User Tools

Site Tools


test

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
test [2026/04/14 19:22] apereztest [2026/04/14 22:56] (current) aperez
Line 71: Line 71:
      
      
-  Set-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\Terminal Server" -Name "fSingleSessionPerUser" -  Value -Type DWord +  reg add "HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server" /v fSingleSessionPerUser /t REG_DWORD /d /f 
-  Set-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\Terminal Server\RCM" -Name "LicensingMode" -Value   2 -Type DWord +  reg add "HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server\RCM" /v LicensingMode /t REG_DWORD /d 2 /f 
-  Set-ItemProperty -Path "HKLM:\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services" -Name "LicenseServers Value "WorldOffice" -Type String +  reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services" /v LicenseServers /t REG_SZ /d   "WorldOffice" /f 
-  Set-ItemProperty -Path "HKLM:\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services" -Name "LicensingMode" -  Value 2 -Type DWord +  reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services" /v LicensingMode /t REG_DWORD /d 2 /f 
-  Restart-Service TermService -Force +  net stop TermService /y 
-  Write-Host "Listo intente RDP ahora"+  net start TermService 
 +   
 +   
 +   
 + 
 + 
 + 
 +  reg add "HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server/v fSingleSessionPerUser /t REG_DWORD /d 0 /f 
 +   
 +  reg add "HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server\RCM" /v LicensingMode /t REG_DWORD /d 2 /f 
 +   
 +  reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services" /v LicenseServers /t REG_SZ /d   "WorldOffice" /f 
 +   
 +  reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services" /v LicensingMode /t REG_DWORD /d 2 /f 
 +   
 +  net stop TermService /y 
 +   
 +  net start TermService 
 +   
 + 
 +   
 +  reg query "HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server\RCM\GracePeriod" 
 +   
 + 
 + 
 +  REM Crear un script para ejecutar como SYSTEM 
 +  echo reg delete "HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server\RCM\GracePeriod" /f > C:\fix_rdp.bat 
 +   
 +  REM Ejecutar como SYSTEM usando el scheduler 
 +  schtasks /create /tn "FixRDP" /tr "C:\fix_rdp.bat" /sc once /st 00:00 /ru SYSTEM /f 
 +  schtasks /run /tn "FixRDP" 
 +   
 +  REM Esperar 3 segundos y reiniciar RDP 
 +  timeout /t 3 
 +  net stop TermService /y 
 +  net start TermService 
 +   
 +  REM Verificar que la clave fue eliminada 
 +  reg query "HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server\RCM\GracePeriod" 
 +   
 +   
 + 
 + 
 + 
 +  reg add "HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server" /v fDenyTSConnections /t REG_DWORD /d 0 /f 
 +  reg add "HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server" /v fSingleSessionPerUser /t REG_DWORD /d 0 /f 
 +  reg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v AllowMultipleTSSessions /t REG_DWORD /d 1   /f 
 +   
 +  net stop TermService /y 
 +  net start TermService 
 +   
 +  netstat -an | findstr "3389" 
 +   
 +   
 +  reg add "HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v PortNumber /t REG_DWORD /d   3389 /f 
 +  reg add "HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v fLogonDisabled /t   REG_DWORD /d 0 /f 
 +  reg add "HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v MaxInstanceCount /t   REG_DWORD /d 4294967295 /f 
 +   
 +  net stop TermService /y 
 +  net start TermService 
 +   
 +  netstat -an | findstr "3389" 
 + 
 +   
 +  REM Verificar estado del firewall 
 +  netsh advfirewall show allprofiles state 
 +   
 +  REM Desactivar completamente 
 +  netsh advfirewall set allprofiles state off 
 +   
 +  REM Verificar 
 +  netsh advfirewall show allprofiles state 
 +   
 +   
 + 
 + 
 +  REM Descargar QEMU Guest Agent 
 +  powershell -Command "Invoke-WebRequest -Uri 'https://fedorapeople.org/groups/virt/virtio-win/direct-  downloads/stable-virtio/virtio-win-guest-tools.exe' -OutFile 'C:\qemu-guest-tools.exe'" 
 +   
 +  REM Instalar 
 +  C:\qemu-guest-tools.exe /S 
 +   
 + 
 + 
 +  powershell -Command "[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; Invoke-  WebRequest -Uri 'https://fedorapeople.org/groups/virt/virtio-win/direct-downloads/stable-virtio/virtio-win-guest-  tools.exe' -OutFile 'C:\qemu-guest-tools.exe'"
test.1776194535.txt.gz · Last modified: by aperez

Donate Powered by PHP Valid HTML5 Valid CSS Driven by DokuWiki