Distribution of Registry key script

  • Thread starter Thread starter lca1630
  • Start date Start date
L

lca1630

Hello,

I am interested in a solution for distributing a registry key to my vista
users that disables IPV6. My scripting knowledge is limited and so I was
wondering if anyone had an idea of a script that would work to distribute
this registry key below via GPO to my users:

Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters]
"Dhcpv6DUID"=hex:00,01,00,01,0f,e1,a4,18,00,0c,29,7c,94,36
"DisabledComponents"=dword:ffffffff

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters\Interfaces]

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters\Interfaces\{14782f48-c147-4378-863a-184700b4c8c4}]
"Dhcpv6Iaid"=dword:0e001372
"Dhcpv6State"=dword:00000000

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters\Interfaces\{31db1df5-a3a8-44a5-8ab0-d0b3a6209736}]
"Dhcpv6Iaid"=dword:0f000c29
"Dhcpv6State"=dword:00000000

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters\Interfaces\{8978d4f1-d9ec-471e-971a-a8023a4e510a}]
"Dhcpv6Iaid"=dword:0c000000
"Dhcpv6State"=dword:00000000

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters\Interfaces\{b9cf3462-a989-4e5d-b674-47c2a15762c0}]
"Dhcpv6Iaid"=dword:0c001372
"Dhcpv6State"=dword:00000000

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters\Interfaces\{d9b77aba-9aa6-49e3-86e6-d8a6e17a9079}]
"Dhcpv6Iaid"=dword:06001422
"Dhcpv6State"=dword:00000000

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters\Interfaces\{fbd4dbdd-2062-442f-ac67-6c0379fc9700}]
"Dhcpv6Iaid"=dword:07001422
"Dhcpv6State"=dword:00000000

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters\Winsock]
"UseDelayedAcceptance"=dword:00000000
"HelperDllName"=hex(2):25,00,53,00,79,00,73,00,74,00,65,00,6d,00,52,00,6f,00,\
6f,00,74,00,25,00,5c,00,53,00,79,00,73,00,74,00,65,00,6d,00,33,00,32,00,5c,\
00,77,00,73,00,68,00,69,00,70,00,36,00,2e,00,64,00,6c,00,6c,00,00,00
"MaxSockAddrLength"=dword:0000001c
"MinSockAddrLength"=dword:0000001c
"Mapping"=hex:08,00,00,00,03,00,00,00,17,00,00,00,01,00,00,00,06,00,00,00,17,\
00,00,00,01,00,00,00,00,00,00,00,17,00,00,00,00,00,00,00,06,00,00,00,17,00,\
00,00,02,00,00,00,11,00,00,00,17,00,00,00,02,00,00,00,00,00,00,00,17,00,00,\
00,00,00,00,00,11,00,00,00,17,00,00,00,03,00,00,00,ff,00,00,00,17,00,00,00,\
03,00,00,00,00,00,00,00

Thanks
 
lca1630 said:
Hello,

I am interested in a solution for distributing a registry key to my vista
users that disables IPV6. My scripting knowledge is limited and so I was
wondering if anyone had an idea of a script that would work to distribute
this registry key below via GPO to my users:

Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters]
"Dhcpv6DUID"=hex:00,01,00,01,0f,e1,a4,18,00,0c,29,7c,94,36
"DisabledComponents"=dword:ffffffff

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters\In
terfaces]

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters\In
terfaces\{14782f48-c147-4378-863a-184700b4c8c4}]
"Dhcpv6Iaid"=dword:0e001372 "Dhcpv6State"=dword:00000000

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters\In
terfaces\{31db1df5-a3a8-44a5-8ab0-d0b3a6209736}]
"Dhcpv6Iaid"=dword:0f000c29 "Dhcpv6State"=dword:00000000

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters\In
terfaces\{8978d4f1-d9ec-471e-971a-a8023a4e510a}]
"Dhcpv6Iaid"=dword:0c000000 "Dhcpv6State"=dword:00000000

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters\In
terfaces\{b9cf3462-a989-4e5d-b674-47c2a15762c0}]
"Dhcpv6Iaid"=dword:0c001372 "Dhcpv6State"=dword:00000000

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters\In
terfaces\{d9b77aba-9aa6-49e3-86e6-d8a6e17a9079}]
"Dhcpv6Iaid"=dword:06001422 "Dhcpv6State"=dword:00000000

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters\In
terfaces\{fbd4dbdd-2062-442f-ac67-6c0379fc9700}]
"Dhcpv6Iaid"=dword:07001422 "Dhcpv6State"=dword:00000000

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters\Wi
nsock] "UseDelayedAcceptance"=dword:00000000
"HelperDllName"=hex(2):25,00,53,00,79,00,73,00,74,00,65,00,6d,00,52,00,6f,
00,\ 6f,00,74,00,25,00,5c,00,53,00,79,00,73,00,74,00,65,00,6d,00,33,00,32,
00,5c,\
00,77,00,73,00,68,00,69,00,70,00,36,00,2e,00,64,00,6c,00,6c,00,00,00
"MaxSockAddrLength"=dword:0000001c "MinSockAddrLength"=dword:0000001c
"Mapping"=hex:08,00,00,00,03,00,00,00,17,00,00,00,01,00,00,00,06,00,00,00,
17,\ 00,00,00,01,00,00,00,00,00,00,00,17,00,00,00,00,00,00,00,06,00,00,00,
17,00,\ 00,00,02,00,00,00,11,00,00,00,17,00,00,00,02,00,00,00,00,00,00,00,
17,00,00,\ 00,00,00,00,00,11,00,00,00,17,00,00,00,03,00,00,00,ff,00,00,00,
17,00,00,00,\ 03,00,00,00,00,00,00,00


What server are you using? If you are using Server 2008, you can do it with
the in-built Group Policy Preferences. If you are using Server 2003, you
will have to search for something that has been bought and borged by
Microsoft. Read this:

http://blog.stealthpuppy.com/group-policy/why-are-you-still-writing-adm-templates

ss.
 
Thank You so much I overlooked the Group Policy option, I was told it was a
possibility but didn't see how initial. This saves me a lot of time trying
piece togther a script of some sort. Thansk again it works perfectly.

Synapse Syndrome said:
lca1630 said:
Hello,

I am interested in a solution for distributing a registry key to my vista
users that disables IPV6. My scripting knowledge is limited and so I was
wondering if anyone had an idea of a script that would work to distribute
this registry key below via GPO to my users:

Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters]
"Dhcpv6DUID"=hex:00,01,00,01,0f,e1,a4,18,00,0c,29,7c,94,36
"DisabledComponents"=dword:ffffffff

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters\In
terfaces]

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters\In
terfaces\{14782f48-c147-4378-863a-184700b4c8c4}]
"Dhcpv6Iaid"=dword:0e001372 "Dhcpv6State"=dword:00000000

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters\In
terfaces\{31db1df5-a3a8-44a5-8ab0-d0b3a6209736}]
"Dhcpv6Iaid"=dword:0f000c29 "Dhcpv6State"=dword:00000000

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters\In
terfaces\{8978d4f1-d9ec-471e-971a-a8023a4e510a}]
"Dhcpv6Iaid"=dword:0c000000 "Dhcpv6State"=dword:00000000

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters\In
terfaces\{b9cf3462-a989-4e5d-b674-47c2a15762c0}]
"Dhcpv6Iaid"=dword:0c001372 "Dhcpv6State"=dword:00000000

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters\In
terfaces\{d9b77aba-9aa6-49e3-86e6-d8a6e17a9079}]
"Dhcpv6Iaid"=dword:06001422 "Dhcpv6State"=dword:00000000

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters\In
terfaces\{fbd4dbdd-2062-442f-ac67-6c0379fc9700}]
"Dhcpv6Iaid"=dword:07001422 "Dhcpv6State"=dword:00000000

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters\Wi
nsock] "UseDelayedAcceptance"=dword:00000000
"HelperDllName"=hex(2):25,00,53,00,79,00,73,00,74,00,65,00,6d,00,52,00,6f,
00,\ 6f,00,74,00,25,00,5c,00,53,00,79,00,73,00,74,00,65,00,6d,00,33,00,32,
00,5c,\
00,77,00,73,00,68,00,69,00,70,00,36,00,2e,00,64,00,6c,00,6c,00,00,00
"MaxSockAddrLength"=dword:0000001c "MinSockAddrLength"=dword:0000001c
"Mapping"=hex:08,00,00,00,03,00,00,00,17,00,00,00,01,00,00,00,06,00,00,00,
17,\ 00,00,00,01,00,00,00,00,00,00,00,17,00,00,00,00,00,00,00,06,00,00,00,
17,00,\ 00,00,02,00,00,00,11,00,00,00,17,00,00,00,02,00,00,00,00,00,00,00,
17,00,00,\ 00,00,00,00,00,11,00,00,00,17,00,00,00,03,00,00,00,ff,00,00,00,
17,00,00,00,\ 03,00,00,00,00,00,00,00


What server are you using? If you are using Server 2008, you can do it with
the in-built Group Policy Preferences. If you are using Server 2003, you
will have to search for something that has been bought and borged by
Microsoft. Read this:

http://blog.stealthpuppy.com/group-policy/why-are-you-still-writing-adm-templates

ss.
 
Back
Top