Welcome!

Each day we go about our business whether we create software, train a child in a school district, build planes in aerospace, provide healthcare, insure peoples stuff, etc. We all have data with varying degrees of importance, some highly critical to the business directly and some highly critical to our customers, while other data is the communication that helps our business units successfully work together. Each of the data types have similarities in size, age, ownership, and a level of security.

Having the ability to query our data helps us to answer a number of questions:

  • Where’s the data?
  • What types of data are we maintaining?
  • Who owns the data?
  • Who has permission to access the data?
  • How fast are we using up our storage space?
  • How old is the data?
  • How often is the data being accessed?

Once queried the data needs to be collated into reports. These reports are read differently based on the perspective of the individual. A volume free space report, read by the Director of Information Technology will not be read with the same perspective as the Business Manager, as the former is figuring out the storage budget, while the other is wondering where the all the current data is. Reports may need to be laid out differently in order to drive the business intelligence needed, based on perspective.

This site attempts to help you learn how to write queries and generate report layouts to help you achieve a new level of success, while supporting, maintaining, and protecting your storage.

Recent Updates

Suspect Permissions: An evaluation of direct user-assigned trustees in NCP.

  • 1
  • 2
  • 3
  • 4
  • 5
Total votes: 1

Summary

Create a report to locate all of the directly assigned user permissions in a particular NCP scan target.

Back Story

The customer has a number of volumes where the trustees should only ever be assigned granted via groups. They need a report to locate any permissions that have been granted to the individual user object, so that it can be evaluated.

Information

The scope of the query to limited to NCP trustees in the desired scan target. The scan_target will need to be modified to make it work based on the environment.

How to Import a Custom Query

  1. Download the zip file containg the SQL query and/or Report Layout (repx) file.
  2. Extract the zip contents to a local folder.
  3. The SQL file can be opened with a text editor, and its contents copied and pasted to the either the Custom Query SQL editor using either the Web interface (figure 1) or in the Report Designer (figure 2) for a given Custom Query report definition.


Find Files Renamed By The Crypto or Wanna Cry Ransomeware Viruses

  • 1
  • 2
  • 3
  • 4
  • 5
Total votes: 2

Summary

Over the past few years computer systems everywhere have been dealing with ransomeware viruses. Crypo, Wanna Cry, and others have hit networks all over the world. How can I find these infected files, so I can restore them from back up?

Extension Report by Category

  • 1
  • 2
  • 3
  • 4
  • 5
Total votes: 3

This report combines file extensions in to categories. The report uses the srs.current_fs_scandata database view which limits the scope to current scans only. The scope is further limited by the sd.fullpath LIKE portion of the sql where clause. If you remove it, the report will run across all current scan_data.

Note: The layout for this report has been updated to handle the chart scripting differently. As it was giving an error for some people.