...

Guiones

Lectura estimada: 14 minutos

Agent / Relay (ADA ASA)

Agent - Responsable de recopilar toda la información sobre los activos.
Relay - Envía toda la información recogida por el agent a Almaden.

Ruta
Caminos
###### Desktop Agent #####
"C:\Program Files (x86)\Automatos\Desktop Agent"

#Logs
"C:\Program Files (x86)\Automatos\Desktop Agent\tmp"

##### Server Agent #####
"C:\Program Files (x86)\Automatos\Automatos Server Agent"

#Logs
"C:\Program Files (x86)\Automatos\Automatos Server Agent\tmp"

Registro
Agent
::#################################
::ADA / ASA
::#################################

:: Customer ID Desktop Agent
reg add "HKLM\SOFTWARE\WOW6432Node\Automatos\Ada\Common\3.0" /v CustomerID /t REG_SZ /d "internal@almaden.ai" /f

:: Customer ID Server Agent
reg add "HKLM\SOFTWARE\WOW6432Node\Automatos\Ada\Common\3.0" /v CustomerID /t REG_SZ /d "internal@almaden.ai" /f

:: Força a coleta completa do Desktop Agent (Server Agent Não possui)
::Enable = 1
::Disable (default) = 0
reg add "HKLM\SOFTWARE\WOW6432Node\Automatos\Ada\Engine\3.0" /v First_TU /t REG_DWORD /d 0 /f

:: Permite Mid Change
::Enable (default) = 1
::Disable = 0
reg add "HKLM\SOFTWARE\WOW6432Node\Automatos\Ada\Common\3.0" /v OEMID /t REG_DWORD /d 1 /f

:: Ignora coletores
::Default = prtmon
reg add "HKLM\SOFTWARE\WOW6432Node\Automatos\Ada\Engine\3.0" /v sSkipCollectors /t REG_SZ /d "prtmon" /f
Relay
::#################################
::RELAY
::#################################

:: Relay alternativo - Mantém o primário sempre habilitado
::Enable = 1
::Disable = 0
reg add "HKLM\SOFTWARE\WOW6432Node\Automatos\Ada\Engine\3.0" /v UseRelay /t REG_DWORD /d 1 /f

:: Relay Primario Endereço - 127.0.0.1 envia diretamente para a nuvem CIQ ITAM
reg add "HKLM\SOFTWARE\WOW6432Node\Automatos\Ada\Engine\3.0" /v TX_Relay /t REG_SZ /d "127.0.0.1" /f

:: Relay Primario Porta
::Default = 1999
reg add "HKLM\SOFTWARE\WOW6432Node\Automatos\Ada\Engine\3.0" /v TX_Relay_Port /t REG_DWORD /d 1999 /f

::Relay Alternativo Endereço
reg add "HKLM\SOFTWARE\WOW6432Node\Automatos\Ada\Engine\3.0" /v TX_Relay_A /t REG_SZ /d "" /f

::Relay Alternativo Porta
::Default = 1999
reg add "HKLM\SOFTWARE\WOW6432Node\Automatos\Ada\Engine\3.0" /v TX_Relay_Port_A /t REG_DWORD /d 1999 /f

::Porta de escuta do RELAY
::Default = 1999
reg add "HKLM\SOFTWARE\WOW6432Node\Automatos\Asa\Relay\3.0" /v "Listen_Port" /t REG_DWORD /d 1999 /f

:: Número máximo de arquivos em backlog na pasta de logs "tmp"
::Default 50000
reg add "HKLM\SOFTWARE\WOW6432Node\Automatos\Asa\Relay\3.0" /v "BackLog_MaxFiles" /t REG_DWORD /d 50000 /f

::Máximo de agentes conectados ao Relay (Server Agent) - Para desktop é ilimitado por default
:: Aumente quando o relay central for receber muitas conexões de Server Agent
::Default = 30
reg add "HKLM\SOFTWARE\WOW6432Node\Automatos\Asa\Relay\3.0" /v "Max_Agents" /t REG_DWORD /d 30 /f
Programas informáticos
::#################################
::SOFTWARES 
::#################################

:: Coleta de softwares do Windows
::Enable (default) = 1
::Disable = 0
reg add "HKLM\SOFTWARE\WOW6432Node\Automatos\Ada\Plugins\Asset\3.0" /v "EnableSoftware" /t REG_DWORD /d 1 /f

:: Coleta de softwares Microsoft Store (Server Agent não possui)
::Enable (default) = 1
::Disable = 0
reg add "HKLM\SOFTWARE\WOW6432Node\Automatos\Ada\Plugins\Asset\3.0" /v "SoftAppx" /t REG_DWORD /d 1 /f
Geolocalización
::#################################
::GEOLOCALIZAÇÃO
::#################################

::# Token API de Geolocalização
reg add "HKLM\SOFTWARE\WOW6432Node\Automatos\Ada\Plugins\Asset\3.0" /v "TokenGeoAPI" /t REG_SZ /d "" /f
::Intervalo de coleta usando o token de geolocalização em minutos
::Default = 60
reg add "HKLM\SOFTWARE\WOW6432Node\Automatos\Ada\Plugins\Asset\3.0" /v "NetFreqMin" /t REG_DWORD /d 720 /f
Proxy / Cortafuegos
::######################################## METHODS ########################################
::NOTA: Apply all registry keys related to each proxy authentication method.
::They apply to both ADA and ASA.

::Change Values "CONFIG_HERE"

:: 1. ######## NONE - Apply to reset the settings to default mode (No proxy). ########
reg add "HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Automatos\Asa\Relay\3.0" /v Firewall_Authentication /t REG_DWORD /d 0 /f
reg add "HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Automatos\Asa\Relay\3.0" /v Firewall_Server /t REG_SZ /d "" /f
reg add "HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Automatos\Asa\Relay\3.0" /v Firewall_Port /t REG_DWORD /d 443 /f
reg add "HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Automatos\Asa\Relay\3.0" /v Firewall_Type /t REG_SZ /d 0 /f
reg add "HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Automatos\Asa\Relay\3.0" /v Firewall_Domain /t REG_SZ /d "" /f
reg add "HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Automatos\Asa\Relay\3.0" /v Firewall_UserID /t REG_SZ /d "" /f
reg add "HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Automatos\Asa\Relay\3.0" /v Firewall_Password /t REG_SZ /d "" /f

:: 2. ######## PROXY Unauthenticated / open proxy ########
reg add "HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Automatos\Asa\Relay\3.0" /v Firewall_Server /t REG_SZ /d "CONFIG_HERE" /f
reg add "HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Automatos\Asa\Relay\3.0" /v Firewall_Port /t REG_DWORD /d "CONFIG_HERE" /f
::Default values
reg add "HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Automatos\Asa\Relay\3.0" /v Firewall_Type /t REG_SZ /d 1 /f
reg add "HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Automatos\Asa\Relay\3.0" /v Firewall_Authentication /t REG_DWORD /d 1 /f

:: 3. ######## PROXY AUTHENTICATED WITH DOMAIN ########
reg add "HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Automatos\Asa\Relay\3.0" /v Firewall_Server /t REG_SZ /d "CONFIG_HERE" /f
reg add "HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Automatos\Asa\Relay\3.0" /v Firewall_Port /t REG_DWORD /d "CONFIG_HERE" /f
reg add "HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Automatos\Asa\Relay\3.0" /v Firewall_Domain /t REG_SZ /d "CONFIG_HERE" /f
reg add "HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Automatos\Asa\Relay\3.0" /v Firewall_UserID /t REG_SZ /d "CONFIG_HERE" /f
reg add "HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Automatos\Asa\Relay\3.0" /v Firewall_Password /t REG_SZ /d "CONFIG_HERE" /f
::Default values
reg add "HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Automatos\Asa\Relay\3.0" /v Firewall_Type /t REG_SZ /d 1 /f
reg add "HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Automatos\Asa\Relay\3.0" /v Firewall_Authentication /t REG_DWORD /d 1 /f

:: 4. ######## Transparent Proxy authenticated ########
reg add "HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Automatos\Asa\Relay\3.0" /v Firewall_Server /t REG_SZ /d ""CONFIG_HERE"" /f
reg add "HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Automatos\Asa\Relay\3.0" /v Firewall_Port /t REG_DWORD /d ""CONFIG_HERE"" /f
reg add "HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Automatos\Asa\Relay\3.0" /v Firewall_Domain /t REG_SZ /d ""CONFIG_HERE"" /f
reg add "HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Automatos\Asa\Relay\3.0" /v Firewall_UserID /t REG_SZ /d "CONFIG_HERE" /f
reg add "HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Automatos\Asa\Relay\3.0" /v Firewall_Password /t REG_SZ /d "CONFIG_HERE" /f
::Default values
reg add "HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Automatos\Asa\Relay\3.0" /v Firewall_Authentication /t REG_DWORD /d 1 /f
reg add "HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Automatos\Asa\Relay\3.0" /v Firewall_Type /t REG_SZ /d 4 /f

:: 5. ######## SOCKS v4
reg add "HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Automatos\Asa\Relay\3.0" /v Firewall_Server /t REG_SZ /d CONFIG_HERE /f
reg add "HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Automatos\Asa\Relay\3.0" /v Firewall_Port /t REG_DWORD /d CONFIG_HERE /f
reg add "HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Automatos\Asa\Relay\3.0" /v Firewall_Domain /t REG_SZ /d "CONFIG_HERE" /f
reg add "HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Automatos\Asa\Relay\3.0" /v Firewall_UserID /t REG_SZ /d "CONFIG_HERE" /f
reg add "HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Automatos\Asa\Relay\3.0" /v Firewall_Password /t REG_SZ /d "CONFIG_HERE" /f
::Default values
reg add "HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Automatos\Asa\Relay\3.0" /v Firewall_Authentication /t REG_DWORD /d 1 /f
reg add "HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Automatos\Asa\Relay\3.0" /v Firewall_Type /t REG_SZ /d 2 /f

:: 6. ######## SOCKS v5
reg add "HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Automatos\Asa\Relay\3.0" /v Firewall_Server /t REG_SZ /d "CONFIG_HERE" /f
reg add "HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Automatos\Asa\Relay\3.0" /v Firewall_Port /t REG_DWORD /d "CONFIG_HERE" /f
reg add "HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Automatos\Asa\Relay\3.0" /v Firewall_Domain /t REG_SZ /d "" /f
reg add "HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Automatos\Asa\Relay\3.0" /v Firewall_UserID /t REG_SZ /d "" /f
reg add "HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Automatos\Asa\Relay\3.0" /v Firewall_Password /t REG_SZ /d "" /f
::Default values
reg add "HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Automatos\Asa\Relay\3.0" /v Firewall_Authentication /t REG_DWORD /d 1 /f
reg add "HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Automatos\Asa\Relay\3.0" /v Firewall_Type /t REG_SZ /d 3 /f

:: 7. ######## SOCKS v5 authenticated
reg add "HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Automatos\Asa\Relay\3.0" /v Firewall_Server /t REG_SZ /d "CONFIG_HERE" /f
reg add "HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Automatos\Asa\Relay\3.0" /v Firewall_Port /t REG_DWORD /d "CONFIG_HERE" /f
reg add "HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Automatos\Asa\Relay\3.0" /v Firewall_Domain /t REG_SZ /d "" /f
reg add "HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Automatos\Asa\Relay\3.0" /v Firewall_UserID /t REG_SZ /d "CONFIG_HERE" /f
reg add "HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Automatos\Asa\Relay\3.0" /v Firewall_Password /t REG_SZ /d "CONFIG_HERE" /f
::Default values
reg add "HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Automatos\Asa\Relay\3.0" /v Firewall_Authentication /t REG_DWORD /d 1 /f
reg add "HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Automatos\Asa\Relay\3.0" /v Firewall_Type /t REG_SZ /d 3 /f
Archivos de registro
::#################################
::LOGS
::#################################

:: AGENTE
::Enable verbosity = 7
::Disable verbosity (default) = 0
reg add "HKLM\SOFTWARE\WOW6432Node\Automatos\Ada\Engine\3.0" /v Verbosity /t REG_DWORD /d 0 /f

:: RELAY
::Enable verbosity = 7
::Disable verbosity (default) = 0
reg add "HKLM\SOFTWARE\WOW6432Node\Automatos\Asa\Relay\3.0" /v "Verbosity" /t REG_DWORD /d 0 /f

Procesos y servicios
Procesos y servicios
#Stop Proccess and Services
taskkill /F /IM aengine.exe
taskkill /F /IM arelay.exe
sc stop "AutomatosDesktopAgent"
sc stop "AutomatosServerAgent"
sc stop "AutomatosRelay"

#Start Services
sc start "AutomatosDesktopAgent"
sc start "AutomatosServerAgent"
sc start "AutomatosRelay"

Actualización automática (AAU)

Actualización automática - Ejecuta las tareas de distribución WAN enviadas por el portal CIQ ITAM.

Ruta
Ruta
##### AAU Path #####
"C:\Program Files (x86)\Automatos\Auto Update"

#Logs
"C:\Windows\aau_installer.log"
"C:\Windows\aau_service.log"

Registro
AAU
::#######
::Auto Update AAU
::#######

:: Espera máxima de buscar informações da distribuição WAN (Minutos)
::Default = 60
reg add "HKLM\SOFTWARE\WOW6432Node\Automatos\Auto Update" /v "Max First Wait" /t REG_DWORD /d 60 /f

::Intervalo de comunicação do agente com a nuvem (Minutos)
::Default 120
reg add "HKLM\SOFTWARE\WOW6432Node\Automatos\Auto Update" /v "Software Update Interval" /t REG_DWORD /d 120 /f

::Intervalo máximo aguardando resposta da Nuvem CIQ ITAM (Minutos)
::Default = 120
reg add "HKLM\SOFTWARE\WOW6432Node\Automatos\Auto Update" /v "Site Timeout" /t REG_DWORD /d 120 /f

Procesos y servicios
Procesos y servicios
#Stop Proccess and Services
taskkill /F /IM aau.exe
sc stop "Automatos Auto Update"

#Start Services
sc start "Automatos Auto Update"

Desinstalador de software (ASU)

Software Uninstaller - Ejecuta las eliminaciones de software configuradas en la lista negra
Nota: Por defecto, los archivos de la lista negra no están presentes tras la instalación; consulte el manual.

Ruta
Ruta
##### AAU Path #####
"C:\Program Files (x86)\Automatos\Software Uninstaller"

##### Local Blacklist Path #####
"C:\Program Files (x86)\Automatos\AwSetup"

#Logs - Habilite com as chaves de registro
"C:\Automatos\ASULOGS"

Registro
ASU
::#######
::Software Uninstaller ASU
::#######

:: Caminho da blacklist remota (aplicada onde todos os computadores tem acesso de leitura na rede)
::EX: \\10.70.35.100\Almaden\BlacklistFiles
reg add "HKLM\SOFTWARE\WOW6432Node\Automatos\ASU" /v "RemoteBlacklistPath" /t REG_SZ /d "C:\WINDOWS\AUTOMATOS\BLACKLIST" /f

:: Habilita/Desabilita Logs do ASU
::NOTA: Ao habilitar o "EnableServiceLogFile", configure o arquivo de log "ServiceLogFile" aplicando o nome do arquivo
::Habilita = 1
::Desabilita (Default) = 0
reg add "HKLM\SOFTWARE\WOW6432Node\Automatos\ASU\Config" /v "EnableServiceLogFile" /t REG_DWORD /d 0 /f

:: Diretório de logs
::Default = C:\Automatos\ASULOGS
reg add "HKLM\SOFTWARE\WOW6432Node\Automatos\ASU\Config" /v "LogDir" /t REG_SZ /d "C:\Automatos\ASULOGS" /f

:: Arquivo de logs
::Aplicar = C:\Automatos\ASULOGS\asu_log.txt
reg add "HKLM\SOFTWARE\WOW6432Node\Automatos\ASU\Config" /v "ServiceLogFile" /t REG_SZ /d "C:\Automatos\ASULOGS\asu_log.txt" /f

Procesos y servicios
Procesos y servicios
#Stop Proccess and Services
taskkill /F /IM asu.exe
sc stop "Uninstall"

#Start Services
sc start "Uninstall"

Servidor de control remoto seguro Automatos (ASRCS)

Servidor de Control Remoto Seguro Automatos - Ejecuta tareas de distribución LAN enviadas por un Agent Servidor + Plugin Asistente de Distribución

Caminos
Caminos
##### ASRCS Path #####
"C:\Program Files (x86)\Automatos\Secure Remote Control\Server"

# Logs
"C:\Windows\asrcs_run.log"
"C:\Windows\asrcse.log"

Procesos y servicios
Procesos y servicios
#Stop Proccess and Services
taskkill /F /IM asrcse.exe
sc stop "asrcs"

#Start Services
sc start "asrcs"

Acceso remoto (servidor ARC)

Servidor de Control Remoto Automatos - Aplicación de conexión remota

Caminos
Caminos
##### Arc Server Path #####
"C:\Program Files (x86)\Automatos\Automatos Remote Control Server"

#Logs
"C:\Program Files (x86)\Automatos\Automatos Remote Control Server\aon_gui.out"
"C:\Program Files (x86)\Automatos\Automatos Remote Control Server\aon_service.out"

Registro
Configuración
::#######
::CONFIGURAÇÕES
::#######

:: HABILITA/DESABILITA ACESSO REMOTO
::Habilitado (default) = true
::Desabilitado = false
reg add "HKLM\SOFTWARE\WOW6432Node\ISL Online\ISL AlwaysOn" /v "enabled" /t REG_SZ /d "true" /f

:: EXIBIR POPUP DE SOLICITAÇÃO DE ACESSO REMOTO AO USUARIO
::Habilitado  = true
::Desabilitado = false
reg add "HKLM\SOFTWARE\WOW6432Node\ISL Online\ISL AlwaysOn" /v "notify_show" /t REG_SZ /d "true" /f

:: TEMPO DE POPUP EXIBIDO AO USUARIO (Segundos)
::Padrão = 10
reg add "HKLM\SOFTWARE\WOW6432Node\ISL Online\ISL AlwaysOn" /v "notify_timeout" /t REG_SZ /d "30" /f

:: PERMITE O USUARIO REJEITAR A CONEXÃO REMOTA
::Permite rejeição = true
::Não Permite rejeição = false
reg add "HKLM\SOFTWARE\WOW6432Node\ISL Online\ISL AlwaysOn" /v "notify_allow_reject" /t REG_SZ /d "true" /f

:: OPÇÃO PADRÃO EXIBIDA PARA O USUÁRIO
::Permite acesso = false
::Rejeita acesso = true
reg add "HKLM\SOFTWARE\WOW6432Node\ISL Online\ISL AlwaysOn" /v "notify_reject_default" /t REG_SZ /d "false" /f

:: PULA A NOTIFICAÇÃO AO USUARIO QUANDO NENHUMA SESSÃO DE USUÁRIO ESTÁ ATIVA NO COMPUTADOR
reg add "HKLM\SOFTWARE\WOW6432Node\ISL Online\ISL AlwaysOn" /v "notify_skip_logon" /t REG_SZ /d "true" /f

:: DIRETORIO PARA ARMAZENAR GRAVAÇÕES (Ao inserir o caminho a gravação é habilitada)
::Nota: O arquivo (.isr) de sessão gravada é aberto pelo player ISL https://docs.almaden.app/docs/remote-access/basic-features-remote-desktop/basic-features-record-a-session/record-a-session-isl-player/
reg add "HKLM\SOFTWARE\WOW6432Node\ISL Online\ISL AlwaysOn" /v "recording_path" /t REG_SZ /d "\\192.168.100.74\\Example" /f

:: BLOQUEIA SESSÃO ATIVA NO COMPUTADOR QUANDO INICIA UMA SESSÃO REMOTA (Acesso intrusivo seguro)
reg add "HKLM\SOFTWARE\WOW6432Node\ISL Online\ISL AlwaysOn" /v "lock_computer" /t REG_SZ /d "true" /f

:: BLOQUEIA A SESSÂO DE USUÁRIO AO FINALIZAR A CONEXÃO REMOTA
reg add "HKLM\SOFTWARE\WOW6432Node\ISL Online\ISL AlwaysOn" /v "disconnect_main_lock" /t REG_SZ /d "true" /f

:: BLOQUEIA A SESSÂO DE USUÁRIO SE A CONEXÃO COM A INTERNET CAIR
reg add "HKLM\SOFTWARE\WOW6432Node\ISL Online\ISL AlwaysOn" /v "connect_desktop_lock_no_net" /t REG_SZ /d "true" /f

:: COMPARTILHAMENTO DE ARQUIVOS (Envia e recebe arquivos do computador remoto)
::Habilitado  = true
::Desabilitado = false
reg add "HKLM\SOFTWARE\WOW6432Node\ISL Online\ISL AlwaysOn" /v "file_sharing" /t REG_SZ /d "false" /f

:: PERMITE ACESSO AO DISCO LOCAL C: COMO LEITURA USANDO A SENHA DE ACESSO "PASSWORD" NO PORTAL "remote.automatos.com"
::Desabilita (Padrão) = 0
::Habilita = 3
reg add "HKLM\SOFTWARE\WOW6432Node\ISL Online\ISL AlwaysOn\fs_JC6RQTGK" /v "type" /t REG_SZ /d "3" /f
Proxy / Cortafuegos
::#######
::PROXY
::#######
:: Nota: Todas as configurações precisam ser aplicadas ao menos uma vez para que seja possível usar as chaves de registro

:: Endereço do proxy
reg add "HKLM\SOFTWARE\WOW6432Node\ISL Online\AutoTransport\Connect options" /v "http_proxy_io1" /t REG_SZ /d "KEY_HERE" /f

:: Usuario de autenticação (Se houver)
reg add "HKLM\SOFTWARE\WOW6432Node\ISL Online\AutoTransport\Connect options" /v "http_proxy_password_io1" /t REG_SZ /d "CHAVE_AQUI" /f

:: Senha de usuário de autenticação
reg add "HKLM\SOFTWARE\WOW6432Node\ISL Online\AutoTransport\Connect options" /v "http_proxy_user_io1" /t REG_SZ /d "CHAVE_AQUI" /f

:: Proxy PAC (essa pode ser aplicada uma URL diretamente na chave)
::Exemplo: http://proxy.almaden.com/proxy.pac
reg add "HKLM\SOFTWARE\WOW6432Node\ISL Online\AutoTransport\Connect options" /v "http_proxy_pac" /t REG_SZ /d "CHAVE_AQUI" /f

Procesos y servicios
Compartir este documento

Guiones

O copie el enlace

Índice
Ir arriba