Prevent duplicate or hanging Powershell processes that run from the Task Scheduler

Many automated processes we write in Powershell are scheduled on a server somewhere and run periodically.
Sometimes, the script may hang. In my experience, the task scheduler setting “Stop the task if it runs longer than:” rarely works properly when a Powershell script hangs. It either thinks it stopped the task, or is unable to.

This can result in memory hogging runaway Powershell processes, locked log files, concurrent user issues, etc etc.

If you want to prevent that from happening, add this function to your script and call it once at the start of your script. It will kill any Powershell process with the same script name that does not match the running process’s Process ID. It requires Powershell 3+:

function preventDoubleSchedule{
        $scriptFileName = split-path $MyInvocation.PSCommandPath -Leaf
    }catch{$scriptFileName = $Null}
        [Array]$psProcesses = @(Get-WmiObject Win32_Process -Filter "name like '%Powershell.exe%' and handle != '$pid'" | where {$_})
    if($psProcesses.Count -gt 0){
        foreach($psProcess in $psProcesses){
            if($psProcess.CommandLine -like "*$scriptFileName*" -and $scriptFileName){
                ##we've found a Powershell process that is running this script, but does not have the same process ID, lets try to kill it
                    Stop-Process -Id $psProcess.Handle -Force -Confirm:$False

O365GroupSync v0.50 available!

Version 0.50 is out, changes:

  • fixed a bug in using the wrong smtp prefix when searching
  • removed log spam about skipped inactive accounts
  • set managedBy after creating all groups
  • extra mail parameters to allow configuration of WHEN emails are sent (e.g. only in case of errors)
  • send error mail when log file is locked
  • reconnect to ExO each caching action
  • overwrite instead of add primary smtp
  • set mailNickName and legacyExchangeDN values when creating AD group so the group isn’t invisible in the legacy exchange console

Get it here

OnedriveMapper v2.53 released!

Version 2.53 of OneDriveMapper has been released!

  • Updated to work with changes in MS’s backend
  • Better handling of AzureAD SSO Preview

This morning I received reports that the O4B mapping was failing, but SpO ones weren’t. Digging into this I noticed that if I attempted to map the moment the script hits O4B, it did work, so OnedriveMapper now handles the timing a bit different to work with the changes Microsoft made on their end.

Get the new version here

OnedriveMapper v2.51, AADConnect SSO workaround

Hi all, I’ve just posted v2.51, which has a workaround for the Preview Version of SSO in Azure AD Connect that some people have reported not working with OnedriveMapper.

It took me a while to reproduce the issue, but v2.51 now works with Azure AD Connect SSO as long as you do not configure the 2 intranet URL’s through GPO. OnedriveMapper will handle the SSO sites in your local intranet for you, and will still prompt the user for a password once and then cache it.

I’ve got a call with Microsoft to assist on why AADConnect SSO does not generate a persistent cookie, so full compatibility may come in the future.


  • detect and log OS and IE version, only check for relevant KB if necessary
  • semi-compatible with Azure AD Connect SSO (bypass)

Get it here