This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# connect to EXO with MFA | |
$CreateEXOPSSession = (Get-ChildItem -Path $env:userprofile -Filter CreateExoPSSession.ps1 -Recurse -ErrorAction SilentlyContinue -Force | Select -Last 1).DirectoryName | |
. "$CreateEXOPSSession\CreateExoPSSession.ps1" |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
function Verify-MScoreHostedOutboundSpamFilterPolicy | |
{ | |
<# | |
.Synopsis | |
Verify-MScoreHostedOutboundSpamFilterPolicy | |
.DESCRIPTION | |
The Verify-MScoreHostedOutboundSpamFilterPolicy cmdlet verifies the configuation | |
of the outbound spam policy |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
function Start-OfficeReadinessCollection | |
{ | |
<# | |
.Synopsis | |
Start-OfficeReadinessCollection | |
.DESCRIPTION | |
Start-OfficeReadinessCollection is a wrapper script for the Readiness Toolkit for Office add-ins and VBA | |
.PARAMETER OutPutPath | |
Specifies the path where the Office Readiness Assessment results are stored. |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Function Export-CMScriptResults | |
{ | |
<# | |
.Synopsis | |
Export-CMScriptResults | |
.DESCRIPTION | |
Export-CMScriptResults exports the return values from scripts that are executed | |
through the ConfigMgr Run Script feature. | |
.PARAMETER ScriptName | |
The name of the Script as it is displayed within the ConfigMgr Console. |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<# | |
.Synopsis | |
Get-UserProfileSize | |
.DESCRIPTION | |
Get-UserProfileSize retrieves the profile size information of each locally stored profile. The command retrieves the | |
size of the profile Document and Desktop folder and the full profile size but excluding the AppData\local folder | |
.EXAMPLE | |
Get-UserProfileSize -OutPutLocation C:\Temp -Verbose |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
function Import-SecurityBaselineGPO | |
<# | |
.Synopsis | |
Import-SecurityBaselineGPO | |
.DESCRIPTION | |
Import-SecurityBaselineGPO | |
.PARAMETER GPOBackupPath | |
The path that constains the Security baselines GPO backup | |
.EXAMPLE |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
function Test-EnvPathHealth | |
{ | |
<# | |
.Synopsis | |
Test-EnvPathHealth | |
.DESCRIPTION | |
Test-EnvPathHealth tests if the paths defined within the %PATH% environment variable | |
exist. | |
.PARAMETER Writable |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
// code used in https://www.verboon.info/2019/11/how-to-generate-a-monthly-defender-atp-threat-and-vulnerability-report/ | |
DeviceTvmSoftwareInventoryVulnerabilities | |
| project DeviceName, SoftwareName, CveId, SoftwareVersion, VulnerabilitySeverityLevel | |
| join (DeviceTvmSoftwareVulnerabilitiesKB | |
| project AffectedSoftware, VulnerabilityDescription , CveId , CvssScore , IsExploitAvailable | |
) | |
on CveId | |
| project CveId , SoftwareName , SoftwareVersion , VulnerabilityDescription , VulnerabilitySeverityLevel, IsExploitAvailable , CvssScore | |
| distinct SoftwareName , SoftwareVersion, CveId, VulnerabilityDescription , VulnerabilitySeverityLevel, IsExploitAvailable | |
| sort by SoftwareName asc , SoftwareVersion |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
function Get-ADSysVolPolicyFolders | |
{ | |
<# | |
.Synopsis | |
Verify-ADSysVolPolicyFolders | |
.DESCRIPTION | |
Get-ADSysVolPolicyFolders retrieves all the folders within the SYSVOL\Policies folder and checks | |
whether it belongs to an existing Group Policy object. | |
Use this script to identify orphan group policy content folders that can be removed. |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# Prepare Folder Structure" | |
If (-not (Test-Path -Path "C:\TEMP\GPO" -PathType Container )) | |
{ | |
New-Item -Path "C:\TEMP\GPO" -ItemType "Directory" | |
New-Item -Path "C:\TEMP\GPO\Backup" -ItemType "Directory" | |
New-Item -Path "C:\TEMP\GPO\Reports" -ItemType "Directory" | |
} | |
Else | |
{ |