TechNet Gallery - resources for IT professionals
Download resources and applications for Windows 7, Windows Server 2008 R2, Windows Server 2008, SharePoint, System Center, Office, and other products. Find resources written in VB Script, PowerShell, SQL, JavaScript, or other script languages. New resources are added frequently so check often and see what's new.
Each contribution is licensed to you under a License Agreement by its owner, not Microsoft. Microsoft does not guarantee the contribution or purport to grant rights to it.
|
Allows a much easier management of permissions on files and folders using PowerShell
|
Featured
|
|
|
Allows a much easier management of permissions on files and folders using PowerShell
|
(105)
Updated 8/21/2013
Released 6/20/2011
96,819
Downloads
|
|
|
Contains two functions that can be used together to view the Share permissions and the NTFS permissions on each share on a server or servers.
|
(21)
Updated 2/22/2012
Released 9/13/2010
6,479
Downloads
|
|
|
List Folder and Subfolder security to csv file!
|
(3)
Updated 1/31/2012
Released 1/31/2012
2,474
Downloads
|
|
|
GetPasswordFile is a function that utilizes Copy-RawItem (http://gallery
directory. This is a sa |
(2)
Updated 6/28/2013
Released 6/20/2013
182
Downloads
|
|
|
Extracts LSA secrets from HKLM:\\SECURITY
|
(0)
Updated 6/26/2012
Released 6/26/2012
593
Downloads
|
|
|
Allows a much easier management of permissions inside the registry database using PowerShell
|
(50)
Updated 8/27/2011
Released 7/27/2011
11,147
Downloads
|
|
|
DESCRIPTION The Enable-TSDuplic
|
(1)
Updated 6/26/2012
Released 6/26/2012
461
Downloads
|
|
|
If you need to edit the .NET Code Access Security (CAS) on a Workstation you have to use the very unhandy CASPOL.EXE.
I had the need to change the CAS to Trust/Untrust a Share. I found no way to remove the Trust easily. So I Wrap and Parse the output of the Caspol.exe. |
(1)
Updated 2/2/2012
Released 2/1/2012
440
Downloads
|
|
|
Welcome to the "A Solution for Private Cloud Security" series of three papers on private cloud security. With increasing numbers of organizations looking to create cloud-based environments or to implement cloud technologies within their existing data centers.
|
(4)
Updated 1/17/2012
Released 1/17/2012
979
Downloads
|
|
|
I have created two PowerShell scripts. First script will generate an encrypted message based on an automatically selected key 0 - 25. The second script will prompt you to enter a plain text and key. Enjoy!More info - http://portal
|
(0)
Updated 11/14/2013
Released 11/7/2013
17
Downloads
|
|
|
SYNOPSIS Performs a Brute-Force Test against SQL Server, Active Directory, Web and FTP.DESCRIPTION Invoke-TSMedusa tries to login to SQL, ActiveDirectory
|
(0)
Updated 6/26/2012
Released 6/26/2012
219
Downloads
|
|
|
The purpose of this document is to define and provide detailed conceptual information on the four fundamental pillars of identity that can be useful in creating a strategic direction for an identity infrastructure in your organization.
|
(3)
Updated 1/25/2013
Released 1/25/2013
753
Downloads
|
|
|
The purpose of this document is to provide detailed conceptual information on identity infrastructure capabilities specific to both on-premises and cloud computing that we at Microsoft are most often asked by our customers to implement.
|
(1)
Updated 6/20/2013
Released 1/25/2013
590
Downloads
|
|
|
First script will generate an encrypted message based on an automatically selected key 0 - 25. The second script will prompt you to enter a plain text and key. Enjoy!More info - http://portal
|
(0)
Updated 11/14/2013
Released 11/7/2013
16
Downloads
|
|
|
This is the Content Map for "A Solution for Private Cloud Security". "A Solution for Private Cloud Security" is a set of documents that
you can use to create the security infrastructure for your private cloud deployments. This document set is focused on an architectural approac |
(2)
Updated 1/17/2012
Released 1/17/2012
333
Downloads
|
|
Download Windows Server 2012