Leveraging WMI Scripting (eBook)
918 Seiten
Elsevier Science (Verlag)
978-0-08-051012-5 (ISBN)
If you've had significant WMI experience, or have read Lissoir's first book, you are ready to apply your WMI knowledge to any technology that interfaces with WMI. Leveraging WMI Scripting continues the presentation of WMI begun in Understanding WMI Scripting. In this new volume, we dive deeper into WMI to understand the manageable entities of the Windows world. Lissoir offers a structured description of the most important WMI providers available from Windows NT 4.0 to Windows Server 2003 (including Windows 2000 and Windows XP). This covers the WMI management of the Windows Registry, Active Directory, SNMP, the Resultant Set Of Policies (RSOP), and the Volume Shadow Service to name a few. This discussion leverages the information on building real-world scripted management solutions presented in Lissoir's first book. Like the first volume, Leveraging WMI Scripting is based on an important concept: learning by practice.
Leveraging WMI Scripting addresses the most advanced topics so that you can exploit the features of various WMI interfaces to manage the components in a real-world environment. WMI is a critical topic under Windows Server 2003, so this book provides real added value to every Windows administrator.
?Shows you how to extract data from applications, understand what's really happening on your servers, and get real work done
?Provides hundreds of usable scripts to use in everyday solutions for network performance and security
?Offers practical and straightforward advice that any enterprise Windows administrator can learn from"
Leveraging WMI Scripting is the second in a series of two books dedicated to WMI. Understanding WMI Scripting (ISBN 1-55558-266-4), Lissoir's first book, explained to Windows Administrators the various WMI scripting techniques and manageability capabilities of this new Windows Server 2003 platform. Illustrated with hundreds of scripts and detailed tables, the book explained the underlying technology and how WMI can be put to work. Lissoir focused not only on WMI programming aspects for developers but on how administrators can use what is available in Windows for their admin work. If you've had significant WMI experience, or have read Lissoir's first book, you are ready to apply your WMI knowledge to any technology that interfaces with WMI. Leveraging WMI Scripting continues the presentation of WMI begun in Understanding WMI Scripting. In this new volume, we dive deeper into WMI to understand the manageable entities of the Windows world. Lissoir offers a structured description of the most important WMI providers available from Windows NT 4.0 to Windows Server 2003 (including Windows 2000 and Windows XP). This covers the WMI management of the Windows Registry, Active Directory, SNMP, the Resultant Set Of Policies (RSOP), and the Volume Shadow Service to name a few. This discussion leverages the information on building real-world scripted management solutions presented in Lissoir's first book. Like the first volume, Leveraging WMI Scripting is based on an important concept: "e;learning by practice."e; Leveraging WMI Scripting addresses the most advanced topics so that you can exploit the features of various WMI interfaces to manage the components in a real-world environment. WMI is a critical topic under Windows Server 2003, so this book provides real added value to every Windows administrator.*Shows you how to extract data from applications, understand what's really happening on your servers, and get real work done *Provides hundreds of usable scripts to use in everyday solutions for network performance and security*Offers practical and straightforward advice that any enterprise Windows administrator can learn from
Front Cover 1
Leveraging WMI Scripting 4
Copyright Page 5
Contents 8
Foreword 16
Preface 18
Some Useful Scripts 22
Acknowledgments 24
List of Figures 30
List of Samples 38
List of Tables 48
Chapter 1. The Windows WMI Providers Discovery 54
1.1 Objective 54
1.2 The WMI provider types 54
1.3 WMI providers discovery 61
1.4 Helpers for the discovery 73
1.5 Summary 80
Chapter 2. The Win32 Providers 82
2.1 Objective 82
2.2 The Win32 providers 82
2.3 Computer system hardware classes 84
2.4 Operating System classes 158
2.5 Summary 262
Chapter 3. The WMI Providers 264
3.1 Objective 264
3.2 The WMI providers 264
3.3 Core OS components providers 266
3.4 Core OS components event providers 372
3.5 Core OS file system components providers 382
3.6 Active Directory components providers 425
3.7 Network components providers 458
3.8 Performance providers 539
3.9 Helper providers 561
3.10 Summary 579
3.11 Useful Internet URLs 580
Chapter 4. WMI Security Scripting 582
4.1 Objective 582
4.2 The WMI security configuration 582
4.3 WMI and Active Server Page (ASP) 589
4.4 WMI security descriptor management 597
4.5 The WMI Security provider 604
4.6 Connecting to the manageable entities 609
4.7 Accessing the security descriptor set on manageable entities 638
4.8 Creating a default security descriptor 656
4.9 The security descriptor conversion 660
4.10 Deciphering the security descriptor 664
4.11 Deciphering the security descriptor components 672
4.12 Modifying the security descriptor 744
4.13 Updating the security descriptor 768
4.14 How WMI scripters are affected by the Microsoft security push 784
4.15 Summary 791
Chapter 5. The Optional Windows Components and Application WMI Providers 794
5.1 Objective 794
5.2 WMI and some additional Windows services 794
5.3 WMI and some (server) products 829
5.4 WMI and some Windows applications 862
5.5 WMI and some Enterprise Management software 866
5.6 WMI and the .NET Framework 896
5.7 Summary 911
5.8 Useful Internet URLs 912
Chapter 6. A Look Into the Future of WMI Scripting 914
6.1 The .NET Framework and scripting 915
6.2 Windows scripting environments 917
6.3 Final thoughts 918
Appendix 920
Index 942
Erscheint lt. Verlag | 29.5.2003 |
---|---|
Sprache | englisch |
Themenwelt | Sachbuch/Ratgeber |
Informatik ► Betriebssysteme / Server ► Windows | |
ISBN-10 | 0-08-051012-4 / 0080510124 |
ISBN-13 | 978-0-08-051012-5 / 9780080510125 |
Haben Sie eine Frage zum Produkt? |
Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM
Dateiformat: PDF (Portable Document Format)
Mit einem festen Seitenlayout eignet sich die PDF besonders für Fachbücher mit Spalten, Tabellen und Abbildungen. Eine PDF kann auf fast allen Geräten angezeigt werden, ist aber für kleine Displays (Smartphone, eReader) nur eingeschränkt geeignet.
Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine
Geräteliste und zusätzliche Hinweise
Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.
aus dem Bereich