Random thoughts of an Exchange PFE

This blog is my effort to document and share interesting details about Exchange Server as I come across them in field, lab and community.

How to revert changes made by Enable-PSRemoting?

How to revert changes made by Enable-PSRemoting?

  • Comments 3
  • Likes

Have you ever been in a situation where you have PowerShell Remoting enabled and you need to put the configuration back the way it was before Enable-PSRemoting was run?

While it might seem that just running Disable-PSRemoting should suffice, it turns out to be a bit more work than you would think. Let’s take a look.

When you run Disable-PSRemoting, here’s what it tells you:

PS C:\Windows\system32> Disable-PSRemoting
WARNING: Disabling the session configurations does not undo all the changes made by the Enable-PSRemoting or
Enable-PSSessionConfiguration cmdlet. You might have to manually undo the changes by following these steps.
    1. Stop and disable the WinRM service.
    2. Delete the listener that accepts requests on any IP address.
    3. Disable the firewall exceptions for WS-Management communications.
    4. Restore the value of the LocalAccountTokenFilterPolicy to 0, which restricts remote access to members of the
Administrators group on the computer.

As you see, the steps are pretty well documented. However, if you are like me, you would follow the order mentioned, and find out later that it’s a problem. Let’s see why.

  1. You stopped and disabled the WinRM service.
  2. You try to delete the listener using winrm commands only to find out the error:
WSManFault
    Message = The client cannot connect to the destination specified in the request. Verify that the service on the dest
ination is running and is accepting requests. Consult the logs and documentation for the WS-Management service running o
n the destination, most commonly IIS or WinRM. If the destination is the WinRM service, run the following command on the
 destination to analyze and configure the WinRM service: "winrm quickconfig".

Well guess what, you just disabled the service. How will winrm commands connect to delete the listener?

So here’s what you need to do:

  1. Delete the listener that accepts requests on any IP address, Usually this means listener with Address = * and Port = 5985 that is using Transport = HTTP. you can verify this by running
    winrm enumerate winrm/config/listener
    You can delete it by running
    winrm delete winrm/config/listener?address=*+transport=HTTP
  2. Disable firewall exceptions. This is pretty simple. Just uncheck Windows Remote Management checkbox for desired (or all) profiles. And if picture is worth thousand words, here it is:

    SNAGHTML2c896ffb

    Now if you fancy why I didn’t use PowerShell to disable firewall exceptions, I will point you to this link and let you figure out how to do that.

  3. Order doesn’t matter after step 1. So let’s disable service now. Do you need me to tell you how? Ok if you seriously want to know how, here’s how:
    Stop-Service winrm
    Set-Service -Name winrm -StartupType Disabled
    I know you will now ask why not just run:
    Set-Service -Name winrm -StartupType Disabled -Status Stopped
    that's because if you do that you will get this error:
    Set-Service : Cannot stop service 'Windows Remote Management (WS-Management) (winrm)' 
    because it is dependent on other services.
  4. Now, if you are still with me, this is last step left. Set value of LocalAccountTokenFilterPolicy to 0. You can do that by running:
    Set-ItemProperty -Path HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System -Name LocalAccountTokenFilterPolicy -Value 0 -Type DWord
    This will create the value if it doesn't exist and will change it if it does. If you are curious as to why this value and why 0, it's documented here so I will let you read it.

Oh, and one more thing (I wonder who does that remind you of!) make sure you do all this from elevated PowerShell. But you already knew that, didn’t you?

Comments
  • Very useful. Thanks for sharing.

  • Thanks

Your comment has been posted.   Close
Thank you, your comment requires moderation so it may take a while to appear.   Close
Leave a Comment