I was going to write about creating, editing, and saving XML files using the System.XML objects today but discovered it had been covered quite well already after a quick Google search. So instead we’ll jump ahead a little bit and use PowerShell & .NET’s XML capabilities to dive into the GPO Reports that can be generated using Get-GPOReport from the grouppolicy module.
This will be the first in a small series of posts that should end up with us having a module capable of searching for any group policy setting that is recorded in the XML reports. That’s the goal, but I’m posting as I get things 90% complete so hopefully all this proves useful and you’ll be willing to bear with me.
Friday, January 29, 2010
Friday, January 8, 2010
Quickly Discover Domain Joined Computers Available via Ping
Occasionally, well…often, I need to run a series of commands or queries against a set of computers on our network. Sometimes it doesn’t really matter to me to hit 100% of that set. For instance, the other day I wanted to know roughly how many computer had login script timeout warnings in the event log for the past week.
In the past I had done something like:
Replace the ‘domain.com/OU/OU’ with the searchroot for the workstation groups you’re after, as well as the “\.domain\.com” with the correct information for your domain and $upComps will contain a collection of QADComputer objects that responded to pings.
From there we can use PSRemoting or tools like psexec.exe with the –d switch to (relatively) quickly run a set of commands against our computers that are up and running!
Many thanks to Lee Holmes for the script that creates the above code block on the clipboard for pasting from any script, truly awesome.
In the past I had done something like:
- Get the list of computers I need to run against from Active Directory or a csv file.
- For each computer, attempt to ping it and if it responds run ye’ commands.
001 002 003 004 005 006 007 008 009 010 011 012 013 014 015 016 017 018 019 020 021 022 023 024 025 | $adComputers = Get-QADComputer -SearchRoot 'domain.com/OU/OU' ` -SizeLimit 0 ` -IncludedProperties lastlogontimestamp | Where-Object ` { (($_.useraccountcontrol -band 0x2) -eq 0) ` -and ($_.lastlogontimestamp -ne $null) ` -and (($_.lastlogontimestamp).adddays(30) -gt (Get-Date)) } $compNames = $adComputers | % { $_.name } $pingResults = ping $compNames -Count 2 -Quiet ` -AllAddresses -Asynchronous -ErrorAction silentlycontinue $compDict = @{} foreach ($comp in $adComputers) { $compDict.add($comp.name,$comp) } $upComps = @() foreach ($result in $pingResults) { if ($result.received -gt 1) { $cName = $result.hostname -replace "\.domain\.com" $upComps += $compDict[$cName] } } |
From there we can use PSRemoting or tools like psexec.exe with the –d switch to (relatively) quickly run a set of commands against our computers that are up and running!
Many thanks to Lee Holmes for the script that creates the above code block on the clipboard for pasting from any script, truly awesome.
Subscribe to:
Posts (Atom)