Index_S


S

Scheduled Task icon, removing with KiXtart, 132-133
SCHTASKS, creating, listing, and deleting tasks with, 357
Scripting methods , understanding, 34-35
Scripts
creating, 1-2
defining, 1
limitations of, 2
versus logon scripts, 311
versus programs, 1-2
running in PowerQuest Drive Image Pro, 30-31
understanding, 1-2
using in Symantec's Norton Ghost, 32
when to use, 2
SDKs, 172-173
SECEDIT utility
fixing Windows 2000 upgrade security with, 269-270
fixing Windows NT security with, 269-270
group policy, reapplying with, 269
security analysis, using with, 269
security settings, explaining, 270-271
Security Template, applying with, 269-270
using, 268-271
Security
logs, understanding, 281-282
managing through Active Directory Services Interface, 272-277
Microsoft Windows 2000, fixing upgrade with SECEDIT on, 270
password length, setting, 273
priorities, list of, 261-262
scripts, list of, 278
templates in Microsoft Security Configuration and Analysis, types of, 260-261
Windows NT, fixing with SECEDIT on, 270
Services
deleting with Windows Management Instrumentation, 189-190
installing from the command line, 155
listing on a remote system, 177
listing with Windows Management Instrumentation, 185-186
managing on a remote system, 177-178
parameters for listing, 177
parameters for managing, 178
pausing from the command line, 156
pausing with Windows Management Instrumentation, 188-189
resuming from the command line, 156
resuming with Windows Management Instrumentation, 189
starting from the command line, 156
starting with Windows Management Instrumentation, 186-187
stopping from the command line, 156-157
stopping with Windows Management Instrumentation, 187-188
uninstalling from the command line, 155
Shares
adding from the command line, 159
copying permissions from the command line, 160
creating with Active Directory Services Interface, 214
creating with permissions from the command line, 160
creating with permissions on a remote system, 176
creating with Windows Management Instrumentation, 180-181
deleting with Active Directory Services Interface, 214-215
deleting with Windows Management Instrumentation, 181-182
listing from the command line, 159
listing on a remote system, 176
listing with Active Directory Services Interface, 213-214
listing with Windows Management Instrumentation, 179-180
removing from the command line, 159
Shell automation
computers, suspending, 109
Context menu, accessing, 111-112
control panel applets, running, 108
Date and Time properties page, accessing, 109
file details, obtaining, 110
files, copying and moving, 110
Find Files properties page, accessing, 109
folder details, obtaining, 110
Folder Name Space, connecting to, 109-110
folders, browsing, 105-106
folders, copying, 110-111
folders, exploring, 107-108
folders, moving, 110-111
folders, opening, 108
PCs, ejecting, 109
Start menu, refreshing, 109
Start menu properties page, accessing, 109
system dialog boxes, calling, 108
system windows, controlling, 105-106
Taskbar properties page, accessing, 109
Shell scripting
alerts, sending, 297-299
BIOS, collecting information on with, 233-234
collecting information on with, 233-236
commands, list of, 145-146
defining, 2
dialog boxes, using with, 145-146
event logs, writing to, 286-288
example, 3-4
file and folder attributes, displaying, setting, or renaming, 57
file system, manipulating, 55-58
file versions, determining, 56
files and directories, replicating, 57-58
files and folders, compressing, 58
files depending on extensions, deleting, 55
folders and subfolders , deleting, 56
limitations of, 4
logon scripts, creating, 316-324
logs, using, 285-288
media files, playing from the command line, 369
memory, collecting information about, 234-235
NTBackup, running with, 347
output, suppressing, 25
processors, collecting information about, 235-263
program files, updating, 56
registry, modifying, 124-129
registry, modifying with REGINI.EXE, 128-129
registry, querying, 125-126
registry, searching, 126
registry keys, backing up, 125
registry keys, deleting with REGEDIT, 127-128
registry keys, restoring, 125
shortcuts, creating, 149-150
SRVINFO utility, collecting information with, 233
text files, appending, 57
text logs, writing to, 285
understanding, 2-4
user input, accepting, 147-148
when to use, 4
Windows 2000, customizing, 126-127
Windows 2003, customizing, 126-127
Windows XP, customizing, 126-127
Shortcuts
broken, deleting, 152-153
creating with KiXtart, 150-151
creating with shell scripting, 149-150
creating with Windows Script Host, 151-152
uninstall, moving to Central Directory, 153-154
working with, 149-153
SHUTDOWN.EXE, list of supported parameters, 161
Silent installations
of Active Directory Services Interface, 42
of Internet Explorer, 43
of LiveUpdate, 43
of Microsoft Data Access Components, 40-41
of Microsoft Office 2000/XP, 47
of .NET framework, 40
of Norton Antivirus 2003, 45
of pcANYWHERE 11.0, 45
of Windows 2000 Resource Kit, 45-46
of Windows 2000 Service Pack, 41
of Windows 2000 XP Service Pack, 41
of Windows Management Instrumentations, 41-42
of Windows XP Service Pack, 41
of WinZip 8.1 SR-1, 43-45
SMS, 231
Software
installed, listing with Windows Management Instrumentation, 254-255
installing with Windows Management Instrumentation, 195-196
uninstalling with Windows Management Instrumentation, 196-197
Software developer's kits (SDKs), Windows Management Instrumentation and, 172-173
Sound cards, collecting information on with Windows Management Instrumentation, 252
SpecialFolder property, list of available folders, 141-142
SRC parameters, 20
SRVINFO, collecting information on with shell scripting, 233
Start menu
controlling, 153-155
properties page, accessing with shell automation, 109
refreshing with shell automation, 109
Static IP addresses, assigning with Windows Management Instrumentation, 193-194
Sub procedures
structure of, 10-11
understanding, 10-11
Subfolders
accessing, 64
deleting, 56, 73
Subroutines
defining, 10
types of, 10-11
understanding, 10-11
Switches
combining, 22-23
using in Symantec's Norton Ghost, 32
Symantec's Norton Antivirus. See Norton Antivirus.
Symantec's Norton Ghost
DST parameters, 20
image files, creating and storing, 19
MODE parameters, 19-20
scripting, 31-32
SRC parameters, 20
understanding, 19
Web site, 15, 19
System dialog boxes, calling with shell automation, 108
System events, calling, 161-163
System information utility, understanding, 230-231
System information utility, using in Windows, 230-231
System logs, understanding, 281-282
System Manager Server (SMS), understanding, 231
System Restore
enabling/disabling through Windows Management Improvements, 390
points, creating through Windows Management Improvements, 390
points, listing through Windows Management Improvements, 391-392
scripting through Windows Management Improvements, 390-393
understanding, 387
System Restore Points
creating through Windows Management Improvements, 390
listing all through Windows Management Improvements, 391-392
rolling back through Windows Management Improvements, 392-393
System Windows, controlling with shell automation, 105-106



Windows Admin Scripting Little Black Book
Windows Admin Scripting Little Black Book (Little Black Books (Paraglyph Press))
ISBN: 1933097108
EAN: 2147483647
Year: 2004
Pages: 89

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net