Solved

Files Attributes Changed after virus

Posted on 2013-05-28
5
389 Views
Last Modified: 2013-06-11
Attributes on shared files on a server were changed after virus infection. They have read only and system attributes. How can I change them back to allow users to access and write to these files?

Thanks,
SR
0
Comment
Question by:splitrockit
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
5 Comments
 
LVL 35

Expert Comment

by:Joseph Daly
ID: 39202338
Are they set to hidden and system? If so we had that same virus and this powershell script should help you out.

gci \\server\share -force | foreach {$name = $_.name
$name = "\\server\share\$name"
attrib $name -s -h}

This will take a main path and the iterate through all files and folders removing the hidden and system attributes.
0
 
LVL 76

Accepted Solution

by:
Alan Hardisty earned 500 total points
ID: 39202387
A simple:

attrib *.* /s -s -h

from a command prompt at the top level of the folder should be just as effective.
0
 

Author Comment

by:splitrockit
ID: 39204132
I have some roaming profiles that are set to read only. I have run the commands listed. They still remain read only. I have full ownership of the files. If I change them manually it shows the command run. But the file still remains read only. Any suggestions?

Thanks,
SR
0
 
LVL 76

Expert Comment

by:Alan Hardisty
ID: 39205726
Are the users logged in and thus using the profiles when you are running the command or logged out and not using the profiles?
0
 

Author Closing Comment

by:splitrockit
ID: 39238691
Thanks
0

Featured Post

Is Your DevOps Pipeline Leaking?

Is your CI/CD pipeline a hodge-podge of randomly connected tools? You’ve likely got a tool to fix one problem & then a different tool to fix another, resulting in a cluster of tools with overlapping functionality. Learn how to optimize your pipeline with Gartner's recommendations

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

INTRODUCTION The purpose of this document is to demonstrate the Installation and configuration of the Data Protection Manager product. Note that this demonstration was prepared on the basis of Windows OS is 2008 R2 and DPM 2010. DATA PROTECTI…
When you upgrade from Windows 8 to 8.1 or to Windows 10 or if you are like me you are on the Insider Program you may find yourself with many 450MB recovery partitions.  With a traditional disk that may not be a problem but with relatively smaller SS…
This video Micro Tutorial explains how to clone a hard drive using a commercial software product for Windows systems called Casper from Future Systems Solutions (FSS). Cloning makes an exact, complete copy of one hard disk drive (HDD) onto another d…
With the advent of Windows 10, Microsoft is pushing a Get Windows 10 icon into the notification area (system tray) of qualifying computers. There are many reasons for wanting to remove this icon. This two-part Experts Exchange video Micro Tutorial s…

734 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question