diff --git a/README.md b/README.md index f7dbaf5d..1b613620 100644 --- a/README.md +++ b/README.md @@ -145,7 +145,7 @@ Following table lists currently tested operating systems | Windows 10 | Pro | 1809 - 22H2 | x64 | | Windows 10 | Pro Education | 20H2 | x64 | | Windows 10 | Enterprise | 1809 - 20H2 | x64 | -| Windows 10 | Education | 20H2 | x64 | +| Windows 10 | Education | 20H2 - 22H2 | x64 | | Windows 11 | Pro Education | 21H2 | x64 | | Windows 11 | Pro | 22H2 | x64 | | Windows Server 2019 | Essentials | 1809 | x64 | diff --git a/Readme/ProblematicTraffic.md b/Readme/ProblematicTraffic.md index 0216ea2a..873e696d 100644 --- a/Readme/ProblematicTraffic.md +++ b/Readme/ProblematicTraffic.md @@ -103,9 +103,9 @@ if outbound traffic is blocked by default. except adding all the accounts needed to separate rule as follows: 1. User account -2. NT AUTHORITY\SYSTEM -3. NT AUTHORITY\LOCAL SERVICE -4. NT AUTHORITY\NETWORK SERVICE +2. `NT AUTHORITY\SYSTEM` +3. `NT AUTHORITY\LOCAL SERVICE` +4. `NT AUTHORITY\NETWORK SERVICE` TODO: doesn't work for CryptSvc, see why diff --git a/Readme/SecurityAndPrivacy.md b/Readme/SecurityAndPrivacy.md index d955e4cb..6c249ea3 100644 --- a/Readme/SecurityAndPrivacy.md +++ b/Readme/SecurityAndPrivacy.md @@ -225,7 +225,7 @@ As already said good news is that you need none of these expensive software, in 1. `Deploy-ATP` is used to deploy attack surface reduction rules on your system 2. `Set-ATP` is programatic way to configure Windows defender and enforce restrictive settings -3. `Show-ASR` is used to show settings applied by `Deploy-ATP.ps1` +3. `Show-ASR` is used to show settings applied by `Deploy-ATP` 4. `Find-UnsignedFile` is used to detect unsigned software on your system and perform automatic\ online malware analysis with [Virus total][virus total] so that you don't have to upload each file manually. diff --git a/Readme/WindowsPowerShell.md b/Readme/WindowsPowerShell.md index 97006abb..1b232165 100644 --- a/Readme/WindowsPowerShell.md +++ b/Readme/WindowsPowerShell.md @@ -41,7 +41,8 @@ Here is how: ### Windows 11 Unfortunately there is no default way like in Windows 10, one solution is to follow steps explained -in section\ `Right click "Open Windows Terminal as Administrator" context menu for Windows 11` below +in section\ +`Right click "Open Windows Terminal as Administrator" context menu for Windows 11` see [Windows Terminal](/Readme/WindowsTerminal.md) ## Right click "Open Windows PowerShell here" context menu in Windows 10 diff --git a/Readme/WindowsTerminal.md b/Readme/WindowsTerminal.md index 7a5b7bf3..803819f8 100644 --- a/Readme/WindowsTerminal.md +++ b/Readme/WindowsTerminal.md @@ -4,7 +4,7 @@ [What is Windows Terminal?][about terminal] Windows Terminal is by default installed on Windows 11, it is not installed by default in Windows 10, -but it can be installed from Windows Store app for more details see +but it can be installed from Windows Store app, for more details see [Install and get started setting up Windows Terminal][install windows terminal] ## How to open Windows Terminal @@ -31,7 +31,7 @@ Windows Terminal Preview however can be configured to be run as Administrator in ## Right click "Open Windows Terminal as Administrator" context menu -To add context menu on right click for "Windows Terminal as Administrator" see:\ +To add context menu on right click for `Windows Terminal as Administrator` see:\ [Add or Remove 'Open in Windows Terminal as administrator' context menu][terminal as admin] [terminal as admin]: https://www.tenforums.com/tutorials/178668-add-remove-open-windows-terminal-administrator-context-menu.html diff --git a/Scripts/Deploy-Firewall.ps1 b/Scripts/Deploy-Firewall.ps1 index 8f8b4bcc..85965dad 100644 --- a/Scripts/Deploy-Firewall.ps1 +++ b/Scripts/Deploy-Firewall.ps1 @@ -84,6 +84,7 @@ None. Deploy-Firewall.ps1 does not generate any output .NOTES TODO: Rule deployment should probably be separated into new script +TODO: Quiet switch should not suppress errors ex. about failed digital signature .LINK https://github.com/metablaster/WindowsFirewallRuleset/tree/master/Scripts diff --git a/Scripts/Reset-Firewall.ps1 b/Scripts/Reset-Firewall.ps1 index 2d56d993..24efcef4 100644 --- a/Scripts/Reset-Firewall.ps1 +++ b/Scripts/Reset-Firewall.ps1 @@ -51,7 +51,7 @@ Disables PS remoting and restores leftover changes. .PARAMETER Remoting If specified resets and disables Windows remote management service, disables PowerShell remoting and -disabled remote registry in addition to firewall reset +disables remote registry in addition to firewall reset .PARAMETER Force If specified, no prompt for confirmation is shown to perform actions