Solved

How to locate registry files for wireless PEAP settings?

Posted on 2008-10-28
8
3,481 Views
Last Modified: 2013-11-17
We have nearly 300 laptops that need to be set up with a wireless config (info below). I'd like to think there is a way to locate the registry keys, export them, and then push them over the network via a dropped patch. I would appreciate any assistance.

[Association Tab]
SSID: wireless
Network Authentication: WPA2
Data encryption: AES

[Authentication]
EAP type: Protected EAP (PEAP)
Uncheck the "Authenticate as computer when computer..."

I found the nirsoft wireless key view utility and the key that it exports (HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WZCSVC\Parameters\Interfaces), but I was unsuccessful in getting that to work. Nothing pulled up in the app window. My assumption is that the settings for this  in particular the PEAP  are not housed within the Zero Config settings of XP Pro.

Thoughts? Thanks in advance.
0
Comment
Question by:ayemac
  • 4
  • 4
8 Comments
 
LVL 3

Expert Comment

by:mrwalker15
ID: 22822898
You can use a free tool called MJ Registry Watcher to view all keys that are changed when you change the settings.
0
 

Author Comment

by:ayemac
ID: 22823092
Walker ~ I'll research and try that now. Thanks.

I wanted to update that I did try the wireless key view from nirsoft, and it did not provide a solution. I tested it by configuring the AP without PEAP, and the util worked fine. But when I bypass the keys and go to use PEAP, the util does not find it. Again, I'm assuming that's because there are no keys to export and Zero Config does not apply.
0
 
LVL 3

Expert Comment

by:mrwalker15
ID: 22823162
I believe it would be stored somewhere in the registry. If not, you could use a tool called filemon from sysinternals to check for all file activity. Also, have you tried using Group Policy to configure this?
0
Easy, flexible multimedia distribution & control

Coming soon!  Ideal for large-scale A/V applications, ATEN's VM3200 Modular Matrix Switch is an all-in-one solution that simplifies video wall integration. Easily customize display layouts to see what you want, how you want it in 4k.

 

Author Comment

by:ayemac
ID: 22823267
I would have thought the registry would have been my solution, too, but I have found nothing with the Registry Watcher so far. I started it, then configured the PEAP settings as originally posted, then reviewed and found nothing that was useful. I could be doing this wrong, too, though.

I'll attempt to use filemon now.

Haven't tried GPOs - I'm relatively naive about that, but a coworker is much more proficient. I'll review with him.
0
 
LVL 3

Expert Comment

by:mrwalker15
ID: 22823452
0
 

Author Comment

by:ayemac
ID: 22823503
Filemon pulled a ton of changes, but none that I could make any sense out of. Most of them were to the system32 directory and no registry mentions.
0
 
LVL 3

Accepted Solution

by:
mrwalker15 earned 250 total points
ID: 22823579
I think the best route here will be to use GPO.
0
 

Author Closing Comment

by:ayemac
ID: 31513768
Walker ~ Sorry I haven't gotten back to this post yet. So that you know, I'm giving you the points - not because you're the only who responded but because you helped me narrow down what I could and could not do. All of the items you provided were excellent; they just couldn't work in our environment. Even the GPOs failed.

Anyway, we completed everything manually (10 minutes per machine) and have completed the task. I appreciate your time and efforts!
0

Featured Post

Announcing the Most Valuable Experts of 2016

MVEs are more concerned with the satisfaction of those they help than with the considerable points they can earn. They are the types of people you feel privileged to call colleagues. Join us in honoring this amazing group of Experts.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Today sees the launch of a new case study, focusing on BYOD technologies we have been working with for some time now.  But with the advent of 802.11ac wireless technologies and the story behind our landmark developments, we would like to share this …
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
This Micro Tutorial will show you how to maximize your wireless card to its maximum capability. This will be demonstrated using Intel(R) Centrino(R) Wireless-N 2230 wireless card on Windows 8 operating system.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…

838 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question