e:\Windows Server 2022\x64
1
350
Primary
2
true
Primary
NTFS
1
1
0x27
2
2
C
NTFS
0
true
0
2
/IMAGE/NAME
Windows Server 2022 SERVERSTANDARDCORE
true
Administrator
Organization
VDYBN-27WPP-V4HQT-9VMD4-VMK7H
OnError
true
en-US
0409:00000409
en-US
en-US
en-US
en-US
false
1
0409:00000409
en-US
en-US
en-US
en-US
true
0
VDYBN-27WPP-V4HQT-9VMD4-VMK7H
S3cr3t0!
true
true
Administrator
1
Set Execution Policy 64 Bit
cmd.exe /c powershell -Command "Set-ExecutionPolicy -ExecutionPolicy RemoteSigned -Force"
true
2
Set Execution Policy 32 Bit
%SystemDrive%\Windows\SysWOW64\cmd.exe /c powershell -Command "Set-ExecutionPolicy -ExecutionPolicy RemoteSigned -Force"
true
%SystemRoot%\System32\reg.exe ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ /v HideFileExt /t REG_DWORD /d 0 /f
3
Show file extensions in Explorer
%SystemRoot%\System32\reg.exe ADD HKCU\Console /v QuickEdit /t REG_DWORD /d 1 /f
4
Enable QuickEdit mode
%SystemRoot%\System32\reg.exe ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ /v Start_ShowRun /t REG_DWORD /d 1 /f
5
Show Run command in Start Menu
%SystemRoot%\System32\reg.exe ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ /v StartMenuAdminTools /t REG_DWORD /d 1 /f
6
Show Administrative Tools in Start Menu
%SystemRoot%\System32\reg.exe ADD HKLM\SYSTEM\CurrentControlSet\Control\Power\ /v HibernateFileSizePercent /t REG_DWORD /d 0 /f
7
Zero Hibernation File
%SystemRoot%\System32\reg.exe ADD HKLM\SYSTEM\CurrentControlSet\Control\Power\ /v HibernateEnabled /t REG_DWORD /d 0 /f
8
Disable Hibernation Mode
cmd.exe /c wmic useraccount where "name='Administrator'" set PasswordExpires=FALSE
9
Disable password expiration for Administrator user
%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe -Command New-SelfSignedCertificate -CertstoreLocation Cert:\LocalMachine\My -DnsName "WinRMCertificate"
Certificate for WinRM
10
true
%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe -Command Enable-PSRemoting -SkipNetworkProfileCheck -Force
Enable WinRM
11
true
%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe -Command ($cert = gci Cert:\LocalMachine\My\) -and (New-Item -Path WSMan:\LocalHost\Listener -Transport HTTPS -Address * -CertificateThumbPrint $cert.Thumbprint –Force)
Add HTTPS WinRM listener with previously generated certificate
12
true
%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe -Command New-NetFirewallRule -DisplayName 'Windows Remote Management (HTTPS-In)' -Name 'Windows Remote Management (HTTPS-In)' -Profile Any -LocalPort 5986 -Protocol TCP
Add firewall exception to TCP port 5986 for WinRM over HTTPS
13
true
%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe -Command Set-Item WSMan:\localhost\Service\Auth\Basic -Value $true
Enable Basic authentication
14
true
cmd.exe /c f:\disable-network-discovery.cmd
Disable Network Discovery
15
true
true
true
true
true
Work
1
true
true
Organization
Owner
false
Pacific Standard Time
S3cr3t0!
true
Administrator
Administrator
Administrators
Administrator