#Requires -Version 4
#Requires -RunAsAdministrator
$ProtocolsToRemove = @('PCT 1.0','SSL 2.0','SSL 3.0','TLS 1.0')
$HashesToRemove = @('MD5','SHA')
$CiphersToRemove = @(
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
[cmdletbinding()] | |
param( | |
[Parameter(Mandatory = $false)] | |
[Alias('Path')] | |
[String[]] | |
$BasePath = 'C:\', | |
[Parameter(Mandatory = $false)] | |
[Alias('User')] | |
[String[]] | |
$FolderName = 'all', |
On Windows, use StarWind RAM Disk: http://www.starwindsoftware.com/tmplink/RAMDiskSetup.exe
Add-WindowsFeature FS-iSCSITarget-Server
Set-Service -Name MSiSCSI -StartupType Automatic
RunDll32.exe InetCpl.cpl,ClearMyTracksByProcess <number>
The parameter is required and is derived from some combination of the following values, represented as a decimal number.
1 = Browsing History
2 = Cookies
4 = Temporary Internet Files
- Using octopusdeploy
- application is precompiled
- drive c: gets fill up
dir IIS:\AppPools | Stop-WebAppPool -ErrorAction SilentlyContinue
Stop-Process -Name "w3wp" -Force -PassThru
rmdir -Path "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Temporary ASP.NET Files\root\" -Force -Recurse
Passing arguments to MSI installers is tricky:
$DataStamp = get-date -Format yyyyMMddTHHmmss
$logFile = '{0}-{1}.log' -f $file.fullname,$DataStamp
$MSIArguments = @(
"/i"
('"{0}"' -f $file.fullname)
"/qn"
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<# | |
.SYNOPSIS | |
This script: | |
Creates a new resource group | |
Creates a VNet with two subnets in the RG | |
Allocates a static public IP | |
Creates a NSG and adds rules permitting TCP 3389, 80 and 443 | |
Launches a WinSrv2012R2 instance | |
Configures RDG server via Remote Desktop Services PowerShell provider using a DSC configuration | |
The DSC configuration: |
https://medium.com/@kyle.gagnet/your-net-code-could-stop-working-in-june-afb35fbf29ca https://www.hass.de/content/setup-microsoft-windows-or-iis-ssl-perfect-forward-secrecy-and-tls-12 https://johnlouros.com/blog/disabling-cryptographic-protocols-for-pci-compliance https://johnlouros.com/blog/basics-of-cryptography-with-open-ssl
- To add Azure AD authentication to Azure SQL, you must first assign an AAD group or user as the database administrator. Removing it will disable AAD authentication, adding it gain will enable Azure AAD again (all users that have been granted access will still have access).
- Azure SQL Authentication will still work. You can use the Azure SQL admin account to access the database.
- Create an Azure SQL Database
- Assign an AAD administrator
- Create an AAD Group called dbaccessors and add an AAD User to the group