Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
SlideShare a Scribd company logo
Finally! Full-On Remote Computer Management (with PowerShell v2) Don Jones ConcentratedTech.com Pre-requisites for this presentation:  1) Strong understanding of basic Windows administration 2) Basic understanding of Windows PowerShell v2 use Level:  Advanced
This slide deck was used in one of our many conference presentations. We hope you enjoy it, and invite you to use it within your own organization however you like. For more information on our company, including information on private classes and upcoming conference appearances, please visit our Web site,  www.ConcentratedTech.com .  For links to newly-posted decks, follow us on Twitter: @concentrateddon or @concentratdgreg This work is copyright ©Concentrated Technology, LLC
About the Instructor Don Jones Contributing Editor,  technetmagazine.com IT author, consultant, and speaker Co-founder of Concentrated Technology Seven-time recipient of Microsoft ’s Most Valuable Professional (MVP) Award Author and Editor-in-Chief for Realtime Publishers Trainer for www.CBTNuggets.com
PowerShell Remoting Connects two copies of Windows PowerShell over the network The  “client copy” (where you sit) sends commands to one or more “server copies” (remote machines) Remote machines execute the commands locally, and send back the resulting objects
Underlying Technologies Relies on  PSSessions , an object that represents an authenticated connection between two computers Persist the connection in a variable Persist multiple connections in an array “ Persist” does not mean “constantly send traffic;” it re-connects on-demand and invisibly
Transport Mechanism Communications are handled by Windows Remote Management (WinRM), a service that implements Web Services for Management (WS-MAN) WinRM 2.0 uses HTTP and HTTPS as the underlying transport, on port 5985 (by default)
WinRM Security WinRM must be allowed to  listen  for requests Incoming requests are tagged with an application; this lets WinRM route requests to the correct app – like PowerShell Apps must be allowed to register as listeners with WinRM Local firewalls must obviously allow the traffic
More WinRM Security By default, WinRM uses Kerberos Doesn ’t transmit passwords at all Ensures mutual authentication of client and server Allows your credential to be delegated to the remote server Allows the use of alternate credentials WinRM can use HTTPS, which encrypts all traffic sent to and from WinRM
PowerShell Remoting “ Remote Shell” registers PowerShell as a WinRM listener PowerShell automatically applies encryption to the traffic it submits to WinRM PowerShell acts both as a client (where you sit) and a server (on the remote machine) Normally only Administrators can remotely invoke the shell
General Requirements Windows PowerShell v2 .NET Framework v2 WinRM Service v2 Win2008R2 and Win7 initial appearance Integrated in PowerShell v2 install for older OSs
Configuring in a Domain You will typically configure WinRM and Remote Shell in a domain environment GPO settings exist to do this – and the domain provides a common authentication mechanism (via Kerberos) Super-simple, super-easy – no need for manual configuration on a per-machine basis
Configuring Per-Machine Run  Set-WsManQuickConfig Starts the service, enables a firewall exception, and allows WinRM listening
Non-Domain Environment Trickier! Some terms: Client: The machine you ’re sitting in front of Server: The remote machine you want to manage You ’ll need to run several steps to make this work
Workgroup WinRM Steps Server: Enable-PSRemoting -force Won ’t work if network card is set to “Public” (vs. “Office” or “Home” or whatever) Administrator account must have a password
Workgroup WinRM Steps Client: Enable-PSRemoting WinXP only: Set-ItemProperty –Path HKLM:ystemurrentControlSetontrolsa –Name ForceGuest –Value  0  (zero) Set-Item WSMan:ocalhostlientrustedHosts –Value  server  –Force -concat
Workgroup WinRM Caution: You are sending a credential from your client to server without verifying the server ’s identity; only do this in a trusted environment For more info, see  http://blogs.msdn.com/wmi/archive/2009/07/24/powershell-remoting-between-two-workgroup-machines.aspx .
WinRM Service Settings Enable Enable if you have pre-WinRM 2.0 listeners Remember, this configured WinRM 2.0!
Remote Shell Settings Enable (Default if setting is not configured) Good idea Only useful is Windows PowerShell v2 is installed and if WinRM is enabled for listening
Troubleshooting Ensure PowerShell is being run as Administrator Caution: With UAC enabled,  explicitly  run as Administrator! No config needed to  send  remote commands; config needed to  receive  them Set-WSManQuickConfig or Enable-PSRemoting
Troubleshooting Ensure WinRM service starts automatically Default on server OS Disabled by default on client OS Use  Set-Service  cmdlet with  –computerName  to remotely change startup mode on multiple computers
Other Issues See  help about_remote_troubleshooting : Administrators in other domains Remoting for non-administrators Using an IP address vs. a computer name Connecting from a workgroup-based computer Adding computers to the  “trusted hosts” list Alternate ports for remoting Proxy servers with remoting Etc
PSSessions Use  New-PSSession  to create a new remoting session Pass an array of computer names to  -computerName  to create multiple new sessions Save the session(s) in a variable for later re-use
New-PSSession Numerous parameters allow customization Authentication mechanism Alternate credential Etc Read  Help New-PSSession  for all the details
Session Management Remove-PSSession : Close connection and delete session object No need to do this when you ’re completely finished – just close the shell Sessions do consume memory on both ends – so don ’t leave them sitting idle for no reason Get-PSSession : Get all of  your  currently-defined PSSessions No way to access others ’ sessions, even on the same machine
Session Tips Setting  –throttleLimit  on  New-PSSession  limits the number of sessions active at once – helps conserve resources Use  New-PSSessionOption  to create a new  “option object” that sets various advanced options; pass the resulting object to  –sessionOption  to apply those options when creating new sessions
Using Sessions Two ways: 1:1, or  interactive 1:many, or  batch Both techniques require that you establish the session first Trick: If you have multiple sessions in a $sessions variable… $sessions[0] is the first $sessions[1] is the second (and so on)
1:1 Remoting Use  Enter-PSSession  and provide a session object Prompt changes to show which computer ’s shell you’re now using Exit-PSSession  exits and returns you to your local shell
1:1 Remoting On-Demand Enter-PSSession  also provides parameters to create a new session on-demand Useful for creating one-off, ad-hoc remote sessions Session is automatically deleted when you run  Exit-PSSession
1:many Remoting Use  Invoke-Command  to specify a command Either specify computer names… … or pass it an array of PSSession objects
Why Sessions? You ’re  always  using a session with  Enter-PSSession  or  Invoke-Command If you use  –computerName , the session is created ad-hoc and deleted immediately If you use  –session , you can pass session objects that have already been created Pre-create the sessions if you will use them more than once in a sitting – saves typing credentials and stuff over and over
Invoke-Command Results PowerShell tacks on a  “PSComputerName” property which contains the computer that the result came from Makes it easy to separate and distinguish the results Output is serialized into XML on the remote computer, and the de-serialized back into objects in your copy of PowerShell (why? XML transmits across the network easily)
Multiple Computers Invoke-Command  automatically throttles how many computers it sends commands to in parallel -ThrottleLimit  lets you modify the default throttle Helps improve performance; means you may have to wait a bit when doing a large number of computers
Invoke-Command Tricks -command  is an alternate name for  –scriptblock , which is the real parameter name -scriptblock  takes a {script block} -filePath  uses a  local  script file (.PS1) -hideComputerName  – hides computer name in output (it ’s still accessible as a property of the output objects) Read help for more!!
More! You can also have  Invoke-Command  run as a background job ( -asJob  parameter); look up  Help *-Job  for details on working with jobs Quick example…
Thank You! Please feel free to pick up a card if you ’d like copies of my session materials I ’ll be happy to take any last questions while I pack up Please complete and submit an evaluation form for this and every session you attend!
 
This slide deck was used in one of our many conference presentations. We hope you enjoy it, and invite you to use it within your own organization however you like. For more information on our company, including information on private classes and upcoming conference appearances, please visit our Web site,  www.ConcentratedTech.com .  For links to newly-posted decks, follow us on Twitter: @concentrateddon or @concentratdgreg This work is copyright ©Concentrated Technology, LLC

More Related Content

What's hot

Wds
WdsWds
Shell Script Linux
Shell Script LinuxShell Script Linux
Shell Script Linux
Wellington Oliveira
 
Users and groups in Linux
Users and groups in LinuxUsers and groups in Linux
Users and groups in Linux
Knoldus Inc.
 
Windows server
Windows serverWindows server
Windows server
Hideo Amezawa
 
Linux LVM Logical Volume Management
Linux LVM Logical Volume ManagementLinux LVM Logical Volume Management
Linux LVM Logical Volume Management
Manolis Kartsonakis
 
Active Directory
Active Directory Active Directory
Active Directory
Sandeep Kapadane
 
File permission in linux
File permission in linuxFile permission in linux
File permission in linux
Prakash Poudel
 
Configuration Management in Ansible
Configuration Management in Ansible Configuration Management in Ansible
Configuration Management in Ansible
Bangladesh Network Operators Group
 
Useful Group Policy Concepts
Useful Group Policy ConceptsUseful Group Policy Concepts
Useful Group Policy Concepts
Rob Dunn
 
Data Retrieval over DNS in SQL Injection Attacks
Data Retrieval over DNS in SQL Injection AttacksData Retrieval over DNS in SQL Injection Attacks
Data Retrieval over DNS in SQL Injection Attacks
Miroslav Stampar
 
IBM Spectrum Scale Authentication For Object - Deep Dive
IBM Spectrum Scale Authentication For Object - Deep Dive IBM Spectrum Scale Authentication For Object - Deep Dive
IBM Spectrum Scale Authentication For Object - Deep Dive
Smita Raut
 
Ansible tips & tricks
Ansible tips & tricksAnsible tips & tricks
Ansible tips & tricks
bcoca
 
Presentation On Group Policy in Windows Server 2012 R2 By Barek-IT
Presentation On Group Policy in Windows Server 2012 R2 By Barek-ITPresentation On Group Policy in Windows Server 2012 R2 By Barek-IT
Presentation On Group Policy in Windows Server 2012 R2 By Barek-IT
Md. Abdul Barek
 
Introduction 2 linux
Introduction 2 linuxIntroduction 2 linux
Introduction 2 linux
Papu Kumar
 
Linux basics
Linux basicsLinux basics
Linux basics
Shagun Rathore
 
Linux fundamentals
Linux fundamentalsLinux fundamentals
Linux fundamentals
Deepak Upadhyay
 
Bash shell scripting
Bash shell scriptingBash shell scripting
Bash shell scripting
VIKAS TIWARI
 
Introduction to Linux
Introduction to Linux Introduction to Linux
Introduction to Linux
Harish R
 
What is active directory
What is active directoryWhat is active directory
What is active directory
Adeel Khurram
 
Samba server configuration
Samba server configurationSamba server configuration
Samba server configuration
Rohit Phulsunge
 

What's hot (20)

Wds
WdsWds
Wds
 
Shell Script Linux
Shell Script LinuxShell Script Linux
Shell Script Linux
 
Users and groups in Linux
Users and groups in LinuxUsers and groups in Linux
Users and groups in Linux
 
Windows server
Windows serverWindows server
Windows server
 
Linux LVM Logical Volume Management
Linux LVM Logical Volume ManagementLinux LVM Logical Volume Management
Linux LVM Logical Volume Management
 
Active Directory
Active Directory Active Directory
Active Directory
 
File permission in linux
File permission in linuxFile permission in linux
File permission in linux
 
Configuration Management in Ansible
Configuration Management in Ansible Configuration Management in Ansible
Configuration Management in Ansible
 
Useful Group Policy Concepts
Useful Group Policy ConceptsUseful Group Policy Concepts
Useful Group Policy Concepts
 
Data Retrieval over DNS in SQL Injection Attacks
Data Retrieval over DNS in SQL Injection AttacksData Retrieval over DNS in SQL Injection Attacks
Data Retrieval over DNS in SQL Injection Attacks
 
IBM Spectrum Scale Authentication For Object - Deep Dive
IBM Spectrum Scale Authentication For Object - Deep Dive IBM Spectrum Scale Authentication For Object - Deep Dive
IBM Spectrum Scale Authentication For Object - Deep Dive
 
Ansible tips & tricks
Ansible tips & tricksAnsible tips & tricks
Ansible tips & tricks
 
Presentation On Group Policy in Windows Server 2012 R2 By Barek-IT
Presentation On Group Policy in Windows Server 2012 R2 By Barek-ITPresentation On Group Policy in Windows Server 2012 R2 By Barek-IT
Presentation On Group Policy in Windows Server 2012 R2 By Barek-IT
 
Introduction 2 linux
Introduction 2 linuxIntroduction 2 linux
Introduction 2 linux
 
Linux basics
Linux basicsLinux basics
Linux basics
 
Linux fundamentals
Linux fundamentalsLinux fundamentals
Linux fundamentals
 
Bash shell scripting
Bash shell scriptingBash shell scripting
Bash shell scripting
 
Introduction to Linux
Introduction to Linux Introduction to Linux
Introduction to Linux
 
What is active directory
What is active directoryWhat is active directory
What is active directory
 
Samba server configuration
Samba server configurationSamba server configuration
Samba server configuration
 

Viewers also liked

PowerShell crashcourse for Sharepoint admins
PowerShell crashcourse for Sharepoint adminsPowerShell crashcourse for Sharepoint admins
PowerShell crashcourse for Sharepoint admins
Concentrated Technology
 
Powershell Training
Powershell TrainingPowershell Training
Powershell Training
Fahad Noaman
 
Implementing dr w. hyper v clustering
Implementing dr w. hyper v clusteringImplementing dr w. hyper v clustering
Implementing dr w. hyper v clustering
Concentrated Technology
 
PowerShell v4 Desired State Configuration
PowerShell v4 Desired State ConfigurationPowerShell v4 Desired State Configuration
PowerShell v4 Desired State Configuration
Jason Stangroome
 
Best free tools for win database admin
Best free tools for win database adminBest free tools for win database admin
Best free tools for win database admin
Concentrated Technology
 
Introduction to powershell
Introduction to powershellIntroduction to powershell
Introduction to powershell
Salaudeen Rajack
 
Meet Windows PowerShell
Meet Windows PowerShellMeet Windows PowerShell
Meet Windows PowerShell
Concentrated Technology
 
Ive got a powershell secret
Ive got a powershell secretIve got a powershell secret
Ive got a powershell secret
Chris Conte
 
PowerShell and WMI
PowerShell and WMIPowerShell and WMI
PowerShell and WMI
Concentrated Technology
 
No-script PowerShell v2
No-script PowerShell v2No-script PowerShell v2
No-script PowerShell v2
Concentrated Technology
 
VDI-in-a-Box: Microsoft Desktop Virtualization for Smaller Businesses and Uses
VDI-in-a-Box:  Microsoft Desktop Virtualization for Smaller Businesses and UsesVDI-in-a-Box:  Microsoft Desktop Virtualization for Smaller Businesses and Uses
VDI-in-a-Box: Microsoft Desktop Virtualization for Smaller Businesses and Uses
Concentrated Technology
 
Free tools for win server administration
Free tools for win server administrationFree tools for win server administration
Free tools for win server administration
Concentrated Technology
 
From VB Script to PowerShell
From VB Script to PowerShellFrom VB Script to PowerShell
From VB Script to PowerShell
Concentrated Technology
 
PowerShell and the Future of Windows Automation
PowerShell and the Future of Windows AutomationPowerShell and the Future of Windows Automation
PowerShell and the Future of Windows Automation
Concentrated Technology
 
PowerShell crash course
PowerShell crash coursePowerShell crash course
PowerShell crash course
Concentrated Technology
 
Managing enterprise with PowerShell remoting
Managing enterprise with PowerShell remotingManaging enterprise with PowerShell remoting
Managing enterprise with PowerShell remoting
Concentrated Technology
 
Basic PowerShell Toolmaking - Spiceworld 2016 session
Basic PowerShell Toolmaking - Spiceworld 2016 sessionBasic PowerShell Toolmaking - Spiceworld 2016 session
Basic PowerShell Toolmaking - Spiceworld 2016 session
Rob Dunn
 
Managing SQLserver
Managing SQLserverManaging SQLserver
Managing SQLserver
Concentrated Technology
 
PowerShell crashcourse
PowerShell crashcoursePowerShell crashcourse
PowerShell crashcourse
Concentrated Technology
 
PS scripting and modularization
PS scripting and modularizationPS scripting and modularization
PS scripting and modularization
Concentrated Technology
 

Viewers also liked (20)

PowerShell crashcourse for Sharepoint admins
PowerShell crashcourse for Sharepoint adminsPowerShell crashcourse for Sharepoint admins
PowerShell crashcourse for Sharepoint admins
 
Powershell Training
Powershell TrainingPowershell Training
Powershell Training
 
Implementing dr w. hyper v clustering
Implementing dr w. hyper v clusteringImplementing dr w. hyper v clustering
Implementing dr w. hyper v clustering
 
PowerShell v4 Desired State Configuration
PowerShell v4 Desired State ConfigurationPowerShell v4 Desired State Configuration
PowerShell v4 Desired State Configuration
 
Best free tools for win database admin
Best free tools for win database adminBest free tools for win database admin
Best free tools for win database admin
 
Introduction to powershell
Introduction to powershellIntroduction to powershell
Introduction to powershell
 
Meet Windows PowerShell
Meet Windows PowerShellMeet Windows PowerShell
Meet Windows PowerShell
 
Ive got a powershell secret
Ive got a powershell secretIve got a powershell secret
Ive got a powershell secret
 
PowerShell and WMI
PowerShell and WMIPowerShell and WMI
PowerShell and WMI
 
No-script PowerShell v2
No-script PowerShell v2No-script PowerShell v2
No-script PowerShell v2
 
VDI-in-a-Box: Microsoft Desktop Virtualization for Smaller Businesses and Uses
VDI-in-a-Box:  Microsoft Desktop Virtualization for Smaller Businesses and UsesVDI-in-a-Box:  Microsoft Desktop Virtualization for Smaller Businesses and Uses
VDI-in-a-Box: Microsoft Desktop Virtualization for Smaller Businesses and Uses
 
Free tools for win server administration
Free tools for win server administrationFree tools for win server administration
Free tools for win server administration
 
From VB Script to PowerShell
From VB Script to PowerShellFrom VB Script to PowerShell
From VB Script to PowerShell
 
PowerShell and the Future of Windows Automation
PowerShell and the Future of Windows AutomationPowerShell and the Future of Windows Automation
PowerShell and the Future of Windows Automation
 
PowerShell crash course
PowerShell crash coursePowerShell crash course
PowerShell crash course
 
Managing enterprise with PowerShell remoting
Managing enterprise with PowerShell remotingManaging enterprise with PowerShell remoting
Managing enterprise with PowerShell remoting
 
Basic PowerShell Toolmaking - Spiceworld 2016 session
Basic PowerShell Toolmaking - Spiceworld 2016 sessionBasic PowerShell Toolmaking - Spiceworld 2016 session
Basic PowerShell Toolmaking - Spiceworld 2016 session
 
Managing SQLserver
Managing SQLserverManaging SQLserver
Managing SQLserver
 
PowerShell crashcourse
PowerShell crashcoursePowerShell crashcourse
PowerShell crashcourse
 
PS scripting and modularization
PS scripting and modularizationPS scripting and modularization
PS scripting and modularization
 

Similar to PowerShell Remoting

Automating Active Directory mgmt in PowerShell
Automating Active Directory mgmt in PowerShellAutomating Active Directory mgmt in PowerShell
Automating Active Directory mgmt in PowerShell
Concentrated Technology
 
Inventory your network and clients with PowerShell
Inventory your network and clients with PowerShellInventory your network and clients with PowerShell
Inventory your network and clients with PowerShell
Concentrated Technology
 
PowerShell 2 remoting
PowerShell 2 remotingPowerShell 2 remoting
PowerShell 2 remoting
jonathanmedd
 
Windows PowerShell
Windows PowerShellWindows PowerShell
Assessment itemManaging Services and SecurityValue 15Due D.docx
Assessment itemManaging Services and SecurityValue 15Due D.docxAssessment itemManaging Services and SecurityValue 15Due D.docx
Assessment itemManaging Services and SecurityValue 15Due D.docx
galerussel59292
 
PowerShell for SharePoint Developers
PowerShell for SharePoint DevelopersPowerShell for SharePoint Developers
PowerShell for SharePoint Developers
Boulos Dib
 
Server Core2
Server Core2Server Core2
PowerShell 2.0 remoting
PowerShell 2.0 remotingPowerShell 2.0 remoting
PowerShell 2.0 remoting
Ravikanth Chaganti
 
April 2010-intro-to-remoting-part2
April 2010-intro-to-remoting-part2April 2010-intro-to-remoting-part2
April 2010-intro-to-remoting-part2
Southeast Michigan PowerShell Script Club
 
Enterprise PowerShell for Remote Security Assessments
Enterprise PowerShell for Remote Security AssessmentsEnterprise PowerShell for Remote Security Assessments
Enterprise PowerShell for Remote Security Assessments
EnclaveSecurity
 
One-Man Ops
One-Man OpsOne-Man Ops
One-Man Ops
Jos Boumans
 
Wsv406 Advanced Automation Using Windows Power Shell2.0
Wsv406 Advanced Automation Using Windows Power Shell2.0Wsv406 Advanced Automation Using Windows Power Shell2.0
Wsv406 Advanced Automation Using Windows Power Shell2.0
jsnover1
 
LOAD BALANCING OF APPLICATIONS USING XEN HYPERVISOR
LOAD BALANCING OF APPLICATIONS  USING XEN HYPERVISORLOAD BALANCING OF APPLICATIONS  USING XEN HYPERVISOR
LOAD BALANCING OF APPLICATIONS USING XEN HYPERVISOR
Vanika Kapoor
 
VM201 - IdoSphere
VM201 - IdoSphereVM201 - IdoSphere
VM201 - IdoSphere
Carl Tyler
 
Sdwest2008 V101 F Dpowerpoint Final
Sdwest2008 V101 F Dpowerpoint FinalSdwest2008 V101 F Dpowerpoint Final
Sdwest2008 V101 F Dpowerpoint Final
Stephen Rose
 
Introduction to PowerShell
Introduction to PowerShellIntroduction to PowerShell
Introduction to PowerShell
Boulos Dib
 
PowerShell - Be A Cool Blue Kid
PowerShell - Be A Cool Blue KidPowerShell - Be A Cool Blue Kid
PowerShell - Be A Cool Blue Kid
Matthew Johnson
 
Powershell Seminar @ ITWorx CuttingEdge Club
Powershell Seminar @ ITWorx CuttingEdge ClubPowershell Seminar @ ITWorx CuttingEdge Club
Powershell Seminar @ ITWorx CuttingEdge Club
Essam Salah
 
Feb 2010 Intro To Remoteing Part1
Feb 2010 Intro To Remoteing Part1Feb 2010 Intro To Remoteing Part1
Feb 2010 Intro To Remoteing Part1
Southeast Michigan PowerShell Script Club
 
Practical Introduction To Linux
Practical Introduction To LinuxPractical Introduction To Linux
Practical Introduction To Linux
Zeeshan Rizvi
 

Similar to PowerShell Remoting (20)

Automating Active Directory mgmt in PowerShell
Automating Active Directory mgmt in PowerShellAutomating Active Directory mgmt in PowerShell
Automating Active Directory mgmt in PowerShell
 
Inventory your network and clients with PowerShell
Inventory your network and clients with PowerShellInventory your network and clients with PowerShell
Inventory your network and clients with PowerShell
 
PowerShell 2 remoting
PowerShell 2 remotingPowerShell 2 remoting
PowerShell 2 remoting
 
Windows PowerShell
Windows PowerShellWindows PowerShell
Windows PowerShell
 
Assessment itemManaging Services and SecurityValue 15Due D.docx
Assessment itemManaging Services and SecurityValue 15Due D.docxAssessment itemManaging Services and SecurityValue 15Due D.docx
Assessment itemManaging Services and SecurityValue 15Due D.docx
 
PowerShell for SharePoint Developers
PowerShell for SharePoint DevelopersPowerShell for SharePoint Developers
PowerShell for SharePoint Developers
 
Server Core2
Server Core2Server Core2
Server Core2
 
PowerShell 2.0 remoting
PowerShell 2.0 remotingPowerShell 2.0 remoting
PowerShell 2.0 remoting
 
April 2010-intro-to-remoting-part2
April 2010-intro-to-remoting-part2April 2010-intro-to-remoting-part2
April 2010-intro-to-remoting-part2
 
Enterprise PowerShell for Remote Security Assessments
Enterprise PowerShell for Remote Security AssessmentsEnterprise PowerShell for Remote Security Assessments
Enterprise PowerShell for Remote Security Assessments
 
One-Man Ops
One-Man OpsOne-Man Ops
One-Man Ops
 
Wsv406 Advanced Automation Using Windows Power Shell2.0
Wsv406 Advanced Automation Using Windows Power Shell2.0Wsv406 Advanced Automation Using Windows Power Shell2.0
Wsv406 Advanced Automation Using Windows Power Shell2.0
 
LOAD BALANCING OF APPLICATIONS USING XEN HYPERVISOR
LOAD BALANCING OF APPLICATIONS  USING XEN HYPERVISORLOAD BALANCING OF APPLICATIONS  USING XEN HYPERVISOR
LOAD BALANCING OF APPLICATIONS USING XEN HYPERVISOR
 
VM201 - IdoSphere
VM201 - IdoSphereVM201 - IdoSphere
VM201 - IdoSphere
 
Sdwest2008 V101 F Dpowerpoint Final
Sdwest2008 V101 F Dpowerpoint FinalSdwest2008 V101 F Dpowerpoint Final
Sdwest2008 V101 F Dpowerpoint Final
 
Introduction to PowerShell
Introduction to PowerShellIntroduction to PowerShell
Introduction to PowerShell
 
PowerShell - Be A Cool Blue Kid
PowerShell - Be A Cool Blue KidPowerShell - Be A Cool Blue Kid
PowerShell - Be A Cool Blue Kid
 
Powershell Seminar @ ITWorx CuttingEdge Club
Powershell Seminar @ ITWorx CuttingEdge ClubPowershell Seminar @ ITWorx CuttingEdge Club
Powershell Seminar @ ITWorx CuttingEdge Club
 
Feb 2010 Intro To Remoteing Part1
Feb 2010 Intro To Remoteing Part1Feb 2010 Intro To Remoteing Part1
Feb 2010 Intro To Remoteing Part1
 
Practical Introduction To Linux
Practical Introduction To LinuxPractical Introduction To Linux
Practical Introduction To Linux
 

More from Concentrated Technology

Wsus sample scripts
Wsus sample scriptsWsus sample scripts
Wsus sample scripts
Concentrated Technology
 
Wsus best practices
Wsus best practicesWsus best practices
Wsus best practices
Concentrated Technology
 
Virtualization today
Virtualization todayVirtualization today
Virtualization today
Concentrated Technology
 
Virtualization auditing & security deck v1.0
Virtualization auditing & security deck v1.0Virtualization auditing & security deck v1.0
Virtualization auditing & security deck v1.0
Concentrated Technology
 
Vdi in-a-box
Vdi in-a-boxVdi in-a-box
Top ESXi command line v2.0
Top ESXi command line v2.0Top ESXi command line v2.0
Top ESXi command line v2.0
Concentrated Technology
 
Supporting SQLserver
Supporting SQLserverSupporting SQLserver
Supporting SQLserver
Concentrated Technology
 
Securely connecting to apps over the internet using rds
Securely connecting to apps over the internet using rdsSecurely connecting to apps over the internet using rds
Securely connecting to apps over the internet using rds
Concentrated Technology
 
Rapidly deploying software
Rapidly deploying softwareRapidly deploying software
Rapidly deploying software
Concentrated Technology
 
PS error handling and debugging
PS error handling and debuggingPS error handling and debugging
PS error handling and debugging
Concentrated Technology
 
Prepping software for w7 deployment
Prepping software for w7 deploymentPrepping software for w7 deployment
Prepping software for w7 deployment
Concentrated Technology
 
PowerShell crashcourse for sharepoint
PowerShell crashcourse for sharepointPowerShell crashcourse for sharepoint
PowerShell crashcourse for sharepoint
Concentrated Technology
 
PowerShell 8tips
PowerShell 8tipsPowerShell 8tips
PowerShell 8tips
Concentrated Technology
 
PowerShell custom properties
PowerShell custom propertiesPowerShell custom properties
PowerShell custom properties
Concentrated Technology
 
Managing SQLserver for the reluctant DBA
Managing SQLserver for the reluctant DBAManaging SQLserver for the reluctant DBA
Managing SQLserver for the reluctant DBA
Concentrated Technology
 
Iis implementation
Iis implementationIis implementation
Iis implementation
Concentrated Technology
 
Hyper v r2 deep dive
Hyper v r2 deep diveHyper v r2 deep dive
Hyper v r2 deep dive
Concentrated Technology
 
How to configure esx to pass an audit
How to configure esx to pass an auditHow to configure esx to pass an audit
How to configure esx to pass an audit
Concentrated Technology
 

More from Concentrated Technology (18)

Wsus sample scripts
Wsus sample scriptsWsus sample scripts
Wsus sample scripts
 
Wsus best practices
Wsus best practicesWsus best practices
Wsus best practices
 
Virtualization today
Virtualization todayVirtualization today
Virtualization today
 
Virtualization auditing & security deck v1.0
Virtualization auditing & security deck v1.0Virtualization auditing & security deck v1.0
Virtualization auditing & security deck v1.0
 
Vdi in-a-box
Vdi in-a-boxVdi in-a-box
Vdi in-a-box
 
Top ESXi command line v2.0
Top ESXi command line v2.0Top ESXi command line v2.0
Top ESXi command line v2.0
 
Supporting SQLserver
Supporting SQLserverSupporting SQLserver
Supporting SQLserver
 
Securely connecting to apps over the internet using rds
Securely connecting to apps over the internet using rdsSecurely connecting to apps over the internet using rds
Securely connecting to apps over the internet using rds
 
Rapidly deploying software
Rapidly deploying softwareRapidly deploying software
Rapidly deploying software
 
PS error handling and debugging
PS error handling and debuggingPS error handling and debugging
PS error handling and debugging
 
Prepping software for w7 deployment
Prepping software for w7 deploymentPrepping software for w7 deployment
Prepping software for w7 deployment
 
PowerShell crashcourse for sharepoint
PowerShell crashcourse for sharepointPowerShell crashcourse for sharepoint
PowerShell crashcourse for sharepoint
 
PowerShell 8tips
PowerShell 8tipsPowerShell 8tips
PowerShell 8tips
 
PowerShell custom properties
PowerShell custom propertiesPowerShell custom properties
PowerShell custom properties
 
Managing SQLserver for the reluctant DBA
Managing SQLserver for the reluctant DBAManaging SQLserver for the reluctant DBA
Managing SQLserver for the reluctant DBA
 
Iis implementation
Iis implementationIis implementation
Iis implementation
 
Hyper v r2 deep dive
Hyper v r2 deep diveHyper v r2 deep dive
Hyper v r2 deep dive
 
How to configure esx to pass an audit
How to configure esx to pass an auditHow to configure esx to pass an audit
How to configure esx to pass an audit
 

Recently uploaded

Securiport Gambia - Intelligent Threat Analysis
Securiport Gambia - Intelligent Threat AnalysisSecuriport Gambia - Intelligent Threat Analysis
Securiport Gambia - Intelligent Threat Analysis
Securiport Gambia
 
UiPath Community Day Amsterdam presentations
UiPath Community Day Amsterdam presentationsUiPath Community Day Amsterdam presentations
UiPath Community Day Amsterdam presentations
UiPathCommunity
 
TribeQonf2024_Dimpy_ShiftingSecurityLeft
TribeQonf2024_Dimpy_ShiftingSecurityLeftTribeQonf2024_Dimpy_ShiftingSecurityLeft
TribeQonf2024_Dimpy_ShiftingSecurityLeft
Dimpy Adhikary
 
Mega MUG 2024: Working smarter in Marketo
Mega MUG 2024: Working smarter in MarketoMega MUG 2024: Working smarter in Marketo
Mega MUG 2024: Working smarter in Marketo
Stephanie Tyagita
 
FIDO Munich Seminar: Securing Smart Car.pptx
FIDO Munich Seminar: Securing Smart Car.pptxFIDO Munich Seminar: Securing Smart Car.pptx
FIDO Munich Seminar: Securing Smart Car.pptx
FIDO Alliance
 
STKI Israeli IT Market Study v2 August 2024.pdf
STKI Israeli IT Market Study v2 August 2024.pdfSTKI Israeli IT Market Study v2 August 2024.pdf
STKI Israeli IT Market Study v2 August 2024.pdf
Dr. Jimmy Schwarzkopf
 
Network Auto Configuration and Correction using Python.pptx
Network Auto Configuration and Correction using Python.pptxNetwork Auto Configuration and Correction using Python.pptx
Network Auto Configuration and Correction using Python.pptx
saikumaresh2
 
FIDO Munich Seminar FIDO Automotive Apps.pptx
FIDO Munich Seminar FIDO Automotive Apps.pptxFIDO Munich Seminar FIDO Automotive Apps.pptx
FIDO Munich Seminar FIDO Automotive Apps.pptx
FIDO Alliance
 
Starlink Product Specifications_HighPerformance-1.pdf
Starlink Product Specifications_HighPerformance-1.pdfStarlink Product Specifications_HighPerformance-1.pdf
Starlink Product Specifications_HighPerformance-1.pdf
ssuser0b9571
 
Understanding NFT Marketplace Ecosystem.pptx
Understanding  NFT Marketplace Ecosystem.pptxUnderstanding  NFT Marketplace Ecosystem.pptx
Understanding NFT Marketplace Ecosystem.pptx
NFT Space.
 
Increase Quality with User Access Policies - July 2024
Increase Quality with User Access Policies - July 2024Increase Quality with User Access Policies - July 2024
Increase Quality with User Access Policies - July 2024
Peter Caitens
 
FIDO Munich Seminar: FIDO Tech Principles.pptx
FIDO Munich Seminar: FIDO Tech Principles.pptxFIDO Munich Seminar: FIDO Tech Principles.pptx
FIDO Munich Seminar: FIDO Tech Principles.pptx
FIDO Alliance
 
UiPath Community Day Amsterdam: Code, Collaborate, Connect
UiPath Community Day Amsterdam: Code, Collaborate, ConnectUiPath Community Day Amsterdam: Code, Collaborate, Connect
UiPath Community Day Amsterdam: Code, Collaborate, Connect
UiPathCommunity
 
FIDO Munich Seminar: Strong Workforce Authn Push & Pull Factors.pptx
FIDO Munich Seminar: Strong Workforce Authn Push & Pull Factors.pptxFIDO Munich Seminar: Strong Workforce Authn Push & Pull Factors.pptx
FIDO Munich Seminar: Strong Workforce Authn Push & Pull Factors.pptx
FIDO Alliance
 
FIDO Munich Seminar Workforce Authentication Case Study.pptx
FIDO Munich Seminar Workforce Authentication Case Study.pptxFIDO Munich Seminar Workforce Authentication Case Study.pptx
FIDO Munich Seminar Workforce Authentication Case Study.pptx
FIDO Alliance
 
CI/CD pipelines for CloudHub 2.0 - Wroclaw MuleSoft Meetup #2
CI/CD pipelines for CloudHub 2.0 - Wroclaw MuleSoft Meetup #2CI/CD pipelines for CloudHub 2.0 - Wroclaw MuleSoft Meetup #2
CI/CD pipelines for CloudHub 2.0 - Wroclaw MuleSoft Meetup #2
wromeetup
 
Scientific-Based Blockchain TON Project Analysis Report
Scientific-Based Blockchain  TON Project Analysis ReportScientific-Based Blockchain  TON Project Analysis Report
Scientific-Based Blockchain TON Project Analysis Report
SelcukTOPAL2
 
Leading Bigcommerce Development Services for Online Retailers
Leading Bigcommerce Development Services for Online RetailersLeading Bigcommerce Development Services for Online Retailers
Leading Bigcommerce Development Services for Online Retailers
SynapseIndia
 
Global Collaboration for Space Exploration.pdf
Global Collaboration for Space Exploration.pdfGlobal Collaboration for Space Exploration.pdf
Global Collaboration for Space Exploration.pdf
Sachin Chitre
 
TrustArc Webinar - Innovating with TRUSTe Responsible AI Certification
TrustArc Webinar - Innovating with TRUSTe Responsible AI CertificationTrustArc Webinar - Innovating with TRUSTe Responsible AI Certification
TrustArc Webinar - Innovating with TRUSTe Responsible AI Certification
TrustArc
 

Recently uploaded (20)

Securiport Gambia - Intelligent Threat Analysis
Securiport Gambia - Intelligent Threat AnalysisSecuriport Gambia - Intelligent Threat Analysis
Securiport Gambia - Intelligent Threat Analysis
 
UiPath Community Day Amsterdam presentations
UiPath Community Day Amsterdam presentationsUiPath Community Day Amsterdam presentations
UiPath Community Day Amsterdam presentations
 
TribeQonf2024_Dimpy_ShiftingSecurityLeft
TribeQonf2024_Dimpy_ShiftingSecurityLeftTribeQonf2024_Dimpy_ShiftingSecurityLeft
TribeQonf2024_Dimpy_ShiftingSecurityLeft
 
Mega MUG 2024: Working smarter in Marketo
Mega MUG 2024: Working smarter in MarketoMega MUG 2024: Working smarter in Marketo
Mega MUG 2024: Working smarter in Marketo
 
FIDO Munich Seminar: Securing Smart Car.pptx
FIDO Munich Seminar: Securing Smart Car.pptxFIDO Munich Seminar: Securing Smart Car.pptx
FIDO Munich Seminar: Securing Smart Car.pptx
 
STKI Israeli IT Market Study v2 August 2024.pdf
STKI Israeli IT Market Study v2 August 2024.pdfSTKI Israeli IT Market Study v2 August 2024.pdf
STKI Israeli IT Market Study v2 August 2024.pdf
 
Network Auto Configuration and Correction using Python.pptx
Network Auto Configuration and Correction using Python.pptxNetwork Auto Configuration and Correction using Python.pptx
Network Auto Configuration and Correction using Python.pptx
 
FIDO Munich Seminar FIDO Automotive Apps.pptx
FIDO Munich Seminar FIDO Automotive Apps.pptxFIDO Munich Seminar FIDO Automotive Apps.pptx
FIDO Munich Seminar FIDO Automotive Apps.pptx
 
Starlink Product Specifications_HighPerformance-1.pdf
Starlink Product Specifications_HighPerformance-1.pdfStarlink Product Specifications_HighPerformance-1.pdf
Starlink Product Specifications_HighPerformance-1.pdf
 
Understanding NFT Marketplace Ecosystem.pptx
Understanding  NFT Marketplace Ecosystem.pptxUnderstanding  NFT Marketplace Ecosystem.pptx
Understanding NFT Marketplace Ecosystem.pptx
 
Increase Quality with User Access Policies - July 2024
Increase Quality with User Access Policies - July 2024Increase Quality with User Access Policies - July 2024
Increase Quality with User Access Policies - July 2024
 
FIDO Munich Seminar: FIDO Tech Principles.pptx
FIDO Munich Seminar: FIDO Tech Principles.pptxFIDO Munich Seminar: FIDO Tech Principles.pptx
FIDO Munich Seminar: FIDO Tech Principles.pptx
 
UiPath Community Day Amsterdam: Code, Collaborate, Connect
UiPath Community Day Amsterdam: Code, Collaborate, ConnectUiPath Community Day Amsterdam: Code, Collaborate, Connect
UiPath Community Day Amsterdam: Code, Collaborate, Connect
 
FIDO Munich Seminar: Strong Workforce Authn Push & Pull Factors.pptx
FIDO Munich Seminar: Strong Workforce Authn Push & Pull Factors.pptxFIDO Munich Seminar: Strong Workforce Authn Push & Pull Factors.pptx
FIDO Munich Seminar: Strong Workforce Authn Push & Pull Factors.pptx
 
FIDO Munich Seminar Workforce Authentication Case Study.pptx
FIDO Munich Seminar Workforce Authentication Case Study.pptxFIDO Munich Seminar Workforce Authentication Case Study.pptx
FIDO Munich Seminar Workforce Authentication Case Study.pptx
 
CI/CD pipelines for CloudHub 2.0 - Wroclaw MuleSoft Meetup #2
CI/CD pipelines for CloudHub 2.0 - Wroclaw MuleSoft Meetup #2CI/CD pipelines for CloudHub 2.0 - Wroclaw MuleSoft Meetup #2
CI/CD pipelines for CloudHub 2.0 - Wroclaw MuleSoft Meetup #2
 
Scientific-Based Blockchain TON Project Analysis Report
Scientific-Based Blockchain  TON Project Analysis ReportScientific-Based Blockchain  TON Project Analysis Report
Scientific-Based Blockchain TON Project Analysis Report
 
Leading Bigcommerce Development Services for Online Retailers
Leading Bigcommerce Development Services for Online RetailersLeading Bigcommerce Development Services for Online Retailers
Leading Bigcommerce Development Services for Online Retailers
 
Global Collaboration for Space Exploration.pdf
Global Collaboration for Space Exploration.pdfGlobal Collaboration for Space Exploration.pdf
Global Collaboration for Space Exploration.pdf
 
TrustArc Webinar - Innovating with TRUSTe Responsible AI Certification
TrustArc Webinar - Innovating with TRUSTe Responsible AI CertificationTrustArc Webinar - Innovating with TRUSTe Responsible AI Certification
TrustArc Webinar - Innovating with TRUSTe Responsible AI Certification
 

PowerShell Remoting

  • 1. Finally! Full-On Remote Computer Management (with PowerShell v2) Don Jones ConcentratedTech.com Pre-requisites for this presentation: 1) Strong understanding of basic Windows administration 2) Basic understanding of Windows PowerShell v2 use Level: Advanced
  • 2. This slide deck was used in one of our many conference presentations. We hope you enjoy it, and invite you to use it within your own organization however you like. For more information on our company, including information on private classes and upcoming conference appearances, please visit our Web site, www.ConcentratedTech.com . For links to newly-posted decks, follow us on Twitter: @concentrateddon or @concentratdgreg This work is copyright ©Concentrated Technology, LLC
  • 3. About the Instructor Don Jones Contributing Editor, technetmagazine.com IT author, consultant, and speaker Co-founder of Concentrated Technology Seven-time recipient of Microsoft ’s Most Valuable Professional (MVP) Award Author and Editor-in-Chief for Realtime Publishers Trainer for www.CBTNuggets.com
  • 4. PowerShell Remoting Connects two copies of Windows PowerShell over the network The “client copy” (where you sit) sends commands to one or more “server copies” (remote machines) Remote machines execute the commands locally, and send back the resulting objects
  • 5. Underlying Technologies Relies on PSSessions , an object that represents an authenticated connection between two computers Persist the connection in a variable Persist multiple connections in an array “ Persist” does not mean “constantly send traffic;” it re-connects on-demand and invisibly
  • 6. Transport Mechanism Communications are handled by Windows Remote Management (WinRM), a service that implements Web Services for Management (WS-MAN) WinRM 2.0 uses HTTP and HTTPS as the underlying transport, on port 5985 (by default)
  • 7. WinRM Security WinRM must be allowed to listen for requests Incoming requests are tagged with an application; this lets WinRM route requests to the correct app – like PowerShell Apps must be allowed to register as listeners with WinRM Local firewalls must obviously allow the traffic
  • 8. More WinRM Security By default, WinRM uses Kerberos Doesn ’t transmit passwords at all Ensures mutual authentication of client and server Allows your credential to be delegated to the remote server Allows the use of alternate credentials WinRM can use HTTPS, which encrypts all traffic sent to and from WinRM
  • 9. PowerShell Remoting “ Remote Shell” registers PowerShell as a WinRM listener PowerShell automatically applies encryption to the traffic it submits to WinRM PowerShell acts both as a client (where you sit) and a server (on the remote machine) Normally only Administrators can remotely invoke the shell
  • 10. General Requirements Windows PowerShell v2 .NET Framework v2 WinRM Service v2 Win2008R2 and Win7 initial appearance Integrated in PowerShell v2 install for older OSs
  • 11. Configuring in a Domain You will typically configure WinRM and Remote Shell in a domain environment GPO settings exist to do this – and the domain provides a common authentication mechanism (via Kerberos) Super-simple, super-easy – no need for manual configuration on a per-machine basis
  • 12. Configuring Per-Machine Run Set-WsManQuickConfig Starts the service, enables a firewall exception, and allows WinRM listening
  • 13. Non-Domain Environment Trickier! Some terms: Client: The machine you ’re sitting in front of Server: The remote machine you want to manage You ’ll need to run several steps to make this work
  • 14. Workgroup WinRM Steps Server: Enable-PSRemoting -force Won ’t work if network card is set to “Public” (vs. “Office” or “Home” or whatever) Administrator account must have a password
  • 15. Workgroup WinRM Steps Client: Enable-PSRemoting WinXP only: Set-ItemProperty –Path HKLM:ystemurrentControlSetontrolsa –Name ForceGuest –Value 0 (zero) Set-Item WSMan:ocalhostlientrustedHosts –Value server –Force -concat
  • 16. Workgroup WinRM Caution: You are sending a credential from your client to server without verifying the server ’s identity; only do this in a trusted environment For more info, see http://blogs.msdn.com/wmi/archive/2009/07/24/powershell-remoting-between-two-workgroup-machines.aspx .
  • 17. WinRM Service Settings Enable Enable if you have pre-WinRM 2.0 listeners Remember, this configured WinRM 2.0!
  • 18. Remote Shell Settings Enable (Default if setting is not configured) Good idea Only useful is Windows PowerShell v2 is installed and if WinRM is enabled for listening
  • 19. Troubleshooting Ensure PowerShell is being run as Administrator Caution: With UAC enabled, explicitly run as Administrator! No config needed to send remote commands; config needed to receive them Set-WSManQuickConfig or Enable-PSRemoting
  • 20. Troubleshooting Ensure WinRM service starts automatically Default on server OS Disabled by default on client OS Use Set-Service cmdlet with –computerName to remotely change startup mode on multiple computers
  • 21. Other Issues See help about_remote_troubleshooting : Administrators in other domains Remoting for non-administrators Using an IP address vs. a computer name Connecting from a workgroup-based computer Adding computers to the “trusted hosts” list Alternate ports for remoting Proxy servers with remoting Etc
  • 22. PSSessions Use New-PSSession to create a new remoting session Pass an array of computer names to -computerName to create multiple new sessions Save the session(s) in a variable for later re-use
  • 23. New-PSSession Numerous parameters allow customization Authentication mechanism Alternate credential Etc Read Help New-PSSession for all the details
  • 24. Session Management Remove-PSSession : Close connection and delete session object No need to do this when you ’re completely finished – just close the shell Sessions do consume memory on both ends – so don ’t leave them sitting idle for no reason Get-PSSession : Get all of your currently-defined PSSessions No way to access others ’ sessions, even on the same machine
  • 25. Session Tips Setting –throttleLimit on New-PSSession limits the number of sessions active at once – helps conserve resources Use New-PSSessionOption to create a new “option object” that sets various advanced options; pass the resulting object to –sessionOption to apply those options when creating new sessions
  • 26. Using Sessions Two ways: 1:1, or interactive 1:many, or batch Both techniques require that you establish the session first Trick: If you have multiple sessions in a $sessions variable… $sessions[0] is the first $sessions[1] is the second (and so on)
  • 27. 1:1 Remoting Use Enter-PSSession and provide a session object Prompt changes to show which computer ’s shell you’re now using Exit-PSSession exits and returns you to your local shell
  • 28. 1:1 Remoting On-Demand Enter-PSSession also provides parameters to create a new session on-demand Useful for creating one-off, ad-hoc remote sessions Session is automatically deleted when you run Exit-PSSession
  • 29. 1:many Remoting Use Invoke-Command to specify a command Either specify computer names… … or pass it an array of PSSession objects
  • 30. Why Sessions? You ’re always using a session with Enter-PSSession or Invoke-Command If you use –computerName , the session is created ad-hoc and deleted immediately If you use –session , you can pass session objects that have already been created Pre-create the sessions if you will use them more than once in a sitting – saves typing credentials and stuff over and over
  • 31. Invoke-Command Results PowerShell tacks on a “PSComputerName” property which contains the computer that the result came from Makes it easy to separate and distinguish the results Output is serialized into XML on the remote computer, and the de-serialized back into objects in your copy of PowerShell (why? XML transmits across the network easily)
  • 32. Multiple Computers Invoke-Command automatically throttles how many computers it sends commands to in parallel -ThrottleLimit lets you modify the default throttle Helps improve performance; means you may have to wait a bit when doing a large number of computers
  • 33. Invoke-Command Tricks -command is an alternate name for –scriptblock , which is the real parameter name -scriptblock takes a {script block} -filePath uses a local script file (.PS1) -hideComputerName – hides computer name in output (it ’s still accessible as a property of the output objects) Read help for more!!
  • 34. More! You can also have Invoke-Command run as a background job ( -asJob parameter); look up Help *-Job for details on working with jobs Quick example…
  • 35. Thank You! Please feel free to pick up a card if you ’d like copies of my session materials I ’ll be happy to take any last questions while I pack up Please complete and submit an evaluation form for this and every session you attend!
  • 36.  
  • 37. This slide deck was used in one of our many conference presentations. We hope you enjoy it, and invite you to use it within your own organization however you like. For more information on our company, including information on private classes and upcoming conference appearances, please visit our Web site, www.ConcentratedTech.com . For links to newly-posted decks, follow us on Twitter: @concentrateddon or @concentratdgreg This work is copyright ©Concentrated Technology, LLC

Editor's Notes

  1. MGB 2003 © 2003 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.
  2. MGB 2003 © 2003 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.