Misc
Removes the REG keys installed using the “Take Ownership – Install” script. Report on success or failure using tag $TakeOwn$ or just failure using $OOD$
Read MoreInstalls a REG file that will allow you to right-click on a file or folder and give the administrator permission. Report on success or failure using tag $TakeOwn$ or just failure using $OOD$
Read MoreScript will calculate the difference between a constant (default 7 days) and the first check-in time in Kaseya. It will then write to Agent Procedure log. For reporting you can use the tag “$IsRecent” to report on everything, or $IsRecentYES$ to report on only those that are less than desired timespan. NOTE: This script also…
Read MoreDeletes all files and folder in the following directories: C:\Windows\Temp C:\Windows\Prefetch C:\Documents and Settings\*\Local Settings\Temp C:\Users\*\Appdata\Local\Temp. Logs the free space before and after the cleanup. Can report using $tempcleanup$.
Read MoreReboots Windows workstation, and removes any safemode boot options. Only works on Windows Vista/7/8/10.
Read MoreReboots Windows workstation, and adds safemode with networking boot option. Only works on Windows Vista/7/8/10. To reboot back to normal mode, use this script.
Read MoreWrites display setting to procedure log in the format: <diaplyname>(<width>x<height>x<bitsperpixel>). Can report using $DisplaySettings$. Use the following video to create a report using the $DisplaySettings$ tag.
Read MoreSometimes Kaseya Private Remote Connect fails to establish a connection with an Endpoint. One of the primary reasons for failure is that remote connections are not allowed on the target machine. This script can be executed across all machines in order to ensure that this issue doesn’t even present itself. For Virtual Administrator partners you…
Read MoreScript relies on 2 custom fields that must be created before script is imported (or must be edited to use different fields). The default field names are “Warranty Exp” and “Purchase Date”. They can be edited on lines 41, and 30. Script downloads a series of vbs scripts to 1) get system info, make a…
Read MoreDownloads and installs intel-sa-0075. Then runs the tool to detect of the machine is vulnerable. Can report using $intel-sa-00075$ and $intel-vulnerable$ to see only the vulnerable machines. Also uploads a copy of the full report to to GetFile as intel-sa-00075.xml
Read More