1001 Secrets for Windows NT Registry
(Publisher: 29th Street Press)
Author(s): Tim Daniels
ISBN: 1882419685
Publication Date: 12/01/97

Previous Table of Contents Next


I-181 During installation, NT opted to use a slow drive for your print spooling. You have recently installed a bigger and faster drive and want to change the drive NT uses for print spooling By default, NT uses the %systemroot%\system32\spool folder. The following registry entry lets you specify an alternate path for all printers. Change the value for DefaultSpoolDirectory under the Printers key to your new path and directory.

Hive: HKEY_LOCAL_MACHINE
Key: System\CurrentControlSet\Control\Print\Printers
Value Name: DefaultSpoolDirectory
Data Type: REG_SZ
Value: <path>

Security

I-182 Are you worried that someone will see who logged into a system last? This registry entry disables that feature.

Hive: HKEY_LOCAL_MACHINE
Key: Software\Microsoft\WindowsNT\CurrentVersion\WinLogin

Add the following value under the WinLogin

Value Name: DontDisplayLastUserName
Data Type: REG_DWORD
Value: 1

Make sure you restart the machine for these changes to take effect.

I-183 You want to add a corporate message or disclaimer before people log on to their machines. The next two registry entries let you display a message before the user logs on.

Hive: HKEY_LOCAL_MACHINE
Key: Software\Microsoft\WindowsNT\CurrentVersion\Winlogon

Change the following values under the Winlogon key.

Value Name: LegalNoticeText
Data Type: REG_SZ
Value: “Text you want displayed before the user logs on”
I-184 Value Name: LegalNoticeCaption
Data Type: REG_SZ
Value: “Text you want displayed on the title bar of the dialog box”

I-185 If you have a Windows NT machine and you don’t really care about security, you can have the system log on for you automatically by modifying or adding the following registry entries. Set the DefaultDomain and the DefaultUserName to the domain and user name that you want the system to use to log on.

Hive: HKEY_LOCAL_MACHINE
Key: Software\Microsoft\WindowsNT\CurrentVersion\WinLogin
Value Name: DefaultDomainName
Data Type: REG_SZ
Value: <domain name>

Hive: HKEY_LOCAL_MACHINE
Key: Software\Microsoft\WindowsNT\CurrentVersion\WinLogin
Value Name: DefaultUserName
Data Type: REG_SZ
Value: <username>

Next, add these two values:

Hive: HKEY_LOCAL_MACHINE
Key: Software\Microsoft\WindowsNT\CurrentVersion\WinLogin
Value Name: DefaultPassword
Data Type: REG_SZ
Value: <password>

Hive: HKEY_LOCAL_MACHINE
Key: Software\Microsoft\WindowsNT\CurrentVersion\WinLogin
Value Name: AutoAdminLogon
Data Type: REG_SZ
Value: 1

Be sure to set the AutoAdminLogon value to 1. Remember, your system is now quite insecure. Anyone with access to the registry can read the password.

Novell 4.0

I-186 If you have NetWare 4.0 servers on a network with Windows NT servers and you’re trying to synchronize user accounts via the Directory Service Manager for NetWare (DSMN), you may run into problems. First, make sure your NetWare 4.0 server is running in bindery emulation mode, then add the following registry value:

Hive: HKEY_LOCAL_MACHINE
Key: System\CurrentControlSet\Services\MSSYNC\parameters
Value Name: Allow4X
Data Type: REG_DWORD
Value: 1

Restart the machine for this change to take effect.

Logon Scripts

I-187 If your logon scripts aren’t working correctly, you may want to verify the following value on your server — it’s the fully qualified path to the directory where the Logon Scripts are stored.

Hive: HKEY_LOCAL_MACHINE
Key: System\CurrentControlSet\Services\NetLogon\Parameters
Value Name: Scripts
Data Type: REG_MULTI_SZ
Value: <fully qualified pathname>

Domain Controllers

I-188 If you need to verify the list of trusted domains on a machine from a remote location, look at the following registry value.

Hive: HKEY_LOCAL_MACHINE
Key: System\CurrentControlSet\Services\NetLogon\Parameters
Value Name: TrustedDomainList
Data Type: REG_MULTI_SZ
Value: <any list of valid domain names>


Previous Table of Contents Next