![]() ![]() %SYSTEMROOT%\System32\WindowsPowerShell\v1.0\powershell.exe -File C:\Support\Scripts\INTEL-SA-00086.ps1 Having determined it’s quite hard to write the log files to a centralised store, I went old skool & set up a group policy that runs this batch file:Ĭopy \\domain.fqdn\netlogon\INTEL-SA-00086\INTEL-SA-00086.ps1 C:\Support\Scripts This is tricky because the tool is pretty much stand-alone it can’t natively write to a centralised file or anything, so each PC generates its own isolated log file. Having had this vulnerability flagged to us, we needed to figure out a way to run the detection tool against our estate.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |