https://forum.malekal.com/viewtopic.php?t=53174&start=
sur DC
djoin /provision /domain <domaine.local> /machine CLI02 /savefile CLI02.txt
Le fichier se trouvera dans le répertoire : C:\Windows\System32
verifier integration CLI02 dans uo computers
sur clients
djoin /requestODJ /loadfile C:\Djoin\CLI02.txt /windowspath %SystemRoot% /localos
reboot de la machine
– requestODJ : Demande une jonction de domaine hors connexion au prochain démarrage
– loadfile : Chemin vers le fichier de métadonnées créé depuis le contrôleur de domaine
– windowspath %SystemRoot% : On indique le chemin vers l’installation de Windows, l’utilisation de la variable %SystemRoot%
– localos : Appliquer sur l’OS exécuté localement. Nécessite un redémarrage. Implique une exécution en tant qu’administrateur local.
https://blogs.technet.microsoft.com/leesteve/2017/08/09/demystifying-the-unc-hardening-dilemma/
The processing of Group Policy failed. Windows attempted to read the file \\yourdomain.fqdn\sysvol\yourdomain.fqdn\Policies\{GPO GUID}\gpt.ini from a domain controller and was not successful.
Running a dir \\yourdomain.fqdn\sysvol will also result in the error: The network path was not found. You may also see an « access denied ».
If the above applies to you, you will need to fix this via registry. First, there are 3 settings for hardening, allow me to briefly explain.
RequireMutualAuthentication (this can be set to 0 or 1): By default, SMB doesn’t actually perform mutual authentication, but delegates this to the security provider of the remote system. If the remote security provider negotiates an authentication, then the connection is allowed. Of course, enforced by setting RequireMutualAuthentication to 1. This can be bypassed with 0 of course.
RequireIntegrity (this can be set to 0 or 1): This is where SMB signing comes into play – if you are still using SMBv1 (please don’t), setting this to 1, for example, will disallow access to the path by requiring something the client cannot support.
RequirePrivacy (this also can be set to 0 or 1): This is where SMB encryption is set. SMB Encryption is only supported on Windows 8/Server 2012 and later, meaning setting this will break connections to Windows 7 systems. I found this to be a troublemaker when testing.
So, back to fixing the problem: If you had the above error trying to apply Group Policy, you can navigate to this registry path in win10 clients:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\NetworkProvider\HardenedPaths
You will need to set 2 entries (both REG_SZ)
1. \\*\sysvol
2. \\*\netlogon
with this value: RequireMutualAuthentication=0, RequireIntegrity=0, RequirePrivacy=0
Of course, replace yourdomain.fqdn with your actual domain’s FQDN. In addition, these settings can be tweaked to fit your environment better. Do keep in mind that you will need to reboot after making this change, don’t bother doing anything else. You should then be able to do your gpupdate /force successfully.
You may also set this in Group Policy, but keep in mind that changing this setting won’t do you any good if you are not able to contact the DC and apply policy – so first things first, work the registry. The GPO setting is located at:
Computer Configuration / Administrative Templates / Network / Network Provider and the setting name is Hardened UNC Paths. Enable this, click Show, and add your shares and values here, i.e. \\*\sysvol as value name and RequireMutualAuthentication=0, RequireIntegrity=0, RequirePrivacy=0 as value.
Hope this helps demystify the reasons why Group Policy wasn’t applying to these Windows 10 devices, but to the Windows 7 ones.
https://www.thewindowsclub.com/fix-100-disk-usage-windows-10
Permanent fix
right click start button
choose command prompt (admin)
type sc stop DiagTrack and press enter
type sc delete DiagTrack and press enter
lister les taches planifiees actives
https://www.malekal.com/les-taches-planifiees-de-windows/
Then open Task Scheduler; under Task Scheduler Library -> Microsoft delete (plutot desactiver) the following items:
Everything under “Application Experience”
Everything under “Autochk”
Everything under “Customer Experience Improvement Program”
Under “Disk Diagnostic” delete only the “Microsoft-Windows-DiskDiagnosticDataCollector”
send MailMessage with authentification
https://rcmtech.wordpress.com/2016/03/03/send-smtp-email-with-authentication-from-powershell/
https://www.pdq.com/blog/secure-password-with-powershell-encrypting-credentials-part-1/
Send mail when server reboot
https://girl-germs.com/?p=1079
#stock le mot de passe encrypté dans c:\Scripts
#Read-Host -AsSecureString | ConvertFrom-SecureString | Out-File -FilePath c:\Scripts\NotifReboot\lien.tran.securestring
!!!! attention a utiliser le meme compte pour lancer la tache planifiée
verifier la tache planifiée qui redemarre le service update
Coupable :
La tâche planifiée cachée qui réactive Windows-Update est :
remsh.exe se trouvant dans c:\program files\rempl\remsh.exe
Le lancement du fichier remsh.exe n’apparait pas dans la liste de démarrage obtenue avec msconfig
Ce lancement est inscrit dans le « task sheduler » (gestionnaire de tâches planifiées) :
\Microsoft\Windows\rempl\shell remsh Microsoft Corporation c:\program files\rempl\remsh.exe et
\Microsoft\Windows\rempl\shell-unlock remsh Microsoft Corporation c:\program files\rempl\remsh.exe
Paramètre de lancement :
« %ProgramFiles%\rempl\remsh.exe » /RunUsoScanOnly
Utilise le compte « Système »
S’exécute à la mise sous tension, même si aucun utilisateur n’a ouvert de session
S’exécute avec les autorisations maximales
Se déclenche tous les jours en lançant %ProgramFiles%\rempl\remsh.exe
Cette tâche est capable de sortir un ordinateur du mode veille pour s’exécuter
Sur un portable, elle ne s’exécute pas si le portable est sur batterie
Elle utilise toutes les connexions réseau possibles
Media Creation Tool (Sans perte données et applications)
!!!FOND ECRAN !!! a sauvegarder
antivirus a desinstaller
conseillé d’effectuer une sauvegarde des documents
-telecharger iso sur le poste a reparer avec media creation tool
-monter iso , lancer setup
Les deux options « Installer Windows 10 » et « Conserver les paramètres Windows, fichiers personnels et applications » sont cochées.
https://www.malekal.com/reparer-windows10-sans-perte-donnees/
menu demarrer
2 services shellExperienceHost et SearchUi
dossier C:\Windows\SystemApps\ShellExperienceHost_xxxxx est présent et contient bien l’exécutable.
Reparer win store
resolution pb win
identifier le dc sur lequel le client s’identifie : nltest /dsgetdc
You can grab the domain controller that the computer is currently connected to with these steps:
nltest /dsgetdc:domainname
Actually switch the domain controller computer is using with these steps.
nltest /Server:ClientComputerName /SC_RESET:DomainName\DomainControllerName
Note: This option is not permanent, as a restart of the computer may grab a different DC.
controle des sorties update
https://portal.msrc.microsoft.com/en-us/security-guidance/summary
SECURITY
blog microsoft defender search
https://cloudblogs.microsoft.com/microsoftsecure/author/windows-defender-research/
—————————————————-
KB2685811 intel IME windows 7
https://support.microsoft.com/fr-fr/help/2685811/kernel-mode-driver-framework-version-1-11-update-for-windows-vista-win
probleme de mise a jour
https://www.commentcamarche.net/faq/35234-resoudre-les-problemes-d-installation-d-une-mise-a-jour-windows