Using a command in PowerShute Network Shutdown

Posted on 2014-08-07
Last Modified: 2014-10-10
I want to run a command in PowerShute Network Shutdown and can't get it to work.

I created a batch file here C:\APC_Server_Shutdown\shutdown_untangle.cmd

The command in the batch file is
plink.exe -batch -pw [password] root@ shutdown -h now

Open in new window

plink.exe reside in the folder C:\APC_Server_Shutdown\

When I right click on the shutdown_untangle.cmd batch file it works. When enter this "C:\APC_Server_Shutdown\shutdown_untangle.cmd" in a command I get

'plink.exe' is not recognized as an internal or external command,
operable program or batch file.

Open in new window

What am I doing wrong?
Question by:Gerhardpet
    LVL 35

    Expert Comment

    by:Joseph Daly
    I would use the full path to the plink.exe executable in the command.
    LVL 5

    Expert Comment

    You will have to run from the same location as plink.exe OR, in the batch file, put the full path to plink.exe.
    LVL 1

    Accepted Solution

    That worked but  trying to run the command file from PowerShute Network Shutdown does not work.

    Any ideas on how to setup the command in Powershute?
    LVL 1

    Author Closing Comment

    I never got this to work. I contacted APC for support and they never solved it for me. I followed up atleast 5 times and the support rep each time said that he would get back to me after he would talk to their developers. It seem to be a bug but he never confirmed it as such.

    To say that their support is really bad.

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Why You Should Analyze Threat Actor TTPs

    After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

    The use of stolen credentials is a hot commodity this year allowing threat actors to move laterally within the network in order to avoid breach detection.
    Join Greg Farro and Ethan Banks from Packet Pushers ( and Greg Ross from Paessler ( for a discussion about smart network …
    In this fourth video of the Xpdf series, we discuss and demonstrate the PDFinfo utility, which retrieves the contents of a PDF's Info Dictionary, as well as some other information, including the page count. We show how to isolate the page count in a…
    In this seventh video of the Xpdf series, we discuss and demonstrate the PDFfonts utility, which lists all the fonts used in a PDF file. It does this via a command line interface, making it suitable for use in programs, scripts, batch files — any pl…

    761 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    12 Experts available now in Live!

    Get 1:1 Help Now