Core.1 Windows Procedures

Core.1 Windows Procedures.Desktops.Auditing

  • Audit BIOS Info via WMI
    • Uses WMIC to get BIOS Info, writes it to a file and retrieves the file to the system's GetFile() folder and writes an entry to the Agent Procedure log with the detected BIOS Info.
  • Audit BOOT.INI
    • Audits contents of C:\BOOT.INI if it exists, writes an entry to the Agent Procedure log, and retrieves a copy of BOOT.INI to the system's GetFile() folder.
  • Audit Files (Any File Types Entered)
    • Searches for all files by using a set of file masks you enter when scheduling the procedure and creates a simple TXT log file and CSV file based on file names you also enter that listi the files found with full path/filename, date and time last accessed, size in bytes, owner and filename.
      • Output files are created in the #agenttemp# folder defined in Step 1.
      • The TXT log file name is defined by the #logfile# variable in Step 2.
      • The CSV file name is defined by the #csvfile# variable in Step 3.
      • The file masks are defined by the #filemasks# variable in Step 4.
      • Both output files are uploaded to the Kaseya server for review and anaysis under that machines profile Documents folder.
      • The TXT log file is additionally written to the script log for reporting.
      • This script can support alerts on file changes as well by altering Steps .
  • Audit Files (PST and OST)
    • Searches for all PST/OSTfiles by using a set of file masks and creates a simple TXT log file and CSV file listing of the files found with full path/filename, date and time last accessed, size in bytes, owner and filename.
      • Output files are created in the #agenttemp# folder defined in Step 1.
      • The TXT log file name is defined by the #logfile# variable in Step 2.
      • The CSV file name is defined by the #csvfile# variable in Step 3.
      • The file masks are defined by the #filemasks# variable in Step 4.
      • Both output files are uploaded to the Kaseya server for review and anaysis under that machines profile Documents folder.
      • The TXT log file is additionally written to the script log for reporting.
      • This script can support alerts on file changes as well by altering Steps .
  • Audit Internet Speed (WEB100CLT)
    • Uses the NDT client utility for Windows (web100clt.exe). Connects to the Public NDT Server you enter when running/scheduling the procedure (see http://e2epi.internet2.edu/ndt/ndt-server-list.html for a list of servers) and performs an Internet speed test (up/down) as well other network diagnostics. The output file (Internet_Speed.txt) is retrieved to the systems GetFile folder.
  • Audit IRPStackSize Registry Key
  • Audit Local Admin Accounts
    • Logs the user accounts that are part of the Administrators group on the local machine to the Agent Procedure log.
  • Audit Local Guest Accounts
    • Log the user accounts that are part of the Guests group on the local machine to the Agent Procedure log. If accounts are reported, they are enabled.
  • Audit Local User Accounts
    • Log the user accounts defined on the machine to the Agent Procedure log.
  • Audit MP3 File Count
    • Counts the number of MP3 files on the C: drive of the machine and writes an entry in the Agent Procedure log indicating this number.
  • Audit Open and Listening TCP Ports
    • Audits open and listening TCP ports on Windows using NETSTAT and then retrieves the results to the systems GetFile folder
  • Audit PageFile Locations
    • Audits the PageFile locations on Windows machines and writes an entry to the Agent Procedure log with the information.
  • Audit Running Services (NET START)
    • Audits the currently started services on a Windows machine and retrieves the list of those services to the systems GetFile folder.
  • Audit Services (SC QUERY)
    • Uses SC QUERY to audit the list of Windows Services to a file and retrieves the file to the systems Get File folder.
  • Audit Services Registry Key
    • Use the REG command to query the HKLM\System\CurrentControlSet\Services registry key for an agent and retrieves the results to the systems GetFile folder.
  • Audit Uninstall Registry Key
    • Use the REG command to query the HKLM\Software\Microsoft\Windows\CurrentVersion\Uninstall registry key for the machine and retrieve the results to the systems GetFile folder.
  • Audit USB Plug-N-Play Devices
    • Uses a VBS and WMI (Win32_PnPEntity class) to audit the USB devices on a Windows machine. Results are retrieved to the systems GetFile folder.
  • Audit User Video Resolution
    • Uses a VBS to audit the current users video diaplay resolution setting. Writes the result to the Agent Procedure Log as well as to a Custom System Information Field called User Video Resolution.
  • Audit Windows Monitor Info
    • Uses a VBS and WMI (root\CIMV2:Win32_DesktopMonitor class) to audit Windows Monitor Information. Write output to a file and retrieves the file to the systems GetFile folder.
  • Audit Windows Monitor EDID Info
    • Uses a VBS with WMI to detect Monitor EDID information (Monitor Manufacturer, Monitor Model, and Monitor Serial Number) and write the detected information to the Agent Procedure log and to Custom System Info fields.

Core.1 Windows Procedures.Desktops.Auditing.Share and NTFS

  • Audit All Share Sessions and Users (NET SESSION)
    • Uses NET SESSION to dump a basic listing of the sessions to shares on an agent and uploads to Docs\Shares-NTFS folder so that files can be viewed via Documents function/machine summary tab.
  • Audit All Shared Files Opened and Users (NET FILE)
    • Uses NET FILE to dump a basic listing of the open files for all shares on an agent and uploads to Docs\Shares-NTFS folder so that files can be viewed via Documents function/machine summary tab.
  • Audit All Shares (NET SHARE)
    • Uses NET SHARE to dump a basic listing of the shares on an agent and uploads to Docs\Shares-NTFS folder so that files can be viewed via Documents function/machine summary tab.
  • Audit Effective User/Group Fldr Perms (ACCESSCHK)
    • Uses ACCESSCHK from Microsoft SysInternals to check the effective permissions of a local pc/domain based user/group object on a folder. Edit this script in Steps 2-6 for these variables:

      pcdom = computername or domain name of the user or group
      usrgrp = username or group name to evaluate
      drive = drive letter where the folder exists
      folder = full path of the folder to be audited
      fldrdesc = a descriptive name for folder to audit (no special chars)

  • Audit Non-Admin Shares (SRVCHECK)
    • Uses SRVCHECK to dump a basic listing of the non-admin shares on an agent and uploads to Docs\Shares-NTFS folder so that files can be viewed via Documents function/machine summary tab.
  • Audit Shared Folders (DUMPSEC)
    • Uses DUMPSEC to create a report of all shares with their paths, accounts, owners and access permissions, and uploads to Docs\Shares-NTFS folder so that files can be viewed via Documents function/machine summary tab.
  • Audit Shared Folders and ACLs (VBS/WMI)
    • Uses a VBS with WMI to audit all local shares, share and NTFS permissions.
  • Audit Shared Printers (DUMPSEC)
    • Uses DUMPSEC to create a report of all printers with names, accounts, owners and access permissions, and uploads to Docs\Shares-NTFS folder so that files can be viewed via Documents function/machine summary tab.

Core.1 Windows Procedures.Desktops.Auditing.Share and NTFS.Audit Admin Shares

  • Audit Automatic Admin Shares
    • Uses NET SHARE to audit automatic admin shares like C$, etc. The results are retrieved to the systems Documents folder under a Share-NFTS subfolder.
  • Audit Automatic Admin Shares Setting
    • Based on the OS of the machine, checks for the existence and value of AutoShareServer or AutoShareWkst in the Windows Registry and writes an Agent Procedure log entry indicating whether this feature is enabled or disabled.

Core.1 Windows Procedures.Desktops.Machine Control.BIOS Management.Dell

  • Inventory Dell BIOS Settings via DCCU
    • Uses the Dell Client Configuration Utility (DCCU) to inventory the BIOS of a Dell business class machine. The results are retrieved to the systems Get File folder.
  • Set Dell BIOS Settings via DCCU
    • Sets Dell BIOS settings based on the setting and value supplied when scheduled. The format for the Dell BIOS setting supplied must be that used by the Dell Client Configuration Utility (DCCU).

Core.1 Windows Procedures.Desktops.Machine Control.BIOS Management.HP

  • HP BiosConfigUtility GetConfig
    • Uses the HP Bios Config Utility to inventory the BIOS of a HP business class machine. The results are retrieved to the systems Get File folder.

Core.1 Windows Procedures.Desktops.Machine Control.BIOS Management.Lenovo

  • Get Lenovo BIOS Settings via WMI-VBS
    • Uses VBS and WMI to get all BIOS Settings on Lenovo systems.
  • Set Lenovo BIOS Settings via WMI-VBS
    • Uses VBS and WMI to configure BIOS settings on Lenovo systems. Prompts for the Lenovo BIOS Setting name and value when run/scheduled.

Core.1 Windows Procedures.Desktops.Machine Control.File Sharing

  • Disable Simple File Sharing (Sets ForceGuest=0) on Windows XP
    • Disables the Simple File Sharing (Sets ForceGuest=0) feature on Windows XP systems and after doing so, stops and restarts the Server service so that the change goes into effect.
  • Enable Automatic Admin Shares
    • Enables AutoShareWks feature on Windows Workstations so that Admin Shares are automatically created when the Server service starts. This agent procedure does NOT restart the Server (lanmanserver) service.
  • Enable Simple File Sharing (Sets ForceGuest=1) on Windows XP
    • Enables the Simple File Sharing (ForceGuest=1) feature on Windows XP systems and after doing so, stops and restarts the Server service so that the change goes into effect.
  • Disable Automatic Admin Shares
    • Disables AutoShareWks feature on Windows Workstations so that Admin Shares are automatically created when the Server service starts. This agent procedure does NOT restart the Server (lanmanserver) service.

Core.1 Windows Procedures.Desktops.Machine Control.File System

  • Convert File System on Drive to NTFS
    • Convert the file system format on the system drive (i.e. the boot partition) to NTFS from FAT/FAT32. This only works on those operating systems which support NTFS (Windows NT4 / 2000 / XP / 2003 / Vista)
  • Delete Files Based on Modified Date
    • Prompts for the Age of Files to Delete, Full Drive\Path to Start delete operation, and a File Mask to be deleted. Then uses FORFILES to recursively process all folders in the Full Drive/Path entered deleting files matching the File Mask if they are older than the Age entered.

Core.1 Windows Procedures.Desktops.Machine Control.Networking.Block Websites

  • Block "Any" Website
    • This script will edit the windows hosts file and point any website that you enter in the prompt to localhost, essentially blocking access to the website from that endpoint. This can be useful to employers trying to improve productivity or just great for laughs.
  • Clear all blocked websites
    • Used to remove all windows hosts file edits. Refreshes the default hosts file settings.

Core.1 Windows Procedures.Desktops.Machine Control.Networking.Diagnostics

  • Network Diagnostics Test (NETSH)
    • Uses NETSH to perform a network diagnostic test and retrieves the results to the systems Documents folder under a Network Diags subfolder.

Core.1 Windows Procedures.Desktops.Machine Control.Networking.Network Connection

  • Configure Local Area Connection to Utilize DHCP
    • Uses NETSH to change the configuration of the Windows named network connection called "Local Area Connection" to utilize DHCP for its IP Address, DNS and WINS settings.
  • Fix RAS DNS Priority
  • Get Windows IP Configuration (IPCONFIG /ALL)
    • Uses IPCONFIG /ALL to get the IP Addressing Configuration of all enabled network connections on a Windows machine. The results are retrieved to the systems Get Files folder.
  • Release and Renew IP Address
    • Uses a batch file to release and renew a Windows machines IP address.

Core.1 Windows Procedures.Desktops.Machine Control.Networking.Wake-On-LAN.Dell

  • Enable Wake-On-LAN in Dell BIOS (DCCU)
    • Uses the Dell Client Configuration Utility (DCCU) to enable Wake-On-LAN within the BIOS of Dell business class machines.
  • Enable Wake-On-LAN in Dell BIOS (CCTK)
    • Uses the Dell Client Configuration Tool Kit (CCTK) to enable Wake-On-LAN within the BIOS of Dell business class machines.

Core.1 Windows Procedures.Desktops.Machine Control.Networking.Wake-On-LAN.HP

  • Enable Wake-On-LAN in HP BIOS
    • Uses the HP BIOS Configuration Utility to enable Wake-On-LAN within the BIOS of HP business class machines.

Core.1 Windows Procedures.Desktops.Machine Control.Networking.Wake-On-LAN.Lenovo

  • Enable Wake-On-LAN in Lenovo BIOS
    • Uses VBS and WMI to enable Wake-On-LAN within the BIOS of Lenovo business class machines.

Core.1 Windows Procedures.Desktops.Machine Control.Networking.Wake-On-LAN.Windows

  • Enable Wake-On-LAN In Windows for all NICs
    • Uses VBS to enable the Power Management Wake-On-LAN feature on each Windows network interface. This allows the machine to be woken via magic packet when hibernated or suspended. WOL features within the BIOS must also be enabled for WOL to work.

Core.1 Windows Procedures.Desktops.Machine Control.Networking.Wireless

  • Disable Wireless Networking Devices
    • Uses DEVCON.EXE to disable Wireless Networking Devices on a Windows system.
  • Enable Wireless Networking Devices
    • Uses DEVCON.EXE to enable Wireless Networking Devices on a Windows system.
  • Disable NIC on Wireless Network Connection
    • Uses NETSH to disable the NIC associated with the Windows named network connection called "Wireless Network Connection".
  • Enable NIC on Wireless Network Connection
    • Uses NETSH to enable the NIC associated with the Windows named network connection called "Wireless Network Connection".

Core.1 Windows Procedures.Desktops.Machine Control.Reboot/Shutdown

  • Hibernate Now
    • Causes a Windows machine to go into a hibernate state immediately.
  • Suspend Now
    • Causes a Windows machine to go into a suspend state immediately.
  • Shutdown Abort
    • Shutdown the computer using Shutdown.exe
  • Shutdown in 60 Seconds
    • Shutdown the computer using Shutdown.exe in 60 seconds
  • Lock Desktop
    • Causes a Windows machines desktop to lock requiring the currently logged on user credentials to unlock the desktop.

Core.1 Windows Procedures.Desktops.Machine Control.System Restore

  • List All System Restore Points
    • Uses WMIC to enumerate all System Restore Points and retrieves list to the systems Get File folder.
  • Enable System Restore on All Drives
    • Uses DISKPART to enumerate all local partitions and then feeds this list of drives into WMIC to disable System Restore on each volume. This will remove any existing System Restore Points.
  • Disable System Restore All Drives
    • Uses DISKPART to enumerate all local partitions and then feeds this list of drives into WMIC to disable System Restore on each volume. This will remove any existing System Restore Points.
  • Create a Named System Restore Point
    • Uses WMIC to create a System Restore Point

Core.1 Windows Procedures.Desktops.Machine Control.Trusted Sites

  • Add Trusted Sites
    • Runs a registry procedure on the machine to allow anything from the domain to run ActiveX. In this example it adds Kaseya.net.

Core.1 Windows Procedures.Desktops.Machine Control.USB/Disk Drive Control

  • Disable USB Drives
    • **Must reboot endpoint after making change via script** There is a simple registry change that will keep the USB storage drivers from starting when the system boots. Keeps people from walking up to a PC and copying data off with a USB key, but allows you to keep your scanner, keyboard, and mouse working.
    • As always – back your system up before messing around in the registry. Just open regedit and browse to this key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\UsbStor Notice the value ‘Start’ Switch this value to 4, and USB storage devices are disabled. Switch this value to 3, and USB storage devices are enabled.
  • Enable USB Drives
    • **Must reboot endpoint after making change via script** There is a simple registry change that will keep the USB storage drivers from starting when the system boots. Keeps people from walking up to a PC and copying data off with a USB key, but allows you to keep your scanner, keyboard, and mouse working.
    • As always – back your system up before messing around in the registry. Just open regedit and browse to this key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\UsbStor Notice the value ‘Start’ Switch this value to 4, and USB storage devices are disabled. Switch this value to 3, and USB storage devices are enabled.
  • Disable USB Drives Write Protection
  • Enable USB Drives Write Protection
  • Disable CD-ROM Drives
    • Disables CD-ROM Disk Devices
  • Enable CD-ROM Drives
    • Enables CD-ROM Disk Devices
  • Disable High Capacity Floppy Drives
    • Disables High Capacity Floppy Disk Devices
  • Enable High Capacity Floppy Drives
    • Enables High Capacity Floppy Disk Devices
  • Disable Floppy Disk Drives
    • Disables Floppy Disk Devices
  • Enable Floppy Disk Drives
    • Enables Floppy Disk Devices
  • Restrict Desktop Access
    • Restricts access to the "Desktop" in Explorer. The "Desktop" will appear empty and users will not be able to use or access it.
  • Unrestrict Desktop Access
    • Enables access to the "Desktop" in Explorer.
  • Hide and Restrict Access to All Drives (A-Z) in Explorer
    • Uses NoViewOnDrive and NoDrives registry settings to hide and restrict access to all drive letters A-Z on a Windows machine.
  • Hide and Restrict Access to C and D Drives in Explorer
    • you can choose "Block C only" or "Block D only" or "Block all drives" with one of among "01.Block" procedures
  • Hide and Restrict Access to Any List of Drives in Explorer
    • you can choose "Block C only" or "Block D only" or "Block all drives" with one of among "01.Block" procedures
  • Unhide and Unrestrict Access to All Drives (A-Z) in Explorer
    • Removes previous drive access restrictions that may be in place.
    • Note: Windows supports the ability to block access to view various drive letters within Explorer. This restriction prevents users from using My Computer or Explorer to access the content of selected drives. Also, they cannot use Run, Map Network Drive, or the Dir command to view the directories on these drives. This Agent Procedure removes any restriction to that effect.

Core.1 Windows Procedures.Desktops.Machine Control.User Access Control

  • Set User Access Control (UAC) to Always Notify
    • Sets User Access Control to Always Notify in Windows Vista, Windows 7, and Windows 8.
  • Set User Access Control (UAC) to Default Notify
    • Sets User Access Control to Default Notify in Windows Vista, Windows 7, and Windows 8.
  • Set User Access Control (UAC) to Insecure Notify
    • Sets User Access Control to Insecure Notify in Windows Vista, Windows 7, and Windows 8.
  • Set User Access Control (UAC) to Never Notify
    • Disables User Access Control in Windows Vista, Windows 7, and Windows 8.

Core.1 Windows Procedures.Desktops.Machine Control.Windows Configuration

  • Hide an Account from Windows Fast User Switching Logon Screen
    • This script will add a DWORD value with the value of "support user" and data to 0. After a reboot, the PC will no longer display the "support user" at the welcome screen
  • Unhide an Account from Windows Fast User Switching Logon Screen
    • This script will add a DWORD value with the value of "support user" and data to 0. After a reboot, the PC will no longer display the "support user" at the welcome screen
  • Disable Show Hidden Operating System Files
    • Disables the Show Hidden Operating System Files option within Windows Explorer.
  • Enable Display the Contents of System Folders
    • Enables the Display Contents of System Folders option within Windows Explorer.
  • Enable Hide Extensions for Known File Types
    • Enables the Enable Hide Extensions for Known File Types option within Windows Explorer.
  • Enable Show Hidden Files and Folders
    • Enables the Show Hidden Files and Folders option within Windows Explorer.
  • Enforce Windows Minimum Password Length of 8 Characters
    • Forces Windows to reject passwords that do not meet a minimum password length. Useful to help stop people from using trivial passwords where security is an issue. Add a new REG_BINARY value of 'MinPwdLen', and set the data to the minimum number of characters required for a password to be accepted. The following example is 8. Note: This does not affect existing passwords, only new or changed.
  • Suppress Balloon Pop-Ups for Current Windows User

Core.1 Windows Procedures.Desktops.Maintenance.Common Maintenance Tasks.Check Disk

  • Check Disk All Drives
    • Uses DISKPART to enumerate all local partitions and then feeds this list of drives into CHKDSK to repair each volume.
  • Check Disk System Drive (Schedule at Next Restart)
    • Executes a CHKDSK command on the system drive. The results of the maintenance are evaluated by the Check Disk Verify script.
  • Check Disk System Drive (Analysis Only)
    • Executes a CHKDSK command on the system drive. The results of the maintenance are evaluated, a log entry is written to the agent procedure log with the results, and the results are retrieved to the systems Get File folder.

Core.1 Windows Procedures.Desktops.Maintenance.Common Maintenance Tasks.Defragmentation

  • Defragment All Drives
    • Uses DISKPART to enumerate all local partitions and then feeds this list of drives into DEFRAG to optimize each volume. Retrieves DEFRAG results for all drives to the systems GetFile folder.
  • Defragment System Drive (Analysis Only)
    • Performs a defragmentation analysis on the system drive in Windows (usually C:). Defragmentation results are written to the agent procedure log.
  • Defragment Page File & Registry
    • Use PageDefrag utility from Sysinternals to defrag the system pagefile and registry and reboot (Windows XP only).
  • Defragment System Drive (Analysis & Prompt User If Reqd)
    • Performs a defragmentation analysis on the system drive in Windows (usually C:). Defragmentation results are written to the agent procedure log. If a user is logged onto the machine, then the procedure asks them if they want to run a full defragmentation on the drive and performs one if they answer yes.

Core.1 Windows Procedures.Desktops.Maintenance.Common Maintenance Tasks.Disk Cleanup

  • Windows Disk Cleanup
    • Sets the "sageset" registry entries for cleanmgr.exe and then executes cleanmgr.exe with the "sagerun" parameter to automatically clean files in the following locations: Active Setup Temp Folder Content Indexer Cleaner Downloaded Program Files Internet Cache Files Memory Dump Files Old ChkDsk Files Recycle Bin Remote Desktop Cache Files Setup Log Files Temporary Files Temporary Offline Files WebClient and WebPublisher Cache

Core.1 Windows Procedures.Desktops.Maintenance.Common Maintenance Tasks.Flush DNS

  • Flush DNS Resolver Cache
    • Flushes and resets the contents of the DNS client resolver cache by performing IPCONFIG /FLUSHDNS

Core.1 Windows Procedures.Desktops.Maintenance.Common Maintenance Tasks.IE Files Management

  • Clear Internet Explorer Cookies
    • Clears the Internet Explorer Cookies for the currently logged on user.
  • Clear Internet Explorer Form Data
    • Clears the Internet Explorer Form Data for the currently logged on user.
  • Clear Internet Explorer History
    • Clears the Internet Explorer History for the currently logged on user.
  • Clear Internet Explorer Passwords
    • Clears the Internet Explorer Passwords for the currently logged on user.
  • Clear Internet Explorer Temp Files
    • Clears the Internet Explorer Temporary Files for the currently logged on user.

Core.1 Windows Procedures.Desktops.Maintenance.Common Maintenance Tasks.System Restore

  • Create Weekly Desktop Maintenance System Restore Point
    • Uses WMIC to create a System Restore Point called Weekly Desktop Maintenance. This agent procedure can be called at the beginning of the Workstation Weekly Maintenance Procedure.

Core.1 Windows Procedures.Desktops.Maintenance.Common Maintenance Tasks.System Restore

  • Create Patch Management System Restore Point
    • Uses WMIC to create a System Restore Point called Patch Management. This agent procedure can be called prior to a patch deployment through a Automatic Update Pre-Agent Procedure.

Core.1 Windows Procedures.Desktops.Maintenance.Common Maintenance Tasks.TEMP Files

  • Clear User TEMP Folder
    • Deletes all files and folders within and below the logged on users %TEMP% folder that are not currently locked/open by Windows.

Core.1 Windows Procedures.Desktops.Maintenance.Common Maintenance Tasks.Time Sync

  • Synchronize Time via SNTP
    • Sets the windows clock to retrieve the time from time.windows.com

Core.1 Windows Procedures.Desktops.Maintenance.Desktop Maintenance

  • Workstation Weekly Maintenance
    • Executes all the Weekly Desktop Maintenance tasks, schedule this script to run during your maintenance window.

Core.1 Windows Procedures.Desktops.Maintenance.Maintenance Notifications

  • Weekly Desktop Maintenance Reminder
    • This script is designed to run in the daytime prior to desktop Patching maintenance. Will send a message to a desktop end user indicating they should leave their machine on overnight.

Core.1 Windows Procedures.Desktops.Software Control.Internet Explorer

  • Set Default Internet Explorer Home Page
    • Set Default Page on Internet Explorer. Just change the site in step 1.

Core.1 Windows Procedures.Desktops.Software Control.Windows Firewall

  • Disable Windows Firewall
    • Uses NETSH to disable the Windows Firewall

Core.1 Windows Procedures.Servers.Active Directory.AD Replication

  • Perform an AD Replication Check Using REPADMIN
    • Runs a Replication Check on Active Directory Services using teh REPADMIN utility. Sends results via email, you MUST update the email address to receive the results.

Core.1 Windows Procedures.Servers.Exchange.Exchange Best Practices Analyzer.Exchange 2003

  • ExBPA Report 2003 server
    • Designed for Exchange 2003. Uses the Exchange Best Practice Analyzer to create a report of any errors. MS Logparser 2.0 is then used to parse the results and email a final report to the email address of the admin that runs/schedules the agent procedure. The Exchange Best Practice Analyzer must be installed prior to using this agent procedure.

Core.1 Windows Procedures.Servers.Exchange.Exchange Best Practices Analyzer.Exchange 2007

  • ExBPA Report 2007 server
    • Designed for Exchange 2007. Uses the Exchange Best Practice Analyzer to create a report of any errors. MS Logparser 2.0 is then used to parse the results and email a final report to the email address of the admin that runs/schedules the agent procedure. The Exchange Best Practice Analyzer must be installed prior to using this agent procedure.

Core.1 Windows Procedures.Servers.IIS Server

  • Perform an IISRESET on IIS Server
    • Performs an IISReset on machine.

Core.1 Windows Procedures.Servers.Maintenance

  • Weekly Server Maintenance
    • Executes all the Weekly Desktop Maintenance tasks.

Core.1 Windows Procedures.Servers.Monitoring Remediation.Disk Usage

  • DiskUsage.GetDirTree.C-D-E-F-G-M-N
    • Returns disk usage on C, D, E, F, G, M and N Drives. Writes the disk usage tree results to the Agent Procedure Log. Drives that do not exist will not display any disk usage results.

Core.1 Windows Procedures.Servers.Monitoring Remediation.Get Process List

  • Performance.Get Process List
    • Uses kperfmon.exe to obtain the process list, CPU % and memory consumption. This script may be configured to execute when performance monitor counters raise an alarm. Writes results to Agent Procedure Log.

Core.1 Windows Procedures.Servers.Print Server

  • Clear Print Spooler Queues
    • Stops the Print Spooler, clears out queues and restarts the Print Spooler.

Core.1 Windows Procedures.Servers.Service Control Manager

  • Compile SCM
    • Recompiles the Service Control Manager to verify SCM events are logged to the system log.

Core.1 Windows Procedures.Servers.Terminal Server

  • Terminal Server - Logoff Disconnected Sessions
    • Logs off all disconnected sessions of a Terminal Server.
  • Terminal Server - Logoff Session X
  • Terminal Server - Logoff Session 1
  • Terminal Server - Query Sessions
    • Uses QUERY USER to generate a list of all Terminal Server Sessions and writes the session information list to the agent procedure log.
  • Terminal Server - Reboot in 60 Seconds
    • Reboots a Terminal Server giving logged on users 60 seconds to close applications and save their work.
  • Terminal Server - Shutdown in 60 Seconds
    • Shuts down a Terminal Server giving logged on users 60 seconds to close applications and save their work.