SECURITY.EXE equivalent information in NetWare 4.x and 5.x - TID10024879 (last modified 09OCT2002)
Click here if this does not solve your problem
Reader Rating from 5 ratings
10024879 10024879 10024879 goal
SECURITY.EXE equivalent information in NetWare 4.x and 5.x
fix
The following is a batch file to collect administration information on security issues on a server and tree. This is meant to be similar information that was obtained from the SECURITY.EXE utility that shipped with netware 3.x and was found in the SYS:SYSTEM directory.
The following information was returned from the security utility: Accounts with password expired, No full name, No password, Account disabled, Last login older then 3 weeks, Security equal to supervisor, Supervisor rights to file system.
How to show users that have no password expiration date.
How to show expired dates on passwords before a certain date.
How to show users with No Full name.
How to show users that had require a password set to YES at some point and it was changed to NO
How to show users that were created and had no password required.
How to show users where the account disabled was never created.
How to show users that have their account disabled whether NO or YES
How to show user account expiration dates before a certain date.
How to show user accounts that have an expiration date and the dates.
How to show user accounts that have never logged in.
How to show users accounts that have not logged in since a certain date.
How to show any user that has a security equal to the admin (Other objects that can give users full rights and are useful to check are [root] and containers and server object and volume objects etc.)
How to list all explicit ACL trustees, (requires you to look in text for supervisor or write rights.)
How to find explicit file system granted Trustee rights
The following commands will collect this information, login as admin and CX to [ROOT] and use the /S command to get more then current container.
NLIST User SHOW "Date Password Expires" ;This will show user that have no password expiration date.
NLIST User WHERE "Date Password Expires" LT 01/10/2000 ;This shows passwords expired dates before 01/10/2000 modify this date per needs.
NLIST User WHERE "Full Name" NEXISTS ; This will show users with No Full name.
NLIST User SHOW "Require a Password" ; This will show users that had require set to YES at some point and it was changed to NO
NLIST User WHERE "Require a Password" NEXISTS ; This will show users that were created and had no password required.
NLIST User WHERE "Account Disabled" NEXISTS ; This will show users where the account disabled was never created.
NLIST User SHOW "Account Disabled" ; This will show all users that have the account disabled whether NO or YES
NLIST User WHERE "Account Has Expiration Date" LT 01/10/2000 ; This will show expiration dates before that date.
NLIST User SHOW "Account Has Expiration Date" ; This will show accounts if they have an expiration date and the dates.
NLIST User WHERE "Last Login Time" NEXISTS ;This is useful to show accounts that have never logged in.
NLIST User WHERE "Last Login Time" LT 12/12/1999 ;This will show users that have not logged in since that date.
NLIST User WHERE "Security Equal To" EQ .admin.novell ;This shows any user that has a security equal to the admin Other objects that can give users full rights and are useful to check are [root] and containers and server object and volume objects etc.
NLIST User WHERE "Security Equal To" EQ .NW411_LAB148.NOVELL /S >> C:\secure.txt ;Change the server object to match your server
NLIST User WHERE "Security Equal To" EQ .NW411_LAB148_SYS.NOVELL /S >> C:\secure.txt ;Change the volume object to match yours
NLIST Organization SHOW "Object Trustees (ACL) /S >> C:\secure.txt ;This will list all explicit trustees, requires you to look in text for supervisor or write rights.
NLIST "Organizational Unit" SHOW "Object Trustees (ACL)" /S >> C:\SECURE.TXT ;Same as above
Rights /T /S ;This will show explicit granted file system rights.
**Again remember that with the NLIST commands you can change context to [ROOT] or any level of container with CX.exe and then use the /S at the end of the command to search down the tree from there. Also you can pipe the results of these commands to a file using > C:\secure.txt or append with >>.