You can use winexe commands to run commands on monitored Windows servers from within Zenoss.
Usage:
$ZENHOME/bin/winexe [options] //host [command]
| Options | Use |
|---|---|
| --uninstall | Uninstall winexe service after remote execution |
| --reinstall | Reinstall winexe service before remote execution |
| --system | Use SYSTEM account |
| --runas=[DOMAIN\]USERNAME%PASSWORD | Run as user (BEWARE: password is sent in cleartext over net) |
| Help Options | Use |
|---|---|
| -?, --help | Show this help message |
| --usage | Display brief usage message |
| Common samba options | Use |
|---|---|
| -d, --debuglevel=DEBUGLEVEL | Set debug level |
| --debug-stderr | Send debug output to STDERR |
| -s, --configfile=CONFIGFILE | Use alternative configuration file |
| --option=name=value | Set smb.conf option from command line |
| -l, --log-basename=LOGFILEBASE | Basename for log/debug files |
| --leak-report | enable talloc leak reporting on exit |
| --leak-report-full | enable full talloc leak reporting on exit |
| -V, --version | Print version |
| Connection Options | Use |
|---|---|
| -R, --name-resolve=NAME-RESOLVE-ORDER | Use these name resolution services only |
| -O, --socket-options=SOCKETOPTIONS | socket options to use |
| -n, --netbiosname=NETBIOSNAME | Primary netbios name |
| -W, --workgroup=WORKGROUP | Set the workgroup name |
| --realm=REALM | Set the realm name |
| -i, --scope=SCOPE | Use this Netbios scope |
| -m, --maxprotocol=MAXPROTOCOL | Set max protocol level |
| Authentication Options | Use |
|---|---|
| -U, --user=[DOMAIN\]USERNAME[%PASSWORD] | Set the network username |
| -N, --no-pass | Don't ask for a password |
| --password=STRING | Password |
| -A, --authentication-file=FILE | Get the credentials from a file |
| -S, --signing=on|off|required | Set the client signing state |
| -P, --machine-pass | Use stored machine account password (implies -k) |
| --simple-bind-dn=STRING | DN to use for a simple bind |
| -k, --kerberos=STRING | Use Kerberos |
| --use-security-mechanisms=STRING | Restricted list of authentication mechanisms available for use with this authentication |