Verify the Default Application for Script File Execution - solution lists incorrect GPO location
Noticed in opensource v3.3.0.1 currently published on website links. Checked most recent opensource 3.3.0.12 binary at time of writing from github, issue also present.
Minor location issue in the PingCastle report with the Stale Object section "Verify the Default Application for Script File Execution". Under the advised solution the notes state to navigate to "Computer Configuration / Preferences / Windows Settings / Folders"
I believe this is incorrect and should in fact read "Computer Configuration / Preferences / Windows Settings / Control Panel / Folder Options"
The remdiation step also doesnt seem to correctly suggest the associated class to set when defining the filetype which appears to be mandatory if using this GPO item.
Screenshot attached for reference. Thank you for PingCastle - quite interesting results revealed for discussion for my client!
Absolutely it should. I have created a ticket internally and will get this updated. Thanks for pointing this out :)
We also very recently fixed the extensions too as it currently only contains js and jse
https://github.com/netwrix/pingcastle/blob/548de82eb0d9631e7a244deffaaf63cfcd4fb460/Healthcheck/Rules/HeatlcheckRuleStaledFolderOptions.cs#L22
As this is just a text replacement we should be able to add this to the next release coming out in a couple of weeks.