Enables Firewall Auditing Events and then tails the event log remotely. The tailing of events for this script is closer to realtime then the text log.
This script will scan the Security log for evidence of recent changes to the local Administrators group and report whether the required audit policy is configured on the machine.
This script will check if the user is part of BUILTINAdministrators, directly named This script will check if the user is a member of BUILTINAdministrators, directly named
or inherited from other local or domain groups
Uses the Horizon PowerCLI api’s to pull all admin related events from the Horizon Event database for all pods. If there is no cloud pod setup it will only process the local pod. After pulling the events it will translate the id’s for the various objects to names to show the proper names where needed.
Requires Horizon 7.5 or later
Output is displayed in the console but also saved to a default location of c:windowstempCU_Horizon_audit_log.csv
This script requires VMware PowerCLI to be installed on the machine running the script. PowerCLI can be installed through PowerShell (PowerShell version 5 or higher required) by running the command ‘Install-Module VMware.PowerCLI -Force -AllowCLobber -Scope AllUsers’
This script retreives the administrative users and groups in a Horizon View environment.
You can this script to make sure administrators have the right permissions in Horizon View?
This action should be executed against a Horizon endpoint machine (one which has the HZ Primary Connection Server column populated in ControlUp Console). The script uses the target machine to determine the connection server address, and is executed on the machine running ControlUp Console.
Creates a report of the packets dropped by Windows firewall during the specified interval.
Add or remove domain or local accounts to/from local groups on selected computers. Can either be done immediately or at a given date/time in the future via a scheduled task, e.g. remove specific users from the local admininstrators group in 1 day’s time.
Users – a comma separated list of AD user accounts to add/remove to/from the specified group
Local group – the name of the local group which will have the users added or removed
Remove from group – if true then the specified users will be removed from the group, if false then the users will be added to the group (default is false)
When – If nothing is specified, the action is taken immediately otherwise a scheduled task is created to perform the action at the data/time specified which can also be a number followed by a time unit, e.g. 8h for 8 hours or 1d for 1 day. If specifying a date/time, it must be enclosed in double quotes.
This SBA confirms whether protection against these vulnerabilities have been enabled on the target computer.
For more infomation: https://support.microsoft.com/en-us/help/4072698/
Adds the required registry keys to enable the mitigations on the target computer.
Requires the relevant Microsoft patch installed on the target computer.
For more inforrmation: https://support.microsoft.com/en-us/help/4072698
This script gets the user SID for the current username. If the same name exists in both the local computer and the domain, both SIDs will be returned.