1
Primary
true
false
NTFS
C
1
1
0
true
OnError
true
Vagrant Administrator
Vagrant Inc.
MHF9N-XY6XB-WVXMC-BTDCT-MKKG7
Never
0
1
OnError
false
/IMAGE/NAME
Windows 8.1 Enterprise Evaluation
en-US
en-US
en-US
en-US
en-US
en-US
false
vagrant
true
vagrant
true
Vagrant User
vagrant
administrators
vagrant
true
true
Home
1
vagrant
true
vagrant
true
cmd.exe /c powershell -Command "Set-ExecutionPolicy -ExecutionPolicy RemoteSigned -Force"
Set Execution Policy
1
true
cmd.exe /c winrm quickconfig -q
winrm quickconfig -q
3
true
cmd.exe /c winrm quickconfig -transport:http
winrm quickconfig -transport:http
4
true
cmd.exe /c winrm set winrm/config @{MaxTimeoutms="1800000"}
Win RM MaxTimoutms
5
true
cmd.exe /c winrm set winrm/config/winrs @{MaxMemoryPerShellMB="800"}
Win RM MaxMemoryPerShellMB
6
true
cmd.exe /c winrm set winrm/config/service @{AllowUnencrypted="true"}
Win RM AllowUnencrypted
7
true
cmd.exe /c winrm set winrm/config/service/auth @{Basic="true"}
Win RM auth Basic
8
true
cmd.exe /c winrm set winrm/config/client/auth @{Basic="true"}
Win RM client auth Basic
9
true
cmd.exe /c winrm set winrm/config/listener?Address=*+Transport=HTTP @{Port="5985"}
Win RM listener Address/Port
10
true
cmd.exe /c netsh advfirewall firewall set rule group="remote administration" new enable=yes
Win RM adv firewall enable
11
true
cmd.exe /c netsh firewall add portopening TCP 5985 "Port 5985"
Win RM port open
12
true
cmd.exe /c net stop winrm
Stop Win RM Service
13
true
cmd.exe /c sc config winrm start= auto
Win RM Autostart
14
true
cmd.exe /c net start winrm
Start Win RM Service
15
true
%SystemRoot%\System32\reg.exe ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ /v HideFileExt /t REG_DWORD /d 0 /f
16
Show file extensions in Explorer
%SystemRoot%\System32\reg.exe ADD HKCU\Console /v QuickEdit /t REG_DWORD /d 1 /f
17
Enable QuickEdit mode
%SystemRoot%\System32\reg.exe ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ /v Start_ShowRun /t REG_DWORD /d 1 /f
18
Show Run command in Start Menu
%SystemRoot%\System32\reg.exe ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ /v StartMenuAdminTools /t REG_DWORD /d 1 /f
19
Show Administrative Tools in Start Menu
%SystemRoot%\System32\reg.exe ADD HKLM\SYSTEM\CurrentControlSet\Control\Power\ /v HibernateFileSizePercent /t REG_DWORD /d 0 /f
20
Zero Hibernation File
%SystemRoot%\System32\reg.exe ADD HKLM\SYSTEM\CurrentControlSet\Control\Power\ /v HibernateEnabled /t REG_DWORD /d 0 /f
21
Disable Hibernation Mode
cmd.exe /c wmic useraccount where "name='vagrant'" set PasswordExpires=FALSE
22
Disable password expiration for vagrant user
cmd.exe /c C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -File a:\openssh.ps1 -AutoStart
Install OpenSSH
99
true
false
false
vagrant-81-x86
Central Standard Time
true