{"id":35552,"date":"2019-10-15T19:54:59","date_gmt":"2019-10-15T15:54:59","guid":{"rendered":"https:\/\/www.msp360.com\/resources\/?p=35552"},"modified":"2023-09-25T14:51:31","modified_gmt":"2023-09-25T10:51:31","slug":"remote-automation-tools","status":"publish","type":"post","link":"https:\/\/www.msp360.com\/resources\/blog\/remote-automation-tools\/","title":{"rendered":"Tips and Tricks for Remote Access Scripting and Automation Tools"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Remote access scripting and automation tools are making life easier than ever for managed service providers and network administrators alike. Access to client PCs and servers from an outside location changes the landscape of the world of support for providers everywhere.<\/span><!--more--><\/p>\n<p><span style=\"font-weight: 400;\">Along with all the potential for active support that <a href=\"https:\/\/www.msp360.com\/solutions\/remote-access\/\">remote access<\/a> brings, the automated features stand out as well. Instead of needing to update settings or pass updates to each device individually, scripting and automation tools have the power to push these through without an active connection from a network technician.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">PowerShell is a tool used to send many different types of automation commands from a central source. Group policy allows for broad settings changes on individual devices or across an entire network. Windows Server Update Services (WSUS for short) offers a way to organize and push out operating system updates in a controlled manner.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Here's an overview of the benefits of automated scripting and a breakdown of how each of these pieces work.\u00a0<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Why You Need to Start Scripting?<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Scripting has brought many different benefits to both network support personnel and end-users. Network administrators and managed service providers are able to get more work done than they would be able to do manually. They are also able to simplify processes. For their part, end users can <a href=\"https:\/\/www.msp360.com\/resources\/blog\/rto-vs-rpo-difference\/\">limit downtime<\/a>, because updates and settings changes can be pushed through at the most convenient times.<\/span><\/p>\n<ul>\n<li><b>Complete more tasks in less time. <span style=\"font-weight: 400;\">Manual processes involve support personnel connecting to each device individually and pushing through updates or making settings changes by hand. Thanks to remote scripting tools, these changes can be pushed to multiple devices at once. Rather than having to work off of each individual device, technicians can run all of these scripts from one central server.\u00a0<\/span><\/b><\/li>\n<li><b>Uniformity throughout your network. <span style=\"font-weight: 400;\">Creating uniformity throughout your network guarantees easier troubleshooting and simplicity in shared information. Rather than have to trust technicians to complete the same processes in a uniform way over and over again, one script can execute identical commands on each of your devices so that uniformity is guaranteed throughout the network. Tools are also available to verify existing configurations.<\/span><\/b><\/li>\n<li><b>Off-hour unattended processing. <span style=\"font-weight: 400;\">Even when it\u2019s scheduled, system downtime can seriously affect a business's performance. Scripting can be easily run at the most convenient times for a business, so that downtime is limited. Furthermore, scripts can be scheduled to run in advance. This way, there is no need for a technician to be available late into the night or on weekends to push scripts through.<\/span><\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Having <a href=\"https:\/\/www.msp360.com\/resources\/blog\/the-benefits-of-remote-support\/\">remote access to individual devices is the first level of benefits<\/a> of this technology. Being able to run scripts to automate processes takes things to a totally different level.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">PowerShell<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Powershell is a tool that can be used to send commands and tasks from a server to client PCs throughout a network. <a href=\"https:\/\/www.msp360.com\/resources\/blog\/top-10-powershell-commands\/\">Powershell offers an array of different<\/a> commands, providing a good amount of control to administrators. Following are some best practices for using PowerShell, and a few of the best commands to know. (Also check out our article about <a href=\"https:\/\/www.msp360.com\/resources\/blog\/powershell-vs-cmd-the-difference-explained\/\">PowerShell vs CMD<\/a> difference for more information.)<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Best Practices<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">As with any networking tool, there are a few different rules to follow to make sure that you are actively harnessing the effects of PowerShell. Here are three best practices to follow.\u00a0<\/span><\/p>\n<ul>\n<li><b>Have a good understanding before you start. <span style=\"font-weight: 400;\">PowerShell is very powerful. It\u2019s important to know what you are doing before you start writing or debugging PowerShell scripts. If you aren\u2019t sure how to use PowerShell properly, enlist the help of someone who does.<\/span><\/b><\/li>\n<li><b>Use Get-Help as much as possible. <span style=\"font-weight: 400;\">This PowerShell command displays a list of options for each command in PowerShell. If you are stumped on how to use a command, Get-Help may be able to get you there.<\/span><\/b><\/li>\n<li><b>Add plenty of comments. <span style=\"font-weight: 400;\">When writing scripts to be run later, add plenty of comments so that others who may use your script later have a good understanding of what your script is meant to do. This way, a good script can be passed on and remain usable into the future.<\/span><\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">This is just a start. Before diving too deep into writing PowerShell scripts, do some research so that you are able to get the most out of it.<\/span><\/p>\n<p><span class=\"further-reading \">Further reading<\/span> <a href=\"https:\/\/www.msp360.com\/resources\/blog\/powershell-remote-alerts-for-firewall\/\">PowerShell Remote Alerts for Firewall<\/a><\/p>\n<h3><span style=\"font-weight: 400;\">Essential Commands<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">PowerShell can be used in two different ways: Via written scripts, or via a command-line interface. When issuing commands directly from the command line, here are a few tools to use to make things simpler:<\/span><\/p>\n<ul>\n<li><b>Get-Service - <span style=\"font-weight: 400;\">Displays all of the services running on the desired machine and their status.<\/span><\/b><\/li>\n<li><b>Get-EventLog - <span style=\"font-weight: 400;\">Displays the event log for the target machine. Helpful for researching or troubleshooting any issues that arise.<\/span><\/b><\/li>\n<li><b>Get-History - <span style=\"font-weight: 400;\">Displays all of the commands run during the current session. It also shows the status and runtime of each command.<\/span>\u00a0<\/b><\/li>\n<li><b>Copy-Item -<span style=\"font-weight: 400;\"> Used for making copies of items. This command can be used for copying files and folders.<\/span><\/b><\/li>\n<li><b>Get-Content - <span style=\"font-weight: 400;\">Used for reading the content within files. Very useful if you need to find out what's in a specific document.\u00a0<\/span><\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">These are just a few of the many commands that can be used. It\u2019s a good idea to have a good understanding of how most of the PowerShell commands work before utilizing it as a tool.<\/span><\/p>\n<p><span class=\"further-reading \">Further reading<\/span> <a href=\"https:\/\/www.msp360.com\/resources\/blog\/top-10-powershell-commands\/\"><span style=\"font-weight: 400;\">Top 10 PowerShell Commands Every IT Admin Should Know<\/span><\/a><\/p>\n<div class=\"call-to-action\">\n<div class=\"call-to-action__left\" style=\"width: 45%;\">\n<p><img decoding=\"async\" src=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2019\/07\/CloudBerry-Remote-Assistant-icon.png\" alt=\"RA icon\" \/><\/p>\n<p style=\"text-align: center;\"><!--HubSpot Call-to-Action Code --><span class=\"hs-cta-wrapper hs-cta-deferred\" id=\"hs-cta-wrapper-325bf518-e428-4b62-895a-4189e7f74314\" data-portal=\"5442029\" data-id=\"325bf518-e428-4b62-895a-4189e7f74314\"><span class=\"hs-cta-node hs-cta-325bf518-e428-4b62-895a-4189e7f74314\" id=\"hs-cta-325bf518-e428-4b62-895a-4189e7f74314\"><!--[if lte IE 8]><div id=\"hs-cta-ie-element\"><\/div><![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/5442029\/325bf518-e428-4b62-895a-4189e7f74314\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"hs-cta-img\" id=\"hs-cta-img-325bf518-e428-4b62-895a-4189e7f74314\" style=\"border-width:0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/5442029\/325bf518-e428-4b62-895a-4189e7f74314.png\" alt=\"CTA\"><\/a><\/span><\/span><!-- end HubSpot Call-to-Action Code --><\/p>\n<\/div>\n<div class=\"call-to-action__right\" style=\"width: 55%;\">\n<div class=\"call-to-action__title\">MSP360 Managed Remote Desktop<\/div>\n<div class=\"call-to-action__text\">\n<p>Feel free to test-drive our new MSP360 Managed Remote Desktop oriented towards Managed Service Providers<\/p>\n<ul>\n<li>Extensive management capabilities<\/li>\n<li>New Statistics page<\/li>\n<li>Deploy Helper feature<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<h2><span style=\"font-weight: 400;\">Group Policy<\/span><\/h2>\n<p id=\"last\"><span style=\"font-weight: 400;\">Group Policy offers administrators another way to make settings and configuration changes for the entire network off of a central server. Although this tool is most effective when managed through Active Directory, every Windows PC has its own Group Policy interface, which allows it to be used on individual computers as well.<\/span><\/p>\n<div id=\"slidebox\"><a class=\"close\">\u00a0<\/a><!--HubSpot Call-to-Action Code --><span class=\"hs-cta-wrapper hs-cta-deferred\" id=\"hs-cta-wrapper-79b6ff0d-42a9-4545-b559-d70d2e8731f2\" data-portal=\"5442029\" data-id=\"79b6ff0d-42a9-4545-b559-d70d2e8731f2\"><span class=\"hs-cta-node hs-cta-79b6ff0d-42a9-4545-b559-d70d2e8731f2\" id=\"hs-cta-79b6ff0d-42a9-4545-b559-d70d2e8731f2\"><!--[if lte IE 8]><div id=\"hs-cta-ie-element\"><\/div><![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/5442029\/79b6ff0d-42a9-4545-b559-d70d2e8731f2\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"hs-cta-img\" id=\"hs-cta-img-79b6ff0d-42a9-4545-b559-d70d2e8731f2\" style=\"border-width:0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/5442029\/79b6ff0d-42a9-4545-b559-d70d2e8731f2.png\" alt=\"CTA\"><\/a><\/span><\/span><!-- end HubSpot Call-to-Action Code --><\/div>\n<h3><span style=\"font-weight: 400;\">Best Practices<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Just like with PowerShell, there is a list of best practices to be used when working with Group Policy. If you are new to Group Policy, here\u2019s a good place to start.<\/span><\/p>\n<ul>\n<li><b>Use descriptive names for policies that you create. <span style=\"font-weight: 400;\">Not only do you need to be able to remember what your policies were meant for - you need other administrators to have an understanding of each policy as well. Use names that will describe each policy\u2019s purpose.<\/span><\/b><\/li>\n<li><b>Implement change policies throughout your organization. <span style=\"font-weight: 400;\">Have a written policy that is followed by all of the administrators on your network. Technicians should have an understanding of your policies so that everyone is on the same page.<\/span><\/b><\/li>\n<li><b>Make good backups before implementing changes. <span style=\"font-weight: 400;\">Group Policy is a powerful tool. If the wrong changes are made, entire operating systems could be corrupted. Make sure that everything is backed up properly before making any changes.<\/span><\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">A common theme here is proper documentation and preparedness. Neither of these are overtly technical concepts. Common sense practices will help you now, and into the future.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Settings to Know<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Administrators can use Group Policy to take greater control of the network that they administer. Here are the top settings changes to make the best use of the tools available.<\/span><\/p>\n<ul>\n<li><b>Lockdown control panel access. <span style=\"font-weight: 400;\">You don\u2019t want non-technical users to be able to access all of the settings that the Control Panel offers. Restrict access to only the control panel items that the users need.<\/span><\/b><\/li>\n<li><b>Force users to use secure passwords. <span style=\"font-weight: 400;\">Group Policy can be used to create password requirements to better secure your network. This includes policies for complexity and minimum password length.\u00a0<\/span><\/b><\/li>\n<li><b>Disable the Guest account. <span style=\"font-weight: 400;\">The Guest account is a vulnerability on any PC. Although access to it is limited by default, it is still a gateway to the operating system. Group Policy can be used to disable access to this account.<\/span><\/b><\/li>\n<li><b>Disable command prompt access. <span style=\"font-weight: 400;\">Users who don't know what they are doing should not be granted access to the command prompt. So, in a general user environment, command prompt access should be disabled within Group Policy.<\/span><\/b><\/li>\n<li><b>Change the administrator account name. <span style=\"font-weight: 400;\">Hackers trying to access the administrative levels of a PC will try to do so by logging in as the local administrator. To make this harder for them to do, you can use Group Policy to change the administrator account name. This way, infiltrators won't be able to log in without knowing this information first.<\/span><\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Group Policy is easier to figure out than PowerShell but is equally as effective. Because of this, administrators should have a good understanding of the best practices and recommended settings changes.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">WSUS<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">WSUS, or Windows Server Update Services, is a service and software package designed to make updates and patch distribution more manageable for administrators. Here is an overview of what WSUS is and some best practices for WSUS management.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">What is WSUS?<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Windows Server Update Services is typically run from a domain controller. WSUS is used to download and push all operating system updates from a central location. There are also a number of different features that it offers. Here\u2019s what to know about it:<\/span><\/p>\n<ul>\n<li><b>It\u2019s a central repository for updates. <span style=\"font-weight: 400;\">With WSUS, rather than having individual PCs downloading updates and using up valuable bandwidth, all of your updates can be downloaded to a central server and redistributed from there. This also means that updates can be kept uniform throughout your network.<\/span><\/b><\/li>\n<li><b>Schedule updates for the right times. <span style=\"font-weight: 400;\">Rather than running updates as they are discovered and slowing down the network during inconvenient times, updates can be scheduled for off-hours when network usage is at a minimum. Additionally, non-essential updates can be postponed until they have been tested thoroughly.\u00a0<\/span><\/b><\/li>\n<li><b>Keep a record of the history of your updates for your entire network. <span style=\"font-weight: 400;\">Every once in a while, updates can go awry. It\u2019s a good policy to keep a record of which updates cause issues. This way, it\u2019s much easier to respond. If needed, update rollbacks can be managed from the WSUS interface as well.<\/span><\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">WSUS may seem simple, but it is a powerful tool for administrators. Having control of the update services on your network is a great way to manage what\u2019s going on with your network.\u00a0\u00a0<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">WSUS Best Practices<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">There are a number of best practices to consider with WSUS. Here are three of the most important.<\/span><\/p>\n<ul>\n<li><b>Push through security patches swiftly. <span style=\"font-weight: 400;\">While non-essential updates can be scheduled at times with limited network activity and after a little bit of testing has been completed, security updates work differently in some cases. Patching security holes is faster and more efficient than ever. Administrators will be able to trust that the most important updates have been pushed on to each and every device in their network.<\/span><\/b><\/li>\n<li><b>Decline all superseded updates. <span style=\"font-weight: 400;\">Sometimes, multiple updates are put out back-to-back, with one patching another\u2019s mistake. WSUS gives administrators the option to bypass updates that have already been superseded - avoiding the potential of passing on bad updates to client devices.\u00a0<\/span><\/b><\/li>\n<li><b>Take advantage of the WSUS Server Cleanup Wizard. <span style=\"font-weight: 400;\">As updates are downloaded to the server, space and resources are used. The WSUS Server Cleanup wizard is effective in deleting older updates from your system to free space and resources.<\/span><\/b><\/li>\n<li>WSUS best practices are a little easier to comprehend and follow compared to PowerShell and Group Policy. Because of this, WSUS is a great way for first-time administrators to start using remote automation tools to manage their network.<\/li>\n<\/ul>\n<h2><span style=\"font-weight: 400;\">Conclusion<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Remote access scripting and automation tools are a very effective way for network administrators and managed service providers to take control of their networks in an efficient manner. Reducing the amount of time and effort it takes to push out updates, issue commands, and change settings for network devices will in turn make network administration more cost-effective. When these cost savings are passed on to those managing and using the network, everyone benefits.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Remote access scripting and automation tools are making life easier than ever for managed service providers and network administrators alike. Access to client PCs and servers from an outside location changes the landscape of the world of support for providers everywhere.<\/p>\n","protected":false},"author":75,"featured_media":44406,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[889,878],"tags":[916],"class_list":["post-35552","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-msp-business-guides","category-msp-university","tag-remote-access-overview-benefits-and-best-practices"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/35552","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/users\/75"}],"replies":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/comments?post=35552"}],"version-history":[{"count":1,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/35552\/revisions"}],"predecessor-version":[{"id":56280,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/35552\/revisions\/56280"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/media\/44406"}],"wp:attachment":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/media?parent=35552"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/categories?post=35552"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/tags?post=35552"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}