D76C6399A0F334216B3A58BE07C3C3137D5E14542BC13CA38EB0800D9FFC1FE6
D76C6399A0F334216B3A58BE07C3C3137D5E14542BC13CA38EB0800D9FFC1FE6
I can but there is an issue where if you execute the signed PowerShell code on an a disconnect system or network, then there is a significant delay in execution.
@jeffschulman what we will do in the future is starting using the releases feature of GitHub and then provide signed and unsigned versions as attachments to the release.
You can also run powershell.exe -ExecutionPolicy Bypass. Execution Policy isn't a security feature.
Doh... it took me a while to see that typo. Set this policy to Not Configured for now and then let all your systems go through a Group Policy refresh....
@onedererer It looks correct in the template to me: https://github.com/iadgov/Secure-Host-Baseline/blob/master/Adobe%20Reader/Group%20Policy%20Templates/ReaderDC.admx#L250 I also checked the compliance file and it looks correct too: https://github.com/iadgov/Secure-Host-Baseline/blob/master/Adobe%20Reader/Compliance/AdobeReaderDC.audit#L277
I'm guessing what happened was that the original template had the error when we exported the GPO. We fixed this typo a few months ago but never updated the exported...
1. Rename the Windows folder to Windows 10. 2. Add a new Windows Server 2016 folder which will have similar content to the Windows 10 folder. Upload the GPO and...
@feldrim This is being discussed on #38 DSC seems to be in a major state of flux. We aren't sure what we're going to do yet but it is on...
Noted. I will get that updated when I have a bit more time available.
@jeffschulman Do you know if there is a source for these certificates other than using InstallRoot (the tool for installing the DoD root CA certificates)?