Solved

How to locate registry files for wireless PEAP settings?

Posted on 2008-10-28
8
3,504 Views
Last Modified: 2013-11-17
We have nearly 300 laptops that need to be set up with a wireless config (info below). I'd like to think there is a way to locate the registry keys, export them, and then push them over the network via a dropped patch. I would appreciate any assistance.

[Association Tab]
SSID: wireless
Network Authentication: WPA2
Data encryption: AES

[Authentication]
EAP type: Protected EAP (PEAP)
Uncheck the "Authenticate as computer when computer..."

I found the nirsoft wireless key view utility and the key that it exports (HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WZCSVC\Parameters\Interfaces), but I was unsuccessful in getting that to work. Nothing pulled up in the app window. My assumption is that the settings for this  in particular the PEAP  are not housed within the Zero Config settings of XP Pro.

Thoughts? Thanks in advance.
0
Comment
Question by:ayemac
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 4
  • 4
8 Comments
 
LVL 3

Expert Comment

by:mrwalker15
ID: 22822898
You can use a free tool called MJ Registry Watcher to view all keys that are changed when you change the settings.
0
 

Author Comment

by:ayemac
ID: 22823092
Walker ~ I'll research and try that now. Thanks.

I wanted to update that I did try the wireless key view from nirsoft, and it did not provide a solution. I tested it by configuring the AP without PEAP, and the util worked fine. But when I bypass the keys and go to use PEAP, the util does not find it. Again, I'm assuming that's because there are no keys to export and Zero Config does not apply.
0
 
LVL 3

Expert Comment

by:mrwalker15
ID: 22823162
I believe it would be stored somewhere in the registry. If not, you could use a tool called filemon from sysinternals to check for all file activity. Also, have you tried using Group Policy to configure this?
0
Space-Age Communications Transitions to DevOps

ViaSat, a global provider of satellite and wireless communications, securely connects businesses, governments, and organizations to the Internet. Learn how ViaSat’s Network Solutions Engineer, drove the transition from a traditional network support to a DevOps-centric model.

 

Author Comment

by:ayemac
ID: 22823267
I would have thought the registry would have been my solution, too, but I have found nothing with the Registry Watcher so far. I started it, then configured the PEAP settings as originally posted, then reviewed and found nothing that was useful. I could be doing this wrong, too, though.

I'll attempt to use filemon now.

Haven't tried GPOs - I'm relatively naive about that, but a coworker is much more proficient. I'll review with him.
0
 
LVL 3

Expert Comment

by:mrwalker15
ID: 22823452
0
 

Author Comment

by:ayemac
ID: 22823503
Filemon pulled a ton of changes, but none that I could make any sense out of. Most of them were to the system32 directory and no registry mentions.
0
 
LVL 3

Accepted Solution

by:
mrwalker15 earned 250 total points
ID: 22823579
I think the best route here will be to use GPO.
0
 

Author Closing Comment

by:ayemac
ID: 31513768
Walker ~ Sorry I haven't gotten back to this post yet. So that you know, I'm giving you the points - not because you're the only who responded but because you helped me narrow down what I could and could not do. All of the items you provided were excellent; they just couldn't work in our environment. Even the GPOs failed.

Anyway, we completed everything manually (10 minutes per machine) and have completed the task. I appreciate your time and efforts!
0

Featured Post

Guide to Performance: Optimization & Monitoring

Nowadays, monitoring is a mixture of tools, systems, and codes—making it a very complex process. And with this complexity, comes variables for failure. Get DZone’s new Guide to Performance to learn how to proactively find these variables and solve them before a disruption occurs.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

In this article you will get to know about pros and cons of storage drives HDD, SSD and SSHD.
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
This Micro Tutorial will show you how to maximize your wireless card to its maximum capability. This will be demonstrated using Intel(R) Centrino(R) Wireless-N 2230 wireless card on Windows 8 operating system.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…

726 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question