{"id":1218,"date":"2015-08-12T09:45:14","date_gmt":"2015-08-12T07:45:14","guid":{"rendered":"http:\/\/lestfrexgn.cluster020.hosting.ovh.net\/?p=1218"},"modified":"2015-08-11T13:45:34","modified_gmt":"2015-08-11T11:45:34","slug":"sccm-2012-supprimer-les-fichiers-dangereux-partie-1","status":"publish","type":"post","link":"https:\/\/les2t.fr\/en_us\/sccm-2012-supprimer-les-fichiers-dangereux-partie-1\/","title":{"rendered":"SCCM 2012 \u2013 Supprimer les fichiers dangereux \u2013 Partie 1"},"content":{"rendered":"<p><a href=\"https:\/\/les2t.fr\/wp-content\/uploads\/2014\/09\/sccm2012.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-83 aligncenter\" src=\"https:\/\/les2t.fr\/wp-content\/uploads\/2014\/09\/sccm2012-300x159.jpg\" alt=\"sccm2012\" width=\"300\" height=\"159\" srcset=\"https:\/\/les2t.fr\/wp-content\/uploads\/2014\/09\/sccm2012-300x159.jpg 300w, https:\/\/les2t.fr\/wp-content\/uploads\/2014\/09\/sccm2012.jpg 314w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>Dana Epp a r\u00e9cemment donn\u00e9 une pr\u00e9sentation sur les vuln\u00e9rabilit\u00e9s de Configuration Manager face \u00e0 des menaces ext\u00e9rieures et sur les d\u00e9fis auxquels sont confront\u00e9s les administrateurs ConfigMgr et Microsoft Deployment Toolkit (MDT) pour bloquer ces menaces.<\/p>\n<p><!--more--><br \/>\nDana recommande fortement au minimum de supprimer quatre fichiers sp\u00e9cifiques de l&rsquo;ensemble de vos ordinateurs afin de rendre votre environnement plus s\u00fbr.<br \/>\nPrenez par exemple le fichier C: sysprep.inf,\u00a0 il contient les informations de mot de passe de l&rsquo;administrateur local en clair.<br \/>\nLes quatre fichiers qui doivent \u00eatre supprim\u00e9es pour Dana sont:<\/p>\n<ul>\n<li>C:\\sysprep.inf<\/li>\n<li>C:\\sysprepsysprep.xml<\/li>\n<li>% Windir%\\Panther\\Unattend\\Unattend.xml<\/li>\n<li>% Windir%\\Panther\\Unattend.xml<\/li>\n<\/ul>\n<p>Ci-dessous un exemple de fichier sysprep.inf que vous pourriez trouver sur vos postes.<br \/>\n<a href=\"https:\/\/les2t.fr\/wp-content\/uploads\/2015\/08\/sccm_ficdang1.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-1221 aligncenter\" src=\"https:\/\/les2t.fr\/wp-content\/uploads\/2015\/08\/sccm_ficdang1-300x138.jpg\" alt=\"sccm_ficdang1\" width=\"300\" height=\"138\" srcset=\"https:\/\/les2t.fr\/wp-content\/uploads\/2015\/08\/sccm_ficdang1-300x138.jpg 300w, https:\/\/les2t.fr\/wp-content\/uploads\/2015\/08\/sccm_ficdang1.jpg 504w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><br \/>\nVoici une solution, parmi d\u2019autres, pour r\u00e9gler le probl\u00e8me.<br \/>\nCommen\u00e7ons par trouver les ordinateurs contenant ces fichiers.<br \/>\nDans la console ConfigMgr 2012, nous allons cr\u00e9er un Configuration Item (CI) pour chacun des quatre fichiers afin de les d\u00e9tecter sur toutes les stations de travail.\u00a0 Bien que ces \u00e9tapes soient \u00e9crites pour ConfigMgr 2012, elles sont fondamentalement les m\u00eames pour ConfigMgr 2007.<br \/>\nJe vais vous montrer le processus pour le fichier sysprep.inf que vous devrez r\u00e9p\u00e9ter pour les trois fichiers restants.<br \/>\n<a href=\"https:\/\/les2t.fr\/wp-content\/uploads\/2015\/08\/sccm_ficdang2.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-1222 aligncenter\" src=\"https:\/\/les2t.fr\/wp-content\/uploads\/2015\/08\/sccm_ficdang2-300x196.jpg\" alt=\"sccm_ficdang2\" width=\"300\" height=\"196\" srcset=\"https:\/\/les2t.fr\/wp-content\/uploads\/2015\/08\/sccm_ficdang2-300x196.jpg 300w, https:\/\/les2t.fr\/wp-content\/uploads\/2015\/08\/sccm_ficdang2.jpg 504w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><br \/>\nDans la console ConfigMgr 2012, aller dans : \u00ab <strong>Assets and Compliance\\ Overview\\Compliance Settings\\Configuration Items<\/strong> \u00bb, puis cliquez sur \u00ab <strong>Create Configuration Item<\/strong> \u00bb dans la barre d&rsquo;outil.<br \/>\n<a href=\"https:\/\/les2t.fr\/wp-content\/uploads\/2015\/08\/sccm_ficdang3.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-1223 aligncenter\" src=\"https:\/\/les2t.fr\/wp-content\/uploads\/2015\/08\/sccm_ficdang3-300x264.jpg\" alt=\"sccm_ficdang3\" width=\"300\" height=\"264\" srcset=\"https:\/\/les2t.fr\/wp-content\/uploads\/2015\/08\/sccm_ficdang3-300x264.jpg 300w, https:\/\/les2t.fr\/wp-content\/uploads\/2015\/08\/sccm_ficdang3.jpg 504w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><br \/>\nEntrez un nom, puis cliquez sur Suivant.<br \/>\nVous aurez besoins de ce nom pour cr\u00e9er la \u00ab <strong>Configuration Baseline<\/strong> \u00bb<\/p>\n<p><a href=\"https:\/\/les2t.fr\/wp-content\/uploads\/2015\/08\/sccm_ficdang4.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-1224 aligncenter\" src=\"https:\/\/les2t.fr\/wp-content\/uploads\/2015\/08\/sccm_ficdang4-300x264.jpg\" alt=\"sccm_ficdang4\" width=\"300\" height=\"264\" srcset=\"https:\/\/les2t.fr\/wp-content\/uploads\/2015\/08\/sccm_ficdang4-300x264.jpg 300w, https:\/\/les2t.fr\/wp-content\/uploads\/2015\/08\/sccm_ficdang4.jpg 504w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><br \/>\nCliquez sur Suivant.<br \/>\n<a href=\"https:\/\/les2t.fr\/wp-content\/uploads\/2015\/08\/sccm_ficdang5.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-1225 aligncenter\" src=\"https:\/\/les2t.fr\/wp-content\/uploads\/2015\/08\/sccm_ficdang5-300x264.jpg\" alt=\"sccm_ficdang5\" width=\"300\" height=\"264\" srcset=\"https:\/\/les2t.fr\/wp-content\/uploads\/2015\/08\/sccm_ficdang5-300x264.jpg 300w, https:\/\/les2t.fr\/wp-content\/uploads\/2015\/08\/sccm_ficdang5.jpg 504w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><br \/>\nCliquez sur Nouveau.<br \/>\n<a href=\"https:\/\/les2t.fr\/wp-content\/uploads\/2015\/08\/sccm_ficdang6.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-1226 aligncenter\" src=\"https:\/\/les2t.fr\/wp-content\/uploads\/2015\/08\/sccm_ficdang6-300x282.jpg\" alt=\"sccm_ficdang6\" width=\"300\" height=\"282\" srcset=\"https:\/\/les2t.fr\/wp-content\/uploads\/2015\/08\/sccm_ficdang6-300x282.jpg 300w, https:\/\/les2t.fr\/wp-content\/uploads\/2015\/08\/sccm_ficdang6.jpg 504w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><br \/>\nDans le champ Nom, entrez un nom convivial.\u00a0 Pour mon exemple, j&rsquo;ai utilis\u00e9 le nom du fichier, sysprep.inf pour simplifier la r\u00e9solution de probl\u00e8me.<br \/>\nModifier \u00ab <strong>Setting type<\/strong> \u00bb \u00e0 \u00ab <strong>File system<\/strong> \u00bb.<br \/>\nEntrez le \u00ab <strong>Path<\/strong> \u00bb vers le fichier C:\\<br \/>\nEntrez le nom du fichier. Sysprep.inf<br \/>\n<a href=\"https:\/\/les2t.fr\/wp-content\/uploads\/2015\/08\/sccm_ficdang7.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-1227 aligncenter\" src=\"https:\/\/les2t.fr\/wp-content\/uploads\/2015\/08\/sccm_ficdang7-300x282.jpg\" alt=\"sccm_ficdang7\" width=\"300\" height=\"282\" srcset=\"https:\/\/les2t.fr\/wp-content\/uploads\/2015\/08\/sccm_ficdang7-300x282.jpg 300w, https:\/\/les2t.fr\/wp-content\/uploads\/2015\/08\/sccm_ficdang7.jpg 504w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><br \/>\nCliquez sur New ou Edit.<br \/>\n<a href=\"https:\/\/les2t.fr\/wp-content\/uploads\/2015\/08\/sccm_ficdang8.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-1228 aligncenter\" src=\"https:\/\/les2t.fr\/wp-content\/uploads\/2015\/08\/sccm_ficdang8-291x300.jpg\" alt=\"sccm_ficdang8\" width=\"291\" height=\"300\" srcset=\"https:\/\/les2t.fr\/wp-content\/uploads\/2015\/08\/sccm_ficdang8-291x300.jpg 291w, https:\/\/les2t.fr\/wp-content\/uploads\/2015\/08\/sccm_ficdang8.jpg 504w\" sizes=\"(max-width: 291px) 100vw, 291px\" \/><\/a><br \/>\nD\u00e9finissez le nom de la r\u00e8gle. Exemple : sysprep.inf must NOT exist<br \/>\nModifier \u00ab <strong>Rule type<\/strong> \u00bb \u00e0 \u00ab <strong>Existential<\/strong> \u00bb.<br \/>\nS\u00e9lectionnez \u00ab <strong>File must not exist on client devices<\/strong> \u00bb.<br \/>\nChangez \u00ab <strong>Noncompliance severity for reports<\/strong> \u00bb \u00e0 \u00ab <strong>Critical<\/strong> \u00bb, puis cliquez sur OK \u00e0 deux reprises pour revenir \u00e0 l&rsquo;Assistant<br \/>\n<a href=\"https:\/\/les2t.fr\/wp-content\/uploads\/2015\/08\/sccm_ficdang9.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-1229 aligncenter\" src=\"https:\/\/les2t.fr\/wp-content\/uploads\/2015\/08\/sccm_ficdang9-300x264.jpg\" alt=\"sccm_ficdang9\" width=\"300\" height=\"264\" srcset=\"https:\/\/les2t.fr\/wp-content\/uploads\/2015\/08\/sccm_ficdang9-300x264.jpg 300w, https:\/\/les2t.fr\/wp-content\/uploads\/2015\/08\/sccm_ficdang9.jpg 504w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><br \/>\nCliquez sur R\u00e9sum\u00e9.<br \/>\n<a href=\"https:\/\/les2t.fr\/wp-content\/uploads\/2015\/08\/sccm_ficdang10.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-1230 aligncenter\" src=\"https:\/\/les2t.fr\/wp-content\/uploads\/2015\/08\/sccm_ficdang10-300x264.jpg\" alt=\"sccm_ficdang10\" width=\"300\" height=\"264\" srcset=\"https:\/\/les2t.fr\/wp-content\/uploads\/2015\/08\/sccm_ficdang10-300x264.jpg 300w, https:\/\/les2t.fr\/wp-content\/uploads\/2015\/08\/sccm_ficdang10.jpg 504w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><br \/>\nCliquez sur Suivant<br \/>\n<a href=\"https:\/\/les2t.fr\/wp-content\/uploads\/2015\/08\/sccm_ficdang11.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-1231 aligncenter\" src=\"https:\/\/les2t.fr\/wp-content\/uploads\/2015\/08\/sccm_ficdang11-300x264.jpg\" alt=\"sccm_ficdang11\" width=\"300\" height=\"264\" srcset=\"https:\/\/les2t.fr\/wp-content\/uploads\/2015\/08\/sccm_ficdang11-300x264.jpg 300w, https:\/\/les2t.fr\/wp-content\/uploads\/2015\/08\/sccm_ficdang11.jpg 504w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><br \/>\nCliquez sur Fermer.<br \/>\nR\u00e9p\u00e9tez les \u00e9tapes ci-dessus afin de cr\u00e9er trois autres \u00ab Configuration Items \u00bb pour chacun des fichiers restants \u00e0 \u00eatre supprim\u00e9s.<\/p>\n<ul>\n<li>C:\\sysprepsysprep.xml<\/li>\n<li>%Windir%\\Panther\\Unattend\\Unattend.xml<\/li>\n<li>%\\Windir%\\Panther\\Unattend.xml<\/li>\n<\/ul>\n<p>Voir l&rsquo;article original de Garth Jones : <a href=\"http:\/\/myitforum.com\/myitforumwp\/2015\/07\/15\/the-four-files-you-need-to-remove-from-configuration-managers-environment\/\" target=\"_blank\">ICI<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>Dana Epp a r\u00e9cemment donn\u00e9 une pr\u00e9sentation sur les vuln\u00e9rabilit\u00e9s de Configuration Manager face \u00e0 des menaces ext\u00e9rieures et sur les d\u00e9fis auxquels sont confront\u00e9s les administrateurs ConfigMgr et Microsoft Deployment Toolkit (MDT) pour bloquer ces menaces.<\/p>","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[7],"tags":[15,14,167,36,165,164,172,22],"class_list":["post-1218","post","type-post","status-publish","format-standard","hentry","category-sccm-2012","tag-configmgr-2007","tag-configmgr-2012","tag-mdt","tag-microsoft","tag-sccm-2007","tag-sccm-2012","tag-system-center","tag-system-center-configuration-manager"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.3.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>SCCM 2012 \u2013 Supprimer les fichiers dangereux \u2013 Partie 1 - Les2T<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/les2t.fr\/en_us\/sccm-2012-supprimer-les-fichiers-dangereux-partie-1\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SCCM 2012 \u2013 Supprimer les fichiers dangereux \u2013 Partie 1 - Les2T\" \/>\n<meta property=\"og:description\" content=\"Dana Epp a r\u00e9cemment donn\u00e9 une pr\u00e9sentation sur les vuln\u00e9rabilit\u00e9s de Configuration Manager face \u00e0 des menaces ext\u00e9rieures et sur les d\u00e9fis auxquels sont confront\u00e9s les administrateurs ConfigMgr et Microsoft Deployment Toolkit (MDT) pour bloquer ces menaces.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/les2t.fr\/en_us\/sccm-2012-supprimer-les-fichiers-dangereux-partie-1\/\" \/>\n<meta property=\"og:site_name\" content=\"Les2T\" \/>\n<meta property=\"article:published_time\" content=\"2015-08-12T07:45:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/les2t.fr\/wp-content\/uploads\/2014\/09\/sccm2012-300x159.jpg\" \/>\n<meta name=\"author\" content=\"TRARBACH Jean-Yves\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TRARBACH Jean-Yves\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/les2t.fr\/sccm-2012-supprimer-les-fichiers-dangereux-partie-1\/\",\"url\":\"https:\/\/les2t.fr\/sccm-2012-supprimer-les-fichiers-dangereux-partie-1\/\",\"name\":\"SCCM 2012 \u2013 Supprimer les fichiers dangereux \u2013 Partie 1 - Les2T\",\"isPartOf\":{\"@id\":\"https:\/\/les2t.fr\/fr_fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/les2t.fr\/sccm-2012-supprimer-les-fichiers-dangereux-partie-1\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/les2t.fr\/sccm-2012-supprimer-les-fichiers-dangereux-partie-1\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/les2t.fr\/wp-content\/uploads\/2014\/09\/sccm2012-300x159.jpg\",\"datePublished\":\"2015-08-12T07:45:14+00:00\",\"author\":{\"@id\":\"https:\/\/les2t.fr\/fr_fr\/#\/schema\/person\/d96bb4f512f9aeb12dc923def245768e\"},\"breadcrumb\":{\"@id\":\"https:\/\/les2t.fr\/sccm-2012-supprimer-les-fichiers-dangereux-partie-1\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/les2t.fr\/sccm-2012-supprimer-les-fichiers-dangereux-partie-1\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/les2t.fr\/sccm-2012-supprimer-les-fichiers-dangereux-partie-1\/#primaryimage\",\"url\":\"https:\/\/les2t.fr\/wp-content\/uploads\/2014\/09\/sccm2012-300x159.jpg\",\"contentUrl\":\"https:\/\/les2t.fr\/wp-content\/uploads\/2014\/09\/sccm2012-300x159.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/les2t.fr\/sccm-2012-supprimer-les-fichiers-dangereux-partie-1\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/les2t.fr\/fr_fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SCCM 2012 \u2013 Supprimer les fichiers dangereux \u2013 Partie 1\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/les2t.fr\/fr_fr\/#website\",\"url\":\"https:\/\/les2t.fr\/fr_fr\/\",\"name\":\"Les2T\",\"description\":\"| BLOG  IT |\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/les2t.fr\/fr_fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/les2t.fr\/fr_fr\/#\/schema\/person\/d96bb4f512f9aeb12dc923def245768e\",\"name\":\"TRARBACH Jean-Yves\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/les2t.fr\/fr_fr\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/les2t.fr\/wp-content\/uploads\/2023\/02\/JeanYvestrarbach-96x96.jpg\",\"contentUrl\":\"https:\/\/les2t.fr\/wp-content\/uploads\/2023\/02\/JeanYvestrarbach-96x96.jpg\",\"caption\":\"TRARBACH Jean-Yves\"},\"description\":\"Head Of Modern Workplace Metsys MVP Windows &amp; devices For IT\",\"sameAs\":[\"https:\/\/les2t.fr\/jean-yves-trarbach\/\"],\"url\":\"https:\/\/les2t.fr\/en_us\/author\/kounac\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"SCCM 2012 \u2013 Supprimer les fichiers dangereux \u2013 Partie 1 - Les2T","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/les2t.fr\/en_us\/sccm-2012-supprimer-les-fichiers-dangereux-partie-1\/","og_locale":"en_US","og_type":"article","og_title":"SCCM 2012 \u2013 Supprimer les fichiers dangereux \u2013 Partie 1 - Les2T","og_description":"Dana Epp a r\u00e9cemment donn\u00e9 une pr\u00e9sentation sur les vuln\u00e9rabilit\u00e9s de Configuration Manager face \u00e0 des menaces ext\u00e9rieures et sur les d\u00e9fis auxquels sont confront\u00e9s les administrateurs ConfigMgr et Microsoft Deployment Toolkit (MDT) pour bloquer ces menaces.","og_url":"https:\/\/les2t.fr\/en_us\/sccm-2012-supprimer-les-fichiers-dangereux-partie-1\/","og_site_name":"Les2T","article_published_time":"2015-08-12T07:45:14+00:00","og_image":[{"url":"https:\/\/les2t.fr\/wp-content\/uploads\/2014\/09\/sccm2012-300x159.jpg","type":"","width":"","height":""}],"author":"TRARBACH Jean-Yves","twitter_card":"summary_large_image","twitter_misc":{"Written by":"TRARBACH Jean-Yves","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/les2t.fr\/sccm-2012-supprimer-les-fichiers-dangereux-partie-1\/","url":"https:\/\/les2t.fr\/sccm-2012-supprimer-les-fichiers-dangereux-partie-1\/","name":"SCCM 2012 \u2013 Supprimer les fichiers dangereux \u2013 Partie 1 - Les2T","isPartOf":{"@id":"https:\/\/les2t.fr\/fr_fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/les2t.fr\/sccm-2012-supprimer-les-fichiers-dangereux-partie-1\/#primaryimage"},"image":{"@id":"https:\/\/les2t.fr\/sccm-2012-supprimer-les-fichiers-dangereux-partie-1\/#primaryimage"},"thumbnailUrl":"https:\/\/les2t.fr\/wp-content\/uploads\/2014\/09\/sccm2012-300x159.jpg","datePublished":"2015-08-12T07:45:14+00:00","author":{"@id":"https:\/\/les2t.fr\/fr_fr\/#\/schema\/person\/d96bb4f512f9aeb12dc923def245768e"},"breadcrumb":{"@id":"https:\/\/les2t.fr\/sccm-2012-supprimer-les-fichiers-dangereux-partie-1\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/les2t.fr\/sccm-2012-supprimer-les-fichiers-dangereux-partie-1\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/les2t.fr\/sccm-2012-supprimer-les-fichiers-dangereux-partie-1\/#primaryimage","url":"https:\/\/les2t.fr\/wp-content\/uploads\/2014\/09\/sccm2012-300x159.jpg","contentUrl":"https:\/\/les2t.fr\/wp-content\/uploads\/2014\/09\/sccm2012-300x159.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/les2t.fr\/sccm-2012-supprimer-les-fichiers-dangereux-partie-1\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/les2t.fr\/fr_fr\/"},{"@type":"ListItem","position":2,"name":"SCCM 2012 \u2013 Supprimer les fichiers dangereux \u2013 Partie 1"}]},{"@type":"WebSite","@id":"https:\/\/les2t.fr\/fr_fr\/#website","url":"https:\/\/les2t.fr\/fr_fr\/","name":"Les2T","description":"| BLOG  IT |","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/les2t.fr\/fr_fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/les2t.fr\/fr_fr\/#\/schema\/person\/d96bb4f512f9aeb12dc923def245768e","name":"TRARBACH Jean-Yves","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/les2t.fr\/fr_fr\/#\/schema\/person\/image\/","url":"https:\/\/les2t.fr\/wp-content\/uploads\/2023\/02\/JeanYvestrarbach-96x96.jpg","contentUrl":"https:\/\/les2t.fr\/wp-content\/uploads\/2023\/02\/JeanYvestrarbach-96x96.jpg","caption":"TRARBACH Jean-Yves"},"description":"Head Of Modern Workplace Metsys MVP Windows &amp; devices For IT","sameAs":["https:\/\/les2t.fr\/jean-yves-trarbach\/"],"url":"https:\/\/les2t.fr\/en_us\/author\/kounac\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/les2t.fr\/en_us\/wp-json\/wp\/v2\/posts\/1218","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/les2t.fr\/en_us\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/les2t.fr\/en_us\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/les2t.fr\/en_us\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/les2t.fr\/en_us\/wp-json\/wp\/v2\/comments?post=1218"}],"version-history":[{"count":0,"href":"https:\/\/les2t.fr\/en_us\/wp-json\/wp\/v2\/posts\/1218\/revisions"}],"wp:attachment":[{"href":"https:\/\/les2t.fr\/en_us\/wp-json\/wp\/v2\/media?parent=1218"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/les2t.fr\/en_us\/wp-json\/wp\/v2\/categories?post=1218"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/les2t.fr\/en_us\/wp-json\/wp\/v2\/tags?post=1218"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}