- Below is a summary of the computers, shares, and ACEs (Access Control Entries) associated with shares configured with excessive privileges.
+ Below is a summary of the computers, shares, and ACEs (Access Control Entries) associated with shares configured with excessive privileges.
$ExcessiveSharePrivsCount ACL entries, on $ExcessiveSharesCount shares, hosted by $ComputerWithExcessive computers were found configured with excessive privileges on the $TargetDomain domain. Overall, $IdentityReferenceListCount identities were assigned excessive privileges. Click the "Exposure Summary" or the titles on the cards below to explore the details.
In total, $RiskLevelCountCritical critical, $RiskLevelCountHigh high, $RiskLevelCountMedium medium, and $RiskLevelCountLow low risk ACE configurations were discovered across shares in the $TargetDomain Active Directory domain. The affected shares were found hosting $InterestingFilesAllObjectsSecretCount files that may contain passwords and $InterestingFilesAllObjectsSensitiveCount files that may contain sensitive data. Overall, $InterestingFilesAllFilesCount interesting files were found that could potentially lead to unauthorized data access or remote code execution. Click the chart titles below to explore the details.
Below are charts to help illustrate the share creation and last write timelines.
$CardCreationTimeLine
@@ -5432,44 +5392,41 @@ $CardLastModifiedTimeLine
$ComputerCount computers were found in the $TargetDomain Active Directory domain. Below is a list of the computers hosting shares configured with excessive privileges.
@@ -5967,8 +5905,6 @@ In the context of this report, excessive read and write share permissions have b
Below is a summary of the exposure associated with each of those groups.
-
-
@@ -6185,47 +6121,38 @@ Below is a summary of the exposure associated with each of those groups.
$AllSMBSharesCount shares were discovered across computers in the $TargetDomain Active Directory domain. $ShareNameChartCount shares were found configured with excessive privileges. Below is a summary of those shares grouped by name.
-
Risk Level relfects the exposure of credentials and sensitive data.
-
-
Share Count
Share Count is the number of unique shares with the same name.
-
-
Interesting Files
Interesting Files are filenames that may be sensitive.
-
-
-
-
-
-
-
1
-
1
-
1
-
1
-
-
-
1
-
1
-
1
-
1
-
-
-
-
-
-
@@ -6465,46 +6278,35 @@ This section lists the most common share owners.
Folder groups are SMB shares that contain the exact same file listing. Each folder group has been hashed so they can be quickly correlated. In some cases, shares with the exact same file listing may be related to a single application or process. This information can help identify the root cause associated with the excessive privileges and expedite remediation.
-
-
-
- Folder Groups Found
-
-
-
-
- $FolderGroupChartCount
-
+
+
+
+ Folder Groups Found
+
+
+
+ $FolderGroupChartCount
+
+
+
-
-
-
-
- Folder Group Count by Risk Level
-
-
+
-
-
-
- Exposed File Count by Category
-
-
+
-
-
+
Clear
-
+
How do I use this report?
-Follow the guidance below to get the most out of this report.
+Follow the guidance below to get the most out of this report. Click each step for more information.