Manually uninstall your ESET product using the ESET uninstaller tool
Issue
- You have used the ESET Start Menu uninstaller and continue to have problems uninstalling or reinstalling your ESET product
- Your ESET product remains active after uninstallation
- Your uninstallation fails
Solution
-
Download the ESET Uninstaller and save it to your Desktop.
-
In Safe Mode open windows command prompt - CMD and run the program esetuninstaller.exe
- Read the warning - Are you sure you wish to continue? and type y to confirm
- Review the items listed under Installed ESET products. Type the numner that correspondes to the ESET installation that should be uninstalled and press the ENTER key
- Verify that you are uninstalling the correct ESET product from the operating system and type y to confirm
- After the end job press any key to exit
Windows Update KB5014692
On June 14, 2022, Microsoft released a Windows update KB5014692 to address security issues in the Windows 10 and Windows Server 2019 operating systems.
As the update was to fix the security issues, it tightened the security level of the host by raising the authentication level for the DCOM protocol.
A protocol that exposes application objects via remote procedure calls (RPCs) is termed a Distributed Component Object Model (DCOM) Remote Protocol. The software components of networked devices communicate with one another using this DCOM protocol.
To address this, Microsoft shared a workaround by disabling the hardening changes using a registry key that were enabled by default after the update.
Steps to disable the authentication level of the DCOM protocol:
Step 1: Open the registry on the source machine.
Step 2: Navigate to the following registry path- HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Ole\AppCompat
Step 3: Right-click on the screen and create a new DWORD (32-bit) value.
Step 4: After it is created, rename the value name from New Value #1 to RequireIntegrityActivationAuthenticationLevel.
Step 5: Now, enter the data value in hexadecimal format, i.e., 0x00000000 to disable.
Step 6: Upon completing the steps above, restart the machine to apply the changes.
Kindly refer to the following KB5004442 for more details: https://support.microsoft.com/en-us/topic/kb5004442-manage-changes-for-windows-dcom-server-security-feature-bypass-cve-2021-26414-f1400b52-c141-43d2-941e-37ed901c769c
*Note: The above-mentioned workaround changes need to be made on all the machines (hypervisors) on which the update KB 5014692 has been applied.
After installing the hotfix, managing the Remote Desktop Services Collection stops working
TEST FRAME PER SEC
Send a message to users RDP’d to server
There is a utility in Windows called MSG . It is a utility to send a message to a user that’s currently logged onto a system.
To send a message to a remote server, from the terminal:
$> msg * /server:SERVER_NAME /time:30 /v "please finish working in the system"
- * : I’m sending the message to all sessions
- /server: The name of the server I’m sending the message to.
- /time:30 : I’m giving the users 30 seconds to acknowledge the message. If no time is listed, the message will stay on the screen until the users click OK.
- /v : verbose
- The message to the users should be in quotes




