[ale] How would you ....

Jim Kinney jim.kinney at gmail.com
Fri Apr 30 08:02:51 EDT 2021


https://devblogs.microsoft.com/scripting/using-winrm-on-linux/

Not the tool I used but very similar. Basically use python on Linux to scrape windows using powershell.

On April 30, 2021 7:34:43 AM EDT, Jim Kinney <jim.kinney at gmail.com> wrote:
>Nice.
>
>I was going to suggest a linux-based pxe boot that auto runs dd
>if=/dev/random of=/dev/sd[[:alpha:]] to ensure the drives are
>encrypted. Windows admins don't let me get near their systems any more.
>
>
>Fuzzy memory. There's a tool I used many years ago for pulling data
>like this from windows systems in a large corp environment using a
>shared AD password. Network tool on Linux that connected to a port....
>auth happens.... request variable values... something. I used it to
>pull names and versions of all install software but it could pull
>anything known by the windows box. Dang. Can't remember the tool name.
>I'll look.
>
>On April 30, 2021 7:11:37 AM EDT, Raj Wurttemberg via Ale <ale at ale.org>
>wrote:
>>I would probably use Ansible to report on hundreds of systems, it is
>>cross
>>platform and agentless.
>>
>>For Windows, you just need to run the command (Administrator level
>>account),
>>"manage-bde -status".  It comes back with a nice report like this:
>>
>>'''
>>Volume C: [OS]
>>[OS Volume]
>>
>>    Size:                 243.58 GB
>>    BitLocker Version:    None
>>    Conversion Status:    Fully Decrypted
>>    Percentage Encrypted: 0.0%
>>    Encryption Method:    None
>>    Protection Status:    Protection Off
>>    Lock Status:          Unlocked
>>    Identification Field: None
>>    Key Protectors:       None Found
>>'''
>>
>>Or with PowerShell...  (output can be JSON if needed with "
>>Get-BitLockerVolume | convertto-json")
>>
>>'''
>>PS C:\WINDOWS\system32> Get-BitLockerVolume
>>
>>
>>   ComputerName: XXXXXXX
>>
>>VolumeType      Mount CapacityGB VolumeStatus           Encryption
>>KeyProtector              AutoUnlock Protection
>>                Point                                   Percentage
>>Enabled    Status
>>----------      ----- ---------- ------------           ----------
>>------------              ---------- ----------
>>Data            E:      2,048.00 FullyDecrypted         0          {}
>>Off
>>Data            F:      2,560.00 FullyDecrypted         0          {}
>>Off
>>Data            G:        979.37 FullyDecrypted         0          {}
>>Off
>>OperatingSystem C:        243.58 FullyDecrypted         0          {}
>>Off
>>Data            D:        232.80 FullyDecrypted         0          {}
>>Off
>>'''
>>
>>/Raj
>>
>>> -----Original Message-----
>>> From: Ale <ale-bounces at ale.org> On Behalf Of DJ-Pfulio via Ale
>>> Sent: Thursday, April 29, 2021 11:10 PM
>>> To: Atlanta Linux Enthusiasts <ale at ale.org>
>>> Cc: DJ-Pfulio <DJPfulio at jdpfu.com>
>>> Subject: [ale] How would you ....
>>> 
>>> run a report against thousands of workstations to ensure they all
>use
>>> encrypted storage. Call it a HIPPA requirement and reporting is just
>>as
>>> important as actually having the encryption deployed.
>>> 
>>> Assume Windows and Linux workstations - but linux-only is fine too.
>>> F/LOSS preferred for the solution.
>>> 
>>> _______________________________________________
>>> Ale mailing list
>>> Ale at ale.org
>>> https://mail.ale.org/mailman/listinfo/ale
>>> See JOBS, ANNOUNCE and SCHOOLS lists at
>>> http://mail.ale.org/mailman/listinfo
>>
>>_______________________________________________
>>Ale mailing list
>>Ale at ale.org
>>https://mail.ale.org/mailman/listinfo/ale
>>See JOBS, ANNOUNCE and SCHOOLS lists at
>>http://mail.ale.org/mailman/listinfo
>
>-- 
>Computers amplify human error
>Super computers are really cool

-- 
Computers amplify human error
Super computers are really cool
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://mail.ale.org/pipermail/ale/attachments/20210430/cc8fd213/attachment.htm>


More information about the Ale mailing list