1 file per $TargetPath. In each file, group ACEs by item and sort by item path target target (same as -SplitBy target -GroupBy none) #> [ValidateSet('account', 'item', 'none', 'target')] [string]$GroupBy = 'item', [Hashtable]$Children, # In-process cache to reduce calls to other processes or disk, and store repetitive parameters for better readability of code and logs [Parameter(Mandatory)] [ref]$Cache ) $Log = @{ 'Cache' = $Cache } $Progress = Get-PermissionProgress -Activity 'Expand-Permission' -Cache $Cache Write-Progress @Progress -Status '0% : Prepare to group permission references, then expand them into objects' -CurrentOperation 'Resolve-SplitByParameter' -PercentComplete 0 Write-LogMsg @Log -Text "Resolve-SplitByParameter -SplitBy $SplitBy" $HowToSplit = Resolve-SplitByParameter -SplitBy $SplitBy Write-LogMsg @Log -Text "`$SortedPaths = `$AceGuidByPath.Keys | Sort-Object" $AceGuidByPath = $Cache.Value['AceGuidByPath'] $SortedPaths = $AceGuidByPath.Value.Keys | Sort-Object $AceGuidByID = $Cache.Value['AceGuidByID'] $ACEsByGUID = $Cache.Value['AceByGUID'] $PrincipalsByResolvedID = $Cache.Value['PrincipalByID'] $ACLsByPath = $Cache.Value['AclByPath'] $TargetPath = $Cache.Value['ParentByTargetPath'] $CommonParams = @{ ACEsByGUID = $ACEsByGUID PrincipalsByResolvedID = $PrincipalsByResolvedID } if ( $HowToSplit['account'] ) { Write-Progress @Progress -Status '13% : Group permission references by account' -CurrentOperation 'Resolve-SplitByParameter' -PercentComplete 17 # Group reference GUIDs by the name of their associated account. Write-LogMsg @Log -Text '$AccountPermissionReferences = Group-AccountPermissionReference -ID $PrincipalsByResolvedID.Keys -AceGuidByID $AceGuidByID -AceByGuid $ACEsByGUID' $AccountPermissionReferences = Group-AccountPermissionReference -ID $PrincipalsByResolvedID.Value.Keys -AceGuidByID $AceGuidByID -AceByGuid $ACEsByGUID Write-Progress @Progress -Status '25% : Expand account permissions into objects' -CurrentOperation 'Resolve-SplitByParameter' -PercentComplete 33 # Expand reference GUIDs into their associated Access Control Entries and Security Principals. Write-LogMsg @Log -Text '$AccountPermissions = Expand-AccountPermissionReference -Reference $AccountPermissionReferences -ACLsByPath $ACLsByPath @CommonParams' $AccountPermissions = Expand-AccountPermissionReference -Reference $AccountPermissionReferences -ACLsByPath $ACLsByPath @CommonParams } if ( $HowToSplit['item'] ) { # Group reference GUIDs by the path to their associated item. Write-Progress @Progress -Status '38% : Group permission references by item' -CurrentOperation 'Group-ItemPermissionReference' -PercentComplete 50 Write-LogMsg @Log -Text '$ItemPermissionReferences = Group-ItemPermissionReference @CommonParams -SortedPath $SortedPaths -AceGUIDsByPath $AceGuidByPath -ACLsByPath $ACLsByPath' $ItemPermissionReferences = Group-ItemPermissionReference -SortedPath $SortedPaths -AceGUIDsByPath $AceGuidByPath -ACLsByPath $ACLsByPath @CommonParams # Expand reference GUIDs into their associated Access Control Entries and Security Principals. Write-Progress @Progress -Status '50% : Expand item permissions into objects' -CurrentOperation 'Expand-ItemPermissionReference' -PercentComplete 67 Write-LogMsg @Log -Text '$ItemPermissions = Expand-ItemPermissionReference -Reference $ItemPermissionReferences -ACLsByPath $ACLsByPath @CommonParams' $ItemPermissions = Expand-ItemPermissionReference -Reference $ItemPermissionReferences -ACLsByPath $ACLsByPath @CommonParams } if ( $HowToSplit['none'] ) { # Expand each Access Control Entry with the Security Principal for the resolved IdentityReference. Write-Progress @Progress -Status '63% : Expand flat permissions into objects' -CurrentOperation 'Expand-FlatPermissionReference' -PercentComplete 83 Write-LogMsg @Log -Text '$FlatPermissions = Expand-FlatPermissionReference -SortedPath $SortedPaths -AceGUIDsByPath $AceGuidByPath @CommonParams' $FlatPermissions = Expand-FlatPermissionReference -SortedPath $SortedPaths -AceGUIDsByPath $AceGuidByPath @CommonParams } if ( $HowToSplit['target'] ) { # Group reference GUIDs by their associated TargetPath. Write-Progress @Progress -Status '75% : Group permission references by target' -CurrentOperation 'Group-TargetPermissionReference' -PercentComplete 17 Write-LogMsg @Log -Text '$TargetPermissionReferences = Group-TargetPermissionReference -TargetPath $TargetPath -Children $Children -AceGUIDsByPath $AceGuidByPath -ACLsByPath $ACLsByPath -GroupBy $GroupBy -AceGuidByID $AceGuidByID @CommonParams' $TargetPermissionReferences = Group-TargetPermissionReference -TargetPath $TargetPath -Children $Children -AceGUIDsByPath $AceGuidByPath -ACLsByPath $ACLsByPath -GroupBy $GroupBy -AceGuidByID $AceGuidByID @CommonParams # Expand reference GUIDs into their associated Access Control Entries and Security Principals. Write-Progress @Progress -Status '88% : Expand item permissions into objects' -CurrentOperation 'Expand-TargetPermissionReference' -PercentComplete 67 Write-LogMsg @Log -Text '$TargetPermissions = Expand-TargetPermissionReference -Reference $TargetPermissionReferences -GroupBy $GroupBy -ACLsByPath $ACLsByPath @CommonParams' $TargetPermissions = Expand-TargetPermissionReference -Reference $TargetPermissionReferences -GroupBy $GroupBy -ACLsByPath $ACLsByPath -AceGuidByPath $AceGuidByPath @CommonParams } Write-Progress @Progress -Completed return [PSCustomObject]@{ AccountPermissions = $AccountPermissions FlatPermissions = $FlatPermissions ItemPermissions = $ItemPermissions TargetPermissions = $TargetPermissions SplitBy = $HowToSplit } } function Expand-PermissionTarget { # Expand a folder path into the paths of its subfolders param ( <# How many levels of subfolder to enumerate Set to 0 to ignore all subfolders Set to -1 (default) to recurse infinitely Set to any whole number to enumerate that many levels #> [int]$RecurseDepth, # In-process cache to reduce calls to other processes or disk, and store repetitive parameters for better readability of code and logs [Parameter(Mandatory)] [ref]$Cache ) $Progress = Get-PermissionProgress -Activity 'Expand-PermissionTarget' -Cache $Cache $Targets = ForEach ($Target in $Cache.Value['ParentByTargetPath'].Value.Values ) { $Target } $TargetCount = $Targets.Count Write-Progress @Progress -Status "0% (item 0 of $TargetCount)" -CurrentOperation 'Initializing...' -PercentComplete 0 $LogBuffer = $Cache.Value['LogBuffer'] $ThreadCount = $Cache.Value['ThreadCount'].Value $Output = [Hashtable]::Synchronized(@{}) $GetSubfolderParams = @{ Cache = $Cache Output = $Output RecurseDepth = $RecurseDepth ErrorAction = 'Continue' } if ($ThreadCount -eq 1 -or $TargetCount -eq 1) { [int]$ProgressInterval = [math]::max(($TargetCount / 100), 1) $IntervalCounter = 0 $i = 0 ForEach ($ThisFolder in $Targets) { $IntervalCounter++ if ($IntervalCounter -eq $ProgressInterval) { [int]$PercentComplete = $i / $TargetCount * 100 Write-Progress @Progress -Status "$PercentComplete% (item $($i + 1) of $TargetCount))" -CurrentOperation "Get-Subfolder '$($ThisFolder)'" -PercentComplete $PercentComplete $IntervalCounter = 0 } $i++ # increment $i after the progress to show progress conservatively rather than optimistically Write-LogMsg -Text "Get-Subfolder -TargetPath '$ThisFolder' -RecurseDepth $RecurseDepth" -Cache $Cache Get-Subfolder -TargetPath $ThisFolder @GetSubfolderParams } } else { $SplitThreadParams = @{ Command = 'Get-Subfolder' InputObject = $Targets InputParameter = 'TargetPath' DebugOutputStream = $Cache.Value['DebugOutputStream'].Value TodaysHostname = $Cache.Value['ThisHostname'].Value WhoAmI = $Cache.Value['WhoAmI'].Value LogBuffer = $LogBuffer Threads = $Cache.Value['ThreadCount'].Value ProgressParentId = $Progress['Id'] AddParam = $GetSubfolderParams } Split-Thread @SplitThreadParams } Write-Progress @Progress -Completed return $Output } function Find-CachedCimInstance { param ( [string]$ComputerName, [string]$Key, [hashtable]$CimCache, [hashtable]$Log, [string[]]$CacheToSearch = ($CimCache[$ComputerName].Keys | Sort-Object -Descending) ) $CimServer = $CimCache[$ComputerName] if ($CimServer) { ForEach ($Cache in $CacheToSearch) { $InstanceCache = $CimServer[$Cache] if ($InstanceCache) { $CachedCimInstance = $InstanceCache[$Key] if ($CachedCimInstance) { return $CachedCimInstance } else { Write-LogMsg @Log -Text " # CIM Instance cache miss in the '$Cache' cache on '$ComputerName' for '$Key'" } } else { Write-LogMsg @Log -Text " # CIM Class/Query cache miss for '$Cache' on '$ComputerName' # for '$Key'" } } } else { Write-LogMsg @Log -Text " # CIM Server cache miss for '$ComputerName' # for '$Key'" } } function Find-ResolvedIDsWithAccess { param ( $ItemPath, [ref]$AceGUIDsByPath, [ref]$ACEsByGUID, [ref]$PrincipalsByResolvedID ) $GuidType = [guid] $IDsWithAccess = New-PermissionCacheRef -Key ([string]) -Value ([System.Collections.Generic.List[guid]]) ForEach ($Item in $ItemPath) { $Guids = $AceGUIDsByPath.Value[$Item] # Not all Paths have ACEs in the cache, so we need to test for null results if ($Guids) { ForEach ($Guid in $Guids) { ForEach ($Ace in $ACEsByGUID.Value[$Guid]) { Add-PermissionCacheItem -Cache $IDsWithAccess -Key $Ace.IdentityReferenceResolved -Value $Guid -Type $GuidType ForEach ($Member in $PrincipalsByResolvedID.Value[$Ace.IdentityReferenceResolved].Members) { Add-PermissionCacheItem -Cache $IDsWithAccess -Key $Member -Value $Guid -Type $GuidType } } } } } return $IDsWithAccess } function Find-ServerFqdn { # Build a list of known ADSI server names to use to populate the caches # Include the FQDN of the current computer and the known trusted domains param ( [uint64]$ParentCount, # In-process cache to reduce calls to other processes or disk, and store repetitive parameters for better readability of code and logs [Parameter(Mandatory)] [ref]$Cache ) $Progress = Get-PermissionProgress -Activity 'Find-ServerFqdn' -Cache $Cache Write-Progress @Progress -Status "0% (path 0 of $ParentCount)" -CurrentOperation 'Initializing' -PercentComplete 0 $ThisFqdn = $Cache.Value['ThisFqdn'].Value $UniqueValues = @{ $ThisFqdn = $null } ForEach ($Value in $Cache.Value['DomainByFqdn'].Value.Keys) { $UniqueValues[$Value] = $null } # Add server names from the ACL paths $ProgressStopWatch = [System.Diagnostics.Stopwatch]::new() $ProgressStopWatch.Start() $LastRemainder = [int]::MaxValue $i = 0 ForEach ($Parent in $Cache.Value['ParentByTargetPath'].Value.Values) { ForEach ($ThisPath in $Parent) { $NewRemainder = $ProgressStopWatch.ElapsedTicks % 5000 if ($NewRemainder -lt $LastRemainder) { $LastRemainder = $NewRemainder [int]$PercentComplete = $i / $ParentCount * 100 Write-Progress @Progress -Status "$PercentComplete% (path $($i + 1) of $ParentCount)" -CurrentOperation "Find-ServerNameInPath '$ThisPath'" -PercentComplete $PercentComplete } $i++ # increment $i after Write-Progress to show progress conservatively rather than optimistically $UniqueValues[(Find-ServerNameInPath -LiteralPath $ThisPath -Cache $Cache)] = $null } } Write-Progress @Progress -Completed return $UniqueValues.Keys } function Format-Permission { param ( # Permission object from Expand-Permission [PSCustomObject]$Permission, <# Domain(s) to ignore (they will be removed from the username) Can be used: to ensure accounts only appear once on the report when they have matching SamAccountNames in multiple domains. when the domain is often the same and doesn't need to be displayed #> [string[]]$IgnoreDomain, # How to group the permissions in the output stream and within each exported file [ValidateSet('account', 'item', 'none', 'target')] [String]$GroupBy = 'item', # File formats to export [ValidateSet('csv', 'html', 'js', 'json', 'prtgxml', 'xml')] [string[]]$FileFormat = @('csv', 'html', 'js', 'json', 'prtgxml', 'xml'), # Type of output returned to the output stream [ValidateSet('passthru', 'none', 'csv', 'html', 'js', 'json', 'prtgxml', 'xml')] [String]$OutputFormat = 'passthru', [cultureinfo]$Culture = $Cache.Value['Culture'], # In-process cache to reduce calls to other processes or disk, and store repetitive parameters for better readability of code and logs [Parameter(Mandatory)] [ref]$Cache, # Properties of each Account to display on the report (left out: managedby) [string[]]$AccountProperty = @('DisplayName', 'Company', 'Department', 'Title', 'Description'), # Object output from Invoke-PermissionAnalyzer [PSCustomObject]$Analysis ) $Progress = Get-PermissionProgress -Activity 'Format-Permission' -Cache $Cache $FormattedResults = @{} $Formats = Resolve-FormatParameter -FileFormat $FileFormat -OutputFormat $OutputFormat $Grouping = Resolve-GroupByParameter -GroupBy $GroupBy -HowToSplit $Permission.SplitBy $ShortNameByID = $Cache.Value['ShortNameByID'] $ExcludeClassFilterContents = $Cache.Value['ExcludeClassFilterContents'] $IncludeAccountFilterContents = $Cache.Value['IncludeAccountFilterContents'] $ConvertSplat = @{ AccountProperty = $AccountProperty ; GroupBy = $GroupBy } if ($Permission.SplitBy['account']) { $i = 0 $Count = $Permission.AccountPermissions.Count $FormattedResults['SplitByAccount'] = ForEach ($Account in $Permission.AccountPermissions) { [int]$Percent = $i / $Count * 100 $i++ # increment $i after Write-Progress to show progress conservatively rather than optimistically Write-Progress -Status "$Percent% (Account $i of $Count)" -CurrentOperation $Account.Account.ResolvedAccountName -PercentComplete $Percent @Progress $Selection = $Account $PermissionGroupingsWithChosenProperties = Invoke-Command -ScriptBlock $Grouping['Script'] -ArgumentList $Selection, $Culture, $ShortNameByID, $IgnoreDomain, $IncludeAccountFilterContents, $ExcludeClassFilterContents $PermissionsWithChosenProperties = Select-PermissionTableProperty -InputObject $Selection -GroupBy $GroupBy -AccountProperty $AccountProperty -ShortNameById $ShortNameByID -IncludeAccountFilterContents $IncludeAccountFilterContents -ExcludeClassFilterContents $ExcludeClassFilterContents $OutputProperties = @{ Account = $Account.Account Path = $Permission.TargetPermissions.Path.FullName NetworkPaths = $Permission.TargetPermissions.NetworkPaths.Item #passthru = [PSCustomObject]@{ # 'Data' = ForEach ($Value in $PermissionsWithChosenProperties.Values) { $Value } #} } ForEach ($Format in $Formats) { $OutputProperties["$Format`Group"] = ConvertTo-PermissionGroup -Permission $PermissionGroupingsWithChosenProperties -Format $Format -HowToSplit $Permission.SplitBy @ConvertSplat $OutputProperties[$Format] = ConvertTo-PermissionList -Permission $PermissionsWithChosenProperties -PermissionGrouping $Selection -ShortestPath @($Permission.TargetPermissions.NetworkPaths.Item.Path)[0] -HowToSplit $Permission.SplitBy -Format $Format @ConvertSplat } [PSCustomObject]$OutputProperties } } if ($Permission.SplitBy['item']) { $i = 0 $Count = $Permission.ItemPermissions.Count $FormattedResults['SplitByItem'] = ForEach ($Item in $Permission.ItemPermissions) { [int]$Percent = $i / $Count * 100 $i++ # increment $i after Write-Progress to show progress conservatively rather than optimistically Write-Progress -Status "$Percent% (Account $i of $Count)" -CurrentOperation $Item.Path -PercentComplete $Percent @Progress $Selection = $Item.Access $PermissionGroupingsWithChosenProperties = Invoke-Command -ScriptBlock $Grouping['Script'] -ArgumentList $Selection, $Culture, $IgnoreDomain, $IncludeAccountFilterContents, $ExcludeClassFilterContents $PermissionsWithChosenProperties = Select-PermissionTableProperty -InputObject $Selection -GroupBy $GroupBy -AccountProperty $AccountProperty -ShortNameById $ShortNameByID -IncludeAccountFilterContents $IncludeAccountFilterContents -ExcludeClassFilterContents $ExcludeClassFilterContents $OutputProperties = @{ Item = $Item.Item TargetPaths = $Permission.TargetPermissions.Path.FullName NetworkPaths = $Permission.TargetPermissions.NetworkPaths.Item #passthru = [PSCustomObject]@{ # 'Data' = ForEach ($Value in $PermissionsWithChosenProperties.Values) { $Value } #} } ForEach ($Format in $Formats) { $OutputProperties["$Format`Group"] = ConvertTo-PermissionGroup -Permission $PermissionGroupingsWithChosenProperties -Format $Format -HowToSplit $Permission.SplitBy @ConvertSplat $OutputProperties[$Format] = ConvertTo-PermissionList -Permission $PermissionsWithChosenProperties -PermissionGrouping $Selection -ShortestPath @($Permission.TargetPermissions.NetworkPaths.Item.Path)[0] -HowToSplit $Permission.SplitBy -Format $Format @ConvertSplat } [PSCustomObject]$OutputProperties } } if ($Permission.SplitBy['target']) { $i = 0 $Count = $Permission.TargetPermissions.Count $FormattedResults['SplitByTarget'] = ForEach ($Target in $Permission.TargetPermissions) { [int]$Percent = $i / $Count * 100 $i++ # increment $i after Write-Progress to show progress conservatively rather than optimistically Write-Progress -Status "$Percent% (Account $i of $Count)" -CurrentOperation $Target.Path -PercentComplete $Percent @Progress [PSCustomObject]@{ PSTypeName = 'Permission.TargetPermission' Path = $Target.Path NetworkPaths = ForEach ($NetworkPath in $Target.NetworkPaths) { $Prop = $Grouping['Property'] if ($Prop -eq 'items') { $Selection = [System.Collections.Generic.List[PSCustomObject]]::new() # Add the network path itself $Selection.Add([PSCustomObject]@{ PSTypeName = 'Permission.ItemPermission' Item = $NetworkPath.Item Access = $NetworkPath.Access }) # Add child items $ChildItems = [PSCustomObject[]]$NetworkPath.$Prop if ($ChildItems) { $Selection.AddRange($ChildItems) } } else { $Selection = $NetworkPath.$Prop } $PermissionGroupingsWithChosenProperties = Invoke-Command -ScriptBlock $Grouping['Script'] -ArgumentList $Selection, $Culture, $ShortNameByID, $IncludeAccountFilterContents, $ExcludeClassFilterContents $PermissionsWithChosenProperties = Select-PermissionTableProperty -InputObject $Selection -GroupBy $GroupBy -AccountProperty $AccountProperty -ShortNameById $ShortNameByID -IncludeAccountFilterContents $IncludeAccountFilterContents -ExcludeClassFilterContents $ExcludeClassFilterContents $OutputProperties = @{ PSTypeName = "Permission.Parent$($Culture.TextInfo.ToTitleCase($GroupBy))Permission" Item = $NetworkPath.Item } ForEach ($Format in $Formats) { $FormatString = $Format if ($Format -eq 'js') { $FormatString = 'json' } $OutputProperties["$FormatString`Group"] = ConvertTo-PermissionGroup -Permission $PermissionGroupingsWithChosenProperties -Format $Format -HowToSplit $Permission.SplitBy @ConvertSplat $OutputProperties[$FormatString] = ConvertTo-PermissionList -Permission $PermissionsWithChosenProperties -PermissionGrouping $Selection -ShortestPath $NetworkPath.Item.Path -HowToSplit $Permission.SplitBy -NetworkPath $NetworkPath.Item.Path -Analysis $Analysis -Format $Format @ConvertSplat } [PSCustomObject]$OutputProperties } } } } return $FormattedResults } function Format-TimeSpan { param ( [timespan]$TimeSpan, [string[]]$UnitsToResolve = @('day', 'hour', 'minute', 'second', 'millisecond') ) $StringBuilder = [System.Text.StringBuilder]::new() $aUnitWithAValueHasBeenFound = $false foreach ($Unit in $UnitsToResolve) { if ($TimeSpan."$Unit`s") { if ($aUnitWithAValueHasBeenFound) { $null = $StringBuilder.Append(", ") } $aUnitWithAValueHasBeenFound = $true if ($TimeSpan."$Unit`s" -eq 1) { $null = $StringBuilder.Append("$($TimeSpan."$Unit`s") $Unit") } else { $null = $StringBuilder.Append("$($TimeSpan."$Unit`s") $Unit`s") } } } $StringBuilder.ToString() } function Get-AccessControlList { # Get folder access control lists # Returns an object representing each effective permission on a folder # This includes each Access Control Entry in the Discretionary Access List, as well as the folder's Owner [CmdletBinding()] param ( # Path to the item whose permissions to export (inherited ACEs will be included) [Hashtable]$TargetPath, # Hashtable of warning messages to allow a summarized count in the Warning stream with detail in the Verbose stream [hashtable]$WarningCache = [Hashtable]::Synchronized(@{}), # In-process cache to reduce calls to other processes or disk, and store repetitive parameters for better readability of code and logs [Parameter(Mandatory)] [ref]$Cache ) $AclByPath = $Cache.Value['AclByPath'] $Progress = Get-PermissionProgress -Activity 'Get-AccessControlList' -Cache $Cache $ChildProgress = @{ Activity = 'Get access control lists for parent and child items' Id = $Progress['Id'] + 1 ParentId = $Progress['Id'] } $GrandChildProgress = @{ Activity = 'Get access control lists' Id = $Progress['Id'] + 2 ParentId = $Progress['Id'] + 1 } Write-Progress @Progress -Status '0% (step 1 of 2) Get access control lists for parent and child items' -CurrentOperation 'Get access control lists for parent and child items' -PercentComplete 0 $GetDirectorySecurity = @{ AclByPath = $AclByPath Cache = $Cache WarningCache = $WarningCache } $TargetIndex = 0 $ParentCount = $TargetPath.Keys.Count $ThreadCount = $Cache.Value['ThreadCount'].Value if ($ThreadCount -eq 1) { ForEach ($Parent in $TargetPath.Keys) { [int]$PercentComplete = $TargetIndex / $ParentCount * 100 $TargetIndex++ Write-Progress @ChildProgress -Status "$PercentComplete% (parent $TargetIndex of $ParentCount) Get access control lists" -CurrentOperation $Parent -PercentComplete $PercentComplete Write-Progress @GrandChildProgress -Status '0% (parent) Get-DirectorySecurity -IncludeInherited' -CurrentOperation $Parent -PercentComplete 0 Get-DirectorySecurity -LiteralPath $Parent -IncludeInherited @GetDirectorySecurity $Children = $TargetPath[$Parent] $ChildCount = $Children.Count [int]$ProgressInterval = [math]::max(($ChildCount / 100), 1) $IntervalCounter = 0 $ChildIndex = 0 ForEach ($Child in $Children) { $IntervalCounter++ if ($IntervalCounter -eq $ProgressInterval -or $ChildIndex -eq 0) { [int]$PercentComplete = $ChildIndex / $ChildCount * 100 Write-Progress @GrandChildProgress -Status "$PercentComplete% (child $($ChildIndex + 1) of $ChildCount) Get-DirectorySecurity" -CurrentOperation $Child -PercentComplete $PercentComplete $IntervalCounter = 0 } $ChildIndex++ # increment $ChildIndex after the progress to show progress conservatively rather than optimistically Get-DirectorySecurity -LiteralPath $Child @GetDirectorySecurity } Write-Progress @GrandChildProgress -Completed } Write-Progress @ChildProgress -Completed } else { ForEach ($Parent in $TargetPath.Keys) { [int]$PercentComplete = $TargetIndex / $ParentCount * 100 $TargetIndex++ Write-Progress @ChildProgress -Status "$PercentComplete% (parent $TargetIndex of $ParentCount) Get access control lists" -CurrentOperation $Parent -PercentComplete $PercentComplete Get-DirectorySecurity -LiteralPath $Parent -IncludeInherited @GetDirectorySecurity $Children = $TargetPath[$Parent] $SplitThread = @{ Command = 'Get-DirectorySecurity' InputObject = $Children InputParameter = 'LiteralPath' #DebugOutputStream = $DebugOutputStream #ThisHostname = $ThisHostname #WhoAmI = $WhoAmI #LogBuffer = $LogBuffer #Threads = $ThreadCount #ProgressParentId = $ChildProgress['Id'] AddParam = $GetDirectorySecurity } Split-Thread @SplitThread } Write-Progress @ChildProgress -Completed } if ($WarningCache.Keys.Count -ge 1) { $StartingLogType = $Cache.Value['LogType'].Value $Cache.Value['LogType'].Value = 'Warning' # PS 5.1 will not allow you to override the Splat by manually calling the param, so we must update the splat Write-LogMsg -Text " # Errors on $($WarningCache.Keys.Count) items while getting access control lists. See verbose log for details." -Cache $Cache $Cache.Value['LogType'].Value = $StartingLogType } Write-Progress @Progress -Status '50% (step 2 of 2) Find non-inherited owners for parent and child items' -CurrentOperation 'Find non-inherited owners for parent and child items' -PercentComplete 50 $ChildProgress['Activity'] = 'Get ACL owners' $GrandChildProgress['Activity'] = 'Get ACL owners' $GetOwnerAce = @{ AclByPath = $AclByPath } $ParentIndex = 0 # Then return the owners of any items that differ from their parents' owners if ($ThreadCount -eq 1) { # Update the cache with ACEs for the item owners (if they do not match the owner of the item's parent folder) # First return the owner of the parent item ForEach ($Parent in $TargetPath.Keys) { [int]$PercentComplete = $ParentIndex / $ParentCount * 100 $ParentIndex++ Write-Progress @ChildProgress -Status "$PercentComplete% (parent $ParentIndex of $ParentCount) Find non-inherited ACL Owners" -CurrentOperation $Parent -PercentComplete $PercentComplete Write-Progress @GrandChildProgress -Status '0% (parent) Get-OwnerAce' -CurrentOperation $Parent -PercentComplete $PercentComplete Get-OwnerAce -Item $Parent @GetOwnerAce $Children = $TargetPath[$Parent] $ChildCount = $Children.Count [int]$ProgressInterval = [math]::max(($ChildCount / 100), 1) $IntervalCounter = 0 $ChildIndex = 0 ForEach ($Child in $Children) { $IntervalCounter++ if ($IntervalCounter -eq $ProgressInterval -or $ChildIndex -eq 0) { [int]$PercentComplete = $ChildIndex / $ChildCount * 100 Write-Progress @GrandChildProgress -Status "$PercentComplete% (child $($ChildIndex + 1) of $ChildCount) Get-OwnerAce" -CurrentOperation $Child -PercentComplete $PercentComplete $IntervalCounter = 0 } $ChildIndex++ Get-OwnerAce -Item $Child @GetOwnerAce } Write-Progress @GrandChildProgress -Completed } Write-Progress @ChildProgress -Completed } else { ForEach ($Parent in $TargetPath.Keys) { [int]$PercentComplete = $ParentIndex / $ParentCount * 100 $ParentIndex++ Write-Progress @ChildProgress -Status "$PercentComplete% (parent $ParentIndex of $ParentCount) Find non-inherited ACL Owners" -CurrentOperation $Parent -PercentComplete $PercentComplete Get-OwnerAce -Item $Parent @GetOwnerAce $Children = $TargetPath[$Parent] $SplitThread = @{ Command = 'Get-OwnerAce' InputObject = $Children InputParameter = 'Item' #DebugOutputStream = $DebugOutputStream #ThisHostname = $ThisHostname #WhoAmI = $WhoAmI #LogBuffer = $LogBuffer #Threads = $ThreadCount #ProgressParentId = $ChildProgress['Id'] AddParam = $GetOwnerAce } Split-Thread @SplitThread } } Write-Progress @Progress -Completed if ($AclByPath.Value.Keys.Count -eq 0) { $StartingLogType = $Cache.Value['LogType'].Value $Cache.Value['LogType'].Value = 'Error' Write-LogMsg -Text ' # 0 access control lists could be retrieved. Exiting script.' -Cache $Cache $Cache.Value['LogType'].Value = $StartingLogType } } function Get-CachedCimInstance { param ( # Name of the computer to query via CIM [String]$ComputerName, # Name of the CIM class whose instances to return [String]$ClassName, # Name of the CIM namespace containing the class [String]$Namespace, # CIM query to run. Overrides ClassName if used (but not efficiently, so don't use both) [String]$Query, [Parameter(Mandatory)] [String]$KeyProperty, [string[]]$CacheByProperty = $KeyProperty, # In-process cache to reduce calls to other processes or disk, and store repetitive parameters for better readability of code and logs [Parameter(Mandatory)] [ref]$Cache ) $Log = @{ 'Cache' = $Cache 'Suffix' = " # for ComputerName '$ComputerName'" } if ($PSBoundParameters.ContainsKey('ClassName')) { $InstanceCacheKey = "$ClassName`By$KeyProperty" } else { $InstanceCacheKey = "$Query`By$KeyProperty" } $CimCache = $Cache.Value['CimCache'] $CimServer = $CimCache.Value[$ComputerName] $String = [type]'String' if ($CimServer) { #Write-LogMsg @Log -Text " # CIM server cache hit" $InstanceCache = $CimServer.Value[$InstanceCacheKey] if ($InstanceCache) { #Write-LogMsg @Log -Text " # CIM instance cache hit for '$InstanceCacheKey'" return $InstanceCache.Value.Values } else { #Write-LogMsg @Log -Text " # CIM instance cache miss for '$InstanceCacheKey'" } } else { #Write-LogMsg @Log -Text " # CIM server cache miss" $CimServer = New-PermissionCacheRef -Key $String -Value ([type]'System.Management.Automation.PSReference') $CimCache.Value[$ComputerName] = $CimServer } Write-LogMsg @Log -Text "`$CimSession = Get-CachedCimSession -ComputerName '$ComputerName' -Cache `$Cache" $CimSession = Get-CachedCimSession -ComputerName $ComputerName -Cache $Cache if ($CimSession) { $GetCimInstanceParams = @{ CimSession = $CimSession ErrorAction = 'SilentlyContinue' Debug = $false } if ($Namespace) { $GetCimInstanceParams['Namespace'] = $Namespace } if ($PSBoundParameters.ContainsKey('ClassName')) { Write-LogMsg @Log -Text "Get-CimInstance -ClassName '$ClassName'" -Expand $GetCimInstanceParams -ExpansionMap $Cache.Value['LogCimMap'].Value $CimInstance = Get-CimInstance -ClassName $ClassName @GetCimInstanceParams } if ($PSBoundParameters.ContainsKey('Query')) { Write-LogMsg @Log -Text "Get-CimInstance -Query '$Query'" -Expand $GetCimInstanceParams -ExpansionMap $Cache.Value['LogCimMap'].Value $CimInstance = Get-CimInstance -Query $Query @GetCimInstanceParams } if ($CimInstance) { $CimInstanceType = [System.Collections.Generic.List[CimInstance]] ForEach ($Prop in $CacheByProperty) { $InstanceCache = New-PermissionCacheRef -Key $String -Value $CimInstanceType if ($PSBoundParameters.ContainsKey('ClassName')) { $InstanceCacheKey = "$ClassName`By$Prop" } else { $InstanceCacheKey = "$Query`By$Prop" } #Write-LogMsg @Log -Text " # Create the '$InstanceCacheKey' cache" $CimServer.Value[$InstanceCacheKey] = $InstanceCache ForEach ($Instance in $CimInstance) { $InstancePropertyValue = $Instance.$Prop #Write-LogMsg @Log -Text " # Add '$InstancePropertyValue' to the '$InstanceCacheKey' cache" $InstanceCache.Value[$InstancePropertyValue] = $Instance } } return $CimInstance } else { #Write-LogMsg @Log -Text " # No CIM instance returned # for $ClassName$Query" } } else { $StartingLogType = $Cache.Value['LogType'].Value $Cache.Value['LogType'].Value = 'Warning' Write-LogMsg @Log -Text ' # CIM connection failure' $Cache.Value['LogType'].Value = $StartingLogType } } function Get-CachedCimSession { param ( # Name of the computer to query via CIM [String]$ComputerName, # In-process cache to reduce calls to other processes or disk, and store repetitive parameters for better readability of code and logs [Parameter(Mandatory)] [ref]$Cache ) $Log = @{ 'Cache' = $Cache 'Suffix' = " # for ComputerName '$ComputerName'" } $ThisFqdn = $Cache.Value['ThisFqdn'].Value $ThisHostname = $Cache.Value['ThisHostname'].Value $CimCache = $Cache.Value['CimCache'] $CimServer = $CimCache.Value[$ComputerName] $String = [type]'String' if ( $CimServer ) { #Write-LogMsg @Log -Text " # CIM server cache hit for '$ComputerName'" $CimSession = $CimServer.Value['CimSession'] if ( $CimSession ) { #Write-LogMsg @Log -Text " # CIM session cache hit for '$ComputerName'" return $CimSession.Value } else { #Write-LogMsg @Log -Text " # CIM session cache miss for '$ComputerName'" $PastFailures = $CimServer.Value['CimFailure'] if ( $PastFailures ) { #Write-LogMsg @Log -Text " # CIM failure cache hit for '$ComputerName'. Skipping connection attempt." return } } } else { #Write-LogMsg @Log -Text " # CIM server cache miss for '$ComputerName'" $CimServer = New-PermissionCacheRef -Key $String -Value ([type]'System.Management.Automation.PSReference') $CimCache.Value[$ComputerName] = $CimServer } $CimErrors = $null if ( $ComputerName -eq $ThisHostname -or $ComputerName -eq "$ThisHostname." -or $ComputerName -eq $ThisFqdn -or $ComputerName -eq "$ThisFqdn." -or $ComputerName -eq 'localhost' -or $ComputerName -eq '127.0.0.1' -or [String]::IsNullOrEmpty($ComputerName) ) { Write-LogMsg @Log -Text '$CimSession = New-CimSession' $CimSession = New-CimSession -ErrorVariable CimErrors -ErrorAction SilentlyContinue } else { # If an Active Directory domain is targeted there are no local accounts and CIM connectivity is not expected # Suppress errors and return nothing in that case Write-LogMsg @Log -Text "`$CimSession = New-CimSession -ComputerName $ComputerName" $CimSession = New-CimSession -ComputerName $ComputerName -ErrorVariable CimErrors -ErrorAction SilentlyContinue } if ($CimErrors.Count -gt 0) { ForEach ($thisErr in $CimErrors) { Write-LogMsg @Log -Text " # CIM connection error: $($thisErr.Exception.Message -replace '\s', ' ' )) # for '$ComputerName'" } $CimServer.Value['CimFailure'] = $CimErrors return } if ($CimSession) { $CimServer.Value['CimSession'] = $CimSession return $CimSession } else { $StartingLogType = $Cache.Value['LogType'].Value $Cache.Value['LogType'].Value = 'Warning' Write-LogMsg @Log -Text " # CIM connection failure without error message # for '$ComputerName'" $Cache.Value['LogType'].Value = $StartingLogType } } function Get-PermissionPrincipal { param ( <# Do not get group members (only report the groups themselves) Note: By default, the -ExcludeClass parameter will exclude groups from the report. If using -NoGroupMembers, you most likely want to modify the value of -ExcludeClass. Remove the 'group' class from ExcludeClass in order to see groups on the report. #> [switch]$NoGroupMembers, # In-process cache to reduce calls to other processes or disk, and store repetitive parameters for better readability of code and logs [Parameter(Mandatory)] [ref]$Cache, # Properties of each Account to display on the report [string[]]$AccountProperty = @('DisplayName', 'Company', 'Department', 'Title', 'Description') ) $Progress = Get-PermissionProgress -Activity 'Get-PermissionPrincipal' -Cache $Cache [string[]]$IDs = $Cache.Value['AceGuidByID'].Value.Keys $Count = $IDs.Count Write-Progress @Progress -Status "0% (identity 0 of $Count) ConvertFrom-ResolvedID" -CurrentOperation 'Initialize' -PercentComplete 0 $Log = @{ 'Cache' = $Cache } $AdsiParams = @{ 'AccountProperty' = $AccountProperty 'Cache' = $Cache } $ThreadCount = $Cache.Value['ThreadCount'].Value if ($ThreadCount -eq 1) { if ($NoGroupMembers) { $AdsiParams['NoGroupMembers'] = $true } [int]$ProgressInterval = [math]::max(($Count / 100), 1) $IntervalCounter = 0 $i = 0 ForEach ($ThisID in $IDs) { $IntervalCounter++ if ($IntervalCounter -eq $ProgressInterval) { [int]$PercentComplete = $i / $Count * 100 Write-Progress @Progress -Status "$PercentComplete% (identity $($i + 1) of $Count) ConvertFrom-ResolvedID" -CurrentOperation $ThisID -PercentComplete $PercentComplete $IntervalCounter = 0 } $i++ Write-LogMsg @Log -Text "ConvertFrom-ResolvedID -IdentityReference '$ThisID'" -Expand $AdsiParams -ExpansionMap $Cache.Value['LogCacheMap'].Value ConvertFrom-ResolvedID -IdentityReference $ThisID @AdsiParams } } else { if ($NoGroupMembers) { $AdsiParams['AddSwitch'] = 'NoGroupMembers' } $SplitThreadParams = @{ Command = 'ConvertFrom-ResolvedID' InputObject = $IDs InputParameter = 'IdentityReference' ObjectStringProperty = 'Name' #TodaysHostname = $ThisHostname #WhoAmI = $WhoAmI #LogBuffer = $LogBuffer #Threads = $ThreadCount #ProgressParentId = $Progress['Id'] AddParam = $AdsiParams } Write-LogMsg @Log -Text 'Split-Thread' -Expand $SplitThreadParams Split-Thread @SplitThreadParams } Write-Progress @Progress -Completed } function Get-PermissionTrustedDomain { param ( # In-process cache to reduce calls to other processes or disk, and store repetitive parameters for better readability of code and logs [Parameter(Mandatory)] [ref]$Cache ) Get-TrustedDomain -Cache $Cache } function Get-PermissionWhoAmI { # Get the NTAccount caption of the user running the script, with the correct capitalization. param ( # Hostname to record in log messages (can be passed to Write-LogMsg as a parameter to avoid calling an external process) [String]$ThisHostname = (HOSTNAME.EXE) ) Get-CurrentWhoAmI -ThisHostName $ThisHostname } function Get-TimeZoneName { param ( [datetime]$Time, [Microsoft.Management.Infrastructure.CimInstance]$TimeZone = (Get-CimInstance -ClassName Win32_TimeZone) ) if ($Time.IsDaylightSavingTime()) { return $TimeZone.DaylightName } else { return $TimeZone.StandardName } } function Initialize-Cache { <# Pre-populate caches in memory to avoid redundant ADSI and CIM queries Use known ADSI and CIM server FQDNs to populate six caches: Three caches of known ADSI directory servers The first cache is keyed on domain SID (e.g. S-1-5-2) The second cache is keyed on domain FQDN (e.g. ad.contoso.com) The first cache is keyed on domain NetBIOS name (e.g. CONTOSO) Two caches of known Win32_Account instances The first cache is keyed on SID (e.g. S-1-5-2) The second cache is keyed on the Caption (NT Account name e.g. CONTOSO\user1) Also populate a cache of DirectoryEntry objects for any domains that have them This prevents threads that start near the same time from finding the cache empty and attempting costly operations to populate it This prevents repetitive queries to the same directory servers #> param ( # FQDNs of the ADSI servers to use to populate the cache [string[]]$Fqdn, # In-process cache to reduce calls to other processes or disk, and store repetitive parameters for better readability of code and logs [Parameter(Mandatory)] [ref]$Cache ) $Progress = Get-PermissionProgress -Activity 'Initialize-Cache' -Cache $Cache $Count = $Fqdn.Count $LogBuffer = $Cache.Value['LogBuffer'] $GetAdsiServer = @{ Cache = $Cache } $ThreadCount = $Cache.Value['ThreadCount'].Value if ($ThreadCount -eq 1) { $i = 0 ForEach ($ThisServerName in $Fqdn) { [int]$PercentComplete = $i / $Count * 100 $i++ # increment $i after Write-Progress to show progress conservatively rather than optimistically Write-Progress -Status "$PercentComplete% (FQDN $i of $Count) Get-AdsiServer" -CurrentOperation "Get-AdsiServer '$ThisServerName'" -PercentComplete $PercentComplete @Progress Write-LogMsg -Text "Get-AdsiServer -Fqdn '$ThisServerName'" -Expand $GetAdsiServer -Cache $Cache -ExpansionMap $Cache.Value['LogCacheMap'].Value $null = Get-AdsiServer -Fqdn $ThisServerName @GetAdsiServer } } else { $SplitThread = @{ Command = 'Get-AdsiServer' InputObject = $Fqdn InputParameter = 'Fqdn' TodaysHostname = $ThisHostname WhoAmI = $WhoAmI LogBuffer = $LogBuffer Timeout = 600 Threads = $ThreadCount ProgressParentId = $ProgressParentId AddParam = $GetAdsiServer } Write-LogMsg -Text "Split-Thread -Command 'Get-AdsiServer' -InputParameter AdsiServer -InputObject @('$($Fqdn -join "',")')" -Cache $Cache $null = Split-Thread @SplitThread } Write-Progress @Progress -Completed } function Invoke-PermissionAnalyzer { param ( # Each key is a string representing the path of an item allowed to have permissions inheritance disabled. Values are irrelevant. [hashtable]$AllowDisabledInheritance, <# Valid accounts that are allowed to appear in ACEs Specify as a ScriptBlock meant for the FilterScript parameter of Where-Object By default, this is a ScriptBlock that always evaluates to $true so it doesn't evaluate any account convention compliance In the ScriptBlock, any account properties are available for evaluation: e.g. {$_.DomainNetbios -eq 'CONTOSO'} # Accounts used in ACEs should be in the CONTOSO domain e.g. {$_.Name -eq 'Group23'} # Accounts used in ACEs should be named Group23 e.g. {$_.ResolvedAccountName -like 'CONTOSO\Group1*' -or $_.ResolvedAccountName -eq 'CONTOSO\Group23'} The format of the ResolvedAccountName property is CONTOSO\Group1 where CONTOSO is the NetBIOS name of the domain (the computer name for local accounts) and Group1 is the samAccountName of the account #> [scriptblock]$AccountConvention = { $true }, # In-process cache to reduce calls to other processes or disk, and store repetitive parameters for better readability of code and logs [Parameter(Mandatory)] [ref]$Cache ) <# Issue: Items with permissions inheritance disabled Explanation: Disabling inheritance adds complexity to management of permissions, leading to unexpected behavior. Example: 1st ticket - Grant access to folder1 and all of its contents 2nd ticket - Unable to access folder1\subfolder1 (oops, nobody knew subfolder1 had inheritance disabled) Recommended: Enable inheritance. To achieve the desired behavior, consider these alternatives in order of preference: 1. Modify ACE inheritance and propagation flags (instead of ACL inheritance). 2. Move folders up higher in the folder structure if they require access not achievable with inheritance and propagation flags. Example: Ticket - Grant access to folder1 but none of its subfolders Not Recommended - Disabling inheritance of all ACEs on all subfolders of folder1 Recommended - The ACE on folder1 which grants access should have the flags set to TODO VERIFY CORRECT CONFIG, BELOW ALL SETTINGS ARE LISTED INSTEAD: Propagation flags: 0 (None) No inheritance flags are set. 1 (NoPropagateInherit) ACE is not propagated to child objects. 2 (InheritOnly) ACE is propagated only to child objects. This includes both container and leaf child objects. Inheritance flags: 0 (None) ACE is inherited by child container objects. 1 (ContainerInherit) ACE is inherited by child container objects. 2 (ObjectInherit) ACE is inherited by child leaf objects. This ensures the new access will not propagate to any subfolders of folder 1, without disrupting ACL inheritance. #> $AclByPath = $Cache.Value['AclByPath'] $AceByGUID = $Cache.Value['AceByGUID'] $AceByGUID = $Cache.Value['AceByGUID'] $PrincipalByID = $Cache.Value['PrincipalByID'] $ItemsWithBrokenInheritance = $AclByPath.Value.Keys | Where-Object -FilterScript { $AclByPath.Value[$_].AreAccessRulesProtected -and -not $AllowDisabledInheritance[$_] } # Groups that were used in ACEs but do not match the specified naming convention # Invert the naming convention scriptblock (because we actually want to identify groups that do NOT follow the convention) $ViolatesAccountConvention = [scriptblock]::Create("!($AccountConvention)") $NonCompliantAccounts = $PrincipalByID.Value.Values | Where-Object -FilterScript { $_.SchemaClassName -eq 'Group' } | Where-Object -FilterScript $ViolatesAccountConvention if ($NonCompliantAccounts) { $AceGUIDsWithNonCompliantAccounts = $Cache.Value['AceGuidByID'].Value[$NonCompliantAccounts] } if ($AceGUIDsWithNonCompliantAccounts) { $ACEsWithNonCompliantAccounts = $AceByGUID.Value[$AceGUIDsWithNonCompliantAccounts] } $ACEsWithUsers = [System.Collections.Generic.List[PSCustomObject]]::new() $ACEsWithUnresolvedSIDs = [System.Collections.Generic.List[PSCustomObject]]::new() $ACEsWithCreatorOwner = [System.Collections.Generic.List[PSCustomObject]]::new() ForEach ($ACE in $AceByGUID.Value.Values) { # ACEs for users (recommend replacing with group-based access on any folder that is not a home folder) if ( $PrincipalByID.Value[$ACE.IdentityReferenceResolved].SchemaClassName -eq 'User' -and $_.IdentityReferenceSID -ne 'S-1-5-18' -and # The 'NT AUTHORITY\SYSTEM' account is part of default Windows file permissions and is out of scope $_.SourceOfAccess -ne 'Ownership' # Currently Ownership is out of scope. Should it be? ) { $ACEsWithUsers.Add($ACE) } # ACEs for unresolvable SIDs (recommend removing these ACEs) if ( $ACE.IdentityReferenceResolved -like "*$($ACE.IdentityReferenceSID)*" ) { $ACEsWithUnresolvedSIDs.Add($ACE) } # CREATOR OWNER access (recommend replacing with group-based access, or with explicit user access for a home folder.) if ( $ACE.IdentityReferenceResolved -match 'CREATOR OWNER' ) { $ACEsWithCreatorOwner.Add($ACE) } } return [PSCustomObject]@{ ACEsWithCreatorOwner = $ACEsWithCreatorOwner ACEsWithNonCompliantAccounts = $ACEsWithNonCompliantAccounts ACEsWithUsers = $ACEsWithUsers ACEsWithUnresolvedSIDs = $ACEsWithUnresolvedSIDs ItemsWithBrokenInheritance = $ItemsWithBrokenInheritance NonCompliantAccounts = $NonCompliantAccounts } } function Invoke-PermissionCommand { param ( [String]$Command, # In-process cache to reduce calls to other processes or disk, and store repetitive parameters for better readability of code and logs [Parameter(Mandatory)] [ref]$Cache ) $Steps = [System.Collections.Specialized.OrderedDictionary]::New() $Steps.Add( 'Get the NTAccount caption of the user running the script, with the correct capitalization', { HOSTNAME.EXE } ) $Steps.Add( 'Get the hostname of the computer running the script', { Get-CurrentWhoAmI -LogBuffer $LogBuffer -ThisHostName $ThisHostname } ) $StepCount = $Steps.Count Write-LogMsg -Cache $Cache -Type Verbose -Text $Command $ScriptBlock = $Steps[$Command] Write-LogMsg -Cache $Cache -Type Debug -Text $ScriptBlock Invoke-Command -ScriptBlock $ScriptBlock } function New-PermissionCache { <# Create an in-process cache to reduce calls to other processes, disk, or network, and to store repetitive parameters for better readability of code and logs. #> param( <# Number of asynchronous threads to use Recommended starting with the # of logical CPUs: (Get-CimInstance -ClassName CIM_Processor | Measure-Object -Sum -Property NumberOfLogicalProcessors).Sum #> [uint16]$ThreadCount = 1, # Path to the folder to save the logs and reports generated by this script [string]$OutputDir = "$env:AppData\Export-Permission", [string]$TranscriptFile ) # Get the hostname of the computer running the script. $ThisHostname = HOSTNAME.EXE $WhoAmI = Get-PermissionWhoAmI -ThisHostname $ThisHostname $ProgressParentId = 0 $Culture = Get-Culture $LogType = 'Debug' $LogCacheMap = @{ 'Cache' = '$Cache' } $LogAnalysisMap = @{ 'Cache' = '$Cache' ; 'Analysis' = '$PermissionAnalysis' ; 'Permission' = '$Permissions' } $LogWellKnownMap = @{ 'Cache' = '$Cache' ; 'CachedWellKnownSID' = '$CachedWellKnownSID' ; 'AceGuid' = '$AceGuids' } $LogStopWatchMap = @{ 'Cache' = '$Cache' ; 'StopWatch' = '$StopWatch' ; 'Analysis' = '$PermissionAnalysis' ; 'Permission' = '$Permissions' ; 'FormattedPermission' = '$FormattedPermissions' } $LogCimMap = @{ 'Cache' = '$Cache' ; 'CimSession' = '$CimSession' } $LogFormattedMap = @{ 'FormattedPermission' = '$FormattedPermissions' ; 'Analysis' = '$PermissionAnalysis' } $LogDirEntryMap = @{ 'Cache' = '$Cache' ; 'DirectoryEntry' = '$DirectoryEntry' ; 'AceGuid' = '$AceGuids' } $LogTargetPathMap = @{ 'Cache' = '$Cache' ; 'TargetPath' = '$Items' } $LogEmptyMap = @{} $ParamStringMap = Get-ParamStringMap $LogBuffer = [System.Collections.Concurrent.ConcurrentQueue[System.Collections.Specialized.OrderedDictionary]]::new() $Log = @{ 'Type' = $LogType 'ThisHostname' = $ThisHostname 'Buffer' = ([ref]$LogBuffer) 'ExpandKeyMap' = $LogEmptyMap } # These events already happened but we will log them now that we have the correct capitalization of the user. Write-LogMsg -Text '$StopWatch = [System.Diagnostics.Stopwatch]::new() ; $StopWatch.Start() # This command was already run but is now being logged' @Log Write-LogMsg -Text "New-Item -ItemType Directory -Path '$OutputDir' -ErrorAction SilentlyContinue # This command was already run but is now being logged" @Log Write-LogMsg -Text "Start-Transcript -Path '$TranscriptFile' # This command was already run but is now being logged" @Log Write-LogMsg -Text 'HOSTNAME.EXE # This command was already run but is now being logged' @Log Write-LogMsg -Text "Get-PermissionWhoAmI -ThisHostName '$ThisHostname' # This command was already run but is now being logged" @Log $Boolean = [type]'String' $String = [type]'String' $GuidList = [type]'System.Collections.Generic.List[Guid]' $StringArray = [type]'String[]' $StringList = [type]'System.Collections.Generic.List[String]' $Object = [type]'Object' $PSCustomObject = [type]'PSCustomObject' $DirectoryInfo = [type]'System.IO.DirectoryInfo' $PSReference = [type]'ref' $WellKnownSidBySid = Get-KnownSidHashTable $WellKnownSidByName = Get-KnownSidByName -WellKnownSIDBySID $WellKnownSidBySid $WellKnownSidByCaption = Get-KnownCaptionHashTable -WellKnownSidBySid $WellKnownSidBySid # String translations indexed by value in the [System.Security.AccessControl.InheritanceFlags] enum # Parameter default value is on a single line as a workaround to a PlatyPS bug # TODO: Move to i18n $InheritanceFlagResolved = @('this folder but not subfolders', 'this folder and subfolders', 'this folder and files, but not subfolders', 'this folder, subfolders, and files') <# $CimCache Key is a String Value is a dict Key is a String Value varies (CimSession or dict) #> return [hashtable]::Synchronized(@{ 'AceByGUID' = New-PermissionCacheRef -Key $String -Value $Object #hashtable Initialize a cache of access control entries keyed by GUID generated in Resolve-ACE. 'AceGuidByID' = New-PermissionCacheRef -Key $String -Value $GuidList #hashtable Initialize a cache of access control entry GUIDs keyed by their resolved NTAccount captions. 'AceGuidByPath' = New-PermissionCacheRef -Key $String -Value $GuidList #hashtable Initialize a cache of access control entry GUIDs keyed by their paths. 'AclByPath' = New-PermissionCacheRef -Key $String -Value $PSCustomObject #hashtable Initialize a cache of access control lists keyed by their paths. 'CimCache' = New-PermissionCacheRef -Key $String -Value $PSReference #hashtable Initialize a cache of CIM sessions, instances, and query results. 'Culture' = [ref]$Culture 'DirectoryEntryByPath' = New-PermissionCacheRef -Key $String -Value $Object #DirectoryEntryCache Initialize a cache of ADSI directory entry keyed by their Path to minimize ADSI queries. 'DomainBySID' = New-PermissionCacheRef -Key $String -Value $Object #DomainsBySID Initialize a cache of directory domains keyed by domain SID to minimize CIM and ADSI queries. 'DomainByNetbios' = New-PermissionCacheRef -Key $String -Value $Object #DomainsByNetbios Initialize a cache of directory domains keyed by domain NetBIOS to minimize CIM and ADSI queries. 'DomainByFqdn' = New-PermissionCacheRef -Key $String -Value $Object #DomainsByFqdn Initialize a cache of directory domains keyed by domain DNS FQDN to minimize CIM and ADSI queries. 'ExcludeAccountFilterContents' = New-PermissionCacheRef -Key $String -Value $Boolean #hashtable Initialize a cache of accounts filtered by the ExcludeAccount parameter. 'ExcludeClassFilterContents' = New-PermissionCacheRef -Key $String -Value $Boolean #hashtable Initialize a cache of accounts filtered by the ExcludeClass parameter. 'IdByShortName' = New-PermissionCacheRef -Key $String -Value $StringList #hashtable Initialize a cache of resolved NTAccount captions keyed by their short names (results of the IgnoreDomain parameter). 'IncludeAccountFilterContents' = New-PermissionCacheRef -Key $String -Value $Boolean #hashtable Initialize a cache of accounts filtered by the IncludeAccount parameter. 'InheritanceFlagResolved' = [ref]$InheritanceFlagResolved 'Log' = [ref]$Log 'LogBuffer' = [ref]$LogBuffer # Initialize a cache of log messages in memory to minimize random disk access. 'LogEmptyMap' = [ref]$LogEmptyMap 'LogCacheMap' = [ref]$LogCacheMap 'LogAnalysisMap' = [ref]$LogAnalysisMap 'LogTargetPathMap' = [ref]$LogTargetPathMap 'LogFormattedMap' = [ref]$LogFormattedMap 'LogStopWatchMap' = [ref]$LogStopWatchMap 'LogCimMap' = [ref]$LogCimMap 'LogDirEntryMap' = [ref]$LogDirEntryMap 'LogWellKnownMap' = [ref]$LogWellKnownMap 'LogType' = [ref]$LogType 'ParamStringMap' = [ref]$ParamStringMap 'ParentByTargetPath' = New-PermissionCacheRef -Key $DirectoryInfo -Value $StringArray #ParentByTargetPath hashtable Initialize a cache of resolved parent item paths keyed by their unresolved target paths. 'PrincipalByID' = New-PermissionCacheRef -Key $String -Value $PSCustomObject #hashtable Initialize a cache of ADSI security principals keyed by their resolved NTAccount caption. 'ProgressParentId' = [ref]$ProgressParentId 'ShortNameByID' = New-PermissionCacheRef -Key $String -Value $String #hashtable Initialize a cache of short names (results of the IgnoreDomain parameter) keyed by their resolved NTAccount captions. 'ThisFqdn' = [ref]'' 'ThisHostname' = [ref]$ThisHostname 'ThreadCount' = [ref]$ThreadCount 'WellKnownSidByCaption' = [ref]$WellKnownSidByCaption 'WellKnownSidByName' = [ref]$WellKnownSidByName 'WellKnownSidBySid' = [ref]$WellKnownSidBySid 'WhoAmI' = [ref]$WhoAmI }) } function Out-Permission { param ( # Type of output returned to the output stream [ValidateSet('passthru', 'none', 'csv', 'html', 'js', 'json', 'prtgxml', 'xml')] [string]$OutputFormat = 'passthru', <# How to group the permissions in the output stream and within each exported file SplitBy GroupBy none none $FlatPermissions all in 1 file none account $AccountPermissions all in 1 file none item $ItemPermissions all in 1 file account none 1 file per item in $AccountPermissions. In each file, $_.Access | sort path account account (same as -SplitBy account -GroupBy none) account item 1 file per item in $AccountPermissions. In each file, $_.Access | group item | sort name item none 1 file per item in $ItemPermissions. In each file, $_.Access | sort account item account 1 file per item in $ItemPermissions. In each file, $_.Access | group account | sort name item item (same as -SplitBy item -GroupBy none) target none 1 file per $TargetPath. In each file, sort ACEs by item path then account name target account 1 file per $TargetPath. In each file, group ACEs by account and sort by account name target item 1 file per $TargetPath. In each file, group ACEs by item and sort by item path target target (same as -SplitBy target -GroupBy none) #> [ValidateSet('account', 'item', 'none', 'target')] [string]$GroupBy = 'item', [hashtable]$FormattedPermission ) ForEach ($Split in 'target', 'item', 'account') { $ThisFormat = $FormattedPermission["SplitBy$Split"] if ($ThisFormat) { $ThisFormat } } <# switch ($GroupBy) { 'None' { $TypeData = @{ TypeName = 'Permission.PassThruPermission' DefaultDisplayPropertySet = 'Folder', 'Account', 'Access' ErrorAction = 'SilentlyContinue' } Update-TypeData @TypeData return $FolderPermissions } 'Item' { Update-TypeData -MemberName Folder -Value { $This.Name } -TypeName 'Permission.FolderPermission' -MemberType ScriptProperty -ErrorAction SilentlyContinue Update-TypeData -MemberName Access -TypeName 'Permission.FolderPermission' -MemberType ScriptProperty -ErrorAction SilentlyContinue -Value { $Access = ForEach ($Permission in $This.Access) { [pscustomobject]@{ Account = $Permission.Account Access = $Permission.Access } } $Access } Update-TypeData -DefaultDisplayPropertySet ('Path', 'Access') -TypeName 'Permission.FolderPermission' -ErrorAction SilentlyContinue return $GroupedPermissions } 'Account' { Update-TypeData -MemberName Account -Value { $This.Name } -TypeName 'Permission.AccountPermission' -MemberType ScriptProperty -ErrorAction SilentlyContinue Update-TypeData -MemberName Access -TypeName 'Permission.AccountPermission' -MemberType ScriptProperty -ErrorAction SilentlyContinue -Value { $Access = ForEach ($Permission in $This.Group) { [pscustomobject]@{ Folder = $Permission.Folder Access = $Permission.Access } } $Access } Update-TypeData -DefaultDisplayPropertySet ('Account', 'Access') -TypeName 'Permission.AccountPermission' -ErrorAction SilentlyContinue #Group-Permission -InputObject $FolderPermissions -Property Account | #Sort-Object -Property Name return } Default { return } } #> <# # Output the result to the pipeline ForEach ($Key in $FormattedPermission.Keys) { ForEach ($Target in $FormattedPermission[$Key]) { ForEach ($NetworkPath in $Target.NetworkPaths) { [PSCustomObject]@{ PSTypeName = 'Permission.ParentItemPermission' Item = $NetworkPath.Item Items = ForEach ($Permission in $NetworkPath.$OutputFormat) { [PSCustomObject]@{ Path = $Permission.Grouping Access = $Permission.$OutputFormat PSTypeName = 'Permission.Item' } } } } } } #> <# if ($OutputFormat -eq 'PrtgXml') { # Output the XML so the script can be directly used as a PRTG sensor # Caution: This use may be a problem for a PRTG probe because of how long the script can run on large folders/domains # Recommendation: Specify the appropriate parameters to run this as a PRTG push sensor instead return $XMLOutput } #> } function Out-PermissionFile { # missing param ( # Regular expressions matching names of security principals to exclude from the HTML report [string[]]$ExcludeAccount, # Accounts whose objectClass property is in this list are excluded from the HTML report [string[]]$ExcludeClass = @('group', 'computer'), <# Domain(s) to ignore (they will be removed from the username) Intended when a user has matching SamAccountNames in multiple domains but you only want them to appear once on the report. Can also be used to remove all domains simply for brevity in the report. #> $IgnoreDomain, # Path to the NTFS folder whose permissions are being exported [string[]]$TargetPath, # Group members are not being exported (only the groups themselves) [switch]$NoMembers, # Path to the folder to save the logs and reports generated by this script $OutputDir, # Timer to measure progress and performance $StopWatch, # Title at the top of the HTML report $Title, $Permission, $FormattedPermission, $RecurseDepth, $LogFileList, $ReportInstanceId, <# Level of detail to export to file 0 Item paths $TargetPath 1 Resolved item paths (server names resolved, DFS targets resolved) $Parents 2 Expanded resolved item paths (parent paths expanded into children) $AclByPath.Keys 3 Access rules $AclByPath.Values 4 Resolved access rules (server names resolved, inheritance flags resolved) $AceByGUID.Values | %{$_} | Sort Path,IdentityReferenceResolved 5 Accounts with access $PrincipalByID.Values | %{$_} | Sort ResolvedAccountName 6 Expanded resolved access rules (expanded with account info) $Permissions 7 Formatted permissions $FormattedPermissions 8 Best Practice issues $Analysis 9 XML custom sensor output for Paessler PRTG Network Monitor $PrtgXml 10 Permission Report #> [int[]]$Detail = @(0..10), <# Information about the current culture settings. This includes information about the current language settings on the system, such as the keyboard layout, and the display format of items such as numbers, currency, and dates. #> [cultureinfo]$Culture = $Cache.Value['Culture'], # File format(s) to export [ValidateSet('csv', 'html', 'js', 'json', 'prtgxml', 'xml')] [string[]]$FileFormat = @('csv', 'html', 'js', 'json', 'prtgxml', 'xml'), # Type of output returned to the output stream [ValidateSet('passthru', 'none', 'csv', 'html', 'js', 'json', 'prtgxml', 'xml')] [String]$OutputFormat = 'passthru', <# How to group the permissions in the output stream and within each exported file SplitBy GroupBy none none $FlatPermissions all in 1 file per $TargetPath none account $AccountPermissions all in 1 file per $TargetPath none item $ItemPermissions all in 1 file per $TargetPath (default behavior) item none 1 file per item in $ItemPermissions. In each file, $_.Access | sort account item account 1 file per item in $ItemPermissions. In each file, $_.Access | group account | sort name item item (same as -SplitBy item -GroupBy none) account none 1 file per item in $AccountPermissions. In each file, $_.Access | sort path account account (same as -SplitBy account -GroupBy none) account item 1 file per item in $AccountPermissions. In each file, $_.Access | group item | sort name #> [ValidateSet('account', 'item', 'none', 'target')] [String]$GroupBy = 'item', <# How to split up the exported files: none generate 1 file with all permissions target generate 1 file per target item generate 1 file per item account generate 1 file per account all generate 1 file per target and 1 file per item and 1 file per account and 1 file with all permissions. #> [ValidateSet('none', 'all', 'target', 'item', 'account')] [string[]]$SplitBy = 'target', # Object output from Invoke-PermissionAnalyzer [PSCustomObject]$Analysis, [uint64]$TargetCount, [uint64]$ParentCount, [uint64]$ChildCount, [uint64]$ItemCount, [uint64]$FqdnCount, [uint64]$AclCount, [uint64]$AceCount, [uint64]$IdCount, [UInt64]$PrincipalCount, # In-process cache to reduce calls to other processes or disk, and store repetitive parameters for better readability of code and logs [Parameter(Mandatory)] [ref]$Cache ) $AceByGUID = $Cache.Value['AceByGUID'] $AclByPath = $Cache.Value['AclByPath'] $PrincipalByID = $Cache.Value['PrincipalByID'] $Parent = $Cache.Value['ParentByTargetPath'] # Determine all formats specified by the parameters $Formats = Resolve-FormatParameter -FileFormat $FileFormat -OutputFormat $OutputFormat # String translations indexed by value in the $Detail parameter # TODO: Move to i18n $DetailStrings = @( 'Item paths', 'Resolved item paths (server names and DFS targets resolved)', 'Expanded resolved item paths (resolved target paths expanded into their children)', 'Access lists', 'Access rules (resolved identity references and inheritance flags)', 'Accounts with access', 'Expanded access rules (expanded with account info)', # #ToDo: Expand DirectoryEntry objects in the DirectoryEntry and Members properties 'Formatted permissions', 'Best Practice issues', 'Custom sensor output for Paessler PRTG Network Monitor', 'Permission report' ) $UnsplitDetail = $Detail | Where-Object -FilterScript { $_ -le 5 -or $_ -in 8, 9 } $SplitDetail = $Detail | Where-Object -FilterScript { $_ -gt 5 -and $_ -notin 8, 9 } $DetailScripts = @( { $TargetPath }, { ForEach ($Key in $Parent.Value.Keys) { [PSCustomObject]@{ OriginalTargetPath = $Key ResolvedNetworkPath = $Parent.Value[$Key] } } }, { $AclByPath.Value.Keys }, { $AclByPath.Value.Values }, { ForEach ($val in $AceByGUID.Value.Values) { $val } }, { ForEach ($val in $PrincipalByID.Value.Values) { $val } }, { switch ($SplitBy) { 'account' { $Permission.AccountPermissions ; break } 'none' { $Permission.FlatPermissions ; break } 'item' { $Permission.ItemPermissions ; break } 'target' { $Permission.TargetPermissions ; break } } }, { $Permissions.Data }, { $Analysis }, { ConvertTo-PermissionPrtgXml -Analysis $Analysis }, {} ) ForEach ($Split in $Permission.SplitBy.Keys) { switch ($Split) { 'account' { $Subproperty = '' $FileNameProperty = $Split $FileNameSubproperty = 'ResolvedAccountName' $ReportFiles = $FormattedPermission["SplitBy$Split"] break } 'item' { $Subproperty = '' $FileNameProperty = $Split $FileNameSubproperty = 'Path' $ReportFiles = $FormattedPermission["SplitBy$Split"] break } 'none' { $Subproperty = 'NetworkPaths' $FileNameProperty = '' $FileNameSubproperty = 'Path' $ReportFiles = [PSCustomObject]@{ NetworkPaths = $FormattedPermission['SplitByTarget'].NetworkPaths Path = $FormattedPermission['SplitByTarget'].Path.FullName } break } 'target' { $Subproperty = 'NetworkPaths' $FileNameProperty = '' $FileNameSubproperty = 'Path' $ReportFiles = $FormattedPermission["SplitBy$Split"] break } } ForEach ($Format in $Formats) { $FormatString = $Format $FormatDir = "$OutputDir\$Format" $null = New-Item -Path $FormatDir -ItemType Directory -ErrorAction SilentlyContinue switch ($Format) { 'csv' { $DetailExports = @( { $args[0] | Out-File -LiteralPath $args[1] }, { $args[0] | Export-Csv -NoTypeInformation -LiteralPath $args[1] }, { $args[0] | Out-File -LiteralPath $args[1] }, { $args[0] | Export-Csv -NoTypeInformation -LiteralPath $args[1] }, { $args[0] | Export-Csv -NoTypeInformation -LiteralPath $args[1] }, { $args[0] | Export-Csv -NoTypeInformation -LiteralPath $args[1] }, { $args[0] | Export-Csv -NoTypeInformation -LiteralPath $args[1] }, { $args[0] | Out-File -LiteralPath $args[1] }, { }, { }, { } ) $DetailScripts[10] = { } break } 'html' { $DetailExports = @( { $args[0] | Out-File -LiteralPath $args[1] }, { $args[0] | ConvertTo-Html -Fragment | Out-File -LiteralPath $args[1] }, { $args[0] -join "<br />`r`n" | Out-File -LiteralPath $args[1] }, { $args[0] | ConvertTo-Html -Fragment | Out-File -LiteralPath $args[1] }, { $args[0] | ConvertTo-Html -Fragment | Out-File -LiteralPath $args[1] }, { $args[0] | ConvertTo-Html -Fragment | Out-File -LiteralPath $args[1] }, { $args[0] | ConvertTo-Html -Fragment | Out-File -LiteralPath $args[1] }, { $args[0] | Out-File -LiteralPath $args[1] }, { }, { }, { $null = Set-Content -LiteralPath $args[1] -Value $args[0] } ) $DetailScripts[10] = { if ( $GroupBy -eq 'none' -or $GroupBy -eq $Split ) { # Combine all the elements into a single string which will be the innerHtml of the <body> element of the report Write-LogMsg -Cache $Cache -Text "Get-HtmlBody -HtmlFolderPermissions `$FormattedPermission.$Format.Div" $Body = Get-HtmlBody @BodyParams # Apply the report template to the generated HTML report body and description $ReportParameters = $HtmlElements.ReportParameters Write-LogMsg -Cache $Cache -Text 'New-BootstrapReport @ReportParameters' New-BootstrapReport -Body $Body @ReportParameters } else { # Combine the header and table inside a Bootstrap div Write-LogMsg -Cache $Cache -Text "New-BootstrapDivWithHeading -HeadingText '$HtmlElements.SummaryTableHeader' -Content `$FormattedPermission.$Format`Group.Table" $TableOfContents = New-BootstrapDivWithHeading -HeadingText $HtmlElements.SummaryTableHeader -Content $PermissionGroupings.Table -Class 'h-100 p-1 bg-light border rounded-3 table-responsive' -HeadingLevel 6 # Combine all the elements into a single string which will be the innerHtml of the <body> element of the report Write-LogMsg -Cache $Cache -Text "Get-HtmlBody -TableOfContents `$TableOfContents -HtmlFolderPermissions `$FormattedPermission.$Format.Div" $Body = Get-HtmlBody -TableOfContents $TableOfContents @BodyParams } $ReportParameters = $HtmlElements.ReportParameters # Apply the report template to the generated HTML report body and description Write-LogMsg -Cache $Cache -Text "New-BootstrapReport @$HtmlElements.ReportParameters" New-BootstrapReport -Body $Body @ReportParameters } break } 'js' { $DetailExports = @( { $args[0] | ConvertTo-Json -Compress -WarningAction SilentlyContinue | Out-File -LiteralPath $args[1] }, { $args[0] | ConvertTo-Json -Compress -WarningAction SilentlyContinue | Out-File -LiteralPath $args[1] }, { $args[0] | ConvertTo-Json -Compress -WarningAction SilentlyContinue | Out-File -LiteralPath $args[1] }, { $args[0] | ConvertTo-Json -Compress -WarningAction SilentlyContinue | Out-File -LiteralPath $args[1] }, { $args[0] | ConvertTo-Json -Compress -WarningAction SilentlyContinue | Out-File -LiteralPath $args[1] }, { $args[0] | ConvertTo-Json -Compress -WarningAction SilentlyContinue | Out-File -LiteralPath $args[1] }, { $args[0] | ConvertTo-Json -Compress -WarningAction SilentlyContinue | Out-File -LiteralPath $args[1] }, { $args[0] | ConvertTo-Json -Compress -WarningAction SilentlyContinue | Out-File -LiteralPath $args[1] }, { }, { }, { $null = Set-Content -LiteralPath $args[1] -Value $args[0] } ) $DetailScripts[10] = { #if ($Permission.FlatPermissions) { if ( $GroupBy -eq 'none' -or $GroupBy -eq $Split ) { # Combine all the elements into a single string which will be the innerHtml of the <body> element of the report Write-LogMsg -Cache $Cache -Text "Get-HtmlBody -HtmlFolderPermissions `$FormattedPermission.$Format.Div" $Body = Get-HtmlBody @BodyParams } else { # Combine the header and table inside a Bootstrap div Write-LogMsg -Cache $Cache -Text "New-BootstrapDivWithHeading -HeadingText '$HtmlElements.SummaryTableHeader' -Content `$FormattedPermission.$Format`Group.Table" $TableOfContents = New-BootstrapDivWithHeading -HeadingText $HtmlElements.SummaryTableHeader -Content $PermissionGroupings.Table -Class 'h-100 p-1 bg-light border rounded-3 table-responsive' -HeadingLevel 6 # Combine all the elements into a single string which will be the innerHtml of the <body> element of the report Write-LogMsg -Cache $Cache -Text "Get-HtmlBody -TableOfContents `$TableOfContents -HtmlFolderPermissions `$FormattedPermission.$Format.Div" $Body = Get-HtmlBody -TableOfContents $TableOfContents @BodyParams } # Build the JavaScript scripts Write-LogMsg -Cache $Cache -Text "ConvertTo-ScriptHtml -Permission `$Permissions -PermissionGrouping `$PermissionGroupings" $ScriptHtml = ConvertTo-ScriptHtml -Permission $Permissions -PermissionGrouping $PermissionGroupings -GroupBy $GroupBy -Split $Split $ReportParameters = $HtmlElements.ReportParameters # Apply the report template to the generated HTML report body and description Write-LogMsg -Cache $Cache -Text "New-BootstrapReport -JavaScript @$HtmlElements.ReportParameters" New-BootstrapReport -JavaScript -AdditionalScriptHtml $ScriptHtml -Body $Body @ReportParameters } $FormatString = 'json' break } 'json' { $DetailExports = @( { $args[0] | ConvertTo-Json -Compress -WarningAction SilentlyContinue | Out-File -LiteralPath $args[1] }, { $args[0] | ConvertTo-Json -Compress -WarningAction SilentlyContinue | Out-File -LiteralPath $args[1] }, { $args[0] | ConvertTo-Json -Compress -WarningAction SilentlyContinue | Out-File -LiteralPath $args[1] }, { $args[0] | ConvertTo-Json -Compress -WarningAction SilentlyContinue | Out-File -LiteralPath $args[1] }, { $args[0] | ConvertTo-Json -Compress -WarningAction SilentlyContinue | Out-File -LiteralPath $args[1] }, { $args[0] | ConvertTo-Json -Compress -WarningAction SilentlyContinue | Out-File -LiteralPath $args[1] }, { $args[0] | ConvertTo-Json -Compress -WarningAction SilentlyContinue | Out-File -LiteralPath $args[1] }, { $args[0] | ConvertTo-Json -Compress -WarningAction SilentlyContinue | Out-File -LiteralPath $args[1] }, { }, { }, { } ) $DetailScripts[10] = { } break } 'prtgxml' { $DetailExports = @( { }, { }, { }, { }, { }, { }, { }, { }, { }, { $args[0] | Out-File -LiteralPath $args[1] } ) break } 'xml' { $DetailExports = @( { ($args[0] | ConvertTo-Xml).InnerXml | Out-File -LiteralPath $args[1] }, { ($args[0] | ConvertTo-Xml).InnerXml | Out-File -LiteralPath $args[1] }, { ($args[0] | ConvertTo-Xml).InnerXml | Out-File -LiteralPath $args[1] }, { ($args[0] | ConvertTo-Xml).InnerXml | Out-File -LiteralPath $args[1] }, { ($args[0] | ConvertTo-Xml).InnerXml | Out-File -LiteralPath $args[1] }, { ($args[0] | ConvertTo-Xml).InnerXml | Out-File -LiteralPath $args[1] }, { ($args[0] | ConvertTo-Xml).InnerXml | Out-File -LiteralPath $args[1] }, { ($args[0] | ConvertTo-Xml).InnerXml | Out-File -LiteralPath $args[1] }, { }, { }, { } ) $DetailScripts[10] = { } break } } $ReportObjects = @{} ForEach ($Level in $UnsplitDetail) { # Save the report $ReportObjects[$Level] = Invoke-Command -ScriptBlock $DetailScripts[$Level] Out-PermissionDetailReport -Detail $Level -ReportObject $ReportObjects -DetailExport $DetailExports -Format $Format -OutputDir $FormatDir -Culture $Culture -DetailString $DetailStrings } ForEach ($File in $ReportFiles) { if ($Subproperty -eq '') { $Subfile = $File } else { $Subfile = $File.$Subproperty } if ($FileNameProperty -eq '') { $FileName = $File.$FileNameSubproperty } else { $FileName = $File.$FileNameProperty.$FileNameSubproperty } $FileName = $FileName -replace '\\\\', '' -replace '\\', '_' -replace '\:', '' # Convert the list of permission groupings list to an HTML table $PermissionGroupings = $Subfile."$FormatString`Group" $Permissions = $Subfile.$FormatString $ReportObjects = @{} [Hashtable]$Params = $PSBoundParameters $Params['TargetPath'] = $File.Path $Params['NetworkPath'] = $File.NetworkPaths $Params['Split'] = $Split $Params['FileName'] = $FileName $HtmlElements = Get-HtmlReportElements @Params $BodyParams = @{ HtmlFolderPermissions = $Permissions.Div HtmlExclusions = $HtmlElements.ExclusionsDiv HtmlFileList = $HtmlElements.HtmlDivOfFiles ReportFooter = $HtmlElements.ReportFooter SummaryDivHeader = $HtmlElements.SummaryDivHeader DetailDivHeader = $HtmlElements.DetailDivHeader NetworkPathDiv = $HtmlElements.NetworkPathDiv } ForEach ($Level in $SplitDetail) { # Save the report $ReportObjects[$Level] = Invoke-Command -ScriptBlock $DetailScripts[$Level] } switch ($Format) { 'csv' { Out-PermissionDetailReport -Detail $SplitDetail -ReportObject $ReportObjects -DetailExport $DetailExports -Format $Format -OutputDir $FormatDir -Culture $Culture -DetailString $DetailStrings break } 'html' { Out-PermissionDetailReport -Detail $SplitDetail -ReportObject $ReportObjects -DetailExport $DetailExports -Format $Format -OutputDir $FormatDir -FileName $FileName -Culture $Culture -DetailString $DetailStrings break } 'js' { Out-PermissionDetailReport -Detail $SplitDetail -ReportObject $ReportObjects -DetailExport $DetailExports -Format $Format -OutputDir $FormatDir -FileName $FileName -Culture $Culture -DetailString $DetailStrings break } # Nothing for 'prtgxml' because it is an Unsplit detail level only 'xml' { Out-PermissionDetailReport -Detail $SplitDetail -ReportObject $ReportObjects -DetailExport $DetailExports -Format $Format -OutputDir $FormatDir -Culture $Culture -DetailString $DetailStrings break } } } } } } function Remove-CachedCimSession { param ( # Cache of CIM sessions and instances to reduce connections and queries [Hashtable]$CimCache = ([Hashtable]::Synchronized(@{})) ) ForEach ($CacheResult in $CimCache.Values) { if ($CacheResult) { $CimSession = $CacheResult['CimSession'] if ($CimSession) { $null = Remove-CimSession -CimSession $CimSession } } } } function Resolve-AccessControlList { # Wrapper to multithread Resolve-Acl # Resolve identities in access control lists to their SIDs and NTAccount names param ( # In-process cache to reduce calls to other processes or disk, and store repetitive parameters for better readability of code and logs [Parameter(Mandatory)] [ref]$Cache, # Properties of each Account to display on the report [string[]]$AccountProperty = @('DisplayName', 'Company', 'Department', 'Title', 'Description') ) $Log = @{ 'Cache' = $Cache } $Progress = Get-PermissionProgress -Activity 'Resolve-AccessControlList' -Cache $Cache $ACLsByPath = $Cache.Value['AclByPath'] $Paths = $ACLsByPath.Value.Keys $Count = $Paths.Count Write-Progress @Progress -Status "0% (ACL 0 of $Count)" -CurrentOperation 'Initializing' -PercentComplete 0 $ACEPropertyName = $ACLsByPath.Value.Values.Access[0].PSObject.Properties.GetEnumerator().Name $ResolveAclParams = @{ AccountProperty = $AccountProperty ACEPropertyName = $ACEPropertyName Cache = $Cache } $ThreadCount = $Cache.Value['ThreadCount'].Value if ($ThreadCount -eq 1) { [int]$ProgressInterval = [math]::max(($Count / 100), 1) $IntervalCounter = 0 $i = 0 Write-LogMsg @Log -Text "`$Cache.Value['AclByPath'].Value.Keys | %{ Resolve-Acl -ItemPath '`$_'" -Expand $ResolveAclParams -Suffix " } # for $Count ACLs" -ExpansionMap $Cache.Value['LogCacheMap'].Value ForEach ($ThisPath in $Paths) { $IntervalCounter++ if ($IntervalCounter -eq $ProgressInterval) { [int]$PercentComplete = $i / $Count * 100 Write-Progress @Progress -Status "$PercentComplete% (ACL $($i + 1) of $Count) Resolve-Acl" -CurrentOperation $ThisPath -PercentComplete $PercentComplete $IntervalCounter = 0 } $i++ # increment $i after Write-Progress to show progress conservatively rather than optimistically #Write-LogMsg @Log -Text "Resolve-Acl -ItemPath '$ThisPath'" -Expand $ResolveAclParams -ExpansionMap $Cache.Value['LogCacheMap'].Value Resolve-Acl -ItemPath $ThisPath @ResolveAclParams } } else { $SplitThreadParams = @{ Command = 'Resolve-Acl' InputObject = $Paths InputParameter = 'ItemPath' TodaysHostname = $Cache.Value['ThisHostname'].Value WhoAmI = $Cache.Value['WhoAmI'].Value LogBuffer = $Cache.Value['LogBuffer'] Threads = $ThreadCount ProgressParentId = $Progress['Id'] AddParam = $ResolveAclParams #DebugOutputStream = 'Debug' } Write-LogMsg @Log -Text 'Split-Thread' -Expand $SplitThreadParams Split-Thread @SplitThreadParams } Write-Progress @Progress -Completed } function Resolve-PermissionTarget { # Resolve each target path to all of its associated UNC paths (including all DFS folder targets) param ( # Path to the NTFS folder whose permissions to export [System.IO.DirectoryInfo[]]$TargetPath, # In-process cache to reduce calls to other processes or disk, and store repetitive parameters for better readability of code and logs [Parameter(Mandatory)] [ref]$Cache ) $Parents = $Cache.Value['ParentByTargetPath'] ForEach ($ThisTargetPath in $TargetPath) { Write-LogMsg -Text "Resolve-Folder -TargetPath '$ThisTargetPath' -Cache `$Cache" -Cache $Cache $Parents.Value[$ThisTargetPath] = Resolve-Folder -TargetPath $ThisTargetPath -Cache $Cache } } function Select-PermissionPrincipal { param ( # Regular expressions matching names of Users or Groups to exclude from the Html report [string[]]$ExcludeAccount, # Regular expressions matching names of Users or Groups to exclude from the Html report [string[]]$IncludeAccount, <# Domain(s) to ignore (they will be removed from the username) Intended when a user has matching SamAccountNames in multiple domains but you only want them to appear once on the report. Can also be used to remove all domains simply for brevity in the report. #> [string[]]$IgnoreDomain, # In-process cache to reduce calls to other processes or disk, and store repetitive parameters for better readability of code and logs [Parameter(Mandatory)] [ref]$Cache ) $Progress = Get-PermissionProgress -Activity 'Select-PermissionPrincipal' -Cache $Cache $PrincipalByID = $Cache.Value['PrincipalByID'] $IDs = $PrincipalByID.Value.Keys $Count = $IDs.Count Write-Progress @Progress -Status "0% (principal 0 of $Count) Select principals as specified in parameters" -CurrentOperation 'Ignore domains, and include/exclude principals based on name or class' -PercentComplete 0 $Type = [string] ForEach ($ThisID in $IDs) { if ( # Exclude the objects whose names match the regular expressions specified in the parameters [bool]$( ForEach ($ClassToExclude in $ExcludeClass) { $Principal = $PrincipalByID.Value[$ThisID] if ($Principal.SchemaClassName -eq $ClassToExclude) { $Cache.Value['ExcludeClassFilterContents'].Value[$ThisID] = $true $true } } ) -or # Exclude the objects whose names match the regular expressions specified in the parameters [bool]$( ForEach ($RegEx in $ExcludeAccount) { if ($ThisID -match $RegEx) { $Cache.Value['ExcludeAccountFilterContents'].Value[$ThisID] = $true $true } } ) -or # Include the objects whose names match the regular expressions specified in the -IncludeAccount parameter -not [bool]$( if ($IncludeAccount.Count -eq 0) { # If no regular expressions were specified, then return $true here # This will be reversed into a $false by the -not operator above # Resulting in the 'continue' statement not being reached, therefore this principal not being filtered out $true } else { ForEach ($RegEx in $IncludeAccount) { if ($ThisID -match $RegEx) { # If the account name matches one of the regular expressions, then return $true here # This will be reversed into a $false by the -not operator above # Resulting in the 'continue' statement not being reached, therefore this principal not being filtered out $true } else { $Cache.Value['IncludeAccountFilterContents'].Value[$ThisID] = $true } } } ) ) { continue } $ShortName = $ThisID ForEach ($IgnoreThisDomain in $IgnoreDomain) { $ShortName = $ShortName -replace "^$IgnoreThisDomain\\", '' } Add-PermissionCacheItem -Cache $Cache.Value['IdByShortName'] -Key $ShortName -Value $ThisID -Type $Type $Cache.Value['ShortNameByID'].Value[$ThisID] = $ShortName } Write-Progress @Progress -Completed } # Add any custom C# classes as usable (exported) types $CSharpFiles = Get-ChildItem -Path "$PSScriptRoot\*.cs" ForEach ($ThisFile in $CSharpFiles) { Add-Type -Path $ThisFile.FullName -ErrorAction Stop } Export-ModuleMember -Function @('Add-CachedCimInstance','Add-CacheItem','Add-PermissionCacheItem','ConvertTo-ItemBlock','ConvertTo-PermissionFqdn','Expand-Permission','Expand-PermissionTarget','Find-CachedCimInstance','Find-ResolvedIDsWithAccess','Find-ServerFqdn','Format-Permission','Format-TimeSpan','Get-AccessControlList','Get-CachedCimInstance','Get-CachedCimSession','Get-PermissionPrincipal','Get-PermissionTrustedDomain','Get-PermissionWhoAmI','Get-TimeZoneName','Initialize-Cache','Invoke-PermissionAnalyzer','Invoke-PermissionCommand','New-PermissionCache','Out-Permission','Out-PermissionFile','Remove-CachedCimSession','Resolve-AccessControlList','Resolve-PermissionTarget','Select-PermissionPrincipal') |