Use Cases

Practical examples of how to use NTFS analysis – from GDPR requests to permission migration.

Typical Use Cases

The NTFS analysis in Docusnap365 supports many everyday and strategic tasks in IT operations. This chapter presents practical use cases where the module provides particular value — from quick ad-hoc analysis to compliance-related scenarios.

GDPR Information Requests

Question:
“What personal data is accessible to user X?”

Approach:

  • Open the analysis
  • Add the user via “Add Principal”
  • Activate filter to show only folders with effective permissions
  • Document permissions from the matrix as evidence (export or screenshot)

Goal: Fast, traceable answer per user — auditable and documented.

Preparing Internal or External Audits

Question:
“Are there uncontrolled special permissions or orphaned access rights?”

Approach:

  • Use quick analyses:
    • Explicit permissions
    • Disabled accounts
    • Unresolvable SIDs
    • Inheritance disabled
  • Filter by domain, system, or critical shares
  • Flag suspicious objects and hand over for cleanup

Goal: Quickly identify, document, and process anomalies as an action list.

Permission Migration or Restructuring

Question:
“What do the permissions look like today — and how can I compare them after changes?”

Approach:

  • Create an analysis package for the current state
  • After restructuring, scan again (same shares, same package)
  • Later compare differences using delta function (upcoming feature)
  • Export the matrix as before-and-after documentation

Tip: Even without delta, it’s useful to save matrix snapshots for each phase.

Permission Maintenance & Recertification

Question:
“Who has which rights in department XY — and why?”

Approach:

  • Filter analysis to the department’s shares
  • Review the matrix: principals, source of rights, context
  • Check higher-level group structures
  • Optionally: Export matrix and review with department leads

Goal: Create clarity and transparency — as a foundation for regular cleanup.

Review of External Permissions and Foreign Domains

Question:
“Are there users/groups from external environments accessing our resources?”

Approach:

  • Run the quick analysis “Permissions from Foreign Domains”
  • Investigate affected principals
  • Trace permissions via the matrix
  • If needed: Clean up or escalate to security officers

Goal: Identify and control security risks due to unwanted external access.

Summary

NTFS analysis is much more than a technical tool — it offers:

  • Quick answers for operational tasks
  • Clear evidence for audits and reviews
  • Structural foundations for security concepts
  • A consistent data base for future comparisons and automation

Use the matrix, filters, quick analyses, and principal focus flexibly — depending on your needs.