A customer asked for a query to find filenames that are too long, and might cause issues when migrating files from eDirectory to AD. The customer requested that query find filenames longer than 128 characters. The filename length to be reported by changing line 12, and the scope can limited by adding sd.scan_target = '\\server\share' to the where clause.
Note: If you have downloaded an older version of the is query and have moved to version 3.5 of the product, the old active_fs_scandata views have been replaced with current_fs_scandata.
Create a report to locate all of the directly assigned user permissions in a particular NCP scan target.
The customer has a number of volumes where the trustees should only ever be assigned granted via groups. They need a report to locate any permissions that have been granted to the individual user object, so that it can be evaluated.
The scope of the query to limited to NCP trustees in the desired scan target. The scan_target will need to be modified to make it work based on the environment.
I need way of locating, within a particular path, all of the GW Archive folders matching the 'ofxxxarc' pattern where the xxx is equal to the FID of the GW user. I also need the fullpath where the archive is located, and the space consumed by the archive.
You will need to change the path in line 8 to match your environment. Note: Case-Sensitive.
Create a report that will display all NCP Trustees in eDirectory.
The customer wanted to create a catalog of the NCP trustees for reference purposes.
The scope of the query is eDirectory Tree wide, but can be limited to a particular path by adding a simple where clause.
*Starting in version 2.6.0, the "srs.active_ncp_trustees" database view has been renamed to "srs.current_ncp_trustees". While the "active" version will still with version 3.0 work it has been deprecated.
Neeed to find the five largest files per scan target and their owners for both eDirectory and Active Directory.
The largest file count can be changed by changing the value in row 17.
Over the past few years computer systems everywhere have been dealing with ransomeware viruses. Crypo, Wanna Cry, and others have hit networks all over the world. How can I find these infected files, so I can restore them from back up?