Not ordered yet…
Windows Admin center
https://www.microsoft.com/en-us/windows-server
Dcom/COM+
You might need to provide permission using the below instruction.
1. Click Start -> Run -> Type -> dcomcnfg, expand Component Services -> Computers -> My Computer -> DCOM Config.
2. Click View -> Detail -> Now you will get Application Name and Application ID in right side.
3. Scroll down and find the application ID {AD65A69D-3831-40D7-9629-9B0B50A93843} -> Right Click -> Properties and select the Security tab.
3. Click Customize under "Launch & Activation Permission" -> click Edit -> Add in the account NT AUTHORITY\SYSTEM and set local launch and local activation.
4. Restart the application Service linked to this Application ID or restart the server and monitor
Random
In Powershell
Get-WindowsOptionalFeature -Online -FeatureName *SNMP*
Enable-WindowsOptionalFeature -Online -FeatureName "SNMP" -All
Get-Service -Name "SMTP"
Not yet sorted
This enables everything IF the machine has a Certificate
Set-WSManQuickConfig -UseSSL
but: this machine does not have an appropriate certificate. To be used for SSL, a
certificate must have a CN matching the hostname, be appropriate for Server Authentication, and not be expired, revoked, or self-signed.
winrm e winrm/config/listener
winrm get winrm/config/client/auth
winrm get winrm/config/Service/auth
(Get-PSSessionConfiguration -Name Microsoft.PowerShell).Permission
Get-ChildItem -Path HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
“Set-ItemProperty –Path HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System –Name LocalAccountTokenFilterPolicy –Value 1 –Type DWord”
Get-ItemProperty -Path HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System -Name LocalAccountTokenFilterPolicy
Get-ChildItem -Path HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
Policies - Administrative Templates - Windows Components - Windows Remote Management (WinRM) - WinRM Client
"Trusted Hosts": Enabled, TrustedHostsList: Must be the Domain Controller FQDN