| Both sides previous revisionPrevious revisionNext revision | Previous revision |
| test [2026/04/13 17:48] – aperez | test [2026/04/14 22:56] (current) – aperez |
|---|
| wevtutil qe System /c:20 /rd:true /f:text | findstr /i "error\|failed\|source\|description" | wevtutil qe System /c:20 /rd:true /f:text | findstr /i "error\|failed\|source\|description" |
| | |
| | |
| | |
| reg add "HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v UserAuthentication /t REG_DWORD /d 0 /f | reg add "HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v UserAuthentication /t REG_DWORD /d 0 /f |
| | |
| reg add "HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v SecurityLayer /t REG_DWORD /d 0 /f | reg add "HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v SecurityLayer /t REG_DWORD /d 0 /f |
| | |
| | |
| | |
| | |
| | netsh advfirewall firewall add rule name="RDP" protocol=TCP dir=in localport=3389 action=allow |
| | |
| | |
| | netstat -an | findstr "3389" |
| | netsh advfirewall set allprofiles state off |
| | netsh firewall set service remotedesktop enable |
| | |
| | |
| | # Corregir el fSingleSessionPerUser |
| | Set-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\Terminal Server" -Name "fSingleSessionPerUser" - Value 0 -Type DWord |
| | |
| | # Configurar licenciamiento por dispositivo directamente en registro |
| | Set-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\Terminal Server\RCM" -Name "LicensingMode" -Value 2 -Type DWord |
| | |
| | # Apuntar servidor de licencias a sí mismo |
| | Set-ItemProperty -Path "HKLM:\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services" -Name "LicenseServers" - Value "WorldOffice" -Type String |
| | Set-ItemProperty -Path "HKLM:\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services" -Name "LicensingMode" - Value 2 -Type DWord |
| | |
| | # Reiniciar RDP |
| | Restart-Service TermService -Force |
| | |
| | |
| | |
| | reg add "HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server" /v fSingleSessionPerUser /t REG_DWORD /d 0 /f |
| | reg add "HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server\RCM" /v LicensingMode /t REG_DWORD /d 2 /f |
| | reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services" /v LicenseServers /t REG_SZ /d "WorldOffice" /f |
| | reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services" /v LicensingMode /t REG_DWORD /d 2 /f |
| | net stop TermService /y |
| | net start TermService |
| | |
| | |
| | |
| | |
| | |
| | |
| | reg add "HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server" /v fSingleSessionPerUser /t REG_DWORD /d 0 /f |
| | |
| | reg add "HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server\RCM" /v LicensingMode /t REG_DWORD /d 2 /f |
| | |
| | reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services" /v LicenseServers /t REG_SZ /d "WorldOffice" /f |
| | |
| | reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services" /v LicensingMode /t REG_DWORD /d 2 /f |
| | |
| | net stop TermService /y |
| | |
| | net start TermService |
| | |
| | |
| | |
| | reg query "HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server\RCM\GracePeriod" |
| | |
| | |
| | |
| | REM Crear un script para ejecutar como SYSTEM |
| | echo reg delete "HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server\RCM\GracePeriod" /f > C:\fix_rdp.bat |
| | |
| | REM Ejecutar como SYSTEM usando el scheduler |
| | schtasks /create /tn "FixRDP" /tr "C:\fix_rdp.bat" /sc once /st 00:00 /ru SYSTEM /f |
| | schtasks /run /tn "FixRDP" |
| | |
| | REM Esperar 3 segundos y reiniciar RDP |
| | timeout /t 3 |
| | net stop TermService /y |
| | net start TermService |
| | |
| | REM Verificar que la clave fue eliminada |
| | reg query "HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server\RCM\GracePeriod" |
| | |
| | |
| | |
| | |
| | |
| | reg add "HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server" /v fDenyTSConnections /t REG_DWORD /d 0 /f |
| | reg add "HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server" /v fSingleSessionPerUser /t REG_DWORD /d 0 /f |
| | reg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v AllowMultipleTSSessions /t REG_DWORD /d 1 /f |
| | |
| | net stop TermService /y |
| | net start TermService |
| | |
| | netstat -an | findstr "3389" |
| | |
| | |
| | reg add "HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v PortNumber /t REG_DWORD /d 3389 /f |
| | reg add "HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v fLogonDisabled /t REG_DWORD /d 0 /f |
| | reg add "HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v MaxInstanceCount /t REG_DWORD /d 4294967295 /f |
| | |
| | net stop TermService /y |
| | net start TermService |
| | |
| | netstat -an | findstr "3389" |
| | |
| | |
| | REM Verificar estado del firewall |
| | netsh advfirewall show allprofiles state |
| | |
| | REM Desactivar completamente |
| | netsh advfirewall set allprofiles state off |
| | |
| | REM Verificar |
| | netsh advfirewall show allprofiles state |
| | |
| | |
| | |
| | |
| | REM Descargar QEMU Guest Agent |
| | powershell -Command "Invoke-WebRequest -Uri 'https://fedorapeople.org/groups/virt/virtio-win/direct- downloads/stable-virtio/virtio-win-guest-tools.exe' -OutFile 'C:\qemu-guest-tools.exe'" |
| | |
| | REM Instalar |
| | C:\qemu-guest-tools.exe /S |
| | |
| | |
| | |
| | powershell -Command "[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; Invoke- WebRequest -Uri 'https://fedorapeople.org/groups/virt/virtio-win/direct-downloads/stable-virtio/virtio-win-guest- tools.exe' -OutFile 'C:\qemu-guest-tools.exe'" |