diff --git a/docs/cwa/dataviews/microsoft-outlook-ostpst-audit.md b/docs/cwa/dataviews/microsoft-outlook-ostpst-audit.md index 79a27a88f9..e49ca1c082 100644 --- a/docs/cwa/dataviews/microsoft-outlook-ostpst-audit.md +++ b/docs/cwa/dataviews/microsoft-outlook-ostpst-audit.md @@ -1,8 +1,8 @@ --- id: '30279ec0-cbb0-40f5-95ea-fb8052cb093a' slug: /30279ec0-cbb0-40f5-95ea-fb8052cb093a -title: 'Microsoft Outlook - OSTPST Audit' -title_meta: 'Microsoft Outlook - OSTPST Audit' +title: 'Microsoft Outlook - OST/PST Audit' +title_meta: 'Microsoft Outlook - OST/PST Audit' keywords: ['dataview', 'outlook', 'audit', 'ost', 'pst', 'windows'] description: 'This document provides a detailed overview of the Dataview that displays the path and size of OST and PST files for users on a Windows machine. It includes dependencies, column descriptions, and data collection details essential for monitoring Outlook files.' tags: ['database', 'performance', 'report', 'setup', 'windows'] @@ -16,9 +16,9 @@ This Dataview displays the path and size of the OST and PST files for users on a ## Dependencies -- [EPM - Data Collection - Script - Microsoft Outlook - OST/PST - Audit](/docs/2029ecbe-c5f8-431e-9643-7aed63bec6d8) -- [EPM - Data Collection - Internal Monitor - Execute Script - Microsoft Outlook - OST/PST - Audit](/docs/d801eb05-05a3-4271-aa8c-a8ea4941f4eb) -- [EPM - Data Collection - Custom Table - pvl_outlook_pst_ost_audit](/docs/bea56cbb-3761-452a-9493-08a88bc6dbab) + +- [Custom Table - pvl_outlook_pst_ost_audit](/docs/bea56cbb-3761-452a-9493-08a88bc6dbab) +- [Solution - Microsoft Outlook - OST/PST Audit](/docs/cefde8db-a69d-4d25-a5b2-dda08f468fb4) ## Columns diff --git a/docs/cwa/monitors/execute-script-microsoft-outlook-ostpst-audit.md b/docs/cwa/monitors/execute-script-microsoft-outlook-ostpst-audit.md index b544495af3..aa20c2d47a 100644 --- a/docs/cwa/monitors/execute-script-microsoft-outlook-ostpst-audit.md +++ b/docs/cwa/monitors/execute-script-microsoft-outlook-ostpst-audit.md @@ -1,8 +1,8 @@ --- id: 'd801eb05-05a3-4271-aa8c-a8ea4941f4eb' slug: /d801eb05-05a3-4271-aa8c-a8ea4941f4eb -title: 'Execute Script - Microsoft Outlook - OSTPST - Audit' -title_meta: 'Execute Script - Microsoft Outlook - OSTPST - Audit' +title: 'Execute Script - Microsoft Outlook - OST/PST - Audit' +title_meta: 'Execute Script - Microsoft Outlook - OST/PST - Audit' keywords: ['monitoring', 'outlook', 'audit', 'windows', 'script'] description: 'This document outlines the setup and dependencies for running internal monitors that execute the Microsoft Outlook OST/PST Audit script weekly on Windows workstations with Outlook installed. It includes information on the alert template and the target scope of the monitoring.' tags: ['windows'] @@ -16,7 +16,8 @@ The internal monitors run the [Microsoft Outlook - OST/PST - Audit](/docs/2029ec ## Dependencies -[EPM - Data Collection - Script - Microsoft Outlook - OST/PST - Audit](/docs/2029ecbe-c5f8-431e-9643-7aed63bec6d8) +- [Script - Microsoft Outlook - OST/PST - Audit](/docs/2029ecbe-c5f8-431e-9643-7aed63bec6d8) +- [Solution - Microsoft Outlook - OST/PST Audit](/docs/cefde8db-a69d-4d25-a5b2-dda08f468fb4) ## Target diff --git a/docs/cwa/scripts/hosts-file-audit.md b/docs/cwa/scripts/hosts-file-audit.md index 3f810cf609..9e4aac4df6 100644 --- a/docs/cwa/scripts/hosts-file-audit.md +++ b/docs/cwa/scripts/hosts-file-audit.md @@ -23,8 +23,8 @@ This script can be run on a single agent or scheduled on a batch of computers on ## Process 1. Run a PowerShell command to return all custom results inside the Windows host file, separated by commas. -2. Update the Host File Contents EDF under Host File Info. +2. Update the `Host File Contents` EDF under Host File Info. ## Output -This script outputs information into the Host File Contents EDF and can be displayed in a Dataview for monitoring if desired. \ No newline at end of file +This script outputs information into the computer EDF `Host File Contents` and can be displayed in a Dataview for monitoring if desired. \ No newline at end of file diff --git a/docs/cwa/scripts/hyper-v-guest-vms-startstop.md b/docs/cwa/scripts/hyper-v-guest-vms-startstop.md index 05e33aa017..ff1af4185e 100644 --- a/docs/cwa/scripts/hyper-v-guest-vms-startstop.md +++ b/docs/cwa/scripts/hyper-v-guest-vms-startstop.md @@ -18,8 +18,10 @@ This script allows for the shutdown or startup of VMs on the target Hyper-V host ## Sample Run +To Stop the VMs: ![Sample Run Image 1](../../../static/img/docs/52d001b4-7152-4616-92de-99a002e2d22c/image_1.webp) +To Start the VMs: ![Sample Run Image 2](../../../static/img/docs/52d001b4-7152-4616-92de-99a002e2d22c/image_2.webp) ## Dependencies diff --git a/docs/cwa/scripts/microsoft-outlook-ostpst-audit.md b/docs/cwa/scripts/microsoft-outlook-ostpst-audit.md index d252cba5e5..f81565e5e8 100644 --- a/docs/cwa/scripts/microsoft-outlook-ostpst-audit.md +++ b/docs/cwa/scripts/microsoft-outlook-ostpst-audit.md @@ -1,8 +1,8 @@ --- id: '2029ecbe-c5f8-431e-9643-7aed63bec6d8' slug: /2029ecbe-c5f8-431e-9643-7aed63bec6d8 -title: 'Microsoft Outlook - OSTPST - Audit' -title_meta: 'Microsoft Outlook - OSTPST - Audit' +title: 'Microsoft Outlook - OST/PST - Audit' +title_meta: 'Microsoft Outlook - OST/PST - Audit' keywords: ['ost', 'pst', 'audit', 'collection', 'windows', 'script'] description: 'This document describes a script that collects all OST/PST file names and sizes from Windows machines, storing the data in a custom table for auditing purposes. It includes details about the script path, file hash, sample run output, dependencies, and the expected output from the script.' tags: ['database', 'report', 'software', 'windows'] @@ -12,10 +12,10 @@ unlisted: false ## Summary -This script collects all the OST/PST file names and sizes from Windows machines and stores them in a custom table [EPM - Data Collection - Custom Table - pvl_outlook_pst_ost_audit](/docs/bea56cbb-3761-452a-9493-08a88bc6dbab). +This script collects all the OST/PST file names and sizes from Windows machines and stores them in a custom table [pvl_outlook_pst_ost_audit](/docs/bea56cbb-3761-452a-9493-08a88bc6dbab). -**Script Path:** C:/ProgramData/_Automation/Script/Audit-OutlookDB/Audit-OutlookDB.ps1 -**File Hash:** B5689044612005060B790DFC5560C8E28E44B82BDE107D971AA146B91F147881 +- **Script Path:** `C:/ProgramData/_Automation/Script/Audit-OutlookDB/Audit-OutlookDB.ps1` +- **File Hash:** `B5689044612005060B790DFC5560C8E28E44B82BDE107D971AA146B91F147881` ## Sample Run @@ -23,7 +23,8 @@ This script collects all the OST/PST file names and sizes from Windows machines ## Dependencies -[EPM - Data Collection - Internal Monitor - Execute Script - Microsoft Outlook - OST/PST - Audit](/docs/d801eb05-05a3-4271-aa8c-a8ea4941f4eb) +- [Internal Monitor - Execute Script - Microsoft Outlook - OST/PST - Audit](/docs/d801eb05-05a3-4271-aa8c-a8ea4941f4eb) +- [Solution - Microsoft Outlook - OST/PST Audit](/docs/cefde8db-a69d-4d25-a5b2-dda08f468fb4) ## Output diff --git a/docs/cwa/scripts/reboot-forced-with-time-window-verification-verify-reboot.md b/docs/cwa/scripts/reboot-forced-with-time-window-verification-verify-reboot.md deleted file mode 100644 index 9581cf659a..0000000000 --- a/docs/cwa/scripts/reboot-forced-with-time-window-verification-verify-reboot.md +++ /dev/null @@ -1,53 +0,0 @@ ---- -id: 'eb54bf63-7c3d-4db0-a76d-d421eb07a243' -slug: /eb54bf63-7c3d-4db0-a76d-d421eb07a243 -title: 'Reboot - Forced with Time Window Verification & Verify Reboot' -title_meta: 'Reboot - Forced with Time Window Verification & Verify Reboot' -keywords: ['reboot', 'time', 'window', 'script', 'check'] -description: 'This document details a script that reboots a machine only if it falls within a preconfigured time window. It includes setup requirements, process steps, and output logging information.' -tags: ['security', 'windows'] -draft: false -unlisted: false ---- - -## Summary - -This script will reboot a machine, but only if it is within a preconfigured time window. The window is NOT configured by default. - -**Time Saved by Automation:** 5 Minutes - -## Sample Run - -![Sample Run](../../../static/img/docs/eb54bf63-7c3d-4db0-a76d-d421eb07a243/image_1_1.webp) - -## Dependencies - -- Global variables must be set up correctly. - -## Variables - -- `@PSResult@` -> Output from the PowerShell time window check -- `@MachineTime@` -> Grabs the local time of the machine -- `@newuptime@` -> Gets the latest uptime from the Automate Database - -#### Global Parameters - -| Name | Example | Required | Description | -|-------------|----------------------------------------------------------------------------------------------------------------------------------------------------------------|----------|-----------------------------------| -| WindowStart | 0 = Midnight, 1 = 1:00 AM, 5 = 5:00 AM, 11 = 11:00 AM, 23 = 11:00 PM | True | When is the window open to reboot | -| WindowEnd | 0 = Midnight, 1 = 1:00 AM, 5 = 5:00 AM, 11 = 11:00 AM, 23 = 11:00 PM | True | When is the window closed to reboot | - -## Process - -1. Convert the window variables to integers and run a comparison to see if the machine is allowed to reboot during this window. -2. Grab the local machine time. -3. Check if the current time (when trying to run the script) is within the reboot window. -4. If it is, reboot the machine and verify that the reboot was successful. - 1. If the reboot fails or shows uptime > 1800 seconds, create a ticket. - 2. If successful, log success in the script logs. -5. If not within the window: - 1. Log that the machine time is not within the window and exit the script. - -## Output - -- Script log \ No newline at end of file diff --git a/docs/cwa/scripts/reset-reboot-pending-edfs.md b/docs/cwa/scripts/reset-reboot-pending-edfs.md index 90c3a8d142..7d92b913d8 100644 --- a/docs/cwa/scripts/reset-reboot-pending-edfs.md +++ b/docs/cwa/scripts/reset-reboot-pending-edfs.md @@ -12,11 +12,11 @@ unlisted: false ## Summary -This script is designed to be used with the monitor [EPM - Windows Configuration - Monitor - Reboot Pending [Prompt]](/docs/8163996f-f8b6-4b7d-b5b1-6b965a9408d4). The script's primary function is to clear the EDFs used in the monitor so it can be re-triggered at a later time. +This script is designed to be used with the monitor [ Reboot Pending [Prompt]](/docs/8163996f-f8b6-4b7d-b5b1-6b965a9408d4). The script's primary function is to clear the EDFs used in the monitor so it can be re-triggered at a later time. ## Sample Run -This script clears the EDFs used in the monitor [EPM - Windows Configuration - Monitor - Reboot Pending [Prompt]](/docs/8163996f-f8b6-4b7d-b5b1-6b965a9408d4) and the script [EPM - Windows Configuration - Script - User Prompt - Reboot](/docs/1789b867-61db-436d-ac0b-07d5aac3f4b8). +This script clears the EDFs used in the monitor [Reboot Pending [Prompt]](/docs/8163996f-f8b6-4b7d-b5b1-6b965a9408d4) and the script [User Prompt - Reboot](/docs/1789b867-61db-436d-ac0b-07d5aac3f4b8). ![Sample Run Image](../../../static/img/docs/e188d9ff-44e7-40e5-a255-d7d2bf0e2f7c/image_1.webp) @@ -24,8 +24,9 @@ This script clears the EDFs used in the monitor [EPM - Windows Configuration - M The following items are dependent on this script: -- [EPM - Windows Configuration - Monitor - Reboot Pending [Prompt]](/docs/8163996f-f8b6-4b7d-b5b1-6b965a9408d4) -- [EPM - Windows Configuration - Script - User Prompt - Reboot](/docs/1789b867-61db-436d-ac0b-07d5aac3f4b8) +- [Monitor - Reboot Pending [Prompt]](/docs/8163996f-f8b6-4b7d-b5b1-6b965a9408d4) +- [Script - User Prompt - Reboot](/docs/1789b867-61db-436d-ac0b-07d5aac3f4b8) +- [Solution - User Prompt For Reboot](/docs/32d2254e-c2a4-4f2d-a029-b74f6d3c8b1a) ## Process diff --git a/docs/cwa/scripts/user-prompt-reboot.md b/docs/cwa/scripts/user-prompt-reboot.md index 968c3035bc..1c7515a7d7 100644 --- a/docs/cwa/scripts/user-prompt-reboot.md +++ b/docs/cwa/scripts/user-prompt-reboot.md @@ -23,7 +23,7 @@ This script is triggered from the monitor [Reboot Pending [Prompt]](/docs/816399 - **Times Prompted** [Text Field - Non Editable] ![](../../../static/img/docs/1789b867-61db-436d-ac0b-07d5aac3f4b8/image_3.webp) -If the user chooses to suppress the prompt by hitting no, it will update the Last Prompted and Times Prompted EDFs with new information. The Last Prompted EDF outlines the date and time when the script recorded that the user was prompted and the script was run. The Times Prompted EDF is increased by one every time the script runs. +If the user chooses to suppress the prompt by hitting no, it will update the `Last Prompted` and `Times Prompted` EDFs with new information. The Last Prompted EDF outlines the date and time when the script recorded that the user was prompted and the script was run. The Times Prompted EDF is increased by one every time the script runs. **Note:** If the `proval_RebootPromptWhenPendingReboot` system property is set to `1` and the computer has a reboot pending flag, but the `Suppress Reboot` policy is applied by the patch manager and the pending reboot flag was set due to a patch job, the machine will be excluded from the script's functionality. Instead, the prompts and reboot will be managed by Automate's built-in `Suppress Reboot` policy. This may result in inconsistently connected machines not getting a proper reboot. @@ -35,8 +35,7 @@ This script is designed to run only when triggered by [Reboot Pending [Prompt]]( The following items depend on this script to function correctly: -- [EPM - Windows Configuration - Monitor - Reboot Pending [Prompt]](/docs/8163996f-f8b6-4b7d-b5b1-6b965a9408d4) -- [EPM - Windows Configuration - Script - Reset Reboot Pending EDFs](/docs/e188d9ff-44e7-40e5-a255-d7d2bf0e2f7c) +- [Solution - User Prompt For Reboot](/docs/32d2254e-c2a4-4f2d-a029-b74f6d3c8b1a) - [CWM - Automate - Script - Prompter](/docs/d8a124df-ea81-4194-82fc-a082c7a036d8) ### System Properties diff --git a/docs/solutions/microsoft-outlook-ostpst-audit.md b/docs/solutions/microsoft-outlook-ostpst-audit.md index 5c71a73d27..68d950aa8f 100644 --- a/docs/solutions/microsoft-outlook-ostpst-audit.md +++ b/docs/solutions/microsoft-outlook-ostpst-audit.md @@ -1,8 +1,8 @@ --- id: 'cefde8db-a69d-4d25-a5b2-dda08f468fb4' slug: /cefde8db-a69d-4d25-a5b2-dda08f468fb4 -title: 'Microsoft Outlook - OSTPST Audit' -title_meta: 'Microsoft Outlook - OSTPST Audit' +title: 'Microsoft Outlook - OST/PST Audit' +title_meta: 'Microsoft Outlook - OST/PST Audit' keywords: ['microsoft', 'outlook', 'ost', 'pst', 'audit', 'dataview', 'monitor'] description: 'This document outlines a solution for retrieving file path and size details of OST and PST files from Windows Workstations, and displaying this data in an Automate dataview. It helps identify unusually large OST or PST files, enhancing data management and monitoring capabilities.' tags: ['windows'] @@ -20,16 +20,16 @@ This solution is designed to retrieve the file path and size details of OST and | Content | Type | Function | |-------------------------------------------------------------------------|---------------|------------------------| -| [Script - Microsoft Outlook - OST/PST - Audit](/docs/2029ecbe-c5f8-431e-9643-7aed63bec6d8) | Script | Fetch the data. | -| [Dataview - Microsoft Outlook - OST/PST Audit](/docs/30279ec0-cbb0-40f5-95ea-fb8052cb093a) | Dataview | Display the data. | -| [Internal Monitor - Execute Script - Microsoft Outlook - OST/PST - Audit](/docs/d801eb05-05a3-4271-aa8c-a8ea4941f4eb) | Internal Monitor | Detects the machines. | +| [Microsoft Outlook - OST/PST - Audit](/docs/2029ecbe-c5f8-431e-9643-7aed63bec6d8) | Script | Fetch the data. | +| [Microsoft Outlook - OST/PST Audit](/docs/30279ec0-cbb0-40f5-95ea-fb8052cb093a) | Dataview | Display the data. | +| [Execute Script - Microsoft Outlook - OST/PST - Audit](/docs/d801eb05-05a3-4271-aa8c-a8ea4941f4eb) | Internal Monitor | Detects the machines. | | △ Custom - Execute Script - Microsoft Outlook - OST/PST - Audit | Alert Template | Executes the script. | #### Other | Content | Type | Function | |-------------------------------------------------------------------------|---------------|--------------------------------| -| [Custom Table - pvl_outlook_pst_ost_audit](/docs/bea56cbb-3761-452a-9493-08a88bc6dbab) | Custom Table | Stores data gathered by the script. | +| [pvl_outlook_pst_ost_audit](/docs/bea56cbb-3761-452a-9493-08a88bc6dbab) | Custom Table | Stores data gathered by the script. | ## Implementation diff --git a/static/img/docs/19d3cc45-e5bd-4705-b82d-c0657b2e6195/image_1.webp b/static/img/docs/19d3cc45-e5bd-4705-b82d-c0657b2e6195/image_1.webp index ea5265dc3d..0022625dac 100644 Binary files a/static/img/docs/19d3cc45-e5bd-4705-b82d-c0657b2e6195/image_1.webp and b/static/img/docs/19d3cc45-e5bd-4705-b82d-c0657b2e6195/image_1.webp differ diff --git a/static/img/docs/52d001b4-7152-4616-92de-99a002e2d22c/image_1.webp b/static/img/docs/52d001b4-7152-4616-92de-99a002e2d22c/image_1.webp index 48ddd08292..6d543a29e2 100644 Binary files a/static/img/docs/52d001b4-7152-4616-92de-99a002e2d22c/image_1.webp and b/static/img/docs/52d001b4-7152-4616-92de-99a002e2d22c/image_1.webp differ diff --git a/static/img/docs/52d001b4-7152-4616-92de-99a002e2d22c/image_2.webp b/static/img/docs/52d001b4-7152-4616-92de-99a002e2d22c/image_2.webp index 21da8468b6..fba7a5381e 100644 Binary files a/static/img/docs/52d001b4-7152-4616-92de-99a002e2d22c/image_2.webp and b/static/img/docs/52d001b4-7152-4616-92de-99a002e2d22c/image_2.webp differ diff --git a/static/img/docs/e188d9ff-44e7-40e5-a255-d7d2bf0e2f7c/image_1.webp b/static/img/docs/e188d9ff-44e7-40e5-a255-d7d2bf0e2f7c/image_1.webp index d51f418f91..ce8a075af0 100644 Binary files a/static/img/docs/e188d9ff-44e7-40e5-a255-d7d2bf0e2f7c/image_1.webp and b/static/img/docs/e188d9ff-44e7-40e5-a255-d7d2bf0e2f7c/image_1.webp differ diff --git a/static/img/docs/eb54bf63-7c3d-4db0-a76d-d421eb07a243/image_1_1.webp b/static/img/docs/eb54bf63-7c3d-4db0-a76d-d421eb07a243/image_1_1.webp deleted file mode 100644 index bb27c3b1d9..0000000000 Binary files a/static/img/docs/eb54bf63-7c3d-4db0-a76d-d421eb07a243/image_1_1.webp and /dev/null differ