DNN – Hide a Page from the Menu

To Hide a DNN Page from the Menu

Note: This page will still be available to those who know the URL of that page (if for example you had put the page in a news letter).

Select Edit / Page Settings

Screenshot 2016 03 15 06 26 56

 

Page Details / Unselect the Include in Menu Option

Screenshot 2016 03 15 06 29 26

Update Page

The Page will no longer appear in the menu system. It can still be hit with the permissions that have previously been set.

Alternatively – To Change Permissions on the page to hide and stop access: http://www.interactivewebs.com/blog/index.php/general-tips/dnn-change-permissions-on-a-page-to-stop-users-being-able-to-access-the-page/

 

 

DNN – Change Permissions on a Page to Stop Users Being Able to Access The Page

To Stop users (Either members or visitors) from being able to access a page on the DNN Site.

Select Edit / Page Settings

Screenshot 2016 03 15 06 26 56

Select the Permissions Tab

Screenshot 2016 03 15 06 33 01

Uptick the All users View Settings. With no view pages permissions set. No users other than the Default Administrator settings will be able to visit the page.

Update Page

Note This hides the page from users in the menu too. Alternatively you can just hide the page from the menu, but still allow people how know where the page exists to still access it by following this post:http://www.interactivewebs.com/blog/index.php/general-tips/dnn-hide-a-page-from-the-menu/

 

Enable TLS 1.2 on Windows 2008 R2

Problem

How to enable TLS 1.2 on Windows Server 2008 R2?

Resolution

QuoVadis recommends enabling and using the TLS 1.2 protocol on your server.  TLS 1.2 has improvements over previous versions of the TLS and SSL protocol which will improve your level of security.  By default, Windows Server 2008 R2 does not have this feature enabled.  This KB article will describe the process to enable this.

 

    1. Start the registry editor by clicking on Start and Run. Type in “regedit” into the Run field (without quotations).

     

      1. Highlight Computer at the top of the registry tree.  Backup the registry first by clicking on File and then on Export.  Select a file location to save the registry file.


      Note:

           You will be editing the registry.  This could have detrimental effects on your computer if done incorrectly, so it is strongly advised to make a backup.



          1. Browse to the following registry key:
            HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols

           

            1. Right click on the Protocols folder and select New and then Key from the drop-down menu. This will create new folder.  Rename this folder to TLS 1.2.

             

              1. Right click on the TLS 1.2 key and add two new keys underneath it.

               

                1. Rename the two new keys as:
                  • Client
                  • Server

                 

                  1. Right click on the Client key and select New and then DWORD (32-bit) Value from the drop-down list.

                   

                    1. Rename the DWORD to DisabledByDefault.

                     

                      1. Right-click the name DisabledByDefault and select Modify… from the drop-down menu.

                       

                        1. Ensure that the Value data field is set to 0 and the Base is Hexadecimal.  Click on OK.

                         

                          1. Create another DWORD for the Client key as you did in Step 7.

                           

                            1. Rename this second DWORD to Enabled.

                             

                              1. Right-click the name Enabled and select Modify… from the drop-down menu.

                               

                                1. Ensure that the Value data field is set to 1 and the Base is Hexadecimal. Click on OK.

                                 

                                  1. Repeat steps 7 to 14 for the Server key (by creating two DWORDs, DisabledByDefault and Enabled, and their values underneath the Server key).

                                   

                                  1. Reboot the server.

                                  Your server should now support TLS 1.2.

                                   

                                  Note: This article cannot be used on a Windows Server 2003 (IIS 6).  Windows Server 2003 does not support the TLS 1.2 protocol.

                                  Reverting Back

                                  If you make a mistake or something just isn’t right, you can revert back to your previous registry settings by opening the Registry Editor and importing the backup you made in step x.