Automating the retrieval and analysis of access information using accesschk.exe
Project description
Automating the retrieval and analysis of access information using accesschk.exe
pip install accesschk2df
Tested against Windows 10 / Python 3.10 / Anaconda 3
Individuals or organizations working with access control and security configurations can benefit from using this Python module by automating the retrieval and analysis of access information using accesschk.exe and leveraging the flexibility and functionality of Python and pandas for further data processing and analysis.
accesschk.exe is a command-line tool developed by Microsoft that is used to view and analyze the security settings and access permissions of various system resources, such as files, directories, registry keys, services, and more. It provides detailed information about access control lists (ACLs) and user privileges for specific resources.
This module utilizes the accesschk.exe tool to retrieve access information and convert it into a pandas DataFrame. By using this module, individuals or organizations working with access control and security configurations can programmatically access and analyze access permissions in a more convenient and automated manner.
Advantages of using this Python module include:
Automation: The module allows for the automation of accesschk.exe functionality through Python code, enabling users to retrieve and process access information programmatically.
Integration: The module integrates the functionality of accesschk.exe with pandas, a popular data manipulation library in Python. This enables users to easily perform further data analysis, transformations, and visualizations on the access information using pandas' extensive capabilities.
Flexibility: Python provides a wide range of data analysis and processing libraries, making it easier to integrate the access information with other data sources and perform complex analyses or combine it with additional security-related tasks.
Reproducibility: By using Python code, users can document and reproduce their access information retrieval and analysis workflows. This is especially useful for auditing, troubleshooting, or creating reports related to access permissions.
df = get_accesschk_df()
# print(df[:3].to_string())
# aa_pid aa_exe aa_rights aa_path
# 0 592 lsass.exe RW NT-AUTORITT\SYSTEM
# 1 592 lsass.exe RW VORDEFINIERT\Administrators
# 2 84 svchost.exe R VORDEFINIERT\Administrators
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
File details
Details for the file accesschk2df-0.10.tar.gz
.
File metadata
- Download URL: accesschk2df-0.10.tar.gz
- Upload date:
- Size: 1.1 MB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/4.0.2 CPython/3.10.10
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | 31af7948f4f09772365edd7f3efe39bfb869cbb96668c48a0b4b45c73f1aecfd |
|
MD5 | 15d851499df68ba4b1a09502711fb9d6 |
|
BLAKE2b-256 | 7977c9564d0f93f339563508d24bb034d5cd7080d65b0f1163c705c75e4846ec |
File details
Details for the file accesschk2df-0.10-py3-none-any.whl
.
File metadata
- Download URL: accesschk2df-0.10-py3-none-any.whl
- Upload date:
- Size: 1.1 MB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/4.0.2 CPython/3.10.10
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | e30d8e165e445faae95ca6c359631da3b079f01002773354403779b5151247fa |
|
MD5 | c9112b7d7aecfb44bd95468a7d1143ad |
|
BLAKE2b-256 | 05ab13c512beda57285f0b4c8da83ee8e5d3b830d774da56e96fe391c1a483af |