posts-powershell

Categories

Tags

Administration agent-based monitoring Agentless Monitoring alert responses alert thresholds alerting Alerts Amazon Aurora Amazon EC2 Amazon RDS Amazon RDS / Aurora Amazon RDS for SQL Server Amazon Redshift Amazon S3 Amazon Web Services (AWS) Analytics application monitoring Aqua Data Studio automation availability Azure Azure SQL Database azure sql managed instance Azure VM backup Backup and recovery backup and restore backup compression backup status Backup Strategy backups big data Blocking bug fixes business architecture business data objects business intelligence business process modeling business process models capacity planning change management cloud cloud database cloud database monitoring cloud infrastructure cloud migration cloud providers Cloud Readiness Cloud Services cloud storage cloud virtual machine cloud VM clusters code completion collaboration compliance compliance audit compliance audits compliance manager compliance reporting conference configuration connect to database cpu Cross Platform custom counters Custom Views customer survey customer testimonials Dark Theme dashboards data analysis Data Analytics data architect data architecture data breaches Data Collector data governance data lakes data lineage data management data model data modeler data modeling data models data privacy data protection data security data security measures data sources data visualization data warehouse database database administration database administrator database automation database backup database backups database capacity database changes database community database connection database design database developer database developers database development database diversity Database Engine Tuning Advisor database fragmentation database GUI database IDE database indexes database inventory management database locks database management database migration database monitoring database navigation database optimization database performance Database Permissions database platforms database profiling database queries database recovery database replication database restore database schema database security database support database synchronization database tools database transactions database tuning database-as-a-service databases DB Change Manager DB Optimizer DB PowerStudio DB2 DBA DBaaS DBArtisan dBase DBMS DDL Debugging defragmentation Demo diagnostic manager diagnostics dimensional modeling disaster recovery Download drills embedded database Encryption End-user Experience entity-relationship model ER/Studio ER/Studio Data Architect ER/Studio Enterprise Team Edition events execution plans free tools galera cluster GDPR Getting Started Git GitHub Google Cloud Hadoop Healthcare high availability HIPAA Hive hybrid clouds Hyper-V IDERA IDERA ACE Index Analyzer index optimization infrastructure as a service (IaaS) infrastructure monitoring installation Integrated Development Environment interbase Inventory Manager IT infrastructure Java JD Edwards JSON licensing load test load testing logical data model macOS macros managed cloud database managed cloud databases MariaDB memory memorystorage memoryusage metadata metric baselines metric thresholds Microsoft Azure Microsoft Azure SQL Database Microsoft PowerShell Microsoft SQL Server Microsoft Windows MongoDB monitoring Monitoring Tools Monyog multiple platforms MySQL news newsletter NoSQL Notifications odbc optimization Oracle PeopleSoft performance Performance Dashboards performance metrics performance monitoring performance schema performance tuning personally identifiable information physical data model Platform platform as a service (PaaS) PostgreSQL Precise Precise for Databases Precise for Oracle Precise for SQL Server Precise Management Database (PMDB) product updates Project Migration public clouds Query Analyzer query builder query monitor query optimization query performance Query Store query tool query tuning query-level waits Rapid SQL rdbms real time monitoring Real User Monitoring recovery regulations relational databases Releases Reporting Reports repository Restore reverse engineering Roadmap sample SAP Scalability Security Policy Security Practices server monitoring Server performance server-level waits Service Level Agreement SkySQL slow query SNMP snowflake source control SQL SQL Admin Toolset SQL CM SQL code SQL coding SQL Compliance Manager SQL Defrag Manager sql development SQL Diagnostic Manager SQL Diagnostic Manager for MySQL SQL Diagnostic Manager for SQL Server SQL Diagnostic Manager Pro SQL DM SQL Doctor SQL Enterprise Job Manager SQl IM SQL Inventory Manager SQL Management Suite SQL Monitoring SQL Performance SQL Quality SQL query SQL Query Tuner SQL Safe Backup SQL script SQL Secure SQL Security Suite SQL Server sql server alert SQL Server Migration SQL Server Performance SQL Server Recommendations SQL Server Security SQL statement history SQL tuning SQL Virtual Database sqlmemory sqlserver SQLyog Storage Storage Performance structured data Subversion Support tempdb tempdb data temporal data Tips and Tricks troubleshooting universal data models universal mapping unstructured data Uptime Infrastructure Monitor user experience user permissions Virtual Machine (VM) web services webinar What-if analysis WindowsPowerShell

Reading Installed Software Remotely

Most software registers itself in the Registry. Here is a piece of code that reads all installed software from the 32-bit and 64-bit hive and works...

gpupdate on Remote Machines

To run gpupdate.exe remotely, you could use a script like this: function Start-GPUpdate { param ( [String[]] $ComputerName ) $code = { $rv = 1 |...

Getting Database Connection String

Have you ever been puzzled just what the connection string would look like for a given database? When you create a new data source in Control Panel,...

Use Splatting to Encapsulate WMI Calls

Splatting is a great way of forwarding parameters to another cmdlet. Here is an example that can be used to encapsulate WMI calls and make them...

Submitting Parameters through Splatting

Splatting was introduced in PowerShell 3.0, but many users still never heard of this. It is a technique to programmatically submit parameters to a...

Getting Group Membership – Fast

If you need to find out the Active Directory groups your user account is in, typically you would query the Active Directory, and you would have to...

Setting Registry Permissions

Setting permissions for Registry keys isn't trivial. With a little trick, though, it is no big deal anymore. First, open REGEDIT and create a...

Blocking Administrator Scripts

If you know that your script requires Administrator privileges, then you should add this to the top of your script: #requires -runasadministrator...

Removing Selected NTFS Permissions

Maybe you need to remove some permission settings from NTFS permissions. Let's assume you want to remove all permissions for a specific user...

PowerShell God Mode

Before you can run a PowerShell script, the execution policy needs to allow this. Typically, you would use this line to enable script execution:...

Checking Windows Updates

To check all installed updates on a Windows box, there is a COM library you can use. Unfortunately, this library isn't very intuitive to use,...

Getting Free Cheat Sheets

There are two great sources for PowerShell cheat sheets. One is the set of cheat sheets created by powershellmagazine.com which was just updated to...

Start to Look at DSC

Desired State Configuration (DSC) is a new feature in PowerShell 4.0. With DSC, you can write simple configuration scripts and apply them to the...

Compiling Binary Cmdlets

PowerShell functions can mimick all the features found in a true binary cmdlet--but PowerShell functions are plain PowerShell code, so anyone can...

Adding and Resetting NTFS Permissions

Whether you want to add a new NTFS access rule to a file or turn off inheritance and add new rules, here is a sample script that illustrates the...

Converting Text Arrays to String

Occasionally, text from a text file needs to be read and processed by other commands. Typically, you would use Get-Content to read the text file...

ISE Bug Locks Debugger

There is an obscure bug in the PowerShell ISE that may dead-lock the debugger. It affects PowerShell version 3.0 and 4.0. Here is a test script:...

Bulk Renaming Object Properties

Occasionally, it may become necessary to bulk rename object properties to create better reports. For example, if you retrieve process objects, you...

Fixing Display in Excel Reports

When you send information to Microsoft Excel, it is converted to text using the built-in .NET ToString() method. This method typically does not...

Creating Excel Reports

PowerShell objects can easily be opened in Microsoft Excel. Simply export the objects to CSV, then open the CSV file with the associated program...

Use JSON to Create Objects

JSON is describing objects, similar to XML--but a lot easier. JSON allows for nested object properties, so you can retrieve information from various...

Getting Variable Value in Parent Scope

If you define variables in a function, then these variables live in function scope. To find out what the value of the variable is in the parent...

Updating Windows Defender Signatures

Windows 8.1 comes with a ton of new cmdlets. One of them can automatically download and install the latest antivirus signatures for Windows...

Showing WPF Info Message

WPF (Windows Presentation Foundation) is a technology that enables you to create windows and dialogs. The advantage of WPF is that the window design...

Sending Email via Outlook

Of course you can send emails directly via SMTP server using Send-MailMessage. But if you want to prefill an email form in your default MAPI client,...

Finding Default MAPI Client

Your MAPI client is the email client that by default is used with URLs like "mailto:". To find out if there is a MAPI client, and if so,...

Getting Arguments from Command Line

In a previous tip we illustrated how you can extract the command from a command line and strip all arguments. Today, you get a function that does...

1 50 51 52 53 54 95