Loading Firewall/set_ping_Rules.ps1 +4 −1 Original line number Diff line number Diff line # enable pings from other institute clients $inst_networks = "131.188.220.192/26,192.168.220.128/25,10.188.220.0/25" # can be done bye wf.msc New-NetFirewallRule -DisplayName "Allow inbound ICMPv4" -Group "WW8" -Profile Private,Domain -Direction Inbound -Protocol ICMPv4 -IcmpType 8 -RemoteAddress 131.188.220.192/26,192.168.220.128/25,10.188.220.0/25 -Action Allow New-NetFirewallRule -DisplayName "Allow inbound ICMPv4" -Group "WW8" -Profile Private,Domain -Direction Inbound -Protocol ICMPv4 -IcmpType 8 -RemoteAddress $inst_networks -Action Allow #New-NetFirewallRule -DisplayName "Allow inbound ICMPv6" -Direction Inbound -Protocol ICMPv6 -IcmpType 8 -RemoteAddress <local subnet> -Action Allow Registry/disable_wifi_sense.reg 0 → 100644 +4 −0 Original line number Diff line number Diff line Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WcmSvc\wifinetworkmanager\config] "AutoConnectAllowedOEM"=dword:00000000 Software/firefox.ps1 +1 −1 Original line number Diff line number Diff line Loading @@ -4,7 +4,7 @@ [Console]::OutputEncoding = [Text.UTF8Encoding]::UTF8 if (([Security.Principal.WindowsPrincipal][Security.Principal.WindowsIdentity]::GetCurrent()).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { $policy_file = ".\policies.json" Loading installers/setup_ww8kd-ca.ps1 +1 −1 Original line number Diff line number Diff line Loading @@ -4,7 +4,7 @@ # [Console]::OutputEncoding = [Text.UTF8Encoding]::UTF8 if (([Security.Principal.WindowsPrincipal][Security.Principal.WindowsIdentity]::GetCurrent()).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { # Bypass Powershell certificate validation, so that we can download any untrusted certificate. [Net.ServicePointManager]::ServerCertificateValidationCallback = {$true} Loading Loading
Firewall/set_ping_Rules.ps1 +4 −1 Original line number Diff line number Diff line # enable pings from other institute clients $inst_networks = "131.188.220.192/26,192.168.220.128/25,10.188.220.0/25" # can be done bye wf.msc New-NetFirewallRule -DisplayName "Allow inbound ICMPv4" -Group "WW8" -Profile Private,Domain -Direction Inbound -Protocol ICMPv4 -IcmpType 8 -RemoteAddress 131.188.220.192/26,192.168.220.128/25,10.188.220.0/25 -Action Allow New-NetFirewallRule -DisplayName "Allow inbound ICMPv4" -Group "WW8" -Profile Private,Domain -Direction Inbound -Protocol ICMPv4 -IcmpType 8 -RemoteAddress $inst_networks -Action Allow #New-NetFirewallRule -DisplayName "Allow inbound ICMPv6" -Direction Inbound -Protocol ICMPv6 -IcmpType 8 -RemoteAddress <local subnet> -Action Allow
Registry/disable_wifi_sense.reg 0 → 100644 +4 −0 Original line number Diff line number Diff line Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WcmSvc\wifinetworkmanager\config] "AutoConnectAllowedOEM"=dword:00000000
Software/firefox.ps1 +1 −1 Original line number Diff line number Diff line Loading @@ -4,7 +4,7 @@ [Console]::OutputEncoding = [Text.UTF8Encoding]::UTF8 if (([Security.Principal.WindowsPrincipal][Security.Principal.WindowsIdentity]::GetCurrent()).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { $policy_file = ".\policies.json" Loading
installers/setup_ww8kd-ca.ps1 +1 −1 Original line number Diff line number Diff line Loading @@ -4,7 +4,7 @@ # [Console]::OutputEncoding = [Text.UTF8Encoding]::UTF8 if (([Security.Principal.WindowsPrincipal][Security.Principal.WindowsIdentity]::GetCurrent()).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { # Bypass Powershell certificate validation, so that we can download any untrusted certificate. [Net.ServicePointManager]::ServerCertificateValidationCallback = {$true} Loading