Skip to main content

Automating the retrieval and analysis of access information using accesschk.exe

Project description

Automating the retrieval and analysis of access information using accesschk.exe

pip install accesschk2df

Tested against Windows 10 / Python 3.10 / Anaconda 3

Individuals or organizations working with access control and security configurations can benefit from using this Python module by automating the retrieval and analysis of access information using accesschk.exe and leveraging the flexibility and functionality of Python and pandas for further data processing and analysis.

accesschk.exe is a command-line tool developed by Microsoft that is used to view and analyze the security settings and access permissions of various system resources, such as files, directories, registry keys, services, and more. It provides detailed information about access control lists (ACLs) and user privileges for specific resources.

This module utilizes the accesschk.exe tool to retrieve access information and convert it into a pandas DataFrame. By using this module, individuals or organizations working with access control and security configurations can programmatically access and analyze access permissions in a more convenient and automated manner.

Advantages of using this Python module include:

Automation: The module allows for the automation of accesschk.exe functionality through Python code, enabling users to retrieve and process access information programmatically.

Integration: The module integrates the functionality of accesschk.exe with pandas, a popular data manipulation library in Python. This enables users to easily perform further data analysis, transformations, and visualizations on the access information using pandas' extensive capabilities.

Flexibility: Python provides a wide range of data analysis and processing libraries, making it easier to integrate the access information with other data sources and perform complex analyses or combine it with additional security-related tasks.

Reproducibility: By using Python code, users can document and reproduce their access information retrieval and analysis workflows. This is especially useful for auditing, troubleshooting, or creating reports related to access permissions.

df = get_accesschk_df()
# print(df[:3].to_string())
#    aa_pid       aa_exe aa_rights                      aa_path
# 0     592    lsass.exe        RW           NT-AUTORITT\SYSTEM
# 1     592    lsass.exe        RW  VORDEFINIERT\Administrators
# 2      84  svchost.exe         R  VORDEFINIERT\Administrators

Project details


Release history Release notifications | RSS feed

This version

0.10

Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

accesschk2df-0.10.tar.gz (1.1 MB view details)

Uploaded Source

Built Distribution

accesschk2df-0.10-py3-none-any.whl (1.1 MB view details)

Uploaded Python 3

File details

Details for the file accesschk2df-0.10.tar.gz.

File metadata

  • Download URL: accesschk2df-0.10.tar.gz
  • Upload date:
  • Size: 1.1 MB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/4.0.2 CPython/3.10.10

File hashes

Hashes for accesschk2df-0.10.tar.gz
Algorithm Hash digest
SHA256 31af7948f4f09772365edd7f3efe39bfb869cbb96668c48a0b4b45c73f1aecfd
MD5 15d851499df68ba4b1a09502711fb9d6
BLAKE2b-256 7977c9564d0f93f339563508d24bb034d5cd7080d65b0f1163c705c75e4846ec

See more details on using hashes here.

File details

Details for the file accesschk2df-0.10-py3-none-any.whl.

File metadata

  • Download URL: accesschk2df-0.10-py3-none-any.whl
  • Upload date:
  • Size: 1.1 MB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/4.0.2 CPython/3.10.10

File hashes

Hashes for accesschk2df-0.10-py3-none-any.whl
Algorithm Hash digest
SHA256 e30d8e165e445faae95ca6c359631da3b079f01002773354403779b5151247fa
MD5 c9112b7d7aecfb44bd95468a7d1143ad
BLAKE2b-256 05ab13c512beda57285f0b4c8da83ee8e5d3b830d774da56e96fe391c1a483af

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page