All posts by kil0 gram

Resetting local password of a FortiGate device via FortiManager

Hoping this will save someone from a major outtage just to reset a password. If you have a FortiManager in your environment that manages your FortiGate firewalls/proxies/etc then you’re in luck (I hope).

With the FortiManager in place, it has the ability to run CLI commands against the devices it manages. This is a nice feature because otherwise you would have to reboot the device and perform the password recovery steps, which isn’t fun in a production environment.

For those that are interested as to how this all works, during the initial setup of your HA cluster with the FortiManager, you provide it the device serial numbers. The FortiManager then uses this to log into the child devices (kind of like the bcpbSERIALNUMBER login process during password recovery), the child devices allow this communication because they’re already aware of who the FortiManager is.

  1. Log onto the FortiManager in the environment that you want to do the password reset in
  2. Once logged in, under Device Manager tab, select your ADOM
  3. Go to Scripts
  4. Double click and confirm chng-pwd script is as the following (create new if doesn’t exist)
  5. Right click the chng-pwd script and click Run
  6. Select the device you want to run against
  7. Test the new password!

Hyper-V Tools v1.6 released today!

Hey guys, long time no update :-/

Sorry about that, I recently got married and next week I start my new job….so yeah, I’ve been pretty busy with life in general.

I just uploaded Hyper-V Tools v1.6 to the cloud and if you’re running a older version, you should be prompted to update. If not, then grab the latest version from below (or original thread).

On a side note: I am a utter noob when it comes to GUI design and even the smallest things can be extremely challenging for me to implement, in this case I had to implement additional columns on a per VHD basis but failed miserably, I mean I have been trying to come up with a solution and my brain has already melted and what I produce just does not work. So there is a slight mismatch in information between what the GUI displays and what is outputted to the CSV. The main addition is that in the CSV file, you will have extra columns for VHDs and in the GUI you won’t.

Hopefully I can figure this out and make the GUI pretty but in the mean time, please bare with me.


Remote Desktop Session Auditor – Find out who’s been on your server!

UPDATE *Fixed download link 11/14/17*

In v0.2 you can now filter based on IP version by using the “-v” switch. I will add links to both version as this still requires a little bit of testing.


Finally a cool breeze and some alone time, here is a tool I wrote up because I had a need to track down and audit multiple remote servers to determine who has been logging in and from where. The tool output’s to the command prompt, you can use a “>” operator and output to file if necessary…see below for example.

The usage is fairly simple and it can be used both in interactive mode and can be ran using command line arguments.

Interactive Mode:

Double click the exe and it will ask you for the target hostname or if you do not provide a hostname, tool will check the local host.

CLI Mode:


Output to file:




The tool has been tested against Server 2008/2008r2/SBS2011/Server2012/Server2012r2/Windows 7/8/8.1 (9 downloads)

Advertising on the site

I wanted to inform my visitors that I have accepted a new advertiser and it is Private Internet Access (PIA). Before recommending a product I do my best to test and actively use it for a lengthy period of time and PIA has been through its fare share of use.

PIA is a VPN service provider, using there servers (which are located globally) you can stay anonymous while still browsing the web at full speeds. The only time I have had issues was when I was playing online multiplayer games and I forgot that PIA was still connected, this was the reason I lost so bad (and I swear, I am not a bad player! :p)

Anyways, PIA delivers on there promise, they do not store any logs nor history of usage. They simply put a layer between you and the rest of the world, keeping you nice and safe.

If you want your product advertised on this blog, please reach out to me (by comment) and I will work closely with you to determine if your product is appropriate for my audience.

Broadcom Network Adapters Causing Slow Network Performance

I wanted to give everyone a heads up on a major issue related to Broadcom NICs, these can be found primarily in top shelf HP/Dell servers that are used in production across the globe. The issue is related to poor network performance for virtual machines and this is due to a advance NIC setting which is referred to as “Virtual Machine Queue”.

VMQ is when network traffic is handled by the physical network adapter, it creates a queue of traffic which waits for everything to arrive and then routes it to where it should go. In my experience, this has killed file transfer speeds and what normally would take 30 seconds to complete will now take over 30min!

To disable this evil monster you can do it via Powershell like below:

another way of disabling this is locating your network card properties in Device Manager and going to the Advanced tab, the Virtual Machine Queue property will be in the list.

I originally faced this issue over a year ago and had posted a question over at ServerFault but seemed like no one had a clue on what might be the problem. Hopefully this saves someone the heads, cheers!

Hyper-V Tool version 1.0 is out!

Quick update on, I’ve been out of town for a while and finally had some time to work on some personal projects. I just finished uploading v1.0 to the cloud so start up your existing tool and grab the update or look below for direct download.

Here is some info from the change log


* fixed bug when manually exporting csv
* added logging to a similarly named .log file in same path as tool
+ command line options added, usage is as such
HyperVTools.exe -u username -p password -d domain -h hostname -o C:\output.csv

Introducing Hyper-V Tools – The Ultimate Hyper-V Reporting Tool

HyperVTools is a read only software which aims to provide a quick method of obtaining virtual machine information from a Microsoft Hyper-V host. Information includes name/uptime/OS Version/DNS name/much more! The tool gives you a quick way of creating a report of your machine status and spits out a nicely formatted CSV with details. If you don’t want to use any disk space, you can highlight items in the list and copy to clipboard even!

I originally started working on this when I saw a posting on reddit requesting something that would work like RVTools but for Hyper-V. RVTools is a pretty slick piece of software but unfortunately (or fortunately?) it is geared towards VMWare virtualization products only and thus came the inception of HyperVTools!

This software is still a work in progress and features will be added as I go. As of right now, it is in a usable state and is ready for future updates and eventually it will live up to the claim of being the Ultimate Hyper-V Reporting tool.


  • Connect to a Hyper-V server from Windows 7/8/8.1 x64 or Windows Server 2008/2008r2/2012/2012r2 (including local host – Run as Administrator)
  • Output CSV with details
  • Auto updating logic included (that doesn’t work when you need it)
  • Minor switch details (this is still WIP)
  • Command line mode:
    • HyperVTools.exe -u username -p password -d domain -h hostname -o C:\output.csv
  • much more!


  • .NET 4.0
  • This software has been tested on Windows Server 2012r2
  • Windows Server 2008/2008r2/2012/2012r2 Hyper-V support **WIP**