WIN
Windows/Microsoft 365 documentation + Powershell & Batch scripting
Licensing
Keys (not tested)
https://gist.github.com/rvrsh3ll/0810c6ed60e44cf7932e4fbae25880df
Security
Password
Fine-grained password
Fine-grained password policies enable security and Active Directory admins to define password settings for individual user accounts and global groups. This enables far greater security than the Group Policy Default Domain Policy, which enforces a single password policy for all domain members.
Powershell
Deploy AD
Syntax tips
“| % “: remplace le foreach-object
Conditions
Operator
Comparison
-eq
equals
-ne
not equals
-gt
greater than
-ge
greater than or equal
-lt
less than
-le
less than or equal
-like
string matches wildcard pattern
-notlike
string does not match wildcard pattern
-match
string matches regex pattern
-notmatch
string does not match regex pattern
-contains
collection contains a value
-notcontains
collection does not contain a value
-in
value is in a collection
-notin
value is not in a collection
-is
both objects are the same type
-isnot
the objects are not the same type
-not
negates the statement
!
negates the statement
Disable firewall
Disable UAC (change value in REGEDIT)
Ask for admin privileges (script)
Connect to M365 Online Exchange
Set IP configuration to adapter
Mini script pour modifier la configuration
https://www.pdq.com/blog/how-to-use-powershell-to-set-static-and-dhcp-ip-addresses/
Batch
Ask for admin cmd
Delete directory and user
Create New user and add in group
M365
SharedCalendar
Adding permissions
Add calendar permission to a user. Exemple: We add the permissions “Editor” to user2 on the calendar of user1.
Permissions
Owner — gives full control of the mailbox folder: read, create, modify, delete items/folders, and manage permissions;
PublishingEditor — read, create, modify, and delete items/subfolders (all permissions, except the right to change permissions);
Editor — read, create, modify, and delete items (can’t create subfolders);
PublishingAuthor — create, and read all items/subfolders. You can modify and delete only items that you have created;
Author — create and read items. Edit and delete own items;
NonEditingAuthor — full read access, and create items. You can delete only your own items;
Reviewer — read folder items only;
Contributor — create items and folders (can’t read items);
AvailabilityOnly — read Free/Busy time from the calendar;
LimitedDetails — view the availability, subject and location of appointments in the calendar;
None — no permissions to access folders and files.
Eléments envoyés dans boîte partagée
Mettre les mails envoyés depuis une boîte partagée dans les éléments envoyés de cette dernière, et non dans celle de l’utilisateur
RDS
Sources
https://www.petenetlive.com/kb/article/0001753
Explanation
RD Session Host: This is what does all the heavy lifting, it hosts the remote user sessions. Typically these will be the server(s) in your deployment that suffer with recourse constraints if you get something wrong. As I’ve mentioned above if you’re running 3rd Party Line of Business applications on here MAKE sure they are designed and optimised for RDS. Finally based on what your users are doing is it worth having better/faster/local storage on these servers.
RD Connection Broker: This role had two primary jobs, 1) Connect remote users to the least utilised session hosts, and 2) Reconnect users to the correct session host if they’ve dropped a connection, or have an existing open RDS session.
RD Web Server: This provides a web logon portal for RDS so that RDS desktops and applications can be accessed over HTTPS. Remember just because traffic is on HTTPS (TCP port 443) do not assume it’s trusted and non malicious. Nearly every exploit and attack these days used HTTPS or SSH to get traffic in and out of your network. Unless you are inspecting https it’s not more secure than http! Typically the RD Web server is deployed in a DMZ. In some small deployments it can also be on the RD Connection broker.
RD Licence Server: Typically this gets put on ‘Another‘ server in the environment, the draw back of this is people forget where it is, and don’t check before decommissioning a server then find out a few days later their licence server disappeared. You install this role, then register it with Microsoft, then finally add your licences to it.

Last updated