

Security alert – why you need a data strategy for 2025.
Identify and eliminate the dangers of unchecked data growth. The question is not
migRaven.24/7 Based on the selected resource (e.g. a DFS drive), Analyzer clearly displays essential information on the data structure and the Active Directory. Data is classified and authorizations checked. This helps Administrators, data owners and possibly also users to gain an understanding of the data structures or their own data and to make informed decisions.
If obsolete data disappears from the productive area of the file server, in most cases IT administration becomes active. However, this situation is absurd because only the department or the file owner (data owner) is aware of the data content and can make a clear statement about the relevance and further use of files.
However, with the growing structures of thousands of files, the question of data owners within directories is anything but trivial.
In migRaven.24/7 the number of files per user is displayed in the File Owner tab. The user with the most files created is either the Data Owner himself or at least knows who it is from the circle of colleagues.
If the data owner of a directory has been determined, the data owner rights can be assigned to the corresponding user on the directory in one click. This gives the data owner the opportunity to give himself an overview of the files and the structure and can decide whether
The beginning of each optimization is the analysis of the current state: This report shows you therefore quickly and clearly, what is difficult to do with Windows on-board resources: Where in directories have deposited large amounts of data and how old this or the structure containing them are. In doing so, you set yourself from which period of time data should be considered obsolete or at least outdated and then see how many of the directories and files that exist on a share are correct or how large the occupied space of these files is. In addition, these values are presented in relation to the total amount of data - often with the result that 70% and more of the data could have been archived or deleted long ago.
Thanks to the Obsolete Data Report, you can purposefully take action against these mountains of data and thus increase the efficiency of all users in handling the file system.
The Obsolete Data Report from migRaven.24/7 shows you quickly and clearly what is difficult to do with Windows on-board resources: Where in directories have deposited large amounts of data and how old this or the structure containing them are.
The best practice analysis provides the administrator with detailed, important key figures regarding the Microsoft best practices compliance of the authorizations on der imported resource. Easily find out where, for example, permissions are too deep (more than 3 levels), inheritance is interrupted or users are directly authorized. This information is indispensable when preparing for a file server restructuring or when cleaning up the Active Directory!
In order to make the administration of authorizations as simple as possible, permissions should not be set too low. In doing so, level 3 of the directory structure has proved to be the optimal directory depth. Because every explicit level below level 1 makes it necessary that list permissions are also set up so that the user can even get to the actual directory. The report shows you in detail how deep the permissions in your environment are, and the resulting average level of privilege.
The break in inheritance should be avoided just like deny permissions. Even if it may seem sensible in certain situations, this procedure provokes additional effort in the further life cycle of the system, e.g. if it becomes necessary to inherit authorizations. The report shows you all broken inheritance. It is recommended that you always work according to the Least Privilege Principle: Ialways only grant as many authorizations as are actually required. This makes it necessary to reverse the view when assigning authorizations. Rights are not set from above, but from below. This means that, for example, on the level above an explicitly assigned Modify right, you only need list authorizations for this to work.
Another recommendation is to use groups to assign authorizations. Groups make it possible to assign rights for many users in the first place. Because Access Control Lists (ACL) are basically limited and performance problems can easily arise if too many ACLs available. The report shows how many users who are not administrators are directly authorized in an environment. According to best practice, you should work according to the AG-DL (or G, or U) -P principle: The account is assigned to a role group (G), this into authorization groups (DL) - this in turn becomes a member of the P (ACL).
However, it makes sense to dispense with the role group in certain cases, eg if the user combination is only needed for a single directory. Exactly then one uses A - () - DL-P - the users become the direct member in the authorization group. This ensures that no users are authorized directly in an ACL.
Orphaned ACEs occur when an account is deleted from the AD without removing the ACE entries. This is not a technical problem, but a "blemish" which of course also affects the reporting.
You are currently viewing placeholder content from X. To access the actual content, click the button below. Please note that data will be passed on to third parties.
More information