?
Solved

Delete network adapters via dos command

Posted on 2014-10-16
5
Medium Priority
?
211 Views
Last Modified: 2014-10-17
I have about one to two hundred PC’s I need to delate 2 network adapters on.
I can’t use PowerShell because some are XP and server 2003 that may not have PowerShell enabled.

It is the Teredo Tunneling Adapter and the Microsoft ISATAP adapter.  

I was sure I could do this in the command line so I could do a batch file to just run on each using netsh but if so I can’t get the syntax.

Can anyone lend any advice on how I can accomplish this with batch?

Thanks!
0
Comment
Question by:SLPowers
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2
5 Comments
 
LVL 56

Expert Comment

by:McKnife
ID: 40386070
Maybe use devcon.exe
0
 

Author Comment

by:SLPowers
ID: 40386372
Thanks for the suggestion but that would require a install.  I have been told powershell should work on xp and 2003 so i think i will look into that.
0
 
LVL 56

Accepted Solution

by:
McKnife earned 2000 total points
ID: 40386413
It would not require an install. It is a free command line tool by microsoft (a single executable) and can b put on a network share and called from there.
0
 

Author Closing Comment

by:SLPowers
ID: 40386696
McKnife you are a genius.  Worked GREAT!

Thank you!
0
 
LVL 56

Expert Comment

by:McKnife
ID: 40386721
You're welcome
0

Featured Post

Get real performance insights from real users

Key features:
- Total Pages Views and Load times
- Top Pages Viewed and Load Times
- Real Time Site Page Build Performance
- Users’ Browser and Platform Performance
- Geographic User Breakdown
- And more

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

You may have already been in the need to update a whole folder stucture using a script. Robocopy does it well and even provides a list of non-updated files in a log (if asked to). Generally those files that were locked by a user or a process by the …
It’s been over a month into 2017, and there is already a sophisticated Gmail phishing email making it rounds. New techniques and tactics, have given hackers a way to authentically impersonate your contacts.How it Works The attack works by targeti…
Windows 8 came with a dramatically different user interface known as Metro. Notably missing from that interface was a Start button and Start Menu. Microsoft responded to negative user feedback of the Metro interface, bringing back the Start button a…
With the advent of Windows 10, Microsoft is pushing a Get Windows 10 icon into the notification area (system tray) of qualifying computers. There are many reasons for wanting to remove this icon. This two-part Experts Exchange video Micro Tutorial s…

801 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question