Thanks
--
--
Brian Desmond
Windows Server MVP
desm...@payton.cps.k12.il.us
"Fredrick A. Zilz" <fz...@NOSPAM.interhealthusa.com> wrote in message
news:OuPay9Ip...@TK2MSFTNGP10.phx.gbl...
1.) wmic command line utility (saw this one in gp newsgroup few weeks ago)
wmic /node:"machinename" /user:"Administrator" rdtoggle where
(AllowTSConnections=0) call SetAllowTSConnections 1
you can substitute /node:"machinename" with /node:@"c:\computer_list.txt"
where computer_list.txt contains the list of computers on which you want RD
to be enabled
2.) Write your own script that uses WMI like the following one
strComputer = "."Set objWMIService = GetObject("winmgmts:" _ &
"{impersonationLevel=impersonate}!\\" & strComputer & "\root\cimv2")Set
colTSSettings = objWMIService.InstancesOf("Win32_TerminalServiceSetting")For
Each colTS in colTSSettings colTS.SetAllowTSConnections(1)Nextsubstitute
"." in strComputer with your remote computer Netbios, FQDN or IP address on
which you want this setting to be changed. If your users are local Admin
then you can add this script in theit logon script. This will change this
setting at logon time.
Next do what Brian suggested to actually allow them to connect remotely.
--
Regards
Matjaz Ladava, MCSE, MCSA, MCT, MVP
Microsoft MVP - Active Directory
mat...@ladava.com, mat...@mvps.org
http://ladava.com
"Brian Desmond [MVP]" <desm...@payton.cps.k12.il.us> wrote in message
news:udXnAOMp...@TK2MSFTNGP11.phx.gbl...
--
--
Brian Desmond
Windows Server MVP
desm...@payton.cps.k12.il.us
"Matjaz Ladava [MVP]" <matjaz@_nospam_ladava.com> wrote in message
news:u43Z7LQp...@TK2MSFTNGP12.phx.gbl...