![]() ![]() As always with Registry edits, take appropriate precautions, such as exporting the containing key before changing any values, and bowing deferentially in the direction of Redmond, Washington. These will tell you which processes are opening and closing files, checking the Registry and so on. ![]() You can then hop over to the Server Core box, run REGEDIT, and make the changes manually. Just launch Process Monitor, click File > Capture Events (if its not already listing PC activity), and watch the process names listed on the left hand side. Process Monitor will log the Registry value or values that get changed or added. The basic technique is to fire up Process Monitor on a full Server 2008 box configure the tool’s filter to include Registry writes, but NOT reads then make the setting you need for your Server Core box, via the GUI on the full Server 2008 box. (You don’t want “Process Explorer” for this purpose, although it is another useful and interesting tool.) Bryce Cogswell and Mark Russinovitch have folded REGMON’s functionality (along with its sibling FILEMON) into “Process Monitor,” a free download. In years past, my preferred Registry spy was REGMON from the friendly guys at System Internals, now absorbed by Microsoft. Background information: I have no anti-virus or malware checker software installed, other than Windows Defender (which I think is part of Windows 7). When you need to hack the Registry on a Server Core box in order to make a setting that you’d normally make through the GUI (if there was one), it’s often helpful to make the desired setting on a “full” server box while running a Registry monitoring tool, in order to figure out what Registry value or values you need to set.
0 Comments
Leave a Reply. |