Rick0

HO

Aug 5th, 2023
214
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Batch 7.99 KB | Software | 0 0
  1. @echo off
  2. ::------------------------------DECLARANDO VARIAVEIS------------------------------------::
  3. ::DEFININDO DOMINIO
  4. SET "DOM=dominio.local"
  5. SET "APROGRAMA=\\SERVER\CAMINHO\PROGRAMA\PROGRAMA.EXE"
  6. TITLE AUTENTICANDO NO %DOM%
  7. ::CAMINHO POWERSHELL
  8. SET "PSW=%SYSTEMROOT%\System32\WindowsPowerShell\v1.0\powershell.exe"
  9. ::UAC CAMINHO
  10. SET "UAC_EXE=%SYSTEMROOT%\System32\UserAccountControlSettings.exe"
  11. ::UAC ATALHO
  12. SET "UAC_LNK=%USERPROFILE%\Desktop\UAC.lnk"
  13. ::PASTA SUPORTE
  14. SET "P_SUPORTE=%SYSTEMDRIVE%\Suporte"
  15. ::CAMINHO PASTA APLICATIVOS HOME OFFICE
  16. SET "APP_PASTA=%P_SUPORTE%\Apphome"
  17. ::############LINK ATALHOS HOME OFFICE###########################
  18. ::LINK TEAM VIEWERQS
  19. SET "LNK_TEAM=%USERPROFILE%\Desktop\TeamViewerQS.lnk"
  20. ::CAMINHO BAT ho.bat
  21. SET "LOGIN_BAT=%PROGRAMDATA%\Microsoft\Windows\Start Menu\Programs\Startup\ho.bat"
  22. ::LINK LOGIN ho.bat
  23. SET "LOGIN_LNK=%USERPROFILE%\Desktop\Login.lnk"
  24. ::CAMINHO EXECUTAVEL TEAM VIEWERQS
  25. SET "TEAM_EXE=%P_SUPORTE%\Apphome\TeamViewerQS.exe"
  26. ::VPN CAMINHO
  27. SET "UVPN=%APP_PASTA%\FortiClientSetup_6.0.9.0277_x86.exe"
  28. ::VALIDANDO VPN 32 OU 64 BITS VPN
  29. IF EXIST "%PROGRAMFILES(X86)%\Fortinet\FortiClient\FortiClient.exe" (SET "VPN=%PROGRAMFILES(X86)%\Fortinet\FortiClient\FortiClient.exe") ELSE (SET "VPN=%PROGRAMFILES%\Fortinet\FortiClient\FortiClient.exe")
  30. ::------------------------------FIM DECLARANDO VARIAVEIS-------------------------------::
  31. ECHO REALIZANDO AJUSTES...
  32. ::------------------------------DESATIVA WINDOWS UPDATE------------------------------------::
  33. ::SC query "wuauserv" | FIND /i "STOPPED" >nul & IF ERRORLEVEL 1 SC stop "wuauserv" >nul & SC config "wuauserv" start= disabled >nul
  34. ::------------------------------FIM DESATIVA WINDOWS UPDATE--------------------------------::
  35. ::------------------------------DESATIVA UAC------------------------------------::
  36. ::REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableLUA" /t REG_DWORD /d "0" /f
  37. ::------------------------------FIM DESATIVA UAC--------------------------------::
  38. ::PASTA HOME OFFICE ATALHO
  39. IF NOT EXIST "%APP_LNK%" %PSW% -c "$s=(New-Object -COM WScript.Shell).CreateShortcut('%APP_LNK%');$s.TargetPath='%APP_PASTA%';$s.Save()"
  40. ::CRIANDO ATALHO UAC
  41. IF NOT EXIST "%UAC_LNK%" %PSW% -c "$s=(New-Object -COM WScript.Shell).CreateShortcut('%UAC_LNK%');$s.TargetPath='%UAC_EXE%';$s.Save()"
  42. ::ATALHO LOGIN DE REDE
  43. IF NOT EXIST "%LOGIN_LNK%" %PSW% -c "$s=(New-Object -COM WScript.Shell).CreateShortcut('%LOGIN_LNK%');$s.TargetPath='%LOGIN_BAT%';$s.Save()"
  44. ::ATALHO TEAM VIEWER
  45. IF NOT EXIST "%LNK_TEAM%" %PSW% -c "$s=(New-Object -COM WScript.Shell).CreateShortcut('%LNK_TEAM%');$s.TargetPath='%TEAM_EXE%';$s.Save()"
  46. ::------------------------------FIM CRIANDO ATALHOS E VALIDANDO PASTA DESKTOP---------------------------------::
  47. ::CONFIGURANDO REG
  48. ::regedit.exe /s %APP_PASTA%\IE_sem_proxy.reg >nul
  49. ::FIM CONFIGURANDO REG
  50. ::configurando speed para Auto duplex
  51. ::Lenovo E73
  52. ::REG ADD "HKLM\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002BE10318}\0009" /v *SpeedDuplex /t REG_SZ /d 0 /f >NUL
  53. ::Lenovo E71
  54. ::REG ADD "HKLM\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002BE10318}\0007" /v *SpeedDuplex /t REG_SZ /d 0 /f >NUL
  55. ::BLOQUEAR USB
  56. ::REG ADD "HKCU\Software\Policies\Microsoft\Windows\RemovableStorageDevices" /v "Deny_All" /t REG_DWORD /d 1 /f > nul
  57. ::PERFIL PADRAO ( REMOVE USUARIO home do grupo administrador)
  58. ::net localgroup "Administrators" home /delete >NUL
  59. CLS
  60. :pro
  61. ::CACHE NOME DE USUARIO
  62. ::for /f "tokens=1,2* delims=\" %%i in ('cmdkey /list server^|findstr /i "%DOM%"') do SET USC=%%j
  63. ::AJUSTE BARRA DE TAREFAS
  64. REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /f /v "TaskbarGlomLevel" /t REG_DWORD /d "1" >NUL
  65. ::------------LIMPA CREDENCIAIS COFRE-----------------------------::
  66. SET "SERVERS=teste.%DOM%,server,192.168.x.x,server_01.%DOM%"
  67. for %%i in (%SERVERS%) do (cmdkey /delete:%%i >NUL)
  68. ::------------FIM LIMPA CREDENCIAIS COFRE-------------------------::
  69. ::INFO MAQUINA TXT
  70. ipconfig.exe /all >"%USERPROFILE%\desktop\Suporte#%COMPUTERNAME%.txt" 2>nul
  71. CLS
  72. ::REMOVE LOGON AUTOMATICO
  73. REG ADD "HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /v "AutoAdminLogon" /t REG_SZ /d 0 /f >NUL
  74. REG ADD "HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /v "DisableCAD" /t REG_DWORD /d 0 /f >NUL
  75. reg delete "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v "DefaultPassword" /f >NUL
  76. reg delete "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v "DefaultUserName" /f >NUL
  77. CLS
  78. ::------------LOGIN DE REDE-----------------------------::
  79. TITLE INFORME SUAS CREDENCIAIS
  80. ECHO AUTENTICANDO NO %DOM%
  81. for /f "tokens=1,2* delims= " %%i in ('%PSW% -c "$credential = $host.ui.PromptForCredential('Informe o login de rede', 'Informe o seu nome de usuario e senha:', '%USC%', '%DOM%'); $a=''+$credential.GetNetworkCredential().username+'',''+$credential.GetNetworkCredential().Password+''; $a"') do (SET "USER=%%i" & SET "PASS=%%j")
  82. ::------------FIM LOGIN DE REDE-------------------------::
  83. CLS
  84. ::------------SALVA CREDENCIAIS COFRE-----------------------------::
  85. SET "SERVERS=teste.%DOM%,server,192.168.x.x,server_01.%DOM%"
  86. for %%i in (%SERVERS%) do (cmdkey /add:%%i /user:%DOM%\%USER% /Pass:%PASS% >NUL)
  87. GOTO AVPN
  88. ::------------FIM SALVA CREDENCIAIS COFRE-------------------------::
  89. :AVPN
  90. ::------------ABRE VPN E LOGO EM SEGUIDA OUTRO PROGRAMA---------------------------::
  91. IF NOT EXIST "%VPN%" (TITLE INSTALANDO FORTICLIENT && ECHO FORTICLIENTE AUSENTE INSTALANDO AGUARDE... & IF EXIST "%UVPN%" "%UVPN%" /quiet /norestart && ECHO LOGUE NA VPN APOS CONECTAR CLIQUE NO X & Start /wait "" "%VPN%">nul & CLS && TITLE ABRINDO O OUTRO PROGRAMA && ECHO ABRINDO OUTRO PROGRAMA AGUARDE... & Start "" "%APROGRAMA%" >nul &GOTO LOGS)
  92. IF EXIST "%VPN%" (TITLE ABRINDO VPN & ECHO LOGUE NA VPN APOS CONECTAR CLIQUE NO X & Start /wait "" "%VPN%">nul & CLS && TITLE ABRINDO O APROGRAMA && ECHO ABRINDO O PROGRAMA AGUARDE... & Start "" "%APROGRAMA%" >nul & GOTO LOGS)
  93. ::------------FIM ABRE VPN E LOGO EM SEGUIDA OUTRO PROGRAMA------------------------::
  94. :LOGS
  95. ::------------LOGS-----------------------------::
  96. ::LOG USUARIO
  97. SET "USR_LOG=%USERPROFILE%\%COMPUTERNAME%.log"
  98. ::LOG PROFILE
  99. SET "HOM_LOG=\\192.168.X.X\log_home.$\%COMPUTERNAME%.log"
  100. SET "HOM_LOGE=\\192.168.X.X\Log_home.$\GERAL\#1_LOG_GERAL.log"
  101. SET "UAC_LOG=\\192.168.X.X\log_home.$\GERAL\UAC\%COMPUTERNAME%-UACELEVADO.log"
  102. ::INFO CISCO
  103. ::SET "KEY_CISCO=HKLM\SOFTWARE\Cisco Systems, Inc.\Communicator"
  104. ::SET "VALUEC=HostName"
  105. ::for /F "usebackq tokens=3" %%A IN (`reg query "%KEY_CISCO%" /v "%VALUEC%" 2^>nul ^| find "%VALUEC%"`) do (set HOSTNAME=%%A)
  106. ::AGENT ID
  107. ::for /F "usebackq tokens=3" %%A IN (`reg query "HKCU\Environment" /v "AgentID" 2^>nul ^| find "AgentID"`) do (set AGENTID=%%A)
  108. ::CONSULTA UAC
  109. for /F "usebackq tokens=3" %%A IN (`reg query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableLUA" 2^>nul ^| find "EnableLUA"`) do (set UACHECK=%%A)
  110. ::IP
  111. for /f %%d in ('%PSW% -c "((ipconfig | findstr [0-9].\.)[0]).Split()[-1]"') do (set IP=%%d)
  112. ::REMOVE ATRIBUTO SOMENTE LEITURA E OCULTO
  113. IF EXIST "%USR_LOG%" (attrib "%USR_LOG%" -h -r )
  114. IF EXIST "%HOM_LOG%" (attrib "%HOM_LOG%" -h -r )
  115. IF EXIST "%HOM_LOGE%" (attrib "%HOM_LOGE%" -h -r )
  116. IF EXIST "%UAC_LOG%" (attrib "%UAC_LOG%" -h -r )
  117. ::SALVA LOG E ADICIONA ATRIBUTO OCULTO E SOMENTE LEITURA
  118. ECHO %USER%,%RAMAL%,%AGENTID%,%HOSTNAME%,%COMPUTERNAME%,%IP%,%date%-%TIME:~0,8%>"%USR_LOG%" & attrib "%USR_LOG%" +h +r
  119. ECHO %USER%,%RAMAL%,%AGENTID%,%HOSTNAME%,%COMPUTERNAME%,%IP%,%date%-%TIME:~0,8%>"%HOM_LOG%" & attrib "%HOM_LOG%" +h +r
  120. ECHO %USER%,%RAMAL%,%AGENTID%,%HOSTNAME%,%COMPUTERNAME%,%IP%,%date%-%TIME:~0,8%>>"%HOM_LOGE%" & attrib "%HOM_LOGE%" +h +r
  121. ::VALIDA UAC SE ESTIVER CORRIGIDO APAGA LOG
  122. IF "%UACHECK%" NEQ "0x0" (ECHO %USER%,UACELEVADO=SIM=%UACHECK%,%RAMAL%,%AGENTID%,%HOSTNAME%,%COMPUTERNAME%,%IP%,%date%-%TIME:~0,8%>"%UAC_LOG%" & attrib "%UAC_LOG%" +h +r) ELSE (IF EXIST "%UAC_LOG%" del /f /q "%UAC_LOG%" )
  123. ::------------FIM LOGS-------------------------::
  124. EXIT
Add Comment
Please, Sign In to add comment