Uses WMIC to get BIOS Info, writes it to a file and retrieves the file to the system's GetFile() folder and writes an entry to the Agent Procedure log with the detected BIOS Info.
Audit BOOT.INI
Audits contents of C:\BOOT.INI if it exists, writes an entry to the Agent Procedure log, and retrieves a copy of BOOT.INI to the system's GetFile() folder.
Audit Files (Any File Types Entered)
Searches for all files by using a set of file masks you enter when scheduling the procedure and creates a simple TXT log file and CSV file based on file names you also enter that listi the files found with full path/filename, date and time last accessed, size in bytes, owner and filename.
Output files are created in the #agenttemp# folder defined in Step 1.
The TXT log file name is defined by the #logfile# variable in Step 2.
The CSV file name is defined by the #csvfile# variable in Step 3.
The file masks are defined by the #filemasks# variable in Step 4.
Both output files are uploaded to the Kaseya server for review and anaysis under that machines profile Documents folder.
The TXT log file is additionally written to the script log for reporting.
This script can support alerts on file changes as well by altering Steps .
Audit Files (PST and OST)
Searches for all PST/OSTfiles by using a set of file masks and creates a simple TXT log file and CSV file listing of the files found with full path/filename, date and time last accessed, size in bytes, owner and filename.
Output files are created in the #agenttemp# folder defined in Step 1.
The TXT log file name is defined by the #logfile# variable in Step 2.
The CSV file name is defined by the #csvfile# variable in Step 3.
The file masks are defined by the #filemasks# variable in Step 4.
Both output files are uploaded to the Kaseya server for review and anaysis under that machines profile Documents folder.
The TXT log file is additionally written to the script log for reporting.
This script can support alerts on file changes as well by altering Steps .
Audit Internet Speed (WEB100CLT)
Uses the NDT client utility for Windows (web100clt.exe). Connects to the Public NDT Server you enter when running/scheduling the procedure (see http://e2epi.internet2.edu/ndt/ndt-server-list.html for a list of servers) and performs an Internet speed test (up/down) as well other network diagnostics. The output file (Internet_Speed.txt) is retrieved to the systems GetFile folder.
Audit IRPStackSize Registry Key
Audits the IRPStackSize value. Event Id 2011 can be caused by Anti-Virus and a number of other types of software. See http://support.microsoft.com/kb/177078.
Audit Local Admin Accounts
Logs the user accounts that are part of the Administrators group on the local machine to the Agent Procedure log.
Audit Local Guest Accounts
Log the user accounts that are part of the Guests group on the local machine to the Agent Procedure log. If accounts are reported, they are enabled.
Audit Local User Accounts
Log the user accounts defined on the machine to the Agent Procedure log.
Audit MP3 File Count
Counts the number of MP3 files on the C: drive of the machine and writes an entry in the Agent Procedure log indicating this number.
Audit Open and Listening TCP Ports
Audits open and listening TCP ports on Windows using NETSTAT and then retrieves the results to the systems GetFile folder
Audit PageFile Locations
Audits the PageFile locations on Windows machines and writes an entry to the Agent Procedure log with the information.
Audit Running Services (NET START)
Audits the currently started services on a Windows machine and retrieves the list of those services to the systems GetFile folder.
Audit Services (SC QUERY)
Uses SC QUERY to audit the list of Windows Services to a file and retrieves the file to the systems Get File folder.
Audit Services Registry Key
Use the REG command to query the HKLM\System\CurrentControlSet\Services registry key for an agent and retrieves the results to the systems GetFile folder.
Audit Uninstall Registry Key
Use the REG command to query the HKLM\Software\Microsoft\Windows\CurrentVersion\Uninstall registry key for the machine and retrieve the results to the systems GetFile folder.
Audit USB Plug-N-Play Devices
Uses a VBS and WMI (Win32_PnPEntity class) to audit the USB devices on a Windows machine. Results are retrieved to the systems GetFile folder.
Audit User Video Resolution
Uses a VBS to audit the current users video diaplay resolution setting. Writes the result to the Agent Procedure Log as well as to a Custom System Information Field called User Video Resolution.
Audit Windows Monitor Info
Uses a VBS and WMI (root\CIMV2:Win32_DesktopMonitor class) to audit Windows Monitor Information. Write output to a file and retrieves the file to the systems GetFile folder.
Audit Windows Monitor EDID Info
Uses a VBS with WMI to detect Monitor EDID information (Monitor Manufacturer, Monitor Model, and Monitor Serial Number) and write the detected information to the Agent Procedure log and to Custom System Info fields.
Core.1 Windows Procedures.Desktops.Auditing.Share and NTFS
Audit All Share Sessions and Users (NET SESSION)
Uses NET SESSION to dump a basic listing of the sessions to shares on an agent and uploads to Docs\Shares-NTFS folder so that files can be viewed via Documents function/machine summary tab.
Audit All Shared Files Opened and Users (NET FILE)
Uses NET FILE to dump a basic listing of the open files for all shares on an agent and uploads to Docs\Shares-NTFS folder so that files can be viewed via Documents function/machine summary tab.
Audit All Shares (NET SHARE)
Uses NET SHARE to dump a basic listing of the shares on an agent and uploads to Docs\Shares-NTFS folder so that files can be viewed via Documents function/machine summary tab.
Audit Effective User/Group Fldr Perms (ACCESSCHK)
Uses ACCESSCHK from Microsoft SysInternals to check the effective permissions of a local pc/domain based user/group object on a folder. Edit this script in Steps 2-6 for these variables:
pcdom = computername or domain name of the user or group usrgrp = username or group name to evaluate drive = drive letter where the folder exists folder = full path of the folder to be audited fldrdesc = a descriptive name for folder to audit (no special chars)
Audit Non-Admin Shares (SRVCHECK)
Uses SRVCHECK to dump a basic listing of the non-admin shares on an agent and uploads to Docs\Shares-NTFS folder so that files can be viewed via Documents function/machine summary tab.
Audit Shared Folders (DUMPSEC)
Uses DUMPSEC to create a report of all shares with their paths, accounts, owners and access permissions, and uploads to Docs\Shares-NTFS folder so that files can be viewed via Documents function/machine summary tab.
Audit Shared Folders and ACLs (VBS/WMI)
Uses a VBS with WMI to audit all local shares, share and NTFS permissions.
Audit Shared Printers (DUMPSEC)
Uses DUMPSEC to create a report of all printers with names, accounts, owners and access permissions, and uploads to Docs\Shares-NTFS folder so that files can be viewed via Documents function/machine summary tab.
Core.1 Windows Procedures.Desktops.Auditing.Share and NTFS.Audit Admin Shares
Audit Automatic Admin Shares
Uses NET SHARE to audit automatic admin shares like C$, etc. The results are retrieved to the systems Documents folder under a Share-NFTS subfolder.
Audit Automatic Admin Shares Setting
Based on the OS of the machine, checks for the existence and value of AutoShareServer or AutoShareWkst in the Windows Registry and writes an Agent Procedure log entry indicating whether this feature is enabled or disabled.
Core.1 Windows Procedures.Desktops.Machine Control.BIOS Management.Dell
Inventory Dell BIOS Settings via DCCU
Uses the Dell Client Configuration Utility (DCCU) to inventory the BIOS of a Dell business class machine. The results are retrieved to the systems Get File folder.
Set Dell BIOS Settings via DCCU
Sets Dell BIOS settings based on the setting and value supplied when scheduled. The format for the Dell BIOS setting supplied must be that used by the Dell Client Configuration Utility (DCCU).
Core.1 Windows Procedures.Desktops.Machine Control.BIOS Management.HP
HP BiosConfigUtility GetConfig
Uses the HP Bios Config Utility to inventory the BIOS of a HP business class machine. The results are retrieved to the systems Get File folder.
Core.1 Windows Procedures.Desktops.Machine Control.BIOS Management.Lenovo
Get Lenovo BIOS Settings via WMI-VBS
Uses VBS and WMI to get all BIOS Settings on Lenovo systems.
Set Lenovo BIOS Settings via WMI-VBS
Uses VBS and WMI to configure BIOS settings on Lenovo systems. Prompts for the Lenovo BIOS Setting name and value when run/scheduled.
Core.1 Windows Procedures.Desktops.Machine Control.File Sharing
Disable Simple File Sharing (Sets ForceGuest=0) on Windows XP
Disables the Simple File Sharing (Sets ForceGuest=0) feature on Windows XP systems and after doing so, stops and restarts the Server service so that the change goes into effect.
Enable Automatic Admin Shares
Enables AutoShareWks feature on Windows Workstations so that Admin Shares are automatically created when the Server service starts. This agent procedure does NOT restart the Server (lanmanserver) service.
Enable Simple File Sharing (Sets ForceGuest=1) on Windows XP
Enables the Simple File Sharing (ForceGuest=1) feature on Windows XP systems and after doing so, stops and restarts the Server service so that the change goes into effect.
Disable Automatic Admin Shares
Disables AutoShareWks feature on Windows Workstations so that Admin Shares are automatically created when the Server service starts. This agent procedure does NOT restart the Server (lanmanserver) service.
Core.1 Windows Procedures.Desktops.Machine Control.File System
Convert File System on Drive to NTFS
Convert the file system format on the system drive (i.e. the boot partition) to NTFS from FAT/FAT32. This only works on those operating systems which support NTFS (Windows NT4 / 2000 / XP / 2003 / Vista)
Delete Files Based on Modified Date
Prompts for the Age of Files to Delete, Full Drive\Path to Start delete operation, and a File Mask to be deleted. Then uses FORFILES to recursively process all folders in the Full Drive/Path entered deleting files matching the File Mask if they are older than the Age entered.
Core.1 Windows Procedures.Desktops.Machine Control.Networking.Block Websites
Block "Any" Website
This script will edit the windows hosts file and point any website that you enter in the prompt to localhost, essentially blocking access to the website from that endpoint. This can be useful to employers trying to improve productivity or just great for laughs.
Clear all blocked websites
Used to remove all windows hosts file edits. Refreshes the default hosts file settings.
Core.1 Windows Procedures.Desktops.Machine Control.Networking.Diagnostics
Network Diagnostics Test (NETSH)
Uses NETSH to perform a network diagnostic test and retrieves the results to the systems Documents folder under a Network Diags subfolder.
Core.1 Windows Procedures.Desktops.Machine Control.Networking.Network Connection
Configure Local Area Connection to Utilize DHCP
Uses NETSH to change the configuration of the Windows named network connection called "Local Area Connection" to utilize DHCP for its IP Address, DNS and WINS settings.
Uses IPCONFIG /ALL to get the IP Addressing Configuration of all enabled network connections on a Windows machine. The results are retrieved to the systems Get Files folder.
Release and Renew IP Address
Uses a batch file to release and renew a Windows machines IP address.
Core.1 Windows Procedures.Desktops.Machine Control.Networking.Wake-On-LAN.Dell
Enable Wake-On-LAN in Dell BIOS (DCCU)
Uses the Dell Client Configuration Utility (DCCU) to enable Wake-On-LAN within the BIOS of Dell business class machines.
Enable Wake-On-LAN in Dell BIOS (CCTK)
Uses the Dell Client Configuration Tool Kit (CCTK) to enable Wake-On-LAN within the BIOS of Dell business class machines.
Core.1 Windows Procedures.Desktops.Machine Control.Networking.Wake-On-LAN.HP
Enable Wake-On-LAN in HP BIOS
Uses the HP BIOS Configuration Utility to enable Wake-On-LAN within the BIOS of HP business class machines.
Core.1 Windows Procedures.Desktops.Machine Control.Networking.Wake-On-LAN.Lenovo
Enable Wake-On-LAN in Lenovo BIOS
Uses VBS and WMI to enable Wake-On-LAN within the BIOS of Lenovo business class machines.
Core.1 Windows Procedures.Desktops.Machine Control.Networking.Wake-On-LAN.Windows
Enable Wake-On-LAN In Windows for all NICs
Uses VBS to enable the Power Management Wake-On-LAN feature on each Windows network interface. This allows the machine to be woken via magic packet when hibernated or suspended. WOL features within the BIOS must also be enabled for WOL to work.
Core.1 Windows Procedures.Desktops.Machine Control.Networking.Wireless
Disable Wireless Networking Devices
Uses DEVCON.EXE to disable Wireless Networking Devices on a Windows system.
Enable Wireless Networking Devices
Uses DEVCON.EXE to enable Wireless Networking Devices on a Windows system.
Disable NIC on Wireless Network Connection
Uses NETSH to disable the NIC associated with the Windows named network connection called "Wireless Network Connection".
Enable NIC on Wireless Network Connection
Uses NETSH to enable the NIC associated with the Windows named network connection called "Wireless Network Connection".
Core.1 Windows Procedures.Desktops.Machine Control.Reboot/Shutdown
Hibernate Now
Causes a Windows machine to go into a hibernate state immediately.
Suspend Now
Causes a Windows machine to go into a suspend state immediately.
Shutdown Abort
Shutdown the computer using Shutdown.exe
Shutdown in 60 Seconds
Shutdown the computer using Shutdown.exe in 60 seconds
Lock Desktop
Causes a Windows machines desktop to lock requiring the currently logged on user credentials to unlock the desktop.
Core.1 Windows Procedures.Desktops.Machine Control.System Restore
List All System Restore Points
Uses WMIC to enumerate all System Restore Points and retrieves list to the systems Get File folder.
Enable System Restore on All Drives
Uses DISKPART to enumerate all local partitions and then feeds this list of drives into WMIC to disable System Restore on each volume. This will remove any existing System Restore Points.
Disable System Restore All Drives
Uses DISKPART to enumerate all local partitions and then feeds this list of drives into WMIC to disable System Restore on each volume. This will remove any existing System Restore Points.
Create a Named System Restore Point
Uses WMIC to create a System Restore Point
Core.1 Windows Procedures.Desktops.Machine Control.Trusted Sites
Add Trusted Sites
Runs a registry procedure on the machine to allow anything from the domain to run ActiveX. In this example it adds Kaseya.net.
Core.1 Windows Procedures.Desktops.Machine Control.USB/Disk Drive Control
Disable USB Drives
**Must reboot endpoint after making change via script** There is a simple registry change that will keep the USB storage drivers from starting when the system boots. Keeps people from walking up to a PC and copying data off with a USB key, but allows you to keep your scanner, keyboard, and mouse working.
As always – back your system up before messing around in the registry. Just open regedit and browse to this key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\UsbStor Notice the value ‘Start’ Switch this value to 4, and USB storage devices are disabled. Switch this value to 3, and USB storage devices are enabled.
Enable USB Drives
**Must reboot endpoint after making change via script** There is a simple registry change that will keep the USB storage drivers from starting when the system boots. Keeps people from walking up to a PC and copying data off with a USB key, but allows you to keep your scanner, keyboard, and mouse working.
As always – back your system up before messing around in the registry. Just open regedit and browse to this key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\UsbStor Notice the value ‘Start’ Switch this value to 4, and USB storage devices are disabled. Switch this value to 3, and USB storage devices are enabled.
Restricts access to the "Desktop" in Explorer. The "Desktop" will appear empty and users will not be able to use or access it.
Unrestrict Desktop Access
Enables access to the "Desktop" in Explorer.
Hide and Restrict Access to All Drives (A-Z) in Explorer
Uses NoViewOnDrive and NoDrives registry settings to hide and restrict access to all drive letters A-Z on a Windows machine.
Hide and Restrict Access to C and D Drives in Explorer
you can choose "Block C only" or "Block D only" or "Block all drives" with one of among "01.Block" procedures
Hide and Restrict Access to Any List of Drives in Explorer
you can choose "Block C only" or "Block D only" or "Block all drives" with one of among "01.Block" procedures
Unhide and Unrestrict Access to All Drives (A-Z) in Explorer
Removes previous drive access restrictions that may be in place.
Note: Windows supports the ability to block access to view various drive letters within Explorer. This restriction prevents users from using My Computer or Explorer to access the content of selected drives. Also, they cannot use Run, Map Network Drive, or the Dir command to view the directories on these drives. This Agent Procedure removes any restriction to that effect.
Core.1 Windows Procedures.Desktops.Machine Control.User Access Control
Set User Access Control (UAC) to Always Notify
Sets User Access Control to Always Notify in Windows Vista, Windows 7, and Windows 8.
Set User Access Control (UAC) to Default Notify
Sets User Access Control to Default Notify in Windows Vista, Windows 7, and Windows 8.
Set User Access Control (UAC) to Insecure Notify
Sets User Access Control to Insecure Notify in Windows Vista, Windows 7, and Windows 8.
Set User Access Control (UAC) to Never Notify
Disables User Access Control in Windows Vista, Windows 7, and Windows 8.
Core.1 Windows Procedures.Desktops.Machine Control.Windows Configuration
Hide an Account from Windows Fast User Switching Logon Screen
This script will add a DWORD value with the value of "support user" and data to 0. After a reboot, the PC will no longer display the "support user" at the welcome screen
Unhide an Account from Windows Fast User Switching Logon Screen
This script will add a DWORD value with the value of "support user" and data to 0. After a reboot, the PC will no longer display the "support user" at the welcome screen
Disable Show Hidden Operating System Files
Disables the Show Hidden Operating System Files option within Windows Explorer.
Enable Display the Contents of System Folders
Enables the Display Contents of System Folders option within Windows Explorer.
Enable Hide Extensions for Known File Types
Enables the Enable Hide Extensions for Known File Types option within Windows Explorer.
Enable Show Hidden Files and Folders
Enables the Show Hidden Files and Folders option within Windows Explorer.
Enforce Windows Minimum Password Length of 8 Characters
Forces Windows to reject passwords that do not meet a minimum password length. Useful to help stop people from using trivial passwords where security is an issue. Add a new REG_BINARY value of 'MinPwdLen', and set the data to the minimum number of characters required for a password to be accepted. The following example is 8. Note: This does not affect existing passwords, only new or changed.
Core.1 Windows Procedures.Desktops.Maintenance.Common Maintenance Tasks.Check Disk
Check Disk All Drives
Uses DISKPART to enumerate all local partitions and then feeds this list of drives into CHKDSK to repair each volume.
Check Disk System Drive (Schedule at Next Restart)
Executes a CHKDSK command on the system drive. The results of the maintenance are evaluated by the Check Disk Verify script.
Check Disk System Drive (Analysis Only)
Executes a CHKDSK command on the system drive. The results of the maintenance are evaluated, a log entry is written to the agent procedure log with the results, and the results are retrieved to the systems Get File folder.
Core.1 Windows Procedures.Desktops.Maintenance.Common Maintenance Tasks.Defragmentation
Defragment All Drives
Uses DISKPART to enumerate all local partitions and then feeds this list of drives into DEFRAG to optimize each volume. Retrieves DEFRAG results for all drives to the systems GetFile folder.
Defragment System Drive (Analysis Only)
Performs a defragmentation analysis on the system drive in Windows (usually C:). Defragmentation results are written to the agent procedure log.
Defragment Page File & Registry
Use PageDefrag utility from Sysinternals to defrag the system pagefile and registry and reboot (Windows XP only).
Defragment System Drive (Analysis & Prompt User If Reqd)
Performs a defragmentation analysis on the system drive in Windows (usually C:). Defragmentation results are written to the agent procedure log. If a user is logged onto the machine, then the procedure asks them if they want to run a full defragmentation on the drive and performs one if they answer yes.
Core.1 Windows Procedures.Desktops.Maintenance.Common Maintenance Tasks.Disk Cleanup
Windows Disk Cleanup
Sets the "sageset" registry entries for cleanmgr.exe and then executes cleanmgr.exe with the "sagerun" parameter to automatically clean files in the following locations: Active Setup Temp Folder Content Indexer Cleaner Downloaded Program Files Internet Cache Files Memory Dump Files Old ChkDsk Files Recycle Bin Remote Desktop Cache Files Setup Log Files Temporary Files Temporary Offline Files WebClient and WebPublisher Cache
Core.1 Windows Procedures.Desktops.Maintenance.Common Maintenance Tasks.Flush DNS
Flush DNS Resolver Cache
Flushes and resets the contents of the DNS client resolver cache by performing IPCONFIG /FLUSHDNS
Core.1 Windows Procedures.Desktops.Maintenance.Common Maintenance Tasks.IE Files Management
Clear Internet Explorer Cookies
Clears the Internet Explorer Cookies for the currently logged on user.
Clear Internet Explorer Form Data
Clears the Internet Explorer Form Data for the currently logged on user.
Clear Internet Explorer History
Clears the Internet Explorer History for the currently logged on user.
Clear Internet Explorer Passwords
Clears the Internet Explorer Passwords for the currently logged on user.
Clear Internet Explorer Temp Files
Clears the Internet Explorer Temporary Files for the currently logged on user.
Core.1 Windows Procedures.Desktops.Maintenance.Common Maintenance Tasks.System Restore
Create Weekly Desktop Maintenance System Restore Point
Uses WMIC to create a System Restore Point called Weekly Desktop Maintenance. This agent procedure can be called at the beginning of the Workstation Weekly Maintenance Procedure.
Core.1 Windows Procedures.Desktops.Maintenance.Common Maintenance Tasks.System Restore
Create Patch Management System Restore Point
Uses WMIC to create a System Restore Point called Patch Management. This agent procedure can be called prior to a patch deployment through a Automatic Update Pre-Agent Procedure.
Core.1 Windows Procedures.Desktops.Maintenance.Common Maintenance Tasks.TEMP Files
Clear User TEMP Folder
Deletes all files and folders within and below the logged on users %TEMP% folder that are not currently locked/open by Windows.
Core.1 Windows Procedures.Desktops.Maintenance.Common Maintenance Tasks.Time Sync
Synchronize Time via SNTP
Sets the windows clock to retrieve the time from time.windows.com
Core.1 Windows Procedures.Desktops.Maintenance.Desktop Maintenance
Workstation Weekly Maintenance
Executes all the Weekly Desktop Maintenance tasks, schedule this script to run during your maintenance window.
Core.1 Windows Procedures.Desktops.Maintenance.Maintenance Notifications
Weekly Desktop Maintenance Reminder
This script is designed to run in the daytime prior to desktop Patching maintenance. Will send a message to a desktop end user indicating they should leave their machine on overnight.
Core.1 Windows Procedures.Desktops.Software Control.Internet Explorer
Set Default Internet Explorer Home Page
Set Default Page on Internet Explorer. Just change the site in step 1.
Core.1 Windows Procedures.Desktops.Software Control.Windows Firewall
Disable Windows Firewall
Uses NETSH to disable the Windows Firewall
Core.1 Windows Procedures.Servers.Active Directory.AD Replication
Perform an AD Replication Check Using REPADMIN
Runs a Replication Check on Active Directory Services using teh REPADMIN utility. Sends results via email, you MUST update the email address to receive the results.
Core.1 Windows Procedures.Servers.Exchange.Exchange Best Practices Analyzer.Exchange 2003
ExBPA Report 2003 server
Designed for Exchange 2003. Uses the Exchange Best Practice Analyzer to create a report of any errors. MS Logparser 2.0 is then used to parse the results and email a final report to the email address of the admin that runs/schedules the agent procedure. The Exchange Best Practice Analyzer must be installed prior to using this agent procedure.
Core.1 Windows Procedures.Servers.Exchange.Exchange Best Practices Analyzer.Exchange 2007
ExBPA Report 2007 server
Designed for Exchange 2007. Uses the Exchange Best Practice Analyzer to create a report of any errors. MS Logparser 2.0 is then used to parse the results and email a final report to the email address of the admin that runs/schedules the agent procedure. The Exchange Best Practice Analyzer must be installed prior to using this agent procedure.
Core.1 Windows Procedures.Servers.IIS Server
Perform an IISRESET on IIS Server
Performs an IISReset on machine.
Core.1 Windows Procedures.Servers.Maintenance
Weekly Server Maintenance
Executes all the Weekly Desktop Maintenance tasks.
Core.1 Windows Procedures.Servers.Monitoring Remediation.Disk Usage
DiskUsage.GetDirTree.C-D-E-F-G-M-N
Returns disk usage on C, D, E, F, G, M and N Drives. Writes the disk usage tree results to the Agent Procedure Log. Drives that do not exist will not display any disk usage results.
Core.1 Windows Procedures.Servers.Monitoring Remediation.Get Process List
Performance.Get Process List
Uses kperfmon.exe to obtain the process list, CPU % and memory consumption. This script may be configured to execute when performance monitor counters raise an alarm. Writes results to Agent Procedure Log.
Core.1 Windows Procedures.Servers.Print Server
Clear Print Spooler Queues
Stops the Print Spooler, clears out queues and restarts the Print Spooler.
Core.1 Windows Procedures.Servers.Service Control Manager
Compile SCM
Recompiles the Service Control Manager to verify SCM events are logged to the system log.
Core.1 Windows Procedures.Servers.Terminal Server
Terminal Server - Logoff Disconnected Sessions
Logs off all disconnected sessions of a Terminal Server.