When undertaking a file migration project between Active Directory domains and forests, it's necessary to locate any EFS encrypted files in order to decrypt them prior to the decommissioning of the old domain and the loss of the keys.
I located this handy script that will identify encrypted files in a volume (just change the drive letter as necessary):
strComputer = "."
Set objWMIService = GetObject("winmgmts:" _
& "{impersonationLevel=impersonate}!\\" & strComputer & "\root\cimv2")
Set colFolders = objWMIService. _
ExecQuery("Select * from Win32_Directory where Drive='C:'" _
& " AND Encrypted=True")
For Each objFolder in colFolders
Wscript.Echo "Name: " & objFolder.Name
Wscript.Echo "Path: " & objFolder.Path
Next
Showing posts with label analyse. Show all posts
Showing posts with label analyse. Show all posts
Sunday, July 4, 2010
Monday, March 9, 2009
Sawmill Report Analyser
I have discovered today that Sawmill is a really cool tool for slicing and dicing data to produce useful analytical reporting information. Well worth a look if you want to produce reports from logged data from Proxies, RADIUS servers, Firewalls, Mail Server logs... you name it.
It has a bunch of preconfigured plug-ins for just about everything, will munch just about any log file you throw at it with quite reasonable performance and is very versatile in its configurability. Pretty cheap too!
I've known about the tool for a while, but never had a reall good play with it until today.
Disclaimer: I am in no way affiliated with Sawmill.
Subscribe to:
Comments (Atom)