Flylib.com
List of Tables
Previous page
Table of content
Next page
Chapter 1: The Windows WMI Providers Discovery
Table 1.1: The Most Important WMI Providers under the Windows Platforms with Their Capabilities
Chapter 2: The Win32 Providers
Table 2.1: The Win32 Providers Capabilities
Table 2.2: The Input Devices Classes
Table 2.3: The Mass Storage Classes
Table 2.4: Motherboard, Controller, and Port Classes
Table 2.5: The Networking Device Classes
Table 2.6: The Connection Status Values
Table 2.7: The Win32_NetworkAdapterConfiguration Methods
Table 2.8: The Power Device Classes
Table 2.9: The Telephony Classes
Table 2.10: The Printing Device Classes
Table 2.11: The Video and Monitor Classes
Table 2.12: The COM Component Classes
Table 2.13: The Desktop Classes
Table 2.14: The Driver Classes
Table 2.15: The File System Classes
Table 2.16: The CIM_LogicalFile Methods
Table 2.17: The Page File Classes
Table 2.18: The Networking Classes
Table 2.19: The Operating System Settings Classes
Table 2.20: The DomainRole property of the Win32_ComputerSystem Class
Table 2.21: The Join and Unjoin Options
Table 2.22: The Operating System File Dump Values
Table 2.23: The Operating System Shutdown Values
Table 2.24: The Process Classes
Table 2.25: The Job Scheduler Classes
Table 2.26: The Service Classes
Table 2.27: The ServiceType, ErrorControl, and StartMode Parameters for a Windows Service Creation
Table 2.28: The Share Classes
Table 2.29: The "ShareType" Values
Table 2.30: The Start Menu Classes
Table 2.31: The User Account Classes
Chapter 3: The WMI Providers
Table 3.1: The WBEM Provider Classes
Table 3.2: The WBEM Provider Capabilities
Table 3.3: The NT Event Log Providers Capabilities
Table 3.4: The NT Event Log Providers Classes
Table 3.5: The OverWritePolicy and OverwriteOutDated Property Values
Table 3.6: The Registry Providers Capabilities
Table 3.7: The Registry Providers Classes
Table 3.8: The StdRegProv Methods
Table 3.9: The Session Provider Capabilities
Table 3.10: The Session Provider Classes
Table 3.11: The Kernel Job Object Providers Capabilities
Table 3.12: The Kernel Job Object Classes
Table 3.13: The TrustMon Provider Capabilities
Table 3.14: The TrustMon Provider Classes
Table 3.15: The TrustMon Check Levels
Table 3.16: The Windows Proxy Providers Capabilities
Table 3.17: The Windows Product Activation Providers Capabilities
Table 3.18: The Windows Product Activation Providers Classes
Table 3.19: The Windows Product Activation Providers Methods
Table 3.20: The Windows Installer Provider
Table 3.21: The Windows Installer WMI Classes
Table 3.22: The Win32_Product Class Methods
Table 3.23: The RSOP Providers
Table 3.24: The RSOP Classes and Their Methods
Table 3.25: The RSOP WMI Classes
Table 3.26: The Status Property of the RSOP_SecuritySettings Class
Table 3.27: The Logging Mode and Planning Mode Flag Values
Table 3.28: The Root\Policy Classes
Table 3.29: The SystemRestore Providers Capabilities
Table 3.30: The SystemRestore Providers Classes
Table 3.31: The RestorePointType Parameter
Table 3.32: The EventType Parameter
Table 3.33: The SystemRestoreConfig Properties
Table 3.34: The Win32ClockProvider Providers Capabilities
Table 3.35: The Win32ClockProvider Classes
Table 3.36: The Power Management Providers Capabilities
Table 3.37: The Power Management Event Type Values
Table 3.38: The Shutdown Providers Capabilities
Table 3.39: The Configuration Change Providers Capabilities
Table 3.40: The EventType Property Meaning
Table 3.41: The Volume Change Providers Capabilities
Table 3.42: The Disk Quota Providers Capabilities
Table 3.43: The Disk Quota Provider Classes
Table 3.44: The DFS Providers Capabilities
Table 3.45: The DFS Provider Classes
Table 3.46: The State Property Meaning of the Win32_DFSNode and Win32_Target Classes
Table 3.47: The Shadow Copy Providers Capabilities
Table 3.48: The Shadow Copy Providers Classes
Table 3.49: The Active Directory Providers Capabilities
Table 3.50: The Active Directory/WMI Syntax Mapping
Table 3.51: The Active Directory Providers Classes
Table 3.52: The Active FSMO Roles and Their Location in Active Directory
Table 3.53: Enabling the Trace Logging of a WMI Provider
Table 3.54: The Active Directory Replication Providers Capabilities
Table 3.55: The Active Directory Replication Providers Classes
Table 3.56: The ExecuteKCC Method Parameters
Table 3.57: The SyncNamingContext Method Parameters
Table 3.58: The Ping Providers Capabilities
Table 3.59: The Network Diagnostic Providers Capabilities
Table 3.60: The IP routing providers capabilities
Table 3.61: The IP routing Providers Classes
Table 3.62: The DNS Providers Capabilities
Table 3.63: The DNS Providers Classes
Table 3.64: Some DNS Server Property Values
Table 3.65: Some Zone Property Values
Table 3.66: The DNS Record Class Values
Table 3.67: The SNMP Providers Capabilities
Table 3.68: The SNMP Classes Available in the Root\SNMP\SMIR Namespaces
Table 3.69: The Proxy Namespace Qualifiers to Define SNMP Transport Characteristics
Table 3.70: The SMI2SMIR.Exe Command-Line Parameters
Table 3.71: The SNMP Debugging Output Level
Table 3.72: The High-Performance Providers Capabilities
Table 3.73: The Win32_PerfRawData Classes
Table 3.74: The Win32_PerfFormattedData Classes
Table 3.75: The __ADAPStatus System Class Properties
Table 3.76: The Win32_PerfFormattedData_Tcpip_NetworkInterface Properties
Table 3.77: The Miscellaneous Cooking Type
Table 3.78: The Performance Monitoring Providers Capabilities
Table 3.79: The View Providers Capabilities
Table 3.80: The View Provider Qualifiers
Table 3.81: The WMI Forwarding Consumer and Forwarding Event Providers Capabilities
Table 3.82: The WMI Forwarding Consumer and Forwarding Event Providers Classes
Table 3.83: The StatusCode Property Returned Values
Table 3.84: The Correlation WMI Providers
Chapter 4: WMI Security Scripting
Table 4.1: The WMI Privileges Required for Some Classes, Properties, or Methods
Table 4.2: The Default Right Settings on the WMI Root Namespace
Table 4.3: The WMI and ADSI Security Descriptor Exposed Methods and Properties
Table 4.4: The Security Descriptor Access Methods with their Representations
Table 4.5: The Security Provider Capabilities
Table 4.6: The Security Providers Classes
Table 4.7: The ADsSecurityUtility Constants
Table 4.8: The Security Descriptor Control Flags Values
Table 4.9: The Security Descriptor Inheritance Flags
Table 4.10: The Security Descriptor Inheritance Flags (Active Directory)
Table 4.11: The Files and Folders ACE AccessMask Values
Table 4.12: The Files and Folders ACE Flags Values
Table 4.13: The File System Share ACE AccessMask Values
Table 4.14: The Active Directory Object ACE AccessMask Values—Standard View
Table 4.15: The Active Directory Object ACE AccessMask Values—Advanced View
Table 4.16: The Active Directory Objects ACE Flags Values
Table 4.17: Extended Rights Available in Active Directory under Windows Server 2003 (Exchange 2000 Extended Rights Included)
Table 4.18: The schemaIDGUID GUID Number with iTs Class Names
Table 4.19: Summary of the GUID Number Origins for the ACE ObjectType Property
Table 4.20: The Exchange 2000 Mailbox A CE AccessMask Values
Table 4.21: The Exchange 2000 Mailbox ACE Flags Values
Table 4.22: The Registry Key ACE AccessMask Values
Table 4.23: The Registry Key ACE Flags Values
Table 4.24: The CIM Repository Namespace Key ACE AccessMask Values
Table 4.25: The CIM Repository Namespace Key ACE Flags Values
Table 4.26: The ChangeSecurityPermissionsEx Method Flags for the Security Descriptor Recursive Update
Chapter 5: The Optional Windows Components and Application WMI Providers
Table 5.1: The Network Load-Balancing Providers Capabilities
Table 5.2: The Network Load-Balancing Providers Classes
Table 5.3: The NlbsNic Class Static Methods
Table 5.4: The Cluster Providers Capabilities
Table 5.5: The Cluster Providers Classes
Table 5.6: The Terminal Server Providers Capabilities
Table 5.7: The Terminal Server Providers Classes
Table 5.8: The Win32_TerminalServiceSetting Customization Values
Table 5.9: The Terminal Services Remote Control Configuration Values
Table 5.10: The Terminal Services Encryption and Authentication Level Values
Table 5.11: The Terminal Services Default Client Settings Values
Table 5.12: The Terminal Services Connection Environment Policy Settings
Table 5.13: The Terminal Services Connection Logon Values
Table 5.14: The Terminal Services Connection Session Values
Table 5.15: The Terminal Services Permission Values and Masks
Table 5.16: The WDM Providers Capabilities
Table 5.17: The WDM Providers Classes
Table 5.18: The Internet Information Server Provider
Table 5.19: The Exchange 2000 WMI Providers
Table 5.20: The ExchangeServerState Class Properties
Table 5.21: The ExchangeLink Properties
Table 5.22: The ExchangeQueue Properties
Table 5.23: The ExchangeClusterResource Properties
Table 5.24: The Exchange_MessageTrackingEntry Class Properties
Table 5.25: The Exchange_MessageTrackingEntry EntryType Property Meaning
Table 5.26: The Exchange_DSAccessDC Class Properties
Table 5.27: The WMI SQL Provider Capabilities
Table 5.28: The WMI SQL Classes
Table 5.29: The Office Provider Capabilities
Table 5.30: The Office 2000 and Office XP Classes
Table 5.31: The Internet Explorer Provider Capabilities
Table 5.32: The Internet Explorer WMI Classes
Table 5.33: Insight SNMP MIB Files
Table 5.34: Insight Management Agents WMI Classes Created from the MIB Files
Table 5.35: The Insight Management Agents Performance Classes
Table 5.36: The OM_Alert Extrinsic Event Class with the MOM SP1 Classes
Table 5.37: The HP OpenView Providers Capabilities
Table 5.38: The OV_Message Class
Table 5.39: The OV_Message and OV_ManagedNode Property Value Meanings
Previous page
Table of content
Next page
Leveraging WMI Scripting: Using Windows Management Instrumentation to Solve Windows Management Problems (HP Technologies)
ISBN: 1555582990
EAN: 2147483647
Year: 2003
Pages: 82
Authors:
Alain Lissoir
BUY ON AMAZON
The .NET Developers Guide to Directory Services Programming
System.DirectoryServices.ActiveDirectory Overview
Returning Many Results with Paged Searches
Understanding the ADSI Property Cache
Foreign Security Principals
LDP
Oracle Developer Forms Techniques
Special Tips for List Items
Sharing a Record Group Across Forms
Object-oriented Methods in Forms
Encapsulation
Programmatically Canceling a Query
Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Input Validation & More
Enforcing Strict Conformance to the C++ Standard
Performing Date and Time Arithmetic
Storing Pointers in a vector
Computing the Distance Between Two Vectors
Using Pointers to Class Members
Systematic Software Testing (Artech House Computer Library)
An Overview of the Testing Process
The Test Manager
Improving the Testing Process
Appendix A Glossary of Terms
Appendix E Simplified Unit Test Plan
HTI+ Home Technology Integrator & CEDIA Installer I All-In-One Exam Guide
Designing and Installing a Computer Network
Troubleshooting and Maintaining Lighting Control Systems
Security System Basics
Programming
Appendix A Home Technology Project Management
Digital Character Animation 3 (No. 3)
Conclusion
Understanding Motion
Adding Personality to a Walk
Four-Legged Mammals
Acting and the Body
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies