Not to put too blunt of a point on it, guys, but you're really making this a lot harder than it needs to be. I have a script that goes out across the domain to check the Run key from each system...it isn't all that hard.
I was particularly shocked by John's (of HawthorneSavings) response. After all, this is a list for Admins, and most admins should be aware that checking for the AutoAdminLogon value in the Registry key isn't the same thing as checking to see who's logged on to the machine. > Any suggestions for performing the following? > 1. Enumerate all domain members (NT not AD) 2. Read > all values in > HKLM\SOFTWARE\Microsoft\Windows > NT\CurrentVersion\Winlogon 3. Record all > these values (CSV or text) I've attached two files...wksdump.pl and regchk.pl. Wksdump.pl uses Win32::Lanman to dump the workstation accounts from the NT domain. Use redirection to send it to a file called "wksdump.log". Regchk.pl is the script I use to query the Run key from each machine. I haven't include 'regchk.dat', as that's simply a list of known-good entries, to keep my resulting output file smaller. However, the concept is the same, given Mike's rather specific request. Win32::TieRegistry is part of the standard distro. I hope this helps. If anyone has any questions, please feel free to contact me. Thanks, Harlan
wksdump.pl
Description: wksdump.pl
regchk.pl
Description: regchk.pl
