0
vote

Install SCCM client

we have a bunch of machines where SCCM Agent is missing or damaged and we want to use our package to (re-) install the sccm Agent. There is an install.cmd and the source (around 274MB) ...

Read More

1
vote
approved

Find OS Version

query machine(s) to determine what OS version they are running (ie Windows 10 Enterprise 1709, revision 820) https://www.morgantechspace.com/2017/09/how-to-find-windows-os-version-using-powershell.html ...

Read More

1
vote
completed

Software usage report

Is it possible to create an instruction to enter an application name and it’s .exe file to see when it was installed and when it was last launched? ...

Read More

2
votes

System Performance Monitoring

Organizations want to be able to monitor CPU utilization and other key performance criteria over time – similar to a perfmon system summary over a period of time (say 5 300 seconds). This allows the IT help desk to check performance of system ...

Read More

1
vote
approved

Profile folder size

Is there a way to get a report on the current folders size which resides in the local user profile like Desktop, Pictures, Videos, Downloads, Music. I already have an similar existing instruction but I couldn’t extend it to multiple folders. Th ...

Read More

0
vote

Basic Visualization

As part of the heartbeat process, send back more information about the machines that are only and provide a basic “fleet wide” dashboard upon Tachyon login. Either set items, or admin select queries. Items like a aggregated user health sc ...

Read More

0
vote

Tachyon Self Service

Create a role in Tachyon that let’s users see their own machines, and allows them to run a certain set of instructions on those machines, like clean up, repair, etc. Also include on the landing page system performance indicators per system with ...

Read More

0
vote

Activity record centralization and persistence.

During an attack, attackers may corrupt a file system, encrypt or delete files, including the Activity Record DB… thus rendering the use of this data to identify initial attack vector and the nature of the attack… what other devices did t ...

Read More

1
vote
completed

Search for all Scheduled Tasks

In response to the recent Windows 10 Task Scheduler zero-day vulnerability, we are looking for an instruction to query all pcs for Scheduled Tasks and date created. We could then run an Action to delete X task.   ...

Read More

1
vote
completed

Skype For Business Network Assessment Tool Deploy and Run-With Reboot Suppress

Scenario: Microsoft provides a tool which will assess the network for throughput, packet loss and jitter. It is intended to verify the network readiness and suitability for use with Skype for Business. This information is useful in making deployment ...

Read More