Jump to content

Recommended Posts

Posted

Our technical support AD credentials have changed passwords and now we are getting hundreds of machines trying to login with the configured AD account PowerShell User Impersonation credentials…locking the technician accounts. These machines are spread out at 19 separate locations and over 600 miles, at remote locations. How do we remotely modify the Runtime PowerShell user credentials on those machines?

I have tried uninstalling and then  reinstalling, but it absorbs the previous configuration…including the former PowerShell User credentials….I also tried calling tech support but was sent to voicemail. Help!

Local Setings where credentials were entered:

301648439_localsettings.JPG.a801b99d0a9e8e68fb415f07d7504366.JPG

Remote Settings, no ability to enter or modify PowerShell User:

318821179_remotesettings.JPG.15ac90ec4ef545cc819080f726f4a997.JPG

  • 1 month later...
  • Staff
Posted

Hi @Comissha,

I would suggest you to configure the PowerShell impersonation on one of your monitored systems manually and then you might use the PowerShell script to configure it on other required systems:

At first you will need to copy the value for the following registry keys and then use them in the following script:

PowerShellUserImpersonation
PowerShellUserImpersonationDomain
PowerShellUserImpersonationPassword
PowerShellUserImpersonationPasswordCtrl
PowerShellUserImpersonationUsername

Set-ItemProperty -Path "HKLM:\Software\MMSOFT Design\PC Monitor" -Name "PowerShellUserImpersonation" -Value "value here"
Set-ItemProperty -Path "HKLM:\Software\MMSOFT Design\PC Monitor" -Name "PowerShellUserImpersonationDomain" -Value "value here"
Set-ItemProperty -Path "HKLM:\Software\MMSOFT Design\PC Monitor" -Name "PowerShellUserImpersonationPassword" -Value "value here"
Set-ItemProperty -Path "HKLM:\Software\MMSOFT Design\PC Monitor" -Name "PowerShellUserImpersonationPasswordCtrl" -Value "value here"
Set-ItemProperty -Path "HKLM:\Software\MMSOFT Design\PC Monitor" -Name "PowerShellUserImpersonationUsername" -Value "value here"

  • 1 month later...
  • 2 weeks later...
  • Staff
Posted

Hi @Comissha,

My mistake, the batch script should do this.

REG ADD "HKLM\Software\MMSOFT Design\PC Monitor" /v PowerShellUserImpersonation /t REG_SZ /d value_here /f
REG ADD "HKLM\Software\MMSOFT Design\PC Monitor" /v PowerShellUserImpersonationDomain /t REG_SZ /d value_here /f
REG ADD "HKLM\Software\MMSOFT Design\PC Monitor" /v PowerShellUserImpersonationPassword /t REG_SZ /d value_here /f
REG ADD "HKLM\Software\MMSOFT Design\PC Monitor" /v PowerShellUserImpersonationPasswordCtrl /t REG_SZ /d value_here /f
REG ADD "HKLM\Software\MMSOFT Design\PC Monitor" /v PowerShellUserImpersonationUsername /t REG_SZ /d value_here /f

  • 4 months later...
Posted

Hi @Chris,

How would you set the "PowerShellUserImpersonationPassword" and "PowerShellUserImpersonationPasswordCtrl" across multiple hosts? You would need to use the same admin password across all hosts?

I'm guessing these are a hash result and hash function input?

Thanks,

  • 3 weeks later...
  • Staff
Posted

Hi @David,

If the name for the user and password for the Powershell Impersonation is different on each system, then you will need to configure it manually on each system.

And yes - the credentials are encrypted, but this encryption is not unique for each system, therefore if the credentials are the same, then you can copy these keys from one system to another.

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
×
×
  • Create New...