Permitir que usuários não administradores acessem o Windows 7 Home Premium via área de trabalho remota

10

Sabemos que podemos acessar o Windows 7 Home Premium via Área de Trabalho Remota através de algumas soluções alternativas .

Mas agora, depois de ativar a Área de Trabalho Remota, gostaria de permitir que alguns usuários fora do grupo Administradores acessem o computador com a Área de Trabalho Remota.

Eu tentei criar um grupo com net localgroup "Remote Desktop Users" /add, mas isso não parece fazer nada para permitir que os usuários desse grupo façam login com a Área de Trabalho Remota. Eu também tentei algumas políticas de hackers, mas não adiantou ainda.

Como posso permitir que esses usuários não administradores se conectem à Área de Trabalho Remota?

palswim
fonte

Respostas:

13

Depois de algumas experiências, descobri que só preciso importar para o registro esses valores:

Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\SAM\SAM\Domains\Builtin\Aliases\0000022B]
"C"=hex:2b,02,00,00,00,00,00,00,b0,00,00,00,02,00,01,00,b0,00,00,00,28,00,00,\
00,00,00,00,00,d8,00,00,00,7a,00,00,00,00,00,00,00,54,01,00,00,00,00,00,00,\
00,00,00,00,01,00,14,80,90,00,00,00,a0,00,00,00,14,00,00,00,44,00,00,00,02,\
00,30,00,02,00,00,00,02,c0,14,00,13,00,05,01,01,01,00,00,00,00,00,01,00,00,\
00,00,02,c0,14,00,ff,ff,1f,00,01,01,00,00,00,00,00,05,07,00,00,00,02,00,4c,\
00,03,00,00,00,00,00,14,00,0c,00,02,00,01,01,00,00,00,00,00,01,00,00,00,00,\
00,00,18,00,1f,00,0f,00,01,02,00,00,00,00,00,05,20,00,00,00,20,02,00,00,00,\
00,18,00,1f,00,0f,00,01,02,00,00,00,00,00,05,20,00,00,00,24,02,00,00,01,02,\
00,00,00,00,00,05,20,00,00,00,20,02,00,00,01,02,00,00,00,00,00,05,20,00,00,\
00,20,02,00,00,52,00,65,00,6d,00,6f,00,74,00,65,00,20,00,44,00,65,00,73,00,\
6b,00,74,00,6f,00,70,00,20,00,55,00,73,00,65,00,72,00,73,00,4d,00,65,00,6d,\
00,62,00,65,00,72,00,73,00,20,00,69,00,6e,00,20,00,74,00,68,00,69,00,73,00,\
20,00,67,00,72,00,6f,00,75,00,70,00,20,00,61,00,72,00,65,00,20,00,67,00,72,\
00,61,00,6e,00,74,00,65,00,64,00,20,00,74,00,68,00,65,00,20,00,72,00,69,00,\
67,00,68,00,74,00,20,00,74,00,6f,00,20,00,6c,00,6f,00,67,00,6f,00,6e,00,20,\
00,72,00,65,00,6d,00,6f,00,74,00,65,00,6c,00,79,00,00,00



[HKEY_LOCAL_MACHINE\SAM\SAM\Domains\Builtin\Aliases\Names\Remote Desktop Users]
@=hex(22b):

Isso faz com que a conexão RDP funcione, para que eu possa fazer login no meu Win7 Home Premium como um usuário comum. Acho que quanto menos mudamos o registro, menores são as chances de algo dar errado.

Eu também acho que este é o impacto mínimo que temos que fazer no registro, como qualquer uma das duas chaves são omitidas, o RDP não funcionará como não-administrador.

E para aqueles que pensam que esse hack viola o contrato de licença: http://download.microsoft.com/Documents/UseTerms/Windows%207_Home%20Premium_English_a0cdb148-2381-47cd-bfc9-9b9102e0cb28.pdf

f. Tecnologias de acesso remoto. Você pode acessar e usar remotamente o software instalado no computador licenciado de outro computador para compartilhar uma sessão usando a Assistência Remota ou tecnologias semelhantes. Uma “sessão” significa a experiência de interagir com o software, direta ou indiretamente, através de qualquer combinação de periféricos de entrada, saída e exibição.

Eu posso estar errado aqui, mas no meu entendimento é definitivamente permitido acessar a máquina remotamente.

Laszlo Kovacs
fonte
Isso funcionou. Eu também tive que adicionar meu usuário não administrador ao grupo com net localgroup "Remote Desktop Users" [username] /add. Além disso, criei anteriormente um grupo com net localgroup "Remote Desktop Users" /adde não consegui efetuar login antes de excluir esse grupo local.
Daniel
Essa abordagem funciona com 2 truques da resposta abaixo : 1) execute o editor de registro com privilégios SYSTEM (use PsExec.exe -s -i regedit.exeou ajuste as permissões); 2) adicione os usuários a "Usuários da Área de Trabalho Remota", que fica disponível depois que você importar o fragmento de registro.
AntonK
6

Eu encontrei os segredos do registro para isso depois de um pouco de pesquisa, nos comentários de um dos artigos da área de trabalho remota , de todos os lugares. Mas eu tive que fazer algumas pequenas modificações.

Primeiro, tive que excluir o grupo Usuários da Área de Trabalho Remota que eu havia criado manualmente (por recomendação de outro comentário ). (Eu criei com net localgroup "Remote Desktop Users" /add; delete com net localgroup "Remote Desktop Users" /delete.)

Em seguida, importei um arquivo de registro como a conta SYSTEM. Eu não sei tudo o que este script de registro faz (atualizarei se obtiver mais entendimento sobre o que exatamente ele está fazendo), mas funcionou para mim. Observe as alterações que fiz com os dados no link de origem: Alterei os caracteres de aspas abertas e aspas próximas para caracteres simples de aspas duplas e adicionei uma barra e um 0caractere adicional a cada Aliases00###entrada (portanto, ...\Aliases0000234tornou - se ...\Aliases\00000234).

Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\SAM\SAM\Domains\Builtin\Aliases\00000243]
"C"=hex:43,02,00,00,00,00,00,00,b0,00,00,00,02,00,01,00,b0,00,00,00,46,00,00,\
00,00,00,00,00,f8,00,00,00,e2,00,00,00,00,00,00,00,dc,01,00,00,00,00,00,00,\
00,00,00,00,01,00,14,80,90,00,00,00,a0,00,00,00,14,00,00,00,44,00,00,00,02,\
00,30,00,02,00,00,00,02,c0,14,00,13,00,05,01,01,01,00,00,00,00,00,01,00,00,\
00,00,02,c0,14,00,ff,ff,1f,00,01,01,00,00,00,00,00,05,07,00,00,00,02,00,4c,\
00,03,00,00,00,00,00,14,00,0c,00,02,00,01,01,00,00,00,00,00,01,00,00,00,00,\
00,00,18,00,1f,00,0f,00,01,02,00,00,00,00,00,05,20,00,00,00,20,02,00,00,00,\
00,18,00,1f,00,0f,00,01,02,00,00,00,00,00,05,20,00,00,00,24,02,00,00,01,02,\
00,00,00,00,00,05,20,00,00,00,20,02,00,00,01,02,00,00,00,00,00,05,20,00,00,\
00,20,02,00,00,41,00,63,00,63,00,65,00,73,00,73,00,20,00,43,00,6f,00,6e,00,\
74,00,72,00,6f,00,6c,00,20,00,41,00,73,00,73,00,69,00,73,00,74,00,61,00,6e,\
00,63,00,65,00,20,00,4f,00,70,00,65,00,72,00,61,00,74,00,6f,00,72,00,73,00,\
00,00,4d,00,65,00,6d,00,62,00,65,00,72,00,73,00,20,00,6f,00,66,00,20,00,74,\
00,68,00,69,00,73,00,20,00,67,00,72,00,6f,00,75,00,70,00,20,00,63,00,61,00,\
6e,00,20,00,72,00,65,00,6d,00,6f,00,74,00,65,00,6c,00,79,00,20,00,71,00,75,\
00,65,00,72,00,79,00,20,00,61,00,75,00,74,00,68,00,6f,00,72,00,69,00,7a,00,\
61,00,74,00,69,00,6f,00,6e,00,20,00,61,00,74,00,74,00,72,00,69,00,62,00,75,\
00,74,00,65,00,73,00,20,00,61,00,6e,00,64,00,20,00,70,00,65,00,72,00,6d,00,\
69,00,73,00,73,00,69,00,6f,00,6e,00,73,00,20,00,66,00,6f,00,72,00,20,00,72,\
00,65,00,73,00,6f,00,75,00,72,00,63,00,65,00,73,00,20,00,6f,00,6e,00,20,00,\
74,00,68,00,69,00,73,00,20,00,63,00,6f,00,6d,00,70,00,75,00,74,00,65,00,72,\
00,2e,00,00,00

[HKEY_LOCAL_MACHINE\SAM\SAM\Domains\Builtin\Aliases\00000227]
"C"=hex:27,02,00,00,00,00,00,00,b0,00,00,00,02,00,01,00,b0,00,00,00,20,00,00,\
00,00,00,00,00,d0,00,00,00,d2,00,00,00,00,00,00,00,a4,01,00,00,00,00,00,00,\
00,00,00,00,01,00,14,80,90,00,00,00,a0,00,00,00,14,00,00,00,44,00,00,00,02,\
00,30,00,02,00,00,00,02,c0,14,00,13,00,05,01,01,01,00,00,00,00,00,01,00,00,\
00,00,02,c0,14,00,ff,ff,1f,00,01,01,00,00,00,00,00,05,07,00,00,00,02,00,4c,\
00,03,00,00,00,00,00,14,00,0c,00,02,00,01,01,00,00,00,00,00,01,00,00,00,00,\
00,00,18,00,1f,00,0f,00,01,02,00,00,00,00,00,05,20,00,00,00,20,02,00,00,00,\
00,18,00,1f,00,0f,00,01,02,00,00,00,00,00,05,20,00,00,00,24,02,00,00,01,02,\
00,00,00,00,00,05,20,00,00,00,20,02,00,00,01,02,00,00,00,00,00,05,20,00,00,\
00,20,02,00,00,42,00,61,00,63,00,6b,00,75,00,70,00,20,00,4f,00,70,00,65,00,\
72,00,61,00,74,00,6f,00,72,00,73,00,42,00,61,00,63,00,6b,00,75,00,70,00,20,\
00,4f,00,70,00,65,00,72,00,61,00,74,00,6f,00,72,00,73,00,20,00,63,00,61,00,\
6e,00,20,00,6f,00,76,00,65,00,72,00,72,00,69,00,64,00,65,00,20,00,73,00,65,\
00,63,00,75,00,72,00,69,00,74,00,79,00,20,00,72,00,65,00,73,00,74,00,72,00,\
69,00,63,00,74,00,69,00,6f,00,6e,00,73,00,20,00,66,00,6f,00,72,00,20,00,74,\
00,68,00,65,00,20,00,73,00,6f,00,6c,00,65,00,20,00,70,00,75,00,72,00,70,00,\
6f,00,73,00,65,00,20,00,6f,00,66,00,20,00,62,00,61,00,63,00,6b,00,69,00,6e,\
00,67,00,20,00,75,00,70,00,20,00,6f,00,72,00,20,00,72,00,65,00,73,00,74,00,\
6f,00,72,00,69,00,6e,00,67,00,20,00,66,00,69,00,6c,00,65,00,73,00,00,00

[HKEY_LOCAL_MACHINE\SAM\SAM\Domains\Builtin\Aliases\00000239]
"C"=hex:39,02,00,00,00,00,00,00,b0,00,00,00,02,00,01,00,b0,00,00,00,2e,00,00,\
00,00,00,00,00,e0,00,00,00,76,00,00,00,00,00,00,00,58,01,00,00,00,00,00,00,\
00,00,00,00,01,00,14,80,90,00,00,00,a0,00,00,00,14,00,00,00,44,00,00,00,02,\
00,30,00,02,00,00,00,02,c0,14,00,13,00,05,01,01,01,00,00,00,00,00,01,00,00,\
00,00,02,c0,14,00,ff,ff,1f,00,01,01,00,00,00,00,00,05,07,00,00,00,02,00,4c,\
00,03,00,00,00,00,00,14,00,0c,00,02,00,01,01,00,00,00,00,00,01,00,00,00,00,\
00,00,18,00,1f,00,0f,00,01,02,00,00,00,00,00,05,20,00,00,00,20,02,00,00,00,\
00,18,00,1f,00,0f,00,01,02,00,00,00,00,00,05,20,00,00,00,24,02,00,00,01,02,\
00,00,00,00,00,05,20,00,00,00,20,02,00,00,01,02,00,00,00,00,00,05,20,00,00,\
00,20,02,00,00,43,00,72,00,79,00,70,00,74,00,6f,00,67,00,72,00,61,00,70,00,\
68,00,69,00,63,00,20,00,4f,00,70,00,65,00,72,00,61,00,74,00,6f,00,72,00,73,\
00,00,00,4d,00,65,00,6d,00,62,00,65,00,72,00,73,00,20,00,61,00,72,00,65,00,\
20,00,61,00,75,00,74,00,68,00,6f,00,72,00,69,00,7a,00,65,00,64,00,20,00,74,\
00,6f,00,20,00,70,00,65,00,72,00,66,00,6f,00,72,00,6d,00,20,00,63,00,72,00,\
79,00,70,00,74,00,6f,00,67,00,72,00,61,00,70,00,68,00,69,00,63,00,20,00,6f,\
00,70,00,65,00,72,00,61,00,74,00,69,00,6f,00,6e,00,73,00,2e,00,00,00

[HKEY_LOCAL_MACHINE\SAM\SAM\Domains\Builtin\Aliases\00000242]
"C"=hex:42,02,00,00,00,00,00,00,b0,00,00,00,02,00,01,00,b0,00,00,00,2c,00,00,\
00,00,00,00,00,dc,00,00,00,ae,00,00,00,00,00,00,00,8c,01,00,00,00,00,00,00,\
00,00,00,00,01,00,14,80,90,00,00,00,a0,00,00,00,14,00,00,00,44,00,00,00,02,\
00,30,00,02,00,00,00,02,c0,14,00,13,00,05,01,01,01,00,00,00,00,00,01,00,00,\
00,00,02,c0,14,00,ff,ff,1f,00,01,01,00,00,00,00,00,05,07,00,00,00,02,00,4c,\
00,03,00,00,00,00,00,14,00,0c,00,02,00,01,01,00,00,00,00,00,01,00,00,00,00,\
00,00,18,00,1f,00,0f,00,01,02,00,00,00,00,00,05,20,00,00,00,20,02,00,00,00,\
00,18,00,1f,00,0f,00,01,02,00,00,00,00,00,05,20,00,00,00,24,02,00,00,01,02,\
00,00,00,00,00,05,20,00,00,00,20,02,00,00,01,02,00,00,00,00,00,05,20,00,00,\
00,20,02,00,00,48,00,79,00,70,00,65,00,72,00,2d,00,56,00,20,00,41,00,64,00,\
6d,00,69,00,6e,00,69,00,73,00,74,00,72,00,61,00,74,00,6f,00,72,00,73,00,4d,\
00,65,00,6d,00,62,00,65,00,72,00,73,00,20,00,6f,00,66,00,20,00,74,00,68,00,\
69,00,73,00,20,00,67,00,72,00,6f,00,75,00,70,00,20,00,68,00,61,00,76,00,65,\
00,20,00,63,00,6f,00,6d,00,70,00,6c,00,65,00,74,00,65,00,20,00,61,00,6e,00,\
64,00,20,00,75,00,6e,00,72,00,65,00,73,00,74,00,72,00,69,00,63,00,74,00,65,\
00,64,00,20,00,61,00,63,00,63,00,65,00,73,00,73,00,20,00,74,00,6f,00,20,00,\
61,00,6c,00,6c,00,20,00,66,00,65,00,61,00,74,00,75,00,72,00,65,00,73,00,20,\
00,6f,00,66,00,20,00,48,00,79,00,70,00,65,00,72,00,2d,00,56,00,2e,00,00,00

[HKEY_LOCAL_MACHINE\SAM\SAM\Domains\Builtin\Aliases\0000022C]
"C"=hex:2c,02,00,00,00,00,00,00,b0,00,00,00,02,00,01,00,b0,00,00,00,3e,00,00,\
00,00,00,00,00,f0,00,00,00,d8,00,00,00,00,00,00,00,c8,01,00,00,00,00,00,00,\
00,00,00,00,01,00,14,80,90,00,00,00,a0,00,00,00,14,00,00,00,44,00,00,00,02,\
00,30,00,02,00,00,00,02,c0,14,00,13,00,05,01,01,01,00,00,00,00,00,01,00,00,\
00,00,02,c0,14,00,ff,ff,1f,00,01,01,00,00,00,00,00,05,07,00,00,00,02,00,4c,\
00,03,00,00,00,00,00,14,00,0c,00,02,00,01,01,00,00,00,00,00,01,00,00,00,00,\
00,00,18,00,1f,00,0f,00,01,02,00,00,00,00,00,05,20,00,00,00,20,02,00,00,00,\
00,18,00,1f,00,0f,00,01,02,00,00,00,00,00,05,20,00,00,00,24,02,00,00,01,02,\
00,00,00,00,00,05,20,00,00,00,20,02,00,00,01,02,00,00,00,00,00,05,20,00,00,\
00,20,02,00,00,4e,00,65,00,74,00,77,00,6f,00,72,00,6b,00,20,00,43,00,6f,00,\
6e,00,66,00,69,00,67,00,75,00,72,00,61,00,74,00,69,00,6f,00,6e,00,20,00,4f,\
00,70,00,65,00,72,00,61,00,74,00,6f,00,72,00,73,00,00,00,4d,00,65,00,6d,00,\
62,00,65,00,72,00,73,00,20,00,69,00,6e,00,20,00,74,00,68,00,69,00,73,00,20,\
00,67,00,72,00,6f,00,75,00,70,00,20,00,63,00,61,00,6e,00,20,00,68,00,61,00,\
76,00,65,00,20,00,73,00,6f,00,6d,00,65,00,20,00,61,00,64,00,6d,00,69,00,6e,\
00,69,00,73,00,74,00,72,00,61,00,74,00,69,00,76,00,65,00,20,00,70,00,72,00,\
69,00,76,00,69,00,6c,00,65,00,67,00,65,00,73,00,20,00,74,00,6f,00,20,00,6d,\
00,61,00,6e,00,61,00,67,00,65,00,20,00,63,00,6f,00,6e,00,66,00,69,00,67,00,\
75,00,72,00,61,00,74,00,69,00,6f,00,6e,00,20,00,6f,00,66,00,20,00,6e,00,65,\
00,74,00,77,00,6f,00,72,00,6b,00,69,00,6e,00,67,00,20,00,66,00,65,00,61,00,\
74,00,75,00,72,00,65,00,73,00

[HKEY_LOCAL_MACHINE\SAM\SAM\Domains\Builtin\Aliases\00000223]
"C"=hex:23,02,00,00,00,00,00,00,b0,00,00,00,02,00,01,00,b0,00,00,00,16,00,00,\
00,00,00,00,00,c8,00,00,00,bc,00,00,00,00,00,00,00,84,01,00,00,00,00,00,00,\
00,00,00,00,01,00,14,80,90,00,00,00,a0,00,00,00,14,00,00,00,44,00,00,00,02,\
00,30,00,02,00,00,00,02,c0,14,00,13,00,05,01,01,01,00,00,00,00,00,01,00,00,\
00,00,02,c0,14,00,ff,ff,1f,00,01,01,00,00,00,00,00,05,07,00,00,00,02,00,4c,\
00,03,00,00,00,00,00,14,00,0c,00,02,00,01,01,00,00,00,00,00,01,00,00,00,00,\
00,00,18,00,1f,00,0f,00,01,02,00,00,00,00,00,05,20,00,00,00,20,02,00,00,00,\
00,18,00,1f,00,0f,00,01,02,00,00,00,00,00,05,20,00,00,00,24,02,00,00,01,02,\
00,00,00,00,00,05,20,00,00,00,20,02,00,00,01,02,00,00,00,00,00,05,20,00,00,\
00,20,02,00,00,50,00,6f,00,77,00,65,00,72,00,20,00,55,00,73,00,65,00,72,00,\
73,00,00,00,50,00,6f,00,77,00,65,00,72,00,20,00,55,00,73,00,65,00,72,00,73,\
00,20,00,61,00,72,00,65,00,20,00,69,00,6e,00,63,00,6c,00,75,00,64,00,65,00,\
64,00,20,00,66,00,6f,00,72,00,20,00,62,00,61,00,63,00,6b,00,77,00,61,00,72,\
00,64,00,73,00,20,00,63,00,6f,00,6d,00,70,00,61,00,74,00,69,00,62,00,69,00,\
6c,00,69,00,74,00,79,00,20,00,61,00,6e,00,64,00,20,00,70,00,6f,00,73,00,73,\
00,65,00,73,00,73,00,20,00,6c,00,69,00,6d,00,69,00,74,00,65,00,64,00,20,00,\
61,00,64,00,6d,00,69,00,6e,00,69,00,73,00,74,00,72,00,61,00,74,00,69,00,76,\
00,65,00,20,00,70,00,6f,00,77,00,65,00,72,00,73,00

[HKEY_LOCAL_MACHINE\SAM\SAM\Domains\Builtin\Aliases\0000022B]
"C"=hex:2b,02,00,00,00,00,00,00,b0,00,00,00,02,00,01,00,b0,00,00,00,28,00,00,\
00,00,00,00,00,d8,00,00,00,7a,00,00,00,00,00,00,00,54,01,00,00,00,00,00,00,\
00,00,00,00,01,00,14,80,90,00,00,00,a0,00,00,00,14,00,00,00,44,00,00,00,02,\
00,30,00,02,00,00,00,02,c0,14,00,13,00,05,01,01,01,00,00,00,00,00,01,00,00,\
00,00,02,c0,14,00,ff,ff,1f,00,01,01,00,00,00,00,00,05,07,00,00,00,02,00,4c,\
00,03,00,00,00,00,00,14,00,0c,00,02,00,01,01,00,00,00,00,00,01,00,00,00,00,\
00,00,18,00,1f,00,0f,00,01,02,00,00,00,00,00,05,20,00,00,00,20,02,00,00,00,\
00,18,00,1f,00,0f,00,01,02,00,00,00,00,00,05,20,00,00,00,24,02,00,00,01,02,\
00,00,00,00,00,05,20,00,00,00,20,02,00,00,01,02,00,00,00,00,00,05,20,00,00,\
00,20,02,00,00,52,00,65,00,6d,00,6f,00,74,00,65,00,20,00,44,00,65,00,73,00,\
6b,00,74,00,6f,00,70,00,20,00,55,00,73,00,65,00,72,00,73,00,4d,00,65,00,6d,\
00,62,00,65,00,72,00,73,00,20,00,69,00,6e,00,20,00,74,00,68,00,69,00,73,00,\
20,00,67,00,72,00,6f,00,75,00,70,00,20,00,61,00,72,00,65,00,20,00,67,00,72,\
00,61,00,6e,00,74,00,65,00,64,00,20,00,74,00,68,00,65,00,20,00,72,00,69,00,\
67,00,68,00,74,00,20,00,74,00,6f,00,20,00,6c,00,6f,00,67,00,6f,00,6e,00,20,\
00,72,00,65,00,6d,00,6f,00,74,00,65,00,6c,00,79,00,00,00

[HKEY_LOCAL_MACHINE\SAM\SAM\Domains\Builtin\Aliases\00000228]
"C"=hex:28,02,00,00,00,00,00,00,b0,00,00,00,02,00,01,00,b0,00,00,00,14,00,00,\
00,00,00,00,00,c4,00,00,00,4a,00,00,00,00,00,00,00,10,01,00,00,00,00,00,00,\
00,00,00,00,01,00,14,80,90,00,00,00,a0,00,00,00,14,00,00,00,44,00,00,00,02,\
00,30,00,02,00,00,00,02,c0,14,00,13,00,05,01,01,01,00,00,00,00,00,01,00,00,\
00,00,02,c0,14,00,ff,ff,1f,00,01,01,00,00,00,00,00,05,07,00,00,00,02,00,4c,\
00,03,00,00,00,00,00,14,00,0c,00,02,00,01,01,00,00,00,00,00,01,00,00,00,00,\
00,00,18,00,1f,00,0f,00,01,02,00,00,00,00,00,05,20,00,00,00,20,02,00,00,00,\
00,18,00,1f,00,0f,00,01,02,00,00,00,00,00,05,20,00,00,00,24,02,00,00,01,02,\
00,00,00,00,00,05,20,00,00,00,20,02,00,00,01,02,00,00,00,00,00,05,20,00,00,\
00,20,02,00,00,52,00,65,00,70,00,6c,00,69,00,63,00,61,00,74,00,6f,00,72,00,\
53,00,75,00,70,00,70,00,6f,00,72,00,74,00,73,00,20,00,66,00,69,00,6c,00,65,\
00,20,00,72,00,65,00,70,00,6c,00,69,00,63,00,61,00,74,00,69,00,6f,00,6e,00,\
20,00,69,00,6e,00,20,00,61,00,20,00,64,00,6f,00,6d,00,61,00,69,00,6e,00,00,\
00

[HKEY_LOCAL_MACHINE\SAM\SAM\Domains\Builtin\Aliases\Names\Access Control Assistance Operators]
@=hex(243):

[HKEY_LOCAL_MACHINE\SAM\SAM\Domains\Builtin\Aliases\Names\Backup Operators]
@=hex(227):

[HKEY_LOCAL_MACHINE\SAM\SAM\Domains\Builtin\Aliases\Names\Cryptographic Operators]
@=hex(239):

[HKEY_LOCAL_MACHINE\SAM\SAM\Domains\Builtin\Aliases\Names\Hyper-V Administrators]
@=hex(242):

[HKEY_LOCAL_MACHINE\SAM\SAM\Domains\Builtin\Aliases\Names\Network Configuration Operators]
@=hex(22c):

[HKEY_LOCAL_MACHINE\SAM\SAM\Domains\Builtin\Aliases\Names\Power Users]
@=hex(223):

[HKEY_LOCAL_MACHINE\SAM\SAM\Domains\Builtin\Aliases\Names\Remote Desktop Users]
@=hex(22b):

[HKEY_LOCAL_MACHINE\SAM\SAM\Domains\Builtin\Aliases\Names\Replicator]
@=hex(228):

Para importar o arquivo do Registro na conta SYSTEM, usei a ferramenta PsExec.exe, no pacote PsTools "Process Utilities" do Microsoft TechNet . É um pacote ZIP, então você não precisa instalar nada. Após descompactar o arquivo psexec.exe, eu corri como um administrador com o seguinte comando: PsExec.exe -s -i regedit.exe. Na janela do Editor do Registro, selecionei File > Importe naveguei pelo local do arquivo de registro.

Para importar o arquivo do registro com sucesso, você não precisa usar o PsExec, mas precisa ter permissão para gravar nas HKEY_LOCAL_MACHINE\SAM\SAM\Domains\Builtin\Aliases\chaves do Registro, o que pode ser obtido replicando as permissões da HKEY_LOCAL_MACHINE\SAMchave para seus filhos (subchaves) .

Depois de importar o arquivo de registro, adicionei usuários ao grupo Usuários da área de trabalho remota ( net localgroup "Remote Desktop Users" [username] /add) e, com esses usuários, pude acessar meu computador com o Windows 7 Home Premium com a Área de trabalho remota.

palswim
fonte
Esta é a resposta mais completa e deve ser aceita. Não importa que seja seu.
cdlvcdlv