If you find that Psexec Windows 2008 access has been denied, the guide below should help.
Approved: Fortect
Open RegEdit on your individual remote server.Go to HKEY_LOCAL_MACHINE SOFTWARE Microsoft Windows CurrentVersion Policies System.Add a new DWORD value named LocalAccountTokenFilterPolicy.Set the value to 1.Reboot the server to remove it.
I am trying to remote boot and avoid IIS 7.0 sites on my LAN.On a personal computer using PsExec.
- The local computer is monitored by Windows Vista.
- The server is running Windows 2008 R2.
- Each server operates differently across domains.
- A one-way trust exists between the domain of my local computer and the domain of the server.
- PsExec uses a regional administrator account that is authenticated as a local administrator on the server.
- The state machine communicates with the server through an alias; it does not use the real name of the server.
"C: Program Files PSTools psexec.exe" (Server Alias) (Server-Domain) (Domain Admin) -u -p (Password) C: Windows System32 inetsrv appcmd.exe stop "Default Web Site"
PsExec v1.94 - start processes remotelyCopyright (C) 2001-2008 Mark RussinovichSysinternals www -.sysinternals.Not comcan run the PsExec program on (server alias):Access denied.
- This command works when executed from a different computer (Windows 2003 R2) in the server’s domain. (Internal domain)
- This command will also work when run on another computerre running Windows 2003 from r2 on my home computer; both are in unique areas. (Cross-domain)
- Using the same PsExec command except ping instead of appcmd.exe failed.
- The sale was made using the “Promote” command and “Run as administrator”.
- The DisableStrictNameChecking registry key is set on the server to specify which aliases to use.
- The LocalAccountTokenFilterPolicy registry key assumes that 1 was installed on both the Internet computer and the local computer.
- Windows Firewall is not running on the server.
- UAC is disabled on each of our local computers.
- UAC is active on the server.
- UAC has disabled “admin mode” assertion via server; this allowed the team to work within a domain (as opposed to cross-domain).
This seems to indicate that this is a specific Windows 2008 R2 issue that also has to do with security settings, possibly with domain or administrator rights choices. I’m still out of ideas. Any suggestions you kindly would be greatly appreciated!
requested August 13, 2010 at 2:09 PM
363
Not The Answer You Are Looking For? Browse Other Questions Tagged Iis-7 Windows-server-2008-r2 Pstools Or Ask Your Own Question.
It took me personally several hours to find a way to find PsExec between two Windows 7 computers among non-admin users running PsExec … Disabling UAC (EnableLUA = 0, ConsentPromptBehaviorAdmin = 0, LocalAccountTokenFilterPolicy = 1) didn’t work by disabling firewalls weren’t working …
Here you find your way of working – thanks to JelmerS:(PSexec info does not connect to devices with specified username and password)
This is relatedso that psexec always tries to access ADMIN $ with your local credentials before running your command as a different user. According to this thread, you can cache credentials implemented before psexec:cmdkey.exe / add: MACHINE_NAME_HERE / user: MACHINE_NAME_HERE Administrator / pass: PASSWORD_HEREpsexec.exe MACHINE_NAME_HERE -i notepadcmdkey.exe / remove: MACHINE_NAME_HERE
answered Feb 26, 2014 at 15:48
Are you running PSEXEC from an elevated command prompt on your awesome Vista workstation? Have you set LocalAccountTokenFilterPolicy = 1? See FAQ: Common PSTools Problems
answered Aug 13 ’10 at 15:16
23.9k
I usually have a similar testing environment, but I can definitely recommend the following:Configure batch languages (.bat) in the client domain, one for each website that needs to be restarted. (I’ll name the consumers “ restart_site-sitename.bat
“). Create one for each website and store them all in a database on the management server at this web address (where I put my system tools where I can always handle everything if there is a problem on my laptop) including PSExec in last in this directory.
psexec.exe (server alias) C: Windows System32 inetsrv appcmd.exe stop worldwide website "WebsiteName"
Approved: Fortect
Fortect is the world's most popular and effective PC repair tool. It is trusted by millions of people to keep their systems running fast, smooth, and error-free. With its simple user interface and powerful scanning engine, Fortect quickly finds and fixes a broad range of Windows problems - from system instability and security issues to memory management and performance bottlenecks.
![](/wp-content/download3.png)
Now try running psexec on this Condude and accessing these electronic batch files.
"C: Program Files PSTools psexec. (Server Alias) exe" -u (Server-Domain) (Domain-Admin) -p (Password) C: Path to psexec_and_scripts restart_site-sitename.bat "
answered Oct 5, 2010 at about 12:28 pm
11.8k
Speed up your computer's performance now with this simple download.
![John Hernandez](https://windowsdiary.com/wp-content/uploads/johnhernandez.jpg)