PowerShell for Windows Admins:

Powershell


November 16, 2015  12:51 PM

Accessing WMI

Richard Siddaway Richard Siddaway Profile: Richard Siddaway
Powershell, WMI

There are 3 sets of cmdlets for working with WMI classes – the WMI cmdlets, the WSMAN cmdlets and the CIM cmdlets. The protocols used by these 3 sets are different. The WMI cmdlets introduced in PowerShell 1 & 2 use DCOM for local and remote access under all circumstances The WSMAN...

November 14, 2015  12:51 PM

PowerShell + DevOps Global Summit 2016 – the agenda

Richard Siddaway Richard Siddaway Profile: Richard Siddaway
Powershell

We've finalised the agenda and we're starting to publish session information on the web site at https://eventloom.com/event/login/PSNA16 There are a handful of sessions on the site at present. The rest will be added over the next week or so. Keep checking back to see who's been...


November 11, 2015  2:00 PM

WMI wildcards and filtering

Richard Siddaway Richard Siddaway Profile: Richard Siddaway
CIM, Powershell, WMI

A question on the forum asking about filtering WMI results raises a number of interesting points. The user wanted to pass a computername and a filter term to pull product information from remote machines. I ended up with this $computername = $env:COMPUTERNAME $filter = 'Live' $scriptblock...


November 6, 2015  1:48 PM

PowerShell in Action, 3e MEAP 2

Richard Siddaway Richard Siddaway Profile: Richard Siddaway
Books, Powershell

Another chapter of PowerShell in Action third edition has been released into the MEAP process. – see 0 Comments     RSS Feed     Email a friend


November 4, 2015  5:13 AM

WMI cmdlets and credentials

Richard Siddaway Richard Siddaway Profile: Richard Siddaway
Powershell, WMI

If you’re working with the WMI cmdlets and need to pass credentials you’ll end up with a statement something like this Get-WmiObject -Class Win32_ComputerSystem -ComputerName $computer -Credential $cred If the computer name defaults to the local host or you use . or ‘localhost’ as the...


October 30, 2015  11:37 AM

Creating DNS records

Richard Siddaway Richard Siddaway Profile: Richard Siddaway
DNS, Powershell

Following on from my previous post about creating a reverse lookup zone in DNS here’s a function to create records in that zone. The function takes an IP address and name (of host) and uses Add-DnsServerResourceRecordA  to add the record to the forward lookup zone – I use my default AD...


October 30, 2015  11:36 AM

Create a reverse lookup zone

Richard Siddaway Richard Siddaway Profile: Richard Siddaway
DNS, Powershell

I needed to create a DNS reverse lookup zone for my test environment. With Windows Server 2012 R2 I’ve got cmdlets available for managing DNS servers – the DnsServer module. You need to install the DNS role or the DNS RSAT tools to get access to the module.   To create a new reverse...


October 29, 2015  12:31 PM

Win free entry to the PowerShell Summit

Richard Siddaway Richard Siddaway Profile: Richard Siddaway
Powershell

Want to go to the PowerShell Summit? Want to go for free? You can win free entry to the Summit (need to pay your own travel & hotel) through the competition at 0 Comments     RSS Feed     Email a friend


October 26, 2015  9:07 AM

-in operator

Richard Siddaway Richard Siddaway Profile: Richard Siddaway
Powershell

As an alternative to the –contains operator you can use the –in operator Repeating the tests from the previous post on –contains PS> $primes = 1,3,5,7,11,13,17,19,23,29,31,37,41,43,47 PS> $candidate = 7 PS> $candidate -in $primes True PS> $candidate = 4 PS>...


October 26, 2015  8:57 AM

-contains operator

Richard Siddaway Richard Siddaway Profile: Richard Siddaway
Powershell

Sometimes you may want to test if a value is in a collection of values For instance $primes = 1,3,5,7,11,13,17,19,23,29,31,37,41,43,47 if you want to test if 7 is a member of the collection $candidate = 7 $primes -contains $candidate True Likewise testing 4 $candidate =...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: