![]() ![]() You can do that by going to Control Panel and then clicking on System. Obviously, you’ll also need to know all the names of the other computers on the network. In my testing on Windows 7 and 8, there was no need to complete these tasks and you really shouldn’t because it opens up your system to potential hackers. You’ll also read on other sites to start the Remote Registry service if that’s not running and to edit the local security policy by adding the Everyone group to Force shutdown from a remote system policy setting. This will allow the account to remain with administrative privileges. This registry key is needed because in Windows Vista and higher, an administrator account is stripped of its credentials when connecting remotely. You don’t need to restart the computer as the changes should take effect immediately. Now double-click on it and change the value from 0 to 1.Ĭlick OK and close out of the registry. Change the name to LocalAccountTokenFilterPolicy and press Enter. Right-click on System on the left hand side and choose New – DWORD (32-bit) Value.Ī new value will pop up at the bottom in the right window and the text will be highlighted. HKEY_LOCAL_MACHINE – SOFTWARE – Microsoft – Windows – CurrentVersion – Policies – System ![]() Open the registry editor by going to Start and typing in regedit. You will only get the Access is Denied message no matter what. Unless you do this, it simply won’t work. Step 3: Lastly, if you are trying to target a Windows Vista, Windows 7 or Windows 8 computer remotely, you will need to modify the registry. You might read on other sites to allow WMI, Remote Shutdown, Network Discovery, etc, but I’ve tested it without any of those and it works just fine. You do not need to allow anything else through the firewall. Make sure you only check the Home/Work (Private) box and not Public. Click on the Allow a program or feature through Windows Firewall in the left menu. Go back to the main Control Panel window and click on Windows Firewall. Click on the Change advanced sharing settings link in the left menu and select the radio button for Turn on network discovery and Turn on file and printer sharing. To do this, go to Control Panel and click on Network and Sharing Center first. Step 2: The second step is to turn on File and Printer Sharing and to allow it through the Windows firewall. Using those credentials, you should be able to shutdown any other computer on the network, even if they are logged in using different credentials. If you’re in a corporate environment with a domain, you will probably want to login using the domain administrator account. Again, the names of the user accounts and the password have to be the same. If you go to Control Panel and click on User Accounts and it says Administrator or Local Administrator, then you’re fine. You don’t have to use the built-in administrator account on either computer for this to work, but the user account you do use on both computers has to be part of the Administrators group on the local computer. ![]() If you’re on a home network, the best way to do this is to make sure all computers are in the same workgroup and that they all have at least one Administrator account with the same username and password. Step 1: Firstly, in order to remotely shutdown a computer on your network, you’ll need to make sure you have Administrative access to the target computer. In order to get this to work, there are a couple of steps you have to complete first otherwise you’ll constantly get an Access is Denied (5) error message and it will drive you mad. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |