RDP warnings
- Go to and modify the key:
HKLM\Software\Policies\Microsoft\Windows NT\Terminal Services\Clientwith the following values:- Name: RedirectionWarningDialogVersion
- Type: REG_DWORD
- Data: 1
HKLM\Software\Policies\Microsoft\Windows NT\Terminal Services\Client with the following values:
Get-Mailbox | ForEach-Object { $mailbox = $_.PrimarySmtpAddress
Get-InboxRule -Mailbox $mailbox | Select-Object @{Name="Mailbox";Expression={$mailbox}}, Name, Description } | Export-Csv -Path "<OutputFile>" -NoTypeInformation -Append –Force
https://admindroid.com/how-to-manage-inbox-rules-in-exchange-online
For legacy applications that need to access file shares on your Windows server, Microsoft suggests configuring those shares with leasing mode using the -LeasingMode None parameter in PowerShell commands like New-SmbShare or Set-SmbShare. This makes the Windows server’s shares behave like SMBv1 (without modern features like oplocks and leases) while still using the more secure SMBv2 or SMBv3 protocols.
Here is an example:
# Create a new share compatible with legacy applications
New-SmbShare -Name “LegacyApp” -Path “C:\LegacyData” -LeasingMode None
# Or modify an existing share
Set-SmbShare -Name “ExistingShare” -LeasingMode None
This allows legacy applications to connect successfully without requiring the vulnerable SMBv1 protoco
Get-WindowsCapability -Name “Print.Management.Console*” -Online | Add-WindowsCapability -Online
diskshadow
delete shadows all
> symbol) at the top left of the screen.Note: This command is case-sensitive. You can use Tab-completion to help:
WinJS.A, press Tab to auto-complete Application.res, press Tab to auto-complete restart.Note: If the Escape key doesn’t close the Console, click anywhere on the screen to ensure the console is focused and then press the key again.
And another
Shift + F10
regedit
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\OOBE\
HideOnlineAccountScreens 1
Computer Configuration>Administrative Templates>Network>Lanman Workstation
Enabled: Enable insecure guest logons
Disable: Require encryption
Then
Disable SMB Signing:
Set-SmbClientConfiguration -RequireSecuritySignature $false
Set-SmbServerConfiguration -RequireSecuritySignature $false
Reboot
Also good to check with
Get-SmbClientConfiguration
takeown /R /A /F foldername /D N
icacls foldername /grant Administrators:F /T /C
explorer shell:::{A8A91A66-3A7D-4424-8D24-04E180695C7A}
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Power]
“PlatformAoAcOverride”=dword:00000000
Reboot