Windows Admin Scripting Little Black Book (Little Black Books (Paraglyph Press))

S

Scheduled Task icon, removing with KiXtart, 132-133

SCHTASKS, creating, listing, and deleting tasks with, 357

Scripting methods , understanding, 34-35

Scripts

creating, 1-2

defining, 1

limitations of, 2

versus logon scripts, 311

versus programs, 1-2

running in PowerQuest Drive Image Pro, 30-31

understanding, 1-2

using in Symantec's Norton Ghost, 32

when to use, 2

SDKs, 172-173

SECEDIT utility

fixing Windows 2000 upgrade security with, 269-270

fixing Windows NT security with, 269-270

group policy, reapplying with, 269

security analysis, using with, 269

security settings, explaining, 270-271

Security Template, applying with, 269-270

using, 268-271

Security

logs, understanding, 281-282

managing through Active Directory Services Interface, 272-277

Microsoft Windows 2000, fixing upgrade with SECEDIT on, 270

password length, setting, 273

priorities, list of, 261-262

scripts, list of, 278

templates in Microsoft Security Configuration and Analysis, types of, 260-261

Windows NT, fixing with SECEDIT on, 270

Services

deleting with Windows Management Instrumentation, 189-190

installing from the command line, 155

listing on a remote system, 177

listing with Windows Management Instrumentation, 185-186

managing on a remote system, 177-178

parameters for listing, 177

parameters for managing, 178

pausing from the command line, 156

pausing with Windows Management Instrumentation, 188-189

resuming from the command line, 156

resuming with Windows Management Instrumentation, 189

starting from the command line, 156

starting with Windows Management Instrumentation, 186-187

stopping from the command line, 156-157

stopping with Windows Management Instrumentation, 187-188

uninstalling from the command line, 155

Shares

adding from the command line, 159

copying permissions from the command line, 160

creating with Active Directory Services Interface, 214

creating with permissions from the command line, 160

creating with permissions on a remote system, 176

creating with Windows Management Instrumentation, 180-181

deleting with Active Directory Services Interface, 214-215

deleting with Windows Management Instrumentation, 181-182

listing from the command line, 159

listing on a remote system, 176

listing with Active Directory Services Interface, 213-214

listing with Windows Management Instrumentation, 179-180

removing from the command line, 159

Shell automation

computers, suspending, 109

Context menu, accessing, 111-112

control panel applets, running, 108

Date and Time properties page, accessing, 109

file details, obtaining, 110

files, copying and moving, 110

Find Files properties page, accessing, 109

folder details, obtaining, 110

Folder Name Space, connecting to, 109-110

folders, browsing, 105-106

folders, copying, 110-111

folders, exploring, 107-108

folders, moving, 110-111

folders, opening, 108

PCs, ejecting, 109

Start menu, refreshing, 109

Start menu properties page, accessing, 109

system dialog boxes, calling, 108

system windows, controlling, 105-106

Taskbar properties page, accessing, 109

Shell scripting

alerts, sending, 297-299

BIOS, collecting information on with, 233-234

collecting information on with, 233-236

commands, list of, 145-146

defining, 2

dialog boxes, using with, 145-146

event logs, writing to, 286-288

example, 3-4

file and folder attributes, displaying, setting, or renaming, 57

file system, manipulating, 55-58

file versions, determining, 56

files and directories, replicating, 57-58

files and folders, compressing, 58

files depending on extensions, deleting, 55

folders and subfolders , deleting, 56

limitations of, 4

logon scripts, creating, 316-324

logs, using, 285-288

media files, playing from the command line, 369

memory, collecting information about, 234-235

NTBackup, running with, 347

output, suppressing, 25

processors, collecting information about, 235-263

program files, updating, 56

registry, modifying, 124-129

registry, modifying with REGINI.EXE, 128-129

registry, querying, 125-126

registry, searching, 126

registry keys, backing up, 125

registry keys, deleting with REGEDIT, 127-128

registry keys, restoring, 125

shortcuts, creating, 149-150

SRVINFO utility, collecting information with, 233

text files, appending, 57

text logs, writing to, 285

understanding, 2-4

user input, accepting, 147-148

when to use, 4

Windows 2000, customizing, 126-127

Windows 2003, customizing, 126-127

Windows XP, customizing, 126-127

Shortcuts

broken, deleting, 152-153

creating with KiXtart, 150-151

creating with shell scripting, 149-150

creating with Windows Script Host, 151-152

uninstall, moving to Central Directory, 153-154

working with, 149-153

SHUTDOWN.EXE, list of supported parameters, 161

Silent installations

of Active Directory Services Interface, 42

of Internet Explorer, 43

of LiveUpdate, 43

of Microsoft Data Access Components, 40-41

of Microsoft Office 2000/XP, 47

of .NET framework, 40

of Norton Antivirus 2003, 45

of pcANYWHERE 11.0, 45

of Windows 2000 Resource Kit, 45-46

of Windows 2000 Service Pack, 41

of Windows 2000 XP Service Pack, 41

of Windows Management Instrumentations, 41-42

of Windows XP Service Pack, 41

of WinZip 8.1 SR-1, 43-45

SMS, 231

Software

installed, listing with Windows Management Instrumentation, 254-255

installing with Windows Management Instrumentation, 195-196

uninstalling with Windows Management Instrumentation, 196-197

Software developer's kits (SDKs), Windows Management Instrumentation and, 172-173

Sound cards, collecting information on with Windows Management Instrumentation, 252

SpecialFolder property, list of available folders, 141-142

SRC parameters, 20

SRVINFO, collecting information on with shell scripting, 233

Start menu

controlling, 153-155

properties page, accessing with shell automation, 109

refreshing with shell automation, 109

Static IP addresses, assigning with Windows Management Instrumentation, 193-194

Sub procedures

structure of, 10-11

understanding, 10-11

Subfolders

accessing, 64

deleting, 56, 73

Subroutines

defining, 10

types of, 10-11

understanding, 10-11

Switches

combining, 22-23

using in Symantec's Norton Ghost, 32

Symantec's Norton Antivirus. See Norton Antivirus.

Symantec's Norton Ghost

DST parameters, 20

image files, creating and storing, 19

MODE parameters, 19-20

scripting, 31-32

SRC parameters, 20

understanding, 19

Web site, 15, 19

System dialog boxes, calling with shell automation, 108

System events, calling, 161-163

System information utility, understanding, 230-231

System information utility, using in Windows, 230-231

System logs, understanding, 281-282

System Manager Server (SMS), understanding, 231

System Restore

enabling/disabling through Windows Management Improvements, 390

points, creating through Windows Management Improvements, 390

points, listing through Windows Management Improvements, 391-392

scripting through Windows Management Improvements, 390-393

understanding, 387

System Restore Points

creating through Windows Management Improvements, 390

listing all through Windows Management Improvements, 391-392

rolling back through Windows Management Improvements, 392-393

System Windows, controlling with shell automation, 105-106

Категории