Solved

How to deploy bginfo?

Posted on 2010-08-21
3
986 Views
Last Modified: 2012-05-10
I want to have bginfo on all of our servers. I can install it but then it is not there the next time I rdp in. How can I easily install it so everyone who rdp's in to these servers running Windows Server 2008?
0
Comment
Question by:jamesh1031
3 Comments
 
LVL 14

Expert Comment

by:athomsfere
ID: 33492150
Put it in the all users startup folder is the easiest...

Here is another ways too that a little sleeker.
http://forum.sysinternals.com/bginfo-at-startup_topic2081_post8838.html
0
 

Author Comment

by:jamesh1031
ID: 33492166
Thank you athomsfere.

Please assume I have no idea how or where to do anything. Can you give me detailed step by step instructions?
0
 
LVL 30

Accepted Solution

by:
Brad Howe earned 500 total points
ID: 33492180
Hi,
Just add BGINFO to your starup folder for ALL USERS.  Place the BgInfo.exe and the logon.bgi in the C:\windows\system32\bginfo\ directory

Then open Regedit or Regedt32.
Go to: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion \Run
Make a new String value (REG_SZ) and name it BgInfo.

In the Value Data: C:\windows\system32\bginfo\BgInfo.exe C:\windows\system32\bginfo\logon.bgi /TIMER:0

Cheers,
Hades666
0

Featured Post

Control application downtime with dependency maps

Visualize the interdependencies between application components better with Applications Manager's automated application discovery and dependency mapping feature. Resolve performance issues faster by quickly isolating problematic components.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Select which programs use which internet connection 15 69
Cisco Router help 5 55
Identify bottom to remote server 2 32
Connecting to CISCO 4402 WLC 3 11
Are you one of those front-line IT Service Desk staff fielding calls, replying to emails, all-the-while working to resolve end-user technological nightmares? I am! That's why I have put together this brief overview of tools and techniques I use in o…
The use of stolen credentials is a hot commodity this year allowing threat actors to move laterally within the network in order to avoid breach detection.
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

896 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now