Custom default formats are often overlooked in the toolbox, but the good news is they’re easy to create. Jeremy will walk you through practical examples and guidance on when to use, or not use, this feature.
Searching for files in large data sets can be a real drag. It's like trying to find a needle in a haystack! How do you do that quickly?
While most Powershell problems are I/O bound, sometimes the limitation is memory. Mark will show the many ways that I/O can slow your PS scripts, using file filtering methods as examples. The overarching topic of this presentation is performance analysis.
Let's dive into different methods available for searching for files at scale using available tools/utilities. We'll discuss pros and cons and how to improve results to boost performance.
Data Arrays are a fundamental building block to work with and understand PowerShell yet working with arrays can sometimes be tricky especially when PowerShell provides more than one way to interact with them.
All native PowerShell cmdlets have what is called ‘Common Parameters’, which provides useful features like controlling error, informational, and verbose output. Understanding how this works is important when it comes time to write our own code that looks and acts like native PowerShell.
PowerShell has great error handling features to make your error handling seamless with the built in error handling. Done correctly, your error handling can make troubleshooting a breeze. So much so that users can troubleshoot their own issues. Beef up your scripts with these tips.
You should be using PSReadline as it provides for an totally customize experience in the PowerShell console Customizable key bindings, better syntax highlighting, console tones, and a awesome history file of what you entered into the console and it’s available for PowerShell version 3.0+.
Windows Event Logs… You know they contain a ton of useful information, but they aren’t exactly the easiest to search. Let’s face it, everyone can use some helpful pointers on how to efficiently search event logs! Join Phil Bossman as he shows you the ins and outs of Event Logs and tricks he has developed over the years to making searching “less painful”. You will leave this talk with the tools required to find that diamond in the rough, or that needle in the hay stack of Event Logs.
Dbatools is an open sourced PowerShell module designed to help Operational (and accidental) DBAs interact with Microsoft SQL Databases. With over 500 cmdlets (more than twice the number as the official Microsoft module), there is bound to be something for everyone.
You want to dip your toes in the cloud space, but it seems daunting and expensive regardless of the platform. In this session, I will identify the hard (and expensive) lessons I learned while leveling up myself in Microsoft Azure. We’ll start with creating a game plan to getting our hands dirty and identifying the gotcha’s along the way in an effort to keep your Azure spend down while you’re leveling up in this space and of course leveraging the Azure PowerShell module along the way.
Command line utilities are great. But they don’t follow PowerShell patterns. They don’t produce objects and they don’t support the pipeline. They output to the console and that’s the end of the line. Or is it? Learn how you can bring the benefits of PowerShell to your command line utilities.
If you can see it on the screen you can do it in PowerShell. But what if there isn’t a cmdlet or .NET class to do what you need? Interoperability is the answer! Learn how to extended your PowerShell skills to literally do anything you see on the computer screen.
The focus of this session will be on leveraging some well-known, and not-so well known, PowerShell modules to save time and mitigate risk when it comes to solving a scripting challenge.
Am I secure using PowerShell? How do I properly secure PowerShell and all of the protections that it has to offer? I’ll cover the basics and the more advanced approaches to doing things right AND safe!
Having the ability to run your code on multiple machines at once is one of the useful capabilities of PowerShell. Gone are the days of click, click, next, repeat x 10 servers. Enabling PowerShell remoting is the easy part, but how do you secure your environment to make your security friends happy?
Sysadmins and programmers have been divided for years, not just in job duties, but also organizationally, culturally, and philosophically. We will examine one systems administrator’s journey to see how they acquired some of the prerequisite skill sets and changed their mindset on the path to DevOps.
Are the security vulnerability scans the ban of your existence? Regulatory compliance audits have worried you the wrong random system will be scanned? Learn how PowerShell and SCCM can be combined to ensure once a vulnerability is fixed it stays fixed.
It’s no secret that incident response is a results-driven field, that is why I developed PowerShell - Rapid Response (PoSh-R2). The tool enables everyone in this demanding field to be able to gain the vital information they need across an Enterprise, using the capability they already have!
Pipelines are all the rage these days, but wtf are they even? I’ll walk you through what they are, how to set one up, and begin to leverage them for your evironment
PowerShell is one of the most versatile languages in use today and is being used beyond system administration. In today’s environment, the language is being used for defensive hunting, forensics, attacker reconnaissance, escalation, exfiltration, or lateral movement. This 6-hour training event will provide hands-on exposure to the aforementioned areas all from within PowerShell within the filesystem, Active Directory, Group Policy, and more! Walking away, you will be better postured to identify these tactics or use them for specific purposes without adding anything additional to the network.