Enable remote server management through a GPO

Enable remote server management through a GPO

Summary : Ability to manage servers remotely is critical for ease of administration and reducing the number of open remote desktop connections. Rick Vanover shows how to deploy this configuration centrally.

When I wrote my tip on how to administer Windows Server Core systems remotely, I didn’t give much thought to automating the process.

Maybe I didn’t see myself using the new Server Manager utility as much or possibly was focused too much on possibly using Windows Firewall centrally through Group Policy for all servers on an internal network. However, when I look at my track record, I use remote server management all the time.

Remote server management is a perfect thing to automate centrally with a Group Policy Object (GPO). It’s quite easy to do, though it will go a lot better if you have Windows Firewall set up centrally within Group Policy. I’ve never used Windows Firewall on internal networks; I’ve played with ideas and configurations that may have used it, but I never pushed it out to a bunch of servers with a firewall profile for an internal network.

In most of my recent environments, especially labs, I’ve set Windows Firewall to be disabled via Group Policy. If you have that in place, this will be a rather easy addition.

To enable remote management, you need to run a winrm command. This is the running configuration for Windows Remote Management, and the associated Windows service is installed and running automatically with default installations of Windows Server 2008 R2. For one-off systems, simply running winrm quickconfig will enable remote management. If you want to apply it centrally to a number of computer accounts, a GPO is the way to go.

The command to run via a script, applied to a computer account GPO, is winrm quickconfig -q and can be saved as a PowerShell script, a .bat, or a .cmd file. This script can be run to a computer account, and it doesn’t require a user to log on to execute this script, which makes security provisioning quite easy. The computer script running winrm would go in Computer Configuration | Policies | Windows Settings | Scripts | Startup (Figure A).

Figure A

Click the image to enlarge.

 

Once the computers apply the GPO (usually on the next boot), remote connections from Server Manager are quite easy.

Rick Vanover (MCITP, MCSA, VCP, vExpert) is an IT Infrastructure Manager for a financial services organization in Columbus, Ohio. Rick has years of IT experience and focuses on virtualization, Windows-based server administration, and system hardware.

Practical tips on simplifying GPOs and OU organization

Practical tips on simplifying GPOs and OU organization

Summary: Deep paths within Active Directory can complicate Organizational Units and Group Policy Objects organization. IT pro Rick Vanover shares his approach to managing the complexity of GPOs.

 

One of the most powerful centralized administration tasks for Windows Servers and PCs is deploying Group Policy Objects (GPOs). So much so, in fact, that I could argue Group Policy is one of the best solutions Microsoft has ever provided.

While I’m very fond of GPOs and their flexibility to configure user and computer settings centrally, we can easily get out of control with conflicting rules and overly complicated implementations. I’m sure we’ve all seen a domain that has a very ugly configuration of GPOs, and let’s not even get started on the security groups.

In my Active Directory practice, I go back and forth in determining how deep the GPOs and Organizational Units (OUs) should go. I frequently don’t do more than three GPOs flowing in series with the OUs.

By series I mean one GPO in a parent OU and another GPO in a child OU, like Figure A where the green GPO applies to the parent OU and the red GPO applies to the child OU (as well as the green GPO).

Figure A 
 
Click the image to enlarge.

OUs are great for granular classification of various Active Directory objects, though I don’t really have an incredible issue going very deep (within reason) in terms of levels for this configuration. GPOs, on the other hand, are not good candidates for multiple applications for each OU as the tree goes deeper.

It is too complicated to keep the configuration rules in mind for planning and quick thinking. To help simplify how GPOs are organized, here are some tips:

  • Leverage GPO filtering by security group to make more GPOs at a higher OU instead of more GPOs in deeper OUs
  • Never add individual users or computer accounts (always use the group trick above)
  • Combine user and computer settings by role, rather than separate GPOs
  • Self-document the names of the GPOs to be intuitive to the role and location
  • Use a consistent GPO nomenclature, including renaming GPOs to get there
  • Scour around for GPOs that have one setting and consolidate it with other GPOs

GPOs are great, but the tools require organization and thought. These tips are general guidelines, and any of you keeping score will note that my screenshot from my personal lab is not exactly following all of these recommendations. It’s fine for a lab, but in production, that’s a different story.

Rick Vanover is an IT infrastructure manager for a financial services organization in Columbus, Ohio. He has years of IT experience and focuses on virtualization, Windows-based server administration and system hardware.

Also read:

 

Configure server, desktop, laptop power options with Group Policy

 

Disable Server Manager and Initial Configuration Tasks via Group Policy

 

 

 

Tips on copying and backing up Group Policy Objects

 

Tips on copying and backing up Group Policy Objects

 

Summary : Group Policy configuration is one of the most powerful aspects of Windows. Read several tips on copying and backing up Group Policy Objects, which can save admins a lot of time.

A cornerstone technology of Windows is Group Policy, which can be assigned locally (a single policy for a Windows system) or managed centrally in an Active Directory domain. When leveraging Active Directory, a number of Group Policy Objects (GPOs) can be assigned to computers and users.

I believe that GPOs are one of the most critical and powerful management tools available; that said, GPOs can also be complicated to work with. For instance, if you need to recreate a GPO, it may require a tedious maneuvering of screens to verify settings from one GPO to another. Fortunately, the Group Policy Management console allows us to do a few things to tackle this task efficiently. The first is a centralized list of GPOs for the entire domain, regardless of the Organizational Unit (OU) where they reside. This panel is shown in Figure A.

Figure A 
 
Click the image to enlarge.

This console serves a number of purposes, but one that irritates me is nomenclature. Figure A is a screenshot of my personal lab, and I have not done a good job in naming the GPOs. Ideally, a GPO is self-documenting so that it tells you: what it does, where it lives, and who it applies to (users, groups, computers, etc.).

Please excuse my lab’s sloppy nomenclature, and let’s focus on the ability to copy and back up a GPO in this console. When we right-click the individual GPO, a very powerful context menu appears. (Note: This menu is not available where the GPO resides in terms of the OUs listed above; it is only available in the Group Policy Objects section.) This context menu is shown in Figure B.

Figure B 
 
Click the image to enlarge.

The copy and backup options are the two tasks that can really save administrators a lot of time. The copy operation will take an existing GPO, and allow you to paste it into the Group Policy Objects section. This may not be intuitive, and Figure C shows where it becomes an option.

Figure C 
 
Click the image to enlarge.

A new GPO is created as a copy of the source GPO, and it can be linked to an OU later. This can be very helpful when a GPO is built over time, but is not ready to be applied to the destination OU.

The ability to back up a GPO exports the GPO to an .XML file, which can be archived and used to recover a previous version of a GPO. There also is an option to back up all GPOs, which will make a large .XML repository in a specified folder path. In both situations, the ability to have the GPOs on outside of the domain controller can be attractive. While backup solutions can protect down to this level, simply for a quick check by hand, the backup options within the Group Policy Management console can be of great aid. Viewing the .XML file isn’t very helpful, but can be an easy way to spot-check settings (Figure D).

Figure D 
 
Click the image to enlarge.

Rick Vanover is an IT infrastructure manager for a financial services organization in Columbus, Ohio. He has years of IT experience and focuses on virtualization, Windows-based server administration and system hardware.

 

How to Find a Lost, Missing, Hidden or Removed Network Card (NIC) or Other Device and Even Remove it

How to Find a Lost, Missing, Hidden or Removed Network Card (NIC) or Other Device and Even Remove it

In a scenario where you have physically removed hardware from a machine you can no longer see it in device manager.  This does not mean that it is gone.  Evidence of that is, if for example you had a network card that had a Static IP address set and you remove the card and add a new one then try to set the IP address to the same as the old NIC you will get an error message. The error might look something like “The IP address 192.168.30.100 you have entered for this network adapter is already assigned to another adapter (Microsoft Virtual machine Bus Network Adapter #3) which is no longer present in the computer.  If the same address is assigned to both adapters and they both become active, only one of them will use this address.  This may result in incorrect system configuration”.  In Windows Server 2008 R2 and Windows 7 it actually gives you an opportunity to “remove the static IP configuration for the absent adapter”. If you say Yes, this will eliminate the IP conflict problem but does not solve the problem of the adapter still being present in the machine.  In older versions of the OS, it was even worse because every time you go into network properties it gives you an error message.  Another way this comes up is if you move a virtual machine from one host to another.  Like in the case of moving from Virtual Server 2005 R2 to Hyper-V or perhaps you are moving from one Hyper-V machine to another but you did not do an export, you just moved the VHD’s and created a new machine. 

IP Address Already Assigned to another adapter

 

Getting rid of these old devices is actually very simple.  Well, it is simple if you know how 😉
Before you proceed, I recommend that you confirm that you have a good backup.  I have never had a problem with this but hey, it is your server not mine.
Description What to do
Step 1: You need to run a command prompt so you can set an environment variable prior to opening the Device Manager 
This will bring up a command window
Click Start – Type the following command and then press ENTER 

cmd
Step 2: We have the command window open.  We now need to set the variable (that is the “set” line and then with the variable set, we need to run Device Manager.  The file name for the Device Manager snap-in is devmgmt.msc.  The first line will not appear to do anything but it is setting the environment for next step.  The second command will actually open the Device Manager but it will be in a “special” mode which allows you to show devices that no longer exists.

Type the following commands pressing ENTER after each line

set devmgr_show_nonpresent_devices=1 
devmgmt.msc
Step 3: Now all we have to do is show hidden devices and you will be able to access the devices that are not present in the machine.  This will also turn a checkbox on in front of the Show Hidden Devices menu option. In this Special Device Manager Window; on the menu, click View then Show Hidden Devices
Step 4: Now you can just go find the adapter or device that is missing and delete it!  
Expand the network adapter (or whatever category of device) and look for the device that needs to be removed.  The error message that you got should tell you the “name” of the device so you just have to go find that named device.  You may also notice while you are there that the icon for the “non-present” or missing device is slightly subdued so that will make it easier to find it if you have many devices in a category. 

See screen shot below

Expand the network adapter (or whatever category of device) and look for the device that needs to be removed. 

Right-Click the Device and select Uninstall

Easy!!!  
It IS easy if you know how.  Now you know how!!!
On the Warning “You are about to uninstall this device from your computer” just click OK
IMPORTANT Note: Lastly, if there are other devices that are subdued / hidden, please to not just go in and delete them all.  If you do, you are asking for trouble.  Just get rid of the things that you know are gone for good and are not coming back!  If you are not absolutely positive, do not remove it.  If you do anyway, better have that backup handy 🙂 

Also, remember, if you change too much stuff at once, you may have to reactivate Windows

Restore from Backup… Just kidding 🙂

DeviceManagerWithMissingAdapterAndCmdScreen

What I learned about the RELOG utility

What I learned today – the RELOG utility

At the Chicago SQL User group meeting on 1/14/2010 John Jones of NetApp gave a talk on storage performance. it was an informative meeting. For instance, did you know that the latency of a 15K Fibre Channel drive is the same as a 15K SAS drive? But SAS drives are smaller; NetApp is able to put 24 drives in a 4U rack.

During the presentation, John mentioned the RELOG utility and how it can convert a perfmon counter log from the default .blg extension to a .csv file. I’d never heard of RELOG before so I did a little reading up on it. I googled RELOG and found lots of information. The sources I used for this article were Ask The Performance TeamMicrosoft TechNet, and this blog post at My Torn Data Pages. And I found that RELOG can do much more than just reformat a file. It can also filter the original counter log to show data from a sample time slice or only pull out certain counters.

RELOG is a command line utility. It’s available in Windows XP or higher machines, and it’s located in the \system32 directory. If you don’t have it you can get from Microsoft downloads. Also the utility isn’t just for SQL counters. you can run it against any perfmon counter file.

Here’s a list of the switches that RELOG uses:

image

In my examples I’m using a benchmark counter log I capture from our production servers. It’s already saved as a .csv file so I don’t need to convert it but I certainly could if I needed to. Also I’m typing RELOG in caps, though it’s not necessary.

Using RELOG with just the filename of the counter log will give you the start and end time of the capture plus the number of samples in the file…

image 

…and using the –q switch will list the counters used in the file. image

Adding the –o switch and specifying a file name will output the counter names to a separate file (RELOG SQL1_20100106.csv –q –o counters.txt).

So now that I know the times and the counters in my baseline, I can filter for the counters between 9 and 10 AM on 1/5(RELOG SQL1_20100106.csv -b “1/5/2010 9:00:00AM” -e “1/5/2010 10:00:00 AM” –f csv -o SQL1_filtered.csv). I can see that I’ve filtered out most of the sampling and now I’ve got the 237 samples I took between 9 and 10.

image

And I can also filter by individual counters.Let’s say I want to see the transactions per second against a specific database between 9 and 10 AM: RELOG SQL1_20100106.csv -b “1/5/2010 9:00:00AM” -e “1/5/2010 10:00:00 AM” -c “\MSSQL$MISDB:Databases(tempdb)\Transactions/sec” –f csv -o SQL1_filtered2.csv. Running this, I see the same 237 samples returned, but if I open the file, I’ll just see the counters I asked for:

image

I can also use a wild card to see the transactions/sec counters against all databases: RELOG SQL1_20100106.csv -b “1/5/2010 9:00:00AM” -e “1/5/2010 10:00:00 AM” -c “\MSSQL$MISDB:Databases(*)\Transactions/sec” –f csv -o SQL1_filtered3.csv

I haven’t tried to save the results to a database yet. According to My Torn Data Pages, there’s a problem with the syntax cited by Microsoft TechNet. I want to test both scenarios, using a DSN and the Native Client.

 

 

Using the RELOG utility – Part 2

In my previous post (What I Learned Today – the RELOG utility) I discussed what I discovered the first time I learned about the RELOG utility. In this post I’ll continue with my education. Again, I’ve used Ask The Performance TeamMicrosoft TechNet, and this blog post at My Torn Data Pages as my references.

I found that I could output a list of counters from a perfmon counter log using RELOG (RELOG counterfilename –q –o counterfilename). But you can take that a step further. Simply edit your counter file and delete the counters you don’t want. Then rerun RELOG and use the –cf switch to import a list of counters to filter for. My examples use the same counter log file as before:

RELOG SQL1_20100106.csv – q –o counters.txt — to get my list of counters

RELOG SQL1_20100106.csv –cf counters.txt –c csv –o filtered1.csv —  to filter by those counters after editing the counters.txt file.

And of course I can still filter by time with the –b and –e switches:

RELOG SQL1_20100106.csv –cf counters.txt -b “1/5/2010 9:00:00AM” -e “1/5/2010 10:00:00 AM” –f csv -o filtered2.csv

You can save your settings in a config file…

[cf] 
counters.txt 
[b] 
1/5/2010 9:00:00AM 
[e] 
1/5/2010 10:00:00AM 
[f] 
csv 
[o] 
configresults.csv

…and use just the –config switch 
RELOG SQL1_20100106.csv –config relogconfig.txt

image

Now there’s plenty of ways to filter your perfmon files. The last way is to save the results in a SQL database.

Inserting into a SQL database

The –o switch specifies where to output the results of a perfmon counter log file. You have the option to export to a flat file, which I’ve been doing so far, or directly to a database. And that’s simple. First, create a DSN pointing to the server and database of your choice. Stan Segers, whose blog I’ve been referencing atMy Torn Data Pages, is correct in noting that you need to use the SQL Driver. Like Stan, I wasn’t able to connect if I chose the SQL Native Client. Then, when you use the –o switch, specify SQL: and the name of your DSN. In the example my counter name is Counters.

RELOG SQL1_20100106.csv –cf counters.txt –o:SQL:Counters 

RELOG will create these 3 tables:

clip_image001

The tables are created the first time you run RELOG to that database. The utility generates a GUID for each run. Each time you run it it will insert records into the CounterDetails and CounterData tables. But it won’t insert into or update the DisplayToID table. So to keep a record of each time you run the utility, specify a different DisplayString. Everything after the exclamation point (!) is the string.  

RELOG SQL1_20100106.csv –cf counters.txt –o:SQL:Counters!DCICHISQL1 

Now that all my performance counters are in the database, I can easily query against them.clip_image002  

I hope I’ve shown you ways to use the RELOG utility. As you can see, it’s pretty powerful.       

Act like a Boss

You’ll need a commanding presence if you want to lead, says Jeffrey Pfeffer, Ph.D., author of Power: Why Some People Have It–and Others Don’t. Here’s how to beef up your image.

Use your voice
Speak in a loud, strong tone that commands attention. “Interrupting can actually be good sometimes,” Pfeffer says. But don’t let people barge in while you’re speaking; this suggests a lack of control.

Stand tall
When addressing a group, keep a straight posture. Don’t hunch or shrink inward. Elevated physical stature and open body language make you seem more powerful, says Roderick Kramer, Ph.D., of Stanford University.

Add flair
To set yourself apart, wear clothing that’s a bit showier than the norm. “You need to wear something that makes you stand out,” Pfeffer says. This can be a touch as subtle as a handkerchief in your pocket.

Take up space
To magnify the power of your presence in smaller groups, Pfeffer says, try to consume more space than everyone else around you. “Spread your arms and legs,” he says. “Expand.” It’ll feel awkward, but you’ll notice results.

Use your hands
Injecting emotion into a speech is effective, as long as your effort seems natural. “Standing still is not good for a leader hoping to engage others and influence their thinking,” Kramer says.

http://www.menshealth.com/fiscally-fit-man/boss

4 rules to building wealth

 

Many years ago, when I first started filming Win Ben Stein’s Money, my makeup artist was named Suzie. As Suzie combed, straightened, and powdered, I was often reading the Wall Street Journal or Barron’s or talking on the phone with my pal Phil DeMuth about investments. At least once a week, Suzie would set her jaw firmly and say, “I’ve got to learn all about this investing thing.”

I never knew quite how to respond, because it’s impossible to know all about investing. No one makes the right decisions every time—or even every year. Bill Miller, the brilliant manager of Legg Mason Value Trust, had beaten the S&P for 15 straight years, but recently lagged well behind it. Warren Buffett, probably the smartest investor of our time, could have pocketed billions by selling Coca-Cola when it was in the 80s and instead rode it down to the 40s. Brilliant hedge-fund traders, who typically make hundreds of millions a year, suddenly come up short and lose billions—and their jobs. It doesn’t happen every day, but it happens.

I’ll bet you know the feeling. Of watching a stock you sold triple in value in the years that followed. Of holding onto a stock you bought for, say, $15 that’s now selling for pennies. It’s happened to me, too. A lot. Which is why, over the years, I’ve developed a few simple rules to invest by. I consider them the Zen of investing, because if you work at them, they eventually become instinctive. You won’t have to think about them. You’ll just abide by them.

 

RULE 1: Instead of trying to time the market, try to tie it.

One day, I was lucky enough to meet Warren Buffett for dinner at a curious restaurant in Omaha called Piccolo Pete’s. As we settled in at our table, near the disco ball, I asked him for the best piece of advice he could give an ordinary investor. With a slight laugh, Mr. Buffett said, “Know your limitations.” The average investor, he explained, isn’t able to pick stocks that will outperform the market. The managers the average investor hires aren’t, either.

So unless you’re a top sensei yourself, don’t try to beat the market. Instead, cast the widest net possible using index funds. Buy a fund that tracks the S&P 500 or maybe even the entire U.S. stock market.

If you’re able to lock in the gains of the market—roughly 10 percent a year, historically—you will have accomplished a vast amount. If you want to duplicate the creativity of the master, Buffett, buy shares of his company, Berkshire Hathaway. It’s not a low-priced stock, but it has averaged a 25 percent return over the past quarter century. And its broad array of holdings makes it as diversified as some mutual funds. You are strongly cautioned that Berkshire Hathaway has had down years, and even long stretches of down years. And my pal Warren won’t be there forever.

So if you’re renting and considering the purchase of a home, or had thought about investing in rental property of your own, favorable deals are out there for the making.

And now for the disclaimer: You may be harder-pressed to find cheap deals in cities where growth is strong. All real estate markets are local, so be sure to do the research for your geographic region.

 

RULE 2: When you’re tempted to sell, buy.

When stocks are in the tank, your gut will tell you to bail, to move your money into less-volatile investments like bonds or money-market funds. It’s human nature. It’s also a huge mistake. When the market plunges—over days, months, and years—there are opportunities to make real money.

Buffett explained it years ago in an annual report: Whether a stock is priced low or high, he said, it’s ownership in the same company. So when the stock market puts a company on sale, that’s the best time to buy.

The inverse is also true: When the market is reaching new highs, you’ll be tempted to jump in with both feet. Don’t. This isn’t necessarily a time to sell, but assuming you’re investing on your own in taxable accounts, you’ll want to be buying less.

Important note: If you do all your investing within a tax-sheltered 401(k) or IRA, maintain or increase your contribution level no matter which way the market’s moving.

 

RULE 3: Collect sectors.

Your best friend as an investor is time. Your portfolio needs to grow slowly and sensibly. This means, of course, that you need to start saving early. For you stock stalwarts, keep in mind that the historical trend has been for the overall market to perform well in an election year, particularly in the latter half.

But you have another best friend, one you don’t spend a whole lot of time thinking about: diversification. You don’t want to be thrown for a huge loss by drops in any one sector. Make sure your holdings cover the entire investment field, so if “energy” collapses, you might be protected by gains in, for example, “financial services” or “health care.” This is another great reason to invest in an S&P 500 index fund: It comprises stocks from virtually every sector.

You need to be diversified by global region, as well. Mostly because of our country’s immense trade deficit, the dollar is likely to continue falling for a long, long time. That means that long term you can make money in foreign stocks and bonds denominated in local currencies, because your euros or yuan, for instance, will buy more dollars when you sell. Especially consider rapidly developing countries like China, India, and Russia—they’re likely to do well over the long run, although the ride is sure to be bumpy. Investing in these emerging markets is a great way to diversify your U.S.-weighted portfolio.

Luckily, there’s an index fund for just about everything, including the emerging regions of the world. Your ability to invest in Singapore, Brazil, and other countries from the comfort of your PC is a heaven-sent gift to the average investor. Give thanks. And buy, buy, buy.

 

RULE 4: Invest in yourself (involuntarily).

Chances are you’re putting away money for retirement automatically; your employer takes it out of your paycheck, pretax. If you ever want to amass a lot of liquid assets—that is, money you can spend today if you want—you need to set your savings to automatic, as well.

You can sign up for automatic savings with your bank and broker online. Have a specific amount taken from your checking account each month and put into an index fund, low-fee variable annuity, or diversified mutual fund. Arrange for a second deduction to be put into a foreign index fund. “Fire and forget,” as they say about the military’s smart weapons.

If you think you can beat the market consistently, good luck to you. It took decades—yes, decades—for these lessons to sink into my fuzzy brain. If it takes you only a few years, you’ll be doing great.

Suzie, I hope you’re listening.


http://www.menshealth.com/fiscally-fit-man/4-wealth-building-rules

Enable TLS 1.1 and TLS 1.2 on Windows Server 2008 R2 and IIS 7.5 – AdminHorror

Enable TLS 1.1 and TLS 1.2 on Windows Server 2008 R2 and IIS 7.5.

Enable TLS 1.1 and TLS 1.2 on Windows Server 2008 R2 and IIS 7.5

  1. Please backup your registry.
  2. Start the registry editor (regedit)
  3. Browse to the following registry key:
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols
  4. Add the following keys: 
    TLS 1.1 and TLS 1.2
  5. Within each of the TLS 1.1 and TLS 1.2 keys (they look like folders), add these keys:Client and Server
  6. Within each of the Client and Server keys, create the following DWORD values:
    • DisabledByDefault with a value of 0
    • Enabled with a value of 1
  7. Reboot the server.

You should now have registry settings that look like:
TLS 1.2 Registry Settings

I tested the new settings by configuring Internet Explorer 9 to only use TLS 1.2 and connected to a secure page on one of the websites on my server. Here is where you configure IE9 to do this:
IE9 SSL/TLS Settings

Do your customers a favor (and thus yourself) by allowing them to use a more secure version of SSL/TLS on your website. Configure your IIS server to use TLS 1.1 and TLS 1.2. Hopefully all web browsers will support these versions in the very-near future – but at least Internet Explorer 9 already does.

PowerShell Code Repository – Get-FailingDrive

PowerShell Code Repository – Get-FailingDrive

Get-FailingDrive works with SMART to determine if your hard drive may be failing. If it determines that the hard drive might be failing, a warning is displayed along with a collection of information about the potentially failing drive.

#.SYNOPSIS

Checks for any potentially failing drives and reports back drive information.

.DESCRIPTION

Checks for any potentially failing drives and reports back drive information. This only works

against local hard drives using SMART technology. Reason values and their meanings can be found

here: http://en.wikipedia.org/wiki/S.M.A.R.T#Known_ATA_S.M.A.R.T._attributes

.PARAMETER Computer

Remote or local computer to check for possible failed hard drive.

.PARAMETER Credential

Provide alternate credential to perform query.

.NOTES

Author: Boe Prox

Version: 1.0

http://learn-powershell.net

 

.EXAMPLE

Get-FailingDrive

WARNING: ST9320320AS ATA Device may fail!

MediaType       : Fixed hard disk media

InterFace       : IDE

DriveName       : ST9320320AS ATA Device

Reason          : 1

SerialNumber    : 202020202020202020202020533531584e5a4d50

FailureImminent : True

Description

———–

Command ran against the local computer to check for potential failed hard drive.

#