This is an old revision of the document!
C:\>net statistics server
C:\>dism /online /get-features * [[http://winitpro.ru/index.php/2010/12/06/ustanovka-rsat-v-windows-7/|Установка RSAT в Windows 7]] * Перед активацией компонентов администрирования, скачать (правой кнопкой) с [[http://val.bmstu.ru/unix/Microsoft/]] пакет Windows6.1-KB958830-x86-RefreshPkg.msu и установить, запустив cmd от имени администратора dism /online /enable-feature /featurename:RemoteServerAdministrationTools dism /online /enable-feature /featurename:RemoteServerAdministrationTools-Roles dism /online /enable-feature /featurename:RemoteServerAdministrationTools-Roles-AD dism /online /enable-feature /featurename:RemoteServerAdministrationTools-Roles-AD-DS dism /online /enable-feature /featurename:RemoteServerAdministrationTools-Roles-AD-DS-SnapIns dism /online /enable-feature /featurename:RemoteServerAdministrationTools-Roles-AD-Powershell dism /online /enable-feature /featurename:RemoteServerAdministrationTools-Roles-AD-DS-AdministrativeCenter dism /online /enable-feature /featurename:RemoteServerAdministrationTools-Roles-AD-DS-NIS dism /online /enable-feature /featurename:RemoteServerAdministrationTools-Roles-AD-LDS dism /online /enable-feature /featurename:RemoteServerAdministrationTools-Roles-DNS dism /online /enable-feature /featurename:RemoteServerAdministrationTools-Features dism /online /enable-feature /featurename:RemoteServerAdministrationTools-Features-GP
!!! Синхронизировать время (лучше по NTP) !!! !!! Пользователи должны быть также заведены локально в SAM с произвольным паролем !!! !!! cmd.exe запускать с правами администратора !!! В Windows, в логине явно указывать имя user2@CORPX.UN C:\>ksetup /setrealm CORPX.UN C:\>ksetup /addkdc CORPX.UN server.corpX.un C:\>ksetup /setcomputerpassword 12345678 C:\>ksetup /mapuser * *
C:\>wuauclt /DetectNow
ipconfig /displaydns
C:\>netstat -an | find "3389"
c:\xampp\php\php.exe c:\xampp\htdocs\cacti\poller.php
Run cmd as Administrator
C:\arp -s 195.19.56.254 00-05-5d-57-fe-a5
C:\>notepad C:\Windows\SYSVOL\sysvol\corpX.un\scripts\logon.cmd
echo %username% %computername% %time% %date% logged on >> \\gate\share\logon.txt
C:\Users\Administrator\Documents>certreq -submit -binary -attrib "CertificateTemplate:WebServer" server.req server.cer
C:\Users\Administrator\Documents>certutil -ca.cert corpX-PDC-CA.cer
server# openssl x509 -inform der -in filename.cer -out filename.crt