Book Image

Powershell Core 6.2 Cookbook

By : Jan-Hendrik Peters
Book Image

Powershell Core 6.2 Cookbook

By: Jan-Hendrik Peters

Overview of this book

This book will follow a recipe-based approach and start off with an introduction to the fundamentals of PowerShell, and explaining how to install and run it through simple examples. Next, you will learn how to use PowerShell to access and manipulate data and how to work with different streams as well. You will also explore the object model which will help with regard to PowerShell function deployment. Going forward, you will get familiar with the pipeline in its different use cases. The next set of chapters will deal with the different ways of accessing data in PowerShell. You will also learn to automate various tasks in Windows and Linux using PowerShell Core, as well as explore Windows Server. Later, you will be introduced to Remoting in PowerShell Core and Just Enough Administration concept. The last set of chapters will help you understand the management of a private and public cloud with PowerShell Core. You will also learn how to access web services and explore the high-performance scripting methods. By the end of this book, you will gain the skills to manage complex tasks effectively along with increasing the performance of your environment.
Table of Contents (14 chapters)

Accessing the Windows event log

Whenever things go sideways, or the operating system behaves in a way that was neither planned nor foreseeable, Windows administrators have grown accustomed to accessing the event log. Regrettably, many administrators are still using the graphical user interface for that.

The trade-off of a colorful UI, of course, is that it does not scale. How are you going to consolidate the event you are looking for on hundreds of servers? How can you efficiently parse the event log for that one piece of information hidden in some event? Why, by using PowerShell Core, of course.

This recipe will introduce you to the Get-WinEvent cmdlet and its filtering capabilities with a very typical task: parsing the security logs for one specific user logon.

Getting ready

...