Sunday, November 6, 2022

Install Telnet Client using Command line and PowerShell

Command Line:

pkgmgr /iu:"TelnetClient"

PowerShell:

Install-WindowsFeature Telnet-Client

Windows couldn't complete the updates

Error:

Windows couldn't complete the updates Undoing changes. Don't turn off your computer.

Solution:

Boot OS from Command prompt

net stop wuauserv

net stop bits

rename c:\windows\SoftwareDistribution SoftwareDistribution.bak

net start wuauserv

net start bits

Reboot the system

Set / Remove Extra Registry Settings from GPOs

Set / Remove Extra Registry Settings from GPOs

Solution:

Powershell cmdlet has a useful set of cmdlets that allow you to read and write directly to the underlying storage file–registry.pol— where Administrative Templates settings are stored. These cmdlets are:

Set-GPRegistryValue

Get-GPRegistryValue

Remove-GPRegistryValue

Set-GPRegistryValue

Example:

Get-GPRegistryValue -Name "*GPO Name" -Key "HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\"

Getting credentials prompt for local intranet sites and share drive after connecting to Remote VPN

Getting credentials prompt for local intranet sites and share drive after connecting to Remote VPN

Solution:

Locate the .pbk file associated with your VPN connection (%AppData%\Roaming\Microsoft\Network\Connections\PBK\rasphone.pbk for user VPNs) or (%ProgramData%\Microsoft\Network\Connections\Pbk\rasphone.pbk for system VPNs).

Right-click on the VPN's .pbk file and open it with Notepad. (Remember to untick 'Always use this program for this file type')

Roughly 5 lines down will be an entry 'UseRasCredentials=1'

Change this to 'UseRasCredentials=0'

Save the file.

Reference:

https://social.technet.microsoft.com/Forums/windows/en-US/0204464d-e32d-4584-966b-60788cce0d6f/disable-creation-of-vpn-quotsessionquot-credential-in-credential-manager-without-disabling-all?forum=winserversecurity


Friday, November 4, 2022

Event ID 4625 Null SID Guest account currently disabled

An account failed to log on.

Subject:

Security ID: Domain\Administrator

Account Name: Administrator

Account Domain: Domain

Logon ID: 0x4DEEDAB8

Logon Type: 3

Account For Which Logon Failed:

Security ID: NULL SID

Account Name: Guest

Account Domain: Computername

Failure Information:

Failure Reason: Account currently disabled.

Status: 0xC000006E

Sub Status: 0xC0000072

Process Information:

Caller Process ID: 0x5acc

Caller Process Name: C:\Windows\explorer.exe

Network Information:

Workstation Name: Computername

Source Network Address: -

Source Port: -

Detailed Authentication Information:

Logon Process: Advapi  

Authentication Package: Negotiate

Transited Services: -

Package Name (NTLM only): -

Key Length: 0

This event is generated when a logon request fails. It is generated on the computer where access was attempted.

The Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.

The Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).

The Process Information fields indicate which account and process on the system requested the logon.

The Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.

The authentication information fields provide detailed information about this specific logon request.

- Transited services indicate which intermediate services have participated in this logon request.

- Package name indicates which sub-protocol was used among the NTLM protocols.

================================================================

That must be not the remote computer attempt to logon your server, if it does and failure, the security log will log “Unknown username or bad password”.

The Network Information fields indicate where a remote logon request originated. The workstation name is not always available and may be left blank in some cases.

It's by design. The core issue for that is that Network and Sharing Center wants to know whether the guest account is enabled for network access

Solution:
Remove "Everyone" NTFS permission from the shared folder.


Reference: 

Event ID 4625 Null SID Guest account currently disabled (microsoft.com)

Search this Blog

Note :

Infolinks In Text Ads