Update samy.ps1

This commit is contained in:
2025-12-01 20:34:53 -05:00
parent d3d6d7e6f4
commit 5029bdc6a1

View File

@@ -80,7 +80,7 @@ Last changes made should fix the issues we had wen running thi in Windows 11 25H
.EXAMPLE .EXAMPLE
& ([ScriptBlock]::Create( (iwr 'https://sm.svstools.com' -UseBasicParsing).Content )) ` & ([ScriptBlock]::Create( (iwr 'https://samy.svstools.com' -UseBasicParsing).Content )) `
-UseWebhook -UseWebhook
-WebhookPassword 'pwd' -WebhookPassword 'pwd'
-SiteUID 'site-123' -SiteUID 'site-123'
@@ -91,7 +91,7 @@ Last changes made should fix the issues we had wen running thi in Windows 11 25H
# Headlessly installs the Datto RMM agent on “Acme Corp” and writes site variables to the registry. # Headlessly installs the Datto RMM agent on “Acme Corp” and writes site variables to the registry.
.EXAMPLE .EXAMPLE
& ([ScriptBlock]::Create( (iwr 'https://sm.svstools.com' -UseBasicParsing).Content )) ` & ([ScriptBlock]::Create( (iwr 'https://samy.svstools.com' -UseBasicParsing).Content )) `
-ApiUrl 'https://api.example.com' ` -ApiUrl 'https://api.example.com' `
-ApiKey 'YourApiKey' ` -ApiKey 'YourApiKey' `
-ApiSecretKey 'YourSecretKey' ` -ApiSecretKey 'YourSecretKey' `
@@ -103,7 +103,7 @@ Last changes made should fix the issues we had wen running thi in Windows 11 25H
# Headlessly installs the Datto RMM agent on “Acme Corp” and writes site variables to the registry. # Headlessly installs the Datto RMM agent on “Acme Corp” and writes site variables to the registry.
.EXAMPLE .EXAMPLE
& ([ScriptBlock]::Create( (iwr 'https://sm.svstools.com' -UseBasicParsing).Content )) ` & ([ScriptBlock]::Create( (iwr 'https://samy.svstools.com' -UseBasicParsing).Content )) `
-UseWebhook ` -UseWebhook `
-WebhookPassword 'pwd' ` -WebhookPassword 'pwd' `
-FetchSites ` -FetchSites `
@@ -113,7 +113,7 @@ Last changes made should fix the issues we had wen running thi in Windows 11 25H
# Fetches the full site list via webhook and saves it as JSON to your Desktop. # Fetches the full site list via webhook and saves it as JSON to your Desktop.
.EXAMPLE .EXAMPLE
& ([ScriptBlock]::Create( (iwr 'https://sm.svstools.com' -UseBasicParsing).Content )) ` & ([ScriptBlock]::Create( (iwr 'https://samy.svstools.com' -UseBasicParsing).Content )) `
-ApiUrl 'https://api.example.com' ` -ApiUrl 'https://api.example.com' `
-ApiKey 'YourApiKey' ` -ApiKey 'YourApiKey' `
-ApiSecretKey 'YourSecretKey' ` -ApiSecretKey 'YourSecretKey' `
@@ -124,7 +124,7 @@ Last changes made should fix the issues we had wen running thi in Windows 11 25H
# Downloads the RMM installer for “Acme Corp” and saves a copy under C:\Temp without running it. # Downloads the RMM installer for “Acme Corp” and saves a copy under C:\Temp without running it.
.EXAMPLE .EXAMPLE
& ([ScriptBlock]::Create( (iwr 'https://sm.svstools.com' -UseBasicParsing).Content )) ` & ([ScriptBlock]::Create( (iwr 'https://samy.svstools.com' -UseBasicParsing).Content )) `
-ApiUrl 'https://api.example.com' ` -ApiUrl 'https://api.example.com' `
-ApiKey 'YourApiKey' ` -ApiKey 'YourApiKey' `
-ApiSecretKey 'YourSecretKey' ` -ApiSecretKey 'YourSecretKey' `
@@ -136,10 +136,10 @@ Last changes made should fix the issues we had wen running thi in Windows 11 25H
# Shows what would happen when installing the RMM agent, without making any changes. # Shows what would happen when installing the RMM agent, without making any changes.
.EXAMPLE .EXAMPLE
& ([ScriptBlock]::Create((iwr 'sm.svstools.ca').Content )) -SilentInstall & ([ScriptBlock]::Create((iwr 'samy.svstools.ca').Content )) -SilentInstall
.EXAMPLE .EXAMPLE
& ([ScriptBlock]::Create((iwr 'sm.svstools.com').Content)) -Cleanup & ([ScriptBlock]::Create((iwr 'samy.svstools.com').Content)) -Cleanup
.EXAMPLE .EXAMPLE
& ([ScriptBlock]::Create((iwr 'samy.svstools.ca').Content)) -Offboard & ([ScriptBlock]::Create((iwr 'samy.svstools.ca').Content)) -Offboard
@@ -157,7 +157,7 @@ if ($ExecutionContext.SessionState.LanguageMode -ne 'FullLanguage' -or
if ($PSCommandPath) { if ($PSCommandPath) {
powershell.exe -NoProfile -ExecutionPolicy Bypass -File "`"$PSCommandPath`"" powershell.exe -NoProfile -ExecutionPolicy Bypass -File "`"$PSCommandPath`""
} else { } else {
powershell.exe -NoProfile -ExecutionPolicy Bypass -Command "& { iwr 'https://sm.svstools.com' -UseBasicParsing | iex }" powershell.exe -NoProfile -ExecutionPolicy Bypass -Command "& { iwr 'https://samy.svstools.com' -UseBasicParsing | iex }"
} }
exit exit