Use GPO and inheritance of GPO. Create two AD groups:
BTW2. This blocks 95% of malware from running
Start-BitsTransfer "https://github.com/dotnet/cli-lab/releases/download/1.6.0/dotnet-core-uninstall-1.6.0.msi" -Destination c:\temp\dotnet-core-uninstall-1.6.0.msi
.\dotnet-core-uninstall-1.6.0.msi
cd 'C:\Program Files (x86)\dotnet-core-uninstall\'
.\dotnet-core-uninstall list
28 .\dotnet-core-uninstall dry-run
30 .\dotnet-core-uninstall dry-run --hosting-bundle 3.1.26
31 .\dotnet-core-uninstall remove --hosting-bundle 3.1.26
32 .\dotnet-core-uninstall list
33 .\dotnet-core-uninstall dry-run --runtime 3.1.26
34 .\dotnet-core-uninstall remove --runtime 3.1.26
Get-WmiObject -Class Win32_Product | Format-Table
https://learn.microsoft.com/en-us/azure/storage/common/storage-analytics
1. Setup Azure Log analytics, see above
2. Download blobs from $log container, use storage explorer.
3. Build a single csv using this file.
.\XLog2CSV.ps1 -inputFolder "C:\temp\orthanc\blob\2023\11\" -outputFile c:\temp\november.csv
4. Import CSV into sql.
5.Analysis
1. Deploy VM, change public IP addresses to "Standard".
2. Deploy LB.
3. Configure interfaces on VMs.
4. Install domain controller DSC.
5. Configure DNS:
6. Test:
1..20| % {
Get-ADUser test01 -Server jarek8sndvm.contoso.local
Start-Sleep -Seconds 1
}
Check your Chrome/Firefox params:
https://1.1.1.1/help
https://dnsviz.net/d/indysoft.com/dnssec/
https://dnssec-debugger.verisignlabs.com/
choco install oh-my-posh -y
choco install microsoft-windows-terminal -y
choco install nerd-fonts-3270 -y
choco install nerd-fonts-meslo -y
Add-MpPreference -ExclusionProcess oh-my-posh.exe
Set-Content -Path $profile -Value 'oh-my-posh init pwsh | Invoke-Expression'
Get-Content $profile
Start-BitsTransfer "https://github.com/ryanoasis/nerd-fonts/releases/download/v2.1.0/Meslo.zip" -Destination c:\temp\meslo.zip
Start-BitsTransfer "https://github.com/microsoft/cascadia-code/releases/download/v2111.01/CascadiaCode-2111.01.zip" -Destination c:\temp\CascadiaCode-2111.01.zip
Expand-Archive C:\temp\meslo.zip -DestinationPath C:\temp\Fonts
Expand-Archive C:\temp\CascadiaCode-2111.01.zip -DestinationPath c:\temp\cascadia\
SELECT DP1.name AS DatabaseRoleName,
isnull (DP2.name, 'No members') AS DatabaseUserName
FROM sys.database_role_members AS DRM
RIGHT OUTER JOIN sys.database_principals AS DP1
ON DRM.role_principal_id = DP1.principal_id
LEFT OUTER JOIN sys.database_principals AS DP2
ON DRM.member_principal_id = DP2.principal_id
WHERE DP1.type = 'R'
ORDER BY DP1.name;
get-nettcpconnection | where {($_.State -eq "Listen")} | select LocalAddress,LocalPort,RemoteAddress,RemotePort,State,@{Name="Process";Expression={(Get-Process -Id $_.OwningProcess).ProcessName}} | ft
get-nettcpconnection | where {($_.State -eq "Listen") -and ($_.LocalPort -eq "80")} | select LocalAddress,LocalPort,RemoteAddress,RemotePort,State,@{Name="Process";Expression={(Get-Process -Id $_.OwningProcess).ProcessName}} | ft
#BACKUP
mysqldump --routines --triggers --host "hostname" --password --user "mysqladmin@hostname" databasename > /tmp/databasename_dump_27022023
optional:
mysqldump --column-statistics=0 --routines --triggers --host "hostname" --password --user "mysqladmin@hostname" databasename > /tmp/databasename_dump_27022023
provide pass
#RESTORE
mysql -u mysqladmin -p -A -Dnewdatabasename --host newhostname-fqdn < /tmp/databasename_dump_27022023
mysqldump -u... -p... --routines --triggers db1 > /root/db1.sql
login:
mysql -h hostname.mysql.database.azure.com -u youruser -D yourDB -P 3306 -p -A