I had a problem where i needed to remove the AV off our servers on a large scale and found that the manual process for this was quite time consuming.
Because CA sold the antivirus business to TotalDefence, a lot of the documentation disappeared from their website so it took some playing around with how to do it successfully.
The batch file does the following steps:
- Stops all eTrust services.
- Kills the processes just in case they are lingering
- runs MSIEXEC uninstall of the software, in the order that they should be. ITM Agent first, then iTechnology iGateway.
- Prompts to tell you to reboot machine
The script is relatively simple, and quite rudimentary – Read more »
A colleague of mine asked if i could make a handy screen capture tool available to our users. I said ‘Sure – piece of cake!’. Well it was for the most part, aside from the installer loading the website post install.
I will document how i successfully completed the deployment of this software to users who opted to install it via Software Catalog website. Read more »
Welcome to Part 2 of my series of Deploying Java 7 JRE – Deep Dive!
Hopefully my first article, Deploying Java 7 JRE – Deep Dive! (Part 1) has helped you understand the history behind what Java have been doing over the past year and how all these changes will affect you. This part will cover the steps to successfully overcome the deployment of Java in an enterprise. So lets get into it! Read more »
Below are some common WMI Queries that I have used, both during OSD (Operating System Deployment), startup/logon scripts or similar situations. I have broken them down to their most common form, and will show you how you can leverage this in a VB script at the end.
I will continue to update this post with new useful queries that I come across.
Read more »
Having worked in help-desk roles in the past I know the importance of knowing which user has logged onto which computer. Its simple stuff really, but unless you have 3rd party systems like System Center 2012 (SC12) or client agents, its either hard or time consuming to find out the relation between users and computers. What we needed was an easy way to find out what the last logged on user was for every machine. Read more »
Normally when I want to uninstall an application I will work through the below steps to get a simple clean uninstall script that is recommended. Unfortunately sometimes vendors dont provide this and you need to get creative in how you uninstall certain applications. Read more »