IT

Rozwiązania IT stosowane przeze mnie:

Wersja SQL-a —————————————————- 01.12.2021
select @@version

sfc i DISM —————————————————– 30.11.2021

sfc /scannow
DISM.exe /Online /Cleanup-image /Restorehealth
DISM.exe /Online /Cleanup-Image /RestoreHealth /Source:C:\RepairSource\Windows /LimitAccess

Windows 11 —————————————————— 09.11.2021

https://www.instalki.pl/aktualnosci/software/50677-nie-da-sie-zainstalowac-aktualizacji-windows-11-co-zrobic.html?fbclid=IwAR21pxMy6xoELAwDbB8I2RUtCPqu2LBi_PyKPaQ4IU8jmg5ctaWZrGp0KFg

Windows 11 —————————————————— 07.11.2021
Folder o nazwie:
GodMode.{ED7BA470-8E54-465E-825C-99712043E01C}

Tryb „Boga”

psexec64 użycie ————————————————- 15.12.2020

@echo off
rem C:\TMP\PS\psexec64.exe -u admin -p haslo "C:\Program Files (x86)\Datacolor\Spectrum\Datacolor Tools\DatacolorTools.exe" select

rem 7z x archive.zip -oc:\soft *.cpp -r
del C:\TMP\Data_Color.exe /q
"C:\Program Files\7-Zip\7z.exe" x C:\TMP\Data_Color.7z -oC:\TMP *.exe -r
C:\TMP\PS\psexec64.exe -u admin -p haslo "C:\Program Files (x86)\Datacolor\Spectrum\Datacolor Tools\DatacolorTools.exe" select

Czyszczenie Windows Update ————————————– 10.01.2017

net stop wuauserv
net stop cryptsvc
ren %windir%\SoftwareDistribution SoftwareDistributionOld
ren %windir%\System32\SoftwareDistribution SoftwareDistributionOld
ren %windir%\System32\CatRoot2 CatRoot2Old
net start wuauserv
net start cryptsvc

Restart Windows update

net stop wuauserv
net stop cryptSvc
net stop bits
net stop msiserver

net start wuauserv
net start cryptSvc
net start bits
net start msiserver

Czyszczenie bufora wydruku ———————————– 11.12.2020

@echo off
echo Czyszczenie bufora wydruku
net stop spooler
echo Trwa usuwanie dokumentow w kolejce drukowania
del /q /f /s "%systemroot%\system32\spool\PRINTERS\*.*"
net start spooler
echo Pomyslnie wykonano wszystkie czynnosci

net use \\192.168.1.177 /user:druk druk
rem net use \\192.168.1.200\acer /user:root haslo
rem powershell Add-Printer -ConnectionName \\192.168.1.177\L2700
timeout /t 5
rundll32 printui.dll,PrintUIEntry /y /q /n "\\192.168.1.177\L2700"
rem printui /s /t2 

Cacls / icacls ————————————————– 11.03.2021

Cacls "C:\Program Files\Java" /E /T /C /G "Użytkownicy":F
Cacls "C:\Program Files\Green" /E /T /C /G "Użytkownicy":F
Cacls "C:\Program Files\Microsoft Office" /E /T /C /G "Użytkownicy":F
Cacls "C:\Program Files\Mozilla Firefox" /E /T /C /G "Użytkownicy":F
Cacls "C:\Program Files\Mozilla Thunderbird" /E /T /C /G "Użytkownicy":F
Cacls "C:\Program Files\OpenVPN" /E /T /C /G "Użytkownicy":F
Cacls "C:\Program Files\PDFCreator" /E /T /C /G "Użytkownicy":F
Cacls "C:\Program Files\Samsung" /E /T /C /G "Użytkownicy":F
Cacls "C:\Program Files\TrueCrypt" /E /T /C /G "Użytkownicy":F
Cacls "C:\Program Files\PDFCreator" /E /T /C /G "Użytkownicy":F
Cacls "C:\Program Files\Mozilla Maintenance Service" /E /T /C /G "Użytkownicy":F
Cacls "C:\Program Files\MozBackup" /E /T /C /G "Użytkownicy":F
Cacls "C:\Program Files\STMicroelectronics" /E /T /C /G "Użytkownicy":F
Cacls "C:\Program Files " /E /T /C /G "Użytkownicy":F
icacls "C:\BACKUP\*" /t /grant user:(f)
icacls "c:\TMP\Migracja\*" /t /grant iga@domena:(f)
icacls "C:\Program Files\*" /t /grant jurale:(f)
icacls "C:\Program Files (x86)\Mozilla Maintenance Service*" /t /grant user:(f)
icacls "C:\Program Files (x86)\e-Deklaracje\*" /t /grant user:(f)
icacls "C:\Program Files (x86)\Google\*" /t /grant user:(f)
icacls "C:\Program Files (x86)\Krajowa Izba Rozliczeniowa S.A\*" /t /grant user:(f)
icacls "C:\Program Files (x86)\Mozilla Thunderbird\*" /t /grant user:(f)
icacls "C:\Program Files (x86)\OpenOffice 4\*" /t /grant user:(f)
icacls "C:\Program Files (x86)\Windows Live\*" /t /grant user:(f)
icacls "C:\Program Files (x86)\Windows Mail\*" /t /grant user:(f)
icacls "C:\Program Files (x86)\Adobe\*" /t /grant user:(f)
icacls "C:\Program Files (x86)\GOFIN\*" /t /grant user:(f)
icacls "C:\Program Files (x86)\Krajowa Izba Rozliczeniowa S.A\*" /t /grant user:(f)
icacls "C:\Program Files (x86)\Certum\*" /t /grant user:(f)
icacls "C:\Program Files\7-Zip\*" /t /grant jurale:(f)
icacls "C:\Program Files\Advanced Card Systems Ltd\*" /t /grant jurale:(f)
icacls "C:\Program Files\Mozilla Firefox\*" /t /grant jurale:(f)
icacls "C:\Program Files\Java\*" /t /grant jurale:(f)
icacls "\*" /t /grant jurale:(f)
icacls "\*" /t /grant jurale:(f)

robocopy.exe Składnia ——————————————- 06.05.2019

robocopy.exe c:\Users\Symfonia\Desktop\ k:\Dane_User\A\Desktop /Z /W:2 /R:3 /E /LOG:C:\TMP\Log\Robbo_Log_Desktop_%date%.txt
robocopy.exe c:\Users\Symfonia\Documents\ k:\Dane_User\A\Documents /Z /W:2 /R:3 /E /LOG:C:\TMP\Log\Robbo_Log_Document_%date%.txt

Ważne komedny z Uruchom —————————————– 07.11.2021

desk.cpl ,,
control

Net user ——————————————————– 23.10.2021

net user User ZAQ12wsx /ADD /FULLNAME:"Imię Nazwisko" /PASSWORDCHG:NO 
          ^nazwa ^ hasło ^ dodać ^ nazwa wyświtlana             ^ nie może zmienić hasła
Dodanie do grupy
net localgroup Administratorzy User /add
net localgroup Administratorzy User /delete

Hasło nigdy nie wygasa
wmic UserAccount where Name='User' set PasswordExpires=False

net user Administrator /FULLNAME:"AAdmin" 
net user Administrator AAdmin
net user Administrator /ACTIVE:Yes
net user Administrator /PASSWORDCHG:Yes 

net accounts ————————————————— 23.10.2021 / 03.12.2024

net accounts
net accounts /Lockoutthreshold:10 - Liczba prób logowania tu 10 prób
net accounts /lockoutwindow:30 - Okno obserowwania blokady 30 minut
net accounts /lockoutduration:10 - Czas trwania blokdady 10 minut

net accounts
net accounts /Lockoutthreshold:5
net accounts /lockoutduration:10
net accounts /lockoutwindow:10

Ustawia maksymalną liczbę dni ważności hasła.

net accounts /MAXPWAGE:999
net accounts /MAXPWAGE:UNLIMITED

Ustawia minimalną liczbę dni, które muszą minąć, zanim użytkownik może zmienić hasło.

net accounts /MINPWAGE:999
net accounts /MINPWAGE:0

Jak podejrzeć ustawienia haseł i blokowania konta w Windows/CMD?

W AD hasło nigdy nie wygasa (nie testowane)

Set-ADUser -Identity "nazwa_użytkownika" -PasswordNeverExpires $true

SMB 1 ———————————————————– 15.02.2021
powershell jako administrator

Protokół SMBv1
Wykrywanie: Get-WindowsFeature FS-SMB1
Wyłączanie: Disable-WindowsOptionalFeature -Online -FeatureName smb1protocol
Włączanie: Enable-WindowsOptionalFeature -Online -FeatureName smb1protocol
lub
Wykrywanie: Get-WindowsOptionalFeature –Online –FeatureName SMB1Protocol
Wyłączanie: Disable-WindowsOptionalFeature -Online -FeatureName SMB1Protocol
Włączanie: Enable-WindowsOptionalFeature -Online -FeatureName SMB1Protocol

Protokół SMBv2/SMBv3
Wykrywanie: Get-SmbServerConfiguration | Select EnableSMB2Protocol
Wyłączanie: Set-SmbServerConfiguration -EnableSMB2Protocol $false
Włączanie: Set-SmbServerConfiguration -EnableSMB2Protocol $true
lub
Wykrywanie: Get-SmbServerConfiguration | Select EnableSMB2Protocol
Wyłączanie: Set-SmbServerConfiguration –EnableSMB2Protocol $false
Włączanie: Set-SmbServerConfiguration –EnableSMB2Protocol $true

winsock reset ————————————————— 03.08.2021

netsh winsock reset c:\TMP\winsocklog.txt

Kontrola karty sieciowej z cmd ———————————- 24.11.2020

netsh interface ipv4 show config
^ konfiguracja wszystkich interfejsów
Powerhell
Get-NetIPInterface
Zmiana nazwy połączenia sieicowego
Rename-NetAdapter -Name „” -NewName „
Rename-NetAdapter -Name „Dom” -NewName „Dom-Ethernet”
Rename-NetAdapter -Name „Wi-Fi” -NewName „Dom-Wi-Fi”
^ to można zmienicć na nazwę firmy np kontak.
CMD
Włączenie/wyłączenie interfejsu dokonamy również za pomocą komend:
netsh interface set interface „” disabled
netsh interface set interface „” enabled

http://slow7.pl/windows-7/item/136-jest-we-mnie-moc-konfiguracja-interfejsow-sieciowych-i-dostep-zdalny-z-wykorzystaniem-powershella?tmpl=component&print=1

Zmiana IP z CMD

netsh interface ip show interfaces "Dom-Ethernet"
netsh interface ipv4 set address name = "Dom-Ethernet" static 192.168.28.221 255.255.255.0 192.168.0.3
netsh interface ipv4 set address name = "Dom-Ethernet" source = dhcp
DNS:
netsh interface ipv4 set dns name = "Dom-Ethernet" static 192.168.28.3
^ Piewszy domyślny \/dns-y 1,2,3
netsh interface ip add dns name="Dom-Ethernet" addr=192.168.28.3 index=1
netsh interface ip add dns name="Dom-Ethernet" addr=8.8.8.8 index=2
netsh interface ip add dns name="Dom-Ethernet" addr=8.8.4.4 index=3
z DHCP 
netsh interface ip set dns name="Dom-Ethernet" source=dhcp

netsh interface ip show interfaces "Dom-Ethernet"
netsh interface ipv4 set address name = "Dom-Ethernet" static 192.168.28.221 255.255.255.0 192.168.0.3
netsh interface ipv4 set address name = "Dom-Ethernet" source = dhcp
DNS:
netsh interface ipv4 set dns name = "Dom-Ethernet" static 192.168.28.3
^ Piewszy domyślny \/dns-y 1,2,3
netsh interface ip add dns name="Dom-Ethernet" addr=192.168.28.3 index=1
netsh interface ip add dns name="Dom-Ethernet" addr=8.8.8.8 index=2
netsh interface ip add dns name="Dom-Ethernet" addr=8.8.4.4 index=3
z DHCP 
netsh interface ip set dns name="Dom-Ethernet" source=dhcp

Windows 10 Home to Pro —————————————— 23.10.2020

Robimy to bez internetu
VK7JG-NPHTM-C97JM-9MPGT-3V66T – To jest klucz transportowy do zmiany

NVVV8-XXXXX-FVV86-XXXXX-WA8XF – klucz w asus marketing aka
NRVVV-XXXXX-2AA2W-XXXXX-RAKTR – KLUCZ W SURFACE GO AKA

slmgr.vbs /dli
slmgr.vbs /dlv
slmgr.vbs /upk
slmgr.vbs -ipk VK7JG-NPHTM-C97JM-9MPGT-3V66T
slmgr.vbs -ato
slmgr.vbs -ipk NRVVV-XXXXX-2AA2W-XXXXX-RAKTR

dism /online /set-edition:ServerStandard /productkey:NRVVV-XXXXX-2AA2W-XXXXX-RAKTR /accepteula
dism /online /set-edition:Core /productkey:NRVVV-XXXXX-2AA2W-XXXXX-RAKTR /accepteula
DISM /online /Get-CurrentEdition
DISM /Online /Cleanup-Image /CheckHealth

slui 4

Plan zasilania ————————————————– 07.01.2021
Plan zasilania wysoka wydajność:

powercfg -duplicatescheme e9a42b02-d5df-448d-aa00-03f14749eb61

psexec64 ——————————————————– 07.01.2021
Jak uruchomić komendę z uprawnieniami administratora

C:\TMP\PSTools\psexec64.exe -u Administrator -p haslo „C:\TMP\bufor-czyszczenie.bat” select
C:\TMP\PSTools\psexec64.exe -u Administrator -p haslo „C:\TMP\bufor-czyszczenie.bat”

Ferro Backup ————————————————–

FBSServer.exe
C:\Program Files (x86)\FERRO Software\Ferro Backup System\FBSServer.exe
C:\Program Files (x86)\FERRO Software\Ferro Backup System\
FBSWorker.exe
C:\Program Files (x86)\FERRO Software\Ferro Backup System\FBSWorker.exe
netsh advfirewall firewall add rule name="C:\Program Files (x86)\FERRO Software\Ferro Backup System\" dir=in action=allow program="C:\Program Files (x86)\FERRO Software\Ferro Backup System\" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files (x86)\FERRO Software\Ferro Backup System\FBSServer.exe" dir=in action=allow program="C:\Program Files (x86)\FERRO Software\Ferro Backup System\FBSServer.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files (x86)\FERRO Software\Ferro Backup System\FBSWorker.exe" dir=in action=allow program="C:\Program Files (x86)\FERRO Software\Ferro Backup System\FBSWorker.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files (x86)\FERRO Software\Ferro Backup System\" dir=out action=allow program="C:\Program Files (x86)\FERRO Software\Ferro Backup System\" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files (x86)\FERRO Software\Ferro Backup System\FBSServer.exe" dir=out action=allow program="C:\Program Files (x86)\FERRO Software\Ferro Backup System\FBSServer.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files (x86)\FERRO Software\Ferro Backup System\FBSWorker.exe" dir=out action=allow program="C:\Program Files (x86)\FERRO Software\Ferro Backup System\FBSWorker.exe" enable=yes

Porty ———————————————————– 17.12.2021

netsh advfirewall firewall add rule name= "Port_1433_TCP_SQL" dir=in action=allow protocol=TCP localport=1433
netsh advfirewall firewall add rule name= "Port_1433_UDP_SQL" dir=in action=allow protocol=UDP localport=1433
netsh advfirewall firewall add rule name= "Port_1433_TCP_SQL" dir=out action=allow protocol=TCP localport=1433
netsh advfirewall firewall add rule name= "Port_1433_UDP_SQL" dir=out action=allow protocol=UDP localport=1433

netsh advfirewall firewall add rule name= "Port_1434_TCP_SQL" dir=in action=allow protocol=TCP localport=1434
netsh advfirewall firewall add rule name= "Port_1434_UDP_SQL" dir=in action=allow protocol=UDP localport=1434
netsh advfirewall firewall add rule name= "Port_1434_TCP_SQL" dir=out action=allow protocol=TCP localport=1434
netsh advfirewall firewall add rule name= "Port_1434_UDP_SQL" dir=out action=allow protocol=UDP localport=1434

netsh advfirewall firewall add rule name= "Port_32343_TCP_Sage" dir=in action=allow protocol=TCP localport=32343
netsh advfirewall firewall add rule name= "Port_32343_UDP_Sage" dir=in action=allow protocol=UDP localport=32343
netsh advfirewall firewall add rule name= "Port_32343_TCP_Sage" dir=out action=allow protocol=TCP localport=32343
netsh advfirewall firewall add rule name= "Port_32343_UDP_Sage" dir=out action=allow protocol=UDP localport=32343

netsh advfirewall firewall add rule name= "Port_32344_TCP_Sage" dir=in action=allow protocol=TCP localport=32344
netsh advfirewall firewall add rule name= "Port_32344_UDP_Sage" dir=in action=allow protocol=UDP localport=32344
netsh advfirewall firewall add rule name= "Port_32344_TCP_Sage" dir=out action=allow protocol=TCP localport=32344
netsh advfirewall firewall add rule name= "Port_32344_UDP_Sage" dir=out action=allow protocol=UDP localport=32344

netsh advfirewall firewall add rule name= "Port_32342_TCP_Sage" dir=in action=allow protocol=TCP localport=32342
netsh advfirewall firewall add rule name= "Port_32342_UDP_Sage" dir=in action=allow protocol=UDP localport=32342
netsh advfirewall firewall add rule name= "Port_32342_TCP_Sage" dir=out action=allow protocol=TCP localport=32342
netsh advfirewall firewall add rule name= "Port_32342_UDP_Sage" dir=out action=allow protocol=UDP localport=32342

SQL 2016 ——————————————————– 17.12.2021

C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\BackupToUrl.exe
C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\DatabaseMail.exe
C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\DCEXEC.exe
C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\SQLAGENT.exe
C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\sqlceip.exe
C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\SQLIOSIM.exe
C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\sqlservr.exe
C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\StretchCodeGen.exe
C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\xpadsi.exe
C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\SQLIOSIM.exe

netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\BackupToUrl.exe" dir=in action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\BackupToUrl.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\DatabaseMail.exe" dir=in action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\DatabaseMail.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\DCEXEC.exe" dir=in action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\DCEXEC.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\SQLAGENT.exe" dir=in action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\SQLAGENT.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\sqlceip.exe" dir=in action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\sqlceip.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\SQLIOSIM.exe" dir=in action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\SQLIOSIM.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\sqlservr.exe" dir=in action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\sqlservr.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\StretchCodeGen.exe" dir=in action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\StretchCodeGen.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\xpadsi.exe" dir=in action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\xpadsi.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\SQLIOSIM.exe" dir=in action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\SQLIOSIM.exe" enable=yes

netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\BackupToUrl.exe" dir=out action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\BackupToUrl.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\DatabaseMail.exe" dir=out action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\DatabaseMail.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\DCEXEC.exe" dir=out action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\DCEXEC.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\SQLAGENT.exe" dir=out action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\SQLAGENT.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\sqlceip.exe" dir=out action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\sqlceip.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\SQLIOSIM.exe" dir=out action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\SQLIOSIM.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\sqlservr.exe" dir=out action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\sqlservr.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\StretchCodeGen.exe" dir=out action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\StretchCodeGen.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\xpadsi.exe" dir=out action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\xpadsi.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\SQLIOSIM.exe" dir=out action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\SQLIOSIM.exe" enable=yes

SQL 2014 ——————————————————– 17.12.2021

C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\BackupToUrl.exe
C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\DatabaseMail.exe
C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\DCEXEC.exe
C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\SQLAGENT.exe
C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\sqlceip.exe
C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\SQLIOSIM.exe
C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\sqlservr.exe
C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\StretchCodeGen.exe
C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\xpadsi.exe
C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\SQLIOSIM.exe

C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESSROGER\MSSQL\Binn
C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn

netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\BackupToUrl.exe" dir=in action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\BackupToUrl.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\DatabaseMail.exe" dir=in action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\DatabaseMail.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\DCEXEC.exe" dir=in action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\DCEXEC.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\SQLAGENT.exe" dir=in action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\SQLAGENT.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\sqlceip.exe" dir=in action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\sqlceip.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\SQLIOSIM.exe" dir=in action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\SQLIOSIM.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\sqlservr.exe" dir=in action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\sqlservr.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\StretchCodeGen.exe" dir=in action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\StretchCodeGen.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\xpadsi.exe" dir=in action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\xpadsi.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\SQLIOSIM.exe" dir=in action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\SQLIOSIM.exe" enable=yes

netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\BackupToUrl.exe" dir=out action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\BackupToUrl.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\DatabaseMail.exe" dir=out action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\DatabaseMail.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\DCEXEC.exe" dir=out action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\DCEXEC.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\SQLAGENT.exe" dir=out action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\SQLAGENT.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\sqlceip.exe" dir=out action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\sqlceip.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\SQLIOSIM.exe" dir=out action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\SQLIOSIM.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\sqlservr.exe" dir=out action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\sqlservr.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\StretchCodeGen.exe" dir=out action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\StretchCodeGen.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\xpadsi.exe" dir=out action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\xpadsi.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\SQLIOSIM.exe" dir=out action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\SQLIOSIM.exe" enable=yes

7zip ———————————————————— 28.12.2021
Pakowanie z pomijanymi katalogami

"C:\Program Files\7-Zip\7z.exe" a -tzip -phaslo "\\192.168.0.16\Backup\Firma_DS_%dow%.zip" "-xr@c:\Backup\XFirma_DS.txt"  @c:\Backup\Firma_DS.txt -scsWIN  >> C:\Backup\Log\Firma_7z_Log.txt

XFirma_DS.txt
*\CAD
"*\KREOWANIE I WDRAŻANIE PRODUKTU\INNE\CHRONOMETRAŻ\nagrania"
"*\KREOWANIE I WDRAŻANIE PRODUKTU\INNE\CHRONOMETRAŻ\NAGRANIA"
"*\Marketing\materiały filmowe"
"*\Marketing\Zdjęcia"

0x0000011b —————————————————— 07.01.2021
Błąd 0x0000011b przy instalacji drukarki udostępnionej

FIX: Error 0x0000011b – Cannot Connect to Printer on Windows 10/7 (Solved)

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Print\
RpcAuthnLevelPrivacyEnabled = 0 DWORD (32-bit)

VPN ——————————————————————- 17.01.2022

wusa /uninstall /kb:5009543

Outlook ————————————————————— 20.01.2022

https://pl.telusuri.info/articles/outlook/ogranichenie-na-maksimalnij-razmer-vlozhenij-v-outlook.html

Outlook ————————————————————— 26.11.2024
Zmiana wielkości na maksymalną plików OST/PST (dla Microsoft 365 Outlook)

REG ADD "HKCU\SOFTWARE\Microsoft\Office\16.0\Outlook\PST" /v "WarnLargeFileSize" /t REG_DWORD /d "4090445042" /f
REG ADD "HKCU\SOFTWARE\Microsoft\Office\16.0\Outlook\PST" /v "MaxLargeFileSize" /t REG_DWORD /d "4294967295" /f

Outlook ————————————————————— 05.12.2023

Przeniesienie kontaktów z poza "Do..." (w noewej wiadomości) na inny komputer
Plik poza "Do..." znajduje się w lokalizacji np:
c:\Users\user\AppData\Local\Microsoft\Outlook\RoamCache\Stream_Autocomplete_0_31BC62F902B2084189572A8E87C58BC1.dat

Edycja „Do…” za pomocą programu N2KEdit https://www.nirsoft.net/utils/outlook_nk2_edit.html

Office —————————————————————- 28.01.2022
Pięć ostatnich cyfr z office

cscript "C:\Program Files (x86)\Microsoft Office\Office15\OSPP.VBS" /dstatus
cscript "C:\Program Files (x86)\Microsoft Office\Office14\OSPP.VBS" /dstatus
cscript "C:\Program Files (x86)\Microsoft Office\Office16\OSPP.VBS" /dstatus

cscript "C:\Program Files\Microsoft Office\Office16\OSPP.VBS" /dstatus 
cscript "C:\Program Files\Microsoft Office\Office15\OSPP.VBS" /dstatus
cscript "C:\Program Files\Microsoft Office\Office14\OSPP.VBS" /dstatus

——————————————————————- Płatnik hasło

Płatnik – wyłączenie zmiany hasła co 30 dni

HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Asseco Poland SA\Płatnik\X.XX.XX\Parametry

HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Asseco Poland SA\Płatnik\10.02.002\Parametry
HKEY_LOCAL_MACHINE\SOFTWARE\Asseco Poland SA\Płatnik\
HKEY_LOCAL_MACHINE\SOFTWARE\Asseco Poland SA\Płatnik\X.XX.XX\Parametry

LimitHasla = 365

——————————————————————- 15.06.2022 Office jak się zrobi Standard z Professional

https://docs.microsoft.com/en-us/answers/questions/596247/office-2021-ltsc-and-spla.html
when you published here the supported ID to use with the ODT TOOL .

ProPlus2021Volume
Standard2021Volume
ProjectPro2021Volume
ProjectStd2021Volume
VisioPro2021Volume
VisioStd2021Volume

you are aware that the SPLA versions are not listed. However, they are available when you configure the .xml file in config.office.com
Then, keeping on repeating that the ID supported are :

ProPlus2021Volume
Standard2021Volume
ProjectPro2021Volume
ProjectStd2021Volume
VisioPro2021Volume
VisioStd2021Volume

does not help much. if they do not match also the ODT TOOL .xml file created with SPLA options…
When launching the installation, the error is thrown if SPLA is in the .xml file.

——————————————————————- 09.06.2022 Firefox

SSL_ERROR_UNSUPPORTED_VERSION on Firefox

about:config
security.tls.version.min wartość ustawić na 1

——————————————————————- 23.05.2022 Komendy nowego control panel

https://learn.microsoft.com/en-us/windows/uwp/launch-resume/launch-settings-app

ms-settings:network-status – Wyświetla status sieci
ms-settings:network-vpn
——————————————————————- 14.03.2022 RDS – Instalacja serwera

W gałęzi HKLM \ SYSTEM \ CurrentControlSet \ Control \ Terminal Server \ RCM \ Licensing Core należy zmienić wartość DWORD parametru o nazwie LicensingMode z 5 na

2) – jeśli stosowane jest licencjonowanie według urządzenia (na urządzenie)
4 – podczas korzystania z licencjonowania użytkownika RDS (na użytkownika)

Użyjemy lokalnego edytora gpedit.msc. Przejdź do Konfiguracja komputera -> Składniki systemu Windows -> Usługi pulpitu zdalnego -> Host sesji zdalnej -> Licencje (Konfiguracja komputera -> Szablony administracyjne -> Składniki systemu Windows -> Usługi pulpitu zdalnego -> Host sesji pulpitu zdalnego \ Licencjonowanie).

Serwer Licencjonowania – nazwa
Tryb licencjonowania – user/urządzenie

https://pl.telusuri.info/articles/windows-server-2012-r2/oshibka-ne-zadan-rezhim-licenzirovaniya-dlya-servera-uzla-seansov-udalennih-rabochih-stolov.html

——————————————————————- 02.02.2022 Domyślny klient pocztowy

HKEY_LOCAL_MACHINE\SOFTWARE\Clients\Mail
Dodać wpis typu: Wartość ciągu
Nazwa domyślna (Domyślna)
Nazwa klienta pocztowego jako wartość np:
eM Client
Mozilla Thunderbird

———————————————————————————— 13.11.2022 Kasacja logów tranzakcyjne MSSQL

Task -> Shrink -> Databases

Jeżeli się nie da:
Właściwości bazy Options przełączyć z trybu Full na Simple

——————————————————————- 06.09.2022 Migracja kontrolera domeny

dnscmd /EnumZones – Sprawdzenie ról kontrolera doemeny
1. Nowy serwer Manager serwera -> zarządzaj -> Dodaj role i funkcje -> inst. oparta na funkcjach -> Active Directory Domain Services (Rola) Usługi domenowe Active Directory
=====
*Gdyby była potrzebna migracja systemu plików SYSVOL z FRS na DFS to:
1. Zrobić backup katalogu C:\Windows\SYSVOL
Powershell
dfsrmig /getglobalstate
dfsrmig /setglobalstate 1
dfsrmig /setglobalstate 2
dfsrmig /setglobalstate 3
dfsrmig /getmigrationstate
Inofmracje z https://www.rebeladmin.com/2015/04/step-by-step-guide-for-upgrading-sysvol-replication-to-dfsr-distributed-file-system-replication/
=====
2. Manager serwera konfiguracja kontrolera domeny
-1 Dodanie do instniejącej domeny
-2 Hasło DRSM trudnedozlamaniahaslo
-3 Upgrade DNS (next)
-4 Next
-5 Scieżki:
–5a Folder bazy danych: C:\Windows\NTDS
–5b Folder plików dziennika C:\Windows\NTDS
–5c Folder SYSVOL C:\Windows\SYSVOL
-6 Next
-7 Next (View Scrypt)
— Install
Restart
powershell – Administrator
netdom query fsmo – ta komenda wyświetla role serwer na kontrolerze domeny (gdzie są przypisane)

Schema master SERWER3.NowySerwerNazwa.local
Domain naming master SERWER3.NowySerwerNazwa.local
PDC SERWER3.NowySerwerNazwa.local
RID pool manager SERWER3.NowySerwerNazwa.local
Infrastructure master SERWER3.NowySerwerNazwa.local
The command completed successfully.

Move-ADDirectoryServerOperationMasterRole -Identity NowySerwerNazwa -OperationMasterRole SchemaMaster, DomainNamingMaster, PDCEmulator, RIDMaster, InfrastructureMaster

^ To przenosi role należy wskazać nazwę serwera gdzie ma być przeniesnione (tu NowySerwerNazwa)

Windows – A Delegation For This DNS Server Cannot Be Created

Windows Server – Locating, Transferring, and Seizing FSMO Roles

——————————————————————- 2024.02.18 Włączenie Silverlight

Jak uruchomić Silverlight na Windows 10, Windows 11 i nowszym

——————————————————————- 2024.03.20 Sesje RDP jako admin

mstsc.exe plik.rdp /admin

——————————————————————- 2925.01.02 Zmiana portu RDP z 3889

HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\TerminalServer\WinStations\RDP-Tcp\PortNumber

——————————————————————- 05.04.2024 Kasowanie plików starszych niż …

forfiles /p „C:\Backup\Dane” /s /m *.* /d -10 /c „cmd /c if @isdir==FALSE del @file”

/p „C:\Backup\Dane”: Określa ścieżkę do folderu, w którym chcesz przeprowadzić wyszukiwanie.
/s: Oznacza, że ​​wyszukiwanie ma być rekursywne, obejmując również podfoldery.
/m *.*: Określa, że ​​szukamy dowolnych plików (*.*).
/d -10: Oznacza, że ​​szukamy plików, które są starsze niż 10 dni.
/c „cmd /c if @isdir==FALSE del @file”: To jest polecenie, które zostanie wykonane dla każdego znalezionego pliku. W tym przypadku sprawdzamy, czy to nie jest folder (@isdir==FALSE) i usuwamy ten plik (del @file)

——————————————————————- 21.09.2023 Zmiana strefy czasowej

https://pl.gadget-info.com/can-t-change-date-time-windows

Metoda 4 – Lokalna polityka bezpieczeństwa

Jeśli pojawi się komunikat o błędzie „Wymagany przywilej nie jest trzymany przez klienta” podczas próby użycia wiersza polecenia, przejdź do Panelu sterowania, Narzędzia administracyjne, Zasady zabezpieczeń lokalnych, a następnie przejdź do Zasady lokalne \ Przypisywanie praw użytkownika i upewnij się, że Zmień czas systemowy i Zmień uprawnienia strefy czasowej są przyznawane administratorom .

——————————————————————- 2023.05.04 .NET

https://dotnet.microsoft.com/en-us/download/dotnet

——————————————————————- 04.07.2023 Kasowanie dysków siecowych

https://spece.it/zdalne-sprawdzanie-zamapowanych-dyskow-na-kontach-uzytkownikow/

——————————————————————- Synology NAS

Mogawki
Zainstalować Pakiet:
Snapshot Replication

——————————————————————- Synology NAS

Uwieżytelnianie dwuskładnikowe:
Panel Sterowanie -> Bezpieczeństwo -> Konto
Zaznaczyć: Wymuś uwieżytelnianie dwuelementtowe dla następujących użytkowników
Użytkownicy grupy administratorów
Zastosuj
Skonfiguruj Teraz

——————————————————————- Axence

4436
C:\Program Files (x86)\Axence\nVision

old
netsh firewall add portopening TCP 4436 Port_4436_TCP
netsh firewall add portopening UDP 4436 Port_4436_UDP

te używać:
netsh advfirewall firewall add rule name= „Port_4436_TCP_axence” dir=in action=allow protocol=TCP localport=4436
netsh advfirewall firewall add rule name= „Port_4436_UDP_axence” dir=in action=allow protocol=UDP localport=4436
netsh advfirewall firewall add rule name= „Port_4436_UDP_axence” dir=out action=allow protocol=TCP localport=4436
netsh advfirewall firewall add rule name= „Port_4436_UDP_axence” dir=out action=allow protocol=UDP localport=4436
netsh advfirewall firewall add rule name=”C:\Program Files (x86)\Axence\nVision” dir=in action=allow program=”C:\Program Files (x86)\Axence\nVision” enable=yes
netsh advfirewall firewall add rule name=”C:\Program Files (x86)\Axence\nVision” dir=out action=allow program=”C:\Program Files (x86)\Axence\nVision” enable=yes

——————————————————————- Skróty Windows 10/11

https://learn.microsoft.com/en-us/windows/uwp/launch-resume/launch-settings-app

——————————————————————- 0x800f0922

https://learn.microsoft.com/pl-pl/troubleshoot/windows-server/installing-updates-features-roles/error-0x800f0922-installing-windows-updates
powershell

Dism /english /online /get-packages /format:table | findstr /i „Staged”

Microsoft-Windows-Client-LanguagePack-Package~31bf3856ad364e35~x86~pl-PL~10.0.19041.4894 | Staged | Language Pack | 16.09.2024 07:52
Microsoft-Windows-MediaPlayer-Package~31bf3856ad364e35~x86~~10.0.19041.4894 | Staged | OnDemand Pack | 16.09.2024 07:52
Microsoft-Windows-MSPaint-FoD-Package~31bf3856ad364e35~x86~~10.0.19041.4894 | Staged | OnDemand Pack | 16.09.2024 07:52
Microsoft-Windows-UserExperience-Desktop-Package~31bf3856ad364e35~x86~~10.0.19041.4842 | Staged | OnDemand Pack | 16.09.2024 07:52
Package_for_RollupFix~31bf3856ad364e35~x86~~19041.4894.1.9 | Staged | Security Update | 16.09.2024 07:52

Dism /online /remove-package /PackageName:Package_for_RollupFix~31bf3856ad364e35~amd64~~14393XXXX

Dism /online /remove-package /PackageName:Package_for_RollupFix~31bf3856ad364e35~x86~~19041.4894.1.9
Dism /online /remove-package /PackageName:Microsoft-Windows-UserExperience-Desktop-Package~31bf3856ad364e35~x86~~10.0.19041.4842
Dism /online /remove-package /PackageName:Microsoft-Windows-MSPaint-FoD-Package~31bf3856ad364e35~x86~~10.0.19041.4894
Dism /online /remove-package /PackageName:Microsoft-Windows-MediaPlayer-Package~31bf3856ad364e35~x86~~10.0.19041.4894
Dism /online /remove-package /PackageName:Microsoft-Windows-Client-LanguagePack-Package~31bf3856ad364e35~x86~pl-PL~10.0.19041.4894

reg query „HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\PI\SecureBootEncodeUEFI” /v ID

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\PI\SecureBootEncodeUEFI
ID REG_SZ {C4A508C5-31B2-4790-8605-B18416495ECD}

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\PI\SecureBootEncodeUEFI
ID REG_SZ {}

reg delete „HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Maintenance\{C4A508C5-31B2-4790-8605-B18416495ECD}” /f
reg delete „HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Plain\{C4A508C5-31B2-4790-8605-B18416495ECD}” /f
reg delete „HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{C4A508C5-31B2-4790-8605-B18416495ECD}” /f
reg delete „HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\PI\SecureBootEncodeUEFI” /f

——————————————————————- Wazuh – Open Source XDR. Open Source SIEM.

Zmienić


  
    no
    10000 
    800
  

——————————————————————-
——————————————————————-
——————————————————————-
——————————————————————-