Author Archives: Peter

Check local certificate store for expired certificate

This script looks inside local machine certificate store for expired certificates. If found, it writes to the event log. [codesyntax lang=”powershell”] $ThresholdWarning = “60” #Set warning date $ThresholdError = “30” #Set error date New-EventLog -Source PKI -LogName Application -ErrorAction:SilentlyContinue $Certs … Continue reading

Posted in Powershell, Uncategorized | Comments Off on Check local certificate store for expired certificate

Windows Firewall – How to bypass AD-policy and allow inbound traffic

In some cases i.e support and other troubleshooting issues you have to temporary disable or allow all traffic through Windows Firewall. 1. Open regedit.exe and browse to HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile (This key does not exist if there is no AD-policy affecting your … Continue reading

Posted in Firewall, Windows | Comments Off on Windows Firewall – How to bypass AD-policy and allow inbound traffic

Move windows in Windows

1. Alt + Space 2. M 3. Use arrow keys to move windows

Posted in Windows | Comments Off on Move windows in Windows

Verify CRL and OCSP of a certificate

One way to verify the revocation status of a certificate is to use the certutil command. Export a certificate from store in DER format. Save it to i.e C:\Temp\Cert.der Open a command promt and type. certutil -url C:\Temp\Cert.der The URL … Continue reading

Posted in Certificate Services | Tagged , , , | Comments Off on Verify CRL and OCSP of a certificate

DNS – Dig commands

Forward lookup asking server 8.8.8.8 dig @8.8.8.8 powerkb.se Forward lookup with minimal answer dig powerkb.se +noall +answer SOA lookup dig powerkb.se SOA NS lookup dig powerkb.se NS DNS trace dig powerkb.se +trace Reference Usage: dig [@global-server] [domain] [q-type] [q-class] {q-opt} … Continue reading

Posted in DNS | Tagged , , | Comments Off on DNS – Dig commands