TechNet Gallery - resources for IT professionals

Download resources and applications for Windows 7, Windows Server 2008 R2, Windows Server 2008, SharePoint, System Center, Office, and other products. Find resources written in VB Script, PowerShell, SQL, JavaScript, or other script languages. New resources are added frequently so check often and see what's new.

Each contribution is licensed to you under a License Agreement by its owner, not Microsoft. Microsoft does not guarantee the contribution or purport to grant rights to it.
Sort by: rss
17 results in Security > Windows Vista [Clear]
Raimund Andrée
Allows a much easier management of permissions on files and folders using PowerShell
Featured
Raimund Andrée
Allows a much easier management of permissions on files and folders using PowerShell
(105)
Updated 8/21/2013
Released 6/20/2011
96,819 Downloads
Boe Prox
Contains two functions that can be used together to view the Share permissions and the NTFS permissions on each share on a server or servers.
(21)
Updated 2/22/2012
Released 9/13/2010
6,479 Downloads
Alexxxandre K8L0
List Folder and Subfolder security to csv file!
(3)
Updated 1/31/2012
Released 1/31/2012
2,474 Downloads
obscuresec
GetPasswordFile is a function that utilizes Copy-RawItem (http://gallery.technet.microsoft.com/scriptcenter/Copy-RawItem-Private-NET-78917643) and the volume shadow copy service to copy the password (either ntds.dit or sam) and system file to a specified
directory. This is a sa
(2)
Updated 6/28/2013
Released 6/20/2013
182 Downloads
Goude, Niklas
Extracts LSA secrets from HKLM:\\SECURITY\Policy\Secrets\ on a local computer. The function must be run with elevated permissions, in 32-bit mode and requires permissions to the security key in the registry
(0)
Updated 6/26/2012
Released 6/26/2012
593 Downloads
Raimund Andrée
Allows a much easier management of permissions inside the registry database using PowerShell
(50)
Updated 8/27/2011
Released 7/27/2011
11,147 Downloads
Goude, Niklas
The Get-TSWordXMetadata function displays Metadata from a WordX file using the Word.Application Com Object.
(0)
Updated 6/26/2012
Released 6/26/2012
206 Downloads
Goude, Niklas
DESCRIPTION The Enable-TSDuplicateToken function duplicates the Access token of lsass and sets it in the current process thread. The CmdLet must be run with elevated permissions.
(1)
Updated 6/26/2012
Released 6/26/2012
461 Downloads
Peter Kriegel
If you need to edit the .NET Code Access Security (CAS) on a Workstation you have to use the very unhandy CASPOL.EXE.
I had the need to change the CAS to Trust/Untrust a Share.
I found no way to remove the Trust easily.
So I Wrap and Parse the output of the Caspol.exe.
(1)
Updated 2/2/2012
Released 2/1/2012
440 Downloads
Thomas W Shinder - MSFT
Welcome to the "A Solution for Private Cloud Security" series of three papers on private cloud security. With increasing numbers of organizations looking to create cloud-based environments or to implement cloud technologies within their existing data centers.
(4)
Updated 1/17/2012
Released 1/17/2012
979 Downloads
Santhosh Sivarajan-
I have created two PowerShell scripts. First script will generate an encrypted message based on an automatically selected key 0 - 25.  The second script will prompt you to enter a plain text and key.  Enjoy!More info - http://portal.sivarajan.com/2013/11/caesar-cipher-encryption-
(0)
Updated 11/14/2013
Released 11/7/2013
17 Downloads
Goude, Niklas
SYNOPSIS Performs a Brute-Force Test against SQL Server, Active Directory, Web and FTP.DESCRIPTION Invoke-TSMedusa tries to login to SQL, ActiveDirectory, Web or FTP using a specific account and password. You can also specify a password-list as input as shown in the Exam
(0)
Updated 6/26/2012
Released 6/26/2012
219 Downloads
Thomas W Shinder - MSFT - Microsoft
The purpose of this document is to define and provide detailed conceptual information on the four fundamental pillars of identity that can be useful in creating a strategic direction for an identity infrastructure in your organization.
(3)
Updated 1/25/2013
Released 1/25/2013
753 Downloads
Thomas W Shinder - MSFT - Microsoft
The purpose of this document is to provide detailed conceptual information on identity infrastructure capabilities specific to both on-premises and cloud computing that we at Microsoft are most often asked by our customers to implement.
(1)
Updated 6/20/2013
Released 1/25/2013
590 Downloads
Santhosh Sivarajan-
First script will generate an encrypted message based on an automatically selected key 0 - 25.  The second script will prompt you to enter a plain text and key.  Enjoy!More info - http://portal.sivarajan.com/2013/11/caesar-cipher-encryption-powershell.htmlScript #1 - This script
(0)
Updated 11/14/2013
Released 11/7/2013
16 Downloads
1 - 15 of 17 Items