Hi,
My configuration:
Windows Server 2003+SPs
CRRedist2008_x86
The reports works perfect, but after I run the commands bellow, the error: "Load report failed" occurs. To fix I need to give the NETWORK SERVICE read access to C:\ , It's possible to change this access to other diretory?
Tks.
cacls "%systemroot%" /t /e /R "everyone" "CREATOR OWNER" "Power Users" "System" "users"
cacls "%systemroot%" /t /e /g administrators:f "CREATOR OWNER":f everyone:r SYSTEM:f
cacls "c:\autoexec.bat" /E /C /R "EVERYONE" "USERS" "POWER USERS"
cacls "c:\config.sys" /E /C /R "EVERYONE" "USERS" "POWER USERS"
cacls "c:\boot.ini" /E /C /R "EVERYONE" "USERS" "POWER USERS"
cacls "c:\ntldr" /E /C /R "EVERYONE" "USERS" "POWER USERS"
cacls "c:\ntdetect.com" /E /C /R "EVERYONE" "USERS" "POWER USERS"
cacls "c:\autoexec.bat" /T /E /C /G administrators:f
cacls "c:\boot.ini" /T /E /C /G administrators:f
cacls "c:\ntldr" /T /E /C /G administrators:f
cacls "c:\Ntdetect.com" /T /E /C /G administrators:f
copy W2k3.inf %Systemroot%\security\templates
copy hardn2003.sdb %Systemroot%\security\database
secedit /validate %Systemroot%\security\templates\W2k3.inf
%systemroot%\system32\secedit.exe /configure /DB %systemroot%\security\database\hardn2003.sdb /CFG %Systemroot%\security\templates\W2k3.inf /log %systemroot%\security\logs\hardening.log
gpupdate /target:computer /force
gpupdate /target:user /force
cacls "c:\config.sys" /T /E /C /G administrators:f
cacls "c:\autoexec.bat" /T /E /C /G system:f
cacls "c:\boot.ini" /T /E /C /G system:f
cacls "c:\ntldr" /T /E /C /G system:f
cacls "c:\Ntdetect.com" /T /E /C /G system:f
cacls "c:\config.sys" /T /E /C /G system:f
cacls "%systemroot%\system32\cmd.exe" /t /e /R "everyone" "CREATOR OWNER" "Power Users" "System" "users"
cacls "%systemroot%\system32\cmd.exe" /t /e /g administrators:f
cacls "%systemroot%\system32\arp.exe" /t /e /R "everyone" "CREATOR OWNER" "Power Users" "System" "users"
cacls "%systemroot%\system32\arp.exe" /t /e /g administrators:f
cacls "%systemroot%\system32\cacls.exe" /t /e /R "everyone" "CREATOR OWNER" "Power Users" "System" "users"
cacls "%systemroot%\system32\cacls.exe" /t /e /g administrators:f
cacls "%systemroot%\system32\debug.exe" /t /e /R "everyone" "CREATOR OWNER" "Power Users" "System" "users"
cacls "%systemroot%\system32\debug.exe" /t /e /g administrators:f
cacls "%systemroot%\system32\edit.com" /t /e /R "everyone" "CREATOR OWNER" "Power Users" "System" "users"
cacls "%systemroot%\system32\edit.com" /t /e /g administrators:f
cacls "%systemroot%\system32\edlin.exe" /t /e /R "everyone" "CREATOR OWNER" "Power Users" "System" "users"
cacls "%systemroot%\system32\edlin.exe" /t /e /g administrators:f
cacls "%systemroot%\system32\finger.exe" /t /e /R "everyone" "CREATOR OWNER" "Power Users" "System" "users"
cacls "%systemroot%\system32\finger.exe" /t /e /g administrators:f
cacls "%systemroot%\system32\ftp.exe" /t /e /R "everyone" "CREATOR OWNER" "Power Users" "System" "users"
cacls "%systemroot%\system32\ftp.exe" /t /e /g administrators:f
cacls "%systemroot%\system32\tftp.exe" /t /e /R "everyone" "CREATOR OWNER" "Power Users" "System" "users"
cacls "%systemroot%\system32\tftp.exe" /t /e /g administrators:f
cacls "%systemroot%\system32\net.exe" /t /e /R "everyone" "CREATOR OWNER" "Power Users" "System" "users"
cacls "%systemroot%\system32\net.exe" /t /e /g administrators:f
cacls "%systemroot%\system32\nslookup.exe" /t /e /R "everyone" "CREATOR OWNER" "Power Users" "System" "users"
cacls "%systemroot%\system32\nslookup.exe" /t /e /g administrators:f
cacls "%systemroot%\system32\regedit.exe" /t /e /R "everyone" "CREATOR OWNER" "Power Users" "System" "users"
cacls "%systemroot%\system32\regedit.exe" /t /e /g administrators:f
cacls "%systemroot%\system32\regedt32.exe" /t /e /R "everyone" "CREATOR OWNER" "Power Users" "System" "users"
cacls "%systemroot%\system32\regedt32.exe" /t /e /g administrators:f
cacls "%systemroot%\system32\rexec.exe" /t /e /R "everyone" "CREATOR OWNER" "Power Users" "System" "users"
cacls "%systemroot%\system32\rexec.exe" /t /e /g administrators:f
cacls "%systemroot%\system32\rsh.exe" /t /e /R "everyone" "CREATOR OWNER" "Power Users" "System" "users"
cacls "%systemroot%\system32\rsh.exe" /t /e /g administrators:f
cacls "%systemroot%\system32\telnet.exe" /t /e /R "everyone" "CREATOR OWNER" "Power Users" "System" "users"
cacls "%systemroot%\system32\telnet.exe" /t /e /g administrators:f
cacls "%systemroot%\system32\nbtstat.exe" /t /e /R "everyone" "CREATOR OWNER" "Power Users" "System" "users"
cacls "%systemroot%\system32\nbtstat.exe" /t /e /g administrators:f
cacls "%systemroot%\system32\netstat.exe" /t /e /R "everyone" "CREATOR OWNER" "Power Users" "System" "users"
cacls "%systemroot%\system32\netstat.exe" /t /e /g administrators:f
cacls "%systemroot%\system32\net.exe" /t /e /R "everyone" "CREATOR OWNER" "Power Users" "System" "users"
cacls "%systemroot%\system32\net.exe" /t /e /g administrators:f
cacls "%systemroot%\system32\ping.exe" /t /e /R "everyone" "CREATOR OWNER" "Power Users" "System" "users"
cacls "%systemroot%\system32\ping.exe" /t /e /g administrators:f
cacls "%systemroot%\system32\regedt32.exe" /t /e /R "everyone"
cacls "%systemroot%\system32\regedt32.exe" /t /e /g administrators:f
cacls "%systemroot%\system32\route.exe" /t /e /R "everyone" "CREATOR OWNER" "Power Users" "System" "users"
cacls "%systemroot%\system32\route.exe" /t /e /g administrators:f
cacls "%systemroot%\system32\syskey.exe" /t /e /R "everyone" "CREATOR OWNER" "Power Users" "System" "users"
cacls "%systemroot%\system32\syskey.exe" /t /e /g administrators:f
cacls "%systemroot%\system32\tracert.exe" /t /e /R "everyone" "CREATOR OWNER" "Power Users" "System" "users"
cacls "%systemroot%\system32\tracert.exe" /t /e /g administrators:f
cacls "%systemroot%\system32\at.exe" /t /e /R "everyone" "CREATOR OWNER" "Power Users" "System" "users"
cacls "%systemroot%\system32\at.exe" /t /e /g administrators:f
cacls "%systemroot%\system32\pathping.exe" /t /e /R "everyone" "CREATOR OWNER" "Power Users" "System" "users"
cacls "%systemroot%\system32\pathping.exe" /t /e /g administrators:f
cacls "%systemroot%\system32\runonce.exe" /t /e /R "everyone" "CREATOR OWNER" "Power Users" "System" "users"
cacls "%systemroot%\system32\runonce.exe" /t /e /g administrators:f
cacls "%systemroot%\system32\runas.exe" /t /e /R "everyone" "CREATOR OWNER" "Power Users" "System" "users"
cacls "%systemroot%\system32\runas.exe" /t /e /g administrators:f
cacls "%systemroot%\system32\secedit.exe" /t /e /R "everyone" "CREATOR OWNER" "Power Users" "System" "users"
cacls "%systemroot%\system32\secedit.exe" /t /e /g administrators:f
sc config alerter start= disabled
sc config AppMgmt start= disabled
sc config BITS start= disabled
sc config Clipsrv start= disabled
sc config Browser start= disabled
sc config cisvc start= disabled
sc config SharedAccess start= disabled
sc config mnmsrvc start= disabled
sc config fax start= disabled
sc config RemoteRegistry start= disabled
sc config RemoteAccess start= disabled
sc config UPS start= disabled
sc config UtilMan start= disabled
sc config tlntSvr start= disabled
sc config RSVP start= disabled
sc config RasAuto start= disabled
sc config TapiSrv start= disabled
sc config WZCSVC start= disabled
sc config Wmi start= disabled
sc config Messenger start= disabled
sc config PolicyAgent start= disabled
sc config Schedule start= disabled
sc config seclogon start= disabled
sc config ImapiService start= disabled
sc config Dfs start= disabled
sc config PolicyAgent start= disabled
sc config Nla start= disabled