PowerShell server connectivity quick check
A read-only connectivity triage script that separates DNS, ping, RDP, WinRM, and application-port failures before escalation.
Toolchest Topic
Reusable PowerShell and command starters for repeatable admin work.
Use this lane when you already understand the problem space and need the reusable operator asset, not just the concept page.
A read-only connectivity triage script that separates DNS, ping, RDP, WinRM, and application-port failures before escalation.
A read-only Windows Server snapshot for uptime, disk pressure, memory, stopped automatic services, and recent critical events.
A read-only pending reboot check for Windows servers before patching, application installs, or maintenance-window closure.
A read-only disk pressure report that finds likely cleanup candidates without deleting logs, caches, dumps, or user data.
A read-only certificate inventory for finding expiring Windows certificate-store items and endpoint certificates before outages.
A read-only IIS inventory for sites, app pools, bindings, host headers, ports, certificate thumbprints, and content paths.
A read-only local administrator audit that records privileged group membership across Windows endpoints for review.
A read-only file share audit that records SMB share permissions, NTFS access, and ownership evidence for review.
A read-only service account discovery pass for Windows services, scheduled tasks, and IIS application pools.
A read-only scheduled task inventory that highlights failed runs, missed runs, disabled tasks, and ownership gaps.
A read-only DHCP scope report that surfaces high utilization, exhausted ranges, and cleanup candidates.
A read-only Windows Firewall audit that records enabled allow rules, ports, profiles, and address scopes.
A read-only DNS audit that compares forward and reverse lookup results across host lists and expected DNS servers.
A read-only PowerShell inventory starter for collecting installed applications from local or remote Windows endpoints.
A read-only RDP triage script pattern for DNS, TCP 3389, listener state, firewall evidence, sessions, and event logs.
A read-only Active Directory stale computer report for last logon, OU, operating system, enabled state, and cleanup planning.
Collect non-replicated lastLogon values from every writable domain controller, calculate the newest observed logon per account, and export evidence suitable for stale-user or stale-computer cleanup decisions without relying on replicated lastLogonTimestamp alone.
PowerShell scanner that checks fixed local drives on Windows servers for root ACL entries where Authenticated Users have broad access. Produces console and CSV evidence so admins can review exposure before any ACL changes.
Read-only PowerShell reporting script pattern to identify likely Microsoft NPS or other RADIUS-capable Windows servers using multiple evidence sources: NPS service presence, NPAS role/feature state, IAS/NPS event log activity, UDP 1812/1813 listener evidence, and registry indicators. Designed for migration discovery, audit support, and authentication troubleshooting.