Leveraging Wmi Scripting : Using Windows Management Instrumentation to Solve Windows Management Problems

個数:
電子版価格 ¥13,187
  • 電書あり

Leveraging Wmi Scripting : Using Windows Management Instrumentation to Solve Windows Management Problems

  • 提携先の海外書籍取次会社に在庫がございます。通常3週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合、分割発送となる場合がございます。
    3. 美品のご指定は承りかねます。
  • 【重要:入荷遅延について】
    ウクライナ情勢悪化・新型コロナウィルス感染拡大により、洋書・洋古書の入荷が不安定になっています。詳しくはこちらをご確認ください。
    海外からのお取り寄せの場合、弊社サイト内で表示している標準的な納期よりもお届けまでに日数がかかる見込みでございます。
    申し訳ございませんが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 918 p.
  • 言語 ENG
  • 商品コード 9781555582999
  • DDC分類 005.4469

Full Description


Leveraging WMI Scripting is the second in a series of two books dedicated to WMI. Understanding WMI Scripting (ISBN 1-55558-266-4), Lissoir's first book, explained to Windows Administrators the various WMI scripting techniques and manageability capabilities of this new Windows Server 2003 platform. Illustrated with hundreds of scripts and detailed tables, the book explained the underlying technology and how WMI can be put to work. Lissoir focused not only on WMI programming aspects for developers but on how administrators can use what is available in Windows for their admin work. If you've had significant WMI experience, or have read Lissoir's first book, you are ready to apply your WMI knowledge to any technology that interfaces with WMI. Leveraging WMI Scripting continues the presentation of WMI begun in Understanding WMI Scripting. In this new volume, we dive deeper into WMI to understand the manageable entities of the Windows world. Lissoir offers a structured description of the most important WMI providers available from Windows NT 4.0 to Windows Server 2003 (including Windows 2000 and Windows XP). This covers the WMI management of the Windows Registry, Active Directory, SNMP, the Resultant Set Of Policies (RSOP), and the Volume Shadow Service to name a few. This discussion leverages the information on building real-world scripted management solutions presented in Lissoir's first book. Like the first volume, Leveraging WMI Scripting is based on an important concept: "learning by practice." Leveraging WMI Scripting addresses the most advanced topics so that you can exploit the features of various WMI interfaces to manage the components in a real-world environment. WMI is a critical topic under Windows Server 2003, so this book provides real added value to every Windows administrator.

Table of Contents

Foreword                                           xv
Preface xvii
Some Useful Scripts xxi
Acknowledgments xxiii
List of Figures xxix
List of Samples xxxvii
List of Tables xlvii
The Windows WMI Providers Discovery 1 (28)
Objective 1 (1)
The WMI provider types 1 (7)
WMI providers discovery 8 (12)
Helpers for the discovery 20 (7)
Summary 27 (2)
The Win32 Providers 29 (182)
Objective 29 (1)
The Win32 providers 29 (2)
Computer system hardware classes 31 (74)
Input device classes 31 (2)
Mass storage classes 33 (7)
Motherboard, controller, and port 40 (9)
classes
Networking device classes 49 (25)
Power device classes 74 (3)
Modem device classes 77 (5)
Printing device classes 82 (14)
Video and monitor classes 96 (9)
Operating System classes 105 (104)
COM component classes 105 (8)
Desktop information classes 113 (9)
Driver classes 122 (2)
File system classes 124 (15)
Page file classes 139 (7)
Multimedia audio/visual class 146 (1)
Networking classes 147 (7)
Operating System settings classes 154 (17)
Process classes 171 (12)
Registry class 183 (1)
Job scheduler classes 183 (8)
Service classes 191 (6)
Share classes 197 (4)
Start menu classes 201 (1)
User account classes 202 (7)
Summary 209 (2)
The WMI Providers 211 (318)
Objective 211 (1)
The WMI providers 211 (2)
Core OS components providers 213 (106)
The WBEM provider 213 (5)
NT Event Log providers 218 (6)
Registry providers 224 (17)
Session providers 241 (5)
Kernel Job providers 246 (5)
TrustMon provider 251 (7)
Windows Proxy provider 258 (2)
Windows Product Activation provider 260 (7)
Windows Installer provider 267 (14)
Resultant Set of Policies (RSOP) 281 (28)
providers
The System Restore provider 309 (10)
Core OS components event providers 319 (10)
The Clock provider 319 (4)
Power management provider 323 (2)
Shutdown provider 325 (1)
Configuration Change provider 326 (2)
Volume Change event provider 328 (1)
Core OS file system components providers 329 (43)
Disk quota provider 329 (15)
DFS provider 344 (8)
Shadow Copy providers 352 (20)
Active Directory components providers 372 (33)
Active Directory Service providers 372 (6)
Creating and updating objects in Active 378 (3)
Directory
Searching in Active Directory 381 (2)
Monitoring Active Directory group 383 (4)
memberships
Monitoring the FSMO roles 387 (4)
Debugging Active Directory providers 391 (3)
Active Directory Replication provider 394 (11)
Network components providers 405 (81)
Ping provider 405 (7)
Network Diagnostic provider 412 (3)
IP routing provider 415 (8)
DNS provider 423 (27)
SNMP providers 450 (4)
Accessing SNMP data 454 (9)
Accessing SNMP private MIB information 463 (4)
Organizing the SNMP data access 467 (4)
Receiving SNMP traps 471 (9)
Sending SNMP commands 480 (5)
Debugging SNMP providers 485 (1)
Performance providers 486 (22)
High-performance providers 486 (16)
Performance Monitoring provider 502 (6)
Helper providers 508 (18)
The View provider 508 (9)
The Forwarding consumer provider 517 (8)
The Event Correlator providers 525 (1)
Summary 526 (1)
Useful Internet URLs 527 (2)
WMI Security Scripting 529 (212)
Objective 529 (1)
The WMI security configuration 529 (7)
The WMI connection security settings 530 (1)
The group membership 530 (6)
WMI and Active Server Page (ASP) 536 (8)
Authentication settings 536 (3)
Customizing IIS 5.0 and above 539 (5)
WMI security descriptor management 544 (7)
The security descriptor WMI 544 (2)
representation
How to access the security descriptor 546 (1)
The security descriptor ADSI 547 (2)
representation
Which access technique to use? Which 549 (2)
security descriptor representation do
we obtain?
The WMI Security provider 551 (5)
Connecting to the manageable entities 556 (29)
Connecting to file and folder security 562 (1)
descriptors
Connecting to files and folders with WMI 562 (3)
Connecting to files and folders with 565 (2)
ADSI
Connecting to file system share 567 (1)
security descriptors
Connecting to file system shares with 567 (2)
WMI
Connecting to file system shares with 569 (2)
ADSI
Connecting to Active Directory object 571 (1)
security descriptors
Connecting to Active Directory objects 571 (2)
with WMI
Connecting to Active Directory objects 573 (2)
with ADSI
Connecting to Exchange 2000 mailbox 575 (1)
security descriptors
Connecting to Exchange 2000 mailbox 576 (2)
security descriptor with WMI
Connecting to Exchange 2000 mailbox 578 (1)
security descriptor with ADSI
Connecting to Exchange 2000 mailbox 579 (2)
security descriptor with CDOEXM
Connecting to registry keys security 581 (1)
descriptor
Connecting to registry keys with WMI 581 (1)
Connecting to registry keys with ADSI 581 (2)
Connecting to CIM repository namespace 583 (1)
security descriptors
Connecting to CIM repository namespaces 583 (2)
with WMI
Connecting to CIM repository namespaces 585 (1)
with ADSI
Accessing the security descriptor set on 585 (18)
manageable entities
Retrieving file and folder security 585 (1)
descriptors
Retrieving file and folder security 585 (2)
descriptors with WMI
Retrieving file and folder security 587 (5)
descriptors with ADSI
Retrieving file system share security 592 (1)
descriptors
Retrieving file system share security 592 (1)
descriptors with WMI
Retrieving file system share security 593 (1)
descriptors with ADSI
Retrieving Active Directory object 594 (1)
security descriptors
Retrieving Active Directory object 594 (2)
security descriptors with WMI
Retrieving Active Directory object 596 (1)
security descriptors with ADSI
Retrieving Exchange 2000 mailbox 597 (1)
security descriptors
Retrieving Exchange 2000 mailbox 597 (1)
security descriptors with WMI
Retrieving Exchange 2000 mailbox 598 (1)
security descriptors with ADSI
Retrieving Exchange 2000 mailbox 599 (1)
security descriptors with CDOEXM
Retrieving registry key security 600 (2)
descriptors with ADSI
Retrieving CIM repository namespace 602 (1)
security descriptors with WMI
Creating a default security descriptor 603 (4)
The security descriptor conversion 607 (4)
Deciphering the security descriptor 611 (8)
Deciphering the WMI security descriptor 611 (5)
representation
Deciphering the ADSI security 616 (3)
descriptor representation
Deciphering the security descriptor 619 (72)
components
Deciphering the Owner and Group 619 (1)
properties
Deciphering the security descriptor 620 (5)
Control Flags
Deciphering the Access Control Lists 625 (1)
Deciphering the Access Control Entries 626 (1)
Deciphering the ACE Trustee property 627 (1)
Deciphering the ACE Type property 627 (5)
Deciphering the ACE Flags property 632 (3)
Deciphering the ACE FlagType property 635 (2)
Deciphering the ACE AccessMask property 637 (1)
The files and folders ACE AccessMask 637 (7)
property
The File System share ACE AccessMask 644 (4)
property
The Active Directory object ACE 648 (32)
AccessMask property
The Exchange 2000 mailbox ACE 680 (4)
AccessMask property
The registry key ACE AccessMask property 684 (3)
The CIM repository namespace ACE 687 (4)
AccessMask property
Modifying the security descriptor 691 (24)
Updating the security descriptor Owner 691 (3)
Updating the security descriptor Group 694 (2)
Updating the security descriptor 696 (3)
Control Flags
Adding an ACE 699 (1)
Adding an ACE in the ADSI object model 699 (2)
Adding an ACE in the WMI object model 701 (2)
Removing an ACE 703 (1)
Removing ACE in the ADSI object model 703 (4)
Removing ACE in the WMI object model 707 (3)
Reordering ACEs 710 (1)
Reordering ACEs in the ADSI object model 711 (2)
Reordering ACEs in the WMI object model 713 (2)
Updating the security descriptor 715 (16)
Updating file and folder security 715 (1)
descriptors
Updating file and folder security 715 (3)
descriptors with WMI
Updating file and folder security 718 (1)
descriptors with ADSI
Updating File System share security 719 (1)
descriptors
Updating share security descriptors 719 (1)
with WMI
Updating share security descriptors 720 (1)
with ADSI
Updating Active Directory object 721 (1)
security descriptors
Updating Active Directory object 721 (2)
security descriptors with WMI
Updating Active Directory object 723 (1)
security descriptors with ADSI
Updating Exchange 2000 mailbox security 724 (2)
descriptors
Updating Exchange 2000 mailbox security 726 (1)
descriptors with WMI
Updating Exchange 2000 mailbox security 727 (1)
descriptors with ADSI
Updating Exchange 2000 mailbox security 728 (1)
descriptors with CDOEXM
Updating registry key security 729 (1)
descriptors with ADSI
Updating CIM repository namespace 730 (1)
security descriptors with WMI
How WMI scripters are affected by the 731 (7)
Microsoft security push
Asynchronous scripting 732 (3)
How the lockdown mechanism of Windows 735 (2)
Server 2003 works
Setting the security descriptor of a 737 (1)
CIM repository namespace
The ADSI WMI Extension 737 (1)
The Windows Authorizations Access Group 738 (1)
(WAAG)
Summary 738 (3)
The Optional Windows Components and 741 (120)
Application WMI Providers
Objective 741 (1)
WMI and some additional Windows services 741 (35)
Network Load-Balancing service 741 (6)
Cluster service 747 (2)
Terminal Server service 749 (3)
The Terminal Server configuration 752 (3)
The Terminal Server connections 755 (1)
configuration
Enabling/disabling the Terminal Server 755 (1)
connections
The Terminal Services remote control 756 (1)
settings
The Terminal Services network adapter 757 (2)
and connection limit settings
The Terminal Services encryption and 759 (1)
authentication settings
The Terminal Services client settings 760 (4)
The Terminal Services environment 764 (2)
settings
The Terminal Services connection logon 766 (2)
settings
The Terminal Services connection 768 (2)
session settings
The Terminal Services connection 770 (1)
permissions settings
Windows Driver Model provider 771 (5)
WMI and some (server) products 776 (33)
Internet Information Server provider 776 (9)
Exchange 2000 785 (1)
The Routing Table provider 786 (3)
The Queue provider 789 (5)
The Cluster provider 794 (1)
The Message Tracking Logs provider 794 (6)
The DSAccess provider 800 (2)
SQL Server 2000 802 (7)
WMI and some Windows applications 809 (4)
Microsoft Office 809 (2)
Internet Explorer 811 (2)
WMI and some Enterprise Management 813 (30)
software
Insight Management Agents 814 (10)
Microsoft Operation Manager 824 (1)
HP OpenView Operations for Windows 825 (18)
WMI and the .NET Framework 843 (15)
The .NET Framework WMI information 844 (2)
access
Accessing WMI information from Visual 846 (4)
Studio.NET
Accessing WMI information from a .NET 850 (8)
language
Summary 858 (1)
Useful Internet URLs 858 (3)
A Look Into the Future of WMI Scripting 861 (6)
The .NET Framework and scripting 862 (2)
Windows scripting environments 864 (1)
Final thoughts 865 (2)
Appendix 867 (22)
Index 889