幽灵资源网 Design By www.bzswh.com
Dim wsObj
Set wsObj = CreateObject("Wscript.Shell")

' Add the LogLevel Value to Kerberos Key in Registry.
On Error Resume Next 
WScript.Echo "Enabling Kerberos Logging..."
wsObj.RegWrite "HKLM\SYSTEM\CurrentControlSet\Services\NTDS\Diagnostics\1 Knowledge Consistency Checker",3,"REG_DWORD"
wsObj.RegWrite "HKLM\SYSTEM\CurrentControlSet\Services\NTDS\Diagnostics\2 Security Events",3,"REG_DWORD"
wsObj.RegWrite "HKLM\SYSTEM\CurrentControlSet\Services\NTDS\Diagnostics\3 ExDS Interface Events",3,"REG_DWORD"
wsObj.RegWrite "HKLM\SYSTEM\CurrentControlSet\Services\NTDS\Diagnostics\4 MAPI Interface Events",3,"REG_DWORD"
wsObj.RegWrite "HKLM\SYSTEM\CurrentControlSet\Services\NTDS\Diagnostics\5 Replication Events",3,"REG_DWORD"
wsObj.RegWrite "HKLM\SYSTEM\CurrentControlSet\Services\NTDS\Diagnostics\6 Garbage Collection",3,"REG_DWORD"
wsObj.RegWrite "HKLM\SYSTEM\CurrentControlSet\Services\NTDS\Diagnostics\7 Internal Configuration",3,"REG_DWORD"
wsObj.RegWrite "HKLM\SYSTEM\CurrentControlSet\Services\NTDS\Diagnostics\8 Directory Access",3,"REG_DWORD"
wsObj.RegWrite "HKLM\SYSTEM\CurrentControlSet\Services\NTDS\Diagnostics\9 Internal Processing",3,"REG_DWORD"
wsObj.RegWrite "HKLM\SYSTEM\CurrentControlSet\Services\NTDS\Diagnostics\10 Performance Counters",3,"REG_DWORD"
wsObj.RegWrite "HKLM\SYSTEM\CurrentControlSet\Services\NTDS\Diagnostics\11 Initialization/Termination",3,"REG_DWORD"
wsObj.RegWrite "HKLM\SYSTEM\CurrentControlSet\Services\NTDS\Diagnostics\12 Service Control",3,"REG_DWORD"
wsObj.RegWrite "HKLM\SYSTEM\CurrentControlSet\Services\NTDS\Diagnostics\13 Name Resolution",3,"REG_DWORD"
wsObj.RegWrite "HKLM\SYSTEM\CurrentControlSet\Services\NTDS\Diagnostics\14 Backup",3,"REG_DWORD"
wsObj.RegWrite "HKLM\SYSTEM\CurrentControlSet\Services\NTDS\Diagnostics\15 Field Engineering",3,"REG_DWORD"
wsObj.RegWrite "HKLM\SYSTEM\CurrentControlSet\Services\NTDS\Diagnostics\16 LDAP Interface Events",3,"REG_DWORD"
wsObj.RegWrite "HKLM\SYSTEM\CurrentControlSet\Services\NTDS\Diagnostics\17 Setup",3,"REG_DWORD"
wsObj.RegWrite "HKLM\SYSTEM\CurrentControlSet\Services\NTDS\Diagnostics\18 Global Catalog",3,"REG_DWORD"
wsObj.RegWrite "HKLM\SYSTEM\CurrentControlSet\Services\NTDS\Diagnostics\19 Inter-site Messaging",3,"REG_DWORD"
wsObj.RegWrite "HKLM\SYSTEM\CurrentControlSet\Services\NTDS\Diagnostics\20 Group Caching",3,"REG_DWORD"
wsObj.RegWrite "HKLM\SYSTEM\CurrentControlSet\Services\NTDS\Diagnostics\21 Linked-Value Replication",3,"REG_DWORD"
wsObj.RegWrite "HKLM\SYSTEM\CurrentControlSet\Services\NTDS\Diagnostics\22 DS RPC Client",3,"REG_DWORD"
wsObj.RegWrite "HKLM\SYSTEM\CurrentControlSet\Services\NTDS\Diagnostics\23 DS RPC Server",3,"REG_DWORD"
wsObj.RegWrite "HKLM\SYSTEM\CurrentControlSet\Services\NTDS\Diagnostics\24 DS Schema",3,"REG_DWORD"
Set wsObj = Nothing 
WScript.Echo "-=[Complete!]=-"

标签:
vbs,nableKerbLog

幽灵资源网 Design By www.bzswh.com
广告合作:本站广告合作请联系QQ:858582 申请时备注:广告合作(否则不回)
免责声明:本站文章均来自网站采集或用户投稿,网站不提供任何软件下载或自行开发的软件! 如有用户或公司发现本站内容信息存在侵权行为,请邮件告知! 858582#qq.com
幽灵资源网 Design By www.bzswh.com

稳了!魔兽国服回归的3条重磅消息!官宣时间再确认!

昨天有一位朋友在大神群里分享,自己亚服账号被封号之后居然弹出了国服的封号信息对话框。

这里面让他访问的是一个国服的战网网址,com.cn和后面的zh都非常明白地表明这就是国服战网。

而他在复制这个网址并且进行登录之后,确实是网易的网址,也就是我们熟悉的停服之后国服发布的暴雪游戏产品运营到期开放退款的说明。这是一件比较奇怪的事情,因为以前都没有出现这样的情况,现在突然提示跳转到国服战网的网址,是不是说明了简体中文客户端已经开始进行更新了呢?