Solved

Identification and removal of pirated software in an enterprise

Posted on 2014-03-11
3
206 Views
Last Modified: 2014-03-17
If we have identify / analyse and demarcate licensed instances of some software vis a vis pirated, what's the approach that should be undertaken?

Take note, that's not a non-compliance of no. of licences purchased vis a vis deployed but licenced vs piracy issue. Some of the earliest investigation have resulted in noticing instances of folders like, 'crack', 'serial' or files like 'crack.exe' or 'keygen.exe' etc. on users c or d drives.

Considering that all machines are domain attached, a script can be run using GPO to identify the existence of these files and folders. But then, some of these can be just screesavers or other low value items while others maybe related to big ticket items like 'Adobe', 'oracle' etc. How do we demarcate? How do we automate?

Can someone advise on best appraoch to yield desired results? The current scope is only identification and not removal. SCCM 2010 is available to undertake some jobs if it's helpful.
0
Comment
Question by:fahim
  • 2
3 Comments
 
LVL 31

Expert Comment

by:merowinger
ID: 39920557
With SCCM Software Inventory you can easily search for specific files on all Computers and do some reports later. But i don't think you can also search for Folders. You only see the Folder names in the paths of files beeing inventored.

Maybe this could be a quick and dirty solution?
http://www.experts-exchange.com/Programming/Languages/Scripting/Q_28375797.html#a39891125
0
 

Author Comment

by:fahim
ID: 39920615
SCCM's inability to search folders is a big letdown, not sure why they did that.

Missing that, the manual search for folders and searching for interesting strings within those folders is coming out to be a longwinded manual process.

Hence this post to something elegant/automated.
0
 
LVL 31

Accepted Solution

by:
merowinger earned 500 total points
ID: 39920659
You can use SCCM to execute a script on all Clients.
The script may could search for all that specific Folders and reports it back into a database where you can run reports on. The only Problem is, you've to create that script because there's nothing predefined. Maybe Google delivers script examples.
Or you use my suggested solution and write a script which reads all the Clients Output files and writes it readable into another file or database.
You you go a complete other way and search for 3rd Party products with such abilities...
0

Featured Post

U.S. Department of Agriculture and Acronis Access

With the new era of mobile computing, smartphones and tablets, wireless communications and cloud services, the USDA sought to take advantage of a mobilized workforce and the blurring lines between personal and corporate computing resources.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

How important is it to take extra precautions to protect your online business? These are some steps you can take to make sure you're free of any cyber crime.
These days, all we hear about hacktivists took down so and so websites and retrieved thousands of user’s data. One of the techniques to get unauthorized access to database is by performing SQL injection. This article is quite lengthy which gives bas…
The viewer will learn how to count occurrences of each item in an array.
The viewer will learn the basics of jQuery, including how to invoke it on a web page. Reference your jQuery libraries: (CODE) Include your new external js/jQuery file: (CODE) Write your first lines of code to setup your site for jQuery.: (CODE)

863 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

27 Experts available now in Live!

Get 1:1 Help Now