The 3389ip Log Path is c: \ windows \ pdplog \ rdplog.txt
Program Code
Copy code The Code is as follows: MD c: \ windows \ pdplog
Echo date/t ^> rdplog.txt> C: \ WINDOWS \ pdplog. cmd
Echo Time/t ^> rdplog.txt> C: \ WINDOWS \ pdplog. cmd
Echo netstat-n-p tcp ^ | find ": 3389" ^> rdplog.txt> C: \ WINDOWS \ pdplog. cmd
Echo start explorer> C: \ WINDOWS \ pdplog. cmd
: the added user automatically records the IP address used each time he or she enters the Remote Desktop to detect hacker traces!
Reg Add "HKEY_LOCAL_MACHINE \ SYSTEM \ controlset001 \ Control \ Terminal Server \ winstations \ RDP-TCP"/V finheritinitialprogram/T REG_DWORD/D "00000000"/F
Reg add "HKEY_LOCAL_MACHINE \ SYSTEM \ controlset001 \ Control \ Terminal Server \ winstations \ RDP-TCP"/V workdirectory/T REG_SZ/d c: \ windows \ pdplog \/F
Reg Add "HKEY_LOCAL_MACHINE \ SYSTEM \ controlset001 \ Control \ Terminal Server \ winstations \ RDP-TCP"/V initialprogram/T REG_SZ/D "C: \ windows \ pdplog. cmd "/F
Reg Add" HKEY_LOCAL_MACHINE \ SYSTEM \ CurrentControlSet \ Control \ Terminal Server \ winstations \ RDP-TCP "/V finheritinitialprogram/T REG_DWORD/D" 00000000 "/F
Reg Add "HKEY_LOCAL_MACHINE \ SYSTEM \ CurrentControlSet \ Control \ Terminal Server \ winstations \ RDP-TCP"/V workdirectory/T REG_SZ/d c: \ windows \ pdplog \/F
Reg Add "HKEY_LOCAL_MACHINE \ SYSTEM \ CurrentControlSet \ Control \ Terminal Server \ winstations \ RDP-TCP"/V initialprogram/T REG_SZ/D "C: \ windows \ pdplog. cmd "/F
the Remote Desktop IP policy has been added! Press any key to exit!
pause> NUL