Add computer to ETC/Hosts
Management Host
Get authentication server allow values.
[powershell](Get-Item wsman:localhost\client\trustedhosts).value[/powershell]
Note: This command is needed if you want to fix Kerberos authentication errors.
[powershell]Set-Item wsman:localhost\client\trustedhosts TESTMACHINE -Concatenate -Force[/powershell]
To remove, you need to clear the trustedhosts and re-add each host.
[powershell]Clear-Item WSMan:\localhost\Client\TrustedHosts[/powershell]
Remote Host
Allow UAC
Get Policy:
[powershell](Get-ItemProperty -Path ‘HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System’).LocalAccountTokenFilterPolicy[/powershell]
Install Policy:
[powershell]New-ItemProperty -Name LocalAccountTokenFilterPolicy -path HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System -propertyType DWord -value 1[/powershell]
Enable Firewall Rules for Remote Managment
[powershell]netsh firewall set service type=remoteadmin mode=enable
netsh advfirewall firewall set rule group=”remote administration” new enable=yes[/powershell]
Enable MMC
[powershell]netsh advfirewall firewall set rule group=”Windows Management Instrumentation (WMI)” new enable=yes
netsh advfirewall firewall set rule group=”Remote Event Log Management” new enable=yes[/powershell]
Enable Fireall Rules for Remote Disk Management
[powershell]netsh advfirewall firewall set rule group=”Remote Volume Management” new enable=yes
((( PowerShell – Run on Both Side)))
Set-NetFirewallRule –Name “RVM-VDS-In-TCP” –Enabled True -Profile Any
Set-NetFirewallRule –Name “RVM-VDSLDR-In-TCP” –Enabled True -Profile Any
Set-NetFirewallRule –Name “RVM-RPCSS-In-TCP” –Enabled True -Profile Any[/powershell]