Заметки сисадмина

Заметки сисадмина о интересных вещах из мира IT, инструкции и рецензии. Настраиваем Компьютеры/Сервера/1С/SIP-телефонию в Москве

Что за штука такая DHCP Relay

2024-05-16 · Posted in DNS / DHCP

Грубо говоря, это ретранслятор DHCP-пакетов из клиентской сети через маршрутизируемую сеть к DHCP-серверу.

Это нужно потому, что DHCP работает на широковещательных пакетах, которые не проходят через маршрутизаторы. И если DHCP-сервер находится в одной подсети, а его клиенты в другой – то в клиентской сети нужно поднять DHCP-релей (у Cisco это называется helper-address, он не только DHCP-запросы роутит, но и NetBIOS и TFTP), который станет для клиентов DHCP-сервером, но сам будет спрашивать всю информацию у центрального DHCP-сервера.

Microsoft Update is not added to Windows Update in Windows 7

2024-05-16 · Posted in Windows - 7

If you not seeing the option shown below:

Run Command Prompt as administrator, copy, paste and execute this command:

then go to Windows Updates and verify

How Fail2Ban Works to Protect Services on a Linux Server

2024-04-23 · Posted in Linux / Unix / MAC

SSH is the de facto method of connecting to a cloud server. It is durable, and it is extensible — as new encryption standards are developed, they can be used to generate new SSH keys, ensuring that the core protocol remains secure. However, no protocol or software stack is totally foolproof, and SSH being so widely deployed across the internet means that it represents a very predictable attack surface or attack vector through which people can try to gain access.

Any service that is exposed to the network is a potential target in this way. If you review the logs for your SSH service running on any widely trafficked server, you will often see repeated, systematic login attempts that represent brute force attacks by users and bots alike. Although you can make some optimizations to your SSH service to reduce the chance of these attacks succeeding to near-zero, such as disabling password authentication in favor of SSH keys, they can still pose a minor, ongoing liability.

Large-scale production deployments for whom this liability is completely unacceptable will usually implement a VPN such as WireGuard in front of their SSH service, so that it is impossible to connect directly to the default SSH port 22 from the outside internet without additional software abstraction or gateways. These VPN solutions are widely trusted, but will add complexity, and can break some automations or other small software hooks.

Prior to or in addition to committing to a full VPN setup, you can implement a tool called Fail2ban. Fail2ban can significantly mitigate brute force attacks by creating rules that automatically alter your firewall configuration to ban specific IPs after a certain number of unsuccessful login attempts. This will allow your server to harden itself against these access attempts without intervention from you.

In another tutorial, we discussed How to protect SSH with Fail2ban. In this guide, we’ll discuss in more depth how Fail2ban actually works and how you can use this knowledge to modify or extend the behavior of this service.

The Fundamentals of Fail2ban

The purpose of Fail2ban is to monitor the logs of common services to spot patterns in authentication failures.

When fail2ban is configured to monitor the logs of a service, it looks at a filter that has been configured specific to that service. The filter is designed to identify authentication failures for that specific service through the use of complex regular expressions. Regular expressions are a common templating language used for pattern matching. It defines these regular expression patterns into an internal variable called failregex.

By default, Fail2ban includes filter files for common services. When a log from any service, like a web server, matches the failregex in its filter, a predefined action is executed for that service. The action is a variable that can be configured to do many different things, depending on the preferences of the administrator.

The default action is to ban the offending host/IP address by modifying the local firewall rules. You can expand this action to, for example, send an email to your system administrator.

By default, action will be taken when three authentication failures have been detected in 10 minutes, and the default ban time is for 10 minutes. This is configurable.

When using the default iptables firewall, fail2ban creates a new set of firewall rules, also called a chain, when the service is started. It adds a new rule to the INPUT chain that sends all TCP traffic directed at port 22 to the new chain. In the new chain, it inserts a single rule that returns to the INPUT chain. The chain and associated rules are removed if the Fail2ban service is stopped.

Exploring Fail2ban Service Settings

Fail2ban is configured through several files located within a hierarchy under the /etc/fail2ban/ directory.

The fail2ban.conf file configures some operational settings like the way the daemon logs info, and the socket and pid file it will use. The main configuration, however, is specified in the files that define the per-application “jails”.

By default, fail2ban ships with a jail.conf file. However, this can be overwritten in updates, so you should copy this file to a jail.local file and make adjustments there.

If you already have a jail.local file, open it using nano or your favorite text editor:

If you don’t have a jail.local file already, or the file you opened was blank, copy over the jail.conf file and then open the new file:

We will take a look at the options available here and see how this file interacts with other configuration files on the system.

The Default Section

The first portion of the file will define the defaults for fail2ban policy. These options can be overridden in each individual service’s configuration section.

With the comments removed, the entirety of the default section looks something like this:

Let’s go over what some of this means:

  • ignoreip: This parameter identifies IP addresses that should be ignored by the banning system. By default, this is just set to ignore traffic coming from the machine itself, so that you don’t fill up your own logs or lock yourself out.
  • bantime: This parameter sets the length of a ban, in seconds. The default is 10 minutes.
  • findtime: This parameter sets the window that Fail2ban will pay attention to when looking for repeated failed authentication attempts. The default is set to 10 minutes, which means that the software will count the number of failed attempts in the last 10 minutes.
  • maxretry: This sets the number of failed attempts that will be tolerated within the findtime window before a ban is instituted.
  • backend: This entry specifies how Fail2ban will monitor log files. The setting of auto means that fail2ban will try pyinotify, then gamin, and then a polling algorithm based on what’s available. inotify is a built-in Linux kernel feature for tracking when files are accessed, and pyinotify is a Python interface to inotify, used by Fail2ban.
  • usedns: This defines whether reverse DNS is used to help implement bans. Setting this to “no” will ban IPs themselves instead of their domain hostnames. The warn setting will attempt to look up a hostname and ban that way, but will log the activity for review.
  • destemail: This is the address that will be sent notification mail if configured your action to mail alerts.
  • sendername: This will be used in the email from field for generated notification emails
  • banaction: This sets the action that will be used when the threshold is reached. This is actually a path to a file located in /etc/fail2ban/action.d/ called iptables-multiport.conf. This handles the actual iptables firewall manipulation to ban an IP address. We will look at this later.
  • mta: This is the mail transfer agent that will be used to send notification emails.
  • protocol: This is the type of traffic that will be dropped when an IP ban is implemented. This is also the type of traffic that is sent to the new iptables chain.
  • chain: This is the chain that will be configured with a jump rule to send traffic to the fail2ban funnel.

The rest of the parameters define different actions that can be specified. They pass in some of the parameters that we’ve defined above using variable substitution within text strings like this:


The line above would be replaced with the contents of var_name. Using this, we can tell that the action variable is set to the action_ definition by default (ban only, no mail alerts).

This, in turn, is configured by calling the iptables-multiport action with a list of parameters (service name, port, protocol, and chain) that is needed to perform the ban. The __name__ is substituted with the name of the service as specified by the section headers below.

Service Specific Sections

Beneath the default section, there are sections for specific services that can be used to override the default settings. This follows a convention of only modifying the parameters that differ from the normal values (convention over configuration).

Each section header is specified like this:


Any section that has the line enabled = true will be read and enabled.

Within each section, the parameters are configured, including the filter file that should be used to parse the logs (minus the file extension) and the location of the log files themselves.

Keeping this in mind, the section that specifies the actions for the SSH service looks like this:

This enables this section and sets the port to the default “ssh” port (port 22). It tells Fail2ban to look at the log located at /var/log/auth.log for this section and to parse the log using the filtering mechanisms defined in the /etc/fail2ban/filters.d directory in a file called sshd.conf.

All of the other pieces of information that it needs are taken from the parameters defined in the [DEFAULT] section. For instance, the action will be set to action_ which will ban the offending IP address using the iptables-multiport banaction, which references a file called iptables-multiport.conf found in /etc/fail2ban/action.d.

As you can see, the actions in the [DEFAULT] section should be general and flexible. Using parameter substitution along with parameters that provide sensible defaults will make it possible to override definitions when necessary.

Examining the Filter File

In order to understand what is going on in our configuration, we need to understand the filter and action files, which do the bulk of the work.

The filter file will determine the lines that fail2ban will look for in the log files to identify offending characteristics. The action file implements all of the actions required, from building up a firewall structure when the service starts, to adding and deleting rules, and tearing down the firewall structure when the service stops.

Let’s look at the filter file that our SSH service called for in the configuration above:


The [INCLUDES] section header specifies other filter files that are read in before or after this file. In our example, the common.conf file is read in and placed before the other lines in this file. This sets up some parameters that we will be using in our configuration.

Next, we have a [Definition] section that defines the actual rules for our filter matches. First, we set the name of the daemon we are monitoring by using the _daemon parameter.

After that, we go through the actual failregex definition, which sets the patterns that will trigger when a matching line in the log file is found. These are regular expressions that match based on the different errors and failures that can be thrown when a user does not authenticate correctly.

Portions of the line like %(__prefix_line)s will be substituted with the value of a parameter setup in the common.conf file that we sourced. This is used to match the different leading information that operating systems write to log files when they use standard methods. For instance, some lines from the /var/log/auth.log might look something like this:

The highlighted portion is a standard pattern that the operating system inserts to provide more context. After that, there are quite a few different ways that the iptables firewall service writes failure attempts to the log.

We see two separate failures in the first two lines above (a PAM authentication error and a password error). The regular expressions defined in the filter are designed to match any of the possible failure lines. You should not have to adjust any of these lines, but you should be aware of the need to catch all of the log entries that signify an unauthorized use error for the application you are trying to protect if you ever have to create a filter file yourself.

At the bottom, you can see an ignoreregex parameter, which is currently blank. This can be used to exclude more specific patterns that would typically match a failure condition in case you want to negate the failure trigger for fail2ban for certain scenarios. We won’t be adjusting this.

Save and close the file when you are finished examining it.

Examining the Action File

Now, let’s take a look at the action file. This file is responsible for setting up the firewall with a structure that allows modifications for banning malicious hosts, and for adding and removing those hosts as necessary.

The action that our SSH service invokes is called iptables-multiport. Open the associated file now:

With the comments removed, this file looks something like this:

The file starts off by sourcing another action file called iptables-blocktype.conf that defines the blocktype parameter, which configures the restriction that will be set when a client is banned. By default the blocktype is set to reject packets and reply to pings sent by banned clients with a rejection message that the port is unreachable. We will use this in our ban rules below.

Next, we get to the rule definitions themselves. The actionstart action sets up the iptables firewall when the fail2ban service is started. It creates a new chain, adds a rule to that chain to return to the calling chain, and then inserts a rule at the beginning of the INPUT chain that passes traffic matching the correct protocol and port destinations to the new chain.

It does this by using the values we passed in with the action that we defined in our jail.local file. The name is taken from the section header for each service. The chain, protocol, and port are taken from the action line itself in that file.

Here, all of the parameters that are set by the other file are referenced by including the parameter name in angle brackets:


When we move down to the companion actionstop definition, we can see that the firewall commands are implementing a reversal of the actionstart commands. When the Fail2ban service stops, it cleanly removes any firewall rules that it added.

Another action called actioncheck makes sure that the proper chain has been created prior to attempting to add ban rules.

Next, we get to the actual banning rule, called actionban. This rule works by adding a new rule to our created chain. The rule matches the source IP address of the offending client – this parameter is read in from the authorization logs when the maxretry limit is reached. It institutes the block defined by the blocktype parameter that we sourced in the [INCLUDE] section at the top of the file.

The actionunban rule removes this rule. This is done automatically by fail2ban when the ban time has elapsed.

Finally, we get to the [Init] section. This just provides some defaults in case the action file is called without passing in all of the appropriate values.

How the Fail2ban Service Processes Configuration Files to Implement Bans

Now that we’ve seen the specifics, let’s go over the process that happens when fail2ban starts.

Loading the Initial Configuration Files

First, the main fail2ban.conf file is read to determine the conditions that the main process should operate under. It creates the socket, pid, and log files if necessary and begins to use them.

Next, fail2ban reads the jail.conf file for configuration details. It follows this by reading, in alphabetical order, any files found in the jail.d directory that end in .conf. It adds the settings found in these files to its internal configuration, giving new values preference over the values described in the jail.conf file.

It then searches for a jail.local file and repeats this process, adapting the new values. Finally, it searches the jail.d directory again, reading in alphabetical order files ending in .local.

In our case, we only have a jail.conf file and a jail.local file. In our jail.local file, we only need to define the values that differ from the jail.conf file. The fail2ban process now has a set of directives loaded into memory that represent a combination of all of the files that it found.

It examines each section and searches for an enabled = true directive. If it finds one, it uses the parameters defined under that section to build a policy and decide what actions are required. Any parameters that are not found in the service’s section use the parameters defined in the [DEFAULT] section.

Parsing the Action Files to Determine Starting Actions

Fail2ban looks for an action directive to figure out what action script to call to implement the banning/unbanning policies. If one is not found, it falls back on the default action determined above.

The action directive consists of the name of the action file(s) that will be read, as well as a key-value dictionary that passes the parameters needed by those files. The values of these often take the form of parameter substitutions by referencing the settings configured in the service’s section. The “name” key is usually passed the value of the special __name__ variable that will be set to the value of the section’s header.

Fail2ban then uses this information to find the associated files in the action.d directory. It first looks for the associated action file ending in .conf and then amends the information found there with any settings contained in an accompanying .local file also found in the action.d directory.

It parses those files to determine the actions that it needs to take. It reads the actionstart value to see the actions it should take to set up the environment. This often includes creating a firewall structure to accommodate banning rules in the future.

The actions defined in this file use the parameters passed to it from the action directive. It will use these values to dynamically create the appropriate rules. If a certain variable wasn’t set, it can look at the default values set in the action file to fill in the blanks.

Parsing the Filter Files to Determine Filtering Rules

The parameters for the service in the jail.* files also include the location of the log file as well as the polling mechanism that should be used to check the file (this is defined by the backend parameter). It also includes a filter that should be used to determine whether a line in the log represents a failure.

Fail2ban looks in the filter.d directory to find the matching filter file that ends with .conf. It reads this file to define the patterns that can be used to match offending lines. It then searches for a matching filter file ending with .local to see if any of the default parameters were overwritten.

It uses the regular expressions defined in these files as it reads the service’s log file. It tries each failregex line defined in the filter.d files against every new line written to the service’s log file.

If the regular expression returns a match, it checks the line against the regular expressions defined by the ignoreregex. If this also matches, fail2ban ignores it. If the line matches an expression in the failregex but does not match an expression in the ignoreregex, an internal counter is incremented for the client that caused the line and an associated timestamp is created for the event.

As the window of time set by the findtime parameter in the jail.* files is reached (as determined by the event timestamp), the internal counter is decremented again and the event is no longer considered relevant to the banning policy.

If, over the course of time, additional authentication failures are logged, each attempt increments the counter. If the counter reaches the value set by the maxretry parameter within the configured window of time, fail2ban institutes a ban by calling the actioncheck action for the service as defined in the action.d/ files for the service. This is to determine whether the actionstart action set up the necessary structure. It then calls the actionban action to ban the offending client. It sets a timestamp for this event as well.

When the amount of time has elapsed that was specified by the bantime parameter, fail2ban unbans the client by calling the actionunban action.

Ключи командной строки Проводника Windows

В операционных системах семейства Windows, Проводник (explorer.exe) является не только файловым менеджером, но и оболочкой (shell) пользователя, обеспечивая взаимодействие человека с компонентами операционной системы и приложениями. Внешний вид Windows (Рабочий стол, Панель задач, Главное меню и т.п.) формируется именно Проводником, который запускается автоматически без каких-либо параметров командной строки при регистрации пользователя в системе. В режиме оболочки пользователя, в зависимости от его действий, Проводник выполняет запуск других экземпляров explorer.exe с различными параметрами командной строки (ключами), большинство из которых слабо документировано или не документировано вовсе.

Формат командной строки:

Параметры командной строки

Если параметры командной строки заданы неверно, то они игнорируются без каких-либо сообщений пользователю и запуск Проводника выполняется так же, как запуск без параметров. Если первый параметр командной строки не является ключом, начинающимся с символа / ), то все поле интерпретируется как путь в пространстве имен оболочки. Если указанный путь не идентифицирует объект пространства имен оболочки, он интерпретируется как путь файловой системы относительно текущего каталога. Если путь в файловой системе недействителен, то параметры командной строки игнорируются.

path – каталог/файл, который будет открыт Проводником. Если в пути файла или папки имеются пробелы, то их необходимо заключать в двойные кавычки.

/n – открывает новое окно Проводника с содержимым по умолчанию, в качестве которого обычно отображается домашний каталог пользователя или корневой каталог системного диска.

/e > – открывает новое окно Проводника с содержимым по умолчанию, в качестве которого обычно отображается домашний каталог пользователя или корневой каталог системного диска.

Если за параметрами /e или n следует запятая и путь к папке, то в окне Проводника откроется ее содержимое.

(,)/root,object – открывает указанный объект в окне Проводника.

/select,object – открывает указанный каталог в окне Проводника и выбирает в нем заданный элемент.

/separate – запускает Проводник как отдельный процесс.

Примеры использования параметров Проводника Windows.

explorer C:\windows\system32 – открыть каталог C:\windows\system32. В окне Проводника отобразится содержимое указанного каталога.

В качестве аргументов командной строки можно использовать и отдельные символы:

explorer . – открыть в Проводнике текущий каталог.

explorer , – открыть в Проводнике ”Этот компьютер”.

explorer / или explorer \\ – открыть в Проводнике папку ”Документы”.

explorer \ – открыть в Проводнике корневой каталог системного диска.

explorer C:\windows\system32\cmd.exe – открыть файл cmd.exe из каталога C:\windows\system32, результатом чего будет запуск командной строки Windows.

explorer /select, C:\windows\system32\cmd.exe – открыть каталог C:\windows\system32 и выбрать в нем файл cmd.exe. Открытие файла не выполняется и командная строка не будет запущена.

explorer ftp://ftp.local/ – открыть корневой каталог FTP-сервера ftp.local. В окне Проводника отобразится содержимое указанного каталога.

explorer /select, ftp://ftp.local/etc/bash.bashrc – открыть папку etc на FTP-сервере ftp.local и выбрать файл bash.bashrc

Командная строка Проводника Windows может использоваться для запуска приложений в соответствии с их ассоциациями по расширениям файлов:

explorer C:\Users\User\Documents\Uname.docx – буден запущен MS Word (в соответствии с расширением .docx) и в нем будет открыт документ Uname.docx из папки Документы пользователя User.

Этот же прием можно использовать для получения в окне Проводника перечня всех возможных в данной системе настроек, если в Проводнике открыть папку, в качестве расширения которой используется идентификатор класса (CLSID), соответствующий всем элементам Панели управления Windows:

Идентификатор класса для всех элементов Панели управления

Можно, например, создать командный файл, выполняющий следующие действия:

– в папке временных файлов TEMP с помощью команды md создается подкаталог с любым именем, например, AllSettings и расширением соответствующего идентификатора CLSID

– созданная на предыдущем шаге папка открывается в Проводнике

Командный файл для получения всех элементов настройки системы в окне Проводника.

Таким образом, с помощью двух команд, можно получить в одном окне все возможные элементы Панели управления данной системы. Если на Рабочем столе создать папку с подобным именем и расширением, то по двойному щелчку на ней, будет выполняться запуск Проводника и отображение всех элементов Панели управления.

Все элементы настроек системы в окне Проводника.

С помощью параметров командной строки Проводника можно получить доступ к большому количеству системных объектов с использованием их идентификаторов классов CLSID. Для этого используется параметр shell:::CLSID. Таким образом, открыть все элементы Панели управления можно было и одной командой:

Используя идентификаторы CLSID, можно получить доступ к отдельным настройкам системы, элементам управления, параметрам отдельных приложений и т.п. Фактически, большинство действий пользователя в его рабочей среде, сопровождается запуском отдельных экземпляров Проводника с различными параметрами командной строки (ключами).

Список основных идентификаторов классов системных объектов (CLSID) в Windows 10.
Краткое описание Параметр командной строки explorer.exe
Все настройки системы Shell:::{ED7BA470-8E54-465E-825C-99712043E01C}
Все элементы панели управления Shell:::{21EC2020-3AEA-1069-A2DD-08002B30309D}
Панель управления (Категории) Shell:::{26EE0668-A00A-44D7-9371-BEB064C98683}
Панель управления
(Все элементы Панели управления)
Администрирование Shell:::{D20EA4E1-3957-11d2-A40B-0C5020524153}
Центр управления сетями и общим доступом Shell:::{8E908FC9-BECC-40f6-915B-F4CA0E70D03D}
Домашняя группа Shell:::{6785BFAC-9D2D-4be5-B7E2-59937E8FB80A}
Изменение параметров Домашней группы Shell:::{67CA7650-96E6-4FDD-BB43-A8E774F73A57}
Сеть (Сетевое окружение) Shell:::{208D2C60-3AEA-1069-A2D7-08002B30309D}
Сеть (Вся сеть) Shell:::{F02C1A0D-BE21-4350-88B0-7367FC96EF3C}
Сетевые подключения Shell:::{7007ACC7-3202-11D1-AAD2-00805FC1270E}
Сетевые подключения Shell:::{992CFFA0-F557-101A-88EC-00DD010CCC48}
Сетевые подключения. Shell:::{7007ACC7-3202-11D1-AAD2-00805FC1270E}
Параметры потоковой передачи мультимедиа Shell:::{B4FB3F98-C1EA-428d-A78A-D1F5659CBA93}
Мастер добавления сетевого расположения. Shell:::{D4480A50-BA28-11d1-8E75-00C04FA31A86}
Управление беспроводными сетями Shell:::{1FA9085F-25A2-489B-85D4-86326EEDCD87}
Устройства Bluetooth Shell:::{28803F59-3A75-4058-995F-4EE5503B023C}
Переносные устройства Shell:::{35786D3C-B075-49b9-88DD-029876E11C01}
Съемные диски Shell:::{F5FB2C77-0E2F-4A16-A381-3E560C68BC83}
Съемные устройства хранения Shell:::{a6482830-08eb-41e2-84c1-73920c2badb9}
Дисковые пространства Shell:::{F942C606-0914-47AB-BE56-1321B8035096}
Электропитание Shell:::{025A5937-A6BE-4686-A844-36FE4BEC8B6D}
Принтеры Shell:::{2227A280-3AEA-1069-A2DE-08002B30309D}
Принтеры Shell:::{863aa9fd-42df-457b-8e4d-0de1b8015c60}
Устройства и принтеры Shell:::{A8A91A66-3A7D-4424-8D24-04E180695C7A}
Программы и компоненты Shell:::{7b81be6a-ce2b-4676-a29e-eb907a5126c5}
Компоненты Windows Shell:::{67718415-c450-4f3c-bf8a-b487642dc39b}
Все Приложения Shell:::{4234d49b-0245-4df3-b780-3893943456e1}
Приложения по умолчанию Shell:::{17cd9488-1228-4b2f-88ce-4298e93e0966}
Приложения по умолчанию (Параметры) Shell:::{2559a1f7-21d7-11d4-bdaf-00c04f60b9f0}
Установка новой программы из сети Shell:::{15eae92e-f17a-4431-9f28-805e482dafd4}
Проводник Shell:::{c57a6066-66a3-4d91-9eb9-41532179f0a5}
Автозапуск Shell:::{9C60DE1E-E5FC-40f4-A487-460851A8D915}
Резервное копирование
и восстановление (Windows 7)
Шифрование диска BitLocker Shell:::{D9EF8727-CAC2-4e60-809E-86F80A666C91}
Открыть cab-файл Shell:::{0CD7A5C0-9F37-11CE-AE65-08002B2E1262}
Поиск в домашнем каталоге пользователя Shell:::{9343812e-1c37-4a49-a12e-4b2d810d956b}
Вид каталога Shell:::{437ff9c0-a07f-4fa0-af80-84b6c6440a16}
Панель быстрого доступа Shell:::{d34a6ca6-62c2-4c34-8a7c-14709c1ad938}
Сжатые файлы и папки Shell:::{E88DCCE0-B7B3-11d1-A9F0-00AA0060FA31}
Диспетчер учетных данных Shell:::{1206F5F1-0569-412C-8FEC-3204630DFB70}
Центр специальных возможностей Shell:::{D555645E-D4F8-4c29-A827-D93C859C4F2A}
Электронная почта Shell:::{2559a1f5-21d7-11d4-bdaf-00c04f60b9f0}
Избранное Shell:::{323CA680-C24D-4099-B94D-446DD2D7249E}
Параметры Проводника Shell:::{6DFD7C5C-2451-11d3-A299-00C04F8EF6AF}
История файлов Shell:::{F6B6E965-E9B2-444B-9286-10C9152EDBC5}
Параметры шрифта Shell:::{93412589-74D4-4E4E-AD0E-E0CB621440FD}
Часто используемые папки Shell:::{3936E9E4-D92C-4EEE-A85A-BC16D5EA0819}
Установленные обновления Shell:::{d450a8a1-9568-45c7-9c0e-b4f9fb4537bd}
Библиотеки Shell:::{031E4825-7B94-4dc3-B131-E946B44C8DD5}
Серверы мультимедиа Shell:::{289AF617-1CC3-42A6-926C-E6A863F0E3BA}
Мои документы Shell:::{450D8FBA-AD25-11D0-98A8-0800361B1103}
Значки в области уведомлений Shell:::{05d7b0f4-2121-4eff-bf6b-ed3f69b894d9}
Папка автономных файлов Shell:::{AFDB1F70-2A4C-11d2-9039-00C04F8EEB3E}
OneDrive Shell:::{018D5C66-4533-4307-9B53-224DE2ED1FE6}
Персонализация Shell:::{ED834ED6-4B5A-4bfe-8F11-A626DCB6A921}
Общие папки Shell:::{4336a54d-038b-4685-ab02-99bb52d3fb8b}
Недавно использованные папки Shell:::{22877a6d-37a1-461a-91b0-dbda5aaebc99}
Восстановление Shell:::{9FE63AFD-59CF-4419-9775-ABCC3849F861}
Корзина Shell:::{645FF040-5081-101B-9F08-00AA002F954E}
Подключения к рабочим столам
и приложениям RemoteApp
Выполнить Shell:::{2559a1f3-21d7-11d4-bdaf-00c04f60b9f0}
Центр Безопасности и обслуживания Shell:::{BB64F8A7-BEE7-4E1A-AB8D-7D8273F7FDB6}
Брандмауэр Защитника Windows Shell:::{4026492F-2F69-46B8-B9BF-5654FC07E423}
Показать Рабочий стол (Свернуть все окна) Shell:::{3080F90D-D7AD-11D9-BD98-0000947B0257}
Распознавание речи Shell:::{58E3C745-D971-4081-9034-86E34B30836A}
Представление задач (Несколько Рабочих столов) Shell:::{3080F90E-D7AD-11D9-BD98-0000947B0257}
Центр синхронизации Shell:::{9C73F5E5-7AE7-4E32-A8E8-8D23B85255BF}
Настройка новой синхронизации Shell:::{2E9E59C0-B437-4981-A647-9C34B9B90891}
Параметры-Система Shell:::{BB06C0E4-D293-4f75-8A90-CB05B6477EEE}
Параметры – Панель задач Shell:::{0DF44EAA-FF21-4412-828E-260A8728E7F1}
Это устройство Shell:::{5b934b42-522b-4c34-bbfe-37a3ef7b9c90}
Этот компьютер Shell:::{20D04FE0-3AEA-1069-A2D8-08002B30309D}
Устранение неполадок Shell:::{C58C4893-3BE0-4B45-ABB5-A63E4B8C8651}
Учетные записи пользователей Shell:::{60632754-c523-4b62-b45c-4172da012619}
Учетные записи пользователей (Автовход) Shell:::{7A9D77BD-5403-11d2-8785-2E0420524153}
Домашний каталог пользователя Shell:::{59031a47-3f72-44a7-89c5-5595fe6b30ee}
Рабочие папки пользователя Shell:::{ECDB0924-4208-451E-8EE0-373C0956DE16}
Центр мобильности Windows Shell:::{5ea4f148-308c-46d7-98a9-49041b1dd468}
Нажатие CTRL+ALT+DEL Shell:::{2559a1f2-21d7-11d4-bdaf-00c04f60b9f0}

Использование параметров командной строки Проводника позволяет выполнить внушительное количество операций администрирования системы, в том числе и в командных файлах.

Настройка принтера.

2024-04-22 · Posted in Windows – 10, Windows – 11

1)Нажимаем ПРАВОЙ кнопкой мыши по меню ПУСК -> выбираем ПАРАМЕТРЫ -> УСТРОЙСТВА.

2)Выбираем пункт ПРИНТЕРЫ И СКАНЕРЫ -> нажимаем на ВАШ ПРИНТЕР -> кнопка УПРАВЛЕНИЕ.

3)Настраиваем нужные параметры в пунктах меню СВОЙСТВА ПРИНТЕРА и НАСТРОЙКА ПЕЧАТИ

4) Перегружаем ПК