- Windows 8.1
- Windows XP / Vista / 7 / 8
- Windows Server 2012 R2
- Windows Server 2003 - 2012
(32 and 64 Bit)
News05 Sep 2014
Due to a corporate event, we will be out of office from 12 o'clock (CET). Please feel free to leave a message on the answering machine, via e-mail or our contact form.02 Sep 2014
TreeSize Free 3.1.1 released - Problems occuring during scans of NTFS drives have been fixed.27 Aug 2014
SpaceObServer Web Access V1.0.1 with shorter loading times, error logging and some minor fixes has been released.25 Aug 2014
ServerSentinel V3.1 - New actions, sensors and other improvements14 Aug 2014
ShellBrowser Delphi Edition V9.1.3 - The system font can be automatically applied to the Breadcrumb control.
Simple, fast, and compact folder permissions analysis with TreeSize
TreeSize offers you the opportunity to create fast, clear, and compact reports about access permissions on folders and files within a scanned directory.
With TreeSize you’ll be able to:
- Display all inherited permissions on folders
- Display general folder access permissions
- Get a clear and compact overview
- Indicate the type of rights within a tested directory (read, write, delete)
- Export all collected data to Excel or to an HTML, XML, or text file
Reports compiled with TreeSize include the display of all inherited permissions as well as an overview about general folder access rights within a tested directory. The column "Own Permissions" only shows the non-inherited permissions. In contrast, the column "Inherited Permissions" shows those permissions that were passed on e.g. to newly created folders. Thus, you can quickly identify folders which did not inherit all their permissions from their parent directories.
TreeSize presents the owner of each folder and file as well as all applicable permissions in a clear, compact, and easy to read format.
TreeSize also allows you to export all scan results into several data formats such as HTML, XML, text file, or even Excel. You’ll be able to create further analysis or special reports which may be used e.g. for security audits.