Not to put too blunt of a point on it, guys, but
you're really making this a lot harder than it needs
to be.  I have a script that goes out across the
domain to check the Run key from each system...it
isn't all that hard.

I was particularly shocked by John's (of
HawthorneSavings) response.  After all, this is a list
for Admins, and most admins should be aware that
checking for the AutoAdminLogon value in the Registry
key isn't the same thing as checking to see who's
logged on to the machine.

> Any suggestions for performing the following?
> 1. Enumerate all domain members (NT not AD) 2. Read
> all values in
> HKLM\SOFTWARE\Microsoft\Windows
> NT\CurrentVersion\Winlogon 3. Record all
> these values (CSV or text)

I've attached two files...wksdump.pl and regchk.pl. 
Wksdump.pl uses Win32::Lanman to dump the workstation
accounts from the NT domain.  Use redirection to send
it to a file called "wksdump.log".  Regchk.pl is the
script I use to query the Run key from each machine. 
I haven't include 'regchk.dat', as that's simply a
list of known-good entries, to keep my resulting
output file smaller.  

However, the concept is the same, given Mike's rather
specific request.  Win32::TieRegistry is part of the
standard distro.  

I hope this helps.  If anyone has any questions,
please feel free to contact me.

Thanks,

Harlan

Attachment: wksdump.pl
Description: wksdump.pl

Attachment: regchk.pl
Description: regchk.pl

Reply via email to