{"id":12,"date":"2023-05-09T21:34:54","date_gmt":"2023-05-09T13:34:54","guid":{"rendered":"https:\/\/www.ruianding.com\/blog\/?p=12"},"modified":"2023-12-12T14:04:33","modified_gmt":"2023-12-12T06:04:33","slug":"execute-processes-remotely-with-psexec","status":"publish","type":"post","link":"https:\/\/www.ruianding.com\/blog\/execute-processes-remotely-with-psexec\/","title":{"rendered":"Execute Processes Remotely with PsExec Tool"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\" id=\"overview\"><strong>Overview<\/strong><\/h2>\n\n\n\n<p>Utilizing the PsExec tool is an efficient method for executing programs on remote systems under different local accounts such as SYSTEM, SERVICE, NETWORK SERVICE, etc. Its lightweight design makes it a practical alternative to traditional telnet. Some of PsExec&#8217;s most powerful applications include launching interactive command prompts on remote systems and enabling tools like IpConfig to display information about remote systems.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"1-how-to-get-the-pstools-suite\"><strong>1. How to Get the PsTools Suite<\/strong><\/h2>\n\n\n\n<p>To download the PsTools package, visit the <a href=\"https:\/\/learn.microsoft.com\/en-us\/sysinternals\/downloads\/pstools\">PsTools &#8211; Sysinternals | Microsoft Learn<\/a>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/06\/image-37.png\" alt=\"\" class=\"wp-image-313\" width=\"328\" height=\"152\"\/><\/figure>\n\n\n\n<p>Unzip the file and place it in your desired directory.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/06\/image-39.png\" alt=\"\" class=\"wp-image-316\" width=\"681\" height=\"368\"\/><\/figure>\n\n\n\n<p>Open a Command Prompt window with administrative privileges. Navigate to the PsTool folder.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"440\" height=\"174\" src=\"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/06\/image-40.png\" alt=\"\" class=\"wp-image-317\"\/><\/figure>\n\n\n\n<p>You can now execute remote programs using the psexec.exe command. For instance, to open a new Command Prompt window as the System Account, use the following command:<\/p>\n\n\n\n<pre class=\"EnlighterJSRAW\" data-enlighter-language=\"powershell\" data-enlighter-theme=\"eclipse\" data-enlighter-highlight=\"\" data-enlighter-linenumbers=\"\" data-enlighter-lineoffset=\"\" data-enlighter-title=\"\" data-enlighter-group=\"\">psexec.exe -i -s cmd.exe<\/pre>\n\n\n\n<p class=\"has-pale-cyan-blue-background-color has-background has-small-font-size\">The <strong>-i<\/strong> flag allows the program to interact with the remote system&#8217;s desktop.<br>The <strong>-s<\/strong> flag enables running the process in the System account.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/06\/image-41.png\" alt=\"\" class=\"wp-image-318\" width=\"625\" height=\"418\"\/><\/figure>\n\n\n\n<p>Upon checking the Task Manager, you&#8217;ll notice the new Command Prompt window running as <strong>SYSTEM<\/strong>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/06\/image-42.png\" alt=\"\" class=\"wp-image-319\" width=\"681\" height=\"409\"\/><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"2-general-implementations-of-psexec-tool\"><strong>2. General Implementations of PsExec Tool<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"DRS-ENDPOINTS\"><a href=\"#DRS-ENDPOINTS\">?<\/a><strong>2.1<\/strong> Checking Microsoft DRS Endpoints Connectivity Under System Account<\/h3>\n\n\n\n<p>During the Device Registration process, the device communicates with Microsoft Endpoints under System Context. PsExec can be used to check the connectivity of these endpoints, particularly the <code>enterpriseregistration.windows.net<\/code> endpoint.<\/p>\n\n\n\n<pre class=\"EnlighterJSRAW\" data-enlighter-language=\"generic\" data-enlighter-theme=\"\" data-enlighter-highlight=\"\" data-enlighter-linenumbers=\"\" data-enlighter-lineoffset=\"\" data-enlighter-title=\"\" data-enlighter-group=\"\">https:\/\/enterpriseregistration.windows.net\nhttps:\/\/login.microsoftonline.com\nhttps:\/\/device.login.microsoftonline.com<\/pre>\n\n\n\n<p>Implement the steps from Section 2 and use the System Account Command Prompt to open a browser (preferably Edge, as Internet Explorer is no longer supported in Windows 11). Third-party browsers like Google Chrome or Mozilla Firefox are also suitable.<\/p>\n\n\n\n<p>Navigate to the browser&#8217;s folder, run <code>iexplore.exe<\/code>, and attempt to access the following DRS discovery URLs:<\/p>\n\n\n\n<p><code>https:\/\/enterpriseregistration.windows.net\/&lt;VerifiedDomain&gt;\/enrollmentserver\/contract?api-version=1.2<\/code><\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/06\/image-43.png\" alt=\"\" class=\"wp-image-320\" width=\"437\" height=\"127\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/06\/image-44.png\" alt=\"\" class=\"wp-image-321\" width=\"506\" height=\"229\"\/><\/figure>\n\n\n\n<p>Replace <code>&lt;VerifiedDomain&gt;<\/code> with your verified Domain Name.<\/p>\n\n\n\n<p><strong>A successful response indicates proper functioning<\/strong>:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/06\/image-45.png\" alt=\"\" class=\"wp-image-322\" width=\"655\" height=\"143\"\/><\/figure>\n\n\n\n<p><strong>If unsuccessful, consult the Network\/Proxy team for potential Winhttp Proxy settings issues<\/strong>:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/06\/image-46.png\" alt=\"\" class=\"wp-image-323\" width=\"463\" height=\"241\"\/><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"ADFS-CERT\"><a href=\"#ADFS-CERT\">?<\/a><strong>2.2 Inspecting Token Signing &amp; Encryption Certificates via ADFS Service Account<\/strong><\/h3>\n\n\n\n<p>The Token Signing and Encryption Certificates are stored within the ADFS Service Account. Use the PsExec tool to access and review these certificates.<\/p>\n\n\n\n<p>First, confirm the ADFS Service Account using PowerShell:<\/p>\n\n\n\n<pre class=\"EnlighterJSRAW\" data-enlighter-language=\"powershell\" data-enlighter-theme=\"\" data-enlighter-highlight=\"\" data-enlighter-linenumbers=\"\" data-enlighter-lineoffset=\"\" data-enlighter-title=\"\" data-enlighter-group=\"\">Get-ItemProperty -Path HKLM:\\SYSTEM\\CURRENTCONTROLSET\\SERVICES\\ADFSSRV | Select ObjectName<\/pre>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/06\/image-47.png\" alt=\"\" class=\"wp-image-324\" width=\"796\" height=\"70\"\/><\/figure>\n\n\n\n<p>Then, employ the PsExec command to open a new Command Prompt as the ADFS Managed Service Account (FsGmsa$):<\/p>\n\n\n\n<pre class=\"EnlighterJSRAW\" data-enlighter-language=\"powershell\" data-enlighter-theme=\"eclipse\" data-enlighter-highlight=\"\" data-enlighter-linenumbers=\"\" data-enlighter-lineoffset=\"\" data-enlighter-title=\"\" data-enlighter-group=\"\">psexec.exe -i -u Domain\\&lt;ADFS Managed Service Account>; -p ~ cmd.exe<\/pre>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/06\/image-48.png\" alt=\"\" class=\"wp-image-325\" width=\"750\" height=\"379\"\/><\/figure>\n\n\n\n<p>Enter the command to launch the Certificate Management Console and review the stored certificates.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/06\/image-49.png\" alt=\"\" class=\"wp-image-326\" width=\"773\" height=\"143\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/06\/image-50.png\" alt=\"\" class=\"wp-image-327\" width=\"766\" height=\"426\"\/><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"WHFB-CRL\"><a href=\"#WHFB-CRL\" data-type=\"internal\" data-id=\"#WHFB-CRL\">?<\/a><strong>2.3 <\/strong>Verifying the Certificate Revocation List Under System Account<\/h3>\n\n\n\n<p>Since Windows Hello for Business authentication occurs under the system context, you can execute the certutil command to perform a Certificate Revocation List (CRL) check using the system account.<\/p>\n\n\n\n<pre class=\"EnlighterJSRAW\" data-enlighter-language=\"powershell\" data-enlighter-theme=\"\" data-enlighter-highlight=\"\" data-enlighter-linenumbers=\"\" data-enlighter-lineoffset=\"\" data-enlighter-title=\"\" data-enlighter-group=\"\">certutil -f \u2013urlfetch -verify mycertificatefile.cer<\/pre>\n\n\n\n<p><a href=\"https:\/\/techcommunity.microsoft.com\/t5\/core-infrastructure-and-security\/basic-crl-checking-with-certutil\/ba-p\/1128367\">Basic CRL checking with certutil &#8211; Microsoft Community Hub<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"AADAP-onpremapp\"><a href=\"#AADAP-onpremapp\" data-type=\"internal\" data-id=\"#AADAP-onpremapp\">?<\/a><strong>2.4 <\/strong>Testing Azure AD Application Proxy Connection to On-premises Web App<\/h3>\n\n\n\n<p>When using the AADAP connector in environments with a proxy, employ the PsExec tool to <strong>remotely access the on-prem application url<\/strong> using the Network Service account. This assists in diagnosing any connectivity issues.<\/p>\n\n\n\n<pre class=\"EnlighterJSRAW\" data-enlighter-language=\"powershell\" data-enlighter-theme=\"eclipse\" data-enlighter-highlight=\"\" data-enlighter-linenumbers=\"\" data-enlighter-lineoffset=\"\" data-enlighter-title=\"\" data-enlighter-group=\"\">psexec -i -u \"nt authority\\network service\" cmd.exe <\/pre>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/06\/image-51.png\" alt=\"\" class=\"wp-image-328\" width=\"650\" height=\"308\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/10\/image-26.png\" alt=\"\" class=\"wp-image-1120\" width=\"648\" height=\"267\"\/><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"AADAP-REGCERT\"><a href=\"#AADAP-REGCERT\">?<\/a><strong>2.5 Inspecting <\/strong>Connector Registration Certificate<strong> via Network Service Account<\/strong><\/h3>\n\n\n\n<p>When we install the AADAP connector or PTA authentication agent, a self-signed certificate is generated to establish trust between the connector server and Azure AD. According to Microsoft documentation, this certificate is set to automatically renew upon expiration. <\/p>\n\n\n\n<p>Initially, the certificate is stored in the local machine&#8217;s personal store. However, after renewal, the new certificate is located in the Network Service account&#8217;s personal store. The PsExec tool can also be utilized to verify and inspect this certificate.<\/p>\n\n\n\n<pre class=\"EnlighterJSRAW\" data-enlighter-language=\"powershell\" data-enlighter-theme=\"eclipse\" data-enlighter-highlight=\"\" data-enlighter-linenumbers=\"\" data-enlighter-lineoffset=\"\" data-enlighter-title=\"\" data-enlighter-group=\"\">psexec -i -u \"nt authority\\network service\" cmd.exe <\/pre>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/10\/image-24.png\" alt=\"\" class=\"wp-image-1116\" width=\"682\" height=\"560\"\/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Overview Utilizing the PsExec tool is an efficient method for executing programs on remote systems under different local accounts such as SYSTEM, SERVICE, NETWORK SERVICE, etc. Its lightweight design makes it a practical alternative to traditional telnet. Some of PsExec&#8217;s most powerful applications include launching interactive command prompts on remote systems and enabling tools like [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_themeisle_gutenberg_block_has_review":false,"footnotes":""},"categories":[10],"tags":[5,6,4],"class_list":["post-12","post","type-post","status-publish","format-standard","hentry","category-tutorial","tag-adfs","tag-drs","tag-pstool"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Execute Processes Remotely with PsExec Tool - \u6781\u7b80IT\uff5cSimpleIT<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ruianding.com\/blog\/execute-processes-remotely-with-psexec\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Execute Processes Remotely with PsExec Tool - \u6781\u7b80IT\uff5cSimpleIT\" \/>\n<meta property=\"og:description\" content=\"Overview Utilizing the PsExec tool is an efficient method for executing programs on remote systems under different local accounts such as SYSTEM, SERVICE, NETWORK SERVICE, etc. Its lightweight design makes it a practical alternative to traditional telnet. Some of PsExec&#8217;s most powerful applications include launching interactive command prompts on remote systems and enabling tools like [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ruianding.com\/blog\/execute-processes-remotely-with-psexec\/\" \/>\n<meta property=\"og:site_name\" content=\"\u6781\u7b80IT\uff5cSimpleIT\" \/>\n<meta property=\"article:published_time\" content=\"2023-05-09T13:34:54+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-12-12T06:04:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/06\/image-37.png\" \/>\n<meta name=\"author\" content=\"Ruian Ding\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ruian Ding\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.ruianding.com\/blog\/execute-processes-remotely-with-psexec\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.ruianding.com\/blog\/execute-processes-remotely-with-psexec\/\"},\"author\":{\"name\":\"Ruian Ding\",\"@id\":\"https:\/\/www.ruianding.com\/blog\/#\/schema\/person\/440d88575b7dc819a4cefc8c4199db3b\"},\"headline\":\"Execute Processes Remotely with PsExec Tool\",\"datePublished\":\"2023-05-09T13:34:54+00:00\",\"dateModified\":\"2023-12-12T06:04:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.ruianding.com\/blog\/execute-processes-remotely-with-psexec\/\"},\"wordCount\":548,\"publisher\":{\"@id\":\"https:\/\/www.ruianding.com\/blog\/#\/schema\/person\/440d88575b7dc819a4cefc8c4199db3b\"},\"image\":{\"@id\":\"https:\/\/www.ruianding.com\/blog\/execute-processes-remotely-with-psexec\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/06\/image-37.png\",\"keywords\":[\"ADFS\",\"DRS\",\"PSTOOL\"],\"articleSection\":[\"Tutorial\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.ruianding.com\/blog\/execute-processes-remotely-with-psexec\/\",\"url\":\"https:\/\/www.ruianding.com\/blog\/execute-processes-remotely-with-psexec\/\",\"name\":\"Execute Processes Remotely with PsExec Tool - \u6781\u7b80IT\uff5cSimpleIT\",\"isPartOf\":{\"@id\":\"https:\/\/www.ruianding.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.ruianding.com\/blog\/execute-processes-remotely-with-psexec\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.ruianding.com\/blog\/execute-processes-remotely-with-psexec\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/06\/image-37.png\",\"datePublished\":\"2023-05-09T13:34:54+00:00\",\"dateModified\":\"2023-12-12T06:04:33+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.ruianding.com\/blog\/execute-processes-remotely-with-psexec\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.ruianding.com\/blog\/execute-processes-remotely-with-psexec\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.ruianding.com\/blog\/execute-processes-remotely-with-psexec\/#primaryimage\",\"url\":\"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/06\/image-37.png\",\"contentUrl\":\"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/06\/image-37.png\",\"width\":586,\"height\":271},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.ruianding.com\/blog\/execute-processes-remotely-with-psexec\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.ruianding.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Execute Processes Remotely with PsExec Tool\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.ruianding.com\/blog\/#website\",\"url\":\"https:\/\/www.ruianding.com\/blog\/\",\"name\":\"Ruian's Tech Troubleshooting Toolbox\",\"description\":\"Debug the World.\",\"publisher\":{\"@id\":\"https:\/\/www.ruianding.com\/blog\/#\/schema\/person\/440d88575b7dc819a4cefc8c4199db3b\"},\"alternateName\":\"\u4e01\u777f\u5b89\u7684\u6280\u672f\u5206\u4eab\u535a\u5ba2\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.ruianding.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\/\/www.ruianding.com\/blog\/#\/schema\/person\/440d88575b7dc819a4cefc8c4199db3b\",\"name\":\"Ruian Ding\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.ruianding.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/05\/logo.png\",\"contentUrl\":\"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/05\/logo.png\",\"width\":284,\"height\":284,\"caption\":\"Ruian Ding\"},\"logo\":{\"@id\":\"https:\/\/www.ruianding.com\/blog\/#\/schema\/person\/image\/\"},\"description\":\"I am currently a Support Specialist at NIO, focusing on cloud-related issues for NIO Power. Previously, at Microsoft Entra ID, I specialized in identity and access management (IAM), including device registration, Windows Hello for Business (WHfB), multi-factor authentication (MFA), and single sign-on (SSO). In addition to my core expertise, I have a strong foundation in Active Directory, Servers, Cloud Computing, Network Administration, and Front-end Web Development. This diverse technical skill set enables me to effectively handle a wide range of challenges in a fast-paced IT environment.\",\"sameAs\":[\"https:\/\/www.ruianding.com\"],\"url\":\"https:\/\/www.ruianding.com\/blog\/author\/ruiand\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Execute Processes Remotely with PsExec Tool - \u6781\u7b80IT\uff5cSimpleIT","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ruianding.com\/blog\/execute-processes-remotely-with-psexec\/","og_locale":"en_US","og_type":"article","og_title":"Execute Processes Remotely with PsExec Tool - \u6781\u7b80IT\uff5cSimpleIT","og_description":"Overview Utilizing the PsExec tool is an efficient method for executing programs on remote systems under different local accounts such as SYSTEM, SERVICE, NETWORK SERVICE, etc. Its lightweight design makes it a practical alternative to traditional telnet. Some of PsExec&#8217;s most powerful applications include launching interactive command prompts on remote systems and enabling tools like [&hellip;]","og_url":"https:\/\/www.ruianding.com\/blog\/execute-processes-remotely-with-psexec\/","og_site_name":"\u6781\u7b80IT\uff5cSimpleIT","article_published_time":"2023-05-09T13:34:54+00:00","article_modified_time":"2023-12-12T06:04:33+00:00","og_image":[{"url":"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/06\/image-37.png","type":"","width":"","height":""}],"author":"Ruian Ding","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Ruian Ding","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.ruianding.com\/blog\/execute-processes-remotely-with-psexec\/#article","isPartOf":{"@id":"https:\/\/www.ruianding.com\/blog\/execute-processes-remotely-with-psexec\/"},"author":{"name":"Ruian Ding","@id":"https:\/\/www.ruianding.com\/blog\/#\/schema\/person\/440d88575b7dc819a4cefc8c4199db3b"},"headline":"Execute Processes Remotely with PsExec Tool","datePublished":"2023-05-09T13:34:54+00:00","dateModified":"2023-12-12T06:04:33+00:00","mainEntityOfPage":{"@id":"https:\/\/www.ruianding.com\/blog\/execute-processes-remotely-with-psexec\/"},"wordCount":548,"publisher":{"@id":"https:\/\/www.ruianding.com\/blog\/#\/schema\/person\/440d88575b7dc819a4cefc8c4199db3b"},"image":{"@id":"https:\/\/www.ruianding.com\/blog\/execute-processes-remotely-with-psexec\/#primaryimage"},"thumbnailUrl":"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/06\/image-37.png","keywords":["ADFS","DRS","PSTOOL"],"articleSection":["Tutorial"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.ruianding.com\/blog\/execute-processes-remotely-with-psexec\/","url":"https:\/\/www.ruianding.com\/blog\/execute-processes-remotely-with-psexec\/","name":"Execute Processes Remotely with PsExec Tool - \u6781\u7b80IT\uff5cSimpleIT","isPartOf":{"@id":"https:\/\/www.ruianding.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.ruianding.com\/blog\/execute-processes-remotely-with-psexec\/#primaryimage"},"image":{"@id":"https:\/\/www.ruianding.com\/blog\/execute-processes-remotely-with-psexec\/#primaryimage"},"thumbnailUrl":"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/06\/image-37.png","datePublished":"2023-05-09T13:34:54+00:00","dateModified":"2023-12-12T06:04:33+00:00","breadcrumb":{"@id":"https:\/\/www.ruianding.com\/blog\/execute-processes-remotely-with-psexec\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ruianding.com\/blog\/execute-processes-remotely-with-psexec\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ruianding.com\/blog\/execute-processes-remotely-with-psexec\/#primaryimage","url":"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/06\/image-37.png","contentUrl":"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/06\/image-37.png","width":586,"height":271},{"@type":"BreadcrumbList","@id":"https:\/\/www.ruianding.com\/blog\/execute-processes-remotely-with-psexec\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.ruianding.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Execute Processes Remotely with PsExec Tool"}]},{"@type":"WebSite","@id":"https:\/\/www.ruianding.com\/blog\/#website","url":"https:\/\/www.ruianding.com\/blog\/","name":"Ruian's Tech Troubleshooting Toolbox","description":"Debug the World.","publisher":{"@id":"https:\/\/www.ruianding.com\/blog\/#\/schema\/person\/440d88575b7dc819a4cefc8c4199db3b"},"alternateName":"\u4e01\u777f\u5b89\u7684\u6280\u672f\u5206\u4eab\u535a\u5ba2","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ruianding.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/www.ruianding.com\/blog\/#\/schema\/person\/440d88575b7dc819a4cefc8c4199db3b","name":"Ruian Ding","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ruianding.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/05\/logo.png","contentUrl":"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/05\/logo.png","width":284,"height":284,"caption":"Ruian Ding"},"logo":{"@id":"https:\/\/www.ruianding.com\/blog\/#\/schema\/person\/image\/"},"description":"I am currently a Support Specialist at NIO, focusing on cloud-related issues for NIO Power. Previously, at Microsoft Entra ID, I specialized in identity and access management (IAM), including device registration, Windows Hello for Business (WHfB), multi-factor authentication (MFA), and single sign-on (SSO). In addition to my core expertise, I have a strong foundation in Active Directory, Servers, Cloud Computing, Network Administration, and Front-end Web Development. This diverse technical skill set enables me to effectively handle a wide range of challenges in a fast-paced IT environment.","sameAs":["https:\/\/www.ruianding.com"],"url":"https:\/\/www.ruianding.com\/blog\/author\/ruiand\/"}]}},"_links":{"self":[{"href":"https:\/\/www.ruianding.com\/blog\/wp-json\/wp\/v2\/posts\/12","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ruianding.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ruianding.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ruianding.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ruianding.com\/blog\/wp-json\/wp\/v2\/comments?post=12"}],"version-history":[{"count":21,"href":"https:\/\/www.ruianding.com\/blog\/wp-json\/wp\/v2\/posts\/12\/revisions"}],"predecessor-version":[{"id":1430,"href":"https:\/\/www.ruianding.com\/blog\/wp-json\/wp\/v2\/posts\/12\/revisions\/1430"}],"wp:attachment":[{"href":"https:\/\/www.ruianding.com\/blog\/wp-json\/wp\/v2\/media?parent=12"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ruianding.com\/blog\/wp-json\/wp\/v2\/categories?post=12"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ruianding.com\/blog\/wp-json\/wp\/v2\/tags?post=12"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}