mode con:cols=150 lines=50
Set-ExecutionPolicy -ExecutionPolicy RemoteSigned
Set-ExecutionPolicy -Scope CurrentUser -ExecutionPolicy Undefined
$crllist = Get-CACrlDistributionPoint; foreach ($crl in $crllist) {Remove-CACrlDistributionPoint $crl.uri -Force}; | |
Add-CACRLDistributionPoint -Uri C:\Windows\System32\CertSrv\CertEnroll\BEDROCK-ROOT%8%9.crl -PublishToServer -PublishDeltaToServer -Force | |
Add-CACRLDistributionPoint -Uri http://pki.bedrock.domain/pki/BEDROCK-ROOT%8%9.crl -AddToCertificateCDP -AddToFreshestCrl -Force | |
Get-CAAuthorityInformationAccess | where {$_.Uri -like '*ldap*' -or $_.Uri -like '*http*' -or $_.Uri -like '*file*'} | Remove-CAAuthorityInformationAccess -Force | |
Add-CAAuthorityInformationAccess -AddToCertificateAia http://pki.bedrock.domain/pki/BEDROCK-ROOT%3%4.crt -Force | |
certutil.exe –setreg CA\CRLPeriodUnits 20 | |
certutil.exe –setreg CA\CRLPeriod “Years” | |
certutil.exe –setreg CA\CRLOverlapPeriodUnits 3 | |
certutil.exe –setreg CA\CRLOverlapPeriod “Weeks” | |
certutil.exe –setreg CA\ValidityPeriodUnits 10 |
# On RootCA | |
Add-WindowsFeature Adcs-Cert-Authority -IncludeManagementTools | |
Install-AdcsCertificationAuthority -CAType StandaloneRootCA -CACommonName "Bedrock Root Certificate Authority" -KeyLength 4096 -HashAlgorithm SHA256 -CryptoProviderName "RSA#Microsoft Software Key Storage Provider" -ValidityPeriod Years -ValidityPeriodUnits 20 -Force | |
# On SubCA | |
Add-WindowsFeature Adcs-Cert-Authority -IncludeManagementTools | |
Install-AdcsCertificationAuthority -CAType EnterpriseSubordinateCA -CACommonName "Bedrock Enterprise Certificate Authority" -KeyLength 4096 -HashAlgorithm SHA256 -CryptoProviderName "RSA#Microsoft Software Key Storage Provider" -Force |
[Version] | |
Signature=”$Windows NT$” | |
[PolicyStatementExtension] | |
Policies=InternalPolicy | |
[InternalPolicy] | |
OID= 1.2.3.4.1455.67.89.5 | |
URL=http://pki.adatum.com/pki/cps.html | |
[Certsrv_Server] | |
RenewalKeyLength=4096 | |
RenewalValidityPeriod=Years |
# Install-ADDSDomainController -NoGlobalCatalog:$true -Credential (Get-Credential) -CriticalReplicationOnly:$false -DatabasePath "C:\Windows\NTDS" -DomainName "adatum.com" -InstallDns:$false -LogPath "C:\Windows\NTDS" -NoRebootOnCompletion:$false -ReplicationSourceDC "NE-DC1.adatum.com" -SiteName "Default-First-Site-Name" -SysvolPath "C:\Windows\SYSVOL" -Force:$true | |
Invoke-Command -ComputerName NE-DC2 { Install-ADDSDomainController -NoGlobalCatalog:$true -Credential (Get-Credential) -CriticalReplicationOnly:$false -DatabasePath "C:\Windows\NTDS" -DomainName "adatum.com" -InstallDns:$false -LogPath "C:\Windows\NTDS" -NoRebootOnCompletion:$false -ReplicationSourceDC "NE-DC1.adatum.com" -SiteName "Default-First-Site-Name" -SysvolPath "C:\Windows\SYSVOL" -Force:$true -SafeModeAdministratorPassword (Read-Host -Prompt "SafeModeAdministratorPassword" -AsSecureString) } |
Set-ItemProperty -Path "HKLM:\SOFTWARE\Policies\Microsoft\Cryptography\Configuration\SSL\00010002" -Name "Functions" -Value "TLS_RSA_WITH_AES_256_GCM_SHA384,TLS_RSA_WITH_AES_128_GCM_SHA256,TLS_RSA_WITH_AES_256_CBC_SHA256,TLS_RSA_WITH_AES_128_CBC_SHA256,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_3DES_EDE_CBC_SHA,TLS_RSA_WITH_RC4_128_SHA" |
dcdiag /test:ridmanager /v | |
danach runter scrollen zu: | |
Starting test: RidManager | |
* Available RID Pool for the Domain is 2100 to 1073741823 | |
* NE-DC1.adatum.com is the RID Master | |
* DsBind with RID Master was successful | |
* rIDAllocationPool is 1600 to 2099 | |
* rIDPreviousAllocationPool is 1600 to 2099 |
Deaktivieren | |
Set-ADObject -Identity (Get-ADDomainController -Identity $env:ComputerName).NTDSSettingsObjectDN -Replace @{options='0'} | |
Aktivieren | |
Set-ADObject -Identity (Get-ADDomainController -Identity $env:ComputerName).NTDSSettingsObjectDN -Replace @{options='1'} | |
wobei "$env:ComputerName" = aktueller DC. |
REM usage: fix_perms.bat <username> | |
REM Recursively assign ownership to Administrators. Answer prompts with "Y". | |
takeown /R /A /F %1 /D Y | |
REM Grant Full permissions on folder and subfolders to Administrators, SYSTEM, and the user | |
cacls %1 /T /E /P "Administrators":F | |
cacls %1 /T /E /P SYSTEM:F | |
cacls %1 /T /E /P %1:F | |
REM Set owner back to UserName | |
subinacl.exe /noverbose /subdirectories %1\*.* /setowner=%1 |