Glossary of terms used on this site

Search for glossary terms (regular expression allowed)
Begin with Contains Exact term

Glossaries

Term Definition
CACLS

CACLS.exe

Display or modify Access Control Lists (ACLs) for files and folders. For Vista and greater use icacls.

Access Control Lists apply only to files stored on an NTFS formatted drive, each ACL determines which users (or groups of users) can read or edit the file. When a new file is created it normally inherits ACL's from the folder where it was created.

 
CALL

CALL

Call one batch program from another, or call a subroutine.

 
CD

CD

Change Directory - Select a Folder (and drive)

 
CERTREQ

CERTREQ

Request certificate from a certification authority (CA), retrieve a response to a previous request from a CA, create a new request from an .inf file, accept and install a response to a request, construct a cross-certification or qualified subordination request from an existing CA certificate or request, or to sign a cross-certification or qualified subordination request.

 
CERTUTIL

CERTUTIL (2008 R2/Server 2012)

Dump and display certification authority (CA) configuration information, configure Certificate Services, back up and restore CA components, verify certificates, key pairs or certificate chains. A subset of these CERTUTIL commands are also supported under Server 2003 or by installing the Server 2003 Administration Tools.

Syntax: Dump certificate file information CertUtil [Options] [-dump] [File] Options: [-f] [-silent] [-split] [-p Password] [-t Timeout] Parse ASN.1 file CertUtil [Options] -asn File  Options: [-f] [decoding_type] Decode a Hex-encoded file to binary CertUtil [-f] [-v] -decodehex InFile OutFile  Decode Base64-encoded file to binary CertUtil [-f] [-v] -decode InFile OutFile Encode a binary file to Base64 CertUtil [-f] [-v] -encode InFile OutFile [-UnicodeText] Encode a file as Hex CertUtil [-f] [-v] -encodehex InFile OutFile Hex encoded files are around 3x larger than base64, in most cases -encode is more useful. Deny pending request CertUtil [Options] -deny RequestId  Options: [-v] [-config Machine\CAName] Resubmit pending request CertUtil [Options] -resubmit RequestId Options: [-v] [-config Machine\CAName] Set attributes for pending request CertUtil [Options] -setattributes RequestId AttributeString Options: [-v] [-config Machine\CAName] RequestId: Numeric Request Id of pending request  AttributeString: Request Attribute name and value pairs Names and values are colon separated. Multiple name, value pairs are newline separated. Example: "CertificateTemplate:UserEMail:User@Domain.com" Each "" sequence is converted to a newline separator. Set extension for pending request CertUtil [Options] -setextension RequestId ExtensionName Flags {Long | Date | String | @InFile} Options: [-v] [-config Machine\CAName] RequestId: Numeric Request Id of a pending request ExtensionName: ObjectId string of the extension  Flags: 0 is recommended. 1 makes the extension critical, 2 disables it, 3 does both. If the last parameter is numeric, it is taken as a Long. If it can be parsed as a date, it is taken as a Date. If it starts with '@', the rest of the token is the filename containing binary data or an ascii-text hex dump. Anything else is taken as a String. Revoke Certificate CertUtil [Options] -revoke SerialNumber [Reason] Options: [-v] [-config Machine\CAName] SerialNumber: Comma separated list of certificate serial numbers to revoke  Reason: numeric or symbolic revocation reason 0: CRL_REASON_UNSPECIFIED: Unspecified (default) 1: CRL_REASON_KEY_COMPROMISE: Key Compromise 2: CRL_REASON_CA_COMPROMISE: CA Compromise 3: CRL_REASON_AFFILIATION_CHANGED: Affiliation Changed 4: CRL_REASON_SUPERSEDED: Superseded 5: CRL_REASON_CESSATION_OF_OPERATION: Cessation of Operation 6: CRL_REASON_CERTIFICATE_HOLD: Certificate Hold 8: CRL_REASON_REMOVE_FROM_CRL: Remove From CRL -1: Unrevoke: Unrevoke Display current certificate disposition CertUtil [Options] -isvalid SerialNumber | CertHash Options: [-v] [-config Machine\CAName] Get default configuration string CertUtil [Options] -getconfig Options: [-v] [-config Machine\CAName] Ping Active Directory Certificate Services Request interface CertUtil [Options] -ping [MaxSecondsToWait | CAMachineList] Options: [-v] [-config Machine\CAName] Request interface CAMachineList -- Comma-separated CA machine name list For a single machine, use a terminating comma Displays the site cost for each CA machine Ping Active Directory Certificate Services Admin interface CertUtil [Options] -pingadmin [MaxSecondsToWait | CAMachineList] Options: [-v] [-config Machine\CAName] Request interface CAMachineList -- Comma-separated CA machine name list For a single machine, use a terminating comma Displays the site cost for each CA machine Display CA Information CertUtil [Options] -CAInfo [InfoName [Index | ErrorCode]] Options: [-v] [-config Machine\CAName] InfoName -- indicates the CA property to display. Use "*" for all properties. Index -- optional zero-based property index ErrorCode -- numeric error code [-f] [-split] [-config Machine\CAName] Retrieve the CA's certificate  CertUtil [Options] -ca.cert OutCACertFile [Index] Options: [-f] [-v] [-split] [-config Machine\CAName] OutCACertFile: output file Index: CA certificate renewal index (defaults to most recent) Retrieve the CA's certificate chain  CertUtil [Options] -ca.chain OutCACertChainFile [Index] Options: [-f] [-v] [-split] [-config Machine\CAName] OutCACertChainFile: output file Index: CA certificate renewal index (defaults to most recent) Get CRL  CertUtil [Options] -GetCRL OutFile [Index] [delta] Options: [-f] [-v] [-split] [-config Machine\CAName] Index: CRL index or key index (defaults to CRL for newest key) delta: delta CRL (default is base CRL) Publish new CRLs [or delta CRLs only] CertUtil [Options] -CRL [dd:hh | republish] [delta] Options: [-v] [-split] [-config Machine\CAName] dd:hh -- new CRL validity period in days and hours republish -- republish most recent CRLs delta -- delta CRLs only (default is base and delta CRLs) Shutdown Active Directory Certificate Services CertUtil [Options] -shutdown Options: [-v] [-config Machine\CAName] Install Certification Authority certificate  CertUtil [Options] -installCert [CACertFile] Options: [-f] [-v] [-silent] [-config Machine\CAName] Renew Certification Authority certificate  CertUtil [Options] -renewCert [ReuseKeys] [Machine\ParentCAName] Options: [-f] [-v] [-silent] [-config Machine\CAName] Use -f to ignore an outstanding renewal request, and generate a new request. Dump Certificate Schema CertUtil [Options] -schema [Ext | Attrib | CRL] Options: [-v] [-split] [-config Machine\CAName] Ext: Extension table Attrib: Attribute table CRL: CRL table Defaults to Request and Certificate table Dump Certificate View CertUtil [Options] -view [Queue | Log | LogFail | Revoked | Ext | Attrib | CRL] [csv] Options: [-v] [-silent] [-split] [-config Machine\CAName] [-restrict RestrictionList] [-out ColumnList] Queue: Request queue Log: Issued or revoked certificates, plus failed requests  LogFail: Failed requests  Revoked: Revoked certificates  Ext: Extension table  Attrib: Attribute table  CRL: CRL table  csv: Output as Comma Separated Values  To display the StatusCode column for all entries: -out StatusCode  To display all columns for the last entry: -restrict "RequestId==$"  To display RequestId and Disposition for three requests: -restrict "RequestId>=37,RequestId<40" -out "RequestId,Disposition" To display Row Ids and CRL Numbers for all Base CRLs: -restrict "CRLMinBase=0" -out "CRLRowId,CRLNumber" CRL  To display Base CRL Number 3: -v -restrict "CRLMinBase=0,CRLNumber=3" -out "CRLRawCRL" CRL To display the entire CRL table: CRL Use "Date[+|-dd:hh]" for date restrictions Use "now+dd:hh" for a date relative to the current time Dump Raw Database CertUtil [Options] -db Options: [-v] [-config Machine\CAName] [-restrict RestrictionList] [-out ColumnList] Delete server database row CertUtil [Options] -deleterow RowId | Date [Request | Cert | Ext | Attrib | CRL]  Options: [-f] [-v] [-config Machine\CAName] Request: Failed and pending requests (submission date)  Cert: Expired and revoked certificates (expiration date) Ext: Extension table Attrib: Attribute table CRL: CRL table (expiration date)  To delete failed and pending requests submitted by January 22, 2001: 1/22/2001 Request  To delete all certificates that expired by January 22, 2001: 1/22/2001 Cert  To delete the certificate row, attributes and extensions for RequestId 37: 37  To delete CRLs that expired by January 22, 2001: 1/22/2001 CRL [-f] [-config Machine\CAName] Backup Active Directory Certificate Services CertUtil [Options] -backup BackupDirectory [Incremental] [KeepLog] Options: [-f] [-v] [-config Machine\CAName] [-p Password] BackupDirectory: directory to store backed up data Incremental: perform incremental backup only (default is full backup) KeepLog: preserve database log files (default is to truncate log files) Backup Active Directory Certificate Services database CertUtil [Options] -backupDB BackupDirectory [Incremental] [KeepLog] Options: [-f] [-v] [-config Machine\CAName] BackupDirectory: directory to store backed up database files Incremental: perform incremental backup only (default is full backup) KeepLog: preserve database log files (default is to truncate log files) Backup Active Directory Certificate Services certificate and private key CertUtil [Options] -backupKey BackupDirectory Options: [-f] [-v] [-config Machine\CAName] [-p Password] [-t Timeout] BackupDirectory: directory to store backed up PFX file Restore Active Directory Certificate Services CertUtil [Options] -restore BackupDirectory Options: [-f] [-v] [-config Machine\CAName] [-p Password] BackupDirectory: directory containing data to be restored Restore Active Directory Certificate Services database CertUtil [Options] -restoreDB BackupDirectory Options: [-f] [-v] [-config Machine\CAName] [-p Password] BackupDirectory: directory containing database files to be restored  Restore Active Directory Certificate Services certificate and private key CertUtil [Options] -restoreKey BackupDirectory | PFXFile Options: [-f] [-v] [-config Machine\CAName] [-p Password] BackupDirectory: directory containing PFX file to be restored PFXFile: PFX file to be restored  Import certificate and private key CertUtil [Options] -importPFX [CertificateStoreName] PFXFile [Modifiers] [-csp Provider] Options: [-f] [-v] [-user] [-p Password] CertificateStoreName: Certificate store name. See -store.  PFXFile: PFX file to be imported  Modifiers: Comma separated list of one or more of the following: AT_SIGNATURE: Change the KeySpec to Signature AT_KEYEXCHANGE: Change the KeySpec to Key Exchange NoExport: Make the private key non-exportable NoCert: Do not import the certificate NoChain: Do not import the certificate chain NoRoot: Do not import the root certificate Protect: Protect keys with password NoProtect: Do not password protect keys Defaults to personal machine store.  Display dynamic file List CertUtil [Options] -dynamicfilelist Options: [-v] [-config Machine\CAName] Display database locations CertUtil [Options] -databaselocations Options: [-v] [-config Machine\CAName] Generate and display cryptographic hash over a file. CertUtil [Options] -hashfile InFile [HashAlgorithm] Options: [-v] Dump certificate store  CertUtil [Options] -store [CertificateStoreName [CertId [OutputFile]]] Options: [-f] [-v] [-enterprise] [-user] [-GroupPolicy] [-silent] [-split] [-dc DCName] CertificateStoreName: Certificate store name. CertId: Certificate or CRL match token. This can be a serial number, an SHA-1 certificate, CRL, CTL or public key hash, a numeric cert index (0, 1, and so on), a numeric CRL index (.0, .1, and so on), a numeric CTL index (..0, ..1, and so on), a public key, signature or extension ObjectId, a certificate subject Common Name, an e-mail address, UPN or DNS name, a key container name or CSP name, a template name or ObjectId, an EKU or Application Policies ObjectId, or a CRL issuer Common Name. These can result in multiple matches. OutputFile: file to save matching cert  Use -user to access a user store instead of a machine store.  Use -enterprise to access a machine enterprise store.  Use -service to access a machine service store.  Use -grouppolicy to access a machine group policy store. Add certificate to store CertUtil [Options] -addstore CertificateStoreName InFile Options: [-f] [-v] [-enterprise] [-user] [-GroupPolicy] [-dc DCName] CertificateStoreName: Certificate store name. See -store.  InFile: Certificate or CRL file to add to store.  Delete certificate from store CertUtil [Options] -delstore CertificateStoreName CertId Options: [-f] [-v] [-enterprise] [-user] [-GroupPolicy] [-dc DCName] CertificateStoreName: Certificate store name. See -store. CertId: Certificate or CRL match token. See -store.  Verify certificate in store CertUtil [Options] -verifystore CertificateStoreName [CertId] Options: [-f] [-v] [-enterprise] [-user] [-GroupPolicy] [-silent] [-split] [-dc DCName] [-t Timeout] CertificateStoreName: Certificate store name. See -store. CertId: Certificate or CRL match token. See -store. Repair key association or update certificate properties or key security descriptor CertUtil [Options] -repairstore CertificateStoreName CertIdList [PropertyInfFile | SDDLSecurityDescriptor] Options: [-f] [-v] [-enterprise] [-user] [-GroupPolicy] [-silent] [-split] [-csp Provider] CertificateStoreName: Certificate store name. See -store. CertIdList: comma separated list of Certificate or CRL match tokens. See -store CertId description. PropertyInfFile -- INF file containing external properties: Dump certificate store CertUtil [Options] -viewstore [CertificateStoreName [CertId [OutputFile]]] Options: [-f] [-v] [-enterprise] [-user] [-GroupPolicy] [-dc DCName] CertificateStoreName: Certificate store name. CertId: Certificate or CRL match token. This can be a serial number, an SHA-1 certificate, CRL, CTL or public key hash, a numeric cert index (0, 1, and so on), a numeric CRL index (.0, .1, and so on), a numeric CTL index (..0, ..1, and so on), a public key, signature or extension ObjectId, a certificate subject Common Name, an e-mail address, UPN or DNS name, a key container name or CSP name, a template name or ObjectId, an EKU or Application Policies ObjectId, or a CRL issuer Common Name. These can result in multiple matches. OutputFile: file to save matching cert  Use -user to access a user store instead of a machine store.  Use -enterprise to access a machine enterprise store.  Use -service to access a machine service store.  Use -grouppolicy to access a machine group policy store. Delete certificate from store CertUtil [Options] -viewdelstore [CertificateStoreName [CertId [OutputFile]]]  Options: [-f] [-v] [-enterprise] [-user] [-GroupPolicy] [-dc DCName] CertificateStoreName: Certificate store name. CertId: Certificate or CRL match token. This can be a serial number, an SHA-1 certificate, CRL, CTL or public key hash, a numeric cert index (0, 1, and so on), a numeric CRL index (.0, .1, and so on), a numeric CTL index (..0, ..1, and so on), a public key, signature or extension ObjectId, a certificate subject Common Name, an e-mail address, UPN or DNS name, a key container name or CSP name, a template name or ObjectId, an EKU or Application Policies ObjectId, or a CRL issuer Common Name. These can result in multiple matches. OutputFile: file to save matching cert  Use -user to access a user store instead of a machine store.  Use -enterprise to access a machine enterprise store.  Use -service to access a machine service store.  Use -grouppolicy to access a machine group policy store. Publish certificate or CRL to Active Directory CertUtil [Options] -dsPublish CertFile [NTAuthCA | RootCA | SubCA | CrossCA | KRA | User | Machine] Options: [-f] [-v] [-user] [-dc DCName] CertUtil [Options] -dsPublish CRLFile [DSCDPContainer [DSCDPCN]] [-f] [-user] [-dc DCName] Options: [-f] [-v] [-user] [-dc DCName] CertFile: certificate file to publish NTAuthCA: Publish cert to DS Enterprise store RootCA: Publish cert to DS Trusted Root store SubCA: Publish CA cert to DS CA object CrossCA: Publish cross cert to DS CA object KRA: Publish cert to DS Key Recovery Agent object User: Publish cert to User DS object Machine: Publish cert to Machine DS object CRLFile: CRL file to publish DSCDPContainer: DS CDP container CN, usually the CA machine name DSCDPCN: DS CDP object CN, usually based on the sanitized CA short name and key index Use -f to create DS object. Display AD templates CertUtil [Options] -ADTemplate [Template]  Options: [-f] [-v] [-user] [-ut] [-mt] [-dc DCName] Display Enrollment Policy templates  CertUtil [Options] -Template [Template]  Options: [-f] [-v] [-user] [-dc DCName] [-user] [-silent] [-PolicyServer URLOrId] [-Anonymous] [-Kerberos] [-ClientCertificate ClientCertId] [-UserName UserName] [-p Password] Display CAs for template CertUtil [Options] -TemplateCAs Template Options: [-f] [-v] [-user] [-dc DCName] Display templates for CA CertUtil [Options] -CATemplates [Template]  Options: [-f] [-v] [-user] [-ut] [-mt] [-config Machine\CAName] [-dc DCName] Set, Verify or Delete CA site names CertUtil [Options] -SetCASites [set] [Sitename] CertUtil [Options] -SetCASites verify [Sitename] CertUtil [Options] -SetCASites delete Options: [-f] [-v] [-config Machine\CAName] [-dc DCName] Use the -config option to target a single CA (Default is all CAs) Sitename is allowed only when targeting a single CA  Use -f to override validation errors for the specified Sitename Use -f to delete all CA site names Display, add or delete enrollment server URLs associated with a CA  CertUtil [Options] -enrollmentServerURL [URL AuthenticationType [Priority] [Modifiers]] CertUtil [Options] -enrollmentServerURL URL delete  Options: [-f] [-config Machine\CAName] [-dc DCName] AuthenticationType: Specify one of the following client authentication methods while adding a URL Kerberos: Use Kerberos SSL credentials UserName: Use named account for SSL credentials ClientCertificate: Use X.509 Certificate SSL credentials Anonymous: Use anonymous SSL credentials delete: deletes the specified URL associated with the CA Priority: defaults to '1' if not specified when adding a URL Modifiers -- Comma separated list of one or more of the following: AllowRenewalsOnly: Only renewal requests can be submitted to this CA via this URL AllowKeyBasedRenewal: Allow use of a certificate that has no associated account in the AD. This applies only with ClientCertificate and AllowRenewalsOnly Mode Display AD CAs CertUtil [Options] -ADCA [CAName] Options: [-f] [-split] [-dc DCName] Display Enrollment Policy CAs CertUtil [Options] -CA [CAName | TemplateName] Options: [-f] [-user] [-silent] [-split] [-PolicyServer URLOrId]  [-Anonymous] [-Kerberos] [-ClientCertificate ClientCertId] [-UserName UserName] [-p Password] Display Enrollment Policy CertUtil [Options] -Policy  Options: [-f] [-user] [-silent] [-split] [-PolicyServer URLOrId] [-Anonymous] [-Kerberos] [-ClientCertificate ClientCertId] [-UserName UserName] [-p Password] Display or delete Enrollment Policy Cache entries CertUtil [Options] -PolicyCache [delete]  Options: [-f] [-user] [-PolicyServer URLOrId] delete: delete Policy Server cache entries  -f: use -f to delete all cache entries Display, add or delete Credential Store entries CertUtil [Options] -CredStore [URL] CertUtil [Options] -CredStore URL add  CertUtil [Options] -CredStore URL delete Options: [-f] [-user] [-silent] [-Anonymous] [-Kerberos] [-ClientCertificate ClientCertId] [-UserName UserName] [-p Password] URL: target URL. Use * to match all entries. Use https://machine* to match a URL prefix. add: add a Credential Store entry. SSL credentials must also be specified. delete: delete Credential Store entries -f: use -f to overwrite an entry or to delete multiple entries.  Install default certificate templates CertUtil [Options] -InstallDefaultTemplates  Options: [-f] [-v] [-dc DCName] Display or delete URL cache entries CertUtil [Options] -URLCache [URL | CRL | * [delete]] Options: [-f] [-v] [-split] URL: Cached URL CRL: Operate on all cached CRL URLs only *: Operate on all cached URLs delete: Delete relevant URLs from the current user's local cache Use -f to force fetching a specific URL and updating the cache. -v : Will display the whole IE internet history and cache file locations (…\Content.IE5…) Pulse autoenrollment events CertUtil [Options] -pulse  Options: [-v] [-user] Display Active Directory computer object information CertUtil [Options] -MachineInfo DomainName\MachineName$  Options: [-v]  Display domain controller information CertUtil [Options] -DCInfo [Domain] [Verify | DeleteBad | DeleteAll] Options: [-f] [-v] [-user] [-urlfetch] [-dc DCName] [-t Timeout] Default is to display DC certs without verification. Display Enterprise CA information CertUtil [Options] -EntInfo DomainName\MachineName$ Options: [-f] [-v] [-user] Display CA information CertUtil [Options] -TCAInfo [DomainDN | -] Options: [-f] [-v] [-enterprise] [-user] [-urlfetch] [-dc DCName] [-t Timeout]  Display smart card information CertUtil [Options] -SCInfo [ReaderName [CRYPT_DELETEKEYSET]] Options: [-v] [-silent] [-split] [-urlfetch] [-t Timeout] CRYPT_DELETEKEYSET: Delete all keys on the smart card  Manage smart card root certificates CertUtil [Options] -SCRoots update [+][InputRootFile] [ReaderName] CertUtil [Options] -SCRoots save @OutputRootFile [ReaderName] CertUtil [Options] -SCRoots view [InputRootFile | ReaderName] CertUtil [Options] -SCRoots delete [ReaderName]  Options: [-f] [-split] [-p Password] Verify public/private key set CertUtil [Options] -verifykeys [KeyContainerName CACertFile] Options: [-f] [-v] [-user] [-silent] [-config Machine\CAName] KeyContainerName: key container name of the key to verify. Defaults to machine keys. Use -user for user keys. CACertFile: signing or encryption certificate file If no arguments are specified, each signing CA cert is verified against its private key. This operation can only be performed against a local CA or local keys.  Verify certificate, CRL or chain CertUtil [Options] -verify CertFile [ApplicationPolicyList | - [IssuancePolicyList]] CertUtil [Options] -verify CertFile [CACertFile [CrossedCACertFile]] CertUtil [Options] -verify CRLFile CACertFile [IssuedCertFile] CertUtil [Options] -verify CRLFile CACertFile [DeltaCRLFile] Options: [-f] [-v] [-enterprise] [-user] [-silent] [-split] [-urlfetch] [-t Timeout] CertFile: Certificate to verify Application PolicyList: optional comma separated list of required Application Policy ObjectIds IssuancePolicyList: optional comma separated list of required Issuance Policy ObjectIds CACertFile: optional issuing CA certificate to verify against  CrossedCACertFile: optional certificate cross-certified by CertFile CRLFile: CRL to verify IssuedCertFile: optional issued certificate covered by CRLFile DeltaCRLFile: optional delta CRL If ApplicationPolicyList is specified, chain building is restricted to chains valid for the specified Application Policies. If IssuancePolicyList is specified, chain building is restricted to chains valid for the specified Issuance Policies. If CACertFile is specified, fields in CACertFile are verified against CertFile or CRLFile. If CACertFile is not specified, CertFile is used to build and verify a full chain. If CACertFile and CrossedCACertFile are both specified, fields in CACertFile and CrossedCACertFile are verified against CertFile. If IssuedCertFile is specified, fields in IssuedCertFile are verified against CRLFile. If DeltaCRLFile is specified, fields in DeltaCRLFile are verified against CRLFile. Verify AuthRoot or Disallowed Certificates CTL CertUtil [Options] -verifyCTL CTLObject [CertDir] [CertFile]  Options: [-f] [-user] [-split] CTLObject: Identifies the CTL to verify: AuthRootWU: read AuthRoot CAB and matching certificates from the URL cache. Use -f to download from Windows Update instead. DisallowedWU: read Disallowed Certificates CAB and disallowed certificate store file from the URL cache. Use -f to download from Windows Update instead. AuthRoot: read registry cached AuthRoot CTL. Use
CHANGE

CHANGE

Change Terminal Server Session properties, use when installing software on a terminal server.

Syntax CHANGE USER /options CHANGE LOGON /options CHANGE PORT /optionsOptions: To change .INI file mapping: (administrator rights required) CHANGE USER /INSTALL Enable install mode. This command has to be run before installing any new software on a Terminal Server. This will create a .ini file for the application in the TS system directory. CHANGE USER /EXECUTE Enable execute mode (default) Run this when an installation is complete. CHANGE USER /QUERY Display current settings. To enable or disable terminal session logins: CHANGE LOGON /QUERY Query current terminal session login mode. CHANGE LOGON /ENABLE Enable user login from terminal sessions. CHANGE LOGON /DISABLE Disable user login from terminal sessions. To list or change COM port mappings for the current session. This can allow DOS applications to access high numbered ports e.g. COM12 CHANGE PORT portx=porty Map port x to port y. CHANGE PORT /D portx Delete mapping for port x. CHANGE PORT /QUERY Display current mapping ports.


How .ini files work:

Installing an application will create a .ini file in the TS system directory.

The first time a user runs the application, the application looks in the home directory for its .ini file. If none is found then Terminal Server will copy the .ini file from the system directory to the users home directory.

Each user will have a unique copy of the application's .ini file in their home directory.

To learn more about what happens when the system is put into install mode run CHANGE USER /?

The CHANGE command replaces CHGLOGON, CHGUSER, and CHGPORT from Citrix Winframe.

“There are two ways to slide easily through life; to believe everything or to doubt everything. Both ways save us from thinking” ~ Alfred Korzybski

Related:


Other Terminal Server commands
INSTSRV - Install an NT Service
LOGOFF - Log a user off
MSIEXEC - Microsoft Windows Installer
Q243202 - TS Session Management Tools
Equivalent bash command (Linux): who - Print all usernames currently logged in

ata-ad-slot="7649547908">
CHKDSK

chkdsk.exe

Check Disk - check and repair disk problems

 
CHKNTFS

CHKNTFS.exe

Check the NTFS file system with CHKDSK

CHOICE

CHOICE.exe

Accept user input to a batch file. Choice allows single key-presses to be captured from the keyboard.

 
CIPHER

CIPHER.exe

Encrypt or Decrypt files and folders.
Without parameters cipher will display the encryption state of the current folder and files.
NTFS volumes only.

 
CleanMgr

CLEANMGR.exe

Automated cleanup of Temp files, Internet files, downloaded files, recycle bin.

 
CLIP

CLIP.exe (Resource Kit / Windows 7)

Copy the result of any command to the Windows clipboard.

 
CLS

CLS

Clear the screen.

 
CMD

CMD.exe

Start a new CMD shell and (optionally) run a command/executable program.

CMDKEY

CMDKEY.exe (Windows 2003+)

Create, list or delete stored user names, passwords or credentials.