Partilhar via


RpcSec-wmi.vbs

By The Scripting Guys, Microsoft Corporation

This script configures RPC security to bypass new restrictions in Windows XP Service Pack 2 and allow anonymous call back. It performs this task by editing the registry, using the WMI System Registry provider. It can run against a local or remote computer.

RpcSec-wmi.vbs corresponds to RpcSec.vbs, one of the scripts that ships with Application Compatibility Testing and Mitigation Guide for Windows XP Service Pack 2 and which are documented in the Appendix. You can download a Windows Installer (.msi) file that installs the Guide and its associated scripts from:

https://www.microsoft.com/downloads/details.aspx?FamilyId=9300BECF-2DEE-4772-ADD9-AD0EAF89C4A7&displaylang=en

To use the script, copy the code, paste it into Notepad, and then save the script as RpcSec-wmi.vbs. To run the script, open a command prompt window to the directory of the script and type:

cscript rpcsec-wmi.vbs

If the default script host on the computer is Cscript.exe, the initial "cscript" may be omitted.

Script Code

'******************************************************************************
'RpcSec-wmi.vbs
'Author: Peter Costantini, the Microsoft Scripting Guys
'Date: 8/25/04
'Revision 1.0
'System requirement: Windows XP Service Pack 2.
'This script configures RPC security to bypass new restrictions in Windows XP
'Service Pack 2 and allow anonymous call back.
'It can be run against a local or remote computer.
'Edit intValue as needed. Valid RestrictRemoteClients values are as follows:
'0 = Bypasses new restrictions.
'1 = Restricts access to all RPC interfaces but allows anonymous callbacks.
'2 = Restricts access to all RPC interfaces and does not allow anonymous
'callbacks.
'******************************************************************************

'On Error Resume Next

'Global variables
strComputer = "." ' Can be changed to name of remote computer.

'Connect with WMI service and StdRegProv class.
Set objReg = GetObject("winmgmts:{impersonationLevel=impersonate}!\\" & _
 strComputer & "\root\default:StdRegProv")
If Err = 0 Then
  SetValue
Else
  WScript.Echo "Unable to connect to WMI StdRegProv on " & strComputer & "."
  WScript.Echo "  Error Number:" & Err.Number
  WScript.Echo "  Source:" & Err.Source
  WScript.Echo "  Description:" & Err.Description
End If
Err.Clear

'******************************************************************************

Sub SetValue

Const HKEY_LOCAL_MACHINE = &H80000002
strKeyPath = "SOFTWARE\Policies\Microsoft\Windows NT\RPC"
strEntryName = "RestrictRemoteClients"
intValue = 0

intReturn = objReg.CreateKey(HKEY_LOCAL_MACHINE, strKeyPath)
If intReturn = 0 Then
  WScript.Echo "Created registry subkey " & strKeyPath & _
   ". If it previously existed, did not overwrite existing values."
  intReturn = objReg.SetDWORDValue(HKEY_LOCAL_MACHINE, strKeyPath, _
   strEntryName, intValue)
  If intReturn = 0 Then
    WScript.Echo "Changed value of " & strEntryName & " to " & intValue
  Else
    WScript.Echo "ERROR: Unable to change value of " & strEntryName
  End If
Else
  WScript.Echo "ERROR: Unable to create registry path " & _
   strKeyPath
End If

End Sub

For online peer support, join The Official Scripting Guys Forum! To provide feedback or report bugs in sample scripts, please start a new discussion on the Discussions tab for this script.

Disclaimer

This sample script is not supported under any Microsoft standard support program or service. The sample script is provided AS IS without warranty of any kind. Microsoft further disclaims all implied warranties including, without limitation, any implied warranties of merchantability or of fitness for a particular purpose. The entire risk arising out of the use or performance of the sample scripts and documentation remains with you. In no event shall Microsoft, its authors, or anyone else involved in the creation, production, or delivery of the scripts be liable for any damages whatsoever (including, without limitation, damages for loss of business profits, business interruption, loss of business information, or other pecuniary loss) arising out of the use of or inability to use the sample scripts or documentation, even if Microsoft has been advised of the possibility of such damages.