Solved

Stinger & Login Script

Posted on 2004-10-01
10
1,032 Views
Last Modified: 2008-02-01
Hi

I don't know if it's the right section ;-)

I will user NAI's stinger within a login script. My question is how to handle the log files. Stinger allows with it's options to run it in silent mode (no user interaction) and with creating a log file. But the file is always called stinger.txt. How can i script that stinger creates a file like %computername%.txt - so i can find my most infected clients by checking the file size. My antivirus solution is trendmicro officescan - but some worms or trojans aren't detected by this. stinger does ....

Any ideas?
0
Comment
Question by:dipich
  • 3
  • 2
  • 2
  • +1
10 Comments
 
LVL 4

Expert Comment

by:ferg-o
ID: 12205208
Try NAI support. Not trying to diss you but they have answers to these questions.

Rgds.
0
 
LVL 4

Expert Comment

by:itcnbwise
ID: 12207289
Write a batch file that runs after stinger in your login script.  Then try this line:

rename stinger.txt <computername>.txt

0
 
LVL 23

Accepted Solution

by:
Tim Holman earned 125 total points
ID: 12208322
This script should do the trick:

c:\stinger /go /adl /log /silent
ren c:\stinger.txt %computername%.txt


0
Three Reasons Why Backup is Strategic

Backup is strategic to your business because your data is strategic to your business. Without backup, your business will fail. This white paper explains why it is vital for you to design and immediately execute a backup strategy to protect 100 percent of your data.

 
LVL 4

Expert Comment

by:itcnbwise
ID: 12208346
That's what I posted.  You just changed "rename" to "ren".
0
 

Author Comment

by:dipich
ID: 12208434
Thanks

I'll try this script on monday. I hope it works - because stinger takes a lot of time. How will a batch file handel if this takes a few minutes?

@echo off
copy \\server\share\stinger.exe c:\
c:\stinger /go /adl /log /silent
ren c:\stinger.txt %computername%.txt
copy %computername%.txt \\server\share\logs\
del stinger.exe
del %computername%.txt

0
 
LVL 23

Expert Comment

by:Tim Holman
ID: 12212660
> That's what I posted.  You just changed "rename" to "ren".

No it wasn't - you missed out the % on either end of computername....  ;)



0
 
LVL 23

Expert Comment

by:Tim Holman
ID: 12212676
Also, you need %%, not % in your batch file for it to work...

for example:

ren c:\stinger.txt %%computername%%.txt
0
 

Author Comment

by:dipich
ID: 12247958
Hi Guys

teh first scripts failed - but nuw it works.

and my working script looks like the following one :

@echo off
c:
copy \\server\stinger$\stinger.exe c:\
c:\stinger.exe /go /adl /log /silent
ren c:\stinger.txt %computername%.txt
copy %computername%.txt \\server\stinger$
del c:\stinger.exe
del c:\%computername%.txt

this is an onw script called in my loginscript.

have a try
0

Featured Post

Enterprise Mobility and BYOD For Dummies

Like “For Dummies” books, you can read this in whatever order you choose and learn about mobility and BYOD; and how to put a competitive mobile infrastructure in place. Developed for SMBs and large enterprises alike, you will find helpful use cases, planning, and implementation.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Pop culture is prime bait for hackers seeking to infect user’s computers and mobile devices with malicious malware. Hackers know exactly what the latest trends are online and know how to use them to their advantage.
Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks.  Concludes by examining the means of securing and protecting critical systems and inf…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

778 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question