Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
SlideShare a Scribd company logo
The Best Free Tools for Windows Desktop Administration(Yes!  Right Here! Right Now!)(You Are in the Right Session!)(You Have Made an Excellent Choice!)Greg Shields, MVPPartner and Principal Technologistwww.ConcentratedTech.com
This slide deck was used in one of our many conference presentations. We hope you enjoy it, and invite you to use it within your own organization however you like.For more information on our company, including information on private classes and upcoming conference appearances, please visit our Web site, www.ConcentratedTech.com. For links to newly-posted decks, follow us on Twitter:@concentrateddon or @concentratdgregThis work is copyright ©Concentrated Technology, LLC
OverviewServer&SecurityFile&DiskNetworkMonitoring&Troubleshooting
AgendaTopicsPart I:	Server & Security ToolsPart II:	File & Disk ToolsPart III:	Network Monitoring & TroubleshootingThe intent of this session is to dump on youas many FREE tips and toolthat I can in a short 75 minutes.
You May Applaud Now.I must warn you.You may have used some of these tools before.You may have seen some of these tools before.This Game Is Interactive!When you see a tool that’s saved your kiester, you must HOWL GRACIOUSLY.Conversely, when you see one that’s kickedyour kiester...…I want to know!  
So, Where am I Gonna’ Get all this Stuff?Process Explorer is freeware.  Download from:  http://www.sysinternals.com/Utilities/ProcessExplorer.htmlMemtest86 is shareware.  Download it from:  http://www.memtest86.com/WSName.exe is freeware (though the author begs you to click a few of his Google ads if you like it) and can be downloaded from:  http://mystuff.clarke.co.nz/wsname.aspSystenance Index.dat Analyzer is freeware and can be downloaded from  http://www.systenance.com/indexdat.php Although Diskeeper’s flagship products are not freeware, Diskeeper Disk Performance Analyzer is.  You can get a copy of it from:  http://downloads.diskeeper.com/DiskPerformanceAnalyzer.exeSafePasswd.com is an on-line resource accessible at www.safepasswd.com.  KeePass is an open-source tool that can be downloaded from:  http://www.keepass.info/LookInMyPC is advertising-driven, but freeware and can be downloaded from:  http://www.lookinmypc.comNewSID is a freeware Sysinternals tool (man, they’ve got lots of tools…).  Download NewSID at:  http://www.microsoft.com/technet/sysinternals/utilities/NewSid.mspxPSTools are freeware.  Download from:  http://www.microsoft.com/technet/sysinternals/utilities/PsTools.mspxSetAcl is freeware.  Download it from:  http://setacl.sourceforge.netAccessEnum is a SysInternals tool and is freeware.  Download it at:  http://www.microsoft.com/technet/sysinternals/utilities/AccessEnum.mspxYou can access easyVMX from http://www.easyvmx.com/easyvmx.shtml.OpenFiler is an open source tool that can be downloaded from:  http://www.openfiler.comWinSCP is a freeware tool and can be downloaded from:  http://winscp.net/eng/download.phpWinDirStat  or “Windows Directory Statistics” is a freeware tool and can be downloaded from:  http://windirstat.info/DiskPart is part of the Windows Resource Kit.Daemon Tools appears to be freeware and available from:  http://www.daemon-tools.ccJDiskReport is freeware.  Download at:  http://www.jgoodies.com/freeware/jdiskreport/
So, Where am I Gonna’ Get all this Stuff?Notepad++ supports 44 languages, including some other useful ones like shell, SQL, batch, KIXtart, and XML formats.  It can be downloaded from:  http://notepad-plus.sourceforge.netFPort is a freeware Foundstone tool that can be downloaded from:  http://www.foundstone.com/index.htm?subnav=resources/navigation.htm&subcontent=/resources/proddesc/fport.htmTCPView is freeware.  Download it from Sysinternals at:  http://www.microsoft.com/technet/sysinternals/utilities/TcpView.mspxSpiceWorks is ad-driven but freeware and can be downloaded from:  http://www.spiceworks.comThe Dude is freeware, has potentially one of the best names of any tool in this session, and can be downloaded from:  http://www.mikrotik.com/thedude.phpVisionapp is a freeware product and can be downloaded from:  http://www.visionapp.comAngry IP Scanner is a freeware tool and can be downloaded from:  http://www.angryziber.comWireshark is licensed as open source and can be downloaded from:  http://www.ethereal.com/HowNetWorks is freeware available from the VMware site.  As it runs in a VMware virtual machine, it requires a version of VMware installed to host the virtual machine.  You can download it from:  http://www.vmware.com/vmtn/appliances/M0n0wall can be downloaded either as a binary or as a pre-built VMware Appliance.  Either are easy to set up and use, though the appliance is a little easier/faster.  Download the binaries and documentation from:  http://m0n0.chDownload the VMware appliance from:  http://www.vmware.com/vmtn/appliances/Iometer http://www.iometer.org/Hyper-V Monitor Gadget http://mindre.net/post/Hyper-V-Monitor-Gadget-for-Windows-Sidebar.aspxEventSentry Light http://www.netikus.net/products_downloads.htmlSpecOps Software Gpupdate http://www.specopssoft.com/products/specopsgpupdate/ShellRunAs http://technet.microsoft.com/en-us/sysinternals/cc300361.aspxRecuva http://www.recuva.com/
Part I:Server & Security
Process ExplorerSysinternals.com toolExtensivelisting of processesCan use in place of Task ManagerLOTS of featuresIndividual performance graphs for each processSearch for files, handles, named pipes, etcTakes a little practice
Memory IssuesMemtest86Runs a thorough, stand-alone memory test for x86 architecture RAMCan build a bootable CD from an ISO imageAllow to test for at least one full pass of all 9 testsIf errors occur, try reseating or re-ordering RAM.  If they still occur, replace.While Vista & Server 2008 have their own memory diagnostic tool built in, this works well for older O/S’s.Like XP, you crazy XP hold outs!
Rename en masseWSName.exeEasy to use tool to rename workstations, in Workgroups and in Domains!Rename remote machinesUse batch files or VBScript along with this tool to rename multiple machines or an entire network.Very handy for migrations.  Vista aware, W7 soon.
oldCmp.exeAn ancient JoeWare tool that remains useful today!Command-line AD tool used to identify and remove stale computer accounts.Computer accounts reported on or removed based on last DS access.HTML reportsDHTML reportsCSV reports
ShellRunAsWindows Vista and Server 2008 no longer natively have the Run as… context menu item!Replaced with the Run as Administrator item.An omission that happens because of UAC.Lacking this, no way to run processes under alternate credentials.Get it back with ShellRunAs.GUI and command-line exposure
Diskeeper Disk Perf. AnalyzerIntended to drive you to Diskeeper’s for-cost defragmentation tools…but good for finding disk-based performance bottlenecks.Target multiple systems or entire network.Results show perf. loss reports based on fragmentation.
IOmeterDesigned to measure disk subsystem performance.With disk being a major bottleneck for many applications, provides an understanding of relative speed.
SafePasswd.comGenerates difficult to crack passwords.For users and administrators.Point your users to this web site when they complain.
KeePassHighly secured (AES & Twofish) password tool.Stores passwords in encrypted format, requires master password to unlock the contents.Can use master password plus separate encryption keyCopy/Paste toclipboard capabilitywith timed wipeNifty passwordgeneration toolsHide & unhidepasswords
Completely Disable UACUAC had great intentions, but let’s be honest – it is truly annoying.Not that I’m recommending you ever do this.  But if you wanted to completely disable UAC, split tokens, virtualization, and all the other new security features…Computer Configuration | Windows Settings | Security Settings | Local Policies | Security Options | User Account ControlUser Account Control:  Admin Approval Mode for the Built-in Administrator account (Disabled)User Account Control:  Behavior of the elevation prompt for administrators in Admin Approval Mode (Elevate without prompting)User Account Control:  Detect application installations and prompt for elevation (Disabled)User Account Control:  Only elevate executables that are signed and validated (Disabled)User Account Control:  Run all administrators in Admin Approval Mode (Disabled)User Account Control:  Switch to the secure desktop when prompting for elevation (Disabled)[This is under “other”] User Account Control:  Only elevate UIAccess applications that are installed in secure locations (Disabled)
The RAID 1 UndoPersonally, my favorite little “trick”Most server-class equipment includes hardware RAIDHowever, most admins are used to RAID 5 for its expandabilityUse “The RAID 1 Undo” immediately prior to major software changes, like patching.  Here’s the trick:Just before the patch, yank one of the drives.If the patch goes well after the reboot, reseat the drive and let the RAID rebuild.If the patch doesn’t go well, then power down the machine, pull the now “bad” drive and drop in the “good” drive.Once the system restarts, reseat the “bad” drive and let the RAID rebuild.
SpecOps GpupdateTool that augments ADUC with additional right-click functionality for managing computers.GpupdateRestartShut DownStart (via WOL)Immediatelyinstall WSUSupdatesGraphicalreporting
ExtremelyUseful!The PSToolsSysInternals Suite of ToolsShould be an important component of any administrator’s quiverUNIX-like toolsPsexec –Remote command executionPsfile –List files opened by remote systemsPsgetsid –Get computer or user SID’sPsinfo –Get local or remote computer informationPslist –List local or remote running processesPsloggedon – Lists logged on usersPsloglist – View local or remote Event LogsPspasswd – Change local or remote passwordsPsservice – Views/Modifies local or remote service configPsshutdown – Shutdown/Reboot local or remote machinesPssuspend – Suspend local or remote processes
PSExecEasily the most useful of all the PSToolsLaunch remote processes:Psexec <ComputerName> iexplore.exe http://www.hampsterdance.comStart remote command shell:Psexec <ComputerName> cmdVerify Terminal Server logged-on users:Psexec <ComputerName> quser
Hyper-V Monitor GadgetOnce Hyper-V is installed, it is challenging to determine the state of virtual machines from the server consoleThis sidebar gadget shows virtual machines and their statusEnables Turn Off | Shut Down | Save | Start functionalityCan monitor multiple serversreport on status, and RDP.Install to your managementVista workstation.
Part II:File & Disk
icaclsIcacls > xcacls.vbs > xcacls > caclsConfiguring perms at the command line is harder than you’d think.This is due to how Windows permissions themselves are now very complex.Icacls can configure DACLs, SACLs, and now Integrity LevelsMust set permission on (OI)(CI) for object and container.
icaclsIcacls C:hared /inheritance:r /grant:r “Domain Users”:(OI)(CI)R /grant:r “File Admins”:(OI)(CI)FIcacls C:haredinance /inheritance:r /grant:r “Finance Users”:(OI)(CI)R /grant:r “File Admins”:(OI)(CI)FIcacls C:haredinanceudget /grant:r “Budget Users”:(OI)(CI)MIcacls C:haredinanceetrics /grant:r “Metrics Users”:(OI)(CI)MIcacls C:haredarketing /inheritance:r /grant:r “Finance Users”:(OI)(CI)R /grant:r “File Admins”:(OI)(CI)FIcacls C:haredarketingroduct /grant:r “Product Users”:(OI)(CI)MIcacls C:haredarketingestricted /inheritance:r /grant:r “File Admins”:(OI)(CI)F /grant:r “Restricted Users”:(OI)(CI)M
Visual Tool for ACL’sAccessEnumVisual tool for seeing ACE’s in ACL’sGood at finding differing ACE’s in down level ACL’sUseful for locating long paths
RecuvaFreeware undelete programIdentifies files that have been deleted and can be restored.  Does not need to be present when the file was deleted.Capable ofsearching medialike digitalcamera cards,etc.Shows recoverableand unrecoverablefiles.
OpenFilerLooking for a low-end iSCSI target for a file server?Useful for ESX datastores.  Win2008 cluster support soon.OpenFiler “appliance” is configured via web interface.Can also be used as a NFS or NAS device.
StarWind iSCSI SAN SoftwareWindows-based iSCSI Target.Works with ESX and Hyper-V hostsFully Windows Failover Clustering capable(I like it better than OpenFiler…)
WinSCPTransferring files between UNIX/Linux and Windows machines is challenging from the command-line.Linux “smbclient” tool, but without all the command line nastiness.WinSCP is a graphical tool to do this.Like FTP, but with security.Also supportsSFTP.
WinDirStatGraphical representation of file sizes across the disk.Pac Man Rocks!Assists users/administrators with eliminating files.Odd looking at first, but the graphical view immediately draws the eye toproblem spots onthe disk drive.Easy to distributeto users to havethem do theirown cleanupactivities.
Daemon Tools / Virtual CloneDriveService for mounting ISO imagesResides in system tray and creates mounted drive lettersGenerates/uses software CD’s for virtual machinesCan emulate some forms of copy protectionDaemon Tools:  Like CloneDrive, but with Malware!
Disk Usage ReportingJDiskReportJava-based tool that scans a file tree and reports statistics on use.Can scan large areas, but tends to crash with very large scansCan report on usage by extension, size, location.Pie charts, bar charts.Show your users how much space they’re wasting!
Notepad++Multiple-language markup and editing toolSupports VBScript among othersNumerous built-in text manipulation macrosNeat zooming, highlighting, and level collapsing features
Part III:Network Monitoring& Troubleshooting
FPortFoundstone tool for “enhanced netstat”Does a better job than netstat at mapping ports to processes, PID’s, and process paths
TcpviewGUI view of  TCP/UDP connectionsShows opening and closing in different colorsNo service or permanent footprint
DSL Speed TestersOn-line speed testers, intended for DSL users can be helpful for any network connection.www.dslreports.com/ stestBe aware of firewalls and proxies
DSL Speed Testerswww.pingtest.netwww.speedtest.net
EventSentry LightVery basic Event Log, log file, and system health management across multiple machines.System health monitors for disk space, software installs/uninstalls, limited performance counters.Alerts and notifications through numerous mechanisms.Limited capabilities, designed to whet the appetite for the full version.
SpiceWorksSurprisingly full-featured multi-platform help desk/ management utility in a small 6M footprint.Ad-driven.Designed for the < 250 machine networks.Built-in help desk ticketing system.Built-in over-the-network automated inventory system.Built-in reporting system with canned and administrator-created reports with smartly-designed reports.Built-in remote control.Built-in SMS/email/alerting.Scanning can be resource intensive.
Best free tools for win database admin
The DudeFreeware network scanning and mapping utility.Discovers numerous device typesEven found my printer!SNMP device enumeration/manipulation.Syslog, Alerting, Probing, the NMS gamut.
NetWrix AD Change ReporterReports changes to AD.Delivers reports with summary and detailed (before/after) information via email.Handy for maintaining compliance.Part of NetWrix family of products.
visionapp Remote DesktopCentral console for all Terminal Services connections.Create credential stores for auto-login.Central management of all your Windows serversNice screenauto-adjustmentfeature.
Angry IP ScannerSuper-fast tool for scanning IP and port ranges rangesCan identify any IP range for scanning.Utilities for showing target network info and opening/viewing remote computer.
RDP Port Trickery!Need to connect to your home network, but don’t want to expose RDP through your firewall?Reconfigure RDP to listen on a non-standard port!Outbound firewalls often don’t filter/scan non-80/443 TCP portsUse 444/tcp to bypass outbound filters
LogMeIn.comRemote access to any machine from any network.Requires the target machine to have functioning Internet access.One of a suite of remoting products (of increasing cost).
WiresharkPowerful and freeware protocol analyzerOpen sourceMany packet parsers for identifying trafficContinuously updated and very commonly used
HowNetWorksGraphical Ubuntu-based VMware-homed Ethereal wrapperMakes Ethereal much easier to useGroupings of flows, identities, and protocolsInteresting flows can be further packet-inspected in EtherealCaptures all incoming traffic.  Must mirror port of interest to HowNetWorks virtual system.
m0n0wallGraphical VMware appliance software firewallVMware has capability of connecting machines in private networks, but no built-in firewall.m0n0wall is a small-signature, easy to setup firewall that can serve that purpose
The Best Free Tools for Windows Desktop Administration(Yes!  Right Here! Right Now!)(You Are in the Right Session!)(You Have Made an Excellent Choice!)Greg Shields, MVPPartner and Principal Technologistwww.ConcentratedTech.com
This slide deck was used in one of our many conference presentations. We hope you enjoy it, and invite you to use it within your own organization however you like.For more information on our company, including information on private classes and upcoming conference appearances, please visit our Web site, www.ConcentratedTech.com. For links to newly-posted decks, follow us on Twitter:@concentrateddon or @concentratdgregThis work is copyright ©Concentrated Technology, LLC

More Related Content

What's hot

Remote Management of Embedded Android Devices
Remote Management of Embedded Android DevicesRemote Management of Embedded Android Devices
Remote Management of Embedded Android Devices
VIA Embedded
 
Windows 10 - tools-tools-tools
Windows 10 - tools-tools-toolsWindows 10 - tools-tools-tools
Windows 10 - tools-tools-tools
Roel van Bueren
 
Optimize Your Computer
Optimize Your ComputerOptimize Your Computer
Optimize Your Computer
Shan Sachwani
 
KACE Agent Architecture and Troubleshooting Overview
KACE Agent Architecture and Troubleshooting OverviewKACE Agent Architecture and Troubleshooting Overview
KACE Agent Architecture and Troubleshooting Overview
Dell World
 
Free tools for rapidly deploying software
Free tools for rapidly deploying softwareFree tools for rapidly deploying software
Free tools for rapidly deploying software
Concentrated Technology
 
TechMentor Fall, 2011 - WDS Tricks You Didn't Know
TechMentor Fall, 2011 - WDS Tricks You Didn't KnowTechMentor Fall, 2011 - WDS Tricks You Didn't Know
TechMentor Fall, 2011 - WDS Tricks You Didn't Know
Concentrated Technology
 
Automated Deployment using Open Source
Automated Deployment using Open SourceAutomated Deployment using Open Source
Automated Deployment using Open Source
duskglow
 
Java Insecurity: How to Deal with the Constant Vulnerabilities
Java Insecurity: How to Deal with the Constant VulnerabilitiesJava Insecurity: How to Deal with the Constant Vulnerabilities
Java Insecurity: How to Deal with the Constant Vulnerabilities
Lumension
 
Remove Windows Component Protector Automatically From Your PC
Remove   Windows Component Protector  Automatically From Your PCRemove   Windows Component Protector  Automatically From Your PC
Remove Windows Component Protector Automatically From Your PC
costamary
 
Deploying w7
Deploying w7Deploying w7
Software Distribution
Software DistributionSoftware Distribution
Software Distribution
Dell World
 
SCUGDK 1803 Windows Autopilot
SCUGDK 1803 Windows AutopilotSCUGDK 1803 Windows Autopilot
SCUGDK 1803 Windows Autopilot
Per Larsen
 
bqurious Test Automation & Management Suite
bqurious Test Automation & Management Suitebqurious Test Automation & Management Suite
bqurious Test Automation & Management Suite
Abhay Goel
 
SURFacademy: Windows 10 deployment met Microsoft Deployment Toolkit en Setup ...
SURFacademy: Windows 10 deployment met Microsoft Deployment Toolkit en Setup ...SURFacademy: Windows 10 deployment met Microsoft Deployment Toolkit en Setup ...
SURFacademy: Windows 10 deployment met Microsoft Deployment Toolkit en Setup ...
Roel van Bueren
 
Security of Windows 10 IoT Core(FFRI Monthly Research 201506)
Security of Windows 10 IoT Core(FFRI Monthly Research 201506)Security of Windows 10 IoT Core(FFRI Monthly Research 201506)
Security of Windows 10 IoT Core(FFRI Monthly Research 201506)
FFRI, Inc.
 
End to End Guide Windows AutoPilot Process via Intune
End to End Guide Windows AutoPilot Process via IntuneEnd to End Guide Windows AutoPilot Process via Intune
End to End Guide Windows AutoPilot Process via Intune
Anoop Nair
 
K2000 Keeping Your Deployments Up-to-Date
K2000 Keeping Your Deployments Up-to-DateK2000 Keeping Your Deployments Up-to-Date
K2000 Keeping Your Deployments Up-to-Date
Dell World
 
UNIT 2 P5 part 2
UNIT 2 P5 part 2UNIT 2 P5 part 2
UNIT 2 P5 part 2
OriginalGSM
 
Remove Windows Command Processor In few Simple Automatic Steps
Remove Windows Command Processor In few Simple Automatic Steps Remove Windows Command Processor In few Simple Automatic Steps
Remove Windows Command Processor In few Simple Automatic Steps
costamary
 
SOP - 2013 Server Build
SOP - 2013 Server BuildSOP - 2013 Server Build
SOP - 2013 Server Build
Robert Jones
 

What's hot (20)

Remote Management of Embedded Android Devices
Remote Management of Embedded Android DevicesRemote Management of Embedded Android Devices
Remote Management of Embedded Android Devices
 
Windows 10 - tools-tools-tools
Windows 10 - tools-tools-toolsWindows 10 - tools-tools-tools
Windows 10 - tools-tools-tools
 
Optimize Your Computer
Optimize Your ComputerOptimize Your Computer
Optimize Your Computer
 
KACE Agent Architecture and Troubleshooting Overview
KACE Agent Architecture and Troubleshooting OverviewKACE Agent Architecture and Troubleshooting Overview
KACE Agent Architecture and Troubleshooting Overview
 
Free tools for rapidly deploying software
Free tools for rapidly deploying softwareFree tools for rapidly deploying software
Free tools for rapidly deploying software
 
TechMentor Fall, 2011 - WDS Tricks You Didn't Know
TechMentor Fall, 2011 - WDS Tricks You Didn't KnowTechMentor Fall, 2011 - WDS Tricks You Didn't Know
TechMentor Fall, 2011 - WDS Tricks You Didn't Know
 
Automated Deployment using Open Source
Automated Deployment using Open SourceAutomated Deployment using Open Source
Automated Deployment using Open Source
 
Java Insecurity: How to Deal with the Constant Vulnerabilities
Java Insecurity: How to Deal with the Constant VulnerabilitiesJava Insecurity: How to Deal with the Constant Vulnerabilities
Java Insecurity: How to Deal with the Constant Vulnerabilities
 
Remove Windows Component Protector Automatically From Your PC
Remove   Windows Component Protector  Automatically From Your PCRemove   Windows Component Protector  Automatically From Your PC
Remove Windows Component Protector Automatically From Your PC
 
Deploying w7
Deploying w7Deploying w7
Deploying w7
 
Software Distribution
Software DistributionSoftware Distribution
Software Distribution
 
SCUGDK 1803 Windows Autopilot
SCUGDK 1803 Windows AutopilotSCUGDK 1803 Windows Autopilot
SCUGDK 1803 Windows Autopilot
 
bqurious Test Automation & Management Suite
bqurious Test Automation & Management Suitebqurious Test Automation & Management Suite
bqurious Test Automation & Management Suite
 
SURFacademy: Windows 10 deployment met Microsoft Deployment Toolkit en Setup ...
SURFacademy: Windows 10 deployment met Microsoft Deployment Toolkit en Setup ...SURFacademy: Windows 10 deployment met Microsoft Deployment Toolkit en Setup ...
SURFacademy: Windows 10 deployment met Microsoft Deployment Toolkit en Setup ...
 
Security of Windows 10 IoT Core(FFRI Monthly Research 201506)
Security of Windows 10 IoT Core(FFRI Monthly Research 201506)Security of Windows 10 IoT Core(FFRI Monthly Research 201506)
Security of Windows 10 IoT Core(FFRI Monthly Research 201506)
 
End to End Guide Windows AutoPilot Process via Intune
End to End Guide Windows AutoPilot Process via IntuneEnd to End Guide Windows AutoPilot Process via Intune
End to End Guide Windows AutoPilot Process via Intune
 
K2000 Keeping Your Deployments Up-to-Date
K2000 Keeping Your Deployments Up-to-DateK2000 Keeping Your Deployments Up-to-Date
K2000 Keeping Your Deployments Up-to-Date
 
UNIT 2 P5 part 2
UNIT 2 P5 part 2UNIT 2 P5 part 2
UNIT 2 P5 part 2
 
Remove Windows Command Processor In few Simple Automatic Steps
Remove Windows Command Processor In few Simple Automatic Steps Remove Windows Command Processor In few Simple Automatic Steps
Remove Windows Command Processor In few Simple Automatic Steps
 
SOP - 2013 Server Build
SOP - 2013 Server BuildSOP - 2013 Server Build
SOP - 2013 Server Build
 

Viewers also liked

PowerShell custom properties
PowerShell custom propertiesPowerShell custom properties
PowerShell custom properties
Concentrated Technology
 
Managing enterprise with PowerShell remoting
Managing enterprise with PowerShell remotingManaging enterprise with PowerShell remoting
Managing enterprise with PowerShell remoting
Concentrated Technology
 
PowerShell crashcourse for Sharepoint admins
PowerShell crashcourse for Sharepoint adminsPowerShell crashcourse for Sharepoint admins
PowerShell crashcourse for Sharepoint admins
Concentrated Technology
 
Ha & drs gotcha's
Ha & drs gotcha'sHa & drs gotcha's
Ha & drs gotcha's
Concentrated Technology
 
Introduction to powershell
Introduction to powershellIntroduction to powershell
Introduction to powershell
Salaudeen Rajack
 
PS error handling and debugging
PS error handling and debuggingPS error handling and debugging
PS error handling and debugging
Concentrated Technology
 
VDI-in-a-Box: Microsoft Desktop Virtualization for Smaller Businesses and Uses
VDI-in-a-Box:  Microsoft Desktop Virtualization for Smaller Businesses and UsesVDI-in-a-Box:  Microsoft Desktop Virtualization for Smaller Businesses and Uses
VDI-in-a-Box: Microsoft Desktop Virtualization for Smaller Businesses and Uses
Concentrated Technology
 
PowerShell and WMI
PowerShell and WMIPowerShell and WMI
PowerShell and WMI
Concentrated Technology
 
Advanced Tools & Scripting with PowerShell 3.0 Jump Start - Certificate
Advanced Tools & Scripting with PowerShell 3.0 Jump Start - CertificateAdvanced Tools & Scripting with PowerShell 3.0 Jump Start - Certificate
Advanced Tools & Scripting with PowerShell 3.0 Jump Start - Certificate
Don Reese
 
Managing SQLserver
Managing SQLserverManaging SQLserver
Managing SQLserver
Concentrated Technology
 
PowerShell crashcourse
PowerShell crashcoursePowerShell crashcourse
PowerShell crashcourse
Concentrated Technology
 
Three cool cmdlets I wish PowerShell Had!
Three cool cmdlets I wish PowerShell Had!Three cool cmdlets I wish PowerShell Had!
Three cool cmdlets I wish PowerShell Had!
Thomas Lee
 
Basic PowerShell Toolmaking - Spiceworld 2016 session
Basic PowerShell Toolmaking - Spiceworld 2016 sessionBasic PowerShell Toolmaking - Spiceworld 2016 session
Basic PowerShell Toolmaking - Spiceworld 2016 session
Rob Dunn
 
Server Core2
Server Core2Server Core2
Implementing dr w. hyper v clustering
Implementing dr w. hyper v clusteringImplementing dr w. hyper v clustering
Implementing dr w. hyper v clustering
Concentrated Technology
 
Meet Windows PowerShell
Meet Windows PowerShellMeet Windows PowerShell
Meet Windows PowerShell
Concentrated Technology
 
PowerShell Functions
PowerShell FunctionsPowerShell Functions
PowerShell Functions
mikepfeiffer
 
PowerShell crash course
PowerShell crash coursePowerShell crash course
PowerShell crash course
Concentrated Technology
 
Best free tools for w d a
Best free tools for w d aBest free tools for w d a
Best free tools for w d a
Concentrated Technology
 
Automating Active Directory mgmt in PowerShell
Automating Active Directory mgmt in PowerShellAutomating Active Directory mgmt in PowerShell
Automating Active Directory mgmt in PowerShell
Concentrated Technology
 

Viewers also liked (20)

PowerShell custom properties
PowerShell custom propertiesPowerShell custom properties
PowerShell custom properties
 
Managing enterprise with PowerShell remoting
Managing enterprise with PowerShell remotingManaging enterprise with PowerShell remoting
Managing enterprise with PowerShell remoting
 
PowerShell crashcourse for Sharepoint admins
PowerShell crashcourse for Sharepoint adminsPowerShell crashcourse for Sharepoint admins
PowerShell crashcourse for Sharepoint admins
 
Ha & drs gotcha's
Ha & drs gotcha'sHa & drs gotcha's
Ha & drs gotcha's
 
Introduction to powershell
Introduction to powershellIntroduction to powershell
Introduction to powershell
 
PS error handling and debugging
PS error handling and debuggingPS error handling and debugging
PS error handling and debugging
 
VDI-in-a-Box: Microsoft Desktop Virtualization for Smaller Businesses and Uses
VDI-in-a-Box:  Microsoft Desktop Virtualization for Smaller Businesses and UsesVDI-in-a-Box:  Microsoft Desktop Virtualization for Smaller Businesses and Uses
VDI-in-a-Box: Microsoft Desktop Virtualization for Smaller Businesses and Uses
 
PowerShell and WMI
PowerShell and WMIPowerShell and WMI
PowerShell and WMI
 
Advanced Tools & Scripting with PowerShell 3.0 Jump Start - Certificate
Advanced Tools & Scripting with PowerShell 3.0 Jump Start - CertificateAdvanced Tools & Scripting with PowerShell 3.0 Jump Start - Certificate
Advanced Tools & Scripting with PowerShell 3.0 Jump Start - Certificate
 
Managing SQLserver
Managing SQLserverManaging SQLserver
Managing SQLserver
 
PowerShell crashcourse
PowerShell crashcoursePowerShell crashcourse
PowerShell crashcourse
 
Three cool cmdlets I wish PowerShell Had!
Three cool cmdlets I wish PowerShell Had!Three cool cmdlets I wish PowerShell Had!
Three cool cmdlets I wish PowerShell Had!
 
Basic PowerShell Toolmaking - Spiceworld 2016 session
Basic PowerShell Toolmaking - Spiceworld 2016 sessionBasic PowerShell Toolmaking - Spiceworld 2016 session
Basic PowerShell Toolmaking - Spiceworld 2016 session
 
Server Core2
Server Core2Server Core2
Server Core2
 
Implementing dr w. hyper v clustering
Implementing dr w. hyper v clusteringImplementing dr w. hyper v clustering
Implementing dr w. hyper v clustering
 
Meet Windows PowerShell
Meet Windows PowerShellMeet Windows PowerShell
Meet Windows PowerShell
 
PowerShell Functions
PowerShell FunctionsPowerShell Functions
PowerShell Functions
 
PowerShell crash course
PowerShell crash coursePowerShell crash course
PowerShell crash course
 
Best free tools for w d a
Best free tools for w d aBest free tools for w d a
Best free tools for w d a
 
Automating Active Directory mgmt in PowerShell
Automating Active Directory mgmt in PowerShellAutomating Active Directory mgmt in PowerShell
Automating Active Directory mgmt in PowerShell
 

Similar to Best free tools for win database admin

Improving Your Admin Image
Improving Your Admin ImageImproving Your Admin Image
Improving Your Admin Image
elisemoss
 
1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx
1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx
1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx
eugeniadean34240
 
Backtrack Manual Part4
Backtrack Manual Part4Backtrack Manual Part4
Backtrack Manual Part4
Nutan Kumar Panda
 
PC Maintenance
PC MaintenancePC Maintenance
PC Maintenance
Terence Kierans aka TK
 
Users guide
Users guideUsers guide
Users guide
Horlarthunji Azeez
 
N-Tier Application with Windows Forms - Deployment and Security
N-Tier Application with Windows Forms - Deployment and SecurityN-Tier Application with Windows Forms - Deployment and Security
N-Tier Application with Windows Forms - Deployment and Security
Peter Gfader
 
Web server security techniques by Khawar Nehal
Web server security techniques by Khawar NehalWeb server security techniques by Khawar Nehal
Web server security techniques by Khawar Nehal
Khawar Nehal khawar.nehal@atrc.net.pk
 
Let’s talk virtualization
Let’s talk virtualizationLet’s talk virtualization
Let’s talk virtualization
Etienne Tremblay
 
Software and its types
Software and its typesSoftware and its types
Software and its types
Waheed Iqbal Boss
 
CHAPTER 3 BASIC DYNAMIC ANALYSIS.ppt
CHAPTER 3 BASIC DYNAMIC ANALYSIS.pptCHAPTER 3 BASIC DYNAMIC ANALYSIS.ppt
CHAPTER 3 BASIC DYNAMIC ANALYSIS.ppt
ManjuAppukuttan2
 
Technical Note - ITME: Running StADOSvr.exe as a Service
Technical Note - ITME: Running StADOSvr.exe as a ServiceTechnical Note - ITME: Running StADOSvr.exe as a Service
Technical Note - ITME: Running StADOSvr.exe as a Service
Wonderware InTouch Machine Edition
 
Android tools for testers
Android tools for testersAndroid tools for testers
Android tools for testers
Maksim Kovalev
 
Two-For-One Talk: Malware Analysis for Everyone
Two-For-One Talk: Malware Analysis for EveryoneTwo-For-One Talk: Malware Analysis for Everyone
Two-For-One Talk: Malware Analysis for Everyone
Paul Melson
 
Oracle Audit vault
Oracle Audit vaultOracle Audit vault
Oracle Audit vault
uzzal basak
 
Remote administration
Remote administrationRemote administration
Remote administration
Suja Ritha
 
WIndows 7 Migration tools for Nashville AITP
WIndows 7 Migration tools for Nashville AITPWIndows 7 Migration tools for Nashville AITP
WIndows 7 Migration tools for Nashville AITP
David Strom
 
Smart Printing Technical Presentation
Smart Printing Technical PresentationSmart Printing Technical Presentation
Smart Printing Technical Presentation
JohnTileyITQ
 
App note running-amd_app_apps_remotely
App note running-amd_app_apps_remotelyApp note running-amd_app_apps_remotely
App note running-amd_app_apps_remotely
Ruby Tsai
 
System Imager.20051215
System Imager.20051215System Imager.20051215
System Imager.20051215
guest95b42b
 
Chapter03 Of It .... BBa 1st
Chapter03 Of It .... BBa 1st Chapter03 Of It .... BBa 1st
Chapter03 Of It .... BBa 1st
Geo-Info Ltd
 

Similar to Best free tools for win database admin (20)

Improving Your Admin Image
Improving Your Admin ImageImproving Your Admin Image
Improving Your Admin Image
 
1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx
1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx
1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx
 
Backtrack Manual Part4
Backtrack Manual Part4Backtrack Manual Part4
Backtrack Manual Part4
 
PC Maintenance
PC MaintenancePC Maintenance
PC Maintenance
 
Users guide
Users guideUsers guide
Users guide
 
N-Tier Application with Windows Forms - Deployment and Security
N-Tier Application with Windows Forms - Deployment and SecurityN-Tier Application with Windows Forms - Deployment and Security
N-Tier Application with Windows Forms - Deployment and Security
 
Web server security techniques by Khawar Nehal
Web server security techniques by Khawar NehalWeb server security techniques by Khawar Nehal
Web server security techniques by Khawar Nehal
 
Let’s talk virtualization
Let’s talk virtualizationLet’s talk virtualization
Let’s talk virtualization
 
Software and its types
Software and its typesSoftware and its types
Software and its types
 
CHAPTER 3 BASIC DYNAMIC ANALYSIS.ppt
CHAPTER 3 BASIC DYNAMIC ANALYSIS.pptCHAPTER 3 BASIC DYNAMIC ANALYSIS.ppt
CHAPTER 3 BASIC DYNAMIC ANALYSIS.ppt
 
Technical Note - ITME: Running StADOSvr.exe as a Service
Technical Note - ITME: Running StADOSvr.exe as a ServiceTechnical Note - ITME: Running StADOSvr.exe as a Service
Technical Note - ITME: Running StADOSvr.exe as a Service
 
Android tools for testers
Android tools for testersAndroid tools for testers
Android tools for testers
 
Two-For-One Talk: Malware Analysis for Everyone
Two-For-One Talk: Malware Analysis for EveryoneTwo-For-One Talk: Malware Analysis for Everyone
Two-For-One Talk: Malware Analysis for Everyone
 
Oracle Audit vault
Oracle Audit vaultOracle Audit vault
Oracle Audit vault
 
Remote administration
Remote administrationRemote administration
Remote administration
 
WIndows 7 Migration tools for Nashville AITP
WIndows 7 Migration tools for Nashville AITPWIndows 7 Migration tools for Nashville AITP
WIndows 7 Migration tools for Nashville AITP
 
Smart Printing Technical Presentation
Smart Printing Technical PresentationSmart Printing Technical Presentation
Smart Printing Technical Presentation
 
App note running-amd_app_apps_remotely
App note running-amd_app_apps_remotelyApp note running-amd_app_apps_remotely
App note running-amd_app_apps_remotely
 
System Imager.20051215
System Imager.20051215System Imager.20051215
System Imager.20051215
 
Chapter03 Of It .... BBa 1st
Chapter03 Of It .... BBa 1st Chapter03 Of It .... BBa 1st
Chapter03 Of It .... BBa 1st
 

More from Concentrated Technology

Wsus sample scripts
Wsus sample scriptsWsus sample scripts
Wsus sample scripts
Concentrated Technology
 
Wsus best practices
Wsus best practicesWsus best practices
Wsus best practices
Concentrated Technology
 
Virtualization today
Virtualization todayVirtualization today
Virtualization today
Concentrated Technology
 
Virtualization auditing & security deck v1.0
Virtualization auditing & security deck v1.0Virtualization auditing & security deck v1.0
Virtualization auditing & security deck v1.0
Concentrated Technology
 
Vdi in-a-box
Vdi in-a-boxVdi in-a-box
From VB Script to PowerShell
From VB Script to PowerShellFrom VB Script to PowerShell
From VB Script to PowerShell
Concentrated Technology
 
Top ESXi command line v2.0
Top ESXi command line v2.0Top ESXi command line v2.0
Top ESXi command line v2.0
Concentrated Technology
 
Supporting SQLserver
Supporting SQLserverSupporting SQLserver
Supporting SQLserver
Concentrated Technology
 
Securely connecting to apps over the internet using rds
Securely connecting to apps over the internet using rdsSecurely connecting to apps over the internet using rds
Securely connecting to apps over the internet using rds
Concentrated Technology
 
Rapidly deploying software
Rapidly deploying softwareRapidly deploying software
Rapidly deploying software
Concentrated Technology
 
PS scripting and modularization
PS scripting and modularizationPS scripting and modularization
PS scripting and modularization
Concentrated Technology
 
Prepping software for w7 deployment
Prepping software for w7 deploymentPrepping software for w7 deployment
Prepping software for w7 deployment
Concentrated Technology
 
PowerShell Remoting
PowerShell RemotingPowerShell Remoting
PowerShell Remoting
Concentrated Technology
 
PowerShell crashcourse for sharepoint
PowerShell crashcourse for sharepointPowerShell crashcourse for sharepoint
PowerShell crashcourse for sharepoint
Concentrated Technology
 
PowerShell 8tips
PowerShell 8tipsPowerShell 8tips
PowerShell 8tips
Concentrated Technology
 
No-script PowerShell v2
No-script PowerShell v2No-script PowerShell v2
No-script PowerShell v2
Concentrated Technology
 
Managing SQLserver for the reluctant DBA
Managing SQLserver for the reluctant DBAManaging SQLserver for the reluctant DBA
Managing SQLserver for the reluctant DBA
Concentrated Technology
 
Inventory your network and clients with PowerShell
Inventory your network and clients with PowerShellInventory your network and clients with PowerShell
Inventory your network and clients with PowerShell
Concentrated Technology
 
Iis implementation
Iis implementationIis implementation
Iis implementation
Concentrated Technology
 
Hyper v r2 deep dive
Hyper v r2 deep diveHyper v r2 deep dive
Hyper v r2 deep dive
Concentrated Technology
 

More from Concentrated Technology (20)

Wsus sample scripts
Wsus sample scriptsWsus sample scripts
Wsus sample scripts
 
Wsus best practices
Wsus best practicesWsus best practices
Wsus best practices
 
Virtualization today
Virtualization todayVirtualization today
Virtualization today
 
Virtualization auditing & security deck v1.0
Virtualization auditing & security deck v1.0Virtualization auditing & security deck v1.0
Virtualization auditing & security deck v1.0
 
Vdi in-a-box
Vdi in-a-boxVdi in-a-box
Vdi in-a-box
 
From VB Script to PowerShell
From VB Script to PowerShellFrom VB Script to PowerShell
From VB Script to PowerShell
 
Top ESXi command line v2.0
Top ESXi command line v2.0Top ESXi command line v2.0
Top ESXi command line v2.0
 
Supporting SQLserver
Supporting SQLserverSupporting SQLserver
Supporting SQLserver
 
Securely connecting to apps over the internet using rds
Securely connecting to apps over the internet using rdsSecurely connecting to apps over the internet using rds
Securely connecting to apps over the internet using rds
 
Rapidly deploying software
Rapidly deploying softwareRapidly deploying software
Rapidly deploying software
 
PS scripting and modularization
PS scripting and modularizationPS scripting and modularization
PS scripting and modularization
 
Prepping software for w7 deployment
Prepping software for w7 deploymentPrepping software for w7 deployment
Prepping software for w7 deployment
 
PowerShell Remoting
PowerShell RemotingPowerShell Remoting
PowerShell Remoting
 
PowerShell crashcourse for sharepoint
PowerShell crashcourse for sharepointPowerShell crashcourse for sharepoint
PowerShell crashcourse for sharepoint
 
PowerShell 8tips
PowerShell 8tipsPowerShell 8tips
PowerShell 8tips
 
No-script PowerShell v2
No-script PowerShell v2No-script PowerShell v2
No-script PowerShell v2
 
Managing SQLserver for the reluctant DBA
Managing SQLserver for the reluctant DBAManaging SQLserver for the reluctant DBA
Managing SQLserver for the reluctant DBA
 
Inventory your network and clients with PowerShell
Inventory your network and clients with PowerShellInventory your network and clients with PowerShell
Inventory your network and clients with PowerShell
 
Iis implementation
Iis implementationIis implementation
Iis implementation
 
Hyper v r2 deep dive
Hyper v r2 deep diveHyper v r2 deep dive
Hyper v r2 deep dive
 

Recently uploaded

UiPath Community Day Amsterdam presentations
UiPath Community Day Amsterdam presentationsUiPath Community Day Amsterdam presentations
UiPath Community Day Amsterdam presentations
UiPathCommunity
 
Jacquard Fabric Explained: Origins, Characteristics, and Uses
Jacquard Fabric Explained: Origins, Characteristics, and UsesJacquard Fabric Explained: Origins, Characteristics, and Uses
Jacquard Fabric Explained: Origins, Characteristics, and Uses
ldtexsolbl
 
Using ScyllaDB for Real-Time Write-Heavy Workloads
Using ScyllaDB for Real-Time Write-Heavy WorkloadsUsing ScyllaDB for Real-Time Write-Heavy Workloads
Using ScyllaDB for Real-Time Write-Heavy Workloads
ScyllaDB
 
TrustArc Webinar - Innovating with TRUSTe Responsible AI Certification
TrustArc Webinar - Innovating with TRUSTe Responsible AI CertificationTrustArc Webinar - Innovating with TRUSTe Responsible AI Certification
TrustArc Webinar - Innovating with TRUSTe Responsible AI Certification
TrustArc
 
AMD Zen 5 Architecture Deep Dive from Tech Day
AMD Zen 5 Architecture Deep Dive from Tech DayAMD Zen 5 Architecture Deep Dive from Tech Day
AMD Zen 5 Architecture Deep Dive from Tech Day
Low Hong Chuan
 
BCC -401-aktu-Cyber-Security Unit-1.docx
BCC -401-aktu-Cyber-Security Unit-1.docxBCC -401-aktu-Cyber-Security Unit-1.docx
BCC -401-aktu-Cyber-Security Unit-1.docx
pubgnewstate1620
 
SuratMeetup-MuleSoft + Salt Security for API Security.pptx
SuratMeetup-MuleSoft + Salt Security for API Security.pptxSuratMeetup-MuleSoft + Salt Security for API Security.pptx
SuratMeetup-MuleSoft + Salt Security for API Security.pptx
nitishjain2015
 
Flame Atomic Emission Spectroscopy.-pptx
Flame Atomic Emission Spectroscopy.-pptxFlame Atomic Emission Spectroscopy.-pptx
Flame Atomic Emission Spectroscopy.-pptx
VaishnaviChavan206944
 
Multimodal Embeddings (continued) - South Bay Meetup Slides
Multimodal Embeddings (continued) - South Bay Meetup SlidesMultimodal Embeddings (continued) - South Bay Meetup Slides
Multimodal Embeddings (continued) - South Bay Meetup Slides
Zilliz
 
Understanding NFT Marketplace Ecosystem.pptx
Understanding  NFT Marketplace Ecosystem.pptxUnderstanding  NFT Marketplace Ecosystem.pptx
Understanding NFT Marketplace Ecosystem.pptx
NFT Space.
 
Increase Quality with User Access Policies - July 2024
Increase Quality with User Access Policies - July 2024Increase Quality with User Access Policies - July 2024
Increase Quality with User Access Policies - July 2024
Peter Caitens
 
The Maritime Security. OSINT [EN] .pdf
The Maritime Security. OSINT [EN]   .pdfThe Maritime Security. OSINT [EN]   .pdf
The Maritime Security. OSINT [EN] .pdf
Snarky Security
 
CI/CD pipelines for CloudHub 2.0 - Wroclaw MuleSoft Meetup #2
CI/CD pipelines for CloudHub 2.0 - Wroclaw MuleSoft Meetup #2CI/CD pipelines for CloudHub 2.0 - Wroclaw MuleSoft Meetup #2
CI/CD pipelines for CloudHub 2.0 - Wroclaw MuleSoft Meetup #2
wromeetup
 
FIDO Munich Seminar: Biometrics and Passkeys for In-Vehicle Apps.pptx
FIDO Munich Seminar: Biometrics and Passkeys for In-Vehicle Apps.pptxFIDO Munich Seminar: Biometrics and Passkeys for In-Vehicle Apps.pptx
FIDO Munich Seminar: Biometrics and Passkeys for In-Vehicle Apps.pptx
FIDO Alliance
 
FIDO Munich Seminar: FIDO Tech Principles.pptx
FIDO Munich Seminar: FIDO Tech Principles.pptxFIDO Munich Seminar: FIDO Tech Principles.pptx
FIDO Munich Seminar: FIDO Tech Principles.pptx
FIDO Alliance
 
Getting Started with Azure AI Studio.pptx
Getting Started with Azure AI Studio.pptxGetting Started with Azure AI Studio.pptx
Getting Started with Azure AI Studio.pptx
Swaminathan Vetri
 
How CXAI Toolkit uses RAG for Intelligent Q&A
How CXAI Toolkit uses RAG for Intelligent Q&AHow CXAI Toolkit uses RAG for Intelligent Q&A
How CXAI Toolkit uses RAG for Intelligent Q&A
Zilliz
 
Project Delivery Methodology on a page with activities, deliverables
Project Delivery Methodology on a page with activities, deliverablesProject Delivery Methodology on a page with activities, deliverables
Project Delivery Methodology on a page with activities, deliverables
CLIVE MINCHIN
 
Webinar: Transforming Substation Automation with Open Source Solutions
Webinar: Transforming Substation Automation with Open Source SolutionsWebinar: Transforming Substation Automation with Open Source Solutions
Webinar: Transforming Substation Automation with Open Source Solutions
DanBrown980551
 
Network Auto Configuration and Correction using Python.pptx
Network Auto Configuration and Correction using Python.pptxNetwork Auto Configuration and Correction using Python.pptx
Network Auto Configuration and Correction using Python.pptx
saikumaresh2
 

Recently uploaded (20)

UiPath Community Day Amsterdam presentations
UiPath Community Day Amsterdam presentationsUiPath Community Day Amsterdam presentations
UiPath Community Day Amsterdam presentations
 
Jacquard Fabric Explained: Origins, Characteristics, and Uses
Jacquard Fabric Explained: Origins, Characteristics, and UsesJacquard Fabric Explained: Origins, Characteristics, and Uses
Jacquard Fabric Explained: Origins, Characteristics, and Uses
 
Using ScyllaDB for Real-Time Write-Heavy Workloads
Using ScyllaDB for Real-Time Write-Heavy WorkloadsUsing ScyllaDB for Real-Time Write-Heavy Workloads
Using ScyllaDB for Real-Time Write-Heavy Workloads
 
TrustArc Webinar - Innovating with TRUSTe Responsible AI Certification
TrustArc Webinar - Innovating with TRUSTe Responsible AI CertificationTrustArc Webinar - Innovating with TRUSTe Responsible AI Certification
TrustArc Webinar - Innovating with TRUSTe Responsible AI Certification
 
AMD Zen 5 Architecture Deep Dive from Tech Day
AMD Zen 5 Architecture Deep Dive from Tech DayAMD Zen 5 Architecture Deep Dive from Tech Day
AMD Zen 5 Architecture Deep Dive from Tech Day
 
BCC -401-aktu-Cyber-Security Unit-1.docx
BCC -401-aktu-Cyber-Security Unit-1.docxBCC -401-aktu-Cyber-Security Unit-1.docx
BCC -401-aktu-Cyber-Security Unit-1.docx
 
SuratMeetup-MuleSoft + Salt Security for API Security.pptx
SuratMeetup-MuleSoft + Salt Security for API Security.pptxSuratMeetup-MuleSoft + Salt Security for API Security.pptx
SuratMeetup-MuleSoft + Salt Security for API Security.pptx
 
Flame Atomic Emission Spectroscopy.-pptx
Flame Atomic Emission Spectroscopy.-pptxFlame Atomic Emission Spectroscopy.-pptx
Flame Atomic Emission Spectroscopy.-pptx
 
Multimodal Embeddings (continued) - South Bay Meetup Slides
Multimodal Embeddings (continued) - South Bay Meetup SlidesMultimodal Embeddings (continued) - South Bay Meetup Slides
Multimodal Embeddings (continued) - South Bay Meetup Slides
 
Understanding NFT Marketplace Ecosystem.pptx
Understanding  NFT Marketplace Ecosystem.pptxUnderstanding  NFT Marketplace Ecosystem.pptx
Understanding NFT Marketplace Ecosystem.pptx
 
Increase Quality with User Access Policies - July 2024
Increase Quality with User Access Policies - July 2024Increase Quality with User Access Policies - July 2024
Increase Quality with User Access Policies - July 2024
 
The Maritime Security. OSINT [EN] .pdf
The Maritime Security. OSINT [EN]   .pdfThe Maritime Security. OSINT [EN]   .pdf
The Maritime Security. OSINT [EN] .pdf
 
CI/CD pipelines for CloudHub 2.0 - Wroclaw MuleSoft Meetup #2
CI/CD pipelines for CloudHub 2.0 - Wroclaw MuleSoft Meetup #2CI/CD pipelines for CloudHub 2.0 - Wroclaw MuleSoft Meetup #2
CI/CD pipelines for CloudHub 2.0 - Wroclaw MuleSoft Meetup #2
 
FIDO Munich Seminar: Biometrics and Passkeys for In-Vehicle Apps.pptx
FIDO Munich Seminar: Biometrics and Passkeys for In-Vehicle Apps.pptxFIDO Munich Seminar: Biometrics and Passkeys for In-Vehicle Apps.pptx
FIDO Munich Seminar: Biometrics and Passkeys for In-Vehicle Apps.pptx
 
FIDO Munich Seminar: FIDO Tech Principles.pptx
FIDO Munich Seminar: FIDO Tech Principles.pptxFIDO Munich Seminar: FIDO Tech Principles.pptx
FIDO Munich Seminar: FIDO Tech Principles.pptx
 
Getting Started with Azure AI Studio.pptx
Getting Started with Azure AI Studio.pptxGetting Started with Azure AI Studio.pptx
Getting Started with Azure AI Studio.pptx
 
How CXAI Toolkit uses RAG for Intelligent Q&A
How CXAI Toolkit uses RAG for Intelligent Q&AHow CXAI Toolkit uses RAG for Intelligent Q&A
How CXAI Toolkit uses RAG for Intelligent Q&A
 
Project Delivery Methodology on a page with activities, deliverables
Project Delivery Methodology on a page with activities, deliverablesProject Delivery Methodology on a page with activities, deliverables
Project Delivery Methodology on a page with activities, deliverables
 
Webinar: Transforming Substation Automation with Open Source Solutions
Webinar: Transforming Substation Automation with Open Source SolutionsWebinar: Transforming Substation Automation with Open Source Solutions
Webinar: Transforming Substation Automation with Open Source Solutions
 
Network Auto Configuration and Correction using Python.pptx
Network Auto Configuration and Correction using Python.pptxNetwork Auto Configuration and Correction using Python.pptx
Network Auto Configuration and Correction using Python.pptx
 

Best free tools for win database admin

  • 1. The Best Free Tools for Windows Desktop Administration(Yes! Right Here! Right Now!)(You Are in the Right Session!)(You Have Made an Excellent Choice!)Greg Shields, MVPPartner and Principal Technologistwww.ConcentratedTech.com
  • 2. This slide deck was used in one of our many conference presentations. We hope you enjoy it, and invite you to use it within your own organization however you like.For more information on our company, including information on private classes and upcoming conference appearances, please visit our Web site, www.ConcentratedTech.com. For links to newly-posted decks, follow us on Twitter:@concentrateddon or @concentratdgregThis work is copyright ©Concentrated Technology, LLC
  • 4. AgendaTopicsPart I: Server & Security ToolsPart II: File & Disk ToolsPart III: Network Monitoring & TroubleshootingThe intent of this session is to dump on youas many FREE tips and toolthat I can in a short 75 minutes.
  • 5. You May Applaud Now.I must warn you.You may have used some of these tools before.You may have seen some of these tools before.This Game Is Interactive!When you see a tool that’s saved your kiester, you must HOWL GRACIOUSLY.Conversely, when you see one that’s kickedyour kiester...…I want to know! 
  • 6. So, Where am I Gonna’ Get all this Stuff?Process Explorer is freeware. Download from: http://www.sysinternals.com/Utilities/ProcessExplorer.htmlMemtest86 is shareware. Download it from: http://www.memtest86.com/WSName.exe is freeware (though the author begs you to click a few of his Google ads if you like it) and can be downloaded from: http://mystuff.clarke.co.nz/wsname.aspSystenance Index.dat Analyzer is freeware and can be downloaded from http://www.systenance.com/indexdat.php Although Diskeeper’s flagship products are not freeware, Diskeeper Disk Performance Analyzer is. You can get a copy of it from: http://downloads.diskeeper.com/DiskPerformanceAnalyzer.exeSafePasswd.com is an on-line resource accessible at www.safepasswd.com. KeePass is an open-source tool that can be downloaded from: http://www.keepass.info/LookInMyPC is advertising-driven, but freeware and can be downloaded from: http://www.lookinmypc.comNewSID is a freeware Sysinternals tool (man, they’ve got lots of tools…). Download NewSID at: http://www.microsoft.com/technet/sysinternals/utilities/NewSid.mspxPSTools are freeware. Download from: http://www.microsoft.com/technet/sysinternals/utilities/PsTools.mspxSetAcl is freeware. Download it from: http://setacl.sourceforge.netAccessEnum is a SysInternals tool and is freeware. Download it at: http://www.microsoft.com/technet/sysinternals/utilities/AccessEnum.mspxYou can access easyVMX from http://www.easyvmx.com/easyvmx.shtml.OpenFiler is an open source tool that can be downloaded from: http://www.openfiler.comWinSCP is a freeware tool and can be downloaded from: http://winscp.net/eng/download.phpWinDirStat or “Windows Directory Statistics” is a freeware tool and can be downloaded from: http://windirstat.info/DiskPart is part of the Windows Resource Kit.Daemon Tools appears to be freeware and available from: http://www.daemon-tools.ccJDiskReport is freeware. Download at: http://www.jgoodies.com/freeware/jdiskreport/
  • 7. So, Where am I Gonna’ Get all this Stuff?Notepad++ supports 44 languages, including some other useful ones like shell, SQL, batch, KIXtart, and XML formats. It can be downloaded from: http://notepad-plus.sourceforge.netFPort is a freeware Foundstone tool that can be downloaded from: http://www.foundstone.com/index.htm?subnav=resources/navigation.htm&subcontent=/resources/proddesc/fport.htmTCPView is freeware. Download it from Sysinternals at: http://www.microsoft.com/technet/sysinternals/utilities/TcpView.mspxSpiceWorks is ad-driven but freeware and can be downloaded from: http://www.spiceworks.comThe Dude is freeware, has potentially one of the best names of any tool in this session, and can be downloaded from: http://www.mikrotik.com/thedude.phpVisionapp is a freeware product and can be downloaded from: http://www.visionapp.comAngry IP Scanner is a freeware tool and can be downloaded from: http://www.angryziber.comWireshark is licensed as open source and can be downloaded from: http://www.ethereal.com/HowNetWorks is freeware available from the VMware site. As it runs in a VMware virtual machine, it requires a version of VMware installed to host the virtual machine. You can download it from: http://www.vmware.com/vmtn/appliances/M0n0wall can be downloaded either as a binary or as a pre-built VMware Appliance. Either are easy to set up and use, though the appliance is a little easier/faster. Download the binaries and documentation from: http://m0n0.chDownload the VMware appliance from: http://www.vmware.com/vmtn/appliances/Iometer http://www.iometer.org/Hyper-V Monitor Gadget http://mindre.net/post/Hyper-V-Monitor-Gadget-for-Windows-Sidebar.aspxEventSentry Light http://www.netikus.net/products_downloads.htmlSpecOps Software Gpupdate http://www.specopssoft.com/products/specopsgpupdate/ShellRunAs http://technet.microsoft.com/en-us/sysinternals/cc300361.aspxRecuva http://www.recuva.com/
  • 8. Part I:Server & Security
  • 9. Process ExplorerSysinternals.com toolExtensivelisting of processesCan use in place of Task ManagerLOTS of featuresIndividual performance graphs for each processSearch for files, handles, named pipes, etcTakes a little practice
  • 10. Memory IssuesMemtest86Runs a thorough, stand-alone memory test for x86 architecture RAMCan build a bootable CD from an ISO imageAllow to test for at least one full pass of all 9 testsIf errors occur, try reseating or re-ordering RAM. If they still occur, replace.While Vista & Server 2008 have their own memory diagnostic tool built in, this works well for older O/S’s.Like XP, you crazy XP hold outs!
  • 11. Rename en masseWSName.exeEasy to use tool to rename workstations, in Workgroups and in Domains!Rename remote machinesUse batch files or VBScript along with this tool to rename multiple machines or an entire network.Very handy for migrations. Vista aware, W7 soon.
  • 12. oldCmp.exeAn ancient JoeWare tool that remains useful today!Command-line AD tool used to identify and remove stale computer accounts.Computer accounts reported on or removed based on last DS access.HTML reportsDHTML reportsCSV reports
  • 13. ShellRunAsWindows Vista and Server 2008 no longer natively have the Run as… context menu item!Replaced with the Run as Administrator item.An omission that happens because of UAC.Lacking this, no way to run processes under alternate credentials.Get it back with ShellRunAs.GUI and command-line exposure
  • 14. Diskeeper Disk Perf. AnalyzerIntended to drive you to Diskeeper’s for-cost defragmentation tools…but good for finding disk-based performance bottlenecks.Target multiple systems or entire network.Results show perf. loss reports based on fragmentation.
  • 15. IOmeterDesigned to measure disk subsystem performance.With disk being a major bottleneck for many applications, provides an understanding of relative speed.
  • 16. SafePasswd.comGenerates difficult to crack passwords.For users and administrators.Point your users to this web site when they complain.
  • 17. KeePassHighly secured (AES & Twofish) password tool.Stores passwords in encrypted format, requires master password to unlock the contents.Can use master password plus separate encryption keyCopy/Paste toclipboard capabilitywith timed wipeNifty passwordgeneration toolsHide & unhidepasswords
  • 18. Completely Disable UACUAC had great intentions, but let’s be honest – it is truly annoying.Not that I’m recommending you ever do this. But if you wanted to completely disable UAC, split tokens, virtualization, and all the other new security features…Computer Configuration | Windows Settings | Security Settings | Local Policies | Security Options | User Account ControlUser Account Control: Admin Approval Mode for the Built-in Administrator account (Disabled)User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode (Elevate without prompting)User Account Control: Detect application installations and prompt for elevation (Disabled)User Account Control: Only elevate executables that are signed and validated (Disabled)User Account Control: Run all administrators in Admin Approval Mode (Disabled)User Account Control: Switch to the secure desktop when prompting for elevation (Disabled)[This is under “other”] User Account Control: Only elevate UIAccess applications that are installed in secure locations (Disabled)
  • 19. The RAID 1 UndoPersonally, my favorite little “trick”Most server-class equipment includes hardware RAIDHowever, most admins are used to RAID 5 for its expandabilityUse “The RAID 1 Undo” immediately prior to major software changes, like patching. Here’s the trick:Just before the patch, yank one of the drives.If the patch goes well after the reboot, reseat the drive and let the RAID rebuild.If the patch doesn’t go well, then power down the machine, pull the now “bad” drive and drop in the “good” drive.Once the system restarts, reseat the “bad” drive and let the RAID rebuild.
  • 20. SpecOps GpupdateTool that augments ADUC with additional right-click functionality for managing computers.GpupdateRestartShut DownStart (via WOL)Immediatelyinstall WSUSupdatesGraphicalreporting
  • 21. ExtremelyUseful!The PSToolsSysInternals Suite of ToolsShould be an important component of any administrator’s quiverUNIX-like toolsPsexec –Remote command executionPsfile –List files opened by remote systemsPsgetsid –Get computer or user SID’sPsinfo –Get local or remote computer informationPslist –List local or remote running processesPsloggedon – Lists logged on usersPsloglist – View local or remote Event LogsPspasswd – Change local or remote passwordsPsservice – Views/Modifies local or remote service configPsshutdown – Shutdown/Reboot local or remote machinesPssuspend – Suspend local or remote processes
  • 22. PSExecEasily the most useful of all the PSToolsLaunch remote processes:Psexec <ComputerName> iexplore.exe http://www.hampsterdance.comStart remote command shell:Psexec <ComputerName> cmdVerify Terminal Server logged-on users:Psexec <ComputerName> quser
  • 23. Hyper-V Monitor GadgetOnce Hyper-V is installed, it is challenging to determine the state of virtual machines from the server consoleThis sidebar gadget shows virtual machines and their statusEnables Turn Off | Shut Down | Save | Start functionalityCan monitor multiple serversreport on status, and RDP.Install to your managementVista workstation.
  • 25. icaclsIcacls > xcacls.vbs > xcacls > caclsConfiguring perms at the command line is harder than you’d think.This is due to how Windows permissions themselves are now very complex.Icacls can configure DACLs, SACLs, and now Integrity LevelsMust set permission on (OI)(CI) for object and container.
  • 26. icaclsIcacls C:hared /inheritance:r /grant:r “Domain Users”:(OI)(CI)R /grant:r “File Admins”:(OI)(CI)FIcacls C:haredinance /inheritance:r /grant:r “Finance Users”:(OI)(CI)R /grant:r “File Admins”:(OI)(CI)FIcacls C:haredinanceudget /grant:r “Budget Users”:(OI)(CI)MIcacls C:haredinanceetrics /grant:r “Metrics Users”:(OI)(CI)MIcacls C:haredarketing /inheritance:r /grant:r “Finance Users”:(OI)(CI)R /grant:r “File Admins”:(OI)(CI)FIcacls C:haredarketingroduct /grant:r “Product Users”:(OI)(CI)MIcacls C:haredarketingestricted /inheritance:r /grant:r “File Admins”:(OI)(CI)F /grant:r “Restricted Users”:(OI)(CI)M
  • 27. Visual Tool for ACL’sAccessEnumVisual tool for seeing ACE’s in ACL’sGood at finding differing ACE’s in down level ACL’sUseful for locating long paths
  • 28. RecuvaFreeware undelete programIdentifies files that have been deleted and can be restored. Does not need to be present when the file was deleted.Capable ofsearching medialike digitalcamera cards,etc.Shows recoverableand unrecoverablefiles.
  • 29. OpenFilerLooking for a low-end iSCSI target for a file server?Useful for ESX datastores. Win2008 cluster support soon.OpenFiler “appliance” is configured via web interface.Can also be used as a NFS or NAS device.
  • 30. StarWind iSCSI SAN SoftwareWindows-based iSCSI Target.Works with ESX and Hyper-V hostsFully Windows Failover Clustering capable(I like it better than OpenFiler…)
  • 31. WinSCPTransferring files between UNIX/Linux and Windows machines is challenging from the command-line.Linux “smbclient” tool, but without all the command line nastiness.WinSCP is a graphical tool to do this.Like FTP, but with security.Also supportsSFTP.
  • 32. WinDirStatGraphical representation of file sizes across the disk.Pac Man Rocks!Assists users/administrators with eliminating files.Odd looking at first, but the graphical view immediately draws the eye toproblem spots onthe disk drive.Easy to distributeto users to havethem do theirown cleanupactivities.
  • 33. Daemon Tools / Virtual CloneDriveService for mounting ISO imagesResides in system tray and creates mounted drive lettersGenerates/uses software CD’s for virtual machinesCan emulate some forms of copy protectionDaemon Tools: Like CloneDrive, but with Malware!
  • 34. Disk Usage ReportingJDiskReportJava-based tool that scans a file tree and reports statistics on use.Can scan large areas, but tends to crash with very large scansCan report on usage by extension, size, location.Pie charts, bar charts.Show your users how much space they’re wasting!
  • 35. Notepad++Multiple-language markup and editing toolSupports VBScript among othersNumerous built-in text manipulation macrosNeat zooming, highlighting, and level collapsing features
  • 37. FPortFoundstone tool for “enhanced netstat”Does a better job than netstat at mapping ports to processes, PID’s, and process paths
  • 38. TcpviewGUI view of TCP/UDP connectionsShows opening and closing in different colorsNo service or permanent footprint
  • 39. DSL Speed TestersOn-line speed testers, intended for DSL users can be helpful for any network connection.www.dslreports.com/ stestBe aware of firewalls and proxies
  • 41. EventSentry LightVery basic Event Log, log file, and system health management across multiple machines.System health monitors for disk space, software installs/uninstalls, limited performance counters.Alerts and notifications through numerous mechanisms.Limited capabilities, designed to whet the appetite for the full version.
  • 42. SpiceWorksSurprisingly full-featured multi-platform help desk/ management utility in a small 6M footprint.Ad-driven.Designed for the < 250 machine networks.Built-in help desk ticketing system.Built-in over-the-network automated inventory system.Built-in reporting system with canned and administrator-created reports with smartly-designed reports.Built-in remote control.Built-in SMS/email/alerting.Scanning can be resource intensive.
  • 44. The DudeFreeware network scanning and mapping utility.Discovers numerous device typesEven found my printer!SNMP device enumeration/manipulation.Syslog, Alerting, Probing, the NMS gamut.
  • 45. NetWrix AD Change ReporterReports changes to AD.Delivers reports with summary and detailed (before/after) information via email.Handy for maintaining compliance.Part of NetWrix family of products.
  • 46. visionapp Remote DesktopCentral console for all Terminal Services connections.Create credential stores for auto-login.Central management of all your Windows serversNice screenauto-adjustmentfeature.
  • 47. Angry IP ScannerSuper-fast tool for scanning IP and port ranges rangesCan identify any IP range for scanning.Utilities for showing target network info and opening/viewing remote computer.
  • 48. RDP Port Trickery!Need to connect to your home network, but don’t want to expose RDP through your firewall?Reconfigure RDP to listen on a non-standard port!Outbound firewalls often don’t filter/scan non-80/443 TCP portsUse 444/tcp to bypass outbound filters
  • 49. LogMeIn.comRemote access to any machine from any network.Requires the target machine to have functioning Internet access.One of a suite of remoting products (of increasing cost).
  • 50. WiresharkPowerful and freeware protocol analyzerOpen sourceMany packet parsers for identifying trafficContinuously updated and very commonly used
  • 51. HowNetWorksGraphical Ubuntu-based VMware-homed Ethereal wrapperMakes Ethereal much easier to useGroupings of flows, identities, and protocolsInteresting flows can be further packet-inspected in EtherealCaptures all incoming traffic. Must mirror port of interest to HowNetWorks virtual system.
  • 52. m0n0wallGraphical VMware appliance software firewallVMware has capability of connecting machines in private networks, but no built-in firewall.m0n0wall is a small-signature, easy to setup firewall that can serve that purpose
  • 53. The Best Free Tools for Windows Desktop Administration(Yes! Right Here! Right Now!)(You Are in the Right Session!)(You Have Made an Excellent Choice!)Greg Shields, MVPPartner and Principal Technologistwww.ConcentratedTech.com
  • 54. This slide deck was used in one of our many conference presentations. We hope you enjoy it, and invite you to use it within your own organization however you like.For more information on our company, including information on private classes and upcoming conference appearances, please visit our Web site, www.ConcentratedTech.com. For links to newly-posted decks, follow us on Twitter:@concentrateddon or @concentratdgregThis work is copyright ©Concentrated Technology, LLC