for %%i in (fdPhost FDResPub upnphost lmhosts iphlpsvc SSDPSRV) do ( sc config "%%i" start=auto > NUL 2>&1 net start "%%i" > NUL 2>&1 ) netsh advfirewall reset > NUL 2>&1 Powershell "Enable-WindowsOptionalFeature -Online -NoRestart -FeatureName SMB1Protocol" Powershell "foreach ($Group in ('@FirewallAPI.dll,-28502','@FirewallAPI.dll,-32752')) {Set-NetFirewallRule -Group $Group -Profile Private, Public -Enabled True}" Powershell "Get-NetConnectionProfile | Set-NetConnectionProfile -InterfaceAlias Ethernet* -NetworkCategory %red%" Powershell "Get-NetConnectionProfile | Set-NetConnectionProfile -InterfaceAlias Wi-Fi* -NetworkCategory %red%" Reg.exe add "HKLM\SYSTEM\CurrentControlSet\Services\LanmanWorkstation\Parameters" /v "EnablePlainTextPassword" /t REG_DWORD /d "0" /f > NUL 2>&1 Reg.exe add "HKLM\SYSTEM\CurrentControlSet\Services\LanmanWorkstation\Parameters" /v "EnableSecuritySignature" /t REG_DWORD /d "1" /f > NUL 2>&1 Reg.exe add "HKLM\SYSTEM\CurrentControlSet\Services\LanmanWorkstation\Parameters" /v "RequireSecuritySignature" /t REG_DWORD /d "0" /f > NUL 2>&1 Reg.exe add "HKLM\SYSTEM\CurrentControlSet\Services\LanmanWorkstation\Parameters" /v "AllowInsecureGuestAuth" /t REG_DWORD /d "1" /f > NUL 2>&1 Reg.exe add "HKLM\Software\Microsoft\Windows\CurrentVersion\NcdAutoSetup\Private" /v "AutoSetup" /t REG_DWORD /d "0" /f > NUL 2>&1