Loading |
VBScript |
JavaScript |
Powershell |
Search Options: WMI Win32_LogicalFileAuditing QueryContent of WMI Win32_LogicalFileAuditing Query.jsMD5 Hash: BB296B2D9E0385B24ADF5D084A17C9F0 |
||
var wbemFlagReturnImmediately = 0x10;
var wbemFlagForwardOnly = 0x20; var arrComputers = new Array("."); for (i = 0; i < arrComputers.length; i++) { WScript.Echo(); WScript.Echo("=========================================="); WScript.Echo("Computer: " + arrComputers[i]); WScript.Echo("=========================================="); var objWMIService = GetObject("winmgmts:\\\\" + arrComputers[i] + "\\root\\CIMV2"); var colItems = objWMIService.ExecQuery("SELECT * FROM Win32_LogicalFileAuditing", "WQL", wbemFlagReturnImmediately | wbemFlagForwardOnly); var enumItems = new Enumerator(colItems); for (; !enumItems.atEnd(); enumItems.moveNext()) { var objItem = enumItems.item(); WScript.Echo("AuditedAccessMask: " + objItem.AuditedAccessMask); WScript.Echo("GuidInheritedObjectType: " + objItem.GuidInheritedObjectType); WScript.Echo("GuidObjectType: " + objItem.GuidObjectType); WScript.Echo("Inheritance: " + objItem.Inheritance); WScript.Echo("SecuritySetting: " + objItem.SecuritySetting); WScript.Echo("Trustee: " + objItem.Trustee); WScript.Echo("Type: " + objItem.Type); } } | ||
© 2008 - 2013 Boris Toll :: Scripts available: 6.481 :: :: scriptbox.toll.at :: :: powered by www.toll.at :: |