Add computer to ETC/Hosts

Management Host

Get authentication server allow values.

[powershell](Get-Item wsman:localhost\client\trustedhosts).value[/powershell]

Note: This command is needed if you want to fix Kerberos authentication errors.

[powershell]Set-Item wsman:localhost\client\trustedhosts TESTMACHINE -Concatenate -Force[/powershell]

To remove, you need to clear the trustedhosts and re-add each host.

[powershell]Clear-Item WSMan:\localhost\Client\TrustedHosts[/powershell]

Remote Host

Allow UAC

Get Policy:

[powershell](Get-ItemProperty -Path ‘HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System’).LocalAccountTokenFilterPolicy[/powershell]

Install Policy:

[powershell]New-ItemProperty -Name LocalAccountTokenFilterPolicy -path HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System -propertyType DWord -value 1[/powershell]

Enable Firewall Rules for Remote Managment

[powershell]netsh firewall set service type=remoteadmin mode=enable
netsh advfirewall firewall set rule group=”remote administration” new enable=yes[/powershell]

Enable MMC

[powershell]netsh advfirewall firewall set rule group=”Windows Management Instrumentation (WMI)” new enable=yes
netsh advfirewall firewall set rule group=”Remote Event Log Management” new enable=yes[/powershell]

Enable Fireall Rules for Remote Disk Management

[powershell]netsh advfirewall firewall set rule group=”Remote Volume Management” new enable=yes
((( PowerShell – Run on Both Side)))
Set-NetFirewallRule –Name “RVM-VDS-In-TCP” –Enabled True -Profile Any
Set-NetFirewallRule –Name “RVM-VDSLDR-In-TCP” –Enabled True -Profile Any
Set-NetFirewallRule –Name “RVM-RPCSS-In-TCP” –Enabled True -Profile Any[/powershell]