31 lines
1.4 KiB
PowerShell
31 lines
1.4 KiB
PowerShell
Write-Host "Delete any existing WinRM listeners"
|
|
winrm delete winrm/config/listener?Address=*+Transport=HTTP 2>$Null
|
|
#winrm delete winrm/config/listener?Address=*+Transport=HTTPS 2>$Null
|
|
|
|
Write-Host "Create a new WinRM listener and configure"
|
|
winrm create winrm/config/listener?Address=*+Transport=HTTP
|
|
#winrm set winrm/config/winrs "@{MaxMemoryPerShellMB=`"0`"}"
|
|
winrm set winrm/config "@{MaxTimeoutms=`"1800000`"}"
|
|
winrm set winrm/config/service "@{AllowUnencrypted=`"true`"}"
|
|
#winrm set winrm/config/service "@{MaxConcurrentOperationsPerUser=`"12000`"}"
|
|
winrm set winrm/config/service/auth "@{Basic=`"true`"}"
|
|
winrm set winrm/config/client/auth "@{Basic=`"true`"}"
|
|
|
|
Write-Host "Configure UAC to allow privilege elevation in remote shells"
|
|
$Key = 'HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System'
|
|
$Setting = 'LocalAccountTokenFilterPolicy'
|
|
Set-ItemProperty -Path $Key -Name $Setting -Value 1 -Force
|
|
|
|
#Write-Host "turn off PowerShell execution policy restrictions"
|
|
#Set-ExecutionPolicy -ExecutionPolicy Unrestricted
|
|
|
|
|
|
Write-Host "Configure and restart the WinRM Service; Enable the required firewall exception"
|
|
net stop winrm
|
|
net start winrm
|
|
#Stop-Service -Name WinRM
|
|
#Set-Service -Name WinRM -StartupType Automatic
|
|
netsh advfirewall firewall set rule name="Windows Remote Management (HTTP-In)" new action=allow localip=any remoteip=any
|
|
#Start-Service -Name WinRM
|
|
|