The document discusses scripting and automation capabilities in GFI MAX RemoteManagement. It provides an overview of scripting concepts, how scripts can be used for monitoring checks and automated maintenance tasks, and examples of built-in and custom scripts. The document also covers best practices for writing scripts, including using command line arguments, interacting with the file system, registry, applications, and returning results.
Scripting and Automation within the MAX Platform Ernest ByrdMAXfocus
Enhance what the GFI MAX RemoteManagement Dashboard can do with user-defined custom scripts or through our built in library, allowing you to monitor VMWare host server health, exchange store size and queue length. Create your own scripts, or use those generously shared by industry peers on our designated FixitScripts website.
In this session we will cover:
•Building Scripts
•Using Scripts in the Library
•Script Types
•Using “Ones from the Internet”
AWS Lambda has changed the way we deploy and run software, but this new serverless paradigm has created new challenges to old problems - how do you test a cloud-hosted function locally? How do you monitor them? What about logging and config management? And how do we start migrating from existing architectures?
In this talk Yan will discuss solutions to these challenges by drawing from real-world experience running Lambda in production and migrating from an existing monolithic architecture.
This document provides an introduction and overview of Windows PowerShell. It discusses what PowerShell is, how it works, and how it can be used for administration tasks and extended to work with other products. The document covers PowerShell concepts like verbs, nouns, pipelines, and cmdlets. It also provides examples of using PowerShell for ad-hoc tasks and developing PowerShell scripts and cmdlets for production environments.
Testing RESTful Webservices using the REST-assured frameworkMicha Kops
The REST-assured framework and its features explained by example.
For detailed information please take a look at my full tutorial including the sources at http://www.hascode.com/2011/10/testing-restful-web-services-made-easy-using-the-rest-assured-framework/
Building a Serverless company with Node.js, React and the Serverless Framewor...Luciano Mammino
Planet9energy.com is a new electricity company building a sophisticated analytics and energy trading platform for the UK market. Since the earliest draft of the platform, we took the unconventional decision to go serverless and build the product on top of AWS Lambda and the Serverless framework using Node.js. In this talk, I want to discuss why we took this radical decision, what are the pros and cons of this approach and what are the main issues we faced as a tech team in our design and development experience. We will discuss how normal things like testing and deployment need to be re-thought to work on a serverless fashion but also the benefits of (almost) infinite self-scalability and the piece of mind of not having to manage hundreds of servers. Finally, we will underline how Node.js seems to fit naturally in this scenario and how it makes developing serverless applications extremely convenient.
This talk shares the various techniques I found whilst building the XSS cheat sheet. It contains auto executing vectors, AngularJS CSP bypasses and dangling markup attacks.
Salesforce provides an interface for testing callouts named HttpCalloutMock used to cover remote callouts. While adequate for simple callouts, in the real world you often need something more flexible, as in the case of multiple and varying responses from the same or varying endpoints. More precise testing and coverage can be obtained by extending the standard interface. Join us as we demonstrate a solution to use to enable the flexibility required for complex integration and synchronization apps.
Comet allows for bidirectional communication between server and client by allowing long-lived HTTP connections. This overcomes limitations of traditional Ajax which uses polling. Comet enables new types of highly interactive web applications such as collaborative editing and streaming financial data. It works by having the client leave an HTTP request open to the server instead of closing after each response. The server can then push updates to the client without needing the client to poll repeatedly. There are different Comet architectures and techniques for implementing it on both the client-side, such as long polling and forever frames, and server-side. While not fully standardized, Comet provides a way to build real-time web applications today despite some browser limitations.
Scripting and Automation within the MAX Platform Ernest ByrdMAXfocus
Enhance what the GFI MAX RemoteManagement Dashboard can do with user-defined custom scripts or through our built in library, allowing you to monitor VMWare host server health, exchange store size and queue length. Create your own scripts, or use those generously shared by industry peers on our designated FixitScripts website.
In this session we will cover:
•Building Scripts
•Using Scripts in the Library
•Script Types
•Using “Ones from the Internet”
AWS Lambda has changed the way we deploy and run software, but this new serverless paradigm has created new challenges to old problems - how do you test a cloud-hosted function locally? How do you monitor them? What about logging and config management? And how do we start migrating from existing architectures?
In this talk Yan will discuss solutions to these challenges by drawing from real-world experience running Lambda in production and migrating from an existing monolithic architecture.
This document provides an introduction and overview of Windows PowerShell. It discusses what PowerShell is, how it works, and how it can be used for administration tasks and extended to work with other products. The document covers PowerShell concepts like verbs, nouns, pipelines, and cmdlets. It also provides examples of using PowerShell for ad-hoc tasks and developing PowerShell scripts and cmdlets for production environments.
Testing RESTful Webservices using the REST-assured frameworkMicha Kops
The REST-assured framework and its features explained by example.
For detailed information please take a look at my full tutorial including the sources at http://www.hascode.com/2011/10/testing-restful-web-services-made-easy-using-the-rest-assured-framework/
Building a Serverless company with Node.js, React and the Serverless Framewor...Luciano Mammino
Planet9energy.com is a new electricity company building a sophisticated analytics and energy trading platform for the UK market. Since the earliest draft of the platform, we took the unconventional decision to go serverless and build the product on top of AWS Lambda and the Serverless framework using Node.js. In this talk, I want to discuss why we took this radical decision, what are the pros and cons of this approach and what are the main issues we faced as a tech team in our design and development experience. We will discuss how normal things like testing and deployment need to be re-thought to work on a serverless fashion but also the benefits of (almost) infinite self-scalability and the piece of mind of not having to manage hundreds of servers. Finally, we will underline how Node.js seems to fit naturally in this scenario and how it makes developing serverless applications extremely convenient.
This talk shares the various techniques I found whilst building the XSS cheat sheet. It contains auto executing vectors, AngularJS CSP bypasses and dangling markup attacks.
Salesforce provides an interface for testing callouts named HttpCalloutMock used to cover remote callouts. While adequate for simple callouts, in the real world you often need something more flexible, as in the case of multiple and varying responses from the same or varying endpoints. More precise testing and coverage can be obtained by extending the standard interface. Join us as we demonstrate a solution to use to enable the flexibility required for complex integration and synchronization apps.
Comet allows for bidirectional communication between server and client by allowing long-lived HTTP connections. This overcomes limitations of traditional Ajax which uses polling. Comet enables new types of highly interactive web applications such as collaborative editing and streaming financial data. It works by having the client leave an HTTP request open to the server instead of closing after each response. The server can then push updates to the client without needing the client to poll repeatedly. There are different Comet architectures and techniques for implementing it on both the client-side, such as long polling and forever frames, and server-side. While not fully standardized, Comet provides a way to build real-time web applications today despite some browser limitations.
Top 5 Tips to Increase Field Service Technician UtilizationServiceMax
See research and tips on how to further increase your field service technician's utilization rates to help increase revenue and drive down costs in your field service organization.
For more information, contact ServiceMax at:
Email: info@servicemax.com
Phone: 1-800-756-4960
We will provide instructions on adding personalization (merge fields) into your ExactTarget emails from Data Extensions or Lists. Additionally, we will cover AMPscript basics (declaring, setting, and retrieving variables) and formatting functions (ProperCase, Lowercase, Uppercase, and RedirectTo).
This document provides a summary of a patent landscaping analysis of vaccines and drugs available for HIV/AIDS. It describes searching several databases including USPTO, ESPACENET, and PATENT LENS to identify relevant patents. Tables and graphs were generated based on assignee country and publication year. The analysis mapped intellectual property and identified patent coverage of competitive inventions. It highlights areas of the public domain and potential partners with adjacent intellectual property in order to understand business risks and opportunities in developing new HIV/AIDS products.
Los quimbayas habitaban el territorio de Colombia prehispánica y se destacaron por su habilidad en la orfebrería, logrando estilos depurados y finos en delicadas joyas de oro. Crearon elegantes vasijas decoradas con pintura negativa, figuras antropomorfas y urnas funerarias. A pesar de seguir normas geométricas, cada pieza muestra individualidad, desde naturalismo hasta inicios de abstracción. Practicaron deformación craneana en recién nacidos para cambiar su aspecto natural.
This document describes a study that used molecular methods including PCR and sequencing of the internal transcribed spacer 1 (ITS1) region to analyze the genetic diversity of anaerobic fungi in the gastrointestinal tracts of buffalo. Total DNA was extracted from rumen samples and the ITS1 region was amplified and sequenced. Sequence analysis of 12 clones showed diversity among the anaerobic fungal isolates. The results indicate that analysis of the ITS1 spacer through molecular techniques is a promising approach for comparing rumen fungal populations and diversity.
La empresa Delivery Express S.A. busca optimizar los recursos humanos para realizar múltiples tareas y ofrecer un servicio las 24 horas del día. La empresa también busca alianzas con proveedores para reducir costos y cuenta con personal calificado para lograr un alto rendimiento. Sin embargo, también enfrenta retos como la posible competencia de otras entidades y retrasos en la entrega de pedidos.
14 Latest modern decor ideas, healing art, for a zentastic lifestyle, for the urban sophisticate! 14 great interior decor ideas with my healing paintings. Feng shui, Reiki symbol healing paintings to refresh, nourish your soul and your space! Thank you for coming by Razarts! Have a Great day and All the Best from Rizwana! www.razarts.com
The digital marketing campaign aims to increase traffic to People's website and magazine subscriptions through social media engagement, a Google AdWords campaign, and mobile updates. Goals include redesigning the Facebook page, live streaming red carpet events, and creating a VIPeople rewards program to acquire new subscribers. The $200,000 budget will be allocated across these social media, internet, mobile, and advertising initiatives.
Estudo mostra a intenção de consumo dos catarinenses para o feriado deste ano. Pesquisa foi realizada pela Fecomércio SC e mostra queda de 1,8% em relação à 2014.
The document summarizes details about the Google in Education UK Summit taking place on April 27-28, 2013, including that it will be held over two days with evening social events, aims to provide knowledge for various education jobs through 30+ sessions at different experience levels, and encourages attending for networking, trying Chromebooks, presenting, and promoting products or services to forward-thinking educators. Attendees can register at www.uksummit.org/registration for more information.
El documento convoca a miembros de la Federación Internacional de Karate Shotokan de México a un seminario impartido por el Maestro Yutaka Yaguchi del 27 al 29 de septiembre. El seminario incluirá clases, demostraciones y exámenes para cintas de diferentes colores. Se proporcionan detalles sobre horarios, ubicación, costos e información requerida para los exámenes de grado.
The document discusses how libraries can build social capital in their communities by moving beyond traditional collections, programs, and partnerships. It advocates for non-traditional collections like seed libraries, board games, and musical instruments. It also suggests allowing community members to help drive collection development and create library programs. The document provides examples of partnering with local organizations on activities and sharing costs and resources. It emphasizes the importance of finding out what the community wants and getting stakeholder buy-in before implementing new initiatives.
This document is a student paper exploring the concept of "women's rights are human rights." It begins by providing context on the establishment of South Africa's constitution and bill of rights in 1996. It then examines perspectives from the past that viewed human rights as excluding women. Hillary Clinton's famous 1995 speech declaring "women's rights are human rights" sparked global recognition of the injustices women faced. The document discusses how women globally began asserting their human rights in response to oppression. It concludes by analyzing how the South African constitution has incorporated women's rights and promoted equality through various legislative acts.
The goal of this talk is to provide new and existing Elixir programmers with knowledge on how to get their application into production and, once it's there, how to tune it for scale.
This document provides an overview of remote management technologies in Windows-based infrastructure, including legacy technologies like WMI and RPC as well as newer tools like PowerShell. It discusses how WMI allows managing both local and remote Windows computers using classes that describe manageable elements. It also covers administrative tools for remote management like MMC, Sysinternals PsTools, and built-in command line utilities. The document concludes with a discussion of administrative shares and an invitation for any final questions.
Going Serverless with Java - a real life storyHerman Lintvelt
It took us a few months to roll out a complete production quality backend system for a new application using AWS, Java and the serverless.com framework. In this talk I want to take you through what we learned. We will see how to get going, how to think about designing your services (hint: DDD), which AWS services to consider, how to deploy, test, monitor & debug it. And then of course all the interesting tips and tricks you don’t find in the documentation, like how to define your API using Swagger, how to keep secrets safe, and 3 different ways to map Lambda events to Java.
Using Apache as an Application Server allows building web applications with less effort by leveraging Apache's support for request processing, security, logging, and other services. The document discusses how Apache modules can integrate application services by running inside the Apache process and having access to the full HTTP request lifecycle. It provides an example Apache configuration and architecture for implementing a rule interpretation engine as an Apache module to deliver dynamic JavaScript for context-aware web pages.
Top 5 Tips to Increase Field Service Technician UtilizationServiceMax
See research and tips on how to further increase your field service technician's utilization rates to help increase revenue and drive down costs in your field service organization.
For more information, contact ServiceMax at:
Email: info@servicemax.com
Phone: 1-800-756-4960
We will provide instructions on adding personalization (merge fields) into your ExactTarget emails from Data Extensions or Lists. Additionally, we will cover AMPscript basics (declaring, setting, and retrieving variables) and formatting functions (ProperCase, Lowercase, Uppercase, and RedirectTo).
This document provides a summary of a patent landscaping analysis of vaccines and drugs available for HIV/AIDS. It describes searching several databases including USPTO, ESPACENET, and PATENT LENS to identify relevant patents. Tables and graphs were generated based on assignee country and publication year. The analysis mapped intellectual property and identified patent coverage of competitive inventions. It highlights areas of the public domain and potential partners with adjacent intellectual property in order to understand business risks and opportunities in developing new HIV/AIDS products.
Los quimbayas habitaban el territorio de Colombia prehispánica y se destacaron por su habilidad en la orfebrería, logrando estilos depurados y finos en delicadas joyas de oro. Crearon elegantes vasijas decoradas con pintura negativa, figuras antropomorfas y urnas funerarias. A pesar de seguir normas geométricas, cada pieza muestra individualidad, desde naturalismo hasta inicios de abstracción. Practicaron deformación craneana en recién nacidos para cambiar su aspecto natural.
This document describes a study that used molecular methods including PCR and sequencing of the internal transcribed spacer 1 (ITS1) region to analyze the genetic diversity of anaerobic fungi in the gastrointestinal tracts of buffalo. Total DNA was extracted from rumen samples and the ITS1 region was amplified and sequenced. Sequence analysis of 12 clones showed diversity among the anaerobic fungal isolates. The results indicate that analysis of the ITS1 spacer through molecular techniques is a promising approach for comparing rumen fungal populations and diversity.
La empresa Delivery Express S.A. busca optimizar los recursos humanos para realizar múltiples tareas y ofrecer un servicio las 24 horas del día. La empresa también busca alianzas con proveedores para reducir costos y cuenta con personal calificado para lograr un alto rendimiento. Sin embargo, también enfrenta retos como la posible competencia de otras entidades y retrasos en la entrega de pedidos.
14 Latest modern decor ideas, healing art, for a zentastic lifestyle, for the urban sophisticate! 14 great interior decor ideas with my healing paintings. Feng shui, Reiki symbol healing paintings to refresh, nourish your soul and your space! Thank you for coming by Razarts! Have a Great day and All the Best from Rizwana! www.razarts.com
The digital marketing campaign aims to increase traffic to People's website and magazine subscriptions through social media engagement, a Google AdWords campaign, and mobile updates. Goals include redesigning the Facebook page, live streaming red carpet events, and creating a VIPeople rewards program to acquire new subscribers. The $200,000 budget will be allocated across these social media, internet, mobile, and advertising initiatives.
Estudo mostra a intenção de consumo dos catarinenses para o feriado deste ano. Pesquisa foi realizada pela Fecomércio SC e mostra queda de 1,8% em relação à 2014.
The document summarizes details about the Google in Education UK Summit taking place on April 27-28, 2013, including that it will be held over two days with evening social events, aims to provide knowledge for various education jobs through 30+ sessions at different experience levels, and encourages attending for networking, trying Chromebooks, presenting, and promoting products or services to forward-thinking educators. Attendees can register at www.uksummit.org/registration for more information.
El documento convoca a miembros de la Federación Internacional de Karate Shotokan de México a un seminario impartido por el Maestro Yutaka Yaguchi del 27 al 29 de septiembre. El seminario incluirá clases, demostraciones y exámenes para cintas de diferentes colores. Se proporcionan detalles sobre horarios, ubicación, costos e información requerida para los exámenes de grado.
The document discusses how libraries can build social capital in their communities by moving beyond traditional collections, programs, and partnerships. It advocates for non-traditional collections like seed libraries, board games, and musical instruments. It also suggests allowing community members to help drive collection development and create library programs. The document provides examples of partnering with local organizations on activities and sharing costs and resources. It emphasizes the importance of finding out what the community wants and getting stakeholder buy-in before implementing new initiatives.
This document is a student paper exploring the concept of "women's rights are human rights." It begins by providing context on the establishment of South Africa's constitution and bill of rights in 1996. It then examines perspectives from the past that viewed human rights as excluding women. Hillary Clinton's famous 1995 speech declaring "women's rights are human rights" sparked global recognition of the injustices women faced. The document discusses how women globally began asserting their human rights in response to oppression. It concludes by analyzing how the South African constitution has incorporated women's rights and promoted equality through various legislative acts.
The goal of this talk is to provide new and existing Elixir programmers with knowledge on how to get their application into production and, once it's there, how to tune it for scale.
This document provides an overview of remote management technologies in Windows-based infrastructure, including legacy technologies like WMI and RPC as well as newer tools like PowerShell. It discusses how WMI allows managing both local and remote Windows computers using classes that describe manageable elements. It also covers administrative tools for remote management like MMC, Sysinternals PsTools, and built-in command line utilities. The document concludes with a discussion of administrative shares and an invitation for any final questions.
Going Serverless with Java - a real life storyHerman Lintvelt
It took us a few months to roll out a complete production quality backend system for a new application using AWS, Java and the serverless.com framework. In this talk I want to take you through what we learned. We will see how to get going, how to think about designing your services (hint: DDD), which AWS services to consider, how to deploy, test, monitor & debug it. And then of course all the interesting tips and tricks you don’t find in the documentation, like how to define your API using Swagger, how to keep secrets safe, and 3 different ways to map Lambda events to Java.
Using Apache as an Application Server allows building web applications with less effort by leveraging Apache's support for request processing, security, logging, and other services. The document discusses how Apache modules can integrate application services by running inside the Apache process and having access to the full HTTP request lifecycle. It provides an example Apache configuration and architecture for implementing a rule interpretation engine as an Apache module to deliver dynamic JavaScript for context-aware web pages.
Azure Cosmos DB - The Swiss Army NoSQL Cloud DatabaseBizTalk360
Microsoft Cosmos DB is the Swiss army NoSQL database in the cloud. It is a multi-model, multi-API, globally-distributed, highly-available, and secure No-SQL database in Azure. In this session, we will explore its capabilities and features through several demos.
DevOps Fest 2019. Игорь Фесенко. DevOps: Be good, Get good or Give upDevOps_Fest
В данной презентации, мы рассмотрим три ключевых момента в культуре DevOps, а именно Continuous Integration, Continuous Delivery и Post-Production фазы, и как методом проб и ошибок менялись наши подходы.
Доклад построен на базе опыта построения и постоянной модернизации приложений для интеграции глобальных экосистем.
Когда есть требования по поводу производительности, безопасности, и высокой доступности распределенного приложения некоторые стандартные подходы могут усложнить нашу жизнь, и я продемонстрирую с какими проблемами нам пришлось столкнуться и какие решения были использованы.
1. The document provides an introduction to the Node.js course, covering topics like JavaScript basics, Node.js fundamentals, Express.js, debugging, and more.
2. Key concepts discussed include how the Node.js runtime works, using core modules, asynchronous programming with callbacks and promises, and the module system.
3. Express.js is introduced as a popular web framework that handles requests and responses, routing, and other complex server tasks so developers can focus on business logic. Debugging tools are also covered.
This document provides an overview of Device Guard and techniques to bypass its application whitelisting capabilities. It begins with an introduction to Device Guard and what arbitrary code execution means under application whitelisting. It then discusses various bypass techniques, including using VBA macros, Excel 4.0 macros, ActiveScript hosts, and XSLT transforms to execute arbitrary code without requiring whitelisted applications. It notes that many of these techniques can be used for stealthy execution regardless of Device Guard. The document concludes by stating that the bypasses described could be detected with the right monitoring but that locking down Office and implementing a consistent ActiveScript model could help strengthen the feature.
Gentle introduction to Azure ARM templates and other deployment options, both imperative and declarative, such as Terraform, Ansible, or even azcli or PowerShell.
The document discusses a gate pass system project that provides security and shows comparability with passing elements through multiple steps. It includes checking an element, showing its status, and passing the element through the security levels. The project defines many attributes and properties to demonstrate the security features.
Security DevOps - Free pentesters' time to focus on high-hanging fruits // Ha...Christian Schneider
The document discusses integrating security testing into continuous integration pipelines, referred to as "Security DevOps". It proposes a "Security DevOps Maturity Model" with four axes: Static Depth, Dynamic Depth, Intensity, and Consolidation. For the Dynamic Depth axis, it describes different levels of integrating dynamic application security testing tools like ZAP, Arachni, BDD-Security, and Gauntlt to test public, authenticated, and backend application layers within a CI pipeline. Examples are given for configuring the tools to perform targeted scans during commits or nightly builds.
VxClass is a system that uses automated unpacking, disassembly, comparison, and clustering algorithms to group malware into families in order to generate byte-based signatures for each cluster to help antivirus companies more quickly detect new malware variants. It processes malware through stages of unpacking, comparison, clustering based on similarity, and then generates signatures of common code shared among all members of a cluster. This clustering and signature generation approach aims to help antivirus companies more efficiently identify and classify new malware variants at scale.
Silicon Valley JUG - How to generate customized java 8 code from your databaseSpeedment, Inc.
The best code is the one you never need to write. Using code generation and automated builds you can minimize the risk of human error when developing software, but how do you maintain control over code when large parts of it is handed over to a machine? In this tutorial, you will learn how to use open-source software to create and control code automation. You will see how you can generate a completely object-oriented domain model by automatically analyzing your database schemas. Every aspect of the process is transparent and configurable, giving you as a developer 100% control of the generated code. This will not only increase your productivity, but also help you build safer and more maintainable Java applications.
How to generate customized java 8 code from your databaseSpeedment, Inc.
Did you know that database classes, that require many lines of Java and SQL code, may be replaced with a single line of Java 8 code? In this tutorial session you will learn how to use standard Java 8 Streams as an alternative to traditional Object Relational Mappers (ORM). We will use the open-source tool Speedment to show how development speed can be increased and how the application code can be more concise and run faster.
AWS re:Invent 2016: Deploying and Managing .NET Pipelines and Microsoft Workl...Amazon Web Services
In this session, we’ll look at the AWS services that customers are using to build and deploy Microsoft-based solutions that use technologies like Windows, .NET, SQL Server, and PowerShell. We’ll start by showing you how to build a Windows-based CI/CD pipeline on AWS using AWS CodeDeploy, AWS CodePipeline, AWS CloudFormation, and PowerShell using an AWS Quick Start. We’ll also cover best practices for how you can create templates that let you automatically deploy ready-to-use Windows products by leveraging services and tools like AWS CloudFormation, PowerShell, and Git. Woot, an online retailer for electronics, will share how it moved from using a complex mix of custom PowerShell code for its DevOps processes to using services like Amazon EC2 Simple Systems Manager (SSM), AWS CodeDeploy, and AWS Directory Service. This migration eliminated the need for complex PowerShell scripts and reduced the operational complexity of performing operational tasks like renaming servers, joining domains, and securely handling keys.
Stratio Streaming is the result of combining the power of Spark Streaming as a continuous computing framework and Siddhi CEP engine as complex event processing engine.
This document summarizes new features in .NET Framework 4.5, including improvements to WeakReferences, streams, ReadOnlyDictionary, compression, and large objects. It describes enhancements to server GC, asynchronous programming, the Task Parallel Library, ASP.NET, Entity Framework, WCF, WPF, and more. The .NET 4.5 update focuses on performance improvements, support for asynchronous code and parallel operations, and enabling modern app development patterns.
Similar to Scripting and Automation within the MAX Platform - Mark Petrie (20)
If last year’s presentation on the SANS 20 felt like more of a rant than a practical application of elite IT knowledge, Ian Trump’s technical track presentation is going to unleash GFI MAX as a security dashboard like nothing you have seen.
The Octopi team has leveraged network scanning and event log checks, and Ian takes the GFI MAX dashboard to a whole new level. MSP’s can take his code and research and immediately apply it to their practices to secure their customers from cyber threats. Dehydrated from the summer information security conferences, Ian will give you the threat intel you need to be on the lookout for in the months ahead.
Besides all the GFI MAX goodness, being part of a live demo to find APT, and seeing Ian link Human Rights, Market Research, Ice, Law, Iggy Azalea, War Ferrets, Christian Studies, Event Auditing, Security Tools, Taylor Swift and How we can all fix the cyber problem into one epic presentation – well, you don’t want to miss this.
Delivering Security Within the MAX Remote Management Platform - Todd HaughlandMAXfocus
Security is every customers top concern and can be a real worry for MSPs - unless they use the MAX RemoteManagement Platform of course.
Here we’ll look at how to provide the most comprehensive and robust security solution for your customers covering all aspect of security from Web Protection and Antivirus to Server and Workstation Monitoring and of course Patch Management.
Soon you’ll stop worrying about security on each and every device you manage - and start to relax while MAX takes care of the work for you.
For this we’ll look at:
•Web Protection
•Managed Antivirus
•Hacker Checks
•Patching Deployments.
Creating Positive User Experiences Through Technology - Paul KennyMAXfocus
This document discusses key insights and strategies for building value in sales. It outlines three insights: that value exists only in the mind of the buyer, few purchasing decisions are rational, and perceptions of value are driven by many different factors. It then discusses five key battles in sales: first impression, insight and understanding, air time, credibility, and relationship and rapport. Finally, it outlines five sales super powers or habits that can help create value: understanding value, dialogue, sharing stories, asking for commitment, and managing resistance.
Welcome and MAX Keynotes - Dave Sobel and Alistair ForbesMAXfocus
This document provides an overview of the MAX Customer Conference 2014, including:
- A welcome from Dave Sobel, Director of Partner Community at GFI MAX
- Information about various GFI MAX team members and their roles
- Statistics on industry trends like BYOD policies and security concerns
- Details on the evolving role of MSPs and characteristics that allow them to remain valuable
- An overview from Alistair Forbes, General Manager, of new GFI MAX products, features, and improvements
- Information on sales playbooks and educational webinars available for partners.
The document provides information about the MAX Customer Conference 2014, including the conference director Dave Sobel, relevant hashtags and social media handles, sponsoring organizations, and statistics on the amount of business and technical content to be delivered including videos, playbooks, and whitepapers.
Maximise Your Reputation in the Marketplace Jason KingMAXfocus
One of the biggest factors in determining how your target market perceives your business relates to the performance of your salespeople.
In this session we will discuss:
How to maintain existing business relationships so that your clients ignore approaches from your competitors
How to effectively prospect for new business without having to cold call
How to prepare and present compelling business proposals (not quotes)
Improvements in these key areas will significantly improve your reputation in the marketplace.
Consolidating your Services Portfolio with GFI MAX - Jason Parsons and Steve ...MAXfocus
Wyvern Business Systems had a problem. They were billing their clients for support monthly, antivirus quarterly, spam protection yearly. The invoices coming in from various suppliers weren’t much clearer. Engineers didn’t know which clients were using what services from which supplier. Accounts didn’t know which supplier invoices should go against which customer revenue. The poor clients were being flooded with invoices. What a mess.
In response, over the past two years, Wyvern have gone through the process of consolidating and improving their service portfolio using GFI MAX. The outcome of this has been beneficial to both the business and their clients.
Wyvern can now offer enhanced, cost-effective solutions to their customers. The business has also been able to simplify their internal practices and have benefited from all the features of MAX, from effortless cloud based management to clear costs and billing.
Jason and Steve from Wyvern would like to share this experience with other GFI MAX customers, of which they are sure have had or are going through similar scenarios.
Managed Services in 2014: Pricing and Positioning - Dave SobelMAXfocus
Managed Services in 2014 has grown and changed. Cloud and mobility change the model from strictly device management to a complex eco-system of management. Through analysis of the latest market data, Dave Sobel, GFI MAX’s Director of Partner Community, will show proven techniques for building a pipeline of interested customers ready to invest in their IT and deliver annuity revenue at higher margin. Discussion will include go-to-market techniques and pricing models for a variety of managed services, from traditional to backup to mobile.
Delivering Security with the MAX RemoteManagement Platform - Paul FenwickMAXfocus
Security is every customers top concern and can be a real worry for MSPs - unless they use the MAX RemoteManagement Platform of course.
Here we’ll look at how to provide the most comprehensive and robust security solution for your customers covering all aspect of security from Web Protection and Antivirus to Server and Workstation Monitoring and of course Patch Management.
Soon you’ll stop worrying about security on each and every device you manage - and start to relax while MAX takes care of the work for you.
For this we’ll look at:
Web Protection
Managed Antivirus
Hacker Checks
Patching Deployments.
Lessons from the Trenches Selling and Marketing Best Practices Terry HeddenMAXfocus
Would you like to grow your managed IT services business revenue over 35,000% in 6 years? If so, this session is for you! A 12 year veteran that leveraged bootstrap marketing to build his Managed IT service business shares his ‘secret sauce’ to building his business to help you grow yours. This session focuses on practical, cost-effective, high impact marketing programs and sales strategies designed to quickly identify and CLOSE a steady stream of Managed IT and Cloud clients. His program is applicable to firms of all sizes looking to grow cloud and managed services-oriented recurring revenue.
Recruit & Retain Top Talent - Michael SchmditmannMAXfocus
Breakout 1.1 - Room 1: Recruit & Retain Top Talent - Gain a Competitive Advantage - Michael S.
Hiring great salespeople and engineers has always been a challenge. As you migrate to new business models for cloud and services sales, it might be even harder to find employees with the needed skills.
This session will show you how to hire and retain game-changing talent.
•Attract Quality Candidates
•How to Screen Effectively
•Avoid Critical Hiring Mistakes
Once hired, are your employees set to succeed? Do they have an exciting career path that incents them to improve their skills and value to your organization?
Hiring and retaining multi-million dollar salespeople and great engineers is simple but not easy. Learn the winning formula in this fast-paced, entertaining session.
This session is led by John Gaillard and Mike Schmidtmann, who work with Solution Providers across the country to grow their businesses and improve profits.
Lessons from the Worlds Top 5 MSPs MAX2014 - Gordon Tan MAXfocus
The document discusses secrets to success from the top 5 most successful MSPs based on research. The 3 secrets are:
1) Developing a strong company culture that is intentionally managed, as culture guides employee decisions.
2) Having structured and systematic customer satisfaction processes, like regular surveys and feedback meetings, to consistently improve service.
3) Maintaining appropriate prices to ensure sufficient resources for good service, while being selective about clients.
Getting from $400k to $4m - the Four Biggest Operational Challenges - Gordan TanMAXfocus
Everyone knows it takes a lot of blood, sweat and tears to grow a managed service business and some are more successful than others. Gordon Tan, owner of R & G Technologies and founder of Client Heartbeat knows this more than most having grown his business from a one man operator, to a four million dollar IT services business. In this not to be missed session, he shares real world insights and practical examples into his four biggest operational challenges over the course of this growth and how he overcame them.
5 Critical Steps for Selling Managed Services - Adam Harris MAXfocus
This document provides an overview of critical steps for selling managed services, including identifying the decision makers, understanding value propositions, qualifying leads, and managing sales teams. It discusses moving from capital expenditures to operating expenditures, the importance of vision and values, and recruiting the right salespeople. The key steps outlined are establishing credibility, qualifying needs and motivations, presenting solutions, presenting pricing, and signing contracts. People engagement and getting the right people on the sales team are also covered.
Max Backup Roadmap and Strategy Presentation - Eric Harless MAXfocus
The document discusses integrated and dedicated backup solutions from MAX Backup. It provides an overview of Manage Online Backup (MOB) and GFI MAX Backup, comparing their features. MOB is an integrated cloud backup solution within MAX Remote Management, while MAX Backup is a standalone hybrid cloud solution. The document reviews the product roadmaps and release histories of both solutions and provides examples of backup and recovery scenarios.
How we turned Office 365 from a threat to an opportunity- Dan ScottMAXfocus
1. Complete I.T. saw Microsoft's retirement of SBS as both a threat and an opportunity - it could lose existing clients but also introduce new recurring revenue services like Office 365.
2. It viewed Office 365 positively as something that provided accessibility, rich features, and opportunities to replace aging SBS systems and bring in new clients, generating licensing revenue, project revenue, and support contracts.
3. By engaging as a partner rather than just a customer, Complete I.T. was able to gain training and marketing benefits from Microsoft that helped promote Office 365 and bring in new clients like Jimmy's Iced Coffee at no acquisition cost.
Delivering Security with GFI MAX - Mark Petrie MAXfocus
GFI MAX provides managed security services through remote monitoring and management. It offers multi-layer protection including asset tracking, proactive monitoring for failed login attempts, patch management, managed antivirus, and web protection from a single interface. While security threats are increasing, managed security services are growing to address organizations' lack of in-house security skills and need for around-the-clock protection.
7 reasons your backups should go to the cloud - Nick Cavalancia MAXfocus
The document discusses 7 reasons why backups should be done in the cloud: availability, scalability, security, speed, recovery, billing, and overall advantages for both customers and service providers. Moving backups to the cloud provides customers with always-available, redundant data storage with unlimited scalability, while allowing service providers to offer expanded service options and generate recurring revenue.
The Mysterious Case of the Vanishing Cloud - Seth Robinson MAXfocus
The document discusses findings from a survey about cloud computing adoption trends among IT channel firms. Some key findings include:
- Over 90% of companies now use some form of cloud computing, with cloud-based IT resources growing significantly between 2012-2014.
- Most channel firms have a positive view of cloud's impact and expect their cloud-based revenue to increase substantially in the coming year.
- While public cloud adoption is higher, many firms also utilize private clouds. The top private cloud platforms are vCloud, OpenStack, and CloudStack.
- Firms see benefits like recurring revenue models and opportunities to transform their businesses and services through cloud technologies.
- Cloud adoption progresses through stages from experimentation to full production use
Cristiano gave a speech thanking GFI MAX for the opportunity. As his English is not strong, he read from a prepared speech. He introduced himself as the owner of CLS, an IT services company in Brazil. Prior to 2013, CLS struggled with a lack of integrated monitoring and remote access tools. After discovering GFI MAX in 2013, CLS implemented its solutions and saw improvements in customer satisfaction, productivity, and revenue. CLS now has a Network Operations Center, uses GFI MAX for remote monitoring and management, and GFI MAX ServiceDesk for ticketing, all of which helped CLS better serve its customers and grow its business.
SOCRadar's Aviation Industry Q1 Incident Report is out now!
The aviation industry has always been a prime target for cybercriminals due to its critical infrastructure and high stakes. In the first quarter of 2024, the sector faced an alarming surge in cybersecurity threats, revealing its vulnerabilities and the relentless sophistication of cyber attackers.
SOCRadar’s Aviation Industry, Quarterly Incident Report, provides an in-depth analysis of these threats, detected and examined through our extensive monitoring of hacker forums, Telegram channels, and dark web platforms.
Need for Speed: Removing speed bumps from your Symfony projects ⚡️Łukasz Chruściel
No one wants their application to drag like a car stuck in the slow lane! Yet it’s all too common to encounter bumpy, pothole-filled solutions that slow the speed of any application. Symfony apps are not an exception.
In this talk, I will take you for a spin around the performance racetrack. We’ll explore common pitfalls - those hidden potholes on your application that can cause unexpected slowdowns. Learn how to spot these performance bumps early, and more importantly, how to navigate around them to keep your application running at top speed.
We will focus in particular on tuning your engine at the application level, making the right adjustments to ensure that your system responds like a well-oiled, high-performance race car.
Using Query Store in Azure PostgreSQL to Understand Query PerformanceGrant Fritchey
Microsoft has added an excellent new extension in PostgreSQL on their Azure Platform. This session, presented at Posette 2024, covers what Query Store is and the types of information you can get out of it.
Microservice Teams - How the cloud changes the way we workSven Peters
A lot of technical challenges and complexity come with building a cloud-native and distributed architecture. The way we develop backend software has fundamentally changed in the last ten years. Managing a microservices architecture demands a lot of us to ensure observability and operational resiliency. But did you also change the way you run your development teams?
Sven will talk about Atlassian’s journey from a monolith to a multi-tenanted architecture and how it affected the way the engineering teams work. You will learn how we shifted to service ownership, moved to more autonomous teams (and its challenges), and established platform and enablement teams.
WWDC 2024 Keynote Review: For CocoaCoders AustinPatrick Weigel
Overview of WWDC 2024 Keynote Address.
Covers: Apple Intelligence, iOS18, macOS Sequoia, iPadOS, watchOS, visionOS, and Apple TV+.
Understandable dialogue on Apple TV+
On-device app controlling AI.
Access to ChatGPT with a guest appearance by Chief Data Thief Sam Altman!
App Locking! iPhone Mirroring! And a Calculator!!
When it is all about ERP solutions, companies typically meet their needs with common ERP solutions like SAP, Oracle, and Microsoft Dynamics. These big players have demonstrated that ERP systems can be either simple or highly comprehensive. This remains true today, but there are new factors to consider, including a promising new contender in the market that’s Odoo. This blog compares Odoo ERP with traditional ERP systems and explains why many companies now see Odoo ERP as the best choice.
What are ERP Systems?
An ERP, or Enterprise Resource Planning, system provides your company with valuable information to help you make better decisions and boost your ROI. You should choose an ERP system based on your company’s specific needs. For instance, if you run a manufacturing or retail business, you will need an ERP system that efficiently manages inventory. A consulting firm, on the other hand, would benefit from an ERP system that enhances daily operations. Similarly, eCommerce stores would select an ERP system tailored to their needs.
Because different businesses have different requirements, ERP system functionalities can vary. Among the various ERP systems available, Odoo ERP is considered one of the best in the ERp market with more than 12 million global users today.
Odoo is an open-source ERP system initially designed for small to medium-sized businesses but now suitable for a wide range of companies. Odoo offers a scalable and configurable point-of-sale management solution and allows you to create customised modules for specific industries. Odoo is gaining more popularity because it is built in a way that allows easy customisation, has a user-friendly interface, and is affordable. Here, you will cover the main differences and get to know why Odoo is gaining attention despite the many other ERP systems available in the market.
Mobile app Development Services | Drona InfotechDrona Infotech
Drona Infotech is one of the Best Mobile App Development Company In Noida Maintenance and ongoing support. mobile app development Services can help you maintain and support your app after it has been launched. This includes fixing bugs, adding new features, and keeping your app up-to-date with the latest
Visit Us For :
Flutter is a popular open source, cross-platform framework developed by Google. In this webinar we'll explore Flutter and its architecture, delve into the Flutter Embedder and Flutter’s Dart language, discover how to leverage Flutter for embedded device development, learn about Automotive Grade Linux (AGL) and its consortium and understand the rationale behind AGL's choice of Flutter for next-gen IVI systems. Don’t miss this opportunity to discover whether Flutter is right for your project.
UI5con 2024 - Bring Your Own Design SystemPeter Muessig
How do you combine the OpenUI5/SAPUI5 programming model with a design system that makes its controls available as Web Components? Since OpenUI5/SAPUI5 1.120, the framework supports the integration of any Web Components. This makes it possible, for example, to natively embed own Web Components of your design system which are created with Stencil. The integration embeds the Web Components in a way that they can be used naturally in XMLViews, like with standard UI5 controls, and can be bound with data binding. Learn how you can also make use of the Web Components base class in OpenUI5/SAPUI5 to also integrate your Web Components and get inspired by the solution to generate a custom UI5 library providing the Web Components control wrappers for the native ones.
E-commerce Development Services- Hornet DynamicsHornet Dynamics
For any business hoping to succeed in the digital age, having a strong online presence is crucial. We offer Ecommerce Development Services that are customized according to your business requirements and client preferences, enabling you to create a dynamic, safe, and user-friendly online store.
2. Scripting and Automation
» Introduction to scripting in GFI MAX RemoteManagement:
» Just what EXACTLY do we mean by scripting?
» Who is using scripting and for what purpose?
» Using built-in scripts
» Pro-active Monitoring Checks
» Automated Maintenance Tasks
» Using community scripts from fixitscripts.com
» Find solutions to problems you have
» Writing your own scripts…
» Return codes
» Considerations
» Getting started
» Coding guidelines
» Using the API
» Examples
4. Just what EXACTLY do we mean by scripting?
» Upload, deploy, schedule and run scripts for additional:
» Monitoring Checks (Windows, OSX and Linux)
» Maintenance Tasks (Windows only)
» Scripts can be written in variety of common languages:
» DOS Batch and CMD
» VBS and Powershell
» Ruby, Python, Perl and PHP
» Javascript
» AppleScript
» BASH
» Upload script once, downloaded as required (without Agent update)
» Very powerful, but also secure:
» Script source can only be uploaded by superuser
» Signed (public/private key encryption) when downloaded by Agents
5. Are people using it?
» 7.5 million script checks run every day!
» Over 140,000 monitoring script checks
» 260,000 maintenance tasks run every day!
» What is it being used for?
» Monitoring bespoke applications and hardware
» Automating onboarding new clients
• Automating software installation
• Enforcing standard configurations
» Regular scheduled maintenance
» Automated fault resolution
7. Pro-active Monitoring Checks
» Deploy as either 24x7 or DSC script check
» Get alerts and view results in Dashboard and Client Reports
» Timeout limited to 150 seconds
8. What Monitoring Checks are already available?
» Application Control:
» Running Process
» System User Count
» SQL Query
» Exchange:
» Large Mailboxes
» Mail Queue Size
» Store Control
» Security Center:
» Antivirus Status
» Windows Firewall
» Windows Update
9. What Monitoring Checks are already available?
» Virtualisation:
» VMware ESXi – Datastore Free Space
» VMware ESXi Health – CPUs
» VMware ESXi Health – Fans
» VMware ESXi Health – Memory
» VMware ESXi Health – PSUs
» VMware ESXi Health – Sensors
» VMware ESXi Health – Storage
» VMware ESXi – Virtual Machine Inventory
» VMware ESXi – Virtual Machine Power State
13. Automated Maintenance Tasks
» Upload script to Dashboard
» Deploy site wide or to individual workstations and servers
» Schedule once per day, week or month
» Run in response to a failed check
» View results in Dashboard
» Automated Tasks Report
» Timeout per schedule
14. What Maintenance Tasks are already available?
» Antivirus:
» Malwarebytes
» Sophos Definition Update
» Application Control:
» Running Process
» SQL Query
» Exchange:
» Store Control
» Clean-Up:
» Clean Temp Files
» Clear Event Log
» Defrag
» Windows
» Schedule Reboot
» Service Control
» Virtualisation
» VMware ESXi – Virtual Machine Control
17. fixitscripts.com
433 problems /
requests for scripts
584 total scripts
269 scripts tagged
for MAX RM
328 PowerShell
scripts
Visitors from over
100 countries
179 VBScript scripts
18,420 visitors in
last 3 months
797 registered users
Over 2 minutes
duration per visit
20. Return codes
» Extend GFI MAX to monitor anything!?
» Use exit codes to cause check to fail:
» Exit 0 to cause check to pass
» Exit non-zero to cause check to fail
» Exit >1000 to display text output in Dashboard
» Batch
echo “Error Message”
exit 1001
» VBS
wscript.echo( “Error Message” )
wscript.Quit(1001)
» PowerShell
Write-Host “Error Message”
Exit 1001
27. Don’t reinvent the wheel!
» Steal Learn from Others Scripts
» fixitscripts.com
» GFI Forum
» LinkedIn
» Google!
» Identify the problem trying to solve
» Look at ServiceDesk – where is time being spent on tickets
» Check Google (Why reinvent the wheel?)
» Investigate using tools (ProcessMonitor, ProcessExplorer, etc)
» Find Applications/Commands
» Command Switches
» Use previous scripts as a template and import into GFI MAX
31. Visual Basic and Powershell
» Visual Basic Script fully supported since Windows 2000
» Powershell supported from WindowsXP onwards
» May need to be installed on some older systems
» Using Windows Script Host WScript object, you can access:
» Arguments passed to script
» Command Line Shell
» File System
» Registry
» Services
» Network (not if running as Local System Account)
» VBS can also access Windows Management Instrumentation
32. Script structure
» Clearly identify problem trying solve
» Any script needs to do the following:
» Declare variables to be used
» Parse command line arguments
» Interact with Windows or Application
» Handle any errors
» Return results
33. Declaring variables and constants
» Good practice to force all variables to be declared before use
» Use g_ to indicate global variables and clarify variable scope
» Use type hinting to indicate variables intended purpose
» Use Constants for magic numbers that won’t change
' Usage: { start | stop | restart } "Service Name“
Option Explicit
Dim g_oArgs, g_nMode, g_sServiceName
Const MODE_START = 101
Const MODE_STOP = 102
Const MODE_RESTART = 103
34. Command Line Arguments
» Arguments passed into script via command line can be used to:
» Control behaviour of script (for example: action to perform)
» Pass in the target of script (for example: service to restart)
» Setup additional environment variables (If not available to Local System)
» Advantages over hard-coding script behaviour and target?
» Common code (e.g. connect to service manager) can be reused
» Reduces number of scripts and improves maintainability of library
35. Command Line Arguments
» Accessing arguments:
» DOS Batch uses %1, %2 etc (note %0 is name of script)
» Linux shell scripts (BASH) use $1, $2 etc ($0 is name of script)
» Dynamic langauges (Perl, PHP) use $argc (count) and @argv (array)
» VBS uses WScript.Arguments object:
• WScript.Arguments.Count method gives number of arguments
• WScript.Arguments(0) is first argument etc
» Scripts ran by Advanced Monitoring Agent:
» Two arguments are always appended to command line (for debug)
» -logfile logname can be ignored
36. Command Line Arguments
' Usage: { start | stop | restart } "Service Name“
Set g_oArgs = WScript.Arguments
If g_oArgs.Count < 2 Then
WScript.Echo "Invalid Arguments"
WScript.Quit(1)
End If
Select Case g_oArgs(0)
Case "start"
g_nMode = MODE_START
Case "stop"
g_nMode = MODE_STOP
Case "restart"
g_nMode = MODE_RESTART
Case Else
WScript.Echo "Invalid Args"
WScript.Quit(1)
End Select
g_sServiceName = g_oArgs(1)
37. Interacting with applications
» Windows Script Host can run applications on local system
» Application has status 0 until it terminates
Set g_oShell = WScript.CreateObject("WScript.Shell")
Set g_oRunningApp = g_oShell.Exec( "c:/path/to/my.exe arg0 arg1" )
Do While g_oRunningApp.Status = 0
WScript.Sleep 100
Loop
WScript.Echo "Application Terminated“
» Application will be ran as user Agent running under (Local System Acc)
» Any pop-up or user intervention will likely cause script timeout
38. Interacting with file system
• Create a File System Object to access any file or directory listing
Set g_oFileSystem = CreateObject( "Scripting.FileSystemObject" )
Set g_oTextFile = g_oFileSystem.OpenTextFile( "c:test.txt", 1 )
Do Until g_oTextFile.AtEndOfStream
g_sNextLine = g_oTextFile.Readline
WScript.Echo g_sNextLine
Loop
• Use regular expressions to parse file contents
Set oRegExp = New RegExp
oRegExp.Pattern = "^GETd.pdf$"
Do Until oTextFile.AtEndOfStream
sCurrentLine = oTextFile.Readline
If oRegExp.Test( sCurrentLine ) Then
nAccessed = nAccessed + 1
End If
Loop
• Regular expressions can also be used to extract or replace matches
39. Interacting with registry
» Registry stores config and management information of OS and Apps
» Hierarchical organisation of keys and values (like filesystem)
» A key can store many other keys.
» A key can have default data.
» A value can only store data and cannot store other values or keys
» Data types of values must be explicitly set on creation
» REG_BINARY – Binary Data (0’s and 1’s)
» REG_DWORD – Double Word (Numeric, up to 32bit values)
» REG_QWORD – Quadruple Word (Numeric, up to 64bit values)
» REG_MULTI_SZ – A Set of Strings
» Retrieve a value from Registry using RegRead (e.g. path to application)
Set g_oShell = WScript.CreateObject ("WScript.Shell")
g_sMBAMLocation = g_oShell.RegRead _
("HKLMSOFTWAREMicrosoftWindowsCurrentVersionApp Pathsmbam.exe")
» Write a value to registry using RegWrite (e.g. reconfigure an application)
g_oShell.RegWrite ( “key_location”, “value”, “key_type” )
40. Handling errors
» On Error GoTo 0 (default)
» Will cause script to exit, use only for fatal non-recoverable errors
» On Error Resume Next
» Will cause script execution to continue, allowing you to handle error
» Err variable set to last error code
» Script follows rule until presented with another error handing instruction
» The scope of rule is per sub-routine only
» Use function to handle errors consistently
Function stHandleFatalError( innExitCode, insMsg )
If Err.Number <> 0 Then
Err.Clear
On Error GoTo 0
WScript.Echo insMsg
Wscript.Quit innExitCode
End If
On Error Resume Next
Err.Clear
End Function
41. Return results to Dashboard
» Use exit codes to cause check to fail:
» Exit 0 to cause check to pass
» Exit non-zero to cause check to fail
» Exit >1000 to display text output in Dashboard
» Batch
echo “Error Message”
exit 1001
» VBS
wscript.echo( “Error Message” )
wscript.Quit(1001)
» PowerShell
Write-Host “Error Message”
Exit 1001
42. Putting it all together
Option Explicit
Dim g_oWindowsFirewall
On Error Resume Next
Set g_oWindowsFirewall = WScript.CreateObject( "HNetCfg.FwMgr" )
stHandleFatalError 2001, "Unable to create Firewall object"
If g_oWindowsFirewall.LocalPolicy.CurrentProfile.FirewallEnabled = 1 Then
WScript.Echo "Windows Firewall Enabled"
WScript.Quit ( 0 )
Else
WScript.Echo "Windows Firewall Disabled"
WScript.Quit ( 2000 )
End If
Function stHandleFatalError( innExitCode, insMsg )
If Err.Number <> 0 Then
Err.Clear
On Error GoTo 0
WScript.Echo insMsg
Wscript.Quit innExitCode
End If
On Error Resume Next
Err.Clear
End Function
43. Windows Management Instrumentation
» WMI allows access to almost all Windows components
» Make modifications to settings and initiate operations
» For example, check Print Spooler is running…
sServiceName = "Spooler"
sComputer = "."
On Error Resume Next
Set oWMIService = GetObject("winmgmts:" & strComputer & "rootCIMV2")
stHandleFatalError( ERROR_CREATEOBJECT_WMI )
Set oService = oWMIService.Get("Win32_Service.Name='" & sServiceName & "'")
If oService.State = "Running" Then
WScript.Echo "Print Spooler is Running"
WScript.Quit ( 0 )
Else
' Restart Service etc...
46. Getting the data you need from API
» Used mainly to get data out of GFI MAX RemoteManagement
» Easy to manipulate with PowerShell:
$apikey = “YOUR API KEY"
$clientsurl = "https://www.systemmonitor.us/api/?apikey=$apikey&service=list_clients"
[xml]$xmlclients = (new-object System.Net.WebClient).DownloadString($clientsurl)
» Example Uses:
» Getting serial number data
» Getting MAC addresses for Wake-on-LAN
» See online help system for full instructions
47. Example: Workstations that have not been scanned in 90 days
$apikey = "YOUR API KEY"
$CurrDate = Get-Date
$clientsurl = "https://www.systemmonitor.us/api/?apikey=$apikey&service=list_clients"
$wstable = @()
[xml]$xmlclients = (new-object System.Net.WebClient).DownloadString($clientsurl)
foreach ($xmlclientslist in $xmlclients.result.items.client) {
$clientid = $xmlclientslist.clientid
$sitesurl="https://www.systemmonitor.us/api/?
apikey=$apikey&service=list_sites&clientid=$clientid"
[xml]$xmlsites = (new-object System.Net.WebClient).DownloadString($sitesurl)
foreach ($xmlsiteslist in $xmlsites.result.items.site) {
$siteid = $xmlsiteslist.siteid
$wsurl = "https://www.hound-dog.us/api/?
apikey=$apikey&service=list_workstations&siteid=$siteid"
[xml]$xmlws = (new-object System.Net.WebClient).DownloadString($wsurl)
foreach ($xmlwslist in $xmlws.result.items.workstation) {
[datetime]$wsdate = $xmlwslist.last_scan_time
if (($CurrDate).Subtract($wsdate).Days -gt 90) {
$wsObj = "" | select Client,WSName,Age
$wsObj.Client = $xmlclientslist.name."#cdata-section"
$wsObj.WSName = $xmlwslist.name."#cdata-section"
$wsObj.Age = ($CurrDate).Subtract($wsdate).Days
$wstable += $wsObj
}}}}
48. Example: Wake devices before patching
param($siteid)
$apikey = "Put your API Key here“
$apiurl = “https://www.systemmonitor.us/api/?apikey=$apikey”
$url = "$($apiurl)&service=list_workstations&siteid=$siteid"
[xml]$xmlmac = (new-object System.Net.WebClient).DownloadString($url)
foreach ($xmlmacws in $xmlmac.result.items.workstation) {
$macString = $xmlmacws.mac1."#cdata-section"
$mac = $macString.split(':') | %{ [byte]('0x' + $_) }
$UDPclient = new-Object System.Net.Sockets.UdpClient
$UDPclient.Connect(([System.Net.IPAddress]::Broadcast),4000)
$packet = [byte[]](,0xFF * 6)
$packet += $mac * 16
[void] $UDPclient.Send($packet, $packet.Length)
write-output "Wake-On-Lan magic packet of length $($packet.Length) sent to
$macString"
}
51. Custom Monitoring
» Check current time vs. NTP server
$ntpcheck = w32tm /stripchart /dataonly /computer:pool.ntp.org /samples:1
[int]$ntpchecktime = $($ntpcheck.Split()[-1]).Split("s")[0].Substring("1")
Write-Output "$ntpchecktime seconds"
if ($ntpchecktime -gt 300) {
Write-Output "Check failed"
Exit 1001
}
52. Onboarding new clients
» Make sure all of your standards are enforced from the start
» Install and configure SNMP
» Software deployment
» Enable RDP
» Enable Wake on LAN
» Open ports in the firewall
54. Software deployment
» Download MSI or EXE and use silent switches to install software
» Host on your website, Dropbox, or similar file storage solution
» Silent switches are typically available with software documentation
» MSI install files always use msiexec with the same switches for installation
Msiexec /I {filepath} /quiet /qn /norestart REBOOT=reallysuppress
» Check HKLMSoftwareMicrosoftWindowsUninstall for MSI uninstall string. Add /quiet to
switch to make quiet
Msiexec /I {filepath} /quiet /qn /norestart REBOOT=reallysuppress
56. Preventing tickets
» Fix problems detected by your monitoring scripts
» Reduce the amount of tickets coming into your helpdesk
» Setup using an automated task
» Don’t run at a specified time, run at a specified event
» Able to run at the failure of most checks (Service, Event, AV Update)
» Script will run at next 24/7 check-in following failure
» Examples:
» Clear and start print spooler when service stops
» Force AV definition update when definitions are old
» Run disk cleanups when disk gets full
57. Clear Print Spooler and restart service
Set objShell = CreateObject("WScript.Shell")
Set objFSO = CreateObject("Scripting.FileSystemObject")
Set objWMIService = GetObject("winmgmts:{impersonationLevel=impersonate}!"_
& “.rootcimv2")
SpoolDirectory = objShell.RegRead("HKLMSystemCurrentControlSet"_
& "ControlPrintPrintersDefaultSpoolDirectory")
Set objFolder = objFSO.GetFolder(SpoolDirectory)
For Each objFile In objFolder.Files
WScript.Echo "Deleteing "+objFile.Name
objFile.Delete(Force)
Next
Set objSpooler = objWMIService.Get("Win32_Service='spooler'")
If objSpooler.State = "Stopped" Then
WScript.Echo "Starting Spooler."
objSpooler.StartService()
End If
59. Summary
» Scripting allows you to extend monitoring and automate maintenance
» 7.5 million script checks and 260,000 maintenance tasks run every day
» Built-in scripts available to add now with no programming knowledge required
» Hundreds of community scripts available on fixitscripts.com for you to use
» If you do want to write your own scripts
» Ensure script returns appropriate return code for pass/fail
» See script writing guidelines in help system
» Borrow and build on top of other scripts
» Save time onboarding new clients, automating maintenance and preventing tickets
» Check your ServiceDesk for where time is being spent on tickets