This repository has been archived by the owner on May 28, 2020. It is now read-only.
forked from richardhicks/aovpn
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathMove-InboxAccountingDatabase.ps1
340 lines (299 loc) · 15.2 KB
/
Move-InboxAccountingDatabase.ps1
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
<#
.SYNOPSIS
PowerShell script to relocate the Remote Access inbox accounting database.
.PARAMETER SourcePath
The original location of the Remote Access inbox accounting database.
.PARAMETER DestinationPath
The target location to move the Remote Access inbox accounting database to.
.PARAMETER Computername
The name of the computer on which to run the command. Default is the local computer.
.PARAMETER Credential
Optional credential to run the script under.
.EXAMPLE
.\Move-RemoteAccessInboxAccountingDatabase.ps1 -DestinationPath 'D:\DirectAccess\DB\'
Running this command will move the Remote Access inbox accounting database from the default location of C:\Windows\DirectAccess\DB to D:\DirectAccess\DB\.'
.EXAMPLE
.\Move-RemoteAccessInboxAccountingDatabase.ps1 -SourcePath 'D:\DirectAccess\DB\' -DestinationPath 'E:\DirectAccess\DB\'
Running this command will move the Remote Access inbox accounting database from the custom location of D:\Windows\DirectAccess\DB\ to E:\DirectAccess\DB\.'
.DESCRIPTION
When DirectAccess or VPN is enabled on a Windows Server and Inbox accounting is enabled, a Windows Internal Database (WID) is created on the C: drive by default. This script allows the administrator to relocate this database to another drive to increase data retention and/or improve performance.
.LINK
https://directaccess.richardhicks.com/
.NOTES
Version: 1.0
Creation Date: February 1, 2020
Last Updated: February 1, 2020
Author: Richard Hicks
Organization: Richard M. Hicks Consulting, Inc.
Contact: [email protected]
Web Site: https://directaccess.richardhicks.com/
#>
[cmdletbinding(SupportsShouldProcess)]
Param(
[Parameter(HelpMessage = "Enter the path to the Direct Access database folder relative to the remote computer")]
[Alias("path")]
[string]$SourcePath = "C:\Windows\DirectAccess\DB",
[Parameter(Mandatory, HelpMessage = "Enter the target folder path to move the Direct Access database relative to the remote computer")]
[alias("destination")]
[string]$DestinationPath,
[Parameter(HelpMessage = "Enter the name of the remote RRAS server.", ValueFromPipeline, ValueFromPipelineByPropertyName)]
[ValidateNotNullOrEmpty()]
[string[]]$Computername = $env:computername,
[switch]$Passthru,
[Parameter(HelpMessage = "Enter an optional credential in the form domain\username or machine\username")]
[PSCredential]$Credential,
[ValidateSet('Default', 'Basic', 'Credssp', 'Digest', 'Kerberos', 'Negotiate', 'NegotiateWithImplicitCredential')]
[ValidateNotNullorEmpty()]
[string]$Authentication = "default",
[switch]$UseSSL
)
Begin {
Write-Verbose "Starting $($myinvocation.mycommand)"
#display some meta information for troubleshooting
Write-Verbose "PowerShell version: $($psversiontable.psversion)"
Write-Verbose "Operating System: $((Get-Ciminstance -class win32_operatingsystem -property caption).caption)"
$sb = {
[cmdletbinding()]
Param(
[ValidateScript( {
#write a custom error message if the database file isn't in the source path
if (Test-Path "$_\RaAcctDb.mdf") {
return $True
}
else {
Throw "The path ($_) does not appear to contain the RaAcctDB.mdf database."
}
})]
[string]$SourcePath,
[string]$DestinationPath,
[bool]$Passthru
)
$VerbosePreference = $using:verbosepreference
$whatifpreference = $using:whatifpreference
Write-Verbose "SourcePath = $SourcePath"
Write-Verbose "TargetPath = $DestinationPath"
Write-Verbose "WhatIf = $whatifpreference"
Write-verbose "Verbose = $VerbosePreference"
If (-Not (Test-Path $DestinationPath)) {
Write-Verbose "Creating target $DestinationPath"
Try {
New-Item -ItemType Directory -Force -Path $DestinationPath -ErrorAction stop
}
Catch {
Write-Verbose "Failed to create target folder $DestinationPath"
Throw $_
#this should terminate the command if the target folder can't be created.
#we will force a bailout just in case this doesn't terminate.
return
}
}
Write-Verbose "Copying Access Control from $SourcePath to $DestinationPath"
if ($pscmdlet.ShouldProcess($DestinationPath, "Copy Access Control")) {
Try {
Write-Verbose "Get ACL"
$Acl = Get-Acl -Path $SourcePath -ErrorAction stop
Write-Verbose "Set ACL"
Set-Acl -Path $DestinationPath -aclobject $Acl -ErrorAction stop
}
Catch {
Write-Verbose "Failed to copy ACL from $SourcePath to $DestinationPath"
Throw $_
#bail out if PowerShell doesn't terminate the pipeline
return
}
} #WhatIf copying ACL
Write-Verbose "Stopping the RamgmtSvc"
Try {
Get-Service RaMgmtSvc -ErrorAction Stop | Stop-Service -Force -ErrorAction Stop
}
Catch {
Write-Verbose "Failed to stop the RaMgmtSvc"
Throw $_
#bail out if PowerShell doesn't terminate the pipeline
return
}
Write-Verbose "Altering database"
$sqlConn = 'server=\\.\pipe\Microsoft##WID\tsql\query;Database=RaAcctDb;Trusted_Connection=True;'
$conn = New-Object System.Data.SQLClient.SQLConnection($sqlConn)
Write-Verbose "Opening WID connection"
if ($pscmdlet.ShouldProcess("RaAcctDB", "Open Connection")) {
$conn.Open()
}
$cmd = $conn.CreateCommand()
$cmdText = "USE master;ALTER DATABASE RaAcctDb SET SINGLE_USER WITH ROLLBACK IMMEDIATE;EXEC sp_detach_db @dbname = N'RaAcctDb';"
Write-Verbose $cmdText
$cmd.CommandText = $cmdText
$cmd | Out-String | Write-Verbose
if ($pscmdlet.ShouldProcess("RaAcctDB", "ALTER DATABASE")) {
Write-Verbose "Executing"
$rdrDetach = $cmd.ExecuteReader()
Write-Verbose "Detached"
$rdrDetach | Out-String | Write-Verbose
}
Write-Verbose "Closing WID connection"
if ($conn.State -eq "Open") {
$conn.Close()
}
Write-Verbose "Moving database files from $sourcePath to $DestinationPath"
$mdf = Join-Path -path $SourcePath -ChildPath "RaAcctDb.mdf"
$ldf = Join-Path -path $SourcePath -ChildPath "RaAcctDb_log.ldf"
Move-Item -Path $mdf -Destination $DestinationPath
Move-Item -Path $ldf -Destination $DestinationPath
Write-Verbose "Creating new database"
$sqlConn = 'server=\\.\pipe\Microsoft##WID\tsql\query;Database=;Trusted_Connection=True;'
$conn = New-Object System.Data.SQLClient.SQLConnection($sqlConn)
Write-Verbose "Opening WID connection"
if ($pscmdlet.ShouldProcess("New DB", "Open Connection")) {
$conn.Open()
}
$cmd = $conn.CreateCommand()
$targetmdf = Join-Path -Path $DestinationPath -ChildPath RaAcctDb.mdf
$targetldf = Join-Path -Path $DestinationPath -ChildPath RaAcctDb_log.ldf
$cmdText = "USE master CREATE DATABASE RaAcctDb ON (FILENAME = '$targetmdf'),(FILENAME = '$targetldf') FOR ATTACH;USE [master] ALTER DATABASE [RaAcctDb] SET READ_WRITE WITH NO_WAIT;"
Write-Verbose $cmdText
$cmd.CommandText = $cmdText
if ($pscmdlet.ShouldProcess($targetmdf, "CREATE DATABASE")) {
Write-Verbose "Executing"
$rdrAttach = $cmd.ExecuteReader()
Write-Verbose "Attached"
$rdrAttach | Out-String | Write-Verbose
}
Write-Verbose "Closing WID connection"
if ($conn.State -eq "Open") {
$conn.Close()
}
Write-Verbose "Starting the RaMgmtSvc"
Try {
Get-Service RaMgmtSvc -ErrorAction stop | Start-Service -ErrorAction stop
}
Catch {
Write-Verbose "Failed to start RaMgmtSvc"
Throw $_
}
#manage README.txt file
if ($SourcePath -eq "C:\Windows\DirectAccess\DB") {
#create a readme.txt file in the default location if files are being moved.
$txt = @"
The RaAcctDB database and log files have been relocated to $DestinationPath
Moved by $env:USERDOMAIN\$env:USERNAME at $(Get-Date)
"@
Set-Content -Path C:\Windows\DirectAccess\DB\Readme.txt -Value $txt
}
elseif ($DestinationPath -eq "C:\Windows\DirectAccess\DB" -AND (Test-Path -path "C:\Windows\DirectAccess\DB\readme.txt") ) {
#if the destination is the default location and the readme file exists, delete the file.
Remove-Item -Path "C:\Windows\DirectAccess\DB\readme.txt"
}
if ($Passthru) {
Get-ChildItem -Path $DestinationPath
}
} #close scriptblock
#define a set of parameter values to splat to Invoke-Command
$icmParams = @{
Computername = ""
Scriptblock = $sb
HideComputername = $True
Authentication = $Authentication
ArgumentList = @($SourcePath, $DestinationPath, $Passthru)
ErrorAction = "Stop"
}
if ($pscredential.username) {
Write-Verbose "Adding an alternate credential for $($pscredential.username)"
$icmParams.Add("Credential", $PSCredential)
}
if ($UseSSL) {
Write-Verbose "Using SSL"
$icmParams.Add("UseSSL", $True)
}
Write-Verbose "Using $Authentication authentication."
} #begin
Process {
foreach ($computer in $computername) {
Write-Verbose "Querying $($computer.toUpper())"
$icmParams.Computername = $computer
$icmParams | Out-String | Write-verbose
Try {
#display result without the runspace ID
Invoke-Command @icmParams
}
Catch {
Throw $_
}
} #foreach computer
} #process
End {
Write-Verbose "Ending $($myinvocation.MyCommand)"
} #end
# SIG # Begin signature block
# MIINbAYJKoZIhvcNAQcCoIINXTCCDVkCAQExCzAJBgUrDgMCGgUAMGkGCisGAQQB
# gjcCAQSgWzBZMDQGCisGAQQBgjcCAR4wJgIDAQAABBAfzDtgWUsITrck0sYpfvNR
# AgEAAgEAAgEAAgEAAgEAMCEwCQYFKw4DAhoFAAQUJr7tFpb/sd7pfIw+K6urw9sh
# qjigggquMIIFMDCCBBigAwIBAgIQBAkYG1/Vu2Z1U0O1b5VQCDANBgkqhkiG9w0B
# AQsFADBlMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYD
# VQQLExB3d3cuZGlnaWNlcnQuY29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVk
# IElEIFJvb3QgQ0EwHhcNMTMxMDIyMTIwMDAwWhcNMjgxMDIyMTIwMDAwWjByMQsw
# CQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cu
# ZGlnaWNlcnQuY29tMTEwLwYDVQQDEyhEaWdpQ2VydCBTSEEyIEFzc3VyZWQgSUQg
# Q29kZSBTaWduaW5nIENBMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA
# +NOzHH8OEa9ndwfTCzFJGc/Q+0WZsTrbRPV/5aid2zLXcep2nQUut4/6kkPApfmJ
# 1DcZ17aq8JyGpdglrA55KDp+6dFn08b7KSfH03sjlOSRI5aQd4L5oYQjZhJUM1B0
# sSgmuyRpwsJS8hRniolF1C2ho+mILCCVrhxKhwjfDPXiTWAYvqrEsq5wMWYzcT6s
# cKKrzn/pfMuSoeU7MRzP6vIK5Fe7SrXpdOYr/mzLfnQ5Ng2Q7+S1TqSp6moKq4Tz
# rGdOtcT3jNEgJSPrCGQ+UpbB8g8S9MWOD8Gi6CxR93O8vYWxYoNzQYIH5DiLanMg
# 0A9kczyen6Yzqf0Z3yWT0QIDAQABo4IBzTCCAckwEgYDVR0TAQH/BAgwBgEB/wIB
# ADAOBgNVHQ8BAf8EBAMCAYYwEwYDVR0lBAwwCgYIKwYBBQUHAwMweQYIKwYBBQUH
# AQEEbTBrMCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5kaWdpY2VydC5jb20wQwYI
# KwYBBQUHMAKGN2h0dHA6Ly9jYWNlcnRzLmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydEFz
# c3VyZWRJRFJvb3RDQS5jcnQwgYEGA1UdHwR6MHgwOqA4oDaGNGh0dHA6Ly9jcmw0
# LmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydEFzc3VyZWRJRFJvb3RDQS5jcmwwOqA4oDaG
# NGh0dHA6Ly9jcmwzLmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydEFzc3VyZWRJRFJvb3RD
# QS5jcmwwTwYDVR0gBEgwRjA4BgpghkgBhv1sAAIEMCowKAYIKwYBBQUHAgEWHGh0
# dHBzOi8vd3d3LmRpZ2ljZXJ0LmNvbS9DUFMwCgYIYIZIAYb9bAMwHQYDVR0OBBYE
# FFrEuXsqCqOl6nEDwGD5LfZldQ5YMB8GA1UdIwQYMBaAFEXroq/0ksuCMS1Ri6en
# IZ3zbcgPMA0GCSqGSIb3DQEBCwUAA4IBAQA+7A1aJLPzItEVyCx8JSl2qB1dHC06
# GsTvMGHXfgtg/cM9D8Svi/3vKt8gVTew4fbRknUPUbRupY5a4l4kgU4QpO4/cY5j
# DhNLrddfRHnzNhQGivecRk5c/5CxGwcOkRX7uq+1UcKNJK4kxscnKqEpKBo6cSgC
# PC6Ro8AlEeKcFEehemhor5unXCBc2XGxDI+7qPjFEmifz0DLQESlE/DmZAwlCEIy
# sjaKJAL+L3J+HNdJRZboWR3p+nRka7LrZkPas7CM1ekN3fYBIM6ZMWM9CBoYs4Gb
# T8aTEAb8B4H6i9r5gkn3Ym6hU/oSlBiFLpKR6mhsRDKyZqHnGKSaZFHvMIIFdjCC
# BF6gAwIBAgIQDOTKENcaCUe5Ct81Y25diDANBgkqhkiG9w0BAQsFADByMQswCQYD
# VQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGln
# aWNlcnQuY29tMTEwLwYDVQQDEyhEaWdpQ2VydCBTSEEyIEFzc3VyZWQgSUQgQ29k
# ZSBTaWduaW5nIENBMB4XDTE5MTIxNjAwMDAwMFoXDTIxMTIyMDEyMDAwMFowgbIx
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1NaXNz
# aW9uIFZpZWpvMSowKAYDVQQKEyFSaWNoYXJkIE0uIEhpY2tzIENvbnN1bHRpbmcs
# IEluYy4xHjAcBgNVBAsTFVByb2Zlc3Npb25hbCBTZXJ2aWNlczEqMCgGA1UEAxMh
# UmljaGFyZCBNLiBIaWNrcyBDb25zdWx0aW5nLCBJbmMuMIIBIjANBgkqhkiG9w0B
# AQEFAAOCAQ8AMIIBCgKCAQEAr+wmqY7Bpvs6EmNV227JD5tee0m+ltuYmleTJ1TG
# TCfibcWU+2HOHICHoUdSF4M8L0LoonkIWKoMCUaGFzrvMFjlt/J8juH7kazf3mEd
# Z9lzxOt6GLn5ILpq+8i2xb4cGqLd1k8FEJaFcq66Xvi2xknQ3r8cDJWBXi4+CoLY
# 0/VPNNPho2RTlpN8QL/Xz//hE+KB7YzaF+7wYCVCkR/Qn4D8AfiUBCAw8fNbjNGo
# Q/v7xh+f6TidtC7Y5B8D8AR4IJSok8Zbivz+HJj5wZNWsS70D8HnWQ7hM/7nAwQh
# teh0/kj0m6TMVtsv4b9KCDEyPT71cp5g4JxMO+x3UZh0CQIDAQABo4IBxTCCAcEw
# HwYDVR0jBBgwFoAUWsS5eyoKo6XqcQPAYPkt9mV1DlgwHQYDVR0OBBYEFB6Bcy+o
# ShXw68ntqleXMwE4Lj1jMA4GA1UdDwEB/wQEAwIHgDATBgNVHSUEDDAKBggrBgEF
# BQcDAzB3BgNVHR8EcDBuMDWgM6Axhi9odHRwOi8vY3JsMy5kaWdpY2VydC5jb20v
# c2hhMi1hc3N1cmVkLWNzLWcxLmNybDA1oDOgMYYvaHR0cDovL2NybDQuZGlnaWNl
# cnQuY29tL3NoYTItYXNzdXJlZC1jcy1nMS5jcmwwTAYDVR0gBEUwQzA3BglghkgB
# hv1sAwEwKjAoBggrBgEFBQcCARYcaHR0cHM6Ly93d3cuZGlnaWNlcnQuY29tL0NQ
# UzAIBgZngQwBBAEwgYQGCCsGAQUFBwEBBHgwdjAkBggrBgEFBQcwAYYYaHR0cDov
# L29jc3AuZGlnaWNlcnQuY29tME4GCCsGAQUFBzAChkJodHRwOi8vY2FjZXJ0cy5k
# aWdpY2VydC5jb20vRGlnaUNlcnRTSEEyQXNzdXJlZElEQ29kZVNpZ25pbmdDQS5j
# cnQwDAYDVR0TAQH/BAIwADANBgkqhkiG9w0BAQsFAAOCAQEAcJWSNtlE7Ml9VLf/
# 96z8tVbF05wZ/EkC4O9ouEdg5AmMx/5LdW2Tz4OrwAUCrRWgIRsC2ea4ZzsZli1i
# 7TdwaYmb2LGKMpq0z1g88iyjIdX6jCoUqMQq1jZAFaJ9iMk7Gn2kHrlcHvVjxwYE
# nf3XxMeGkvvBl8CBkV/fPQ2rrSyKeGSdumWdGGx6Dv/OH5log+x6Qdr6tkFC7byK
# oCBsiETUHs63z53QeVjVxH0zXGa9/G57XphUx18UTYkgIobMN4+dRizxA5sU1WCB
# pstchAVbAsM8OhGoxCJlQGjaXxSk6uis2XretUDhNzCodqdz9ul8CVKem9uJTYjo
# V6CBYjGCAigwggIkAgEBMIGGMHIxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdp
# Q2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xMTAvBgNVBAMTKERp
# Z2lDZXJ0IFNIQTIgQXNzdXJlZCBJRCBDb2RlIFNpZ25pbmcgQ0ECEAzkyhDXGglH
# uQrfNWNuXYgwCQYFKw4DAhoFAKB4MBgGCisGAQQBgjcCAQwxCjAIoAKAAKECgAAw
# GQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEOMAwGCisG
# AQQBgjcCARUwIwYJKoZIhvcNAQkEMRYEFNBLDEONf24fmhjeiqzcb/OifF8qMA0G
# CSqGSIb3DQEBAQUABIIBAAJm8+mBsS7ObfrMkDK2MF7/HR1rBFz4/TrX00kuu076
# C0zMmetXseheoPkkTNj/MQeYNzAJgdBBF0iS0fsVjC91bVmDr+PqjY91nXkg2iy/
# +T4Qn1l9S9PdKojVXpoXYDnWkAeDVm30+KjMoUMDhSDmIJ3UuG6q+EPADXLKEdHI
# 288e81edt5I7+19SoFWg1L749jwvLd9qPdAkWzYAtg/arEglsVbf1VvD6zP1Zkn6
# iH44rCWBe/A390M85PU9DZuDuGrb47j25J4A6zNfGfFxLK7ZVPDCJ52b+HqAk+4q
# QlBlsaTxoQ15Ly8aXltBuS1jr2xsQYHWpOLWhavyDnk=
# SIG # End signature block