Tags
Stolen Linux Devices Office scan Trend micro wallpaper style colour count uninstall slack slack Windows server backup Event id Retrieve Implementation module Toast send VBScript next logon generation Locked Unlock AD Computer tickets desk AD User AD Cylance Protect cylance Remote Control by ITarian Itarian Communication Client Encrpyt Uptime test internet properties serial shadow Lockscreen Hardening Enumeration Net Session netcease DLP attack Brute force Trace CPU repair mask Subnet Public IP Internet explorer 11 Nitro Upgrade Assistant Spiceworks agent forticlientssl vpn activate dates between mailbox exchange save CES comodo endpoint security CAVS image files photo webcam capture unblock close opened Generator Random power plan hash bandwidth MODEL Hunter Unknown CA trusted root cerficate avira shortcuts arrow icon user folder log file full scan sorting policy video audio File types System Boot Time Boot time speed Trend Micro Worry-Free Business Security Services Instance US EU C1 apache wallpaper Education Consumer sentinelone without reboot decrypt comdom ESM agent ESM without authentication with authentication No restart authentication Upload Documents Cobian backup triggering defender without with CisReportTool C1 logs printer port name ping pubnub zip file file transfer winscp adifosensu Recovery key synchronize NTP server caskroom Existing Firewall Rule match expire loggedin user internet connection windows lock Dome agent website certain time priority product keys msoffice word macros dotm file dotm windows 10 outlook PST Image vaccine Petya ransomware local drive permission interval interva; browser .msu win 7 workstation TKINTER ethernet windows update metered Virtual manager FTP states windows features teamviewer host SQL workgroup contents resume pause free edition maxthon browser QualityCompact Panda Antivirus HP one operation system fastboot and labtech Vulnerability SEP Software Inventory WEBROOT comodo dome agent comodo cloud antivirus Vipre Business Agent Malwarebytes Anti-Exploit plugged in sleep uptodate Time out zip autostart client agent encryption recover sub system software distribution screenshot product key ms office Drive username an Credential BITS speed control WSUS Onedrive search google chrome UK blank page internet Explorer metric interface metric date patch management agent bginfo LAN Wake environment Dome Standard Agent crash kernal same the within a your on WinRM Setup collecting appropriate error in Erase approve EDR delayed ITSMService Veeam different service from RAM Usage Reaches Value Level Log RAM sockets available HTTPS TCP Port Server cis autorun Batch file three largest pm spm rmm availability Power management Ability Connectivity Virtual Private Network VPN online Shutdown unzip 24 hours Success Failed virusscan mcafee public installed Trendmicro Antivirus INTEL AMT Laptop updates KB spooler print Action center 48 older Web Page Cdome Trusted Root Certification Authorities store Certificate Motherboard Health Status Hard Drive Changes space Threshold Modify host screen Legal start menu install comodo patch management agent installed programs Installed Programs and identifying number property remote Transfer SFTP idle time capacity resize activity Hard disk Smart Missing Font Network Share SCEP System Center Endpoint Protection Ownership Recursively Extension clean Find Unhide Empty Rename SHA1 Checksum MD5 Modification creation time last File Modification older than UTC time Projects Corrupted Copy Blacklisted root Storage Display Top Microsoft Installer Recent Windows Management Instrumentation Command WMIC Consuming Last Logged on already restore created format Delete partion CCleaner problems Interrupt saving Kill balanced plan Running high memory maintenance Kaspersky Security Center Agent Critical Kaspersky Endpoint Security 10 Kaspersky defragmentation auslogics using Defragment Decompress Compress Background Tool commands all Demand Task summary Recycle bin Shared file Task Scheduler Clear Cache Renew ESET Desktop Setting BookMark Mapped Removable Machine Processor Architecture Interaction failure Current User Temporary Local Group days open Computer updated Guest User Sophos except Path remove Byte size directory Microsoft Essentials Malwarebytes TCP/IP Folder DHCP Dynamic Host Configuration Protocol Symantec Sub Directory All files Dynamic IP Text content specified path Network Adapters RDP Remote Desktop connection BitDefender Agent Security Tools BitDefender DNS netman Delete Values Registry-key share folder wireless network License Status Microsoft Office Office Microsoft .NET 3.5 SP1 id product lisence shortcut Comodo Client Communication operations AVG CloudCare AVG Sub-keys Browser history volume target Teamviewer WMI statistics usage Anti-viruses limit quota Popup Message Task Bar Quick Icon restart notifications disconnected logoff logon enabled disabled JRE JDK Java Development kit Java Runtime Environment Java reboots pending infections detected uncleaned certificates expired URL Unauthorised not activated License Key Number permissible USER ACCESS CONTROL UAC triggers actions Multiple changed Local User Environmental Variables partition stop BIOS startup services local accounts plug and play run reboot drives bitlocker drivers workstation lock restorepoint performance power active connections ram process Guid Comodo Client Security patches windows updates Windows command Python 2 Dome shield hardware servers Security Configurations Process management Script Procedures Task automation MSP automation Script monitroing Email ITSM Procedures Domain User accounts MSP Log collection integration File operation C1 automation System opearations Patch managment MAC Powershell VB script script Remote managment
More

Get Sub-keys and Values for a Register Key

The script is to get sub-keys and values of a valid register-key Each key can contain both subkeys and data, so this will help you to get...

Categories Action

(0)
Released 06/05/2017
Updated 09/30/2020
381 views
599 downloads

Has Registry key

This script is to check whether your target Windows machine has the Registry key or not. The Registry or Windows Registry contains information...

Categories Action

(0)
Released 06/05/2017
Updated 10/03/2020
552 views
517 downloads

Uninstall Comodo Endpoint Security and Comodo Endpoint security Manager (CESM) agents.

Please use below script to, This script will Uninstall the  Comodo Endpoint Security and Comodo Endpoint security Manager (CESM) agents ....

Categories Offboarding

(0)
Released 06/05/2017
Updated 10/13/2020
1019 views
558 downloads

Display All Installed or Active Anti-Viruses from an Endpoint

The script is to detect all installed or active anti-viruses from an endpoint Note: The Windows command "WMIC /Node:localhost /Namespa...

Categories Action

(0)
Released 06/05/2017
Updated 10/10/2020
1020 views
285 downloads

View the Quick Icons list from the Task Bar

This script is to view a list of icons in the taskbar. It will also list the files in quick bar  

Categories Action

(0)
Released 06/05/2017
Updated 10/18/2020
343 views
362 downloads

Procedure to check whether the endpoint require Reboot or not?

The script is to check whether the endpoint require reboot itself or not It is neccessary for some time to reboot the sysytem,this script help...

Categories Action

(0)
Released 06/05/2017
Updated 09/25/2020
610 views
289 downloads

Send custom popup message to endpoint with any Language

We recommend this script to send a custom pop-up message to the endpoint user (who is currently logged in) Give following parameters message=u&q...

Categories Action

(0)
Released 06/05/2017
Updated 10/16/2020
948 views
505 downloads

Run PowerShell Script

Please run the script as System User The procedure does the following for you, Gets PowerShell Script Content Gets File Name with Extension...

Categories Action

(0)
Released 06/05/2017
Updated 10/19/2020
2324 views
735 downloads

Get System summary

Please refer the sccript to Get System Inventory Information means the system summary .  It will display  the inofrmartion regarding...

Categories Action

(0)
Released 10/08/2016
Updated 10/18/2020
384 views
839 downloads

Uninstall an Application Using GUID

The procedure will uninstall if the GUID is available in the Windows Endpoint. You can find the GUID for each MSI Application that was installed on th...

Categories Action

(0)
Released 10/08/2016
Updated 09/25/2020
1105 views
441 downloads