I just wrote a script to search for and collect specific file types on a user's machine and copy them to a specific server share.
We are having a legal discovery and have to provide all (doc/xls/etc) scanned from a user's machine and provided to our legal dept.
The script uses robocopy to search for files and save the filepaths/names which is then used to feed a copy routine with some logic to ensure that no files are overwritten if the filenames are the same in the destination folder. (@ticks+$filename.ext)
Registered: 2003-01-28
Posts: 4396
Loc: New Jersey
Couple of concurrent projects: SendMail service - monitors a folder and sends mail messages based on content. Interfaces to a web site. MailSig - generates an email signature file in HTML based on AD settings MailArch - disable and move PST to a central location to facilitate an Exchange archiving project. KGen/Sanity - updates to the KGen UDF resolver and the Sanity UDF SWProcD - a windows service that synchronizes folders containing software install folders between a master site and our branch offices. It also migrates log files back to the central server for consolidation. Same service runs on each server and interfaces with the Unison sync utility.
Oh, and my latest favorite - the script that enumerates all user's home and profile folders looking for unauthorized media files (music, video, and photo) and removes them. Bwa-ha-ha-ha!
Evil Admi - er.. Glenn
_________________________ Actually I am a Rocket Scientist!
Registered: 2005-01-17
Posts: 1895
Loc: Hilversum, The Netherlands
My Latest is a script that checks all Computer objects on my site, checks if online, then gets the PN and SN from WMI, and check them on a HP website to see if the CarePack is still active. Then write it to a log.
Why you changing AV? I wanted to, but the costs to switch to another vendor are just as bad as Symantec. Was going to try and maybe go with ESET/NOD32 but by the time you get everything in place you're not saving any money and their support is no better than Symantec (at least in my limited experience with them).
You removing Symantec cleanly or hacking it out? I might have some stuff for you if you're hacking it out.
Registered: 2000-11-27
Posts: 1222
Loc: Gothenburg, Sweden
Doing a similar thing as Glenn with the MailSig thing, but generating images with ImageMagick instead since I've grown tired of Outlook's HTML support and all crafty colleagues that think they're god sent graphic designers
@Allen, I suffer with you hehe... But have faith, Symantec has a command line tool for this called CleanWipe. It's their own tool and the best way to completely remove Symantec products.
Others have already answered the question, numerous times and in multiple posts (and at least once in this post). Sandeep is requesting the case number so he can track down the call and work out what happened and find out why the caller couldn't get a copy of cleanwipe.
The standard way to get CleanWipe is to raise a call with support. All support engineers should know about it (if they search our internal KB they will find it). I cannot see us posting CleanWipe to the public site any time soon due its sheer effectiveness at removing our product. If people need a copy, then please log a call (you can do this online using mysupport.symantec.com) - if you haven't had a reply after 24 hours please post your case reference here and one of us will follow up.
Please note that we would only recommend using CleanWipe as the final solution for removal of our product, the proper uninstallation routines should always be tried first.
Actually I'm using two registry changes to eliminate it asking for the uninstall password. Then, and this is the part I have not tested just yet, I will either use psexec or wmi to run the uninstaller on each machine.
Version 11 sucks, IMHO. It's slow, the management is clunky, and it seems every time you turn around Symantec is raising prices. I'm most likely going to point my customers to Sunbelt Software's Vipre Enterprise. They are even offering competitive upgrades right now too.
Was curious if the removal of that key actually worked to not ask for the password. Back about 5 years ago there was no such key so you had to really hack it even more.
I keep thinking about making my own removal tool, but each time I end up just doing a quickie hack/slash removal and never make a real removal tool...
Too many distractions and other real work. So - some day
I don't remember which one was the last... hmm... lately, I've been writing kix-scripts that have been sold to audience as full blown software and I haven't gained on them.
those include automated laptop backup software (similar to rads in the first post), electric-bill-service-management (e-bill, the finnish postal service something something) and so forth.
anyhow, lately been coding days in and out with VB and end is not nead. I estimate at least 2 weeks of headache full days before the asp code is ready...
Registered: 2001-01-03
Posts: 6241
Loc: Tigard, OR
I created a KiXForms script to take an MD5 Hash and decrypt it for logins.
It uses an excutable that is external to it and places the result into a window..
I then created another KiXForms script that gives the ability to set accounts active from a D Status to an A Status. An interface so simple that we now have the Receptionist re-enable accounts and we don't have to fire up Enterprise Manager for our clients.