WIN

Windows/Microsoft 365 documentation + Powershell & Batch scripting

Licensing


Keys (not tested)

https://gist.github.com/rvrsh3ll/0810c6ed60e44cf7932e4fbae25880dfarrow-up-right

Security


Password

Fine-grained password

https://www.techtarget.com/searchsecurity/tutorial/How-to-enable-Active-Directory-fine-grained-password-policiesarrow-up-right

Fine-grained password policies enable security and Active Directoryarrow-up-right admins to define password settings for individual user accounts and global groups. This enables far greater security than the Group Policy Default Domain Policy, which enforces a single password policy for all domain members.

Powershell


Deploy AD

Syntax tips

“| % “: remplace le foreach-object

Conditions

Operator

Comparison

-eq

equals

-ne

not equals

-gt

greater than

-ge

greater than or equal

-lt

less than

-le

less than or equal

-like

string matches wildcard pattern

-notlike

string does not match wildcard pattern

-match

string matches regex pattern

-notmatch

string does not match regex pattern

-contains

collection contains a value

-notcontains

collection does not contain a value

-in

value is in a collection

-notin

value is not in a collection

-is

both objects are the same type

-isnot

the objects are not the same type

-not

negates the statement

!

negates the statement

Disable firewall

Disable UAC (change value in REGEDIT)

Ask for admin privileges (script)

Connect to M365 Online Exchange

Set IP configuration to adapter

Mini script pour modifier la configuration

https://www.pdq.com/blog/how-to-use-powershell-to-set-static-and-dhcp-ip-addresses/arrow-up-right

Batch


Ask for admin cmd

Delete directory and user

Create New user and add in group

M365


SharedCalendar

Adding permissions

Add calendar permission to a user. Exemple: We add the permissions “Editor” to user2 on the calendar of user1.

  • Permissions

    • Owner — gives full control of the mailbox folder: read, create, modify, delete items/folders, and manage permissions;

    • PublishingEditor — read, create, modify, and delete items/subfolders (all permissions, except the right to change permissions);

    • Editor — read, create, modify, and delete items (can’t create subfolders);

    • PublishingAuthor — create, and read all items/subfolders. You can modify and delete only items that you have created;

    • Author — create and read items. Edit and delete own items;

    • NonEditingAuthor — full read access, and create items. You can delete only your own items;

    • Reviewer — read folder items only;

    • Contributor — create items and folders (can’t read items);

    • AvailabilityOnly — read Free/Busy time from the calendar;

    • LimitedDetails — view the availability, subject and location of appointments in the calendar;

    • None — no permissions to access folders and files.

Eléments envoyés dans boîte partagée

Mettre les mails envoyés depuis une boîte partagée dans les éléments envoyés de cette dernière, et non dans celle de l’utilisateur

RDS


Sources

https://www.petenetlive.com/kb/article/0001753arrow-up-right

Explanation

RD Session Host: This is what does all the heavy lifting, it hosts the remote user sessions. Typically these will be the server(s) in your deployment that suffer with recourse constraints if you get something wrong. As I’ve mentioned above if you’re running 3rd Party Line of Business applications on here MAKE sure they are designed and optimised for RDS. Finally based on what your users are doing is it worth having better/faster/local storage on these servers.

RD Connection Broker: This role had two primary jobs, 1) Connect remote users to the least utilised session hosts, and 2) Reconnect users to the correct session host if they’ve dropped a connection, or have an existing open RDS session.

RD Web Server: This provides a web logon portal for RDS so that RDS desktops and applications can be accessed over HTTPSarrow-up-right. Remember just because traffic is on HTTPS (TCParrow-up-right port 443) do not assume it’s trusted and non malicious. Nearly every exploit and attack these days used HTTPS or SSHarrow-up-right to get traffic in and out of your network. Unless you are inspecting https it’s not more secure than http! Typically the RD Web server is deployed in a DMZarrow-up-right. In some small deployments it can also be on the RD Connection broker.

RD Licence Server: Typically this gets put on ‘Another‘ server in the environment, the draw back of this is people forget where it is, and don’t check before decommissioning a server then find out a few days later their licence server disappeared. You install this role, then register it with Microsoft, then finally add your licences to it.

rds.png

Last updated