wmic UserAccount set PasswordExpires=False Sprawdzenie czy odpowiada port 1433: Test-NetConnection -ComputerName -Port 1433 Sprawdzenie lokalnie co słucha na danym porcie 1433: Get-NetTCPConnection -LocalPort 1433 | Select-Object LocalAddress, LocalPort, OwningProcess | ForEach-Object { $proc = Get-Process -Id $_.OwningProcess -ErrorAction SilentlyContinue; [PSCustomObject]@{Port=$_.LocalPort; ProcessId=$_.OwningProcess; ProcessName=if($proc){$proc.ProcessName}else{"Unknown"}} } Konfig RemoteApp dozwolone aplikacje HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Terminal Server\TSAppAllowList fDisabledAllowList to the value 1. LUB for each RemoteApp program: HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Terminal Server\TSAppAllowList \Applications Add a string named “Name” and the value “”. Add a string named “Path” and the value The last step is to create an RDP file on the client side. The RDP file must include the following entries: full address:s: disableremoteappcapscheck:i:1 alternate shell:s:rdpinit.exe shell working directory:s: remoteapplicationprogram:s:|| gatewayhostname:s: remoteapplicationname:s:Appname.exe remoteapplicationcmdline:s: Sprawdzenie portów przekierowanych: chgport Lista plików z podkatalogów z pełną ścieżką: dir /s /b /a:-d