?
Solved

How to locate registry files for wireless PEAP settings?

Posted on 2008-10-28
8
Medium Priority
?
3,586 Views
Last Modified: 2013-11-17
We have nearly 300 laptops that need to be set up with a wireless config (info below). I'd like to think there is a way to locate the registry keys, export them, and then push them over the network via a dropped patch. I would appreciate any assistance.

[Association Tab]
SSID: wireless
Network Authentication: WPA2
Data encryption: AES

[Authentication]
EAP type: Protected EAP (PEAP)
Uncheck the "Authenticate as computer when computer..."

I found the nirsoft wireless key view utility and the key that it exports (HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WZCSVC\Parameters\Interfaces), but I was unsuccessful in getting that to work. Nothing pulled up in the app window. My assumption is that the settings for this  in particular the PEAP  are not housed within the Zero Config settings of XP Pro.

Thoughts? Thanks in advance.
0
Comment
Question by:ayemac
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 4
  • 4
8 Comments
 
LVL 3

Expert Comment

by:mrwalker15
ID: 22822898
You can use a free tool called MJ Registry Watcher to view all keys that are changed when you change the settings.
0
 

Author Comment

by:ayemac
ID: 22823092
Walker ~ I'll research and try that now. Thanks.

I wanted to update that I did try the wireless key view from nirsoft, and it did not provide a solution. I tested it by configuring the AP without PEAP, and the util worked fine. But when I bypass the keys and go to use PEAP, the util does not find it. Again, I'm assuming that's because there are no keys to export and Zero Config does not apply.
0
 
LVL 3

Expert Comment

by:mrwalker15
ID: 22823162
I believe it would be stored somewhere in the registry. If not, you could use a tool called filemon from sysinternals to check for all file activity. Also, have you tried using Group Policy to configure this?
0
Need protection from advanced malware attacks?

Look no further than WatchGuard's Total Security Suite, providing defense in depth against today's most headlining attacks like Petya 2.0 and WannaCry. Keep your organization out of the news with protection from known and unknown threats.

 

Author Comment

by:ayemac
ID: 22823267
I would have thought the registry would have been my solution, too, but I have found nothing with the Registry Watcher so far. I started it, then configured the PEAP settings as originally posted, then reviewed and found nothing that was useful. I could be doing this wrong, too, though.

I'll attempt to use filemon now.

Haven't tried GPOs - I'm relatively naive about that, but a coworker is much more proficient. I'll review with him.
0
 
LVL 3

Expert Comment

by:mrwalker15
ID: 22823452
0
 

Author Comment

by:ayemac
ID: 22823503
Filemon pulled a ton of changes, but none that I could make any sense out of. Most of them were to the system32 directory and no registry mentions.
0
 
LVL 3

Accepted Solution

by:
mrwalker15 earned 1000 total points
ID: 22823579
I think the best route here will be to use GPO.
0
 

Author Closing Comment

by:ayemac
ID: 31513768
Walker ~ Sorry I haven't gotten back to this post yet. So that you know, I'm giving you the points - not because you're the only who responded but because you helped me narrow down what I could and could not do. All of the items you provided were excellent; they just couldn't work in our environment. Even the GPOs failed.

Anyway, we completed everything manually (10 minutes per machine) and have completed the task. I appreciate your time and efforts!
0

Featured Post

Ransomware Attacks Keeping You Up at Night?

Will your organization be ransomware's next victim?  The good news is that these attacks are predicable and therefore preventable. Learn more about how you can  stop a ransomware attacks before encryption takes place with our Ransomware Prevention Kit!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I'm a big fan of Windows' offline folder caching and have used it on my laptops for over a decade.  One thing I don't like about it, however, is how difficult Microsoft has made it for the cache to be moved out of the Windows folder.  Here's how to …
DECT technology has become a popular standard for wireless voice communication. DECT devices are not likely to be affected by other electronic devices and signals because they operate in a separate frequency-band.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
Finding and deleting duplicate (picture) files can be a time consuming task. My wife and I, our three kids and their families all share one dilemma: Managing our pictures. Between desktops, laptops, phones, tablets, and cameras; over the last decade…

752 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question