This is the remedy (besides bashing their heads repeatedly).
Query for the session IDs:
Now, kill those stranglers:> qwinsta /SERVER:[server name]
SESSIONNAME USERNAME ID STATE TYPE DEVICE
console username 0 Active wdcon
rdp-tcp 65536 Listen rdpwd
jackass1 1 Disc rdpwd
jackass2 2 Disc rdpwd
Remember: you need to be an administrator of [server name] to do this.> logoff 1 /SERVER:[server name]
> logoff 2 /SERVER:[server name]
More command line goodies: http://dev.remotenetworktechnology.com/cmd/tscmd.htm
No comments:
Post a Comment