Lỗi hkey local machine software micorsoft windows nt currentversion winlogon năm 2024

Over the years, there have been several methods attempted for managing local Administrator accounts: Scripted password change – Don’t do this. The password is exposed in SYSVOL. Group Policy Preferences. The credentials are exposed in SYSVOL. Password vault/safe product (Thycotic, CyberArk, Lieberman, Quest, Exceedium, etc). Microsoft Local Administrator Password Solution (LAPS). LAPS Overview Microsoft’s …

When I try to install applications they fail with a permissions error when accessing HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows

I have tried regedit, right clicking on permissions. It tells me that I don't have permission to view... but can make changes. In the permissions dialog there are no users or groups i the list. I can add users but when I apply the changes I get access denied.

I have also tried this from UBD4WIN using remote registry editor with the same result.

Any Ideas.

If the value for "MSS: (AutoAdminLogon) Enable Automatic Logon (not recommended)" is not set to "Disabled", this is a finding.

The policy referenced configures the following registry value:

Registry Hive: HKEY_LOCAL_MACHINE Subkey: \Software\Microsoft\Windows NT\CurrentVersion\Winlogon\

Value Name: AutoAdminLogon

Type: REG_SZ Value: 0

Automatic logon for a user is enabled by setting the value of AutoAdminLogon to 1, the value of DefaultUserName to the name of an existing user and DefaultPassword to his/her password.

When in a domain, DefaultDomain is additionally needed.

@set /p password="Enter password for %USERNAME%: " @reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v DefaultUserName /t REG_SZ /d %USERNAME% /f @reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v DefaultPassword /t REG_SZ /d %password% /f @reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v AutoAdminLogon /t REG_SZ /d 1 /f

In order to bypass this mechanism, the shift key must be pressed after/while starting Windows.

NoDebugThread

If set, wininit.exe won't create the «periodic timer queue».

SFCDisable

Specifies disabledness of Windows File Protection

The value can be one of

  • 0x00: enabled
  • 0x01: disabled with prompt at next boot.
  • 0x02: disabled at next boot
  • 0x04: enabled, no pop ups
  • 0xffffff9d: completely disabled

SFCDllCacheDir

SFCDllCacheDir specifies the Dll Cache directory.

SfcScan

The value of SfcScan specifies the behavior of the System File Checker tool and can be set with sfc.exe.

Hãy nâng cấp lên Microsoft Edge để tận dụng các tính năng mới nhất, bản cập nhật bảo mật và hỗ trợ kỹ thuật.

  • Bài viết
  • 12/26/2023

Trong bài viết này

This article describes an issue where you can't sign in to the system and you're prompted for user name and password repeatedly.

Applies to: Windows Server 2003 Original KB number: 555648

Symptoms

Windows logs on and logs off immediately when you try logging on to Windows. When you type the user name and password, you're again presented with User name and Password dialogue box. You try hard to get in but to no avail.

Cause

You can't log on to system using either Normal Mode or Safe Mode. This occurs only when Winlogon service tries to load the Windows default shell (explorer.exe) and user shell (userinit.exe) from registry. This service searches for Explorer.exe and Userinit.exe in the following path of registry:

HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon

Resolution

Edit these values and type the correct path of shell:

Shell = explorer.exe Userinit=X:\windows\system32\userinit.exe

Note

These files may also be deleted by spywares. You may need to extract them using Windows CD.

Steps for rectifying this problem

  • Log on to a networked computer.
  • Run Regedit.exe.
  • Point your cursor to HKEY_LOCAL_MACHINE.
  • Select File > Connect Remote Registry.
  • Type the computer name (infected computer).
  • Navigate to the following location in registry of destination or infected computer: HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon
  • Edit these two values in right pane: Shell Userinit
  • Change these two values to Shell=explorer.exe Userinit = x:\windows\system32\userinit.exe
  • Exit from Registry.
  • Restart the infected computer.
  • You should be able to log on to the computer.

Community Solutions Content Disclaimer

Microsoft corporation and/or its respective suppliers make no representations about the suitability, reliability, or accuracy of the information and related graphics contained herein. All such information and related graphics are provided "as is" without warranty of any kind. Microsoft and/or its respective suppliers hereby disclaim all warranties and conditions with regard to this information and related graphics, including all implied warranties and conditions of merchantability, fitness for a particular purpose, workmanlike effort, title and non-infringement. You specifically agree that in no event shall Microsoft and/or its suppliers be liable for any direct, indirect, punitive, incidental, special, consequential damages or any damages whatsoever including, without limitation, damages for loss of use, data or profits, arising out of or in any way connected with the use of or inability to use the information and related graphics contained herein, whether based on contract, tort, negligence, strict liability or otherwise, even if Microsoft or any of its suppliers has been advised of the possibility of damages.