Solved

How to locate registry files for wireless PEAP settings?

Posted on 2008-10-28
8
3,390 Views
Last Modified: 2013-11-17
We have nearly 300 laptops that need to be set up with a wireless config (info below). I'd like to think there is a way to locate the registry keys, export them, and then push them over the network via a dropped patch. I would appreciate any assistance.

[Association Tab]
SSID: wireless
Network Authentication: WPA2
Data encryption: AES

[Authentication]
EAP type: Protected EAP (PEAP)
Uncheck the "Authenticate as computer when computer..."

I found the nirsoft wireless key view utility and the key that it exports (HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WZCSVC\Parameters\Interfaces), but I was unsuccessful in getting that to work. Nothing pulled up in the app window. My assumption is that the settings for this  in particular the PEAP  are not housed within the Zero Config settings of XP Pro.

Thoughts? Thanks in advance.
0
Comment
Question by:ayemac
  • 4
  • 4
8 Comments
 
LVL 3

Expert Comment

by:mrwalker15
ID: 22822898
You can use a free tool called MJ Registry Watcher to view all keys that are changed when you change the settings.
0
 

Author Comment

by:ayemac
ID: 22823092
Walker ~ I'll research and try that now. Thanks.

I wanted to update that I did try the wireless key view from nirsoft, and it did not provide a solution. I tested it by configuring the AP without PEAP, and the util worked fine. But when I bypass the keys and go to use PEAP, the util does not find it. Again, I'm assuming that's because there are no keys to export and Zero Config does not apply.
0
 
LVL 3

Expert Comment

by:mrwalker15
ID: 22823162
I believe it would be stored somewhere in the registry. If not, you could use a tool called filemon from sysinternals to check for all file activity. Also, have you tried using Group Policy to configure this?
0
 

Author Comment

by:ayemac
ID: 22823267
I would have thought the registry would have been my solution, too, but I have found nothing with the Registry Watcher so far. I started it, then configured the PEAP settings as originally posted, then reviewed and found nothing that was useful. I could be doing this wrong, too, though.

I'll attempt to use filemon now.

Haven't tried GPOs - I'm relatively naive about that, but a coworker is much more proficient. I'll review with him.
0
Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

 
LVL 3

Expert Comment

by:mrwalker15
ID: 22823452
0
 

Author Comment

by:ayemac
ID: 22823503
Filemon pulled a ton of changes, but none that I could make any sense out of. Most of them were to the system32 directory and no registry mentions.
0
 
LVL 3

Accepted Solution

by:
mrwalker15 earned 250 total points
ID: 22823579
I think the best route here will be to use GPO.
0
 

Author Closing Comment

by:ayemac
ID: 31513768
Walker ~ Sorry I haven't gotten back to this post yet. So that you know, I'm giving you the points - not because you're the only who responded but because you helped me narrow down what I could and could not do. All of the items you provided were excellent; they just couldn't work in our environment. Even the GPOs failed.

Anyway, we completed everything manually (10 minutes per machine) and have completed the task. I appreciate your time and efforts!
0

Featured Post

Maximize Your Threat Intelligence Reporting

Reporting is one of the most important and least talked about aspects of a world-class threat intelligence program. Here’s how to do it right.

Join & Write a Comment

The Samsung SSD 840 EVO and 840 EVO mSATA have a well-known problem with a drop in read performance. I first learned about this in an interesting thread here at Experts Exchange: http://www.experts-exchange.com/Hardware/Storage/Hard_Drives/Q_2852…
Sometimes a user will call me frantically, explaining that something has gone wrong and they have tried everything (read - they have messed it up more and now need someone to clean up) and it still does no good, can I help them?!  Usually the standa…
This Micro Tutorial will show you how to maximize your wireless card to its maximum capability. This will be demonstrated using Intel(R) Centrino(R) Wireless-N 2230 wireless card on Windows 8 operating system.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…

746 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

9 Experts available now in Live!

Get 1:1 Help Now