すべての場所について、リモートデスクトップに関する記事のコメントでかなり検索したところ、レジストリの秘密が見つかりました。しかし、少し変更を加える必要がありました。
まず、手動で作成したRemote Desktop Usersグループを削除する必要がありました(別のコメントの推奨により)。(で作成しましたnet localgroup "Remote Desktop Users" /add
。で削除しnet localgroup "Remote Desktop Users" /delete
ます。)
次に、レジストリファイルをSYSTEMアカウントとしてインポートしました。このレジストリスクリプトが実行するすべてのことはわかりません(実際に何が行われているのかについて理解が深まったら更新します)。ソースリンクのデータから行った変更に注意してください。私は、開始引用符と終了引用符の文字を単純な二重引用符に変更し、0
各Aliases00###
エントリにスラッシュと追加文字を追加しました(そのように...\Aliases0000234
なりました...\Aliases\00000234
)。
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SAM\SAM\Domains\Builtin\Aliases\00000243]
"C"=hex:43,02,00,00,00,00,00,00,b0,00,00,00,02,00,01,00,b0,00,00,00,46,00,00,\
00,00,00,00,00,f8,00,00,00,e2,00,00,00,00,00,00,00,dc,01,00,00,00,00,00,00,\
00,00,00,00,01,00,14,80,90,00,00,00,a0,00,00,00,14,00,00,00,44,00,00,00,02,\
00,30,00,02,00,00,00,02,c0,14,00,13,00,05,01,01,01,00,00,00,00,00,01,00,00,\
00,00,02,c0,14,00,ff,ff,1f,00,01,01,00,00,00,00,00,05,07,00,00,00,02,00,4c,\
00,03,00,00,00,00,00,14,00,0c,00,02,00,01,01,00,00,00,00,00,01,00,00,00,00,\
00,00,18,00,1f,00,0f,00,01,02,00,00,00,00,00,05,20,00,00,00,20,02,00,00,00,\
00,18,00,1f,00,0f,00,01,02,00,00,00,00,00,05,20,00,00,00,24,02,00,00,01,02,\
00,00,00,00,00,05,20,00,00,00,20,02,00,00,01,02,00,00,00,00,00,05,20,00,00,\
00,20,02,00,00,41,00,63,00,63,00,65,00,73,00,73,00,20,00,43,00,6f,00,6e,00,\
74,00,72,00,6f,00,6c,00,20,00,41,00,73,00,73,00,69,00,73,00,74,00,61,00,6e,\
00,63,00,65,00,20,00,4f,00,70,00,65,00,72,00,61,00,74,00,6f,00,72,00,73,00,\
00,00,4d,00,65,00,6d,00,62,00,65,00,72,00,73,00,20,00,6f,00,66,00,20,00,74,\
00,68,00,69,00,73,00,20,00,67,00,72,00,6f,00,75,00,70,00,20,00,63,00,61,00,\
6e,00,20,00,72,00,65,00,6d,00,6f,00,74,00,65,00,6c,00,79,00,20,00,71,00,75,\
00,65,00,72,00,79,00,20,00,61,00,75,00,74,00,68,00,6f,00,72,00,69,00,7a,00,\
61,00,74,00,69,00,6f,00,6e,00,20,00,61,00,74,00,74,00,72,00,69,00,62,00,75,\
00,74,00,65,00,73,00,20,00,61,00,6e,00,64,00,20,00,70,00,65,00,72,00,6d,00,\
69,00,73,00,73,00,69,00,6f,00,6e,00,73,00,20,00,66,00,6f,00,72,00,20,00,72,\
00,65,00,73,00,6f,00,75,00,72,00,63,00,65,00,73,00,20,00,6f,00,6e,00,20,00,\
74,00,68,00,69,00,73,00,20,00,63,00,6f,00,6d,00,70,00,75,00,74,00,65,00,72,\
00,2e,00,00,00
[HKEY_LOCAL_MACHINE\SAM\SAM\Domains\Builtin\Aliases\00000227]
"C"=hex:27,02,00,00,00,00,00,00,b0,00,00,00,02,00,01,00,b0,00,00,00,20,00,00,\
00,00,00,00,00,d0,00,00,00,d2,00,00,00,00,00,00,00,a4,01,00,00,00,00,00,00,\
00,00,00,00,01,00,14,80,90,00,00,00,a0,00,00,00,14,00,00,00,44,00,00,00,02,\
00,30,00,02,00,00,00,02,c0,14,00,13,00,05,01,01,01,00,00,00,00,00,01,00,00,\
00,00,02,c0,14,00,ff,ff,1f,00,01,01,00,00,00,00,00,05,07,00,00,00,02,00,4c,\
00,03,00,00,00,00,00,14,00,0c,00,02,00,01,01,00,00,00,00,00,01,00,00,00,00,\
00,00,18,00,1f,00,0f,00,01,02,00,00,00,00,00,05,20,00,00,00,20,02,00,00,00,\
00,18,00,1f,00,0f,00,01,02,00,00,00,00,00,05,20,00,00,00,24,02,00,00,01,02,\
00,00,00,00,00,05,20,00,00,00,20,02,00,00,01,02,00,00,00,00,00,05,20,00,00,\
00,20,02,00,00,42,00,61,00,63,00,6b,00,75,00,70,00,20,00,4f,00,70,00,65,00,\
72,00,61,00,74,00,6f,00,72,00,73,00,42,00,61,00,63,00,6b,00,75,00,70,00,20,\
00,4f,00,70,00,65,00,72,00,61,00,74,00,6f,00,72,00,73,00,20,00,63,00,61,00,\
6e,00,20,00,6f,00,76,00,65,00,72,00,72,00,69,00,64,00,65,00,20,00,73,00,65,\
00,63,00,75,00,72,00,69,00,74,00,79,00,20,00,72,00,65,00,73,00,74,00,72,00,\
69,00,63,00,74,00,69,00,6f,00,6e,00,73,00,20,00,66,00,6f,00,72,00,20,00,74,\
00,68,00,65,00,20,00,73,00,6f,00,6c,00,65,00,20,00,70,00,75,00,72,00,70,00,\
6f,00,73,00,65,00,20,00,6f,00,66,00,20,00,62,00,61,00,63,00,6b,00,69,00,6e,\
00,67,00,20,00,75,00,70,00,20,00,6f,00,72,00,20,00,72,00,65,00,73,00,74,00,\
6f,00,72,00,69,00,6e,00,67,00,20,00,66,00,69,00,6c,00,65,00,73,00,00,00
[HKEY_LOCAL_MACHINE\SAM\SAM\Domains\Builtin\Aliases\00000239]
"C"=hex:39,02,00,00,00,00,00,00,b0,00,00,00,02,00,01,00,b0,00,00,00,2e,00,00,\
00,00,00,00,00,e0,00,00,00,76,00,00,00,00,00,00,00,58,01,00,00,00,00,00,00,\
00,00,00,00,01,00,14,80,90,00,00,00,a0,00,00,00,14,00,00,00,44,00,00,00,02,\
00,30,00,02,00,00,00,02,c0,14,00,13,00,05,01,01,01,00,00,00,00,00,01,00,00,\
00,00,02,c0,14,00,ff,ff,1f,00,01,01,00,00,00,00,00,05,07,00,00,00,02,00,4c,\
00,03,00,00,00,00,00,14,00,0c,00,02,00,01,01,00,00,00,00,00,01,00,00,00,00,\
00,00,18,00,1f,00,0f,00,01,02,00,00,00,00,00,05,20,00,00,00,20,02,00,00,00,\
00,18,00,1f,00,0f,00,01,02,00,00,00,00,00,05,20,00,00,00,24,02,00,00,01,02,\
00,00,00,00,00,05,20,00,00,00,20,02,00,00,01,02,00,00,00,00,00,05,20,00,00,\
00,20,02,00,00,43,00,72,00,79,00,70,00,74,00,6f,00,67,00,72,00,61,00,70,00,\
68,00,69,00,63,00,20,00,4f,00,70,00,65,00,72,00,61,00,74,00,6f,00,72,00,73,\
00,00,00,4d,00,65,00,6d,00,62,00,65,00,72,00,73,00,20,00,61,00,72,00,65,00,\
20,00,61,00,75,00,74,00,68,00,6f,00,72,00,69,00,7a,00,65,00,64,00,20,00,74,\
00,6f,00,20,00,70,00,65,00,72,00,66,00,6f,00,72,00,6d,00,20,00,63,00,72,00,\
79,00,70,00,74,00,6f,00,67,00,72,00,61,00,70,00,68,00,69,00,63,00,20,00,6f,\
00,70,00,65,00,72,00,61,00,74,00,69,00,6f,00,6e,00,73,00,2e,00,00,00
[HKEY_LOCAL_MACHINE\SAM\SAM\Domains\Builtin\Aliases\00000242]
"C"=hex:42,02,00,00,00,00,00,00,b0,00,00,00,02,00,01,00,b0,00,00,00,2c,00,00,\
00,00,00,00,00,dc,00,00,00,ae,00,00,00,00,00,00,00,8c,01,00,00,00,00,00,00,\
00,00,00,00,01,00,14,80,90,00,00,00,a0,00,00,00,14,00,00,00,44,00,00,00,02,\
00,30,00,02,00,00,00,02,c0,14,00,13,00,05,01,01,01,00,00,00,00,00,01,00,00,\
00,00,02,c0,14,00,ff,ff,1f,00,01,01,00,00,00,00,00,05,07,00,00,00,02,00,4c,\
00,03,00,00,00,00,00,14,00,0c,00,02,00,01,01,00,00,00,00,00,01,00,00,00,00,\
00,00,18,00,1f,00,0f,00,01,02,00,00,00,00,00,05,20,00,00,00,20,02,00,00,00,\
00,18,00,1f,00,0f,00,01,02,00,00,00,00,00,05,20,00,00,00,24,02,00,00,01,02,\
00,00,00,00,00,05,20,00,00,00,20,02,00,00,01,02,00,00,00,00,00,05,20,00,00,\
00,20,02,00,00,48,00,79,00,70,00,65,00,72,00,2d,00,56,00,20,00,41,00,64,00,\
6d,00,69,00,6e,00,69,00,73,00,74,00,72,00,61,00,74,00,6f,00,72,00,73,00,4d,\
00,65,00,6d,00,62,00,65,00,72,00,73,00,20,00,6f,00,66,00,20,00,74,00,68,00,\
69,00,73,00,20,00,67,00,72,00,6f,00,75,00,70,00,20,00,68,00,61,00,76,00,65,\
00,20,00,63,00,6f,00,6d,00,70,00,6c,00,65,00,74,00,65,00,20,00,61,00,6e,00,\
64,00,20,00,75,00,6e,00,72,00,65,00,73,00,74,00,72,00,69,00,63,00,74,00,65,\
00,64,00,20,00,61,00,63,00,63,00,65,00,73,00,73,00,20,00,74,00,6f,00,20,00,\
61,00,6c,00,6c,00,20,00,66,00,65,00,61,00,74,00,75,00,72,00,65,00,73,00,20,\
00,6f,00,66,00,20,00,48,00,79,00,70,00,65,00,72,00,2d,00,56,00,2e,00,00,00
[HKEY_LOCAL_MACHINE\SAM\SAM\Domains\Builtin\Aliases\0000022C]
"C"=hex:2c,02,00,00,00,00,00,00,b0,00,00,00,02,00,01,00,b0,00,00,00,3e,00,00,\
00,00,00,00,00,f0,00,00,00,d8,00,00,00,00,00,00,00,c8,01,00,00,00,00,00,00,\
00,00,00,00,01,00,14,80,90,00,00,00,a0,00,00,00,14,00,00,00,44,00,00,00,02,\
00,30,00,02,00,00,00,02,c0,14,00,13,00,05,01,01,01,00,00,00,00,00,01,00,00,\
00,00,02,c0,14,00,ff,ff,1f,00,01,01,00,00,00,00,00,05,07,00,00,00,02,00,4c,\
00,03,00,00,00,00,00,14,00,0c,00,02,00,01,01,00,00,00,00,00,01,00,00,00,00,\
00,00,18,00,1f,00,0f,00,01,02,00,00,00,00,00,05,20,00,00,00,20,02,00,00,00,\
00,18,00,1f,00,0f,00,01,02,00,00,00,00,00,05,20,00,00,00,24,02,00,00,01,02,\
00,00,00,00,00,05,20,00,00,00,20,02,00,00,01,02,00,00,00,00,00,05,20,00,00,\
00,20,02,00,00,4e,00,65,00,74,00,77,00,6f,00,72,00,6b,00,20,00,43,00,6f,00,\
6e,00,66,00,69,00,67,00,75,00,72,00,61,00,74,00,69,00,6f,00,6e,00,20,00,4f,\
00,70,00,65,00,72,00,61,00,74,00,6f,00,72,00,73,00,00,00,4d,00,65,00,6d,00,\
62,00,65,00,72,00,73,00,20,00,69,00,6e,00,20,00,74,00,68,00,69,00,73,00,20,\
00,67,00,72,00,6f,00,75,00,70,00,20,00,63,00,61,00,6e,00,20,00,68,00,61,00,\
76,00,65,00,20,00,73,00,6f,00,6d,00,65,00,20,00,61,00,64,00,6d,00,69,00,6e,\
00,69,00,73,00,74,00,72,00,61,00,74,00,69,00,76,00,65,00,20,00,70,00,72,00,\
69,00,76,00,69,00,6c,00,65,00,67,00,65,00,73,00,20,00,74,00,6f,00,20,00,6d,\
00,61,00,6e,00,61,00,67,00,65,00,20,00,63,00,6f,00,6e,00,66,00,69,00,67,00,\
75,00,72,00,61,00,74,00,69,00,6f,00,6e,00,20,00,6f,00,66,00,20,00,6e,00,65,\
00,74,00,77,00,6f,00,72,00,6b,00,69,00,6e,00,67,00,20,00,66,00,65,00,61,00,\
74,00,75,00,72,00,65,00,73,00
[HKEY_LOCAL_MACHINE\SAM\SAM\Domains\Builtin\Aliases\00000223]
"C"=hex:23,02,00,00,00,00,00,00,b0,00,00,00,02,00,01,00,b0,00,00,00,16,00,00,\
00,00,00,00,00,c8,00,00,00,bc,00,00,00,00,00,00,00,84,01,00,00,00,00,00,00,\
00,00,00,00,01,00,14,80,90,00,00,00,a0,00,00,00,14,00,00,00,44,00,00,00,02,\
00,30,00,02,00,00,00,02,c0,14,00,13,00,05,01,01,01,00,00,00,00,00,01,00,00,\
00,00,02,c0,14,00,ff,ff,1f,00,01,01,00,00,00,00,00,05,07,00,00,00,02,00,4c,\
00,03,00,00,00,00,00,14,00,0c,00,02,00,01,01,00,00,00,00,00,01,00,00,00,00,\
00,00,18,00,1f,00,0f,00,01,02,00,00,00,00,00,05,20,00,00,00,20,02,00,00,00,\
00,18,00,1f,00,0f,00,01,02,00,00,00,00,00,05,20,00,00,00,24,02,00,00,01,02,\
00,00,00,00,00,05,20,00,00,00,20,02,00,00,01,02,00,00,00,00,00,05,20,00,00,\
00,20,02,00,00,50,00,6f,00,77,00,65,00,72,00,20,00,55,00,73,00,65,00,72,00,\
73,00,00,00,50,00,6f,00,77,00,65,00,72,00,20,00,55,00,73,00,65,00,72,00,73,\
00,20,00,61,00,72,00,65,00,20,00,69,00,6e,00,63,00,6c,00,75,00,64,00,65,00,\
64,00,20,00,66,00,6f,00,72,00,20,00,62,00,61,00,63,00,6b,00,77,00,61,00,72,\
00,64,00,73,00,20,00,63,00,6f,00,6d,00,70,00,61,00,74,00,69,00,62,00,69,00,\
6c,00,69,00,74,00,79,00,20,00,61,00,6e,00,64,00,20,00,70,00,6f,00,73,00,73,\
00,65,00,73,00,73,00,20,00,6c,00,69,00,6d,00,69,00,74,00,65,00,64,00,20,00,\
61,00,64,00,6d,00,69,00,6e,00,69,00,73,00,74,00,72,00,61,00,74,00,69,00,76,\
00,65,00,20,00,70,00,6f,00,77,00,65,00,72,00,73,00
[HKEY_LOCAL_MACHINE\SAM\SAM\Domains\Builtin\Aliases\0000022B]
"C"=hex:2b,02,00,00,00,00,00,00,b0,00,00,00,02,00,01,00,b0,00,00,00,28,00,00,\
00,00,00,00,00,d8,00,00,00,7a,00,00,00,00,00,00,00,54,01,00,00,00,00,00,00,\
00,00,00,00,01,00,14,80,90,00,00,00,a0,00,00,00,14,00,00,00,44,00,00,00,02,\
00,30,00,02,00,00,00,02,c0,14,00,13,00,05,01,01,01,00,00,00,00,00,01,00,00,\
00,00,02,c0,14,00,ff,ff,1f,00,01,01,00,00,00,00,00,05,07,00,00,00,02,00,4c,\
00,03,00,00,00,00,00,14,00,0c,00,02,00,01,01,00,00,00,00,00,01,00,00,00,00,\
00,00,18,00,1f,00,0f,00,01,02,00,00,00,00,00,05,20,00,00,00,20,02,00,00,00,\
00,18,00,1f,00,0f,00,01,02,00,00,00,00,00,05,20,00,00,00,24,02,00,00,01,02,\
00,00,00,00,00,05,20,00,00,00,20,02,00,00,01,02,00,00,00,00,00,05,20,00,00,\
00,20,02,00,00,52,00,65,00,6d,00,6f,00,74,00,65,00,20,00,44,00,65,00,73,00,\
6b,00,74,00,6f,00,70,00,20,00,55,00,73,00,65,00,72,00,73,00,4d,00,65,00,6d,\
00,62,00,65,00,72,00,73,00,20,00,69,00,6e,00,20,00,74,00,68,00,69,00,73,00,\
20,00,67,00,72,00,6f,00,75,00,70,00,20,00,61,00,72,00,65,00,20,00,67,00,72,\
00,61,00,6e,00,74,00,65,00,64,00,20,00,74,00,68,00,65,00,20,00,72,00,69,00,\
67,00,68,00,74,00,20,00,74,00,6f,00,20,00,6c,00,6f,00,67,00,6f,00,6e,00,20,\
00,72,00,65,00,6d,00,6f,00,74,00,65,00,6c,00,79,00,00,00
[HKEY_LOCAL_MACHINE\SAM\SAM\Domains\Builtin\Aliases\00000228]
"C"=hex:28,02,00,00,00,00,00,00,b0,00,00,00,02,00,01,00,b0,00,00,00,14,00,00,\
00,00,00,00,00,c4,00,00,00,4a,00,00,00,00,00,00,00,10,01,00,00,00,00,00,00,\
00,00,00,00,01,00,14,80,90,00,00,00,a0,00,00,00,14,00,00,00,44,00,00,00,02,\
00,30,00,02,00,00,00,02,c0,14,00,13,00,05,01,01,01,00,00,00,00,00,01,00,00,\
00,00,02,c0,14,00,ff,ff,1f,00,01,01,00,00,00,00,00,05,07,00,00,00,02,00,4c,\
00,03,00,00,00,00,00,14,00,0c,00,02,00,01,01,00,00,00,00,00,01,00,00,00,00,\
00,00,18,00,1f,00,0f,00,01,02,00,00,00,00,00,05,20,00,00,00,20,02,00,00,00,\
00,18,00,1f,00,0f,00,01,02,00,00,00,00,00,05,20,00,00,00,24,02,00,00,01,02,\
00,00,00,00,00,05,20,00,00,00,20,02,00,00,01,02,00,00,00,00,00,05,20,00,00,\
00,20,02,00,00,52,00,65,00,70,00,6c,00,69,00,63,00,61,00,74,00,6f,00,72,00,\
53,00,75,00,70,00,70,00,6f,00,72,00,74,00,73,00,20,00,66,00,69,00,6c,00,65,\
00,20,00,72,00,65,00,70,00,6c,00,69,00,63,00,61,00,74,00,69,00,6f,00,6e,00,\
20,00,69,00,6e,00,20,00,61,00,20,00,64,00,6f,00,6d,00,61,00,69,00,6e,00,00,\
00
[HKEY_LOCAL_MACHINE\SAM\SAM\Domains\Builtin\Aliases\Names\Access Control Assistance Operators]
@=hex(243):
[HKEY_LOCAL_MACHINE\SAM\SAM\Domains\Builtin\Aliases\Names\Backup Operators]
@=hex(227):
[HKEY_LOCAL_MACHINE\SAM\SAM\Domains\Builtin\Aliases\Names\Cryptographic Operators]
@=hex(239):
[HKEY_LOCAL_MACHINE\SAM\SAM\Domains\Builtin\Aliases\Names\Hyper-V Administrators]
@=hex(242):
[HKEY_LOCAL_MACHINE\SAM\SAM\Domains\Builtin\Aliases\Names\Network Configuration Operators]
@=hex(22c):
[HKEY_LOCAL_MACHINE\SAM\SAM\Domains\Builtin\Aliases\Names\Power Users]
@=hex(223):
[HKEY_LOCAL_MACHINE\SAM\SAM\Domains\Builtin\Aliases\Names\Remote Desktop Users]
@=hex(22b):
[HKEY_LOCAL_MACHINE\SAM\SAM\Domains\Builtin\Aliases\Names\Replicator]
@=hex(228):
SYSTEMアカウントでレジストリファイルをインポートするには、Microsoft TechNetの「Process Utilities」PsToolsパッケージにあるPsExec.exeツールを使用しました。これはZIPパッケージなので、何もインストールする必要はありません。PsExec.exeファイルを解凍した後、次のコマンドを使用して管理者として実行しましたPsExec.exe -s -i regedit.exe
。[レジストリエディター]ウィンドウからを選択しFile > Import
、レジストリファイルの場所に移動しました。
レジストリファイルを正常にインポートするために、PsExecを使用する必要はありませんがHKEY_LOCAL_MACHINE\SAM\SAM\Domains\Builtin\Aliases\
、レジストリのキーへの書き込み権限が必要です。これは、HKEY_LOCAL_MACHINE\SAM
キーからその子(サブキー)に権限を複製することで取得できます。 。
レジストリファイルをインポートした後、ユーザーをRemote Desktop Usersグループ(net localgroup "Remote Desktop Users" [username] /add
)に追加し、それらのユーザーを使用して、リモートデスクトップで Windows 7 Home Premium PCにアクセスできました。
net localgroup "Remote Desktop Users" [username] /add
。また、以前にでグループを作成していたため、net localgroup "Remote Desktop Users" /add
そのローカルグループを削除する前にログインできませんでした。