PowerShell for Windows Admins:

Powershell


November 19, 2015  2:49 PM

Splatting and Default parameters

Richard Siddaway Richard Siddaway Profile: Richard Siddaway
Powershell

One thing you don’t hear much about is default parameters. Consider this Get-CimInstance -ClassName Win32_LogicalDisk -Filter "DeviceId = 'C:'" A pretty standard use of CIM. Now think if you have to do this across a number of machines on a regular basis. Typing could get a bit...

November 18, 2015  8:10 AM

Out of Process

Richard Siddaway Richard Siddaway Profile: Richard Siddaway
Powershell

One thing I’ve been seeing come up a lot recently is the problem of modules and cmdlets cot being available when jobs and workflows are executed even though the module has been specifically loaded into PowerShell. This is because workflows and Jobs run in a separate process when you execute...


November 16, 2015  12:51 PM

Accessing WMI

Richard Siddaway Richard Siddaway Profile: Richard Siddaway
Powershell, WMI

There are 3 sets of cmdlets for working with WMI classes – the WMI cmdlets, the WSMAN cmdlets and the CIM cmdlets. The protocols used by these 3 sets are different. The WMI cmdlets introduced in PowerShell 1 & 2 use DCOM for local and remote access under all circumstances The WSMAN...


November 14, 2015  12:51 PM

PowerShell + DevOps Global Summit 2016 – the agenda

Richard Siddaway Richard Siddaway Profile: Richard Siddaway
Powershell

We've finalised the agenda and we're starting to publish session information on the web site at https://eventloom.com/event/login/PSNA16 There are a handful of sessions on the site at present. The rest will be added over the next week or so. Keep checking back to see who's been...


November 11, 2015  2:00 PM

WMI wildcards and filtering

Richard Siddaway Richard Siddaway Profile: Richard Siddaway
CIM, Powershell, WMI

A question on the forum asking about filtering WMI results raises a number of interesting points. The user wanted to pass a computername and a filter term to pull product information from remote machines. I ended up with this $computername = $env:COMPUTERNAME $filter = 'Live' $scriptblock...


November 6, 2015  1:48 PM

PowerShell in Action, 3e MEAP 2

Richard Siddaway Richard Siddaway Profile: Richard Siddaway
Books, Powershell

Another chapter of PowerShell in Action third edition has been released into the MEAP process. – see 0 Comments     RSS Feed     Email a friend


November 4, 2015  5:13 AM

WMI cmdlets and credentials

Richard Siddaway Richard Siddaway Profile: Richard Siddaway
Powershell, WMI

If you’re working with the WMI cmdlets and need to pass credentials you’ll end up with a statement something like this Get-WmiObject -Class Win32_ComputerSystem -ComputerName $computer -Credential $cred If the computer name defaults to the local host or you use . or ‘localhost’ as the...


October 30, 2015  11:37 AM

Creating DNS records

Richard Siddaway Richard Siddaway Profile: Richard Siddaway
DNS, Powershell

Following on from my previous post about creating a reverse lookup zone in DNS here’s a function to create records in that zone. The function takes an IP address and name (of host) and uses Add-DnsServerResourceRecordA  to add the record to the forward lookup zone – I use my default AD...


October 30, 2015  11:36 AM

Create a reverse lookup zone

Richard Siddaway Richard Siddaway Profile: Richard Siddaway
DNS, Powershell

I needed to create a DNS reverse lookup zone for my test environment. With Windows Server 2012 R2 I’ve got cmdlets available for managing DNS servers – the DnsServer module. You need to install the DNS role or the DNS RSAT tools to get access to the module.   To create a new reverse...


October 29, 2015  12:31 PM

Win free entry to the PowerShell Summit

Richard Siddaway Richard Siddaway Profile: Richard Siddaway
Powershell

Want to go to the PowerShell Summit? Want to go for free? You can win free entry to the Summit (need to pay your own travel & hotel) through the competition at 0 Comments     RSS Feed     Email a friend


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: