
Do Do Do – Try This at HomeYou may have seen television programs featuring dangerous stunts, which end with an inane message, ‘don’t try this at home’. Guy says: Do Do Do, try the following at home. My reasoning is this, while all these configuration changes are fun, even I admit that most are too naught to try on your company’s servers. As I wrote these naughty but nice tricks to try on your home server, so I pictured a test network connected to the internet. I see a Virtual Machine where you are trying out some of my suggestions or better still, some of your own ideas. All these ‘Hacks’ work on Windows Server 2003 (Also RC2). Many will also apply to XP. Topics
Shutdown Event TrackerThis Shutdown Event Tracker has been voted the most irritating message in Windows Server 2003. Techies, like ‘Mad Mick’ hate it even more than the Office Paperclip wizard. I zap this exasperating Shutdown Tracker menu via Group Policy. In your Active Directory, navigate to the Domain Controllers Group Policy, (GPMC is cool). Once the Group Policy launches, navigate to: Computer Configuration, Administrative Templates, System, now look for: As soon as you have finished configuring the Group Policy, run gpupdate /force. Now try Start, Shutdown, there should be no sign of the irritating Tracker, you don’t actually have to go through with the Shutdown to see the effect. I once flirted with disabling this Shutdown Event Tracker setting via the registry, but I am now in favor of controlling it via Group Policy. What is more interesting is how I found out where in the registry the setting is located. What I did was export the registry with regedit, made the change via Group Policy, then exported the registry – again. Next I ran a utility called Windiff to compare the two files and thus highlight where in the registry to locate the difference that I just created. The answer was HKLM\Software\Policies\Microsoft\Windows NT\Reliability\ShutdownReasonOn value = zero. Remove IE’s ‘Nagging Nanny’. – Control Panel, Add or Remove ProgramsProblem. When I’m at my Windows Server 2003 I cannot browse with Internet Explorer. Now I know that the real answer is to master Internet Security within IE6 (or IE7). I should launch IE6 (or IE7) configure, Tools, Internet Options, Security, but more often than not, I still cannot browse Http: //ownserver/exchange. Rather than troubleshoot, I take the Mr Ruthless approach and disable: Internet Explorer Enhanced Security Configuration. The path is Control Panel, Add or Remove Programs, Windows Components and then remove the tick next to Internet Explorer Enhanced Security Configuration. AutoAdminLogon – RegeditI admit that setting AutoAdminLogon =1 should be a disciplinary offence on a company server. However, on a test network, the benefit is when you reboot the server, there is no need to type in the password. AutoAdminLogon mimics typing in the password, but it can only do this if you store the password as plain text in the registry, another reason not to try this trick on a production network. Navigate to HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon. If AutoAdminLogon exists then Double Click on AutoAdminLogon and set value =1 (Numeric 1) Important, to ensure that AutoAdminLogon works, you must also add a new key called: DefaultPassword. In regedit navigate to the above Winlogon section, select he EDIT menu, New, String Value type DefaultPassword. Only you know the value to put in this field, for example P#ssw0rd. To digress, I discovered recently that you can use punctuation marks in passwords. At first this knowledge shocked me, but then it gave me ideas for making my password, harder: to crack. AutoAdminLogon was the first registry hack I discovered, still one of the most useful on a machine where physical security is not a factor. Occasionally you see scripts which sometimes employ this technique when they need to logon with Administrative privileges. Just before the script finishes the code covers its tracks by deleting the DefaultPassword key and setting AutoAdminLogon to zero. Tip1: Double check the value in Winlogon for the REG_SZ, DefaultDomainName and DefaultUser. Tip2: To override AutoAdminLogon e.g. logon as another user, hold down the shift key during logon. Tip3: For the slightly security conscious you could create and configure an account other than Administrator. The trick is to make an ordinary account a Backup Operator so that it has the right to logon at a server. See an update on Windows 8 AutoAdminLogon Registry. Guy Recommends: The Free IP Address Tracker (IPAT) |
