Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
Updated: October 7, 2009
Applies To: Windows Server 2008 R2
Tip
This topic applies to DNSSEC in Windows Server 2008 R2. DNSSEC support is greatly enhanced in Windows Server 2012. For more information, see DNSSEC in Windows Server 2012.
The following is an example script that you can use to configure the NRPT on a client computer.
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows NT\DNSClient]"EnableDAForAllNetworks"=dword:00000000"DnsSecureNameQueryFallback"=dword:00000000"DirectAccessQueryOrder"=dword:00000000[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows NT\DNSClient\DnsPolicyConfig][HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows NT\DNSClient\DnsPolicyConfig\Rule1]"Version"=dword:00000001"ConfigOptions"=dword:00000002"Name"=hex(7):2e,00,00,00,00,00"IPSECCARestriction"="""DNSSECValidationRequired"=dword:00000001"DNSSECQueryIPSECRequired"=dword:00000001"DNSSECQueryIPSECEncryption"=dword:00000001[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows NT\DNSClient\DnsPolicyConfig\Rule2]"Version"=dword:00000001"ConfigOptions"=dword:00000004"Name"=hex(7):2e,00,63,00,6f,00,6e,00,74,00,6f,00,73,00,6f,00,2e,00,63,00,6f,\ 00,6d,00,00,00,00,00"IPSECCARestriction"="""DNSSECValidationRequired"=dword:00000000"DNSSECQueryIPSECRequired"=dword:00000000"DNSSECQueryIPSECEncryption"=dword:00000000