Jump to content

BlueToast

Members
  • Content Count

    117
  • Joined

  • Days Won

    7

BlueToast last won the day on December 15 2020

BlueToast had the most liked content!

Community Reputation

20 Excellent

My Information

  • Agent Count
    10000+

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

  1. for /f "tokens=*" %a in ('dir "C:\Users" /B ^| findstr /V "Administrator defaultuser0 Public"') do @(echo mkdir "C:\Users\%~a\AppData\Roaming\Microsoft Teams\Backgrounds\Uploads") Remove "echo " if you want this command to do something for real, otherwise it just tells you what it would otherwise normally execute if echo were removed. If you use this in a batch file, the command will need to be modified: find and replace "%" with "%%".
  2. Veeam has some degree of integration with CWA. Not sure about CWM.
  3. KI 12894729. The work-around solution is to take a good copy of the binary, replace the 0 KB file, and lock the permissions down on the executable to prevent its modification or deletion. Then, with every update of ConnectWise Automate, repeat the same thing to ensure the SCService.exe is up-to-date. From ConnectWise:
  4. I'm afraid that is not something I can do due to the amount of time investment we made to build our own disk cleanup script. However, the gist of what we did was to go to System > Configuration > Dashboard > Config > Configurations > Disk Cleanup in the CWA desktop client and write a shell command for each entry listed. This involved commands such as del, rd, for /f, forfiles. For the Windows built-in disk cleanup tool Cleanmgr.exe, it involved using the documentation at https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/cleanmgr to generate a p
  5. This may or may not help, at least pertaining to some facts acquired from ConnectWise Support: Running scripts will timeout after 48 hours (meaning they will be forcibly terminated by the script engine). This is hard-coded into ConnectWise Automate and cannot be modified. Commands issued to online agents will generally timeout after 6 hours except for commands where ConnectWise Development has deemed as information is coming back from the command (timeout is indefinite). This is hard-coded into ConnectWise Automate and cannot be modified. In example: Resend Patches, i
  6. What username and password are you supplying? Is it the credentials to some CWA local account?
  7. You need to modify the properties of the Location in ConnectWise Automate to paste your UNC path \\servername\LTCache into the Drive field: It sounds and looks like that is the problem you are experiencing. Is this correct?
  8. Could you provide a practical example? Where do the values for the likes of $UserName, $Password, $urlToken, and xxx-xxx-xxx come from?
  9. Is there a way to perform the GZip Base64 decompression and decoding purely via MySQL? The end objective I am trying to reach is to figure out a way to automate exporting scripts into a format that is GitHub-friendly for version tracking of all changes.
  10. %scriptid% and %when% does not get updated though (remains to be the values of the parent script), and global variables in sub-scripts are overwritten by already existing variables (meaning global variables do not get set if the variable already exists)
  11. Use a Shell command: ren "c:\windows\assembly\GAC_MSIL\Newtonsoft.Json\11.0.0.0_30ad4fe6b2a6aeed\Newtonsoft.json.dll" "Newtonsoft.json.old" Extended (verifies that the rename was successful): ren "c:\windows\assembly\GAC_MSIL\Newtonsoft.Json\11.0.0.0_30ad4fe6b2a6aeed\Newtonsoft.json.dll" "Newtonsoft.json.old"&(if exist "c:\windows\assembly\GAC_MSIL\Newtonsoft.Json\11.0.0.0_30ad4fe6b2a6aeed\Newtonsoft.json.dll" (echo Rename successful) else (echo Rename failure))
  12. Deletes a key pertaining to Automatic Updates and a value used for hiding Windows Updates from Security Center.
  13. These are registry keys I acquired on a Windows 10 workstation with SysInternals Process Monitor: Set Windows Update Defaults reg add "HKLM\SOFTWARE\Microsoft\Security Center" /v "NoWindowsUpdate" /t REG_DWORD /d 0 /f reg delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\AU" /f reg delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "HideSCAHealth" /f Disable Windows Update reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU" /v NoAutoUpdate /t REG_DWORD /d 1 /f reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\Wind
  14. You could potentially use Windows' built-in detection: for /f "tokens=2 delims==" %a in ('wmic /NAMESPACe:\\root\SecurityCenter2 PATH AntiVirusProduct GET displayName /VALUE ^| find "="') do @(echo %~a) wmic /NAMESPACe:\\root\SecurityCenter2 PATH AntiVirusProduct GET /VALUE wmic /NAMESPACe:\\root\SecurityCenter2 PATH AntiVirusProduct GET displayName /VALUE | find /C "=" Source: https://www.404techsupport.com/2015/04/27/powershell-script-detect-antivirus-product-and-status/
×
×
  • Create New...