Skip to content

Instantly share code, notes, and snippets.

We can make this file beautiful and searchable if this error is corrected: It looks like row 6 should actually have 5 columns, instead of 3. in line 5.
Element,Tag,Comment,Reg Type,Example
Boolean, <boolean id=>,Usually corresponds to a tick box in gpedit.msc which sets a value to true or false,REG_DWORD,"<enabled/><data id=""DeviceInstall_Classes_Deny_Retroactive"" value=""false""/>"
Decimal, <decimal id=>,"Gpedit.msc contains an interface to adjust decimal values usually time periods",REG_DWORD,"<enabled/><data id=""Streaming_Reestablishment_Interval_Prompt""value=""4""/>"
Enum,<enum id=>,"Gpedit provides a drop down the values correspond to a numeric value that is written to the registry",REG_DWORD,"<enabled/><data id=""EncryptionMethodWithXtsOsDropDown_Name"" value=""4""/>"
List,<list id=>,Multiple string values can be entered into a grid in gpedit.msc. The grid is repesented in SyncML as a string containing pairs of strings. You should always first use gpedit and check the registry to see how the value pairs are created,REG_SZ,"<enabled/><data id=""DeviceInstall_Classes_Deny_List"" value=""1&#xF000;123&#xF000;2&#xF000;456""/>"
No elements,n/a,Refers to
@mackwage
mackwage / windows_hardening.cmd
Last active July 3, 2024 14:47
Script to perform some hardening of Windows OS
:: Windows 10 Hardening Script
:: This is based mostly on my own personal research and testing. My objective is to secure/harden Windows 10 as much as possible while not impacting usability at all. (Think being able to run on this computer's of family members so secure them but not increase the chances of them having to call you to troubleshoot something related to it later on). References for virtually all settings can be found at the bottom. Just before the references section, you will always find several security settings commented out as they could lead to compatibility issues in common consumer setups but they're worth considering.
:: Obligatory 'views are my own'. :)
:: Thank you @jaredhaight for the Win Firewall config recommendations!
:: Thank you @ricardojba for the DLL Safe Order Search reg key!
:: Thank you @jessicaknotts for the help on testing Exploit Guard configs and checking privacy settings!
:: Best script I've found for Debloating Windows 10: https://github.com/Sycnex/Windows10Debloater
:
@leeramsay
leeramsay / PSADT-Cheatsheet.ps1
Last active June 28, 2024 18:21
PSADT snippits/cheatsheet
## Commonly used PSADT env variables
$envCommonDesktop # C:\Users\Public\Desktop
$envCommonStartMenuPrograms # C:\ProgramData\Microsoft\Windows\Start Menu\Programs
$envProgramFiles # C:\Program Files
$envProgramFilesX86 # C:\Program Files (x86)
$envProgramData # c:\ProgramData
$envUserDesktop # c:\Users\{user currently logged in}\Desktop
$envUserStartMenuPrograms # c:\Users\{user currently logged in}\AppData\Roaming\Microsoft\Windows\Start Menu\Programs
$envSystemDrive # c:
$envWinDir # c:\windows
@Manouchehri
Manouchehri / rfc3161.txt
Last active July 7, 2024 10:55
List of free rfc3161 servers.
https://rfc3161.ai.moda
https://rfc3161.ai.moda/adobe
https://rfc3161.ai.moda/microsoft
https://rfc3161.ai.moda/apple
https://rfc3161.ai.moda/any
http://rfc3161.ai.moda
http://timestamp.digicert.com
http://timestamp.globalsign.com/tsa/r6advanced1
http://rfc3161timestamp.globalsign.com/advanced
http://timestamp.sectigo.com