Kaseya Community

KRC/KLC reset for OSX endpoints

Script to restore functionality of KRC and KLC after a VSA update caused issues. Script was recreated, to publish on clubmsp.com, as described in this thread: http://community.kaseya.com/xsp/f/355/t/24534.aspx

Read More

Programs Installed within X days (w/ blacklist)

Searches registry for installed programs in both HKLM and USERS. Table of results will be saved in the Docs tab of the agent. Can report using $ProgInstallX$ Script uses 3 variables that can be set manually by editing the script if additional filters are desired. Those fields can be used to specify the 1) number…

Read More

Programs Installed (Prompt for Name)

Script prompts for a program name to search for. Script goes through Add/Remove Programs and creates a list of all programs that contain the requested prompted name. Output is written to Agent Procedure log, uploaded to Documents, and email sent to the Kaseya Admin that executed the script. Can report using $ProgInstalled$. Additional filters are…

Read More

Programs Installed within X days

Script prompts for number of days days. Searches registry for installed programs in both HKLM and USERS. Table of results will be saved in the Docs tab of the agent. Can report using $ProgInstallX$ Script uses 3 variables that can be set manually by editing the script if additional filters are desired. Those fields can…

Read More

Hide K-Working directory

This script will automatically hide the ‘kworking’ directory on the endpoint.     Script written by Oscar Romero at Kaseya

Read More

Un-Hide K-Working directory

This script will automatically unhide the ‘kworking’ directory on the endpoint that may have been hidden with the hide script.  Original hide script written by Oscar Romero at Kaseya. Modified to change attribute by Virtual Administrator.  Chris A.

Read More

XMR Endpoint Check

Procedure to check the endpoints for the mining exploit. Created by Douglas Sanchez (douglas.sanchez@kaseya.com) You MUST create a custom field called “XMR” as documented in Kaseya’s article 1-29-18 Modified by Chris A – Virtual Administrator to add Tags, and reduce un-needed entries Review the following video to build a report off the tags. The tag…

Read More

Meltdown/Spectre – Vulnerability Check

Installs PS module and runs powershell command Get-SpeculationControlSettings. Outputs the results to a file and reports to the procedure log. Procedure log will indicate if patching may be required. Should work on Powershell 3.0 or later. Results are saved to custom variable (“updateSystemInfo” lines will need to be edited to link to your variable). It…

Read More

Meltdown Scripts

Folder containing all the current meltdown scripts: Meltdown Reg Key Audit Meltdown Reg Key Force Add Meltdown/Spectre Vulnerability Check Meltdown/Spectre Vulnerability Check (w/ Tags)

Read More

Meltdown Reg Key Force Add

This agent procedure will create the registry key “HKEY_LOCAL_MACHINE:\SOFTWARE\Microsoft\Windows\CurrentVersion\QualityCompat” Value=”cadca5fe-87d3-4b96-b7fb-a231484277cc” Type=”REG_DWORD” on any Windows machine using a powershell script. The registry key is not always required to get the Windows Update to protect against the Meltdown vulnerability. It is advised to check the list of Antivirus at: https://docs.google.com/spreadsheets/d/184wcDt9I9TUNFFbsAVLpzAtckQxYiuirADzf3cL42FQ/htmlview?sle=true#gid=0 You can find more information on this…

Read More