Not ordered yet…

Windows Admin center


You might need to provide permission using the below instruction.

1. Click Start -> Run -> Type -> dcomcnfg, expand Component Services -> Computers -> My Computer -> DCOM Config.
2. Click View -> Detail -> Now you will get Application Name and Application ID in right side.
3. Scroll down and find the application ID {AD65A69D-3831-40D7-9629-9B0B50A93843} -> Right Click -> Properties and select the Security tab.
3. Click Customize under "Launch & Activation Permission" -> click Edit -> Add in the account NT AUTHORITY\SYSTEM and set local launch and local activation.
4. Restart the application Service linked to this Application ID or restart the server and monitor


In Powershell

Get-WindowsOptionalFeature -Online -FeatureName *SNMP*

Enable-WindowsOptionalFeature -Online -FeatureName "SNMP" -All

Get-Service -Name "SMTP"

Not yet sorted

This enables everything IF the machine has a Certificate

Set-WSManQuickConfig -UseSSL

but: this machine does not have an appropriate certificate. To be used for SSL, a 
certificate must have a CN matching the hostname, be appropriate for Server Authentication, and not be expired, revoked, or self-signed.

winrm e winrm/config/listener

winrm get winrm/config/client/auth
winrm get winrm/config/Service/auth

(Get-PSSessionConfiguration -Name Microsoft.PowerShell).Permission

Get-ChildItem -Path HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System

“Set-ItemProperty –Path HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System –Name  LocalAccountTokenFilterPolicy –Value 1 –Type DWord”
Get-ItemProperty -Path HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System -Name LocalAccountTokenFilterPolicy

Get-ChildItem -Path HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System

Policies - Administrative Templates - Windows Components - Windows Remote Management (WinRM) - WinRM Client
"Trusted Hosts": Enabled, TrustedHostsList: Must be the Domain Controller FQDN