Windows NT KAMIDAKI 10.0 build 19045 (Windows 10) AMD64
Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.3.9
Server IP : 192.168.3.16 & Your IP : 216.73.216.140
Domains :
Cant Read [ /etc/named.conf ]
User : SISTEMA
Terminal
Auto Root
Create File
Create Folder
Localroot Suggester
Backdoor Destroyer
Readme
C: /
Windows /
diagnostics /
system /
Search /
Delete
Unzip
Name
Size
Permission
Date
Action
en-US
[ DIR ]
drwxrwxrwx
2023-03-23 12:54
pt-BR
[ DIR ]
drwxrwxrwx
2019-12-07 15:53
CL_Utility.ps1
20.11
KB
-rw-rw-rw-
2019-12-07 10:09
DiagPackage.diagpkg
15.54
KB
-rw-rw-rw-
2019-12-07 10:09
DiagPackage.dll
79.5
KB
-rw-rw-rw-
2019-12-07 10:09
RS_ResetWindowsSearchApp.ps1
3.84
KB
-rw-rw-rw-
2019-12-07 10:09
RS_RestoreDefaults.ps1
838
B
-rw-rw-rw-
2019-12-07 10:09
RS_RestorePermissions.ps1
2.43
KB
-rw-rw-rw-
2019-12-07 10:09
RS_StartIndexingService.ps1
548
B
-rw-rw-rw-
2019-12-07 10:09
TS_CheckPermissions.ps1
2.61
KB
-rw-rw-rw-
2019-12-07 10:09
TS_FilterHostCrashing.ps1
913
B
-rw-rw-rw-
2019-12-07 10:09
TS_ForcedShutdownInRecovery.ps1
945
B
-rw-rw-rw-
2019-12-07 10:09
TS_ForcedShutdownNoCorruption.ps1
962
B
-rw-rw-rw-
2019-12-07 10:09
TS_IndexingService.ps1
1.97
KB
-rw-rw-rw-
2019-12-07 10:09
TS_IndexingServiceCrashing.ps1
909
B
-rw-rw-rw-
2019-12-07 10:09
TS_ProtocolHostCrashing.ps1
931
B
-rw-rw-rw-
2019-12-07 10:09
TS_SearchApp.ps1
926
B
-rw-rw-rw-
2019-12-07 10:09
Save
Rename
# Copyright © Microsoft Corporation. All rights reserved. # Check permissions on the indexer data directories. # Load utility library . .\CL_Utility.ps1 Write-DiagProgress -activity $localizationString.progress_ts_checkPermissions $dataDirectory = (Get-ItemProperty -path "HKLM:\SOFTWARE\Microsoft\Windows Search").DataDirectory # Append a trailing slash to the dataDirectory if there isn't one if (!$dataDirectory.EndsWith("\")) { $dataDirectory += "\" } $applications = $dataDirectory + "Applications" $windows = $applications + "\Windows" $obj = ConvertStringToPSObject "dataDirectory" $dataDirectory $obj | select-object -Property @{Name=$localizationString.dataDirectory_name; Expression={$_.dataDirectory}} | convertto-xml | Update-DiagReport -id DataDirectory -name $localizationString.dataDirectory_name -description $localizationString.dataDirectory_description -verbosity Informational function Check-Permissions([string]$folderPath) { # First check that owner is SYSTEM $acl = get-acl $folderPath [bool]$ownerOK = ($acl.Owner -eq "NT AUTHORITY\SYSTEM") [bool]$accessOK = $true # Verify that Administrators have read and write access $accessOK = $accessOK -and (Get-AccessGranted $folderPath "S-1-5-32-544" $GENERIC_READ -bor $GENERIC_WRITE) # Verify that Users have neither read nor write access $accessOK = $accessOK -and -not(Get-AccessGranted $folderPath "S-1-5-32-545" $GENERIC_READ) $accessOK = $accessOK -and -not(Get-AccessGranted $folderPath "S-1-5-32-545" $GENERIC_WRITE) # Verify that LOCAL SYSTEM has full control $accessOK = $accessOK -and (Get-AccessGranted $folderPath "S-1-5-18" $GENERIC_ALL) if (-not ($ownerOK -and $accessOK)) { Update-DiagRootCause -id "RC_BadPermissions" -Detected $true if (-not $ownerOK) { $acl.Owner | convertto-xml | Update-DiagReport -id BadPermissions -name $localizationString.dataDirectoryPermissions_name -description $localizationString.dataDirectoryPermissions_description -verbosity Error -rid "RC_BadPermissions" } if (-not $accessOK) { $aces = $acl | foreach-object -process {$_.Access} $aces | convertto-xml | Update-DiagReport -id BadPermissions -name $localizationString.dataDirectoryPermissions_name -description $localizationString.dataDirectoryPermissions_description -verbosity Error -rid "RC_BadPermissions" } exit } } Check-Permissions $dataDirectory Check-Permissions $applications Check-Permissions $windows Update-DiagRootCause -id "RC_BadPermissions" -Detected $false