User Tools

Site Tools


test

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
test [2026/04/13 22:05] apereztest [2026/04/14 22:56] (current) aperez
Line 54: Line 54:
   netsh advfirewall set allprofiles state off   netsh advfirewall set allprofiles state off
   netsh firewall set service remotedesktop enable   netsh firewall set service remotedesktop enable
 +  
 +  
 +  # Corregir el fSingleSessionPerUser
 +  Set-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\Terminal Server" -Name "fSingleSessionPerUser" -  Value 0 -Type DWord
 +  
 +  # Configurar licenciamiento por dispositivo directamente en registro
 +  Set-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\Terminal Server\RCM" -Name "LicensingMode" -Value   2 -Type DWord
 +  
 +  # Apuntar servidor de licencias a sí mismo
 +  Set-ItemProperty -Path "HKLM:\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services" -Name "LicenseServers" -  Value "WorldOffice" -Type String
 +  Set-ItemProperty -Path "HKLM:\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services" -Name "LicensingMode" -  Value 2 -Type DWord
 +  
 +  # Reiniciar RDP
 +  Restart-Service TermService -Force
 +  
 +  
 +  
 +  reg add "HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server" /v fSingleSessionPerUser /t REG_DWORD /d 0 /f
 +  reg add "HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server\RCM" /v LicensingMode /t REG_DWORD /d 2 /f
 +  reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services" /v LicenseServers /t REG_SZ /d   "WorldOffice" /f
 +  reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services" /v LicensingMode /t REG_DWORD /d 2 /f
 +  net stop TermService /y
 +  net start TermService
 +  
 +  
 +  
 +
 +
 +
 +  reg add "HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server" /v fSingleSessionPerUser /t REG_DWORD /d 0 /f
 +  
 +  reg add "HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server\RCM" /v LicensingMode /t REG_DWORD /d 2 /f
 +  
 +  reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services" /v LicenseServers /t REG_SZ /d   "WorldOffice" /f
 +  
 +  reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services" /v LicensingMode /t REG_DWORD /d 2 /f
 +  
 +  net stop TermService /y
 +  
 +  net start TermService
 +  
 +
 +  
 +  reg query "HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server\RCM\GracePeriod"
 +  
 +
 +
 +  REM Crear un script para ejecutar como SYSTEM
 +  echo reg delete "HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server\RCM\GracePeriod" /f > C:\fix_rdp.bat
 +  
 +  REM Ejecutar como SYSTEM usando el scheduler
 +  schtasks /create /tn "FixRDP" /tr "C:\fix_rdp.bat" /sc once /st 00:00 /ru SYSTEM /f
 +  schtasks /run /tn "FixRDP"
 +  
 +  REM Esperar 3 segundos y reiniciar RDP
 +  timeout /t 3
 +  net stop TermService /y
 +  net start TermService
 +  
 +  REM Verificar que la clave fue eliminada
 +  reg query "HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server\RCM\GracePeriod"
 +  
 +  
 +
 +
 +
 +  reg add "HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server" /v fDenyTSConnections /t REG_DWORD /d 0 /f
 +  reg add "HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server" /v fSingleSessionPerUser /t REG_DWORD /d 0 /f
 +  reg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v AllowMultipleTSSessions /t REG_DWORD /d 1   /f
 +  
 +  net stop TermService /y
 +  net start TermService
 +  
 +  netstat -an | findstr "3389"
 +  
 +  
 +  reg add "HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v PortNumber /t REG_DWORD /d   3389 /f
 +  reg add "HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v fLogonDisabled /t   REG_DWORD /d 0 /f
 +  reg add "HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v MaxInstanceCount /t   REG_DWORD /d 4294967295 /f
 +  
 +  net stop TermService /y
 +  net start TermService
 +  
 +  netstat -an | findstr "3389"
 +
 +  
 +  REM Verificar estado del firewall
 +  netsh advfirewall show allprofiles state
 +  
 +  REM Desactivar completamente
 +  netsh advfirewall set allprofiles state off
 +  
 +  REM Verificar
 +  netsh advfirewall show allprofiles state
 +  
 +  
 +
 +
 +  REM Descargar QEMU Guest Agent
 +  powershell -Command "Invoke-WebRequest -Uri 'https://fedorapeople.org/groups/virt/virtio-win/direct-  downloads/stable-virtio/virtio-win-guest-tools.exe' -OutFile 'C:\qemu-guest-tools.exe'"
 +  
 +  REM Instalar
 +  C:\qemu-guest-tools.exe /S
 +  
 +
 +
 +  powershell -Command "[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; Invoke-  WebRequest -Uri 'https://fedorapeople.org/groups/virt/virtio-win/direct-downloads/stable-virtio/virtio-win-guest-  tools.exe' -OutFile 'C:\qemu-guest-tools.exe'"
test.1776117912.txt.gz · Last modified: by aperez

Donate Powered by PHP Valid HTML5 Valid CSS Driven by DokuWiki