A cikin ƙungiyar da nake aiki, an hana aikin nesa bisa manufa. Was Har satin da ya gabata. Yanzu dole ne mu aiwatar da mafita cikin gaggawa. Daga kasuwanci - daidaita matakai zuwa sabon tsarin aiki, daga gare mu - PKI tare da lambobin PIN da alamu, VPN, cikakken shiga da ƙari.
Daga cikin wasu abubuwa, Ina kafa Kayayyakin Kayan Aiki na Nesa (Remote Desktop Infrastructure) wato Terminal Services. Muna da jigilar RDS da yawa a cibiyoyin bayanai daban-daban. Ɗaya daga cikin manufofin shine don baiwa abokan aiki daga sassan IT masu alaƙa don haɗawa da zaman mai amfani da mu'amala. Kamar yadda kuka sani, akwai daidaitaccen tsarin inuwa na RDS don wannan, kuma hanya mafi sauƙi don wakilta ita ce ba da haƙƙin mai gudanarwa na gida akan sabar RDS.
Ina mutuntawa da daraja abokan aikina, amma ina matukar kwadayin bayar da hakkin admin. 🙂 Ga wadanda suka yarda da ni, don Allah a bi yanke.
To, aikin a bayyane yake, yanzu bari mu sauka zuwa kasuwanci.
Mataki 1
Bari mu ƙirƙiri ƙungiyar tsaro a cikin Active Directory RDP_Masu aiki kuma hada da asusun waɗancan masu amfani waɗanda muke son ba wa haƙƙoƙinsu a ciki:
Idan kuna da shafukan AD da yawa, kuna buƙatar jira har sai an kwaikwayi shi ga duk masu kula da yanki kafin matsawa zuwa mataki na gaba. Wannan yawanci bai wuce mintuna 15 ba.
Mataki 2
Mu baiwa ƙungiyar haƙƙoƙin gudanar da zaman tasha akan kowane sabar RDSH:
Saita-RDSPermissions.ps1
$Group = "RDP_Operators"
$Servers = @(
"RDSHost01",
"RDSHost02",
"RDSHost03"
)
ForEach ($Server in $Servers) {
#Делегируем право на теневые сессии
$WMIHandles = Get-WmiObject `
-Class "Win32_TSPermissionsSetting" `
-Namespace "rootCIMV2terminalservices" `
-ComputerName $Server `
-Authentication PacketPrivacy `
-Impersonation Impersonate
ForEach($WMIHandle in $WMIHandles)
{
If ($WMIHandle.TerminalName -eq "RDP-Tcp")
{
$retVal = $WMIHandle.AddAccount($Group, 2)
$opstatus = "успешно"
If ($retVal.ReturnValue -ne 0) {
$opstatus = "ошибка"
}
Write-Host ("Делегирование прав на теневое подключение группе " +
$Group + " на сервере " + $Server + ": " + $opstatus + "`r`n")
}
}
}
Mataki 3
Ƙara ƙungiyar zuwa rukunin gida Masu amfani da Desktop mai nisa akan kowane sabar RDSH. Idan an haɗa sabar ku zuwa tarin zaman, to muna yin haka a matakin tarin:
Don uwar garken guda ɗaya muna amfani da su manufofin kungiyar, jiran a yi amfani da shi a kan sabobin. Wadanda suka yi kasala don jira zasu iya hanzarta aiwatar da yin amfani da tsohuwar gpupdate mai kyau, zai fi dacewa a tsakiya.
Don sanya rubutun PS ya dace don aiki, za mu ƙirƙira masa harsashi ta hanyar fayil cmd tare da suna iri ɗaya da rubutun PS:
RDSManagement.cmd
@ECHO OFF
powershell -NoLogo -ExecutionPolicy Bypass -File "%~d0%~p0%~n0.ps1" %*
Mun sanya fayiloli guda biyu a cikin babban fayil da za su iya samun dama ga "manjoji" kuma mu tambaye su su sake shiga. Yanzu, ta hanyar gudanar da fayil ɗin cmd, za su iya haɗawa da zaman sauran masu amfani a cikin yanayin Shadow na RDS kuma su tilasta su fita (wannan na iya zama da amfani lokacin da mai amfani ba zai iya dakatar da zaman "hange") da kansa ba.
Yana kama da wani abu kamar haka:
Domin "manager"
Ga mai amfani
'Yan sharhi na ƙarshe
Nuance 1. Idan an ƙaddamar da zaman mai amfani wanda muke ƙoƙarin samun iko kafin a aiwatar da rubutun Set-RDSPermissions.ps1 akan sabar, to "mai sarrafa" zai sami kuskuren shiga. Maganin a nan a bayyane yake: jira har sai mai amfani da aka sarrafa ya shiga.
Nuance 2. Bayan kwanaki da yawa na aiki tare da RDP Shadow, mun lura da bug mai ban sha'awa ko fasali: bayan ƙarshen zaman inuwa, mashaya harshe a cikin tire ya ɓace don haɗin mai amfani da shi, kuma don dawo da shi, mai amfani yana buƙatar sakewa. -shiga. Kamar yadda ya bayyana, ba mu kadai ba: sau, два, uku.
Shi ke nan. Ina muku fatan alheri da kuma sabobin ku. Kamar koyaushe, ina sa ido ga ra'ayoyin ku a cikin sharhi kuma in tambaye ku da ku ɗauki ɗan gajeren binciken da ke ƙasa.