Tags
Remote Control by ITarian Itarian Communication Client Encrpyt Uptime test internet properties serial shadow Lockscreen Hardening Enumeration Net Session netcease DLP attack Brute force Trace CPU repair mask Subnet Public IP Internet explorer 11 Nitro Upgrade Assistant Spiceworks agent forticlientssl vpn activate dates between mailbox exchange save CES comodo endpoint security CAVS image files photo webcam capture unblock close opened Generator Random power plan hash bandwidth MODEL Hunter Unknown CA trusted root cerficate avira shortcuts arrow icon user folder log file full scan sorting policy video audio File types System Boot Time Boot time speed Trend Micro Worry-Free Business Security Services Instance US EU C1 apache wallpaper Education Consumer sentinelone without reboot decrypt comdom ESM agent ESM without authentication with authentication No restart authentication Upload Documents Cobian backup triggering defender without with CisReportTool C1 logs printer port name ping pubnub zip file file transfer winscp adifosensu Recovery key synchronize NTP server caskroom Existing Firewall Rule match expire loggedin user internet connection windows lock Dome agent website certain time priority product keys msoffice word macros dotm file dotm windows 10 outlook PST Image vaccine Petya ransomware local drive permission interval interva; browser .msu win 7 workstation TKINTER ethernet windows update metered Virtual manager FTP states windows features teamviewer host SQL Name workgroup contents resume pause free edition maxthon browser QualityCompact Panda Antivirus HP one operation system fastboot and labtech Vulnerability SEP Software Inventory WEBROOT comodo dome agent comodo cloud antivirus Vipre Business Agent Malwarebytes Anti-Exploit plugged in sleep uptodate Time out zip autostart client agent encryption recover sub system software distribution screenshot product key ms office Drive username an Credential BITS speed control WSUS Advanced Monitoring Agent Onedrive search google chrome UK blank page internet Explorer metric interface metric date patch management agent bginfo LAN Wake environment customer Dome Standard Agent crash kernal same the within a your on WinRM Setup collecting appropriate error in Erase approve EDR delayed ITSMService Veeam different service from RAM Usage Reaches Value Level Log RAM sockets available HTTPS TCP Port Server cis autorun Batch file three largest pm spm rmm availability Power management Ability Connectivity Virtual Private Network VPN online Shutdown unzip 24 hours Success Failed virusscan mcafee public installed Trendmicro Antivirus INTEL AMT Laptop updates KB spooler print Action center 48 older Web Page Cdome Trusted Root Certification Authorities store Certificate Motherboard Health Status Hard Drive Changes space Threshold Modify host screen Legal start menu install comodo patch management agent installed programs Installed Programs and identifying number property remote Transfer SFTP idle time capacity resize activity Hard disk Smart Missing Font Network Share SCEP System Center Endpoint Protection Ownership Recursively Extension clean Find Unhide Empty Rename SHA1 Checksum MD5 Modification creation time last File Modification older than UTC time Projects Corrupted Copy Blacklisted root Storage Display Top Microsoft Installer Recent Windows Management Instrumentation Command WMIC Consuming Last Logged on already restore created format Delete partion CCleaner problems Interrupt saving Kill balanced plan Running high memory maintenance Duplicate Kaspersky Security Center Agent Critical Kaspersky Endpoint Security 10 Kaspersky defragmentation auslogics using Defragment Decompress Compress Background Tool commands all Demand Task summary Recycle bin Shared file Task Scheduler Clear Cache Renew ESET Desktop Setting BookMark Mapped Removable Machine Processor Architecture Interaction failure Current User Temporary Local Group days open Computer updated Guest User Sophos except Path remove Byte size directory Microsoft Essentials Malwarebytes TCP/IP Folder DHCP Dynamic Host Configuration Protocol Symantec Sub Directory All files Dynamic IP Text content specified path Network Adapters RDP Remote Desktop connection BitDefender Agent Security Tools BitDefender DNS netman Delete Values Registry-key share folder wireless network License Status Microsoft Office Office Microsoft .NET 3.5 SP1 id product lisence shortcut Comodo Client Communication operations AVG CloudCare AVG Sub-keys Browser history volume target Teamviewer WMI statistics usage Anti-viruses limit quota Popup Message Task Bar Quick Icon restart notifications disconnected logoff logon enabled disabled JRE JDK Java Development kit Java Runtime Environment Java reboots pending infections detected uncleaned certificates expired URL Unauthorised not activated License Key Number permissible USER ACCESS CONTROL UAC triggers actions Multiple changed Local User Environmental Variables partition stop BIOS startup services local accounts plug and play run reboot drives bitlocker drivers workstation lock restorepoint performance power active connections ram process Guid Comodo Client Security patches windows updates Windows command Python 2 Dome shield hardware servers Security Configurations Process management Script Procedures Task automation MSP automation Script monitroing Email ITSM Procedures Domain User accounts MSP Log collection integration File operation C1 automation System opearations Patch managment MAC Powershell VB script script Remote managment Comodo ONE
More

Monitor a folder and its sub-folders/files for modifications and additions, then email the results

Hi, This script will monitor a folder including its sub-folders/files for any modifications and new additions, then email the results....

Category Script Monitors

(0)
Released 05/30/2018
Updated 05/30/2018
78 views
98 downloads

Check if the contents of a file are correct. If not, replace the file with a file that contains the correct content

This script is used to check if the contents of a file are correct. If not, provide alert and replace the file with a file that contains the...

Category File Operations

(0)
Released 04/10/2018
Updated 04/10/2018
107 views
134 downloads

Desktop shortcut delete

Hi Please refer the script to delete the desktop shortcut as required  and list the remaining shortcuts in the desktop. Note: Run this s...

Category File Operations

(0)
Released 04/02/2018
Updated 04/02/2018
110 views
179 downloads

Download a file from a HTTP URL and copy to a specified folder on the endpoint

This script is used to download a file from a given URL and copy it to a specified folder on a endpoint destination_folder = r"  "&n...

Category File Operations

(0)
Released 03/13/2018
Updated 03/13/2018
254 views
174 downloads

Executing FTP and SFTP commands using winscp

This script is used to transfer a file via ftp or sftp using winscp commands Run the script as system user 

Category File Operations

(0)
Released 03/05/2018
Updated 03/05/2018
226 views
182 downloads

Remove files from folder

Hi, This script will remove files from a folder. it can be either a single file or a multiple files. Edit Parameters: dirPath = r"C:\Pro...

Category File Operations

(0)
Released 02/25/2018
Updated 02/25/2018
200 views
237 downloads

SecurityLog Used Percentage

This script is used to check the used percentage of SecurityLog event. Run the script as system user

Category File Operations

(0)
Released 01/24/2018
Updated 01/24/2018
186 views
182 downloads

Allow the executable and write access to USB in the system+

This script is used to make configuration to allow read, write and executable access to USB. NOTE: Run the script as system user.

Category System

(0)
Released 12/26/2017
Updated 12/26/2017
234 views
168 downloads

Block the executable and write access to USB

This script is used to Make USB devices read-only and block executables from USB. Note: Run the script as system user

Category System

(0)
Released 12/12/2017
Updated 12/12/2017
253 views
161 downloads

File operations in the endpoint using procedure

This script is used to perform file operations in the endpoint through procedures for, 1. For renaming a file or folder 2: List files from specified...

Category File Operations

(0)
Released 08/22/2017
Updated 08/22/2017
303 views
215 downloads