打开APP
未登录
开通VIP,畅享免费电子书等14项超值服
开通VIP
首页
好书
留言交流
下载APP
联系客服
VBS脚本使用WMI操作注册表
castar
>《我的图书馆》
2011.10.05
关注
'VBS脚本使用WMI操作注册表,从微软弄下来的,整理了一下,弄成最简版,简版,常用版,以便与快速查找。
oReg.CreateKey HKEY_LOCAL_MACHINE,strKeyPath
oReg.SetExpandedStringValue HKEY_LOCAL_MACHINE,strKeyPath,strValueName,strValue
oReg.SetStringValue HKEY_LOCAL_MACHINE,strKeyPath,strValueName,strValue
oReg.SetDWORDValue HKEY_LOCAL_MACHINE,strKeyPath,strValueName,dwValue
oReg.SetBinaryValue HKEY_LOCAL_MACHINE,strPath,strValueName,uBinary
oReg.SetMultiStringValue HKEY_LOCAL_MACHINE,strKeyPath,strValueName,arrStringValues
oReg.DeleteKey HKEY_LOCAL_MACHINE, strKeyPath
oReg.DeleteValue HKEY_LOCAL_MACHINE,strKeyPath,strStringValueName
oReg.GetExpandedStringValue HKEY_LOCAL_MACHINE,strKeyPath,strValueName,strValue
oReg.GetDWORDValue HKEY_CURRENT_USER,strKeyPath,strValueName,dwValue
oReg.GetStringValue HKEY_LOCAL_MACHINE,strKeyPath,strValueName,strValue
oReg.GetBinaryValue HKEY_LOCAL_MACHINE,strKeyPath,strValueName,uBinary
oReg.GetMultiStringValue HKEY_LOCAL_MACHINE,strKeyPath,strValueName,arrStringValues
'-------------------------------------------------------------------------------------------
Const
HKEY_CLASSES_ROOT = &H80000000
Const
HKEY_CURRENT_USER = &H80000001
Const
HKEY_LOCAL_MACHINE = &H80000002
Const
HKEY_USERS = &H80000003
Const
HKEY_CURRENT_CONFIG = &H80000005
' 创建注册表项
const
HKEY_LOCAL_MACHINE = &H80000002
strComputer =
"."
Set
StdOut = WScript.StdOut
Set
oReg=
GetObject
(
"winmgmts:{impersonationLevel=impersonate}!\\"
&_
strComputer &
"\root\default:StdRegProv"
)
strKeyPath =
"SOFTWARE\System Admin Scripting Guide"
oReg.CreateKey HKEY_LOCAL_MACHINE,strKeyPath
'创建多字符串值
const
HKEY_LOCAL_MACHINE = &H80000002
strComputer =
"."
Set
oReg=
GetObject
(
"winmgmts:{impersonationLevel=impersonate}!\\"
&_
strComputer &
"\root\default:StdRegProv"
)
strKeyPath =
"SOFTWARE\System Admin Scripting Guide"
strValueName =
"Multi String Value Name"
arrStringValues =
Array
(
"first string"
,
"second string"
,_
"third string"
,
"fourth string"
)
oReg.SetMultiStringValue HKEY_LOCAL_MACHINE,strKeyPath,_
strValueName,arrStringValues
'创建扩展的字符串值
const
HKEY_LOCAL_MACHINE = &H80000002
strComputer =
"."
Set
oReg=
GetObject
(
"winmgmts:{impersonationLevel=impersonate}!\\"
&_
strComputer &
"\root\default:StdRegProv"
)
strKeyPath =
"SOFTWARE\System Admin Scripting Guide"
strValueName =
"Expanded String Value Name"
strValue =
"%PATHEXT%"
oReg.SetExpandedStringValue HKEY_LOCAL_MACHINE,strKeyPath,strValueName,strValue
'创建字符串和 DWORD 值
const
HKEY_LOCAL_MACHINE = &H80000002
strComputer =
"."
Set
StdOut = WScript.StdOut
Set
oReg=
GetObject
(
"winmgmts:{impersonationLevel=impersonate}!\\"
&_
strComputer &
"\root\default:StdRegProv"
)
strKeyPath =
"SOFTWARE\System Admin Scripting Guide"
strValueName =
"String Value Name"
strValue =
"string value"
oReg.SetStringValue HKEY_LOCAL_MACHINE,strKeyPath,strValueName,strValue
strValueName =
"DWORD Value Name"
dwValue = 82
oReg.SetDWORDValue HKEY_LOCAL_MACHINE,strKeyPath,strValueName,dwValue
'删除注册表项
const
HKEY_LOCAL_MACHINE = &H80000002
strComputer =
"."
Set
oReg=
GetObject
(
"winmgmts:{impersonationLevel=impersonate}!\\"
&_
strComputer &
"\root\default:StdRegProv"
)
strKeyPath =
"SOFTWARE\System Admin Scripting Guide"
oReg.DeleteKey HKEY_LOCAL_MACHINE, strKeyPath
'删除注册表值
const
HKEY_LOCAL_MACHINE = &H80000002
strComputer =
"."
Set
oReg=
GetObject
(
"winmgmts:{impersonationLevel=impersonate}!\\"
&_
strComputer &
"\root\default:StdRegProv"
)
strKeyPath =
"SOFTWARE\System Admin Scripting Guide"
strDWORDValueName =
"DWORD Value Name"
strExpandedStringValueName =
"Expanded String Value Name"
strMultiStringValueName =
"Multi String Value Name"
strStringValueName =
"String Value Name"
oReg.DeleteValue HKEY_LOCAL_MACHINE,strKeyPath,strDWORDValueName
oReg.DeleteValue HKEY_LOCAL_MACHINE,strKeyPath,strExpandedStringValueName
oReg.DeleteValue HKEY_LOCAL_MACHINE,strKeyPath,strMultiStringValueName
oReg.DeleteValue HKEY_LOCAL_MACHINE,strKeyPath,strStringValueName
'枚举注册表值和类型
'枚举子项
'列出注册表文件
'监视注册表子项事件
'监视注册表子树事件
'读取二进制注册表值
const
HKEY_LOCAL_MACHINE = &H80000002
strComputer =
"."
Set
StdOut = WScript.StdOut
Set
oReg=
GetObject
(
"winmgmts:{impersonationLevel=impersonate}!\\"
&_
strComputer &
"\root\default:StdRegProv"
)
strKeyPath =
"SOFTWARE\Microsoft\Windows NT\CurrentVersion"
strValueName =
"LicenseInfo"
oReg.GetBinaryValue HKEY_LOCAL_MACHINE,strKeyPath,_
strValueName,strValue
For
i =
lBound
(strValue)
to
uBound
(strValue)
StdOut.WriteLine strValue(i)
Next
'读取 MultiString 值
const
HKEY_LOCAL_MACHINE = &H80000002
strComputer =
"."
Set
StdOut = WScript.StdOut
Set
oReg=
GetObject
(
"winmgmts:{impersonationLevel=impersonate}!\\"
&_
strComputer &
"\root\default:StdRegProv"
)
strKeyPath =
"SYSTEM\CurrentControlSet\Services\Eventlog\System"
strValueName =
"Sources"
oReg.GetMultiStringValue HKEY_LOCAL_MACHINE,strKeyPath,_
strValueName,arrValues
For
Each
strValue
In
arrValues
StdOut.WriteLine strValue
Next
'读取扩展的字符串值
const
HKEY_LOCAL_MACHINE = &H80000002
strComputer =
"."
Set
StdOut = WScript.StdOut
Set
oReg=
GetObject
(
"winmgmts:{impersonationLevel=impersonate}!\\"
&_
strComputer &
"\root\default:StdRegProv"
)
strKeyPath =
"SOFTWARE\Microsoft\Windows NT\CurrentVersion\WinLogon"
strValueName =
"UIHost"
oReg.GetExpandedStringValue HKEY_LOCAL_MACHINE,strKeyPath,_
strValueName,strValue
StdOut.WriteLine
"The Windows logon UI host is: "
& strValue
'读取字符串和 DWORD 值
const
HKEY_CURRENT_USER = &H80000001
const
HKEY_LOCAL_MACHINE = &H80000002
strComputer =
"."
Set
StdOut = WScript.StdOut
Set
oReg=
GetObject
(
"winmgmts:{impersonationLevel=impersonate}!\\"
&_
strComputer &
"\root\default:StdRegProv"
)
strKeyPath =
"Console"
strValueName =
"HistoryBufferSize"
oReg.GetDWORDValue HKEY_CURRENT_USER,strKeyPath,strValueName,dwValue
StdOut.WriteLine
"Current History Buffer Size: "
& dwValue
strKeyPath =
"SOFTWARE\Microsoft\Windows Script Host\Settings"
strValueName =
"TrustPolicy"
oReg.GetStringValue HKEY_LOCAL_MACHINE,strKeyPath,strValueName,strValue
StdOut.WriteLine
"Current WSH Trust Policy Value: "
& strValue
'-------------------------------------------------------------------------------------------
Const
HKEY_CLASSES_ROOT = &H80000000
Const
HKEY_CURRENT_USER = &H80000001
Const
HKEY_LOCAL_MACHINE = &H80000002
Const
HKEY_USERS = &H80000003
Const
HKEY_CURRENT_CONFIG = &H80000005
strComputer =
"."
Set
StdOut = WScript.StdOut
Set
oReg=
GetObject
(
"winmgmts:{impersonationLevel=impersonate}!\\" & strComputer & "
\root\default:StdRegProv")
'创建注册表项
strKeyPath =
"SOFTWARE\System Admin Scripting Guide"
oReg.CreateKey HKEY_LOCAL_MACHINE,strKeyPath
'创建多字符串值
strValueName =
"Multi String Value Name"
arrStringValues =
Array
(
"first string"
,
"second string"
,
"third string"
,
"fourth string"
)
oReg.SetMultiStringValue HKEY_LOCAL_MACHINE,strKeyPath,strValueName,arrStringValues
'创建扩展的字符串值
strValueName =
"Expanded String Value Name"
strValue =
"%PATHEXT%"
oReg.SetExpandedStringValue HKEY_LOCAL_MACHINE,strKeyPath,strValueName,strValue
'创建字符串
strValueName =
"String Value Name"
strValue =
"string value"
oReg.SetStringValue HKEY_LOCAL_MACHINE,strKeyPath,strValueName,strValue
'创建DWORD 值
strValueName =
"DWORD Value Name"
dwValue = 82
oReg.SetDWORDValue HKEY_LOCAL_MACHINE,strKeyPath,strValueName,dwValue
'创建二进制值
strValueName =
"Binary Value Name"
uBinary =
Array
(1,0,0,0)
oReg.SetBinaryValue HKEY_LOCAL_MACHINE,strPath,strValueName,uBinary
'删除注册表项
strKeyPath =
"SOFTWARE\System Admin Scripting Guide"
oReg.DeleteKey HKEY_LOCAL_MACHINE, strKeyPath
'删除注册表值
strDWORDValueName =
"DWORD Value Name"
strExpandedStringValueName =
"Expanded String Value Name"
strMultiStringValueName =
"Multi String Value Name"
strStringValueName =
"String Value Name"
oReg.DeleteValue HKEY_LOCAL_MACHINE,strKeyPath,strDWORDValueName
oReg.DeleteValue HKEY_LOCAL_MACHINE,strKeyPath,strExpandedStringValueName
oReg.DeleteValue HKEY_LOCAL_MACHINE,strKeyPath,strMultiStringValueName
oReg.DeleteValue HKEY_LOCAL_MACHINE,strKeyPath,strStringValueName
'''''''''''''''''''''''''''''''''''''''''''''''''枚举注册表值和类型
'''''''''''''''''''''''''''''''''''''''''''''''''枚举子项
'''''''''''''''''''''''''''''''''''''''''''''''''列出注册表文件
'''''''''''''''''''''''''''''''''''''''''''''''''监视注册表子项事件
'''''''''''''''''''''''''''''''''''''''''''''''''监视注册表子树事件
'读取 MultiString 值
strKeyPath =
"SYSTEM\CurrentControlSet\Services\Eventlog\System"
strValueName =
"Sources"
oReg.GetMultiStringValue HKEY_LOCAL_MACHINE,strKeyPath,strValueName,arrValues
For
Each
strValue
In
arrValues
StdOut.WriteLine strValue
Next
'读取扩展的字符串值
strKeyPath =
"SOFTWARE\Microsoft\Windows NT\CurrentVersion\WinLogon"
strValueName =
"UIHost"
oReg.GetExpandedStringValue HKEY_LOCAL_MACHINE,strKeyPath,strValueName,strValue
StdOut.WriteLine
"The Windows logon UI host is: "
& strValue
'读取字符串值
strKeyPath =
"Console"
strValueName =
"HistoryBufferSize"
oReg.GetDWORDValue HKEY_CURRENT_USER,strKeyPath,strValueName,dwValue
StdOut.WriteLine
"Current History Buffer Size: "
& dwValue
'读取 DWORD 值
strKeyPath =
"SOFTWARE\Microsoft\Windows Script Host\Settings"
strValueName =
"TrustPolicy"
oReg.GetStringValue HKEY_LOCAL_MACHINE,strKeyPath,strValueName,strValue
StdOut.WriteLine
"Current WSH Trust Policy Value: "
& strValue
'读取二进制注册表值
strKeyPath =
"SOFTWARE\Microsoft\Windows NT\CurrentVersion"
strValueName =
"LicenseInfo"
oReg.GetBinaryValue HKEY_LOCAL_MACHINE,strKeyPath,strValueName,strValue
For
i =
lBound
(strValue)
to
uBound
(strValue)
StdOut.WriteLine strValue(i)
Next
本站仅提供存储服务,所有内容均由用户发布,如发现有害或侵权内容,请
点击举报
。
打开APP,阅读全文并永久保存
查看更多类似文章
猜你喜欢
类似文章
【热】
打开小程序,算一算2024你的财运
偷梁换柱:用脚本实现共享文件夹路径的转换
使用vbs添加windows网络代理
在域环境下禁用USB存储设备的方法
完整的注册表操作实例 VBS脚本
如何修改 Internet Explorer 的主页设置?
如何使用脚本锁定任务栏?
更多类似文章 >>
生活服务
热点新闻
留言交流
回顶部
联系我们
分享
收藏
点击这里,查看已保存的文章
导长图
关注
一键复制
下载文章
绑定账号成功
后续可登录账号畅享VIP特权!
如果VIP功能使用有故障,
可点击这里联系客服!
联系客服
微信登录中...
请勿关闭此页面
先别划走!
送你5元优惠券,购买VIP限时立减!
5
元
优惠券
优惠券还有
10:00
过期
马上使用
×