en-US
en-US
en-US
en-US
en-US
en-US
Primary
1
350
2
Primary
true
true
NTFS
1
1
NTFS
C
2
2
0
true
/IMAGE/NAME
Windows Server 2012 R2 SERVERHYPERCORE
0
2
OnError
true
Vagrant
Vagrant
false
vagrant-2012-r2
Pacific Standard Time
true
false
false
true
true
vagrant
true
true
vagrant
cmd.exe /c powershell -Command "Set-ExecutionPolicy -ExecutionPolicy RemoteSigned -Force"
Set Execution Policy 64 Bit
1
true
C:\Windows\SysWOW64\cmd.exe /c powershell -Command "Set-ExecutionPolicy -ExecutionPolicy RemoteSigned -Force"
Set Execution Policy 32 Bit
2
true
cmd.exe /c winrm quickconfig -q
winrm quickconfig -q
3
true
cmd.exe /c winrm quickconfig -transport:http
winrm quickconfig -transport:http
4
true
cmd.exe /c winrm set winrm/config @{MaxTimeoutms="1800000"}
Win RM MaxTimoutms
5
true
cmd.exe /c winrm set winrm/config/winrs @{MaxMemoryPerShellMB="800"}
Win RM MaxMemoryPerShellMB
6
true
cmd.exe /c winrm set winrm/config/service @{AllowUnencrypted="true"}
Win RM AllowUnencrypted
7
true
cmd.exe /c winrm set winrm/config/service/auth @{Basic="true"}
Win RM auth Basic
8
true
cmd.exe /c winrm set winrm/config/client/auth @{Basic="true"}
Win RM client auth Basic
9
true
cmd.exe /c winrm set winrm/config/listener?Address=*+Transport=HTTP @{Port="5985"}
Win RM listener Address/Port
10
true
cmd.exe /c netsh advfirewall firewall set rule group="remote administration" new enable=yes
Win RM adv firewall enable
11
true
cmd.exe /c netsh firewall add portopening TCP 5985 "Port 5985"
Win RM port open
12
true
cmd.exe /c net stop winrm
Stop Win RM Service
13
true
cmd.exe /c sc config winrm start= auto
Win RM Autostart
14
true
cmd.exe /c net start winrm
Start Win RM Service
15
true
%SystemRoot%\System32\reg.exe ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ /v HideFileExt /t REG_DWORD /d 0 /f
16
Show file extensions in Explorer
%SystemRoot%\System32\reg.exe ADD HKCU\Console /v QuickEdit /t REG_DWORD /d 1 /f
17
Enable QuickEdit mode
%SystemRoot%\System32\reg.exe ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ /v Start_ShowRun /t REG_DWORD /d 1 /f
18
Show Run command in Start Menu
%SystemRoot%\System32\reg.exe ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ /v StartMenuAdminTools /t REG_DWORD /d 1 /f
19
Show Administrative Tools in Start Menu
%SystemRoot%\System32\reg.exe ADD HKLM\SYSTEM\CurrentControlSet\Control\Power\ /v HibernateFileSizePercent /t REG_DWORD /d 0 /f
20
Zero Hibernation File
%SystemRoot%\System32\reg.exe ADD HKLM\SYSTEM\CurrentControlSet\Control\Power\ /v HibernateEnabled /t REG_DWORD /d 0 /f
21
Disable Hibernation Mode
cmd.exe /c wmic useraccount where "name='vagrant'" set PasswordExpires=FALSE
22
Disable password expiration for vagrant user
cmd.exe /c a:\microsoft-updates.bat
98
Enable Microsoft Updates
cmd.exe /c C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -File a:\win-updates.ps1
Install Windows Updates
100
true
true
true
true
true
true
Home
1
vagrant
true
vagrant
true
administrators
Vagrant
vagrant
Vagrant User
false