win2003 服务器磁盘权限安全设置批处理

复制代码 代码如下:

@ECHO OFF

title C盘权限批量处理-2010.7.1

echo —————————–

echo 主机宝贝服务器C盘权限设置

echo http://www.jb51.net

echo —————————–

:menu

echo.

echo [1] 删除C盘的everyone的权限

echo [2] 删除C盘的所有的users的访问权限

echo [3] 添加iis_wpg的访问权限

echo [4] 添加iis_wpg的访问权限[.net专用]

echo [5] 添加iis_wpg的访问权限[装了MACFEE的软件专用]

echo [6] 添加users的访问权限

echo [7] 删除C盘Windows下的所有的危险文件夹

echo [8] 删除系统危险文件的访问权限,只留管理组成员

echo [9] 注册表相关设定

echo [10] 将C盘权限还原为默认[需重启]

echo [0] 退出

echo.

@echo 请选择?

@echo 输入上面的选项回车

@echo off

set /p menu=

if %menu% == 0 goto exit

if %menu% == 1 goto 1

if %menu% == 2 goto 2

if %menu% == 3 goto 3

if %menu% == 4 goto 4

if %menu% == 5 goto 5

if %menu% == 6 goto 6

if %menu% == 7 goto 7

if %menu% == 8 goto 8

if %menu% == 9 goto 9

if %menu% == 10 goto 10

:1

echo 删除C盘的everyone的权限

cacls “%SystemDrive%” /r “CREATOR OWNER” /e

cacls “%SystemDrive%” /r “everyone” /e

cacls “%SystemRoot%” /r “everyone” /e

cacls “%SystemDrive%/Documents and Settings” /r “everyone” /e

cacls “%SystemDrive%/Documents and Settings/All Users” /r “everyone” /e

cacls “%SystemDrive%/Documents and Settings/All Users/Documents” /r “everyone” /e

echo.

echo 删除C盘的everyone的权限 ………………ok!

echo.

goto menu

:2

echo 删除C盘的所有的users的访问权限

cacls “%SystemDrive%” /r “users” /e

cacls “%SystemDrive%/Program Files” /r “users” /e

cacls “%SystemDrive%/Documents and Settings” /r “users” /e

cacls “%SystemRoot%” /r “users” /e

cacls “%SystemRoot%/addins” /r “users” /e

cacls “%SystemRoot%/AppPatch” /r “users” /e

cacls “%SystemRoot%/Connection Wizard” /r “users” /e

cacls “%SystemRoot%/Debug” /r “users” /e

cacls “%SystemRoot%/Driver Cache” /r “users” /e

cacls “%SystemRoot%/Help” /r “users” /e

cacls “%SystemRoot%/IIS Temporary Compressed Files” /r “users” /e

cacls “%SystemRoot%/java” /r “users” /e

cacls “%SystemRoot%/msagent” /r “users” /e

cacls “%SystemRoot%/mui” /r “users” /e

cacls “%SystemRoot%/repair” /r “users” /e

cacls “%SystemRoot%/Resources” /r “users” /e

cacls “%SystemRoot%/security” /r “users” /e

cacls “%SystemRoot%/system” /r “users” /e

cacls “%SystemRoot%/TAPI” /r “users” /e

cacls “%SystemRoot%/Temp” /r “users” /e

cacls “%SystemRoot%/twain_32” /r “users” /e

cacls “%SystemRoot%/Web” /r “users” /e

cacls “%SystemRoot%/WinSxS” /r “users” /e

cacls “%SystemRoot%/system32/3com_dmi” /r “users” /e

cacls “%SystemRoot%/system32/administration” /r “users” /e

cacls “%SystemRoot%/system32/Cache” /r “users” /e

cacls “%SystemRoot%/system32/CatRoot2” /r “users” /e

cacls “%SystemRoot%/system32/Com” /r “users” /e

cacls “%SystemRoot%/system32/config” /r “users” /e

cacls “%SystemRoot%/system32/dhcp” /r “users” /e

cacls “%SystemRoot%/system32/drivers” /r “users” /e

cacls “%SystemRoot%/system32/export” /r “users” /e

cacls “%SystemRoot%/system32/icsxml” /r “users” /e

cacls “%SystemRoot%/system32/lls” /r “users” /e

cacls “%SystemRoot%/system32/LogFiles” /r “users” /e

cacls “%SystemRoot%/system32/MicrosoftPassport” /r “users” /e

cacls “%SystemRoot%/system32/mui” /r “users” /e

cacls “%SystemRoot%/system32/oobe” /r “users” /e

cacls “%SystemRoot%/system32/ShellExt” /r “users” /e

cacls “%SystemRoot%/system32/wbem” /r “users” /e

echo.

echo 删除C盘的所有的users的访问权限 ………………ok!

echo.

goto menu

:7

echo 删除C盘Windows下的所有的危险文件夹

attrib %SystemRoot%/Web/printers -s -r -h

del %SystemRoot%\Web\printers\*.* /s /q /f

rd %SystemRoot%\Web\printers /s /q

attrib %SystemRoot%\Help\iisHelp -s -r -h

del %SystemRoot%\Help\iisHelp\*.* /s /q /f

rd %SystemRoot%\Help\iisHelp /s /q

attrib %SystemRoot%\system32\inetsrv\iisadmpwd -s -r -h

del %SystemRoot%\system32\inetsrv\iisadmpwd\*.* /s /q /f

rd %SystemRoot%\system32\inetsrv\iisadmpwd /s /q

echo.

echo 删除C盘Windows下的所有的危险文件夹 ………………ok!

echo.

goto menu

:8

echo 给系统危险文件设置权限设定

cacls “C:\boot.ini” /T /C /E /G Administrators:F

cacls “C:\boot.ini” /D Guests:F /E

cacls “C:\AUTOEXEC.BAT” /T /C /E /G Administrators:F

cacls “C:\AUTOEXEC.BAT” /D Guests:F /E

cacls “%SystemRoot%/system32/net.exe” /T /C /E /G Administrators:F

cacls “%SystemRoot%/system32/net.exe” /D Guests:F /E

cacls “%SystemRoot%/system32/net1.exe” /T /C /E /G Administrators:F

cacls “%SystemRoot%/system32/net1.exe” /D Guests:F /E

cacls “%SystemRoot%/system32/cmd.exe” /T /C /E /G Administrators:F

cacls “%SystemRoot%/system32/cmd.exe” /D Guests:F /E

cacls “%SystemRoot%/system32/ftp.exe” /T /C /E /G Administrators:F

cacls “%SystemRoot%/system32/ftp.exe” /D Guests:F /E

cacls “%SystemRoot%/system32/netstat.exe” /T /C /E /G Administrators:F

cacls “%SystemRoot%/system32/netstat.exe” /D Guests:F /E

cacls “%SystemRoot%/system32/regedit.exe” /T /C /E /G Administrators:F

cacls “%SystemRoot%/system32/regedit.exe” /D Guests:F /E

cacls “%SystemRoot%/system32/at.exe” /T /C /E /G Administrators:F

cacls “%SystemRoot%/system32/at.exe” /D Guests:F /E

cacls “%SystemRoot%/system32/attrib.exe” /T /C /E /G Administrators:F

cacls “%SystemRoot%/system32/attrib.exe” /D Guests:F /E

cacls “%SystemRoot%/system32/format.com” /T /C /E /G Administrators:F

cacls “%SystemRoot%/system32/format.com” /D Guests:F /E

cacls “%SystemRoot%/system32/logoff.exe” /T /C /E /G Administrators:F

cacls “%SystemRoot%/system32/shutdown.exe” /G Administrators:F

cacls “%SystemRoot%/system32/shutdown.exe” /D Guests:F /E

cacls “%SystemRoot%/system32/telnet.exe” /T /C /E /G Administrators:F

cacls “%SystemRoot%/system32/telnet.exe” /D Guests:F /E

cacls “%SystemRoot%/system32/wscript.exe” /T /C /E /G Administrators:F

cacls “%SystemRoot%/system32/wscript.exe” /D Guests:F /E

cacls “%SystemRoot%/system32/doskey.exe” /T /C /E /G Administrators:F

cacls “%SystemRoot%/system32/doskey.exe” /D Guests:F /E

cacls “%SystemRoot%/system32/help.exe” /T /C /E /G Administrators:F

cacls “%SystemRoot%/system32/help.exe” /D Guests:F /E

cacls “%SystemRoot%/system32/ipconfig.exe” /T /C /E /G Administrators:F

cacls “%SystemRoot%/system32/ipconfig.exe” /D Guests:F /E

cacls “%SystemRoot%/system32/nbtstat.exe” /T /C /E /G Administrators:F

cacls “%SystemRoot%/system32/nbtstat.exe” /D Guests:F /E

cacls “%SystemRoot%/system32/print.exe” /T /C /E /G Administrators:F

cacls “%SystemRoot%/system32/print.exe” /D Guests:F /E

cacls “%SystemRoot%/system32/xcopy.exe” /T /C /E /G Administrators:F

cacls “%SystemRoot%/system32/xcopy.exe” /D Guests:F /E

cacls “%SystemRoot%/system32/edit.com” /T /C /E /G Administrators:F

cacls “%SystemRoot%/system32/edit.com” /D Guests:F /E

cacls “%SystemRoot%/system32/regedt32.exe” /T /C /E /G Administrators:F

cacls “%SystemRoot%/system32/regedt32.exe” /D Guests:F /E

cacls “%SystemRoot%/system32/reg.exe” /T /C /E /G Administrators:F

cacls “%SystemRoot%/system32/reg.exe” /D Guests:F /E

cacls “%SystemRoot%/system32/register.exe” /T /C /E /G Administrators:F

cacls “%SystemRoot%/system32/register.exe” /D Guests:F /E

cacls “%SystemRoot%/system32/replace.exe” /T /C /E /G Administrators:F

cacls “%SystemRoot%/system32/replace.exe” /D Guests:F /E

cacls “%SystemRoot%/system32/nwscript.exe” /T /C /E /G Administrators:F

cacls “%SystemRoot%/system32/nwscript.exe” /D Guests:F /E

cacls “%SystemRoot%/system32/share.exe” /T /C /E /G Administrators:F

cacls “%SystemRoot%/system32/share.exe” /D Guests:F /E

cacls “%SystemRoot%/system32/ping.exe” /T /C /E /G Administrators:F

cacls “%SystemRoot%/system32/ping.exe” /D Guests:F /E

cacls “%SystemRoot%/system32/ipsec6.exe” /T /C /E /G Administrators:F

cacls “%SystemRoot%/system32/ipsec6.exe” /D Guests:F /E

cacls “%SystemRoot%/system32/netsh.exe” /T /C /E /G Administrators:F

cacls “%SystemRoot%/system32/netsh.exe” /D Guests:F /E

cacls “%SystemRoot%/system32/debug.exe” /T /C /E /G Administrators:F

cacls “%SystemRoot%/system32/debug.exe” /D Guests:F /E

cacls “%SystemRoot%/system32/route.exe” /T /C /E /G Administrators:F

cacls “%SystemRoot%/system32/route.exe” /D Guests:F /E

cacls “%SystemRoot%/system32/tracert.exe” /T /C /E /G Administrators:F

cacls “%SystemRoot%/system32/tracert.exe” /D Guests:F /E

cacls “%SystemRoot%/system32/powercfg.exe” /T /C /E /G Administrators:F

cacls “%SystemRoot%/system32/powercfg.exe” /D Guests:F /E

cacls “%SystemRoot%/system32/nslookup.exe” /T /C /E /G Administrators:F

cacls “%SystemRoot%/system32/nslookup.exe” /D Guests:F /E

cacls “%SystemRoot%/system32/arp.exe” /T /C /E /G Administrators:F

cacls “%SystemRoot%/system32/arp.exe” /D Guests:F /E

cacls “%SystemRoot%/system32/rsh.exe” /T /C /E /G Administrators:F

cacls “%SystemRoot%/system32/rsh.exe” /D Guests:F /E

cacls “%SystemRoot%/system32/netdde.exe” /T /C /E /G Administrators:F

cacls “%SystemRoot%/system32/netdde.exe” /D Guests:F /E

cacls “%SystemRoot%/system32/mshta.exe” /T /C /E /G Administrators:F

cacls “%SystemRoot%/system32/mshta.exe” /D Guests:F /E

cacls “%SystemRoot%/system32/mountvol.exe” /T /C /E /G Administrators:F

cacls “%SystemRoot%/system32/mountvol.exe” /D Guests:F /E

cacls “%SystemRoot%/system32/tftp.exe” /T /C /E /G Administrators:F

cacls “%SystemRoot%/system32/tftp.exe” /D Guests:F /E

cacls “%SystemRoot%/system32/setx.exe” /T /C /E /G Administrators:F

cacls “%SystemRoot%/system32/setx.exe” /D Guests:F /E

cacls “%SystemRoot%/system32/find.exe” /T /C /E /G Administrators:F

cacls “%SystemRoot%/system32/find.exe” /D Guests:F /E

cacls “%SystemRoot%/system32/finger.exe” /T /C /E /G Administrators:F

cacls “%SystemRoot%/system32/finger.exe” /D Guests:F /E

cacls “%SystemRoot%/system32/where.exe” /T /C /E /G Administrators:F

cacls “%SystemRoot%/system32/where.exe” /D Guests:F /E

cacls “%SystemRoot%/system32/regsvr32.exe” /T /C /E /G Administrators:F

cacls “%SystemRoot%/system32/regsvr32.exe” /D Guests:F /E

cacls “%SystemRoot%/system32/cacls.exe” /T /C /E /G Administrators:F

cacls “%SystemRoot%/system32/cacls.exe” /D Guests:F /E

cacls “%SystemRoot%/system32/sc.exe” /T /C /E /G Administrators:F

cacls “%SystemRoot%/system32/sc.exe” /D Guests:F /E

cacls “%SystemRoot%/system32/shadow.exe” /T /C /E /G Administrators:F

cacls “%SystemRoot%/system32/shadow.exe” /D Guests:F /E

cacls “%SystemRoot%/system32/runas.exe” /T /C /E /G Administrators:F

cacls “%SystemRoot%/system32/runas.exe” /D Guests:F /E

cacls “%SystemRoot%/system32/wshom.ocx” /T /C /E /G Administrators:F

cacls “%SystemRoot%/system32/wshom.ocx” /D Guests:F /E

cacls “%SystemRoot%/system32/wshext.dll” /T /C /E /G Administrators:F

cacls “%SystemRoot%/system32/wshext.dll” /D Guests:F /E

cacls “%SystemRoot%/system32/shell32.dll” /T /C /E /G Administrators:F

cacls “%SystemRoot%/system32/shell32.dll” /D Guests:F /E

cacls “%SystemRoot%/system32/zipfldr.dll” /T /C /E /G Administrators:F

cacls “%SystemRoot%/system32/zipfldr.dll” /D Guests:F /E

cacls “%SystemRoot%/PCHealth/HelpCtr/Binaries/msconfig.exe” /T /C /E /G Administrators:F

cacls “%SystemRoot%/PCHealth/HelpCtr/Binaries/msconfig.exe” /D Guests:F /E

cacls “%SystemRoot%/notepad.exe” /T /C /E /G Administrators:F

cacls “%SystemRoot%/notepad.exe” /D Guests:F /E

cacls “%SystemRoot%/regedit.exe” /T /C /E /G Administrators:F

cacls “%SystemRoot%/regedit.exe” /D Guests:F /E

cacls “%SystemRoot%/winhelp.exe” /T /C /E /G Administrators:F

cacls “%SystemRoot%/winhelp.exe” /D Guests:F /E

cacls “%SystemRoot%/winhlp32.exe” /T /C /E /G Administrators:F

cacls “%SystemRoot%/winhlp32.exe” /D Guests:F /E

cacls “%SystemRoot%/system32/notepad.exe” /T /C /E /G Administrators:F

cacls “%SystemRoot%/system32/notepad.exe” /D Guests:F /E

cacls “%SystemRoot%/system32/edlin.exe” /T /C /E /G Administrators:F

cacls “%SystemRoot%/system32/edlin.exe” /D Guests:F /E

cacls “%SystemRoot%/system32/posix.exe” /T /C /E /G Administrators:F

cacls “%SystemRoot%/system32/posix.exe” /D Guests:F /E

cacls “%SystemRoot%/system32/atsvc.exe” /T /C /E /G Administrators:F

cacls “%SystemRoot%/system32/atsvc.exe” /D Guests:F /E

cacls “%SystemRoot%/system32/qbasic.exe” /T /C /E /G Administrators:F

cacls “%SystemRoot%/system32/qbasic.exe” /T /C /E /G Administrators:F

cacls “%SystemRoot%/system32/runonce.exe” /T /C /E /G Administrators:F

cacls “%SystemRoot%/system32/runonce.exe” /D Guests:F /E

cacls “%SystemRoot%/system32/syskey.exe” /T /C /E /G Administrators:F

cacls “%SystemRoot%/system32/syskey.exe” /D Guests:F /E

cacls “%SystemRoot%/system32/cscript.exe” /T /C /E /G Administrators:F

cacls “%SystemRoot%/system32/cscript.exe” /D Guests:F /E

echo.

echo 给系统危险文件设置权限设定 ………………ok!

echo.

goto menu

:9

echo 注册表相关设定

reg delete HKEY_CLASSES_ROOT\WScript.Shell /f

reg delete HKEY_CLASSES_ROOT\WScript.Shell.1 /f

reg delete HKEY_CLASSES_ROOT\Shell.application /f

reg delete HKEY_CLASSES_ROOT\Shell.application.1 /f

reg delete HKEY_CLASSES_ROOT\WSCRIPT.NETWORK /f

reg delete HKEY_CLASSES_ROOT\WSCRIPT.NETWORK.1 /f

regsvr32 /s /u wshom.ocx

regsvr32 /s /u wshext.dll

regsvr32 /s /u shell32.dll

regsvr32 /s /u zipfldr.dll

echo.

echo 注册表相关设定 ………………ok!

echo.

goto menu

:3

echo 添加iis_wpg的访问权限

cacls “%SystemRoot%” /g iis_wpg:r /e

cacls “%SystemDrive%/Program Files/Common Files” /g iis_wpg:r /e

cacls “%SystemRoot%/Downloaded Program Files” /g iis_wpg:c /e

cacls “%SystemRoot%/Help” /g iis_wpg:c /e

cacls “%SystemRoot%/IIS Temporary Compressed Files” /g iis_wpg:c /e

cacls “%SystemRoot%/Offline Web Pages” /g iis_wpg:c /e

cacls “%SystemRoot%/System32” /g iis_wpg:c /e

cacls “%SystemRoot%/Tasks” /g iis_wpg:c /e

cacls “%SystemRoot%/Temp” /g iis_wpg:c /e

cacls “%SystemRoot%/Web” /g iis_wpg:c /e

echo.

echo 添加iis_wpg的访问权限 ………………ok!

echo.

goto menu

:4

echo 添加iis_wpg的访问权限[.net专用]

cacls “%SystemRoot%/Assembly” /g iis_wpg:c /e

cacls “%SystemRoot%/Microsoft.NET” /g iis_wpg:c /e

echo.

echo 添加iis_wpg的访问权限[.net专用] ………………ok!

echo.

goto menu

:5

echo 添加iis_wpg的访问权限[装了MACFEE的软件专用]

cacls “%SystemDrive%/Program Files/Network Associates” /g iis_wpg:r /e

echo.

echo 添加iis_wpg的访问权限[装了MACFEE的软件专用] ………………ok!

echo.

goto menu

:6

echo 添加users的访问权限

cacls “%SystemRoot%/temp” /g users:c /e

echo.

echo 添加users的访问权限 ………………ok!

echo.

goto menu

:10

echo 将C盘权限还原为默认

Secedit /configure /db %SYSTEMROOT%\security\database\cvtfs.sdb /Cfg “%SYSTEMROOT%\security\templates\setup security.inf” /areas filestore

goto menu

:exit

exit

将上面代码保存为XX.bat 即可设置服务器磁盘安全

其实青云的批处理也不错的,大家可以根据需要选择下载地址 http://www.jb51.net/softs/12762.html

文章来源网络,作者:运维,如若转载,请注明出处:https://shuyeidc.com/wp/155471.html<

(0)
运维的头像运维
上一篇2025-03-15 11:10
下一篇 2025-03-15 11:11

相关推荐

  • 个人主题怎么制作?

    制作个人主题是一个将个人风格、兴趣或专业领域转化为视觉化或结构化内容的过程,无论是用于个人博客、作品集、社交媒体账号还是品牌形象,核心都是围绕“个人特色”展开,以下从定位、内容规划、视觉设计、技术实现四个维度,详细拆解制作个人主题的完整流程,明确主题定位:找到个人特色的核心主题定位是所有工作的起点,需要先回答……

    2025-11-20
    0
  • 社群营销管理关键是什么?

    社群营销的核心在于通过建立有温度、有价值、有归属感的社群,实现用户留存、转化和品牌传播,其管理需贯穿“目标定位-内容运营-用户互动-数据驱动-风险控制”全流程,以下从五个维度展开详细说明:明确社群定位与目标社群管理的首要任务是精准定位,需明确社群的核心价值(如行业交流、产品使用指导、兴趣分享等)、目标用户画像……

    2025-11-20
    0
  • 香港公司网站备案需要什么材料?

    香港公司进行网站备案是一个涉及多部门协调、流程相对严谨的过程,尤其需兼顾中国内地与香港两地的监管要求,由于香港公司注册地与中国内地不同,其网站若主要服务内地用户或使用内地服务器,需根据服务器位置、网站内容性质等,选择对应的备案路径(如工信部ICP备案或公安备案),以下从备案主体资格、流程步骤、材料准备、注意事项……

    2025-11-20
    0
  • 如何企业上云推广

    企业上云已成为数字化转型的核心战略,但推广过程中需结合行业特性、企业痛点与市场需求,构建系统性、多维度的推广体系,以下从市场定位、策略设计、执行落地及效果优化四个维度,详细拆解企业上云推广的实践路径,精准定位:明确目标企业与核心价值企业上云并非“一刀切”的方案,需先锁定目标客户群体,提炼差异化价值主张,客户分层……

    2025-11-20
    0
  • PS设计搜索框的实用技巧有哪些?

    在PS中设计一个美观且功能性的搜索框需要结合创意构思、视觉设计和用户体验考量,以下从设计思路、制作步骤、细节优化及交互预览等方面详细说明,帮助打造符合需求的搜索框,设计前的规划明确使用场景:根据网站或APP的整体风格确定搜索框的调性,例如极简风适合细线条和纯色,科技感适合渐变和发光效果,电商类则可能需要突出搜索……

    2025-11-20
    0

发表回复

您的邮箱地址不会被公开。必填项已用 * 标注