Skip to content

Instantly share code, notes, and snippets.

View alexverboon's full-sized avatar

Alex Verboon alexverboon

View GitHub Profile
@alexverboon
alexverboon / GPOCentralStoreContent
Created December 4, 2019 19:43
GPOCentralStoreContent
$GPStoreLocation = "\\contoso.com\sysvol\contoso.com\Policies\PolicyDefinitions"
Get-item -Path "$GPStoreLocation\*.*" | Sort-Object Name | Select-Object Name | Out-GridView
@alexverboon
alexverboon / GetEventlogIDs.ps1
Created December 10, 2019 18:33
Windows Event Log IDs
# Get all the possible events of an event log provider
(Get-WinEvent -ListProvider "Microsoft-Windows-SENSE").events | Select-Object ID,Description
@alexverboon
alexverboon / managenetbios.ps1
Last active December 14, 2019 16:48
NetBIOSConfiguration
Function Get-NetBiosDisabledStatus
{
<#
.Synopsis
Get-NetBiosDisabledStatus
.DESCRIPTION
Get-NetBiosDisabledStatus checks whether NetBIOS over TCP/IP is disabled
on all IP enabled network adapters.
When NETBIOS over TCP/IP is disabled on all IP enabled network adapters
@alexverboon
alexverboon / Get-AzMFADeploymentStats.ps1
Created March 17, 2020 17:41
Get-AzMFADeploymentStats
function Get-AzMFADeploymentStats
<#
.Synopsis
Get-AzMFADeploymentStats
.DESCRIPTION
Get-AzMFADeploymentStats retrieves the MFA registration information from all users in the
Tenant and summarizes the results by MFA Authentication mode.
.EXAMPLE
Get-AzMFADeploymentStats
@alexverboon
alexverboon / Validate-DkimConfig.ps1
Created March 23, 2020 19:56
Validate-DkimConfig
function Validate-DkimConfig
{
[cmdletbinding()]
Param(
[parameter(Mandatory=$false)]
[string]$domain,
[parameter(Mandatory=$false)]
[switch]$showAll
)
@alexverboon
alexverboon / Start-MDATPAnalyzer.ps1
Created March 23, 2020 21:23
Start-MDATPAnalyzer
Function Start-MDATPAnalyzer{
<#
.Synopsis
Start-MDATPAnalyzer
.DESCRIPTION
Start-MDATPAnalyzer downloads and then runs the Microsoft Defender Connectivity Analyzer tool referenced here:
https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/configure-proxy-internet#verify-client-connectivity-to-microsoft-defender-atp-service-urls
.PARAMETER TargetPath
Location where MDATP Analyzer will be downloaded and executed from.
.NOTES
Write-host "I was just downloaded"
Write-host "I was just downloaded"
Param(
$Param1
)
write-host "And executed with $Param1"
pause
Write-host "I was just downloaded"
Function RunMe{
Param(
$Param1
)
write-host "And executed with $Param1"
pause
}
# Check if Hawk is installed
If(!(Get-Module "Hawk"))
{
Install-Module -Name "Hawk" -scope CurrentUser
}
Else
{
Write-Output "Hawk Module is already installed"
}