Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
?
Solved

Modify Registry keys via Logon Script

Posted on 2014-02-18
2
Medium Priority
?
3,493 Views
Last Modified: 2014-05-27
Im creating a Logon script to change the value of a specific registry key attribute throughout our domain workstations, but in order to make the change, permissions have to be modified on the containing folder itself. Is there a string that can be added to the text file to change access permissions to full prior to attempting to change the key itself?
0
Comment
Question by:paulrausch
2 Comments
 
LVL 70

Accepted Solution

by:
KCTS earned 2000 total points
ID: 39868678
Why use a logon script - use group policy preferences

http://technet.microsoft.com/en-us/library/cc753092.aspx
0
 
LVL 2

Author Closing Comment

by:paulrausch
ID: 40093728
I did this instead. Thanks
0

Featured Post

Free Tool: Site Down Detector

Helpful to verify reports of your own downtime, or to double check a downed website you are trying to access.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Active Directory can easily get cluttered with unused service, user and computer accounts. In this article, I will show you the way I like to implement ADCleanup..
A bad practice commonly found during an account life cycle is to set its password to an initial, insecure password. The Password Reset Tool was developed to make the password reset process easier and more secure.
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles from a Windows Server 2008 domain controller to a Windows Server 2012 domain controlle…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

580 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question