Skip to main content

Powershell command to check Network Adapter

 


To check Network Adapter:

PS C: Get-NetAdapter 
Name 
SC- EA- ID- 80-26-85 
Ethernet 
-45-E5 
Bluetooth Network Con... 2 
SC- EA- ID- 80-26-86 
InterfaceDescription 
Dell Wireless 1707 802.11bIgIn (2.4GHZ) 
Realtek PCIe GBE Family 
Bluetooth Device (Personal Area Ne.. 
iflndex 
g 
6 
Status 
Disconnected 
IJP 
Disconnected 
MacAddress 
ac 
- EC 
-43- 
65 
Li n kSpeed 
g bps 
leg Mbps 
3 Mbps

Show by status:PS C: Get-NetAdapter I where status 
InterfaceDescription 
Name 
Realtek PCIe Family 
Ethernet 
Control ler 
iflndex 
6 
Status 
Up 
macAddress 
8c-Ec-4a-65-45-E5 
Li n kSpeed 
løø mbps

Comments

Popular posts from this blog

Datto Backup Process

                                                    Backup Process Local Backup The protected machine generates data that needs to be backed up.   The Datto appliance sends a backup request to the agent software installed on the protected machine.   The agent software opens the network transfer protocol and initiates the VSS snapshot on the protected machine.   The backup data is transferred over the network to the Datto and written to the live dataset.   On the Datto appliance, ZFS takes a point-in-time snapshot of the live dataset and integrates it into the backup chain.         Roundtrip:-                Roundtrip drives are external hard drives provided b y Datto to expedite the transfer of large data sets to the Datt...

Beyond the Basics: Understanding the 3-2-1 Backup Rule

In our increasingly digital world, data is king. From cherished family photos and important financial documents to critical business records, our lives and livelihoods depend on the availability and integrity of our digital information. But what happens when disaster strikes? A hard drive crashes, a laptop is stolen, a ransomware attack locks down your files, or a natural disaster renders your primary systems unusable? ​That's where the 3-2-1 backup rule comes in. It's a simple, elegant, and incredibly effective strategy for data protection that every individual and organization should adopt. Forget complex jargon – let's break down this fundamental principle of digital resilience. ​What is the 3-2-1 Backup Rule? ​The 3-2-1 rule is a widely recommended guideline for ensuring your data is safe and recoverable in almost any scenario. It's built on three core tenets: ​ 1. 3 Copies of Your Data: This is your foundational layer of protection. You should al...

Windows Stuck on "Preparing to configure Windows"

           Preparing to configure Windows. Do not turn off your computer.   When server got stuck from long time on “Preparing to configure Windows Do not turn off your computer” . Don’t powering it off because it may be bad effect on your OS. Here have fix to get rid out of this.                                                                                                   Steps to Fix: Logged into another server on the same domain. Open Services console Right Click on Service (Local), then click on “Connect to...