I know this has been already answered else where... but could someone help me in my scripted install of Windows 7 (32-Bit) Auto-login of local workgroup account.

Delete the setup account.

Local administrator account enabled

and the auto-login account enabled with, password, password doesn't expire, and user cannot change password.

Here is what I currently have:

start /wait net user administrator /active:yes
start /wait net user administrator password
start /wait net user SSCC password /add /fullname:"SSCC" /expires:never /passwordchg:no /active
start /wait wmic useraccount where Name='SSCC' set PasswordExpires=False
start /wait net user SSCC /active:yes
start /wait net localgroup groupname SSCC /add
start /wait net user kaceadmin /delete
del /Q /F C:\Users\kaceadmin
start /wait reg.exe add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\WinLogon" /v AutoAdminLogon /d 1 /f
start /wait reg.exe add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\WinLogon" /v DefaultUserName /d SSCC /f
start /wait reg.exe add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\WinLogon" /v DefaultPassWord /d sscc /f
start /wait reg.exe add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\WinLogon" /v ForceAutoLogon /d 1 /f

I have it working well on Windows 7 (64-Bit) with a couple extra reg keys that are required for 64-Bit.

 


 

Answer Summary:
Cancel
0 Comments   [ + ] Show Comments

Comments

Please log in to comment

Answers

1

only thing I see is that you are setting user SSCC's password to password not sscc

start /wait net user SSCC password /add /fullname:"SSCC" /expires:never /passwordchg:no /active

should be

start /wait net user SSCC sscc /add /fullname:"SSCC" /expires:never /passwordchg:no /active

Answered 02/20/2013 by: SMal.tmcc
Red Belt

  • That's the command I have... I just removed the admin and Sscc passwords from the script and replaced with password.
    • I will test in my lab, it should work as you have it.
  • If you remember, I had the same problem with x64... I have setup the x86 the same, minus the commands required for 64bit. I have setup my post install tasks the same and all too.
    • The one thought I am looking at, you are deleting your logged in user mid script, my delete user command is one of the last things I do, I am running your script on a test deployment. The only difference I am doing is not deleting the local user account.
  • Ok ran test with this script and it logs in auto. Try moving these to the end of your batch start /wait net user kaceadmin /delete del /Q /F C:\Users\kaceadmin you may also want to look at rmdir instead of del :::::::::::::::Start of script:::::::::: net start w32time start /wait %SystemRoot%\system32\w32tm /config /update /manualpeerlist:ntp.tmcc.edu /syncfromflags:manual Start /wait net user administrator xxxxxxxxxxxxx Start /wait net user dfault xxxxxxxxxxxx start /wait cscript %SystemRoot%\System32\slmgr.vbs -ATO start /wait net user SSCC SScc123$ /add /fullname:"SSCC" /expires:never /passwordchg:no /active start /wait wmic useraccount where Name='SSCC' set PasswordExpires=False start /wait net user SSCC /active:yes start /wait net localgroup administrators SSCC /add start /wait reg.exe add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\WinLogon" /v AutoAdminLogon /d 1 /f start /wait reg.exe add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\WinLogon" /v DefaultUserName /d SSCC /f start /wait reg.exe add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\WinLogon" /v DefaultPassWord /d SScc123$ /f start /wait reg.exe add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\WinLogon" /v ForceAutoLogon /d 1 /f reg.exe DELETE HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate /f
  • OK, great! I will look into this. However, I will be out of the office, so I will do this when I return. Thank you for your help.
  • This content is currently hidden from public view.
    Reason: Removed by member request
    For more information, visit our FAQ's.
  • Look in the registry under HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\WinLogon is there still a DefaultDomainName key? I am able to duplicate this on a test machine, that key is still there after removing the machine from the domain when I had autologon set before removing it. If that is the case you can add a reg /delete line to your script to nuke that key.
  • OK, here is what I have in the script... it is still not working.. So, I removed all the post install tasks except the autologin script. Still a no go. start /wait net user administrator /active:yes start /wait net user administrator gr1zzly start /wait net user SSCC sscc /add /fullname:"SSCC" /expires:never /passwordchg:no /active start /wait wmic useraccount where Name='SSCC' set PasswordExpires=False start /wait net user SSCC /active:yes start /wait net localgroup groupname SSCC /add start /wait reg.exe add "HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server" /v fDenyTSConnections /d 0 /T REG_DWORD /f start /wait reg.exe add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\WinLogon" /v AutoAdminLogon /d 1 /f start /wait reg.exe add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\WinLogon" /v DefaultUserName /d SSCC /f start /wait reg.exe add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\WinLogon" /v DefaultPassWord /d sscc /f start /wait reg.exe add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\WinLogon" /v ForceAutoLogon /d 1 /f start /wait cscript C:\Windows\System32\slmgr.vbs -skms 10.1.1.53:1688 start /wait cscript C:\Windows\System32\slmgr.vbs -ipk XXXX-XXXXX-XXXXX-XXXXX-XXXXX-XXX "C:\Program Files\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\ospprearm.exe" start /wait cscript %SystemRoot%\System32\slmgr.vbs -ATO start /wait cscript "c:\program files\microsoft office\office14\ospp.vbs" /act start /wait reg.exe add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v ipv6kill /d start /wait reg.exe add "HKLM\SYSTEM\CurrentControlSet\services\Tcpip6\Parameters\" /v DisabledComponents /t REG_DWORD /d 4294967295 /f start /wait reg.exe add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v kclean /d "c:\kcleanup.exe" start /wait net user kaceadmin /delete rmdir C:\Users\kaceadmin Reply
  • Sorry got in a hurry.
    • no prob, let me know about the HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\WinLogon\DefaultDomainName key
  • This was a scripted install never on a workgroup, however the key exists. Doing some more test tomorrow. Didn't have much time today.
  • So after testing again today... the following script is what I have and some reg keys are in place others are not... start /wait net user administrator /active:yes start /wait net user administrator password start /wait net localgroup administrators administrator /add start /wait net localgroup "remote desktop users" administrator /add start /wait net user SSCC sscc /add /fullname:"SSCC" /expires:never /passwordchg:no /active start /wait wmic useraccount where Name='SSCC' set PasswordExpires=False start /wait net user SSCC /active:yes start /wait net localgroup groupname SSCC /add start /wait reg.exe add "HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server" /v fDenyTSConnections /d 0 /T REG_DWORD /f netsh firewall set service type=FILEANDPRINT mode=ENABLE netsh firewall set service type=REMOTEDESKTOP mode=ENABLE start /wait reg.exe add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\WinLogon" /v AutoAdminLogon /d 1 /f start /wait reg.exe add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\WinLogon" /v DefaultUserName /d SSCC /f start /wait reg.exe add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\WinLogon" /v DefaultPassWord /d sscc /f start /wait reg.exe add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\WinLogon" /v ForceAutoLogon /d 1 /f start /wait reg.exe add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v ipv6kill /d start /wait reg.exe add "HKLM\SYSTEM\CurrentControlSet\services\Tcpip6\Parameters\" /v DisabledComponents /t REG_DWORD /d 4294967295 /f start /wait reg.exe add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v kclean /d "c:\kcleanup.exe" start /wait net user kaceadmin /delete rmdir /S /Q C:\Users\kaceadmin The keys that are missing or not configured correctly are: start /wait reg.exe add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\WinLogon" /v AutoAdminLogon /d 1 /f Still set to 0 start /wait reg.exe add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\WinLogon" /v DefaultPassWord /d sscc /f Missing completely When I manually add these and execute it works perfectly. Weird!
    • No not to weird, Those keys will change to that exact state when the AutoLogonCount key reaches zero. Lets add: start /wait reg.exe delete "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\WinLogon" /v DefaultDomainName /f start /wait reg.exe delete "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\WinLogon" /v AutoLogonCount /f after your netsh commands. and remove start /wait reg.exe add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\WinLogon" /v ForceAutoLogon /d 1 /f
  • That got it! You're such a great help! Thank you so much!
    • Good thing I am not a doctor, by the time the problem was diagnosed the patient would have died.
    • did those netsh lines solve your firewall problem?
      • Yes, I used. Tested and working well. netsh firewall set service type=FILEANDPRINT mode=ENABLE netsh firewall set service type=REMOTEDESKTOP mode=ENABLE
Please log in to comment
Answer this question or Comment on this question for clarity