Skip to content

SMB Connector Overview

This connector (previously CIFS) enables you to use Data Access Security to access and analyze data stored in SMB and do the following:

  • Analyze the structure of your stored data.
  • Classify the data being stored.
  • Verify user permissions on the resources and compare them against requirements.

Installation Flow Overview

  1. Setup the prerequisites.

  2. Add a new SMB application to Data Access Security.

Collecting Data Stored in a Managed Application

The list below describes the high-level installation process required to collect and analyze data from an external application. Most of these should already be set up in your Data Access Security installation.

  1. Create an application in Data Access Security.

  2. Create a Virtual Appliance Cluster if utilizing Permission Collection, Crawler, or Data Classification.

Supported Versions

The Data Access Security Microsoft SMB Connector supports the following versions of Microsoft SMB and SMB Core:

2016, 2019, 2022, 2025

32 and 64-bit support for all versions.

SMB Operation Principles

Data Access Security connects to the SMB through SMB, collects the local users and groups, and analyzes the share and NTFS permissions on all the folders.

Business Resource Path

The full path of the business resource is the UNC shared path, rather than the physical path of the folder. The physical paths display since they are represented by the administrative shares (c, d...) and are treated in the same way as any other share on the server.

  • Crawler - The crawler crawls through all the shares and creates business resources with the share’s full path (\server_name\share\folder).

  • Permission Collector - The permissions collector analyzes share permissions, as well as NTFS permissions.

Resource Tree Structure

Physical paths that do not belong to a share are not displayed in Data Access Security.

The Business Resources tree is represented as follows:

  • [Application Name]

    • [Special / Admin Shares] (this includes C$ and any other volume configured on the endpoint)

    • [Share A]

    • [Share B]

Documentation Feedback

Feedback is provided as an informational resource only and does not form part of SailPoint’s official product documentation. SailPoint does not warrant or make any guarantees about the feedback (including without limitation as to its accuracy, relevance, or reliability). All feedback is subject to the terms set forth at https://developer.sailpoint.com/discuss/tos.