User Tools

Site Tools


uls:agents:win_tools

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
uls:agents:win_tools [2013-12-03 12:40]
uls [What You Get]
uls:agents:win_tools [2015-02-03 08:37] (current)
uls [Software Installation]
Line 2: Line 2:
 ===== ULS-Agent for Windows ===== ===== ULS-Agent for Windows =====
  
-The WIN_TOOLS are the ULS-agent for the Windows operating system. ​+The WIN_TOOLS are the [[http://​www.gnu.org/​licenses/​gpl.txt|GPLv3]]-based ​ULS-agent for the Windows operating system. ​
 It gathers inventory information and configuration settings ​ It gathers inventory information and configuration settings ​
 as well as runtime metrics of the operating system ​ as well as runtime metrics of the operating system ​
Line 35: Line 35:
 |} |}
  
 +-----
  
 ==== Download & Installation ==== ==== Download & Installation ====
Line 48: Line 49:
 **Download** the  **Download** the 
 {{:​uls:​agents:​win_tools:​win_tools_2013-12-03.zip|current version of the WIN_TOOLS}} {{:​uls:​agents:​win_tools:​win_tools_2013-12-03.zip|current version of the WIN_TOOLS}}
-to the just created directory and check the checksums  +to the just created directory and check the checksums. 
-(you may need to get md5sum.exe from www or use an online service like [[http://​onlinemd5.com|MD5 & SHA1 Hash Generator For File]]):+ 
 +You may need
 +  * to use the fciv.exe from [[http://​support.microsoft.com/​kb/​841290]] 
 +  * or use an online service like [[http://​onlinemd5.com|MD5 & SHA1 Hash Generator For File]]
  
 <code winbatch>​ <code winbatch>​
Line 68: Line 72:
 ''​This file came from another computer and might be blocked to help protect this computer''​ ''​This file came from another computer and might be blocked to help protect this computer''​
  
 +-----
  
 ==== Software Installation ==== ==== Software Installation ====
Line 116: Line 121:
 c:\> powershell Set-ExecutionPolicy RemoteSigned c:\> powershell Set-ExecutionPolicy RemoteSigned
 </​code>​ </​code>​
 +
 +:!: Alternatively,​ you can use the command line parameter ''​-executionpolicy bypass''​
 +<​code>​
 +c:\> powershell.exe -executionpolicy bypass -File <​script.ps1>​ <​arguments>​
 +</​code>​
 +when starting the win_watch powershell script.
 +
 +-----
  
 ==== What You Get ==== ==== What You Get ====
uls/agents/win_tools.1386070852.txt.gz · Last modified: 2014-01-21 09:27 (external edit)