Solved

How to run mscorfcfg.msc

Posted on 2016-08-10
7
53 Views
Last Modified: 2016-08-17
How can I run the Microsoft .NET Framework Configuration in Windows 2012 R2. It is not under administrative tools

Thanks

F.
0
Comment
Question by:toronto2456
  • 4
  • 3
7 Comments
 
LVL 27

Expert Comment

by:Dan McFadden
ID: 41751651
I'll assume that you are using the .NET Framework v4+...  MS has removed the utility from the v4 framework.

MSDN Link:  https://msdn.microsoft.com/en-us/library/2bc0cxhc(v=vs.100).aspx

What is it that you are looking to configure?

Dan
0
 

Author Comment

by:toronto2456
ID: 41752055
the site code is under UNC share. and I need to ceate this groups using caspol.

But There is no definitive way to create this groups,I have tried fucking all the switch with CASPOL ( Drive:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\caspol.exe -m -ag 1 -url "file:////\\computername\sharename\*" FullTrust -exclusive on )

but I couldn't make it work. It made it worse as now I can not remove the ones I created. why is there no documentation about this IIS stuff. It is like hell.

It is not anyway to make IIS worked for all remote shares without having have to create this groups.
0
 

Author Comment

by:toronto2456
ID: 41752078
isn't there any way to make IIS work with all remote shares without having have to create this.  or what the fuck is the right switch for this, or how do we delete the groups we created. Nothing works .
0
Use Case: Protecting a Hybrid Cloud Infrastructure

Microsoft Azure is rapidly becoming the norm in dynamic IT environments. This document describes the challenges that organizations face when protecting data in a hybrid cloud IT environment and presents a use case to demonstrate how Acronis Backup protects all data.

 
LVL 27

Expert Comment

by:Dan McFadden
ID: 41752092
You are trying to modify a .NET4+ application with a .NET 2 utility?  That will not work.

BTW, here is a link to a GUI for caspol:  http://brandonpotter.com/2010/01/23/code-access-security-policy-caspol-exe-gui-utility/

Maybe that will help out a bit.

And a somewhat backward question... Why is the code on an UNC share and not locally stored on the server?

Can you explain more about the application setup?

Dan
0
 
LVL 27

Accepted Solution

by:
Dan McFadden earned 500 total points
ID: 41752147
Have you tried to reset the policies?

caspol.exe -all -reset

Open in new window


Dan
0
 

Author Comment

by:toronto2456
ID: 41759723
Hi Dan,

Problem was that caspol command was wrong from the microsoft site. I had been trying to make it work then I tried the another swtiched that worked

It was about caspol problem.

content are on the UNC share as it was the design.

Thanks

F.
0
 

Author Comment

by:toronto2456
ID: 41759730
caspol.exe -m -ag 1 -url "\\xxxxxxxxxxx\xxxxxxxxxx\www\*" FullTrust -exclusive on

this is the one I have used not this one that is wrong

caspol.exe -m -ag 1 -url "file:////\\computername\sharename\*" FullTrust -exclusive on
0

Featured Post

Free Tool: Subnet Calculator

The subnet calculator helps you design networks by taking an IP address and network mask and returning information such as network, broadcast address, and host range.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Today I came across an interesting issue that had me pulling my hair out.  I was troubleshooting a new internal web site which uses integrated security instead of anonymous.  When browsing the site from my laptop, I was able to access it with no iss…
If you are a web developer, you would be aware of the <iframe> tag in HTML. The <iframe> stands for inline frame and is used to embed another document within the current HTML document. The embedded document could be even another website.
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

808 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question