Powershell GUI fronted (WPF) to run categorized console scripts

⌈⌋ branch:  ClickyColoury


Check-in [7d3b522d61]

Many hyperlinks are disabled.
Use anonymous login to enable hyperlinks.

Overview
Comment:NETLOGON registry change to enable WinLogon debugging
Downloads: Tarball | ZIP archive | SQL archive
Timelines: family | ancestors | descendants | both | trunk
Files: files | file ages | folders
SHA1:7d3b522d61a64e56572ab3d0cd83d7ae080c41b7
User & Date: mario 2018-05-16 18:15:02
Context
2018-05-16
18:15
Trivial Get-InboxRule script check-in: c70309ceb4 user: mario tags: trunk
18:15
NETLOGON registry change to enable WinLogon debugging check-in: 7d3b522d61 user: mario tags: trunk
18:13
AD search for user properties, with a few (unpractical) sample -Filters. check-in: 09ab7c0a65 user: mario tags: trunk
Changes

Added tools/beta/netlogon_debug.ps1.























































































>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
# api: multitool
# version: 0.2
# title: Netlogon.log enable
# description: Set NETLOGON debug parameters
# category: beta
# x_cat: registry
# icon: powershell
# type: inline
# key: b51
# doc: https://serverfault.com/questions/65265/finding-why-a-user-is-locked-out-in-active-directory,
#      https://support.microsoft.com/de-de/help/109626/enabling-debug-logging-for-the-netlogon-service
# status: beta
#
# Akin to running:
#  ❏ Nltest /DBFlag:2080FFFF
# on user machine.
#
# ➜ log should appear in C:\Windows\Debug\netlogon.log
#
# Disable again via 
#  ❏ Nltest /DBFlag:0
# on client


Param(
    $machine = (Read-Host "computer"),
    $user = (Read-Host "user")
)
$settings = @(
    @("\\$machine\HKLM\SYSTEM\CurrentControlSet\Services\Netlogon\Parameters\DBFlag", (0x2080FFFF), "DWord"),
    @("\\$machine\HKLM\SYSTEM\CurrentControlSet\Services\Netlogon\Parameters\MaximumLogFileSize", (2MB), "DWord")
)


#-- registry
ForEach ($tuple in $settings) {
    $regkey, $setval, $regtype = $tuple
    Write-Host -f Yellow "➜ $regkey := $setval"
    Set-RemoteRegistry $regkey $setval $regtype
}
Write-Host -f Gray "➩ Active after next reboot" 
Write-Host -f Gray "➩ See C:\windows\Debug\netlogon.log" 
Write-Host ""