Avatar of USSteel
USSteel
Flag for United States of America asked on

Registry Key or Files to detect bootleg copy of Windows?

I'm interested in blocking VPN connections from pirated copies of Windows.

Are there any files or registry keys I could search for on a client to indicate a copy of Windows hasn't been activated or has failed the Windows Genuine Authentication?
Windows 7Windows XPVPN

Avatar of undefined
Last Comment
David Johnson, CD

8/22/2022 - Mon
ASKER CERTIFIED SOLUTION
motnahp00

Log in or sign up to see answer
Become an EE member today7-DAY FREE TRIAL
Members can start a 7-Day Free trial then enjoy unlimited access to the platform
Sign up - Free for 7 days
or
Learn why we charge membership fees
We get it - no one likes a content blocker. Take one extra minute and find out why we block content.
Not exactly the question you had in mind?
Sign up for an EE membership and get your own personalized solution. With an EE membership, you can ask unlimited troubleshooting, research, or opinion questions.
ask a question
USSteel

ASKER
Hmm, I'll take a look at that and see if it works.

I'm using Cisco's ASA for VPN.  There is an endpoint assessment portion of the client that can do basic checks for files, registry keys, etc.

I'm trying to evaluate if some of the features I am desiring (like evaluating if the OS is pirated) are available using the basic endpoint assessment.
SOLUTION
David Johnson, CD

Log in or sign up to see answer
Become an EE member today7-DAY FREE TRIAL
Members can start a 7-Day Free trial then enjoy unlimited access to the platform
Sign up - Free for 7 days
or
Learn why we charge membership fees
We get it - no one likes a content blocker. Take one extra minute and find out why we block content.
Not exactly the question you had in mind?
Sign up for an EE membership and get your own personalized solution. With an EE membership, you can ask unlimited troubleshooting, research, or opinion questions.
ask a question
USSteel

ASKER
I'm not concerned with the issue of whether software is pirated.  I'm looking for indicators that a system is at risk for malware.

If an end user is connecting with a non-genuine or not yet activated product, it most likely isn't getting patched.
USSteel

ASKER
Not exactly what I had hoped for, but good insight.
All of life is about relationships, and EE has made a viirtual community a real community. It lifts everyone's boat
William Peck
David Johnson, CD

Your logic is flawed.

Equating non-genuine/not activated to malware risk is a null argument. A Genuine Activated system is not necessarily a fully patched system.  Just a casual perusal of the number of people with genuine software on this site that have been victims of malware should show you the fallacy of your argument.

The best defense is minimum permissions and educated users.