NRPT Example Script
Updated: October 7, 2009
Applies To: Windows Server 2008 R2
Tip
This topic applies to DNSSEC in Windows Server 2008 R2. DNSSEC support is greatly enhanced in Windows Server 2012. For more information, see DNSSEC in Windows Server 2012.
The following is an example script that you can use to configure the NRPT on a client computer.
Example registry script
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows NT\DNSClient]"EnableDAForAllNetworks"=dword:00000000"DnsSecureNameQueryFallback"=dword:00000000"DirectAccessQueryOrder"=dword:00000000[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows NT\DNSClient\DnsPolicyConfig][HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows NT\DNSClient\DnsPolicyConfig\Rule1]"Version"=dword:00000001"ConfigOptions"=dword:00000002"Name"=hex(7):2e,00,00,00,00,00"IPSECCARestriction"="""DNSSECValidationRequired"=dword:00000001"DNSSECQueryIPSECRequired"=dword:00000001"DNSSECQueryIPSECEncryption"=dword:00000001[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows NT\DNSClient\DnsPolicyConfig\Rule2]"Version"=dword:00000001"ConfigOptions"=dword:00000004"Name"=hex(7):2e,00,63,00,6f,00,6e,00,74,00,6f,00,73,00,6f,00,2e,00,63,00,6f,\ 00,6d,00,00,00,00,00"IPSECCARestriction"="""DNSSECValidationRequired"=dword:00000000"DNSSECQueryIPSECRequired"=dword:00000000"DNSSECQueryIPSECEncryption"=dword:00000000