Rozwiązania IT stosowane przeze mnie:
Wersja SQL-a —————————————————- 01.12.2021
select @@version
sfc i DISM —————————————————– 30.11.2021
sfc /scannow
DISM.exe /Online /Cleanup-image /Restorehealth
DISM.exe /Online /Cleanup-Image /RestoreHealth /Source:C:\RepairSource\Windows /LimitAccess
Windows 11 —————————————————— 09.11.2021
https://www.instalki.pl/aktualnosci/software/50677-nie-da-sie-zainstalowac-aktualizacji-windows-11-co-zrobic.html?fbclid=IwAR21pxMy6xoELAwDbB8I2RUtCPqu2LBi_PyKPaQ4IU8jmg5ctaWZrGp0KFg
Windows 11 —————————————————— 07.11.2021
Folder o nazwie:
GodMode.{ED7BA470-8E54-465E-825C-99712043E01C}
Tryb „Boga”
psexec64 użycie ————————————————- 15.12.2020
@echo off
rem C:\TMP\PS\psexec64.exe -u admin -p haslo "C:\Program Files (x86)\Datacolor\Spectrum\Datacolor Tools\DatacolorTools.exe" select
rem 7z x archive.zip -oc:\soft *.cpp -r
del C:\TMP\Data_Color.exe /q
"C:\Program Files\7-Zip\7z.exe" x C:\TMP\Data_Color.7z -oC:\TMP *.exe -r
C:\TMP\PS\psexec64.exe -u admin -p haslo "C:\Program Files (x86)\Datacolor\Spectrum\Datacolor Tools\DatacolorTools.exe" select
Czyszczenie Windows Update ————————————– 10.01.2017
net stop wuauserv
net stop cryptsvc
ren %windir%\SoftwareDistribution SoftwareDistributionOld
ren %windir%\System32\SoftwareDistribution SoftwareDistributionOld
ren %windir%\System32\CatRoot2 CatRoot2Old
net start wuauserv
net start cryptsvc
Restart Windows update
net stop wuauserv
net stop cryptSvc
net stop bits
net stop msiserver
net start wuauserv
net start cryptSvc
net start bits
net start msiserver
Czyszczenie bufora wydruku ———————————– 11.12.2020
@echo off
echo Czyszczenie bufora wydruku
net stop spooler
echo Trwa usuwanie dokumentow w kolejce drukowania
del /q /f /s "%systemroot%\system32\spool\PRINTERS\*.*"
net start spooler
echo Pomyslnie wykonano wszystkie czynnosci
net use \\192.168.1.177 /user:druk druk
rem net use \\192.168.1.200\acer /user:root haslo
rem powershell Add-Printer -ConnectionName \\192.168.1.177\L2700
timeout /t 5
rundll32 printui.dll,PrintUIEntry /y /q /n "\\192.168.1.177\L2700"
rem printui /s /t2
Cacls / icacls ————————————————– 11.03.2021
Cacls "C:\Program Files\Java" /E /T /C /G "Użytkownicy":F
Cacls "C:\Program Files\Green" /E /T /C /G "Użytkownicy":F
Cacls "C:\Program Files\Microsoft Office" /E /T /C /G "Użytkownicy":F
Cacls "C:\Program Files\Mozilla Firefox" /E /T /C /G "Użytkownicy":F
Cacls "C:\Program Files\Mozilla Thunderbird" /E /T /C /G "Użytkownicy":F
Cacls "C:\Program Files\OpenVPN" /E /T /C /G "Użytkownicy":F
Cacls "C:\Program Files\PDFCreator" /E /T /C /G "Użytkownicy":F
Cacls "C:\Program Files\Samsung" /E /T /C /G "Użytkownicy":F
Cacls "C:\Program Files\TrueCrypt" /E /T /C /G "Użytkownicy":F
Cacls "C:\Program Files\PDFCreator" /E /T /C /G "Użytkownicy":F
Cacls "C:\Program Files\Mozilla Maintenance Service" /E /T /C /G "Użytkownicy":F
Cacls "C:\Program Files\MozBackup" /E /T /C /G "Użytkownicy":F
Cacls "C:\Program Files\STMicroelectronics" /E /T /C /G "Użytkownicy":F
Cacls "C:\Program Files " /E /T /C /G "Użytkownicy":F
icacls "C:\BACKUP\*" /t /grant user:(f)
icacls "c:\TMP\Migracja\*" /t /grant iga@domena:(f)
icacls "C:\Program Files\*" /t /grant jurale:(f)
icacls "C:\Program Files (x86)\Mozilla Maintenance Service*" /t /grant user:(f)
icacls "C:\Program Files (x86)\e-Deklaracje\*" /t /grant user:(f)
icacls "C:\Program Files (x86)\Google\*" /t /grant user:(f)
icacls "C:\Program Files (x86)\Krajowa Izba Rozliczeniowa S.A\*" /t /grant user:(f)
icacls "C:\Program Files (x86)\Mozilla Thunderbird\*" /t /grant user:(f)
icacls "C:\Program Files (x86)\OpenOffice 4\*" /t /grant user:(f)
icacls "C:\Program Files (x86)\Windows Live\*" /t /grant user:(f)
icacls "C:\Program Files (x86)\Windows Mail\*" /t /grant user:(f)
icacls "C:\Program Files (x86)\Adobe\*" /t /grant user:(f)
icacls "C:\Program Files (x86)\GOFIN\*" /t /grant user:(f)
icacls "C:\Program Files (x86)\Krajowa Izba Rozliczeniowa S.A\*" /t /grant user:(f)
icacls "C:\Program Files (x86)\Certum\*" /t /grant user:(f)
icacls "C:\Program Files\7-Zip\*" /t /grant jurale:(f)
icacls "C:\Program Files\Advanced Card Systems Ltd\*" /t /grant jurale:(f)
icacls "C:\Program Files\Mozilla Firefox\*" /t /grant jurale:(f)
icacls "C:\Program Files\Java\*" /t /grant jurale:(f)
icacls "\*" /t /grant jurale:(f)
icacls "\*" /t /grant jurale:(f)
robocopy.exe Składnia ——————————————- 06.05.2019
robocopy.exe c:\Users\Symfonia\Desktop\ k:\Dane_User\A\Desktop /Z /W:2 /R:3 /E /LOG:C:\TMP\Log\Robbo_Log_Desktop_%date%.txt
robocopy.exe c:\Users\Symfonia\Documents\ k:\Dane_User\A\Documents /Z /W:2 /R:3 /E /LOG:C:\TMP\Log\Robbo_Log_Document_%date%.txt
Ważne komedny z Uruchom —————————————– 07.11.2021
desk.cpl ,,
control
Net user ——————————————————– 23.10.2021
net user User ZAQ12wsx /ADD /FULLNAME:"Imię Nazwisko" /PASSWORDCHG:NO
^nazwa ^ hasło ^ dodać ^ nazwa wyświtlana ^ nie może zmienić hasła
Dodanie do grupy
net localgroup Administratorzy User /add
net localgroup Administratorzy User /delete
Hasło nigdy nie wygasa
wmic UserAccount where Name='User' set PasswordExpires=False
net user Administrator /FULLNAME:"AAdmin"
net user Administrator AAdmin
net user Administrator /ACTIVE:Yes
net user Administrator /PASSWORDCHG:Yes
net accounts ————————————————— 23.10.2021 / 03.12.2024
net accounts
net accounts /Lockoutthreshold:10 - Liczba prób logowania tu 10 prób
net accounts /lockoutwindow:30 - Okno obserowwania blokady 30 minut
net accounts /lockoutduration:10 - Czas trwania blokdady 10 minut
net accounts
net accounts /Lockoutthreshold:5
net accounts /lockoutduration:10
net accounts /lockoutwindow:10
Ustawia maksymalną liczbę dni ważności hasła.
net accounts /MAXPWAGE:999
net accounts /MAXPWAGE:UNLIMITED
Ustawia minimalną liczbę dni, które muszą minąć, zanim użytkownik może zmienić hasło.
net accounts /MINPWAGE:999
net accounts /MINPWAGE:0
Jak podejrzeć ustawienia haseł i blokowania konta w Windows/CMD?
W AD hasło nigdy nie wygasa (nie testowane)
Set-ADUser -Identity "nazwa_użytkownika" -PasswordNeverExpires $true
SMB 1 ———————————————————– 15.02.2021
powershell jako administrator
Protokół SMBv1
Wykrywanie: Get-WindowsFeature FS-SMB1
Wyłączanie: Disable-WindowsOptionalFeature -Online -FeatureName smb1protocol
Włączanie: Enable-WindowsOptionalFeature -Online -FeatureName smb1protocol
lub
Wykrywanie: Get-WindowsOptionalFeature –Online –FeatureName SMB1Protocol
Wyłączanie: Disable-WindowsOptionalFeature -Online -FeatureName SMB1Protocol
Włączanie: Enable-WindowsOptionalFeature -Online -FeatureName SMB1Protocol
Protokół SMBv2/SMBv3
Wykrywanie: Get-SmbServerConfiguration | Select EnableSMB2Protocol
Wyłączanie: Set-SmbServerConfiguration -EnableSMB2Protocol $false
Włączanie: Set-SmbServerConfiguration -EnableSMB2Protocol $true
lub
Wykrywanie: Get-SmbServerConfiguration | Select EnableSMB2Protocol
Wyłączanie: Set-SmbServerConfiguration –EnableSMB2Protocol $false
Włączanie: Set-SmbServerConfiguration –EnableSMB2Protocol $true
winsock reset ————————————————— 03.08.2021
netsh winsock reset c:\TMP\winsocklog.txt
Kontrola karty sieciowej z cmd ———————————- 24.11.2020
netsh interface ipv4 show config
^ konfiguracja wszystkich interfejsów
Powerhell
Get-NetIPInterface
Zmiana nazwy połączenia sieicowego
Rename-NetAdapter -Name „
Rename-NetAdapter -Name „Dom” -NewName „Dom-Ethernet”
Rename-NetAdapter -Name „Wi-Fi” -NewName „Dom-Wi-Fi”
^ to można zmienicć na nazwę firmy np kontak.
CMD
Włączenie/wyłączenie interfejsu dokonamy również za pomocą komend:
netsh interface set interface „
netsh interface set interface „
http://slow7.pl/windows-7/item/136-jest-we-mnie-moc-konfiguracja-interfejsow-sieciowych-i-dostep-zdalny-z-wykorzystaniem-powershella?tmpl=component&print=1
Zmiana IP z CMD
netsh interface ip show interfaces "Dom-Ethernet"
netsh interface ipv4 set address name = "Dom-Ethernet" static 192.168.28.221 255.255.255.0 192.168.0.3
netsh interface ipv4 set address name = "Dom-Ethernet" source = dhcp
DNS:
netsh interface ipv4 set dns name = "Dom-Ethernet" static 192.168.28.3
^ Piewszy domyślny \/dns-y 1,2,3
netsh interface ip add dns name="Dom-Ethernet" addr=192.168.28.3 index=1
netsh interface ip add dns name="Dom-Ethernet" addr=8.8.8.8 index=2
netsh interface ip add dns name="Dom-Ethernet" addr=8.8.4.4 index=3
z DHCP
netsh interface ip set dns name="Dom-Ethernet" source=dhcp
netsh interface ip show interfaces "Dom-Ethernet"
netsh interface ipv4 set address name = "Dom-Ethernet" static 192.168.28.221 255.255.255.0 192.168.0.3
netsh interface ipv4 set address name = "Dom-Ethernet" source = dhcp
DNS:
netsh interface ipv4 set dns name = "Dom-Ethernet" static 192.168.28.3
^ Piewszy domyślny \/dns-y 1,2,3
netsh interface ip add dns name="Dom-Ethernet" addr=192.168.28.3 index=1
netsh interface ip add dns name="Dom-Ethernet" addr=8.8.8.8 index=2
netsh interface ip add dns name="Dom-Ethernet" addr=8.8.4.4 index=3
z DHCP
netsh interface ip set dns name="Dom-Ethernet" source=dhcp
Windows 10 Home to Pro —————————————— 23.10.2020
Robimy to bez internetu
VK7JG-NPHTM-C97JM-9MPGT-3V66T – To jest klucz transportowy do zmiany
NVVV8-XXXXX-FVV86-XXXXX-WA8XF – klucz w asus marketing aka
NRVVV-XXXXX-2AA2W-XXXXX-RAKTR – KLUCZ W SURFACE GO AKA
slmgr.vbs /dli
slmgr.vbs /dlv
slmgr.vbs /upk
slmgr.vbs -ipk VK7JG-NPHTM-C97JM-9MPGT-3V66T
slmgr.vbs -ato
slmgr.vbs -ipk NRVVV-XXXXX-2AA2W-XXXXX-RAKTR
dism /online /set-edition:ServerStandard /productkey:NRVVV-XXXXX-2AA2W-XXXXX-RAKTR /accepteula
dism /online /set-edition:Core /productkey:NRVVV-XXXXX-2AA2W-XXXXX-RAKTR /accepteula
DISM /online /Get-CurrentEdition
DISM /Online /Cleanup-Image /CheckHealth
slui 4
Plan zasilania ————————————————– 07.01.2021
Plan zasilania wysoka wydajność:
powercfg -duplicatescheme e9a42b02-d5df-448d-aa00-03f14749eb61
psexec64 ——————————————————– 07.01.2021
Jak uruchomić komendę z uprawnieniami administratora
C:\TMP\PSTools\psexec64.exe -u Administrator -p haslo „C:\TMP\bufor-czyszczenie.bat” select
C:\TMP\PSTools\psexec64.exe -u Administrator -p haslo „C:\TMP\bufor-czyszczenie.bat”
Ferro Backup ————————————————–
FBSServer.exe
C:\Program Files (x86)\FERRO Software\Ferro Backup System\FBSServer.exe
C:\Program Files (x86)\FERRO Software\Ferro Backup System\
FBSWorker.exe
C:\Program Files (x86)\FERRO Software\Ferro Backup System\FBSWorker.exe
netsh advfirewall firewall add rule name="C:\Program Files (x86)\FERRO Software\Ferro Backup System\" dir=in action=allow program="C:\Program Files (x86)\FERRO Software\Ferro Backup System\" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files (x86)\FERRO Software\Ferro Backup System\FBSServer.exe" dir=in action=allow program="C:\Program Files (x86)\FERRO Software\Ferro Backup System\FBSServer.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files (x86)\FERRO Software\Ferro Backup System\FBSWorker.exe" dir=in action=allow program="C:\Program Files (x86)\FERRO Software\Ferro Backup System\FBSWorker.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files (x86)\FERRO Software\Ferro Backup System\" dir=out action=allow program="C:\Program Files (x86)\FERRO Software\Ferro Backup System\" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files (x86)\FERRO Software\Ferro Backup System\FBSServer.exe" dir=out action=allow program="C:\Program Files (x86)\FERRO Software\Ferro Backup System\FBSServer.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files (x86)\FERRO Software\Ferro Backup System\FBSWorker.exe" dir=out action=allow program="C:\Program Files (x86)\FERRO Software\Ferro Backup System\FBSWorker.exe" enable=yes
Porty ———————————————————– 17.12.2021
netsh advfirewall firewall add rule name= "Port_1433_TCP_SQL" dir=in action=allow protocol=TCP localport=1433
netsh advfirewall firewall add rule name= "Port_1433_UDP_SQL" dir=in action=allow protocol=UDP localport=1433
netsh advfirewall firewall add rule name= "Port_1433_TCP_SQL" dir=out action=allow protocol=TCP localport=1433
netsh advfirewall firewall add rule name= "Port_1433_UDP_SQL" dir=out action=allow protocol=UDP localport=1433
netsh advfirewall firewall add rule name= "Port_1434_TCP_SQL" dir=in action=allow protocol=TCP localport=1434
netsh advfirewall firewall add rule name= "Port_1434_UDP_SQL" dir=in action=allow protocol=UDP localport=1434
netsh advfirewall firewall add rule name= "Port_1434_TCP_SQL" dir=out action=allow protocol=TCP localport=1434
netsh advfirewall firewall add rule name= "Port_1434_UDP_SQL" dir=out action=allow protocol=UDP localport=1434
netsh advfirewall firewall add rule name= "Port_32343_TCP_Sage" dir=in action=allow protocol=TCP localport=32343
netsh advfirewall firewall add rule name= "Port_32343_UDP_Sage" dir=in action=allow protocol=UDP localport=32343
netsh advfirewall firewall add rule name= "Port_32343_TCP_Sage" dir=out action=allow protocol=TCP localport=32343
netsh advfirewall firewall add rule name= "Port_32343_UDP_Sage" dir=out action=allow protocol=UDP localport=32343
netsh advfirewall firewall add rule name= "Port_32344_TCP_Sage" dir=in action=allow protocol=TCP localport=32344
netsh advfirewall firewall add rule name= "Port_32344_UDP_Sage" dir=in action=allow protocol=UDP localport=32344
netsh advfirewall firewall add rule name= "Port_32344_TCP_Sage" dir=out action=allow protocol=TCP localport=32344
netsh advfirewall firewall add rule name= "Port_32344_UDP_Sage" dir=out action=allow protocol=UDP localport=32344
netsh advfirewall firewall add rule name= "Port_32342_TCP_Sage" dir=in action=allow protocol=TCP localport=32342
netsh advfirewall firewall add rule name= "Port_32342_UDP_Sage" dir=in action=allow protocol=UDP localport=32342
netsh advfirewall firewall add rule name= "Port_32342_TCP_Sage" dir=out action=allow protocol=TCP localport=32342
netsh advfirewall firewall add rule name= "Port_32342_UDP_Sage" dir=out action=allow protocol=UDP localport=32342
SQL 2016 ——————————————————– 17.12.2021
C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\BackupToUrl.exe
C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\DatabaseMail.exe
C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\DCEXEC.exe
C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\SQLAGENT.exe
C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\sqlceip.exe
C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\SQLIOSIM.exe
C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\sqlservr.exe
C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\StretchCodeGen.exe
C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\xpadsi.exe
C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\SQLIOSIM.exe
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\BackupToUrl.exe" dir=in action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\BackupToUrl.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\DatabaseMail.exe" dir=in action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\DatabaseMail.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\DCEXEC.exe" dir=in action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\DCEXEC.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\SQLAGENT.exe" dir=in action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\SQLAGENT.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\sqlceip.exe" dir=in action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\sqlceip.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\SQLIOSIM.exe" dir=in action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\SQLIOSIM.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\sqlservr.exe" dir=in action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\sqlservr.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\StretchCodeGen.exe" dir=in action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\StretchCodeGen.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\xpadsi.exe" dir=in action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\xpadsi.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\SQLIOSIM.exe" dir=in action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\SQLIOSIM.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\BackupToUrl.exe" dir=out action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\BackupToUrl.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\DatabaseMail.exe" dir=out action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\DatabaseMail.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\DCEXEC.exe" dir=out action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\DCEXEC.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\SQLAGENT.exe" dir=out action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\SQLAGENT.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\sqlceip.exe" dir=out action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\sqlceip.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\SQLIOSIM.exe" dir=out action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\SQLIOSIM.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\sqlservr.exe" dir=out action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\sqlservr.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\StretchCodeGen.exe" dir=out action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\StretchCodeGen.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\xpadsi.exe" dir=out action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\xpadsi.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\SQLIOSIM.exe" dir=out action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\SQLIOSIM.exe" enable=yes
SQL 2014 ——————————————————– 17.12.2021
C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\BackupToUrl.exe
C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\DatabaseMail.exe
C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\DCEXEC.exe
C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\SQLAGENT.exe
C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\sqlceip.exe
C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\SQLIOSIM.exe
C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\sqlservr.exe
C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\StretchCodeGen.exe
C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\xpadsi.exe
C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\SQLIOSIM.exe
C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESSROGER\MSSQL\Binn
C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\BackupToUrl.exe" dir=in action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\BackupToUrl.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\DatabaseMail.exe" dir=in action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\DatabaseMail.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\DCEXEC.exe" dir=in action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\DCEXEC.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\SQLAGENT.exe" dir=in action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\SQLAGENT.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\sqlceip.exe" dir=in action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\sqlceip.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\SQLIOSIM.exe" dir=in action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\SQLIOSIM.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\sqlservr.exe" dir=in action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\sqlservr.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\StretchCodeGen.exe" dir=in action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\StretchCodeGen.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\xpadsi.exe" dir=in action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\xpadsi.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\SQLIOSIM.exe" dir=in action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\SQLIOSIM.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\BackupToUrl.exe" dir=out action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\BackupToUrl.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\DatabaseMail.exe" dir=out action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\DatabaseMail.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\DCEXEC.exe" dir=out action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\DCEXEC.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\SQLAGENT.exe" dir=out action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\SQLAGENT.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\sqlceip.exe" dir=out action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\sqlceip.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\SQLIOSIM.exe" dir=out action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\SQLIOSIM.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\sqlservr.exe" dir=out action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\sqlservr.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\StretchCodeGen.exe" dir=out action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\StretchCodeGen.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\xpadsi.exe" dir=out action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\xpadsi.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\SQLIOSIM.exe" dir=out action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\SQLIOSIM.exe" enable=yes
7zip ———————————————————— 28.12.2021
Pakowanie z pomijanymi katalogami
"C:\Program Files\7-Zip\7z.exe" a -tzip -phaslo "\\192.168.0.16\Backup\Firma_DS_%dow%.zip" "-xr@c:\Backup\XFirma_DS.txt" @c:\Backup\Firma_DS.txt -scsWIN >> C:\Backup\Log\Firma_7z_Log.txt
XFirma_DS.txt
*\CAD
"*\KREOWANIE I WDRAŻANIE PRODUKTU\INNE\CHRONOMETRAŻ\nagrania"
"*\KREOWANIE I WDRAŻANIE PRODUKTU\INNE\CHRONOMETRAŻ\NAGRANIA"
"*\Marketing\materiały filmowe"
"*\Marketing\Zdjęcia"
0x0000011b —————————————————— 07.01.2021
Błąd 0x0000011b przy instalacji drukarki udostępnionej
FIX: Error 0x0000011b – Cannot Connect to Printer on Windows 10/7 (Solved)
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Print\
RpcAuthnLevelPrivacyEnabled = 0 DWORD (32-bit)
VPN ——————————————————————- 17.01.2022
wusa /uninstall /kb:5009543
Outlook ————————————————————— 20.01.2022
https://pl.telusuri.info/articles/outlook/ogranichenie-na-maksimalnij-razmer-vlozhenij-v-outlook.html
Outlook ————————————————————— 26.11.2024
Zmiana wielkości na maksymalną plików OST/PST (dla Microsoft 365 Outlook)
REG ADD "HKCU\SOFTWARE\Microsoft\Office\16.0\Outlook\PST" /v "WarnLargeFileSize" /t REG_DWORD /d "4090445042" /f
REG ADD "HKCU\SOFTWARE\Microsoft\Office\16.0\Outlook\PST" /v "MaxLargeFileSize" /t REG_DWORD /d "4294967295" /f
Outlook ————————————————————— 05.12.2023
Przeniesienie kontaktów z poza "Do..." (w noewej wiadomości) na inny komputer
Plik poza "Do..." znajduje się w lokalizacji np:
c:\Users\user\AppData\Local\Microsoft\Outlook\RoamCache\Stream_Autocomplete_0_31BC62F902B2084189572A8E87C58BC1.dat
Edycja „Do…” za pomocą programu N2KEdit https://www.nirsoft.net/utils/outlook_nk2_edit.html
Office —————————————————————- 28.01.2022
Pięć ostatnich cyfr z office
cscript "C:\Program Files (x86)\Microsoft Office\Office15\OSPP.VBS" /dstatus
cscript "C:\Program Files (x86)\Microsoft Office\Office14\OSPP.VBS" /dstatus
cscript "C:\Program Files (x86)\Microsoft Office\Office16\OSPP.VBS" /dstatus
cscript "C:\Program Files\Microsoft Office\Office16\OSPP.VBS" /dstatus
cscript "C:\Program Files\Microsoft Office\Office15\OSPP.VBS" /dstatus
cscript "C:\Program Files\Microsoft Office\Office14\OSPP.VBS" /dstatus
——————————————————————- Płatnik hasło
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Asseco Poland SA\Płatnik\X.XX.XX\Parametry
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Asseco Poland SA\Płatnik\10.02.002\Parametry
HKEY_LOCAL_MACHINE\SOFTWARE\Asseco Poland SA\Płatnik\
HKEY_LOCAL_MACHINE\SOFTWARE\Asseco Poland SA\Płatnik\X.XX.XX\Parametry
LimitHasla = 365
——————————————————————- 15.06.2022 Office jak się zrobi Standard z Professional
https://docs.microsoft.com/en-us/answers/questions/596247/office-2021-ltsc-and-spla.html
when you published here the supported ID to use with the ODT TOOL .
ProPlus2021Volume
Standard2021Volume
ProjectPro2021Volume
ProjectStd2021Volume
VisioPro2021Volume
VisioStd2021Volume
you are aware that the SPLA versions are not listed. However, they are available when you configure the .xml file in config.office.com
Then, keeping on repeating that the ID supported are :
ProPlus2021Volume
Standard2021Volume
ProjectPro2021Volume
ProjectStd2021Volume
VisioPro2021Volume
VisioStd2021Volume
does not help much. if they do not match also the ODT TOOL .xml file created with SPLA options…
When launching the installation, the error is thrown if SPLA is in the .xml file.
——————————————————————- 09.06.2022 Firefox
SSL_ERROR_UNSUPPORTED_VERSION on Firefox
about:config
security.tls.version.min wartość ustawić na 1
——————————————————————- 23.05.2022 Komendy nowego control panel
https://learn.microsoft.com/en-us/windows/uwp/launch-resume/launch-settings-app
ms-settings:network-status – Wyświetla status sieci
ms-settings:network-vpn
——————————————————————- 14.03.2022 RDS – Instalacja serwera
W gałęzi HKLM \ SYSTEM \ CurrentControlSet \ Control \ Terminal Server \ RCM \ Licensing Core należy zmienić wartość DWORD parametru o nazwie LicensingMode z 5 na
2) – jeśli stosowane jest licencjonowanie według urządzenia (na urządzenie)
4 – podczas korzystania z licencjonowania użytkownika RDS (na użytkownika)
Użyjemy lokalnego edytora gpedit.msc. Przejdź do Konfiguracja komputera -> Składniki systemu Windows -> Usługi pulpitu zdalnego -> Host sesji zdalnej -> Licencje (Konfiguracja komputera -> Szablony administracyjne -> Składniki systemu Windows -> Usługi pulpitu zdalnego -> Host sesji pulpitu zdalnego \ Licencjonowanie).
Serwer Licencjonowania – nazwa
Tryb licencjonowania – user/urządzenie
https://pl.telusuri.info/articles/windows-server-2012-r2/oshibka-ne-zadan-rezhim-licenzirovaniya-dlya-servera-uzla-seansov-udalennih-rabochih-stolov.html
——————————————————————- 02.02.2022 Domyślny klient pocztowy
HKEY_LOCAL_MACHINE\SOFTWARE\Clients\Mail
Dodać wpis typu: Wartość ciągu
Nazwa domyślna (Domyślna)
Nazwa klienta pocztowego jako wartość np:
eM Client
Mozilla Thunderbird
———————————————————————————— 13.11.2022 Kasacja logów tranzakcyjne MSSQL
Task -> Shrink -> Databases
Jeżeli się nie da:
Właściwości bazy Options przełączyć z trybu Full na Simple
——————————————————————- 06.09.2022 Migracja kontrolera domeny
dnscmd /EnumZones – Sprawdzenie ról kontrolera doemeny
1. Nowy serwer Manager serwera -> zarządzaj -> Dodaj role i funkcje -> inst. oparta na funkcjach -> Active Directory Domain Services (Rola) Usługi domenowe Active Directory
=====
*Gdyby była potrzebna migracja systemu plików SYSVOL z FRS na DFS to:
1. Zrobić backup katalogu C:\Windows\SYSVOL
Powershell
dfsrmig /getglobalstate
dfsrmig /setglobalstate 1
dfsrmig /setglobalstate 2
dfsrmig /setglobalstate 3
dfsrmig /getmigrationstate
Inofmracje z https://www.rebeladmin.com/2015/04/step-by-step-guide-for-upgrading-sysvol-replication-to-dfsr-distributed-file-system-replication/
=====
2. Manager serwera konfiguracja kontrolera domeny
-1 Dodanie do instniejącej domeny
-2 Hasło DRSM trudnedozlamaniahaslo
-3 Upgrade DNS (next)
-4 Next
-5 Scieżki:
–5a Folder bazy danych: C:\Windows\NTDS
–5b Folder plików dziennika C:\Windows\NTDS
–5c Folder SYSVOL C:\Windows\SYSVOL
-6 Next
-7 Next (View Scrypt)
— Install
Restart
powershell – Administrator
netdom query fsmo – ta komenda wyświetla role serwer na kontrolerze domeny (gdzie są przypisane)
Schema master SERWER3.NowySerwerNazwa.local
Domain naming master SERWER3.NowySerwerNazwa.local
PDC SERWER3.NowySerwerNazwa.local
RID pool manager SERWER3.NowySerwerNazwa.local
Infrastructure master SERWER3.NowySerwerNazwa.local
The command completed successfully.
Move-ADDirectoryServerOperationMasterRole -Identity NowySerwerNazwa -OperationMasterRole SchemaMaster, DomainNamingMaster, PDCEmulator, RIDMaster, InfrastructureMaster
^ To przenosi role należy wskazać nazwę serwera gdzie ma być przeniesnione (tu NowySerwerNazwa)
Windows – A Delegation For This DNS Server Cannot Be Created
Windows Server – Locating, Transferring, and Seizing FSMO Roles
——————————————————————- 2024.02.18 Włączenie Silverlight
Jak uruchomić Silverlight na Windows 10, Windows 11 i nowszym
——————————————————————- 2024.03.20 Sesje RDP jako admin
mstsc.exe plik.rdp /admin
——————————————————————- 2925.01.02 Zmiana portu RDP z 3889
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\TerminalServer\WinStations\RDP-Tcp\PortNumber
——————————————————————- 05.04.2024 Kasowanie plików starszych niż …
forfiles /p „C:\Backup\Dane” /s /m *.* /d -10 /c „cmd /c if @isdir==FALSE del @file”
/p „C:\Backup\Dane”: Określa ścieżkę do folderu, w którym chcesz przeprowadzić wyszukiwanie.
/s: Oznacza, że wyszukiwanie ma być rekursywne, obejmując również podfoldery.
/m *.*: Określa, że szukamy dowolnych plików (*.*).
/d -10: Oznacza, że szukamy plików, które są starsze niż 10 dni.
/c „cmd /c if @isdir==FALSE del @file”: To jest polecenie, które zostanie wykonane dla każdego znalezionego pliku. W tym przypadku sprawdzamy, czy to nie jest folder (@isdir==FALSE) i usuwamy ten plik (del @file)
——————————————————————- 21.09.2023 Zmiana strefy czasowej
https://pl.gadget-info.com/can-t-change-date-time-windows
Metoda 4 – Lokalna polityka bezpieczeństwa
Jeśli pojawi się komunikat o błędzie „Wymagany przywilej nie jest trzymany przez klienta” podczas próby użycia wiersza polecenia, przejdź do Panelu sterowania, Narzędzia administracyjne, Zasady zabezpieczeń lokalnych, a następnie przejdź do Zasady lokalne \ Przypisywanie praw użytkownika i upewnij się, że Zmień czas systemowy i Zmień uprawnienia strefy czasowej są przyznawane administratorom .
——————————————————————- 2023.05.04 .NET
https://dotnet.microsoft.com/en-us/download/dotnet
——————————————————————- 04.07.2023 Kasowanie dysków siecowych
https://spece.it/zdalne-sprawdzanie-zamapowanych-dyskow-na-kontach-uzytkownikow/
——————————————————————- Synology NAS
Mogawki
Zainstalować Pakiet:
Snapshot Replication
——————————————————————- Synology NAS
Uwieżytelnianie dwuskładnikowe:
Panel Sterowanie -> Bezpieczeństwo -> Konto
Zaznaczyć: Wymuś uwieżytelnianie dwuelementtowe dla następujących użytkowników
Użytkownicy grupy administratorów
Zastosuj
Skonfiguruj Teraz
——————————————————————- Axence
4436
C:\Program Files (x86)\Axence\nVision
old
netsh firewall add portopening TCP 4436 Port_4436_TCP
netsh firewall add portopening UDP 4436 Port_4436_UDP
te używać:
netsh advfirewall firewall add rule name= „Port_4436_TCP_axence” dir=in action=allow protocol=TCP localport=4436
netsh advfirewall firewall add rule name= „Port_4436_UDP_axence” dir=in action=allow protocol=UDP localport=4436
netsh advfirewall firewall add rule name= „Port_4436_UDP_axence” dir=out action=allow protocol=TCP localport=4436
netsh advfirewall firewall add rule name= „Port_4436_UDP_axence” dir=out action=allow protocol=UDP localport=4436
netsh advfirewall firewall add rule name=”C:\Program Files (x86)\Axence\nVision” dir=in action=allow program=”C:\Program Files (x86)\Axence\nVision” enable=yes
netsh advfirewall firewall add rule name=”C:\Program Files (x86)\Axence\nVision” dir=out action=allow program=”C:\Program Files (x86)\Axence\nVision” enable=yes
——————————————————————- Skróty Windows 10/11
https://learn.microsoft.com/en-us/windows/uwp/launch-resume/launch-settings-app
——————————————————————- 0x800f0922
https://learn.microsoft.com/pl-pl/troubleshoot/windows-server/installing-updates-features-roles/error-0x800f0922-installing-windows-updates
powershell
Dism /english /online /get-packages /format:table | findstr /i „Staged”
Microsoft-Windows-Client-LanguagePack-Package~31bf3856ad364e35~x86~pl-PL~10.0.19041.4894 | Staged | Language Pack | 16.09.2024 07:52
Microsoft-Windows-MediaPlayer-Package~31bf3856ad364e35~x86~~10.0.19041.4894 | Staged | OnDemand Pack | 16.09.2024 07:52
Microsoft-Windows-MSPaint-FoD-Package~31bf3856ad364e35~x86~~10.0.19041.4894 | Staged | OnDemand Pack | 16.09.2024 07:52
Microsoft-Windows-UserExperience-Desktop-Package~31bf3856ad364e35~x86~~10.0.19041.4842 | Staged | OnDemand Pack | 16.09.2024 07:52
Package_for_RollupFix~31bf3856ad364e35~x86~~19041.4894.1.9 | Staged | Security Update | 16.09.2024 07:52
Dism /online /remove-package /PackageName:Package_for_RollupFix~31bf3856ad364e35~amd64~~14393XXXX
Dism /online /remove-package /PackageName:Package_for_RollupFix~31bf3856ad364e35~x86~~19041.4894.1.9
Dism /online /remove-package /PackageName:Microsoft-Windows-UserExperience-Desktop-Package~31bf3856ad364e35~x86~~10.0.19041.4842
Dism /online /remove-package /PackageName:Microsoft-Windows-MSPaint-FoD-Package~31bf3856ad364e35~x86~~10.0.19041.4894
Dism /online /remove-package /PackageName:Microsoft-Windows-MediaPlayer-Package~31bf3856ad364e35~x86~~10.0.19041.4894
Dism /online /remove-package /PackageName:Microsoft-Windows-Client-LanguagePack-Package~31bf3856ad364e35~x86~pl-PL~10.0.19041.4894
reg query „HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\PI\SecureBootEncodeUEFI” /v ID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\PI\SecureBootEncodeUEFI
ID REG_SZ {C4A508C5-31B2-4790-8605-B18416495ECD}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\PI\SecureBootEncodeUEFI
ID REG_SZ {
reg delete „HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Maintenance\{C4A508C5-31B2-4790-8605-B18416495ECD}” /f
reg delete „HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Plain\{C4A508C5-31B2-4790-8605-B18416495ECD}” /f
reg delete „HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{C4A508C5-31B2-4790-8605-B18416495ECD}” /f
reg delete „HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\PI\SecureBootEncodeUEFI” /f
——————————————————————- Wazuh – Open Source XDR. Open Source SIEM.
Zmienić
no
10000
800
——————————————————————-
——————————————————————-
——————————————————————-
——————————————————————-