![]() ![]() These scripts were developed for use in environments compromised by the SUNBURST vulnerability and are In the Configuration Manager console, choose Software Library > Application Management > Global Conditions. Simply type ipconfig to find out which System Center TechCenter. ps1 -SiteServer CM01 -ComponentName SMS_AD_USER_DISCOVERY_AGENT -Path C:\Temp\UserOUList. To do so: Open the PowerShell console as shown above. ![]() Unfortunately, the link to the Supporting Online Help article is dead as of Windows 10 version 1903, but it can be found here: Supporting Online Help. The PowerShell script runs on a device to discover and report on the settings defined in the JSON. ![]() For Discovery script ,click on edit script and use the following PowerShell script. See Configuring discovery settings for information on enabling discovery of Windows hosts in AWS. Use the PnP Provisioning Engine with the PnP PowerShell module. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |