Documentation forAccess Rights Manager

Report: Who has access where?

Managers and team leads know best who should have access to resources in your organization. Understanding your employee's access rights is extremely important, especially for sensitive resources. The Who has access where report provides an overview of all users and their access to your network resources.

This report assists managers in making information-based decisions regarding two central questions:

  • Who should have access to what? (increase in data security)
  • Which access rights should exist? (improvement of data integrity)

Start the report

After you log in to ARM, you can access the report through the Start or Resources tab in the toolbar. When you are finished, configure and generate the report.

Start the report through the Start tab

  1. Log in to the Access Rights Manager application.

  2. Click Start in the toolbar.

  3. Under Documentation and Reporting, click Who has access where.

  4. Configure and generate the report.

Select the report through the Resources tab

  1. Log in to the Access Rights Manager application.

  2. Click the Resources tab.

  3. Right-click a directory that you are responsible for and select Report: Who has access where.

  4. Configure and generate the report.

Configure and generate the report

  1. In the Who has access where screen under Report configuration, enter a title and comment for this report. The selected resource automatically populates the list of objects to be analyzed. You can add additional resources, if needed.

  2. Click the Details drop-down menu and set the report options. SolarWinds recommends selecting the options shown below for a first-run report.

  3. (Recommended) Click the Group settings drop-down menu and select Usersview to reduce the report complexity.

  4. Click the Settings drop-down menu and set the output options. For example, you can schedule and set the report to be sent to you by email on a scheduled basis.

  5. Click Start to generate the report.

Report example

Below is an example of a Who has access where report. This report allows data owners to verify whether the listed users should have access to specific network resources.

Ensure that the access rights of some users cannot be reduced—for example, from Full access to Read or Modify. This ensures a higher level of data integrity in the report.

See the following sections for more information: