Partager via


NRPT Example Script

Updated: October 7, 2009

Applies To: Windows Server 2008 R2

Tip

This topic applies to DNSSEC in Windows Server 2008 R2. DNSSEC support is greatly enhanced in Windows Server 2012. For more information, see DNSSEC in Windows Server 2012.

The following is an example script that you can use to configure the NRPT on a client computer.

Example registry script

[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows NT\DNSClient]"EnableDAForAllNetworks"=dword:00000000"DnsSecureNameQueryFallback"=dword:00000000"DirectAccessQueryOrder"=dword:00000000[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows NT\DNSClient\DnsPolicyConfig][HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows NT\DNSClient\DnsPolicyConfig\Rule1]"Version"=dword:00000001"ConfigOptions"=dword:00000002"Name"=hex(7):2e,00,00,00,00,00"IPSECCARestriction"="""DNSSECValidationRequired"=dword:00000001"DNSSECQueryIPSECRequired"=dword:00000001"DNSSECQueryIPSECEncryption"=dword:00000001[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows NT\DNSClient\DnsPolicyConfig\Rule2]"Version"=dword:00000001"ConfigOptions"=dword:00000004"Name"=hex(7):2e,00,63,00,6f,00,6e,00,74,00,6f,00,73,00,6f,00,2e,00,63,00,6f,\  00,6d,00,00,00,00,00"IPSECCARestriction"="""DNSSECValidationRequired"=dword:00000000"DNSSECQueryIPSECRequired"=dword:00000000"DNSSECQueryIPSECEncryption"=dword:00000000

See Also

Concepts

Deploy Name Resolution Policy to Client Computers