This document provides an overview of free tools for Windows desktop administration. It discusses tools for server and security such as Process Explorer for process monitoring, Memtest86 for memory testing, WSName for renaming computers, and KeePass for password management. Additionally, it covers file and disk tools like Diskeeper Disk Performance Analyzer for analyzing disk fragmentation, as well as network monitoring and troubleshooting tools such as the PSTools from Sysinternals for remote administration tasks. The document provides download links for all the tools discussed.
SLBdiensten: Windows 10 deployment met Microsoft Deployment Toolkit en Setup ...Roel van Bueren
SLBdiensten organiseerde op woensdag 5 oktober 2016 de training Windows 10 Deployment in samenwerking met ROVABU Software. Na deze training kunnen deelnemers zelf de Microsoft Deployment Toolkit en Setup Commander installeren en hiermee Windows 10 uitrollen binnen de organisatie.
WinConnections Spring, 2011 - Deploying Windows 7 without the Ridiculous Micr...Concentrated Technology
Greg Shields may be most known for his books, magazine articles, and conference sessions. But he started his career deploying thousands of computers from a basement of a building with no windows. His passion for deploying Windows is fed by his desire to automate everything. You can do that with Microsoft’s free tools. But while the tools are fantastic, their alphabet soup of acronyms is confusing and their documentation isn’t much better. Learn Greg’s Seven Simple Steps in 75 minutes or less, and leave with a framework for automating everything in Windows 7 deployment.
SLBdiensten: Windows 10 deployment met Microsoft Deployment Toolkit en Setup ...Roel van Bueren
SLBdiensten organiseerde op woensdag 5 oktober 2016 de training Windows 10 Deployment in samenwerking met ROVABU Software. Na deze training kunnen deelnemers zelf de Microsoft Deployment Toolkit en Setup Commander installeren en hiermee Windows 10 uitrollen binnen de organisatie.
WinConnections Spring, 2011 - Deploying Windows 7 without the Ridiculous Micr...Concentrated Technology
Greg Shields may be most known for his books, magazine articles, and conference sessions. But he started his career deploying thousands of computers from a basement of a building with no windows. His passion for deploying Windows is fed by his desire to automate everything. You can do that with Microsoft’s free tools. But while the tools are fantastic, their alphabet soup of acronyms is confusing and their documentation isn’t much better. Learn Greg’s Seven Simple Steps in 75 minutes or less, and leave with a framework for automating everything in Windows 7 deployment.
Remote Management of Embedded Android DevicesVIA Embedded
This presentation given by Tonny Shen, VIA Embedded Project Manager, provides an introduction to the standard Android application deployment process focusing on OTA update technology and then shifts to focus on how to make key modifications to meet the requirements for embedded deployments. The presentation ends with a look at the VIA DMS (Device Management System) and how it can effectively improve system maintenance efficiency and reduce total cost of ownership.
Your Windows 7 testing is over and it’s time for rapid deployment! Yet while you’re excited about delivering Windows 7 to users, you might still remember your last upgrade. Deploying Ghost images might have been easy back then, but it wasn’t very flexible. What you want is deployment from a single image, where every computer starts from one golden master. You also want better naming, giving each computer the correct name automatically. Most importantly, you want the process automated so you’re not sitting around waiting to click buttons. You can have all this and more with Microsoft’s free Windows Deployment Services.
Microsoft MVP Greg Shields has been rapidly deploying Windows computers for over a decade. In this session full of tips and tricks, bring your laptop and get HANDS-ON with Windows Deployment Services. You’ll learn the secret tricks for creating that single image that installs everywhere. You’ll find WDS’ hidden solution for automatic naming. You’ll learn the tricks you absolutely must know to automate Windows installation. And you’ll leave with a functioning deployment solution you can take home to begin deploying immediately.
Are you’re ready for Windows deployment, but not ready for the learning curve? Save yourself weeks of time and join this must-see HANDS-ON session. You’ll walk away with exactly what you need to start rapidly deploying Windows 7 the moment you return home.
Java Insecurity: How to Deal with the Constant VulnerabilitiesLumension
Just over a decade ago, the outcry over Microsoft’s security problems reached such a deafening level that it finally got the attention of Bill Gates, who wrote the famous Trustworthy Computing memo. Today, many would say that Microsoft leads the industry in security and vulnerability handling.
Now, it’s Java that’s causing the uproar. But has Oracle learned anything from Microsoft in handling these seemingly ceaseless problems? I’ll start by reviewing the wide-ranging Java security changes Oracle is promising to make. They sound so much like the improvements Microsoft made back with Trustworthy Computing that I’m amazed it hasn’t been done before! We’ll move on to discuss what you can do now to address Java security in your environment.
One of the banes of security with Java is the presence of multiple versions of Java, often on the same computer. Sometimes you really need multiple versions of Java to support applications with version dependencies (crazy, I know). But other times, multiple copies of Java are there “just because.” In this webinar, we’ll talk about the current Java mess and how you can get out of it, including:
Assessment. We’ll discuss ways and tools for cataloging what versions of Java are actually out there on your endpoints.
Identification. We’ll look at methods for identifying which versions are actually required by your users; for instance, I’ll show you how you might use Process Tracking and File Access events in the Windows Security Log to see which Java files are being accessed, by whom, and by which programs.
Disabling. Can you just disable Java? Maybe not for everyone, but what if you could disable it for certain roles within your company that make up 25% – or even 75% – of your workforce? That would be worth it. We’ll explore how you might go about such a measure.
Hardening. We’ll dive into the technical details of hardening Java and reducing your Java attack surface, where possible.
Filtering. Another way to reduce your Java risk is by filtering Java content at your gateway. Again not full coverage control – but what is?
Patching. Then, we’ll delve into the Java patching nightmare. Depending on self-updaters on each endpoint, is could be a recipe for disaster, and I’ll explain why. Basically the only way out of the Java mess is a 3rd party solution that can perform centralized patch management and remediation and that’s where our sponsor, Lumension, will come in.
Remove Windows Component Protector Automatically From Your PCcostamary
Windows Component Protector claims to
be a security application but is actually a malicious application that can cause several problem and can even lead to various corruption issues.
This intermediate course will go beyond the basics and look at some unconventional wisdom when it comes to deploying software. Large installers, complex installers, repackaging, and more- we'll take a look at best practices that fit. Learn more: http://dell.to/1GDYpr8
bqurious Test Automation & Management SuiteAbhay Goel
bqurious is a Complete Test Automation & Management Suite built on top of Opensource Technologies like Selenium. Its a SaaS based solution that supports "No Programming" automation testing paradigm.
bqurious enables simultaneous automation testing on multiple real devices connected on internet/intranet.
SURFacademy: Windows 10 deployment met Microsoft Deployment Toolkit en Setup ...Roel van Bueren
SURFacademy organiseerde op vrijdag 27 mei 2016 de training Windows 10 Deployment in samenwerking met ROVABU Software. Na deze training kunnen deelnemers zelf de Microsoft Deployment Toolkit en Setup Commander installeren en hiermee Windows 10 uitrollen binnen de organisatie.
Security of Windows 10 IoT Core(FFRI Monthly Research 201506)FFRI, Inc.
•Windows 10 IoT is successor platform of Windows Embedded that optimized for embedded devices.
•Windows 10 IoT Core Insider Preview has been provided for single-board computers such as the Raspberry Pi 2.
•We show tutorial about security of Windows 10 IoT Core using the Raspberry Pi 2.
End to End Guide Windows AutoPilot Process via IntuneAnoop Nair
I had an opportunity to present end to end Windows AutoPilot process flow at Bangalore IT Pro user group meeting. I covered end to end process to provision Windows 10 devices via Windows AutoPilot service with Intune.
K2000 Keeping Your Deployments Up-to-DateDell World
In this session we will demonstrate methods for keeping your OS deployments current with the latest greatest Windows updates. Learn more: http://dell.to/1GDYpr8
Remove Windows Command Processor In few Simple Automatic Steps costamary
Windows Command Processor claims to
be a security application but is actually a malicious application that can cause several problem and can even lead to various corruption issues.
Remote Management of Embedded Android DevicesVIA Embedded
This presentation given by Tonny Shen, VIA Embedded Project Manager, provides an introduction to the standard Android application deployment process focusing on OTA update technology and then shifts to focus on how to make key modifications to meet the requirements for embedded deployments. The presentation ends with a look at the VIA DMS (Device Management System) and how it can effectively improve system maintenance efficiency and reduce total cost of ownership.
Your Windows 7 testing is over and it’s time for rapid deployment! Yet while you’re excited about delivering Windows 7 to users, you might still remember your last upgrade. Deploying Ghost images might have been easy back then, but it wasn’t very flexible. What you want is deployment from a single image, where every computer starts from one golden master. You also want better naming, giving each computer the correct name automatically. Most importantly, you want the process automated so you’re not sitting around waiting to click buttons. You can have all this and more with Microsoft’s free Windows Deployment Services.
Microsoft MVP Greg Shields has been rapidly deploying Windows computers for over a decade. In this session full of tips and tricks, bring your laptop and get HANDS-ON with Windows Deployment Services. You’ll learn the secret tricks for creating that single image that installs everywhere. You’ll find WDS’ hidden solution for automatic naming. You’ll learn the tricks you absolutely must know to automate Windows installation. And you’ll leave with a functioning deployment solution you can take home to begin deploying immediately.
Are you’re ready for Windows deployment, but not ready for the learning curve? Save yourself weeks of time and join this must-see HANDS-ON session. You’ll walk away with exactly what you need to start rapidly deploying Windows 7 the moment you return home.
Java Insecurity: How to Deal with the Constant VulnerabilitiesLumension
Just over a decade ago, the outcry over Microsoft’s security problems reached such a deafening level that it finally got the attention of Bill Gates, who wrote the famous Trustworthy Computing memo. Today, many would say that Microsoft leads the industry in security and vulnerability handling.
Now, it’s Java that’s causing the uproar. But has Oracle learned anything from Microsoft in handling these seemingly ceaseless problems? I’ll start by reviewing the wide-ranging Java security changes Oracle is promising to make. They sound so much like the improvements Microsoft made back with Trustworthy Computing that I’m amazed it hasn’t been done before! We’ll move on to discuss what you can do now to address Java security in your environment.
One of the banes of security with Java is the presence of multiple versions of Java, often on the same computer. Sometimes you really need multiple versions of Java to support applications with version dependencies (crazy, I know). But other times, multiple copies of Java are there “just because.” In this webinar, we’ll talk about the current Java mess and how you can get out of it, including:
Assessment. We’ll discuss ways and tools for cataloging what versions of Java are actually out there on your endpoints.
Identification. We’ll look at methods for identifying which versions are actually required by your users; for instance, I’ll show you how you might use Process Tracking and File Access events in the Windows Security Log to see which Java files are being accessed, by whom, and by which programs.
Disabling. Can you just disable Java? Maybe not for everyone, but what if you could disable it for certain roles within your company that make up 25% – or even 75% – of your workforce? That would be worth it. We’ll explore how you might go about such a measure.
Hardening. We’ll dive into the technical details of hardening Java and reducing your Java attack surface, where possible.
Filtering. Another way to reduce your Java risk is by filtering Java content at your gateway. Again not full coverage control – but what is?
Patching. Then, we’ll delve into the Java patching nightmare. Depending on self-updaters on each endpoint, is could be a recipe for disaster, and I’ll explain why. Basically the only way out of the Java mess is a 3rd party solution that can perform centralized patch management and remediation and that’s where our sponsor, Lumension, will come in.
Remove Windows Component Protector Automatically From Your PCcostamary
Windows Component Protector claims to
be a security application but is actually a malicious application that can cause several problem and can even lead to various corruption issues.
This intermediate course will go beyond the basics and look at some unconventional wisdom when it comes to deploying software. Large installers, complex installers, repackaging, and more- we'll take a look at best practices that fit. Learn more: http://dell.to/1GDYpr8
bqurious Test Automation & Management SuiteAbhay Goel
bqurious is a Complete Test Automation & Management Suite built on top of Opensource Technologies like Selenium. Its a SaaS based solution that supports "No Programming" automation testing paradigm.
bqurious enables simultaneous automation testing on multiple real devices connected on internet/intranet.
SURFacademy: Windows 10 deployment met Microsoft Deployment Toolkit en Setup ...Roel van Bueren
SURFacademy organiseerde op vrijdag 27 mei 2016 de training Windows 10 Deployment in samenwerking met ROVABU Software. Na deze training kunnen deelnemers zelf de Microsoft Deployment Toolkit en Setup Commander installeren en hiermee Windows 10 uitrollen binnen de organisatie.
Security of Windows 10 IoT Core(FFRI Monthly Research 201506)FFRI, Inc.
•Windows 10 IoT is successor platform of Windows Embedded that optimized for embedded devices.
•Windows 10 IoT Core Insider Preview has been provided for single-board computers such as the Raspberry Pi 2.
•We show tutorial about security of Windows 10 IoT Core using the Raspberry Pi 2.
End to End Guide Windows AutoPilot Process via IntuneAnoop Nair
I had an opportunity to present end to end Windows AutoPilot process flow at Bangalore IT Pro user group meeting. I covered end to end process to provision Windows 10 devices via Windows AutoPilot service with Intune.
K2000 Keeping Your Deployments Up-to-DateDell World
In this session we will demonstrate methods for keeping your OS deployments current with the latest greatest Windows updates. Learn more: http://dell.to/1GDYpr8
Remove Windows Command Processor In few Simple Automatic Steps costamary
Windows Command Processor claims to
be a security application but is actually a malicious application that can cause several problem and can even lead to various corruption issues.
VDI-in-a-Box: Microsoft Desktop Virtualization for Smaller Businesses and UsesConcentrated Technology
Today’s talk about VDI centers around deploying hundreds or thousands of desktops. But sometimes you just want access for a few people and a few applications. Or, you just can’t afford big-budget solutions. Have you tried Microsoft Hyper-V and RDS? Combining these two tools, a sufficiently-powerful server, and the information in this session, you’ll quickly build a single-server VDI solution for just those small needs. Join RDS MVP Greg Shields for a look at the very small in VDI. He’ll show you how to get started on the most micro of budgets, and send you home with the exact click-by-click to begin hosting your own virtual desktops.
Basic PowerShell Toolmaking - Spiceworld 2016 sessionRob Dunn
PowerShell is everywhere. Admit it, even if you don't like change, you've probably needed to run a one-off command or small script in order to accomplish something...whether it was in AD, Exchange, VMWare or something else.
Running a single command is one thing, but what about making a reusable piece of code that anyone can run, or even better, schedule it? Get a report every Monday about drive space, remove old log files every month, report on logon failures...
We're going to take a command that fulfills a 'single-serving' role and turn it into something more dynamic; something that can be run over and over and be both relevant and timely!
Be ready to learn about parameters, basic functions, comment-based help, and other useful techniques - bring your laptop and code along with us!
Let's build a PowerShell tool!
Watch me present this topic via YouTube: https://youtu.be/akTypRvwr7g (video 1 of 2)
This is one of the presentations made at SWW 2009. It outlines best practices for creating an admin image. Admin Images are used to install SolidWorks across a network of users. This is useful for IT and CAD Managers.
1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docxeugeniadean34240
1RUNNING HEAD: MANAGING HOST BASED SECURITY IN WINDOWS 8.1
Lab Deliverable for Lab 2
a. Procedure to Manage Windows Defender
Operating Environment:
1. Operating System: Windows 8.1 Pro
2. Hardware: A Laptop
3. Software: VMware Horizon Client Installed
Description:
This window configuration project will require the sytem admin permission so as to access the programs and get to know how it is commanded to the action it should peform. Also, to use a virtual box one should have knowledge in how to operate the virtual box and explore the virtual programs
Notes, Warnings and Restrictions:
1. Windows Defender come with windows 8.1 software and are found in the control panel.
2. The application is used only when you login your system as an administarator or have permitted to act as the administrator.
3. For windows defender to run in the system it should be turned on and no other antivirus should be active
4. Scanning the system with windows defender deletes infected files. Also ensure you do the required scanning
5. If a different anti virus has been previously deleted, then windows defender needs to be turned off and to be restarted
Resources (Futher Reading):
Firewalls. (n.d.). Retrieved from https://technet.microsoft.com/en-us/library/cc700820.aspx
Microsoft Baseline Security Analyzer. (2011). Retrieved from https://dougvitale.wordpress.com/2011/11/18/microsoft-baseline-security-analyzer/
CloudFlare. (n.d.). Retrieved from https://www.winhelp.us/configure-windows-defender-in-windows-8.html
Procedures:
Windows defender
Window defender protects a computer system against any form of malware by running in the background of the computer system and gives notification if any suspicious item is found in the syatem for the user to take action. It can also be used by a computer to scan the system if the system has issues e.g becomes slow, switches off when not commanded to, hanging among other things. Windows defender should be updated over time so that it is not outdated and also to improve its performance.
Windows defender is found in the control panel icon, steps of opening are
i. Open control panel and select “windows defender”
ii. While you click on windows defender, the following page appears
a) To update the system click on “update”
b) Real time scanning
c) For the full scan results it will appear in the table as shown below
d) For quick results check the button just before you click on scan. Then the results will appear as shown below.
e) To scan removable device, select “setting” and click on advance
Then check the box just before removing any removable drivers and click save
b. Procedure to configure Windows Firewall for Windows 8.1
Operating Environment:
1. Operating System: Windows 8.1 Pro
2. Hardware: A Laptop
3. Software: VMware Horizon Client Installed
Descriptions:
Windows firewall is a protection application that protects against suspicious items, It helps in blocking suspicious programs .
N-Tier Application with Windows Forms - Deployment and SecurityPeter Gfader
Part 1: Deployment of .NET Winforms apps
History
Deployment & Updates
Security
Issues & Warnings
Configuration and user settings
Part 2: Security
Role-based security
Authentication and Authorization
Impersonation
Code Access Security
Assembly Strong Naming
You want to learn what virtualization is all about? I’ll talk about high level concepts, tips and tricks and best practices. You will learn all that and even why Azure might be an interesting choice when we talk developer virtualization. Concepts like Sysprep, Differencing drives, snapshot intrigue you? I’ll let you know all about them and more! Come join me to explore all that virtualization as to offer
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Best free tools for win database admin
1. The Best Free Tools for Windows Desktop Administration(Yes! Right Here! Right Now!)(You Are in the Right Session!)(You Have Made an Excellent Choice!) Greg Shields, MVPPartner and Principal Technologistwww.ConcentratedTech.com
4. Agenda Topics Part I: Server & Security Tools Part II: File & Disk Tools Part III: Network Monitoring & Troubleshooting The intent of this session is to dump on youas many FREE tips and toolthat I can in a short 75 minutes.
5. You May Applaud Now. I must warn you. You may have used some of these tools before. You may have seen some of these tools before. This Game Is Interactive! When you see a tool that’s saved your kiester, you must HOWL GRACIOUSLY. Conversely, when you see one that’s kickedyour kiester... …I want to know!
6. So, Where am I Gonna’ Get all this Stuff? Process Explorer is freeware. Download from: http://www.sysinternals.com/Utilities/ProcessExplorer.html Memtest86 is shareware. Download it from: http://www.memtest86.com/ WSName.exe is freeware (though the author begs you to click a few of his Google ads if you like it) and can be downloaded from: http://mystuff.clarke.co.nz/wsname.asp Systenance Index.dat Analyzer is freeware and can be downloaded from http://www.systenance.com/indexdat.php Although Diskeeper’s flagship products are not freeware, Diskeeper Disk Performance Analyzer is. You can get a copy of it from: http://downloads.diskeeper.com/DiskPerformanceAnalyzer.exe SafePasswd.com is an on-line resource accessible at www.safepasswd.com. KeePass is an open-source tool that can be downloaded from: http://www.keepass.info/ LookInMyPC is advertising-driven, but freeware and can be downloaded from: http://www.lookinmypc.com NewSID is a freeware Sysinternals tool (man, they’ve got lots of tools…). Download NewSID at: http://www.microsoft.com/technet/sysinternals/utilities/NewSid.mspx PSTools are freeware. Download from: http://www.microsoft.com/technet/sysinternals/utilities/PsTools.mspx SetAcl is freeware. Download it from: http://setacl.sourceforge.net AccessEnum is a SysInternals tool and is freeware. Download it at: http://www.microsoft.com/technet/sysinternals/utilities/AccessEnum.mspx You can access easyVMX from http://www.easyvmx.com/easyvmx.shtml. OpenFiler is an open source tool that can be downloaded from: http://www.openfiler.com WinSCP is a freeware tool and can be downloaded from: http://winscp.net/eng/download.php WinDirStat or “Windows Directory Statistics” is a freeware tool and can be downloaded from: http://windirstat.info/ DiskPart is part of the Windows Resource Kit. Daemon Tools appears to be freeware and available from: http://www.daemon-tools.cc JDiskReport is freeware. Download at: http://www.jgoodies.com/freeware/jdiskreport/
7. So, Where am I Gonna’ Get all this Stuff? Notepad++ supports 44 languages, including some other useful ones like shell, SQL, batch, KIXtart, and XML formats. It can be downloaded from: http://notepad-plus.sourceforge.net FPort is a freeware Foundstone tool that can be downloaded from: http://www.foundstone.com/index.htm?subnav=resources/navigation.htm&subcontent=/resources/proddesc/fport.htm TCPView is freeware. Download it from Sysinternals at: http://www.microsoft.com/technet/sysinternals/utilities/TcpView.mspx SpiceWorks is ad-driven but freeware and can be downloaded from: http://www.spiceworks.com The Dude is freeware, has potentially one of the best names of any tool in this session, and can be downloaded from: http://www.mikrotik.com/thedude.php Visionapp is a freeware product and can be downloaded from: http://www.visionapp.com Angry IP Scanner is a freeware tool and can be downloaded from: http://www.angryziber.com Wireshark is licensed as open source and can be downloaded from: http://www.ethereal.com/ HowNetWorks is freeware available from the VMware site. As it runs in a VMware virtual machine, it requires a version of VMware installed to host the virtual machine. You can download it from: http://www.vmware.com/vmtn/appliances/ M0n0wall can be downloaded either as a binary or as a pre-built VMware Appliance. Either are easy to set up and use, though the appliance is a little easier/faster. Download the binaries and documentation from: http://m0n0.chDownload the VMware appliance from: http://www.vmware.com/vmtn/appliances/ Iometer http://www.iometer.org/ Hyper-V Monitor Gadget http://mindre.net/post/Hyper-V-Monitor-Gadget-for-Windows-Sidebar.aspx EventSentry Light http://www.netikus.net/products_downloads.html SpecOps Software Gpupdate http://www.specopssoft.com/products/specopsgpupdate/ ShellRunAs http://technet.microsoft.com/en-us/sysinternals/cc300361.aspx Recuva http://www.recuva.com/
9. Process Explorer Sysinternals.com tool Extensivelisting of processes Can use in place of Task Manager LOTS of features Individual performance graphs for each process Search for files, handles, named pipes, etc Takes a little practice
10. Memory Issues Memtest86 Runs a thorough, stand-alone memory test for x86 architecture RAM Can build a bootable CD from an ISO image Allow to test for at least one full pass of all 9 tests If errors occur, try reseating or re-ordering RAM. If they still occur, replace. While Vista & Server 2008 have their own memory diagnostic tool built in, this works well for older O/S’s. Like XP, you crazy XP hold outs!
11. Rename en masse WSName.exe Easy to use tool to rename workstations, in Workgroups and in Domains! Rename remote machines Use batch files or VBScript along with this tool to rename multiple machines or an entire network. Very handy for migrations. Vista aware, W7 soon.
12. oldCmp.exe An ancient JoeWare tool that remains useful today! Command-line AD tool used to identify and remove stale computer accounts. Computer accounts reported on or removed based on last DS access. HTML reports DHTML reports CSV reports
13. ShellRunAs Windows Vista and Server 2008 no longer natively have the Run as… context menu item! Replaced with the Run as Administrator item. An omission that happens because of UAC. Lacking this, no way to run processes under alternate credentials. Get it back with ShellRunAs. GUI and command-line exposure
14. Diskeeper Disk Perf. Analyzer Intended to drive you to Diskeeper’s for-cost defragmentation tools …but good for finding disk-based performance bottlenecks. Target multiple systems or entire network. Results show perf. loss reports based on fragmentation.
15. IOmeter Designed to measure disk subsystem performance. With disk being a major bottleneck for many applications, provides an understanding of relative speed.
16. SafePasswd.com Generates difficult to crack passwords. For users and administrators. Point your users to this web site when they complain.
17. KeePass Highly secured (AES & Twofish) password tool. Stores passwords in encrypted format, requires master password to unlock the contents. Can use master password plus separate encryption key Copy/Paste toclipboard capabilitywith timed wipe Nifty passwordgeneration tools Hide & unhidepasswords
18. Completely Disable UAC UAC had great intentions, but let’s be honest – it is truly annoying. Not that I’m recommending you ever do this. But if you wanted to completely disable UAC, split tokens, virtualization, and all the other new security features… Computer Configuration | Windows Settings | Security Settings | Local Policies | Security Options | User Account Control User Account Control: Admin Approval Mode for the Built-in Administrator account (Disabled) User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode (Elevate without prompting) User Account Control: Detect application installations and prompt for elevation (Disabled) User Account Control: Only elevate executables that are signed and validated (Disabled) User Account Control: Run all administrators in Admin Approval Mode (Disabled) User Account Control: Switch to the secure desktop when prompting for elevation (Disabled) [This is under “other”] User Account Control: Only elevate UIAccess applications that are installed in secure locations (Disabled)
19. The RAID 1 Undo Personally, my favorite little “trick” Most server-class equipment includes hardware RAID However, most admins are used to RAID 5 for its expandability Use “The RAID 1 Undo” immediately prior to major software changes, like patching. Here’s the trick: Just before the patch, yank one of the drives. If the patch goes well after the reboot, reseat the drive and let the RAID rebuild. If the patch doesn’t go well, then power down the machine, pull the now “bad” drive and drop in the “good” drive. Once the system restarts, reseat the “bad” drive and let the RAID rebuild.
20. SpecOps Gpupdate Tool that augments ADUC with additional right-click functionality for managing computers. Gpupdate Restart Shut Down Start (via WOL) Immediatelyinstall WSUSupdates Graphicalreporting
21. Extremely Useful! The PSTools SysInternals Suite of Tools Should be an important component of any administrator’s quiver UNIX-like tools Psexec –Remote command execution Psfile –List files opened by remote systems Psgetsid –Get computer or user SID’s Psinfo –Get local or remote computer information Pslist –List local or remote running processes Psloggedon – Lists logged on users Psloglist – View local or remote Event Logs Pspasswd – Change local or remote passwords Psservice – Views/Modifies local or remote service config Psshutdown – Shutdown/Reboot local or remote machines Pssuspend – Suspend local or remote processes
22. PSExec Easily the most useful of all the PSTools Launch remote processes: Psexec <ComputerName> iexplore.exe http://www.hampsterdance.com Start remote command shell: Psexec <ComputerName> cmd Verify Terminal Server logged-on users: Psexec <ComputerName> quser
23. Hyper-V Monitor Gadget Once Hyper-V is installed, it is challenging to determine the state of virtual machines from the server console This sidebar gadget shows virtual machines and their status Enables Turn Off | Shut Down | Save | Start functionality Can monitor multiple serversreport on status, and RDP. Install to your managementVista workstation.
25. icacls Icacls > xcacls.vbs > xcacls > cacls Configuring perms at the command line is harder than you’d think. This is due to how Windows permissions themselves are now very complex. Icacls can configure DACLs, SACLs, and now Integrity Levels Must set permission on (OI)(CI) for object and container.
27. Visual Tool for ACL’s AccessEnum Visual tool for seeing ACE’s in ACL’s Good at finding differing ACE’s in down level ACL’s Useful for locating long paths
28. Recuva Freeware undelete program Identifies files that have been deleted and can be restored. Does not need to be present when the file was deleted. Capable ofsearching medialike digitalcamera cards,etc. Shows recoverableand unrecoverablefiles.
29. OpenFiler Looking for a low-end iSCSI target for a file server? Useful for ESX datastores. Win2008 cluster support soon. OpenFiler “appliance” is configured via web interface. Can also be used as a NFS or NAS device.
30. StarWind iSCSI SAN Software Windows-based iSCSI Target. Works with ESX and Hyper-V hosts Fully Windows Failover Clustering capable (I like it better than OpenFiler…)
31. WinSCP Transferring files between UNIX/Linux and Windows machines is challenging from the command-line. Linux “smbclient” tool, but without all the command line nastiness. WinSCP is a graphical tool to do this. Like FTP, but with security. Also supportsSFTP.
32. WinDirStat Graphical representation of file sizes across the disk. Pac Man Rocks! Assists users/administrators with eliminating files. Odd looking at first, but the graphical view immediately draws the eye toproblem spots onthe disk drive. Easy to distributeto users to havethem do theirown cleanupactivities.
33. Daemon Tools / Virtual CloneDrive Service for mounting ISO images Resides in system tray and creates mounted drive letters Generates/uses software CD’s for virtual machines Can emulate some forms of copy protection Daemon Tools: Like CloneDrive, but with Malware!
34. Disk Usage Reporting JDiskReport Java-based tool that scans a file tree and reports statistics on use. Can scan large areas, but tends to crash with very large scans Can report on usage by extension, size, location. Pie charts, bar charts. Show your users how much space they’re wasting!
35. Notepad++ Multiple-language markup and editing tool Supports VBScript among others Numerous built-in text manipulation macros Neat zooming, highlighting, and level collapsing features
37. FPort Foundstone tool for “enhanced netstat” Does a better job than netstat at mapping ports to processes, PID’s, and process paths
38. Tcpview GUI view of TCP/UDP connections Shows opening and closing in different colors No service or permanent footprint
39. DSL Speed Testers On-line speed testers, intended for DSL users can be helpful for any network connection. www.dslreports.com/ stest Be aware of firewalls and proxies
41. EventSentry Light Very basic Event Log, log file, and system health management across multiple machines. System health monitors for disk space, software installs/uninstalls, limited performance counters. Alerts and notifications through numerous mechanisms. Limited capabilities, designed to whet the appetite for the full version.
42. SpiceWorks Surprisingly full-featured multi-platform help desk/ management utility in a small 6M footprint. Ad-driven. Designed for the < 250 machine networks. Built-in help desk ticketing system. Built-in over-the-network automated inventory system. Built-in reporting system with canned and administrator-created reports with smartly-designed reports. Built-in remote control. Built-in SMS/email/alerting. Scanning can be resource intensive.
43.
44. The Dude Freeware network scanning and mapping utility. Discovers numerous device types Even found my printer! SNMP device enumeration/manipulation. Syslog, Alerting, Probing, the NMS gamut.
45. NetWrix AD Change Reporter Reports changes to AD. Delivers reports with summary and detailed (before/after) information via email. Handy for maintaining compliance. Part of NetWrix family of products.
46. visionapp Remote Desktop Central console for all Terminal Services connections. Create credential stores for auto-login. Central management of all your Windows servers Nice screenauto-adjustmentfeature.
47. Angry IP Scanner Super-fast tool for scanning IP and port ranges ranges Can identify any IP range for scanning. Utilities for showing target network info and opening/viewing remote computer.
48. RDP Port Trickery! Need to connect to your home network, but don’t want to expose RDP through your firewall? Reconfigure RDP to listen on a non-standard port! Outbound firewalls often don’t filter/scan non-80/443 TCP ports Use 444/tcp to bypass outbound filters
49. LogMeIn.com Remote access to any machine from any network. Requires the target machine to have functioning Internet access. One of a suite of remoting products (of increasing cost).
50. Wireshark Powerful and freeware protocol analyzer Open source Many packet parsers for identifying traffic Continuously updated and very commonly used
51. HowNetWorks Graphical Ubuntu-based VMware-homed Ethereal wrapper Makes Ethereal much easier to use Groupings of flows, identities, and protocols Interesting flows can be further packet-inspected in Ethereal Captures all incoming traffic. Must mirror port of interest to HowNetWorks virtual system.
52. m0n0wall Graphical VMware appliance software firewall VMware has capability of connecting machines in private networks, but no built-in firewall. m0n0wall is a small-signature, easy to setup firewall that can serve that purpose
53. The Best Free Tools for Windows Desktop Administration(Yes! Right Here! Right Now!)(You Are in the Right Session!)(You Have Made an Excellent Choice!) Greg Shields, MVPPartner and Principal Technologistwww.ConcentratedTech.com