湛蓝之海 发表于 2021-11-3 23:31:44

windows服务器记录3389远程桌面IP策略

3389IP日志路径是C:\WINDOWS\PDPLOG\RDPlog.txt
程序代码

MD C:\WINDOWS\PDPLOG
echo date /t ^>^>RDPlog.txt >>C:\WINDOWS\PDPLOG\PdPLOG.CMD
echo time /t ^>^>RDPlog.txt >>C:\WINDOWS\PDPLOG\PdPLOG.CMD
echo netstat -n -p tcp ^| find ":3389"^>^>RDPlog.txt >>C:\WINDOWS\PDPLOG\PdPLOG.CMD
echo start Explorer >>C:\WINDOWS\PDPLOG\PdPLOG.CMD

:: 添加用户每次进入远程桌面时自动记录下来所用IP,可用来发现黑客踪迹!
REG ADD "HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Terminal Server\WinStations\RDP-Tcp" /v fInheritInitialProgram /t REG_DWORD /d "00000000" /f
REG ADD "HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Terminal Server\WinStations\RDP-Tcp" /v WorkDirectory /t REG_SZ /d C:\WINDOWS\PDPLOG\ /f
REG ADD "HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Terminal Server\WinStations\RDP-Tcp" /v InitialProgram /t REG_SZ /d "C:\WINDOWS\PDPLOG\PdPLOG.CMD" /f
REG ADD "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v fInheritInitialProgram /t REG_DWORD /d "00000000" /f
REG ADD "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v WorkDirectory /t REG_SZ /d C:\WINDOWS\PDPLOG\ /f
REG ADD "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v InitialProgram /t REG_SZ /d "C:\WINDOWS\PDPLOG\PdPLOG.CMD" /f

Echo 记录远程桌面IP策略添加完毕! 请按任意键退出!
PAUSE >nul

https://www.uoften.com/serverhost/winhost/20180415/80452.html
页: [1]
查看完整版本: windows服务器记录3389远程桌面IP策略