Copy some files to a remote window servers with password less and execute on remote locally

In a Microsoft Windows environment, would like to achieve below.  Please suggest.

1.      Would like to copy some files to a remote window servers with password less (wihout password prompt). We can input pwd to a script.
2.      Executing file remote (start.exe), which should run locally on the remote server.
3.      Get the completion status back to master server. which pushed the file

Please also advise on the utility that I might need to achieve this (e.g bat, vbscript, powersheel etc)

I’m familiar in linux environment but not in Windows
Who is Participating?

[Product update] Infrastructure Analysis Tool is now available with Business Accounts.Learn More

I wear a lot of hats...

"The solutions and answers provided on Experts Exchange have been extremely helpful to me over the last few years. I wear a lot of hats - Developer, Database Administrator, Help Desk, etc., so I know a lot of things but not a lot about one thing. Experts Exchange gives me answers from people who do know a lot about one thing, in a easy to use platform." -Todd S.

This link from the MSFT windows script center has all you need to do this, plus some excellent examples.

Invoke-Command [[-ComputerName] <string[]>] [-ScriptBlock] <scriptblock> [-ApplicationName <string>] [-ArgumentList <Object[]>] [-AsJob] [-Authentication {<Default> | <Basic> | <Negotiate> | <NegotiateWithImplicitCredential> | <Credssp> | <Digest> | <Kerberos>}] [-CertificateThumbprint <string>] [-ConfigurationName <string>] [-Credential <PSCredential>] [-HideComputerName] [-InputObject <psobject>] [-JobName <string>] [-Port <int>] [-SessionOption <PSSessionOption>] [-ThrottleLimit <int>] [-UseSSL] [<CommonParameters>]

Invoke-Command [[-ComputerName] <string[]>] [-FilePath] <string> [-ApplicationName <string>] [-ArgumentList <Object[]>] [-AsJob] [-Authentication {<Default> | <Basic> | <Negotiate> | <NegotiateWithImplicitCredential> | <Credssp> | <Digest> | <Kerberos>}] [-ConfigurationName <string>] [-Credential <PSCredential>] [-HideComputerName] [-InputObject <psobject>] [-JobName <string>] [-Port <int>] [-SessionOption <PSSessionOption>] [-ThrottleLimit <int>] [-UseSSL] [<CommonParameters>]

Invoke-Command [[-Session] <PSSession[]>] [-FilePath] <string> [-ArgumentList <Object[]>] [-AsJob] [-HideComputerName] [-InputObject <psobject>] [-JobName <string>] [-ThrottleLimit <int>] [<CommonParameters>]

Invoke-Command [[-ConnectionURI] <Uri[]>] [-FilePath] <string> [-AllowRedirection] [-ArgumentList <Object[]>] [-AsJob] [-Authentication {<Default> | <Basic> | <Negotiate> | <NegotiateWithImplicitCredential> | <Credssp> | <Digest> | <Kerberos>}] [-ConfigurationName <string>] [-Credential <PSCredential>] [-HideComputerName] [-InputObject <psobject>] [-JobName <string>] [-SessionOption <PSSessionOption>] [-ThrottleLimit <int>] [<CommonParameters>]

Invoke-Command [-ScriptBlock] <scriptblock> [-ArgumentList <Object[]>] [-InputObject <psobject>] [<CommonParameters>]

Invoke-Command [[-Session] <PSSession[]>] [-ScriptBlock] <scriptblock> [-ArgumentList <Object[]>] [-AsJob] [-HideComputerName] [-InputObject <psobject>] [-JobName <string>] [-ThrottleLimit <int>] [<CommonParameters>]

Invoke-Command [[-ConnectionURI] <Uri[]>] [-ScriptBlock] <scriptblock> [-AllowRedirection] [-ArgumentList <Object[]>] [-AsJob] [-Authentication {<Default> | <Basic> | <Negotiate> | <NegotiateWithImplicitCredential> | <Credssp> | <Digest> | <Kerberos>}] [-CertificateThumbprint <string>] [-ConfigurationName <string>] [-Credential <PSCredential>] [-HideComputerName] [-InputObject <psobject>] [-JobName <string>] [-SessionOption <PSSessionOption>] [-ThrottleLimit <int>] [<CommonParameters>]

Open in new window


Experts Exchange Solution brought to you by

Your issues matter to us.

Facing a tech roadblock? Get the help and guidance you need from experienced professionals who care. Ask your question anytime, anywhere, with no hassle.

Start your 7-day free trial
You can also use psexec.exe from SysInternals -  It includes an option to copy the file that needs to be executed to the remote system.

PSExec requires that the admin shares be visible and available, and Powershell (mentioned above) requires that the remote system already be configured to allow remoting.  

enthuguyAuthor Commented:
Thanks dlethe, Looks like powershell is the way to go (or atleast will meet my requirement)

Went thru some Microsoft virtual academy training as well. its really cool
It's more than this solution.Get answers and train to solve all your tech problems - anytime, anywhere.Try it for free Edge Out The Competitionfor your dream job with proven skills and certifications.Get started today Stand Outas the employee with proven skills.Start learning today for free Move Your Career Forwardwith certification training in the latest technologies.Start your trial today
VB Script

From novice to tech pro — start learning today.