37861 Shows configuration and state information.\n
37956 Exports configuration settings.\n
37957 \n%1!s! \n [ filename = ] filename \n \n Exports an .xml file that contains the current configuration settings for \n the Network Access Protection (NAP) client. \n \n filename - Specifies the file path. (Required) \n \n Example: \n %1!s! filename = "c:\config.xml" \n
37958 Imports configuration settings.\n
37959 \n%1!s! \n [ filename = ] filename \n \n Imports an .xml file that contains configuration settings for the Network \n Access Protection (NAP) client. \n \n filename - Specifies the file path. (Required) \n \n Example: \n %1!s! filename = "c:\config.xml" \n
38056 Shows state.\n
38057 \n%1!s! \n \n Shows state information. \n
38256 Advanced
38257 Basic
38258 Disabled
38259 Enabled
38260 Client component
38261 Client communication
38262 None
38263 Other
38264 Server communication
38265 Server component
38266 Could not update
38267 In progress
38268 Success
38269 Group policy
38270 Not restricted, deferred enforcement
38271 Not restricted
38272 Restricted
38273 Local
38274 No
38275 Yes
38276 Verbose
38356 Resets CSP configuration.\n
38357 \n%1!s! \n \n Sets the cryptographic service provider (CSP) parameter to "MS-Enhanced cryptographic service provider".\n
38358 Sets CSP configuration.\n
38359 \n%1!s! \n [ name = ] name \n [ [ keylength = ] keylength ] \n \n Sets the cryptographic service provider (CSP) that will be used on the \n target computer. You can obtain the name from the "show csps" command. \n \n name - Specifies the name of the CSP. You can specify only one name. \n (Required) \n keylength - Specifies the length of the asymmetric key. The default is \n 2048. (Optional) \n \n Example: \n %1!s! name = "Microsoft RSA SChannel Cryptographic Provider" keylength = "2048" \n
38360 Shows CSP configuration.\n
38361 \n%1!s! \n \n Shows all available cryptographic service providers (CSPs) on the target \n system. Use this command to obtain the names that you can use in the \n "add csp" and "delete csp" commands. \n
38559 \n%1!s! \n \n Shows configuration settings and state information. \n
38560 Shows group policy configuration.\n
38561 \n%1!s! \n \n Shows group policy configuration settings and state information. \n
38756 Resets hash configuration.\n
38757 \n%1!s! \n \n Sets the hash algorithm parameter to "SHA1". \n
38758 Sets hash configuration.\n
38759 \n%1!s! \n [ oid = ] oid \n \n Sets the hash algorithm that will be used on the target computer. You can \n obtain the oid from the "show hashes" command. \n \n oid - Specifies the oid of the hash algorithm. You can specify only one \n oid. (Required) \n \n Example: \n %1!s! oid = "1.2.840.113549.1.1.5" \n
38760 Shows hash configuration.\n
38761 \n%1!s! \n \n Shows all available hash algorithms on the target system. Use this \n command to obtain the oids that you can use in the "add hash" and \n "delete hash" commands. \n
38856 Resets enforcement configuration.\n
38857 \n%1!s! \n \n Sets the enforcement client parameter to "DISABLED". \n
38858 Sets enforcement configuration.\n
38859 \n%1!s! \n [ID = ] id \n [ADMIN = ] ENABLE|DISABLE \n \n \n Enables or disables enforcement clients. You can specify one or more \n enforcement clients, but you must specify at least one. By default, all \n enforcement clients are disabled. \n \n \n Id the identifier for the Quarantine Enforcement Client (QEC). \n \n \n Examples: \n \n %1!s! ID = 67213 ADMIN = "DISABLE" \n \n
38956 Resets tracing configuration.\n
38957 \n%1!s! \n \n Sets the tracing parameter to "DISABLE".\n
38958 Sets tracing configuration.\n
38959 \n%1!s! \n [ [ state = ] ENABLE|DISABLE \n [ level = ] BASIC|ADVANCED|VERBOSE ] \n \n Sets tracing settings. You must specify at least one parameter. \n \n state - Specifies whether tracing is enabled or disabled. The default \n value is "DISABLE". (Optional) \n ENABLE - Enables tracing. \n DISABLE - Disables tracing. (Default) \n \n level - Specifies the level of information that appears in the tracing \n log file. The default value is "BASIC". (Optional) \n BASIC - Basic tracing detail. (Default) \n ADVANCED - Advanced tracing detail. \n VERBOSE - Verbose tracing detail. \n \n Example: \n %1!s! state = "ENABLE" level = "BASIC" \n
39056 Resets user interface configuration.\n
39057 \n%1!s! \n \n Deletes all settings in the user interface. \n
39058 Sets user interface configuration.\n
39059 \n%1!s! \n [ [ title = ] title \n [ text = ] text \n [ image = ] image ] \n \n Sets the user interface settings. You must specify one or more parameters. \n \n title - Specifies the title that appears in the user interface. \n (Optional) \n \n text - Specifies the description that appears in the user interface. \n (Optional) \n \n image - Specifies the image that appears in the user interface. \n (Optional) \n \n Example: \n %1!s! title = "My company" \n text = "Protecting your PC" \n image = "c:\Logo.jpg" \n
39156 Adds trusted server configuration.\n
39157 \n%1!s! \n [ group = ] group \n [ url = ] url \n [ [ processingorder = ] processingorder ] \n \n Adds the URL to a trusted server group. \n \n group - Specifies the name of the trusted server group. (Required) \n \n url - Specifies the URL. (Required) \n Servers added to this group must use the https:// prefix if required \n by the trusted server group. \n\n \n processingorder - Sets the processing order of the URL. If you do not \n specify the processing order, the URL is added last in \n the list. (Optional) \n \n Example: \n %1!s! group = "group1" url = "url1" processingorder = "1" \n
39158 Deletes trusted server configuration.\n
39159 \n%1!s! \n [ group = ] group \n [ url = ] url \n \n Deletes the URL from a specified trusted server group. \n \n group - Specifies the name of the trusted server group. (Required) \n \n url - Specifies the URL. (Required) \n \n Example: \n %1!s! group = "group1" url = "url1" \n
39160 Renames trusted server configuration.\n
39161 \n%1!s! \n [ group = ] group \n [ url = ] url \n [ newurl = ] url \n \n Renames the URL of an existing trusted server in a specified trusted \n server group. \n \n group - Specifies the name of the trusted server group. (Required) \n \n url - Specifies the existing URL. (Required) \n \n newurl - Specifies the new URL. (Required) \n \n Example: \n %1!s! group = "group1" url = "url1" newurl = "url2" \n
39162 Resets trusted server configuration.\n
39163 \n%1!s! \n [ group = ] group \n \n Deletes all URLs in a specified trusted server group. \n \n group - Specifies the name of the trusted server group. (Required) \n \n Example: \n %1!s! group = "group1" \n
39164 Sets trusted server configuration.\n
39165 \n%1!s! \n [ group = ] group \n [ url = ] url \n [ processingorder = ] processingorder \n \n Sets the configuration of a trusted server. \n \n group - Specfies the name of the trusted server group. (Required) \n \n url - Specifies the URL. (Required) \n \n processingorder - Sets the processing order of the URL. If you do not \n specify the processing order, the URL is added last in \n the list. (Optional) \n \n Example: \n %1!s! group = "group1" url = "url1" processingorder = "1" \n
39256 Adds trusted server group configuration.\n
39257 \n%1!s! \n [ name = ] name \n [ requirehttps = ] ENABLE|DISABLE (optional) \n \n Adds a trusted server group. \n \n name - Specifies the name of the trusted server group. (Required) \n \n requirehttps - Specifies whether server verification (https:) is required for all servers in this group. (optional) \n ENABLE - All servers require https. (Default) \n DISABLE - Non https servers are allowed. \n \n Example: \n %1!s! name = "group1" requirehttps = "ENABLE" \n
39258 Deletes trusted server group configuration.\n
39259 \n%1!s! \n [ name = ] name \n \n Deletes a trusted server group. \n \n name - Specifies the name of the trusted server group. (Required) \n \n Example: \n %1!s! name = "group1" \n
39260 Renames trusted server group configuration.\n
39261 \n%1!s! \n [ name = ] name \n [ newname = ] newname \n \n Renames a trusted server group. \n \n name - Specifies the existing name of the trusted server group. \n (Required) \n \n newname - Specifies the new name of the trusted server group. (Required) \n \n Example: \n %1!s! name = "group1" newname = "group2" \n
39262 Resets trusted server group configuration.\n
39263 \n%1!s! \n \n Deletes all trusted server groups and the list of all health \n registration authority servers (by URL) contained in each trusted server \n group. \n
39264 Shows all trusted server groups.\n
39265 \n%1!s! \n \n Shows all trusted server groups and the URLs in each group. \n
39356 Adds CA server configuration.\n
39357 \n%1!s! \n [ name = ] name \n [ [ processingorder = ] processingorder ] \n \n Adds a certification authority (CA) server. \n \n name - Specifies the name of the CA server. The required format is \n "\computername\CAname". (Required) \n \n processingorder - Sets the processing order of the CA server. If you do \n not specify the processing order, the CA server is \n added last in the list. (Optional) \n \n Example: \n %1!s! name = "\\server1\CA" processingorder = "1" \n
39358 Deletes CA server configuration.\n
39359 \n%1!s! \n [ name = ] name \n \n Deletes a certification authority (CA) server. \n \n name - Specifies the name of the CA server. (Required) \n \n Example: \n %1!s! name = "\\server1\CA" \n
39360 Renames CA server configuration.\n
39361 \n%1!s! \n [ name = ] name \n [ newname = ] newname \n \n Renames an existing certification authority (CA) server. \n \n name - Specifies the existing name of the CA server. (Required) \n \n newname - Specifies the new name of the CA server. (Required) \n \n Example: \n %1!s! name = "\\server1\CA" newname = "\\server2\CA" \n
39365 \n%1!s! \n [ name = ] name \n [ processingorder = ] processingorder \n \n Sets the configuration of a certification authority (CA) server. \n \n name - Specifies the name of the CA server. (Required) \n \n processingorder - Sets the processing order of the CA server. If you do \n not specify the processing order, the CA server is \n added last in the list. (Optional) \n \n Example: \n %1!s! name = "\\server1\CA" processingorder = "1" \n
39406 Reset HRA Certificate Template Configurations\n
39408 Set HRA Certificate Template Configurations.\n
39409 \n%1!s! \n [ anontemplate = ] [ template simple name ] \n [ authtemplate = ] [ template simple name ] \n \n anontemplate - Specifies the name of the health certificate template to use \n when requesting certificates for anonymous health certificate\n requests. \n \n authtemplate - Specifies the name of the health certificate template to use \n when requesting certificates for authenticated health \n certificate requests. \n \n Note: \n You can use 'certutil -template' to get a list of available certificate \n templates. \n\n anontemplate and authtemplate must be both set or clear at the same time. \n
39412 Reset HRA Validity Period\n
39413 \n%1!s! \n \n Reset HRA Validity Period. \n
39414 Sets how long a certificate is good for in minutes.\n
39415 \n%1!s! \n [ duration = ] minutes \n \n duration - Specifies how long a certificate is good for in minutes. \n Note: Minimum value is 5 minutes. \n
39416 Sets HRA mode.\n
39417 \n%1!s! \n [ mode = ] { 0 | 1 } \n \n Sets the current mode to the following values: \n 0: Standalone CAs only \n 1: Enterprise and Standalone CAs. \n \n Note: Enterprise mode requires that templates are configured. \n
39418 Resets current mode of HRA\n
39419 \n%1!s! \n \n Reset current mode of HRA to Standalone CAs only. \n
39456 Resets timeout configuration.\n
39457 \n%1!s! \n \n Sets blackout time to 5 minutes and no response time to 20 seconds. \n
39458 Sets timeout configuration.\n
39459 \n%1!s! \n [ [ blackout = ] blackout \n [ noresponse = ] noresponse ] \n \n Sets the blackout time and no response time. \n \n blackout - Specifies the time that the server is identified as \n unavailable, in minutes. Default value is 5. (Optional) \n \n noresponse - Specifies the maximum time to wait for the server to \n respond, in seconds. Default value is 20. (Optional) \n \n Example: \n %1!s! blackout = "10" noresponse = "60" \n
39506 Resets Policy OIDs configuration.\n
39507 \n%1!s! \n \n Sets Policy OIDs to Disabled. \n
39508 Sets Policy OIDs configuration.\n
39509 \n%1!s! \n [ state = ] ENABLE/DISABLE \n \n Sets the Policy OIDs enable state. \n \n Example: \n %1!s! state = "ENABLE" \n \n Note: To enable Policy OIDs, opmode has to be set to Standalone only. \n
39556 Adds CSP configuration.\n
39557 \n%1!s! \n [ name = ] name \n \n Adds a cryptographic service provider (CSP) to the list of allowed CSPs. \n You can obtain the names from the "show csps" command. \n \n name - Specifies the name of the CSP. (Required) \n \n Example: \n %1!s! name = "Microsoft RSA SChannel Cryptographic Provider" \n
39558 Deletes CSP configuration.\n
39559 \n%1!s! \n [ name = ] name \n \n Deletes a cryptographic service provider (CSP) from the list of allowed \n CSPs. You can obtain the names from the "show config" command. \n \n name - Specifies the name of the CSP. (Required) \n \n Example: \n %1!s! name = "Microsoft RSA SChannel Cryptographic Provider" \n
39560 Resets CSP configuration. \n
39561 \n%1!s! \n \n Sets the cryptographic service provider (CSP) parameter to "MS-Enhanced cryptographic service provider". \n
39562 Shows CSPs. \n
39563 \n%1!s! \n \n Shows all available cryptographic service providers (CSPs) on the target \n system. Use this command to obtain the oids that you can use in the \n "add csp" and "delete csp" commands. \n
39656 Adds hash configuration.\n
39657 \n%1!s! \n [ oid = ] oid \n \n Adds a hash algorithm to the list of allowed hash algorithms. You can \n obtain the oids from the "show hashes" command. \n \n oid - Specifies the oid of the hash algorithm. (Required) \n \n Example: \n %1!s! oid = "1.2.840.113549.1.1.5" \n
39658 Deletes hash configuration.\n
39659 \n%1!s! \n [ oid = ] oid \n \n Deletes a hash algorithm from the list of accepted hash algorithms. You \n can obtain the oids from the "show config" command. \n \n oid - Specifies the oid of the hash algorithm. (Required) \n \n Example: \n %1!s! oid = "1.2.840.113549.1.1.5" \n
39660 Resets hash configuration.\n
39661 \n%1!s! \n \n Sets the hash parameter to "SHA1". \n
39662 Shows hashes.\n
39663 \n%1!s! \n \n Shows all available hash algorithms on the target system. \n
39756 Adds user agent configuration.\n
39757 \n%1!s! \n [ oid = ] oid \n \n Adds an HTTP client user agent to the list of allowed user agents. \n \n name - Specifies the name of the user agent. (Required) \n \n Example: \n %1!s! name = "MSIE 7.0b" \n
39758 Deletes a user agent.\n
39759 \n [ name = ] name \n \n Deletes a user agent from the list of accepted user agents. You can \n obtain the name from the "show config" command.\n \n name - Specifies the name of the user agent. (Required) \n \n Example: \n %1!s! name = "MSIE 7.0b" \n
39760 Resets user agent configuration.\n
39761 \n%1!s! \n \n Sets the HTTP client user agent parameter to "ANY". \n
39856 Adds asymmetric key configuration.\n
39857 \n%1!s! \n [ oid = ] oid \n [ [ minkeylength = ] minkeylength \n [ maxkeylength = ] maxkeylength \n \n Adds an asymmetric key algorithm to the list of allowed asymmetric key \n algorithms. You can obtain the oids from the "show asymmetrickeys" \n command. \n \n oid - Specifies the oid of the asymmetric key algorithm. (Required) \n \n minkeylength - Specifies the minimum key length. (Optional) \n \n maxkeylength - Specifies the maximum key length. (Optional) \n \n Example: \n %1!s! oid = "1.2.840.113549.1.1.1" minkeylength = "1024" \n maxkeylength = "4096" \n
39858 Deletes asymmetric key aconfiguration.\n
39859 \n%1!s! \n [ oid = ] oid \n \n Deletes an asymmetric key algorithm from the list of allowed asymmetric \n key algorithms. You can obtain the oids from the "show config" \n command. \n \n oid - Specifies the oid of the asymmetric key algorithm. (Required) \n \n Example: \n %1!s! oid = "1.2.840.113549.1.1.1" \n
39860 Resets asymmetric key configuration.\n
39861 \n%1!s! \n \n Sets the asymmetric key parameter to "RSA (1024)". \n
39862 Shows asymmetric keys.\n
39863 \n%1!s! \n \n Shows all available asymmetric keys on the target system. Use this \n command to obtain the oids that you can use in the \n "add asymmetrickeys" command. \n
41672 \n%1!s! \n [ name = ] name \n \n Adds an HTTP client user agent to the list of allowed user agents. \n \n name - Specifies the name of the user agent. (Required) \n \n Example: \n %1!s! name = "NAP IPSec Enforcement v1.0" \n
41673 \n [ name = ] name \n \n Deletes a user agent from the list of accepted user agents. You can \n obtain the name from the "show config" command.\n \n name - Specifies the name of the user agent. (Required) \n \n Example: \n %1!s! name = "MNAP IPSec Enforcement v1.0" \n
41674 \nClient state: \n---------------------------------------------------- \nName = %1!s! \nDescription = %2!s! \nProtocol version = %3!s! \nStatus = %4!s! \nRestriction state = %5!s! \nTroubleshooting URL = %6!s! \nRestriction start time = %7!s! \nExtended state = %8!s! \n
41675 \n%1!s! \n [ name = ] name \n [ [ processingorder = ] processingorder ] \n \n Adds a certification authority (CA) server. \n \n name - Specifies the name of the CA server. The required format is \n "\\computername\CAname". (Required) \n \n processingorder - Sets the processing order of the CA server. If you do \n not specify the processing order, the CA server is \n added last in the list. (Optional) \n \n Example: \n %1!s! name = "\\server1\CA" processingorder = "1" \n
41676 \n%1!s! \n \n Shows all available cryptographic service providers (CSPs) on the target \n system. Use this command to obtain the names that you can use in the \n "add csp" and "delete csp" commands. \n
41677 \n%1!s! \n \n Shows all available asymmetric keys on the target system. Use this \n command to obtain the oids that you can use in the \n "add asymmetrickey" command. \n