Skip to content

Releases: canix1/ADACLScanner

ADACLScanner 6.8

17 Aug 11:40
Compare
Choose a tag to compare

Version: 6.8

17 August, 2021

Fixed issues

  • Missing icons in the browsing view from release 6.8

ADACLScanner 6.7

08 Aug 00:10
5aadc0d
Compare
Choose a tag to compare

Version: 6.7

08 August, 2021

SHA256: 555662D4CCBB940D87869E6295EC7CC74BB85D8C8FC5916EC34D1226704578C5

Fixed issues

  • Updated the download function for templates

ADACLScanner 6.6

07 Aug 22:08
f470690
Compare
Choose a tag to compare

Version: 6.6

08 August, 2021

SHA256: C957D0BAF9072864F8E62924F975CE635B1A6620EBEBBA3BCFBBD3A2B962556E

Fixed issues

  • Issues with empty rows in HTML report

ADACLScanner 6.5

07 Aug 21:01
70e871b
Compare
Choose a tag to compare

07 August, 2021

SHA256: 497D6E35D5BE916D1401B405266B2D931F3E1F364E9136D82F19DB516B74F183

Updates

  • Add option for showing color coded criticality from command line

Fixed issues

  • Issues with Referenced Assemblies System.Drawing
  • Issues with PowerShell version checking
  • Issues with searching for foreign security principals

ADACLScanner 6.4

08 Jan 09:03
Compare
Choose a tag to compare

Updates

  • Update with latest OS/Schema versions numbers

Fixed issues

  • Minor fixes

ADACLScanner 6.3

27 Apr 06:58
Compare
Choose a tag to compare

Fixed issues

  • Effective rights scan from cli did not include inherited permission

ADACLScanner 6.1

29 Feb 09:12
Compare
Choose a tag to compare

Fixed issues

  • Legend does not match result

ADACLScanner 6.0

09 Feb 00:04
Compare
Choose a tag to compare

This is a major update to the UI . Most of the functions has been made available through the command line.
A new thing is that it is possible to scan linked Group Policy Objects.
To simplify the assessment and the hunt for high privileged accounts it is possible to filter on criticality of the ACE's. If the builtin groups is not of interest it's possible to filter them out.

Normally only the objects in the ACL's that are shown in the report, but now you can perform a recursive find on group members too. This will show all principals that have the permission in the report.
.\ADACLScan.ps1 -b "ou=corp,dc=contoso,dc=com" -RecursiveFind | ft

if you like you can filter the group members to only user objects:
.\ADACLScan.ps1 -b "ou=corp,dc=contoso,dc=com" -RecursiveFind -RecursiveObjectType User | ft