PowerShell Logo Small

Get-PcsvDevice



This is the built-in help made by Microsoft for the command 'Get-PcsvDevice', in PowerShell version 5 - as retrieved from Windows version 'Microsoft Windows Server 2012 R2 Standard' PowerShell help files on 2016-06-23.

For PowerShell version 3 and up, where you have Update-Help, this command was run just before creating the web pages from the help files.

SYNOPSIS

Gets information about a remote hardware device.

SYNTAX


Get-PcsvDevice [-TargetAddress] <String> [-Credential] <PSCredential> [-ManagementProtocol] <ManagementProtocol> [[-Port] <UInt16>] [-AsJob] [-Authentication
<Authentication>] [-CimSession <CimSession[]>] [-SkipCACheck] [-SkipCNCheck] [-SkipRevocationCheck] [-ThrottleLimit <Int32>] [-TimeoutSec <UInt32>] [-UseSSL]
[<CommonParameters>]



Search powershellhelp.space

DESCRIPTION


The Get-PcsvDevice cmdlet gets information about a remote device. The cmdlet connects to a remote device, for example, a baseboard management controller, and collects
hardware inventory information and information about the firmware installed on the device. The cmdlet communicates with the remote device by using the Intelligent Platform
Management Interface (IPMI) or WS-Management (WSMAN) protocols.



<

RELATED LINKS

Online Version: http://go.microsoft.com/fwlink/?LinkId=288915
Start-PcsvDevice
Stop-PcsvDevice
Restart-PcsvDevice

REMARKS

<

Examples


Example 1: Get information from a remote IPMI device

PS C:\> $Credential = Get-Credential Admin
PS C:\> Get-PCSVDevice -TargetAddress "10.0.0.29" -ManagementProtocol IPMI -Credential $Credential
TargetAddress Manufacturer Model SerialNumber EnabledState

------------- ------------ ----- ------------ ------------
10.177.231.27 DELL PowerEdge R720 CN7016329700EH Enabled



This example connects with an IPMI device and returns hardware and firmware information for the device.

The first command uses the Get-Credential cmdlet to create a credential, and then stores it in the $Credential variable. The cmdlet prompts you for a user name and password.
For more information, type Get-Help Get-Credential.

The second command returns the hardware and firmware information from the target computer. The command connects with the remote hardware device that has the management IP
address 10.0.0.29 by using the IPMI management protocol and the default port (623). The command specifies the credential object stored in the $Credential variable.

The EnabledState property indicates whether the machine is on or off or in an alternate state, such as quiesce.




Example 2: Get information from a remote WSMAN device

PS C:\> $Credential = Get-Credential Admin
PS C:\> Get-PcsvDevice -TargetAddress "10.0.0.30" -Credential $Credential -ManagementProtocol WSMan -Port 664 -UseSSL -SkipCACheck -SkipCNCheck -SkipRevocationCheck



This example connects with a WS-Management device by using a custom port, and returns the hardware and firmware information for the device. The remote device uses a
self-signed certificate for authentication, so the Get-PcsvDevice cmdlet specifies the SkipCACheck and SkipCNCheck parameters. Specify these parameters only for connecting
to trusted remote hardware devices.

The first command uses the Get-Credential cmdlet to create a credential, and then stores it in the $Credential variable. The cmdlet prompts you for a user name and password.
For more information, type Get-Help Get-Credential.

The second command returns the hardware and firmware information from the target computer. The command connects with the target computer that has the management IP address
10.0.0.30 by using the WS-Management protocol, SSL, and port 664. The command specifies the credential object stored in the $Credential variable.

The command specifies that the client connects by using HTTPS without validating that a CA authority signed the server certificate. The command specifies that the
certificate common name (CN) of the server does not need to match the host name of the server. The command specifies that the cmdlet skips the revocation check of server
certificates.




Example 3: Get information from a remote WSMAN device over HTTP

PS C:\> Set-Item WSMan:\localhost\Client\TrustedHosts "10.0.0.30"
PS C:\> Set-Item WSMan:\localhost\Client\AllowUnencrypted true
PS C:\> $Credential = Get-Credential Admin
PS C:\> Get-PCSVDevice -TargetAddress 10.0.0.30 -ManagementProtocol WSMan -Port 16992 -Credential $Credential -Authentication Digest



This example connects with a WS-Management using HTTP. Since the traffic is unencrypted, additional configuration on the management client is required.

The first two commands create the configuration that the WS-Management client on Windows requires to enable unecrypted WSMAN traffic. This is a one-time only configuration.

The third command uses the Get-Credential cmdlet to create a credential, and then stores it in the $Credential variable. The cmdlet prompts you for a user name and password.
For more information, type Get-Help Get-Credential.

The fourth command connects with the target computer that has the management IP address 10.0.0.30 by using the WS-Management protocol and port 16992. The command specifies
the credential object stored in the $Credential variable. The command specifies the Digest authentication method for the device.