Windows 10 disables the Windows Defender antispyware agent
Edit the registry: Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender] “DisableAntiSpyware”=dword:00000001
Edit the registry: Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender] “DisableAntiSpyware”=dword:00000001
In this tutorial, I will explain to you how to create and especially configure receive connectors in Exchange during a migration between two versions. When we do an Exchange migration, especially on large environments, it happens that we cannot do it in an evening or a weekend and we will end up with mailboxes in …
In this new tutorial dedicated to IIS ARR, I will explain how to configure ARR in order to be able to use a self-signed certificate on the target server. In the previous tutorial, I explained how to do an SSL dump, in this configuration the target server is in HTTP, which means that the request …
In this tutorial, I will explain how to add the X-Forwarded-For field in the IIS logs, in order to retrieve the real IP address of a visitor when a reverse proxy is upstream of the IIS server. On the IIS Web server, open the Internet Services Management console. Select server 1 and click Logging 2. …
In this tutorial, I will explain how to sign your scripts. Before going into the subject, we will see why signing the scripts, the main reason is security. If your environment (computers + servers) is configured to run only signed scripts and a PowerShell script is launched in a malicious file, it will be neutralized …
In this tutorial, I will tell you how to fix error 0x8007520c on an ADFS proxy server. When you open the Remote Access Management Console console, the following page is displayed: This error occurs during a certificate change and the proxy does not have the same fingerprint as the ADFS server. The easiest way to …
In this tutorial, I will explain how to download a file using PowerShell that is on a server accessible in HTTP or HTTPS. This can be particularly useful when administering a server without an interface, where the only browser installed is Internet Explorer or in a script. There are several solutions to download one using …
In this “small” tutorial, I will explain how to create a text file in Powershell and then how to write content in it. In this tutorial, we will see 4 Powershell Cmdlets: We will start by creating the file. Here the file is created in the current folder, it is possible to put an absolute …
In this tutorial, I will explain how to configure the default applications (browser, PDF reader…) using a Group Policy (GPO) in an Active Directory environment. Puzzle of IT services, it is the use of default programs for certain types of files (PDF, Images) or even Internet browser, the configuration of such a group strategy allows …
In this tutorial, I will explain how to delete a mailbox on Exchange 2016/2019, without deleting the user who is linked to this mailbox. On the ECP interface, if you use the trash can icon in addition to deleting the mailbox, this deletes the user in the Active Directory, or it happens in some cases …