This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
uls:agents:win_tools [2013-12-03 12:40] uls [What You Get] |
uls:agents:win_tools [2015-02-03 08:37] (current) uls [Software Installation] |
||
---|---|---|---|
Line 2: | Line 2: | ||
===== ULS-Agent for Windows ===== | ===== ULS-Agent for Windows ===== | ||
- | The WIN_TOOLS are the ULS-agent for the Windows operating system. | + | The WIN_TOOLS are the [[http://www.gnu.org/licenses/gpl.txt|GPLv3]]-based ULS-agent for the Windows operating system. |
It gathers inventory information and configuration settings | It gathers inventory information and configuration settings | ||
as well as runtime metrics of the operating system | as well as runtime metrics of the operating system | ||
Line 35: | Line 35: | ||
|} | |} | ||
+ | ----- | ||
==== Download & Installation ==== | ==== Download & Installation ==== | ||
Line 48: | Line 49: | ||
**Download** the | **Download** the | ||
{{:uls:agents:win_tools:win_tools_2013-12-03.zip|current version of the WIN_TOOLS}} | {{:uls:agents:win_tools:win_tools_2013-12-03.zip|current version of the WIN_TOOLS}} | ||
- | to the just created directory and check the checksums | + | to the just created directory and check the checksums. |
- | (you may need to get md5sum.exe from www or use an online service like [[http://onlinemd5.com|MD5 & SHA1 Hash Generator For File]]): | + | |
+ | You may need: | ||
+ | * to use the fciv.exe from [[http://support.microsoft.com/kb/841290]] | ||
+ | * or use an online service like [[http://onlinemd5.com|MD5 & SHA1 Hash Generator For File]] | ||
<code winbatch> | <code winbatch> | ||
Line 68: | Line 72: | ||
''This file came from another computer and might be blocked to help protect this computer'' | ''This file came from another computer and might be blocked to help protect this computer'' | ||
+ | ----- | ||
==== Software Installation ==== | ==== Software Installation ==== | ||
Line 116: | Line 121: | ||
c:\> powershell Set-ExecutionPolicy RemoteSigned | c:\> powershell Set-ExecutionPolicy RemoteSigned | ||
</code> | </code> | ||
+ | |||
+ | :!: Alternatively, you can use the command line parameter ''-executionpolicy bypass'' | ||
+ | <code> | ||
+ | c:\> powershell.exe -executionpolicy bypass -File <script.ps1> <arguments> | ||
+ | </code> | ||
+ | when starting the win_watch powershell script. | ||
+ | |||
+ | ----- | ||
==== What You Get ==== | ==== What You Get ==== |