Last active
March 1, 2025 12:39
-
-
Save emilwojcik93/91a272c996b03c4d51a19702641466a0 to your computer and use it in GitHub Desktop.
admin-script
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
param ( | |
[Parameter(Mandatory=$false)] | |
[string]$ExampleParam = "default", | |
[string[]]$StringArrayParam = @("default1", "default2"), | |
[int]$IntParam = 42, | |
[bool]$BoolParam = $true | |
) | |
if ($PSCmdlet.MyInvocation.BoundParameters.ContainsKey('Verbose')) { | |
$VerbosePreference = "Continue" | |
} else { | |
$VerbosePreference = "SilentlyContinue" | |
} | |
Write-Output "Script started with parameters:" | |
Write-Output "ExampleParam: $ExampleParam" | |
Write-Output "StringArrayParam: $($StringArrayParam -join ', ')" | |
Write-Output "IntParam: $IntParam" | |
Write-Output "BoolParam: $BoolParam" | |
if (!([Security.Principal.WindowsPrincipal][Security.Principal.WindowsIdentity]::GetCurrent()).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { | |
Write-Output "This script needs to be run as Administrator. Attempting to relaunch." | |
$argList = @() | |
$PSBoundParameters.GetEnumerator() | ForEach-Object { | |
$argList += if ($_.Value -is [switch] -and $_.Value) { | |
"-$($_.Key)" | |
} elseif ($_.Value -is [array]) { | |
"-$($_.Key) $($_.Value -join ',')" | |
} elseif ($_.Value) { | |
"-$($_.Key) '$($_.Value)'" | |
} | |
} | |
$script = if ($PSCommandPath) { | |
"& { & `"$($PSCommandPath)`" $($argList -join ' ') }" | |
} else { | |
"&([ScriptBlock]::Create((irm https://gist.githubusercontent.com/emilwojcik93/91a272c996b03c4d51a19702641466a0/raw/admin-script.ps1))) $($argList -join ' ')" | |
} | |
$powershellcmd = if (Get-Command pwsh -ErrorAction SilentlyContinue) { "pwsh" } else { "powershell" } | |
$processCmd = if (Get-Command wt.exe -ErrorAction SilentlyContinue) { "wt.exe" } else { $powershellcmd } | |
Write-Verbose "Elevated command to be executed: $processCmd $powershellcmd -ExecutionPolicy Bypass -NoProfile -Command `"$script`"" | |
Start-Process $processCmd -ArgumentList "$powershellcmd -ExecutionPolicy Bypass -NoProfile -Command `"$script`"" -Verb RunAs | |
break | |
} else { | |
Write-Verbose "Script is running with elevated privileges." | |
} | |
# Check and set execution policy for CurrentUser, Process, and LocalMachine | |
$executionPolicies = Get-ExecutionPolicy -List | |
$currentUserPolicy = $executionPolicies | Where-Object { $_.Scope -eq 'CurrentUser' } | |
$processPolicy = $executionPolicies | Where-Object { $_.Scope -eq 'Process' } | |
$localMachinePolicy = $executionPolicies | Where-Object { $_.Scope -eq 'LocalMachine' } | |
Write-Verbose "Current execution policies:" | |
Write-Verbose "CurrentUser: $($currentUserPolicy.ExecutionPolicy)" | |
Write-Verbose "Process: $($processPolicy.ExecutionPolicy)" | |
Write-Verbose "LocalMachine: $($localMachinePolicy.ExecutionPolicy)" | |
if ($currentUserPolicy.ExecutionPolicy -ne 'Bypass') { | |
Write-Verbose "Setting execution policy for CurrentUser to Bypass." | |
Set-ExecutionPolicy -Scope CurrentUser -ExecutionPolicy Bypass -Force | |
} | |
if ($processPolicy.ExecutionPolicy -ne 'Bypass') { | |
Write-Verbose "Setting execution policy for Process to Bypass." | |
Set-ExecutionPolicy -Scope Process -ExecutionPolicy Bypass -Force | |
} | |
if ($localMachinePolicy.ExecutionPolicy -ne 'Bypass') { | |
Write-Verbose "Setting execution policy for LocalMachine to Bypass." | |
Set-ExecutionPolicy -Scope LocalMachine -ExecutionPolicy Bypass -Force | |
} | |
Write-Verbose "Execution policy checked and set to Bypass where necessary." | |
# Continue with the rest of your script | |
Write-Output "Execution policy checked and set to Bypass where necessary." | |
# Add any additional script logic here | |
# Prompt user to exit | |
Write-Output "Press Enter to exit..." | |
[void][System.Console]::ReadLine() |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
admin-script.ps1
This script checks if it is running with elevated privileges, and if not, it relaunches itself with elevated privileges. It also sets the execution policy to Bypass for CurrentUser, Process, and LocalMachine scopes.
Usage
Options
-ExampleParam <String>
: An example string parameter. Default is "default".-StringArrayParam <String[]>
: An array of strings. Default is @("default1", "default2").-IntParam <Int>
: An integer parameter. Default is 42.-BoolParam <Bool>
: A boolean parameter. Default is $true.-Verbose
: Enables verbose output.Running the Script from the Internet:
Use
Invoke-RestMethod
to download and execute the script. Here is how you can do it:Note
If it doesn't work, then try to Set-ExecutionPolicy via PowerShell (Admin)
Note
To execute the script from the Internet with additional parameters, please run
Example of issue
Example of execution
Example of execution for local modified params
Example of execution with default params
Example of execution as admin
Demo
2025-03-01.12-35-44.mp4