To remove this annoying partition (there is always a popup of a full disk as this one doesn't have many space) you have to do the following:
Open a command prompt with administrative rights and execute the commands from this post.
To remove this annoying partition (there is always a popup of a full disk as this one doesn't have many space) you have to do the following:
Open a command prompt with administrative rights and execute the commands from this post.
Open an elevated command prompt
But don't forget to disable it again when you have installed the drive
Also SecureBoot must be DISABLED
Open an elevated command prompt
But don't forget to enable it again when you have installed the driver
Also SecureBoot must be DISABLED
Restart your computer by holding the shift key while clicking on restart
In the advanced boot menu choose:
After the reboot you can install unsigned drivers. When you have installed the needed driver reboot again to enable driver signing again.
Windows 10 includes a feature called “Fast Startup”, which is enabled by default. The whole idea behind this feature is to make it so computers don’t take as long to boot up after being shut down (rather than going into hibernation or sleep).
It achieves this by essentially using a cut-down implementation of Windows Hibernation. Instead of saving all user and application state to a file like traditional hibernation, it only saves the kernel and system session to the hibernation file (no user session data) – that way when it “turns on”, it loads the previous system session into RAM and off you go. Its worth noting that this process doesn’t apply to reboots – only shutdowns. Reboots follow the traditional process of completely unloading the kernel and starting from scratch on boot-up.
Obviously, it’s a great idea for consumers – quicker boot-up and login times = happy consumers.
When you start using it in a corporate environment though, you can start running into some issues – primarily:
Obviously if the computer doesn’t support hibernation, there’s no issues.
If you’d like to disable Fast Startup, there doesn’t seem to be a specific GPO setting – you’ll have to use Group Policy Preferences instead. The relevant registry setting is here:
Sometimes you need to connect to an AzureAD connected device but with the normal login credentials AzureAD\userid this isn't possible.
For these cases you have to modify the RDP file corresponding to this article. So open mstsc.exe and save the connection details to a place where you can find and open it.
Open the RDP file with notepad!!
This value should be present but maybe have another value:
This is the value to add:
With these values the mstsc client will connect to the machine and only at that point your credentials are asked. If you have Windows Hello for Business activated please be aware that not the pin code is asked but the normal user password.
Sometimes Windows Profiles gets corrupt especially roaming profiles or if different users are working on the same machine someone is deleting files from another profile just for fun or what ever.
Than it often happens that you get a temporary profile (a small popup appears on the bottom right when login in.
Depending on what Windows version and theme it may look like this:
Than you have some possibilities to restore normal functionality of that user profile (but all settings will always be gone).
When the profile of a user is corrupt you have to recreate it. Sometimes users have several GB of data and copying that as backup takes often too long and so you can simply move the users directory. But be aware that you must be in the correct settings page before doing that.
Now you can move the profile as backup (or rename it) and then you can click delete in the settings pane.
After the reboot the profile should then get recreated from scrap.
Sometimes it happens that the profile is not listed anymore within the settings or someone deleted the wrong files etc.
Here just be sure that you restarted the machine and that the users folders no longer exists (rename it if present or move it).
After that open your registry with regedit.exe and navigate to the following place.
For some keys you should find the value "ProfileImagePath" where you can check that you have the correct users (it points to the folder of the user profile).
If you have figured the correct key right click it and export it (as backup like always). Than delete it.
Often the key exists a second time with the same value but .class at the end - This one you should also backup and delete.
After that restart the computer and the profile should than be recreated.
In some cases, maybe 1 of 100, that doesn't work and here only a reinstall of the machine can help.
Tool | Switch |
|---|---|
Bcdedit | Operating on a store
Operating on entries in a store
Changing entry options
Controlling output
Controlling the boot manager
Emergency Management Services options
Debugging
|
Compact | |
Diskpart | |
DISM | |
ICACLS | |
ICD | |
Ipconfig | |
Powercfg | |
Sysprep |
|
WinAppDeployCmd |
Description | Shortcut / Command | Category |
|---|---|---|
Action Center | WIN + A | Keyboard (Windows) |
Add a Device wizard | %windir%System32DevicePairingWizard.exe | Control Panel |
Add a Printer wizard | rundll32.exe shell32.dll,SHHelpShortcuts_RunDLL AddPrinter | Control Panel |
Add Hardware wizard | %windir%System32hdwwiz.exe | Control Panel |
Additional Clocks | rundll32.exe shell32.dll,Control_RunDLL timedate.cpl,,1 | Control Panel |
Administrative Tools | control /name Microsoft.AdministrativeTools | Control Panel |
Administrative Tools | control admintools | Control Panel |
AutoPlay | control /name Microsoft.AutoPlay | Control Panel |
Backup and Restore (Windows 7) | control /name Microsoft.BackupAndRestoreCenter | Control Panel |
BitLocker Drive Encryption | control /name Microsoft.BitLockerDriveEncryption | Control Panel |
Clipboard History | WIN + V | Keyboard (Windows) |
Close active virtual desktop | WIN + CTRL + F4 | Keyboard (Windows) |
Color and Appearance | explorer shell:::{ED834ED6-4B5A-4bfe-8F11-A626DCB6A921} -Microsoft.PersonalizationpageColorization | Control Panel |
Color Management | control /name Microsoft.ColorManagement | Control Panel |
Computer Management | compmgmt.msc | MMC / MSC |
Credential Manager | control /name Microsoft.CredentialManager | Control Panel |
Date and Time (Additional Clocks) | rundll32.exe shell32.dll,Control_RunDLL timedate.cpl,,1 | Control Panel |
Date and Time (Date and Time) | control /name Microsoft.DateAndTime | Control Panel |
Date and Time (Date and Time) | control timedate.cpl | Control Panel |
Date and Time (Date and Time) | control date/time | Control Panel |
Date and Time (Date and Time) | rundll32.exe shell32.dll,Control_RunDLL timedate.cpl,,0 | Control Panel |
Default Programs | control /name Microsoft.DefaultPrograms | Control Panel |
Desktop Background | explorer shell:::{ED834ED6-4B5A-4bfe-8F11-A626DCB6A921} -Microsoft.PersonalizationpageWallpaper | Control Panel |
Desktop Icon Settings | rundll32.exe shell32.dll,Control_RunDLL desk.cpl,,0 | Control Panel |
Device Manager | devmgmt.msc | MMC / MSC |
Device Manager | control /name Microsoft.DeviceManager | Control Panel |
Device Manager | control hdwwiz.cpl | Control Panel |
Device Manager | devmgmt.msc | MMC / MSC |
Devices and Printers | control /name Microsoft.DevicesAndPrinters | Control Panel |
Devices and Printers | control printers | Control Panel |
Dictation Toolbar | WIN + H | Keyboard (Windows) |
Disk Manager | diskmgmt.msc | MMC / MSC |
Ease of Access Center | control /name Microsoft.EaseOfAccessCenter | Control Panel |
Ease of Access Center | control access.cpl | Control Panel |
Empty Console | MMC.exe | MMC / MSC |
Establish a connection to a remote PowerShell session (Computer) | etsn | PowerShell |
Event Viewer | eventvwr.msc | MMC / MSC |
exit PowerShell session | exsn | PowerShell |
Explorer | WIN + E | Keyboard (Windows) |
Feedback Hub | WIN + F | Keyboard (Windows) |
File Explorer Options (General tab) | control /name Microsoft.FolderOptions | Control Panel |
File Explorer Options (General tab) | control folders | Control Panel |
File Explorer Options (General tab) | rundll32.exe shell32.dll,Options_RunDLL 0 | Control Panel |
File Explorer Options (Search tab) | rundll32.exe shell32.dll,Options_RunDLL 2 | Control Panel |
File Explorer Options (View tab) | rundll32.exe shell32.dll,Options_RunDLL 7 | Control Panel |
File History | control /name Microsoft.FileHistory | Control Panel |
Fonts | control /name Microsoft.Fonts | Control Panel |
Fonts | control fonts | Control Panel |
Game Capturing | WIN + G | Keyboard (Windows) |
Game Controllers | control /name Microsoft.GameControllers | Control Panel |
Game Controllers | control joy.cpl | Control Panel |
Get Programs | control /name Microsoft.GetPrograms | Control Panel |
Get Programs | rundll32.exe shell32.dll,Control_RunDLL appwiz.cpl,,1 | Control Panel |
Group Policy Editor | gpedit.msc | MMC / MSC |
HomeGroup | control /name Microsoft.HomeGroup | Control Panel |
Hyper-V Manager | virtmgmt.msc | MMC / MSC |
Indexing Options | control /name Microsoft.IndexingOptions | Control Panel |
Indexing Options | rundll32.exe shell32.dll,Control_RunDLL srchadmin.dll | Control Panel |
Infrared | control /name Microsoft.Infrared | Control Panel |
Infrared | control irprops.cpl | Control Panel |
Infrared | control /name Microsoft.InfraredOptions | Control Panel |
Internet Properties (Advanced tab) | rundll32.exe shell32.dll,Control_RunDLL inetcpl.cpl,,6 | Control Panel |
Internet Properties (Connections tab) | rundll32.exe shell32.dll,Control_RunDLL inetcpl.cpl,,4 | Control Panel |
Internet Properties (Content tab) | rundll32.exe shell32.dll,Control_RunDLL inetcpl.cpl,,3 | Control Panel |
Internet Properties (General tab) | control /name Microsoft.InternetOptions | Control Panel |
Internet Properties (General tab) | control inetcpl.cpl | Control Panel |
Internet Properties (General tab) | rundll32.exe shell32.dll,Control_RunDLL inetcpl.cpl,,0 | Control Panel |
Internet Properties (Privacy tab) | rundll32.exe shell32.dll,Control_RunDLL inetcpl.cpl,,2 | Control Panel |
Internet Properties (Programs tab) | rundll32.exe shell32.dll,Control_RunDLL inetcpl.cpl,,5 | Control Panel |
Internet Properties (Security tab) | rundll32.exe shell32.dll,Control_RunDLL inetcpl.cpl,,1 | Control Panel |
iSCSI Initiator | control /name Microsoft.iSCSIInitiator | Control Panel |
Keyboard | control /name Microsoft.Keyboard | Control Panel |
Keyboard | control keyboard | Control Panel |
Language | control /name Microsoft.Language | Control Panel |
Lock Session | WIN + L | Keyboard (Windows) |
Mouse Properties (Buttons tab 0) | control /name Microsoft.Mouse | Control Panel |
Mouse Properties (Buttons tab 0) | control main.cpl | Control Panel |
Mouse Properties (Buttons tab 0) | control mouse | Control Panel |
Mouse Properties (Buttons tab 0) | rundll32.exe shell32.dll,Control_RunDLL main.cpl,,0 | Control Panel |
Mouse Properties (Hardware tab 4) | control main.cpl,,4 | Control Panel |
Mouse Properties (Hardware tab 4) | rundll32.exe shell32.dll,Control_RunDLL main.cpl,,4 | Control Panel |
Mouse Properties (Pointer Options tab 2) | control main.cpl,,2 | Control Panel |
Mouse Properties (Pointer Options tab 2) | rundll32.exe shell32.dll,Control_RunDLL main.cpl,,2 | Control Panel |
Mouse Properties (Pointers tab 1) | control main.cpl,,1 | Control Panel |
Mouse Properties (Pointers tab 1) | rundll32.exe shell32.dll,Control_RunDLL main.cpl,,1 | Control Panel |
Mouse Properties (Wheel tab 3) | control main.cpl,,3 | Control Panel |
Mouse Properties (Wheel tab 3) | rundll32.exe shell32.dll,Control_RunDLL main.cpl,,3 | Control Panel |
Network and Sharing Center | control /name Microsoft.NetworkAndSharingCenter | Control Panel |
Network Connections | control ncpa.cpl | Control Panel |
Network Connections | control netconnections | Control Panel |
Network Setup Wizard | control netsetup.cpl | Control Panel |
New virtual desktop | WIN + CTRL + D | Keyboard (Windows) |
Notification Area Icons | explorer shell:::{05d7b0f4-2121-4eff-bf6b-ed3f69b894d9} | Control Panel |
ODBC Data Source Administrator | control odbccp32.cpl | Control Panel |
Offline Files | control /name Microsoft.OfflineFiles | Control Panel |
Performance Monitor | perfmon.msc | MMC / MSC |
Performance Options (Data Execution Prevention) | %windir%system32SystemPropertiesDataExecutionPrevention.exe | Control Panel |
Performance Options (Visual Effects) | %windir%system32SystemPropertiesPerformance.exe | Control Panel |
Personalization | explorer shell:::{ED834ED6-4B5A-4bfe-8F11-A626DCB6A921} | Control Panel |
Phone and Modem | control /name Microsoft.PhoneAndModem | Control Panel |
Phone and Modem | control telephon.cpl | Control Panel |
Power Options | control /name Microsoft.PowerOptions | Control Panel |
Power Options | control powercfg.cpl | Control Panel |
Power Options - Advanced settings | control powercfg.cpl,,1 | Control Panel |
Power Options - Create a Power Plan | control /name Microsoft.PowerOptions /page pageCreateNewPlan | Control Panel |
Power Options - Edit Plan Settings | control /name Microsoft.PowerOptions /page pagePlanSettings | Control Panel |
Power Options - System Settings | control /name Microsoft.PowerOptions /page pageGlobalSettings | Control Panel |
Presentation Settings | %windir%system32PresentationSettings.exe | Control Panel |
Print Management | printmanagement.msc | MMC / MSC |
Programs and Features | control /name Microsoft.ProgramsAndFeatures | Control Panel |
Programs and Features | control appwiz.cpl | Control Panel |
Purges the DNS Resolver cache | ipconfig /flushdns | Command Prompt |
Quick Link Menu | WIN + X | Keyboard (Windows) |
Recovery | control /name Microsoft.Recovery | Control Panel |
Refreshes all DHCP leases and re-registers DNS names | ipconfig /registerdns | Command Prompt |
Region (Administrative tab) | control /name Microsoft.RegionalAndLanguageOptions /page /p:"Administrative" | Control Panel |
Region (Formats tab) | control /name Microsoft.RegionAndLanguage | Control Panel |
Region (Formats tab) | control /name Microsoft.RegionalAndLanguageOptions /page /p:"Formats" | Control Panel |
Region (Formats tab) | control intl.cpl | Control Panel |
Region (Formats tab) | control international | Control Panel |
Region (Location tab) | control /name Microsoft.RegionalAndLanguageOptions /page /p:"Location" | Control Panel |
RemoteApp and Desktop Connections | control /name Microsoft.RemoteAppAndDesktopConnections | Control Panel |
Run / Execute a program | WIN + R | Keyboard (Windows) |
Scanners and Cameras | control /name Microsoft.ScannersAndCameras | Control Panel |
Scanners and Cameras | control sticpl.cpl | Control Panel |
SCCM Configuration Manager | control smscfgrc | Control Panel |
Screen Saver Settings | rundll32.exe shell32.dll,Control_RunDLL desk.cpl,,1 | Control Panel |
Screenshot | WIN + PrtScr | Keyboard (Windows) |
Search | WIN + S | Keyboard (Windows) |
Security and Maintenance | control /name Microsoft.ActionCenter | Control Panel |
Security and Maintenance | control wscui.cpl | Control Panel |
Services Manager | services.msc | MMC / MSC |
Set Associations | control /name Microsoft.DefaultPrograms /page pageFileAssoc | Control Panel |
Set Default Programs | control /name Microsoft.DefaultPrograms /page pageDefaultProgram | Control Panel |
Set Program Access and Computer Defaults | rundll32.exe shell32.dll,Control_RunDLL appwiz.cpl,,3 | Control Panel |
Sound (Communications tab) | %windir%System32rundll32.exe shell32.dll,Control_RunDLL mmsys.cpl,,3 | Control Panel |
Sound (Playback tab) | control /name Microsoft.Sound | Control Panel |
Sound (Playback tab) | control mmsys.cpl | Control Panel |
Sound (Playback tab) | %windir%System32rundll32.exe shell32.dll,Control_RunDLL mmsys.cpl,,0 | Control Panel |
Sound (Recording tab) | %windir%System32rundll32.exe shell32.dll,Control_RunDLL mmsys.cpl,,1 | Control Panel |
Sound (Sounds tab) | %windir%System32rundll32.exe shell32.dll,Control_RunDLL mmsys.cpl,,2 | Control Panel |
Speech Recognition | control /name Microsoft.SpeechRecognition | Control Panel |
Storage Spaces | control /name Microsoft.StorageSpaces | Control Panel |
Switch between virtual desktops | WIN + CTRL + Arrow Left or Right | Keyboard (Windows) |
Sync Center | control /name Microsoft.SyncCenter | Control Panel |
System | control /name Microsoft.System | Control Panel |
System | control sysdm.cpl | Control Panel |
System Icons | explorer shell:::{05d7b0f4-2121-4eff-bf6b-ed3f69b894d9} SystemIcons,,0 | Control Panel |
System Properties (Advanced) | %windir%System32SystemPropertiesAdvanced.exe | Control Panel |
System Properties (Computer Name) | %windir%System32SystemPropertiesComputerName.exe | Control Panel |
System Properties (Hardware) | %windir%System32SystemPropertiesHardware.exe | Control Panel |
System Properties (Remote) | %windir%System32SystemPropertiesRemote.exe | Control Panel |
System Properties (System Protection) | %windir%System32SystemPropertiesProtection.exe | Control Panel |
Tablet PC Settings | control /name Microsoft.TabletPCSettings | Control Panel |
Task Sheduler | taskschd.msc | MMC / MSC |
Task View | WIN + TAB | Keyboard (Windows) |
Text to Speech | control /name Microsoft.TextToSpeech | Control Panel |
TPM Manager | tpm.msc | MMC / MSC |
Troubleshooting | explorer shell:::{26EE0668-A00A-44D7-9371-BEB064C98683}::{C58C4893-3BE0-4B45-ABB5-A63E4B8C8651} | Control Panel |
User Accounts | control /name Microsoft.UserAccounts | Control Panel |
User Accounts | control userpasswords | Control Panel |
User Accounts (netplwiz) | netplwiz | Control Panel |
User Accounts (netplwiz) | control userpasswords2 | Control Panel |
Windows 10 Settings | WIN + I | Keyboard (Windows) |
Windows Defender Firewall | control /name Microsoft.WindowsFirewall | Control Panel |
Windows Defender Firewall | control firewall.cpl | Control Panel |
Windows Defender Firewall Allowed apps | explorer shell:::{4026492F-2F69-46B8-B9BF-5654FC07E423} -Microsoft.WindowsFirewallpageConfigureApps | Control Panel |
Windows Defender Firewall with Advanced Security | %WinDir%System32WF.msc | MMC / MSC |
Windows Features | %windir%System32OptionalFeatures.exe | Control Panel |
Windows Features | rundll32.exe shell32.dll,Control_RunDLL appwiz.cpl,,2 | Control Panel |
Windows Mobility Center | control /name Microsoft.MobilityCenter | Control Panel |
Work Folders | %windir%System32WorkFolders.exe | Control Panel |
The registry path HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Power\PowerSettings\4f971e89-eebd-4455-a8de-9e59040e7347\833a6b62-dfa4-46d1-82f8-e09e34d029d6 refers to a specific setting within Windows' power management system. This particular path controls the "Minimum power saving" setting within the "Processor power management" category for the "Active" power plan.
To elaborate, this registry entry allows users to configure the minimum performance state of the processor when the system is actively in use. Modifying this setting can impact the system's responsiveness and power consumption.
Under the registry key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Power\PowerSettings\7516b95f-f776-4464-8c53-06167f40cc99, you can find settings related to the "Console lock display off timeout" feature in Windows. Specifically, this key contains settings that control how long the screen remains on after the console (lock screen) is active before automatically turning off.
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Power\PowerSettings\7516b95f-f776-4464-8c53-06167f40cc99\A9CEB8DA-CD46-44FB-A98B-02AF69DE4623]
"Attributes"=dword:00000000
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Power\PowerSettings\7516b95f-f776-4464-8c53-06167f40cc99\FBD9AA66-9553-4097-BA44-ED6E9D65EAB8]
"Attributes"=dword:00000000
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Power\PowerSettings\7516b95f-f776-4464-8c53-06167f40cc99\90959d22-d6a1-49b9-af93-bce885ad335b]
"Attributes"=dword:00000000
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Power\PowerSettings\7516b95f-f776-4464-8c53-06167f40cc99\EED904DF-B142-4183-B10B-5A1197A37864]
"Attributes"=dword:00000000
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Power\PowerSettings\7516b95f-f776-4464-8c53-06167f40cc99\82DBCF2D-CD67-40C5-BFDC-9F1A5CCD4663]
"Attributes"=dword:00000000
Display More
In some Windows 11 Installations the "RunAs" option is missing within the start menu - with this little registry tweak here you can activate this again.
Don't forget to reboot after adding/changing this.
The registry key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Power\PowerSettings\54533251-82be-4824-96c1-47b60b740d00 in Windows is related to Processor power management settings. Specifically, it contains settings that control various aspects of processor performance and power consumption, such as Processor performance boost mode, minimum and maximum processor states, and processor performance decrease threshold.
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Power\PowerSettings\54533251-82be-4824-96c1-47b60b740d00\06cadf0e-64ed-448a-8927-ce7bf90eb35d]
"Attributes"=dword:00000000
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Power\PowerSettings\54533251-82be-4824-96c1-47b60b740d00\06cadf0e-64ed-448a-8927-ce7bf90eb35e]
"Attributes"=dword:00000000
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Power\PowerSettings\54533251-82be-4824-96c1-47b60b740d00\0cc5b647-c1df-4637-891a-dec35c318583]
"Attributes"=dword:00000000
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Power\PowerSettings\54533251-82be-4824-96c1-47b60b740d00\0cc5b647-c1df-4637-891a-dec35c318584]
"Attributes"=dword:00000000
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Power\PowerSettings\54533251-82be-4824-96c1-47b60b740d00\12a0ab44-fe28-4fa9-b3bd-4b64f44960a6]
"Attributes"=dword:00000000
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Power\PowerSettings\54533251-82be-4824-96c1-47b60b740d00\12a0ab44-fe28-4fa9-b3bd-4b64f44960a7]
"Attributes"=dword:00000000
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Power\PowerSettings\54533251-82be-4824-96c1-47b60b740d00\1facfc65-a930-4bc5-9f38-504ec097bbc0]
"Attributes"=dword:00000000
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Power\PowerSettings\54533251-82be-4824-96c1-47b60b740d00\2430ab6f-a520-44a2-9601-f7f23b5134b1]
"Attributes"=dword:00000000
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Power\PowerSettings\54533251-82be-4824-96c1-47b60b740d00\2ddd5a84-5a71-437e-912a-db0b8c788732]
"Attributes"=dword:00000000
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Power\PowerSettings\54533251-82be-4824-96c1-47b60b740d00\36687f9e-e3a5-4dbf-b1dc-15eb381c6863]
"Attributes"=dword:00000000
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Power\PowerSettings\54533251-82be-4824-96c1-47b60b740d00\36687f9e-e3a5-4dbf-b1dc-15eb381c6864]
"Attributes"=dword:00000000
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Power\PowerSettings\54533251-82be-4824-96c1-47b60b740d00\3b04d4fd-1cc7-4f23-ab1c-d1337819c4bb]
"Attributes"=dword:00000000
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Power\PowerSettings\54533251-82be-4824-96c1-47b60b740d00\4009efa7-e72d-4cba-9edf-91084ea8cbc3]
"Attributes"=dword:00000000
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Power\PowerSettings\54533251-82be-4824-96c1-47b60b740d00\40fbefc7-2e9d-4d25-a185-0cfd8574bac6]
"Attributes"=dword:00000000
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Power\PowerSettings\54533251-82be-4824-96c1-47b60b740d00\40fbefc7-2e9d-4d25-a185-0cfd8574bac7]
"Attributes"=dword:00000000
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Power\PowerSettings\54533251-82be-4824-96c1-47b60b740d00\447235c7-6a8d-4cc0-8e24-9eaf70b96e2b]
"Attributes"=dword:00000000
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Power\PowerSettings\54533251-82be-4824-96c1-47b60b740d00\447235c7-6a8d-4cc0-8e24-9eaf70b96e2c]
"Attributes"=dword:00000000
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Power\PowerSettings\54533251-82be-4824-96c1-47b60b740d00\45bcc044-d885-43e2-8605-ee0ec6e96b59]
"Attributes"=dword:00000000
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Power\PowerSettings\54533251-82be-4824-96c1-47b60b740d00\465e1f50-b610-473a-ab58-00d1077dc419]
"Attributes"=dword:00000000
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Power\PowerSettings\54533251-82be-4824-96c1-47b60b740d00\4b92d758-5a24-4851-a470-815d78aee119]
"Attributes"=dword:00000000
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Power\PowerSettings\54533251-82be-4824-96c1-47b60b740d00\4bdaf4e9-d103-46d7-a5f0-6280121616ef]
"Attributes"=dword:00000000
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Power\PowerSettings\54533251-82be-4824-96c1-47b60b740d00\4d2b0152-7d5c-498b-88e2-34345392a2c5]
"Attributes"=dword:00000000
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Power\PowerSettings\54533251-82be-4824-96c1-47b60b740d00\4e4450b3-6179-4e91-b8f1-5bb9938f81a1]
"Attributes"=dword:00000000
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Power\PowerSettings\54533251-82be-4824-96c1-47b60b740d00\5d76a2ca-e8c0-402f-a133-2158492d58ad]
"Attributes"=dword:00000000
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Power\PowerSettings\54533251-82be-4824-96c1-47b60b740d00\616cdaa5-695e-4545-97ad-97dc2d1bdd88]
"Attributes"=dword:00000000
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Power\PowerSettings\54533251-82be-4824-96c1-47b60b740d00\616cdaa5-695e-4545-97ad-97dc2d1bdd89]
"Attributes"=dword:00000000
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Power\PowerSettings\54533251-82be-4824-96c1-47b60b740d00\619b7505-003b-4e82-b7a6-4dd29c300971]
"Attributes"=dword:00000000
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Power\PowerSettings\54533251-82be-4824-96c1-47b60b740d00\619b7505-003b-4e82-b7a6-4dd29c300972]
"Attributes"=dword:00000000
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Power\PowerSettings\54533251-82be-4824-96c1-47b60b740d00\6c2993b0-8f48-481f-bcc6-00dd2742aa06]
"Attributes"=dword:00000000
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Power\PowerSettings\54533251-82be-4824-96c1-47b60b740d00\71021b41-c749-4d21-be74-a00f335d582b]
"Attributes"=dword:00000000
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Power\PowerSettings\54533251-82be-4824-96c1-47b60b740d00\75b0ae3f-bce0-45a7-8c89-c9611c25e100]
"Attributes"=dword:00000000
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Power\PowerSettings\54533251-82be-4824-96c1-47b60b740d00\75b0ae3f-bce0-45a7-8c89-c9611c25e101]
"Attributes"=dword:00000000
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Power\PowerSettings\54533251-82be-4824-96c1-47b60b740d00\7b224883-b3cc-4d79-819f-8374152cbe7c]
"Attributes"=dword:00000000
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Power\PowerSettings\54533251-82be-4824-96c1-47b60b740d00\7d24baa7-0b84-480f-840c-1b0743c00f5f]
"Attributes"=dword:00000000
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Power\PowerSettings\54533251-82be-4824-96c1-47b60b740d00\7d24baa7-0b84-480f-840c-1b0743c00f60]
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Power\PowerSettings\54533251-82be-4824-96c1-47b60b740d00\7f2492b6-60b1-45e5-ae55-773f8cd5caec]
"Attributes"=dword:00000000
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Power\PowerSettings\54533251-82be-4824-96c1-47b60b740d00\7f2f5cfa-f10c-4823-b5e1-e93ae85f46b5]
"Attributes"=dword:00000000
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Power\PowerSettings\54533251-82be-4824-96c1-47b60b740d00\893dee8e-2bef-41e0-89c6-b55d0929964d]
"Attributes"=dword:00000000
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Power\PowerSettings\54533251-82be-4824-96c1-47b60b740d00\8baa4a8a-14c6-4451-8e8b-14bdbd197537]
"Attributes"=dword:00000000
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Power\PowerSettings\54533251-82be-4824-96c1-47b60b740d00\93b8b6dc-0698-4d1c-9ee4-0644e900c85d]
"Attributes"=dword:00000000
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Power\PowerSettings\54533251-82be-4824-96c1-47b60b740d00\943c8cb6-6f93-4227-ad87-e9a3feec08d1]
"Attributes"=dword:00000000
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Power\PowerSettings\54533251-82be-4824-96c1-47b60b740d00\97cfac41-2217-47eb-992d-618b1977c907]
"Attributes"=dword:00000000
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Power\PowerSettings\54533251-82be-4824-96c1-47b60b740d00\984cf492-3bed-4488-a8f9-4286c97bf5aa]
"Attributes"=dword:00000000
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Power\PowerSettings\54533251-82be-4824-96c1-47b60b740d00\984cf492-3bed-4488-a8f9-4286c97bf5ab]
"Attributes"=dword:00000000
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Power\PowerSettings\54533251-82be-4824-96c1-47b60b740d00\9943e905-9a30-4ec1-9b99-44dd3b76f7a2]
"Attributes"=dword:00000000
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Power\PowerSettings\54533251-82be-4824-96c1-47b60b740d00\b000397d-9b0b-483d-98c9-692a6060cfbf]
"Attributes"=dword:00000000
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Power\PowerSettings\54533251-82be-4824-96c1-47b60b740d00\bae08b81-2d5e-4688-ad6a-13243356654b]
"Attributes"=dword:00000000
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Power\PowerSettings\54533251-82be-4824-96c1-47b60b740d00\bc5038f7-23e0-4960-96da-33abaf5935ed]
"Attributes"=dword:00000000
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Power\PowerSettings\54533251-82be-4824-96c1-47b60b740d00\be337238-0d82-4146-a960-4f3749d470c7]
"Attributes"=dword:00000000
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Power\PowerSettings\54533251-82be-4824-96c1-47b60b740d00\c4581c31-89ab-4597-8e2b-9c9cab440e6b]
"Attributes"=dword:00000000
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Power\PowerSettings\54533251-82be-4824-96c1-47b60b740d00\c7be0679-2817-4d69-9d02-519a537ed0c6]
"Attributes"=dword:00000000
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Power\PowerSettings\54533251-82be-4824-96c1-47b60b740d00\cfeda3d0-7697-4566-a922-a9086cd49dfa]
"Attributes"=dword:00000000
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Power\PowerSettings\54533251-82be-4824-96c1-47b60b740d00\d8edeb9b-95cf-4f95-a73c-b061973693c8]
"Attributes"=dword:00000000
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Power\PowerSettings\54533251-82be-4824-96c1-47b60b740d00\d8edeb9b-95cf-4f95-a73c-b061973693c9]
"Attributes"=dword:00000000
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Power\PowerSettings\54533251-82be-4824-96c1-47b60b740d00\dfd10d17-d5eb-45dd-877a-9a34ddd15c82]
"Attributes"=dword:00000000
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Power\PowerSettings\54533251-82be-4824-96c1-47b60b740d00\e0007330-f589-42ed-a401-5ddb10e785d3]
"Attributes"=dword:00000000
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Power\PowerSettings\54533251-82be-4824-96c1-47b60b740d00\ea062031-0e34-4ff1-9b6d-eb1059334028]
"Attributes"=dword:00000000
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Power\PowerSettings\54533251-82be-4824-96c1-47b60b740d00\ea062031-0e34-4ff1-9b6d-eb1059334028\DefaultPowerSchemeValues]
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Power\PowerSettings\54533251-82be-4824-96c1-47b60b740d00\ea062031-0e34-4ff1-9b6d-eb1059334029]
"Attributes"=dword:00000000
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Power\PowerSettings\54533251-82be-4824-96c1-47b60b740d00\f735a673-2066-4f80-a0c5-ddee0cf1bf5d]
"Attributes"=dword:00000000
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Power\PowerSettings\54533251-82be-4824-96c1-47b60b740d00\f8861c27-95e7-475c-865b-13c0cb3f9d6b]
"Attributes"=dword:00000000
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Power\PowerSettings\54533251-82be-4824-96c1-47b60b740d00\fddc842b-8364-4edc-94cf-c17f60de1c80]
"Attributes"=dword:00000000
Display More
Sometimes you are admin and have access to a remote machine by Windows Explorer etc but you need RDP to be enabled.
For that you need to connect with regedit.exe remotly to the other machine (maybe the Remote Registry is not running and you need to run it manually) and change a value within the registry:
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server] "fDenyTSConnections"=dword:00000000
With that key you Enable Remote Desktop connections (by default is has 1 as value and you need to set it to 0)
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp] "UserAuthentication"=dword:00000001
With that key you Enable Network Level Authentication (normally it is already set to 1)
You simply need to set the InitialKeyboardIndicators value to 2
Windows Registry Editor Version 5.00
[HKEY_USERS\.DEFAULT\Control Panel\Keyboard]
"InitialKeyboardIndicators"="2"
Here are all possible values:
The following activates the Powermanagement settings for the display lock screen.
By default this setting is hidden and so need to get activate with a small registry change 🙂
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Power\PowerSettings\7516b95f-f776-4464-8c53-06167f40cc99\8EC4B3A5-6868-48c2-BE75-4F3044BE88A7]
"Attributes"=dword:00000002
"Description"=hex(2):40,00,25,00,53,00,79,00,73,00,74,00,65,00,6d,00,52,00,6f,\
00,6f,00,74,00,25,00,5c,00,73,00,79,00,73,00,74,00,65,00,6d,00,33,00,32,00,\
5c,00,70,00,6f,00,77,00,72,00,70,00,72,00,6f,00,66,00,2e,00,64,00,6c,00,6c,\
00,2c,00,2d,00,34,00,31,00,34,00,2c,00,53,00,70,00,65,00,63,00,69,00,66,00,\
69,00,65,00,73,00,20,00,43,00,6f,00,6e,00,73,00,6f,00,6c,00,65,00,20,00,6c,\
00,6f,00,63,00,6b,00,20,00,64,00,69,00,73,00,70,00,6c,00,61,00,79,00,20,00,\
6f,00,66,00,66,00,20,00,74,00,69,00,6d,00,65,00,6f,00,75,00,74,00,00,00
"FriendlyName"=hex(2):40,00,25,00,53,00,79,00,73,00,74,00,65,00,6d,00,52,00,6f,\
00,6f,00,74,00,25,00,5c,00,73,00,79,00,73,00,74,00,65,00,6d,00,33,00,32,00,\
5c,00,70,00,6f,00,77,00,72,00,70,00,72,00,6f,00,66,00,2e,00,64,00,6c,00,6c,\
00,2c,00,2d,00,34,00,31,00,35,00,2c,00,43,00,6f,00,6e,00,73,00,6f,00,6c,00,\
65,00,20,00,6c,00,6f,00,63,00,6b,00,20,00,64,00,69,00,73,00,70,00,6c,00,61,\
00,79,00,20,00,6f,00,66,00,66,00,20,00,74,00,69,00,6d,00,65,00,6f,00,75,00,\
74,00,00,00
"ValueIncrement"=dword:00000001
"ValueMax"=dword:ffffffff
"ValueMin"=dword:00000000
"ValueUnits"=hex(2):40,00,25,00,53,00,79,00,73,00,74,00,65,00,6d,00,52,00,6f,\
00,6f,00,74,00,25,00,5c,00,73,00,79,00,73,00,74,00,65,00,6d,00,33,00,32,00,\
5c,00,70,00,6f,00,77,00,72,00,70,00,72,00,6f,00,66,00,2e,00,64,00,6c,00,6c,\
00,2c,00,2d,00,38,00,30,00,2c,00,53,00,65,00,63,00,6f,00,6e,00,64,00,73,00,\
00,00
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Power\PowerSettings\7516b95f-f776-4464-8c53-06167f40cc99\8EC4B3A5-6868-48c2-BE75-4F3044BE88A7\DefaultPowerSchemeValues]
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Power\PowerSettings\7516b95f-f776-4464-8c53-06167f40cc99\8EC4B3A5-6868-48c2-BE75-4F3044BE88A7\DefaultPowerSchemeValues\381b4222-f694-41f0-9685-ff5bb260df2e]
"AcSettingIndex"=dword:0000003c
"DcSettingIndex"=dword:0000003c
"ProvAcSettingIndex"=dword:0000001e
"ProvDcSettingIndex"=dword:0000001e
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Power\PowerSettings\7516b95f-f776-4464-8c53-06167f40cc99\8EC4B3A5-6868-48c2-BE75-4F3044BE88A7\DefaultPowerSchemeValues\8c5e7fda-e8bf-4a96-9a85-a6e23a8c635c]
"AcSettingIndex"=dword:0000003c
"DcSettingIndex"=dword:0000003c
"ProvAcSettingIndex"=dword:0000001e
"ProvDcSettingIndex"=dword:0000001e
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Power\PowerSettings\7516b95f-f776-4464-8c53-06167f40cc99\8EC4B3A5-6868-48c2-BE75-4F3044BE88A7\DefaultPowerSchemeValues\a1841308-3541-4fab-bc81-f71556f20b4a]
"AcSettingIndex"=dword:0000003c
"DcSettingIndex"=dword:0000003c
"ProvAcSettingIndex"=dword:0000001e
"ProvDcSettingIndex"=dword:0000001e
Display More
As already mentioned under the PowerShell Forum no one wants this shit and you can disable it also by registry keys:
Since the Bing search is in the start menu I always have issue searching and finding what I'm looking for as he always also searches the web.
So here is a little registry tweak to simply disable this search function.
Windows Registry Editor Version 5.00
[HKEY_LOCAL_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search]
"BingSearchEnabled"=dword:00000000
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Search]
"BingSearchEnabled"=dword:00000000
Pay attention that you can have for the current user under HKEY_LOCAL_USER or system wide under HKEY_LOCAL_MACHINE
A small PowerShell script to check the uptime of a computer over the network.
$ComputerName = "MACHINENAME"
$userSystem = Get-WmiObject win32_operatingsystem -ComputerName $ComputerName -ErrorAction SilentlyContinue
if ($userSystem.LastBootUpTime) {
$sysuptime= (Get-Date) - $userSystem.ConvertToDateTime($userSystem.LastBootUpTime) Write-Output ("Last boot: " + $userSystem.ConvertToDateTime($userSystem.LastBootUpTime) ) Write-Output ("Uptime : " + $sysuptime.Days + " Days " + $sysuptime.Hours + " Hours " + $sysuptime.Minutes + " Minutes" )
}
else {
Write-Warning "Unable to connect to $computername"
}
Sometimes it is useful to get the files list of a folder into an Excel Sheet.
This is very simple to realize thanks to Powershell.
You just need to import a module and enter the following:
Install-Module -Name ImportExcel
(Get-ChildItem C:\FolderName -file).BaseName | Export-excel folderlist.xlsx
Of course, you can name your file how you want.
Windows Firewall - Remote Access through MMC
Enable rule to let the remote pc in:
Enable the rule in a domain environment:
Get-NetFirewallProfile -CimSession Win10Pro-VM1-L1 -Name Domain | Get-NetFirewallRule | ? DisplayGroup -eq Windows-Firewallremoteverwaltung | Enable-NetFirewallRule
Pay attention that this codes needs to be used in an elevated powershell console.
You can import easily a CSV file in your SharePoint List. If you have a file with special characters like french ones (éàè) you should save your file as CSV UTF-8 format.
You have to first load a module in your PowerShell Session (which you open as admin as usual)
If you connect to your Sharepoint you can test it with (after Connect-PnPOnline)
Get-PnPlist
Example for Connect-PnPOnline
Connect-PnPOnline -Url "https://yourURL.tld" -Credentials (Get-Credential)
For the correct field name from sharepoint you have to edit the column and than look in the URL how it is written
https://xy.com/site01/_layouts/15/FldEdit.aspx?List=%7BDC358694-4BDB-4369-BA40-F8CB09535F10%7D&Field=Full_x0020_Name
In the URL you will find Field= at the end of it and what is written behind is the field name you have to take in the script (Here in the example: Full_x0020_Name)
Now you can execute the full script (see below)
$credentials = Get-Credential -Message "Please Enter SharePoint Online credentials"
$Site="https://xy.com/site01/"
$TestData = Import-CSV "C:\scripts\testutf8.csv"
Connect-PnPOnline -Url $Site -Credentials $credentials
foreach ($Record in $TestData){
Add-PnPListItem -List "Name of the list" -Values @{
"Title"= $Record.'Shortcut';
"Full_x0020_Name"= $Record.'Full Name';
}}
The Records are defined with SharePointColumnName = $Record.'ColumnNameInCSVFile'
In different cases it is more convenient to read out the BIOS settings within Windows or even modify them.
Depending on the brand of your machine you can find a complete handbook to achieve that with PowerShell.
Here I give you the example for Lenovo and HP - Just examples that may work for your machine or not - check the manual corresponding do your machine!
Tested on Lenovo T14 models.
# List all Settings
gwmi -class Lenovo_BiosSetting -namespace root\wmi | ForEach-Object {if ($_.CurrentSetting -ne "") {Write-Host $_.CurrentSetting.replace(","," = ")}}
# Show a partical value
gwmi -class Lenovo_BiosSetting -namespace root\wmi | Where-Object {$_.CurrentSetting.split(",",[StringSplitOptions]::RemoveEmptyEntries) -eq "MACAddressPassThrough"} | Format-List CurrentSetting
# Full BIOS Settings as table
gwmi -class Lenovo_BiosSetting -namespace root\wmi | Out-GridView
# Set a BIOS setting
# Use the following command as a template to set the value of a setting.
# This is a two-step process: set and then save.
# Note: The setting string is case sensitive and should be in the format "<item>,<value>".
(gwmi -class Lenovo_SetBiosSetting –namespace root\wmi).SetBiosSetting("WakeOnLAN,Disable")
(gwmi -class Lenovo_SaveBiosSettings -namespace root\wmi).SaveBiosSettings()
# Set a BIOS setting when a supervisor password exists
# Use the following command as a template to set the value of a setting
# when a supervisor password exists.
# This is a two-step process: set and then save.
# Note: The setting string is case sensitive and should be in the format
# "<item>,<value>,<password + encoding>".
(gwmi -class Lenovo_SetBiosSetting –namespace root\wmi).SetBiosSetting("VTdFeature,Enable,yourbiospassword,ascii,us")
(gwmi -class Lenovo_SaveBiosSettings -namespace root\wmi).SaveBiosSettings("yourbiospassword,ascii,us")
# Examples:
(gwmi -class Lenovo_SetBiosSetting -namespace root\wmi).SetBiosSetting("VirtualizationTechnology,Disable,yourbiospassword,ascii,us")
(gwmi -class Lenovo_SaveBiosSettings -namespace root\wmi).SaveBiosSettings("yourbiospassword,ascii,us")
Display More
Tested on HP 840 models.
# Get Settings
Get-WmiObject -Namespace root/hp/InstrumentedBIOS -Class HP_BIOSEnumeration
# Get Settings but in txt file
Get-WmiObject -Namespace root/hp/InstrumentedBIOS -Class HP_BIOSEnumeration | Out-File -FilePath c:\HPBiosSettings\HPBiosSettings.txt
# Save HP Settings in a variable
$HPBiosSettings = Get-WmiObject -Namespace root/hp/InstrumentedBIOS -Class HP_BIOSSetting
# Example for changing a value
$Interface.SetBIOSSetting("Reuse Embedded LAN Address","Enable")
# Example
# Put all values in a variable
$SettingList = Get-WmiObject -Namespace root\HP\InstrumentedBIOS -Class HP_BIOSEnumeration
# Output just the name and value from the variable set before
$SettingList | Select-Object Name,Value
# Output just the name and value for "Reuse Embedded LAN Address"
($SettingList | Where-Object Name -eq "Reuse Embedded LAN Address") | select-object Name,Value
# Example with BIOS Password
$Password = "<utf-16/>"+"yourbiospassword"
$BIOS = gwmi -class hp_biossettinginterface -Namespace "root\hp\instrumentedbios"
$result = $BIOS.SetBIOSSetting("NumLock on at boot", "Enable", "$Password")
Display More
At the moment there is a bug running through Windows 11 where the search doesn't work anymore.
Here is a small script that you can start as admin to reset your search and put it into a working state again.
The comments are in french!
# Redémarre les processus liés à la recherche Windows
Write-Host "Redémarrage du processus SearchHost.exe..."
Get-Process -Name "SearchHost" -ErrorAction SilentlyContinue | Stop-Process -Force
# Redémarre l'explorateur Windows
Write-Host "Redémarrage de l'Explorateur Windows..."
Stop-Process -Name explorer -Force
Start-Process explorer
# Réenregistre les composants liés à la recherche
Write-Host "Réenregistrement du composant de recherche..."
Get-AppxPackage -AllUsers MicrosoftWindows.Client.CBS | foreach {Add-AppxPackage -DisableDevelopmentMode -Register "$($_.InstallLocation)\AppXManifest.xml"}
# Vérifie l'état du service Windows Search
Write-Host "Vérification de l'état du service Windows Search..."
$searchService = Get-Service -Name WSearch -ErrorAction SilentlyContinue
if ($searchService.Status -ne 'Running') {
Write-Host " Démarrage du service Windows Search..."
Start-Service -Name WSearch
} else {
Write-Host " Le service Windows Search est déjà en cours d'exécution."
}
Write-Host " Script terminé. Essayez de rouvrir la recherche dans la barre des tâches."
Display More
As this function is now live and no-one wants this shit here is a way to disable it again:
$RecallEnabled = Dism /online /Get-FeatureInfo /FeatureName:Recall | findstr /B /C:"State"
If ($RecallEnabled -Match 'State : Enabled') {
DISM /Online /Disable-Feature /Featurename:Recall
} else {
Write-Host "Recall Disabled"
}
Display More
Or alternatively simply this here:
Den Key erstellt Ihr euch über SSH mit folgendem Befehl
Achtung: Domainname natürlich mit eurem ersetzen!
ddns-confgen -a hmac-sha512 -z Domainname
//
// named.conf
//
// Provided by Red Hat bind package to configure the ISC BIND named(8) DNS
// server as a caching only nameserver (as a localhost DNS resolver only).
//
// See /usr/share/doc/bind*/sample/ for example named configuration files.
//
options {
listen-on port 53 {
any;
};
// listen-on-v6 port 53 { ::1; };
// filter-aaaa-on-v4 yes;
directory "/var/named";
dump-file "/var/named/data/cache_dump.db";
statistics-file "/var/named/data/named_stats.txt";
memstatistics-file "/var/named/data/named_mem_stats.txt";
secroots-file "/var/named/data/named.secroots";
recursing-file "/var/named/data/named.recursing";
allow-query {
any;
};
allow-transfer {
EDITED;
};
notify yes;
also-notify {
EDITED;
};
/*
- If you are building an AUTHORITATIVE DNS server, do NOT enable recursion.
- If you are building a RECURSIVE (caching) DNS server, you need to enable
recursion.
- If your recursive DNS server has a public IP address, you MUST enable access
control to limit queries to your legitimate users. Failing to do so will
cause your server to become part of large scale DNS amplification
attacks. Implementing BCP38 within your network would greatly
reduce such attack surface
*/
recursion yes;
dnssec-validation auto;
managed-keys-directory "/var/named/dynamic";
geoip-directory "/usr/share/GeoIP";
pid-file "/run/named/named.pid";
session-keyfile "/run/named/session.key";
/* https://fedoraproject.org/wiki/Changes/CryptoPolicy */
include "/etc/crypto-policies/back-ends/bind.config";
forwarders {
EDITED;
8.8.8.8;
8.8.4.4;
};
// dnssec-enable yes;
// dnssec-enable yes;
};
logging {
channel default_debug {
file "/var/log/named.run";
};
};
zone "." IN {
type hint;
file "named.ca";
};
include "/etc/named.rfc1912.zones";
include "/etc/named.root.key";
key rndc-key {
algorithm hmac-sha256;
secret "EDITED";
};
key "ddns-key.dyndns.datateam.center" {
algorithm hmac-sha512;
secret "Euer generierter Key";
};
controls {
inet 127.0.0.1 port 953 allow { 127.0.0.1; } keys { rndc-key; };
};
server EDITED {
};
zone "datateam.center" {
type master;
file "/var/named/datateam.center.hosts";
also-notify {
EDITED;
};
notify yes;
update-policy {
grant ddns-key.dyndns.datateam.center zonesub ANY;
};
allow-transfer {
127.0.0.1;
EDITED;
};
};
Display More
I edited some things and replaced them with EDITED - so be careful
What is actually just added is the following:
key "ddns-key.dyndns.datateam.center" {
algorithm hmac-sha512;
secret "Euer generierter Key";
};
Unter der Zone kommt folgendes:
update-policy {
grant ddns-key.dyndns.datateam.center zonesub ANY;
};
You will receive exactly what is entered when you generate your key.
key "ddns-key.dyndns.datateam.center" {
algorithm hmac-sha512;
secret "Euer generierter Key";
};
<#
Get full info:
$providerinfo = Invoke-RestMethod http://ipinfo.io/json
#>
Param (
[String]$KeyPath = "C:\dyndns\dyndns.datateam.center.key",
[String]$NSScriptPath = "c:\dyndns\nsupdate.txt",
[String]$NSUpdatePath = "C:\dyndns"
)
begin {
#Gather status of system IP Addresses, DNS Servers, and domains
$myip = (Invoke-WebRequest -uri "https://api.ipify.org/").Content
$servername = "ns1.datateam.center"
$dnszone = "datateam.center"
$hostname = "holodeck.$dnszone"
}
process {
$script = "update delete $hostname
update add $hostname. 60 A $myip
"
}
end {
$script | Out-File -FilePath $NSScriptPath -Encoding "ascii" -Force
Start-Process -FilePath (Join-Path -Path $NSUpdatePath -ChildPath "nsupdate.exe") -ArgumentList "-d -k `"$KeyPath`" `"$NSScriptPath`"" -Wait -NoNewWindow -RedirectStandardError "c:\dyndns\nsstderr.log" -RedirectStandardOutput "c:\dyndns\nsstdout.log" -WorkingDirectory $NSUpdatePath | Out-Null
}
Display More
Here I created the dyndns directory on C: on a Windows computer.
Below I copied the DLL files and nsupdate.exe from the ZIP file from the Bind DNS server.
dyndns.datateam.center.key is the file with the generated key. You can name it whatever you want, you just have to adapt the PowerShell file 🙂