Computer step by step
 Make your Pc better
Description:  

This policy setting changes the operational behavior of the Responder network protocol driver.

The Responder allows a computer to participate in Link Layer Topology Discovery requests so that it can be
discovered and located on the network. It also allows a computer to participate in Quality-of-Service activities
such as bandwidth estimation and network health analysis.

If you enable this policy setting, additional options are available to fine-tune your selection. You may choose
the "Allow operation while in domain" option to allow the Responder to operate on a network interface that's
connected to a managed network. On the other hand, if a network interface is connected to an unmanaged
network, you may choose the "Allow operation while in public network" and "Prohibit operation while in
private network" options instead.

If you disable or do not configure this policy setting, the default behavior for the Responder will apply.

Supported on: At least Windows Vista.
Turn on Responder (RSPNDR) driver
Description Gpedit Regedit CMD Back VBScript PowerShell Script
Gpedit:   

Please perform the following steps:

Please go to Pearl button (Start) and click on the Search programs and files
For more information about the change from Start to Pearl button click here
Type gpedit.msc and press Enter
In the Group Policy window please navigate to Computer Configuration -> Administrative Templates ->
Network -> Link-Layer Topology Discovery and open Turn on Responder (RSPNDR) driver.
Not Configured -> is the Default state
Enabled -> apply this GPO
Disabled -> this GPO will not be applied

To finish press ok button and close Group Policy window.
Description Gpedit Regedit CMD Up Back VBScript
Type regedit and press ok
Please confirm User Account Control pop-up
Microsoft official disclaimer

Warning Serious problems might occur if you modify the registry incorrectly by using Registry Editor or by
using another method. These problems might require that you reinstall the operating system. Microsoft
cannot guarantee that these problems can be solved. Modify the registry at your own risk.

Note: This registry key is created by Group Policy when this GPO is Enable or Disable. The GPO Default state
is Not Configured -> this registry entry is not present.

Please navigate to HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\LLTD
and locate:
EnableRspndr registry key
AllowRspndrOnDomain registry key
AllowRspndrOnPublicNet registry key
ProhibitRspndrOnPrivateNet registry key
Regedit:          

Please perform the following steps:

Please go to Pearl button (Start) and click on the Search programs and files
For more information about the change from Start to Pearl button click here
Description Gpedit Regedit CMD Up Back VBScript PowerShell Script PowerShell Script
   
   
To Enable:
EnableRspndr = 1
AllowRspndrOnDomain = 0
AllowRspndrOnPublicNet = 0
ProhibitRspndrOnPrivateNet = 0

Allow operation while in domain:
EnableRspndr = 1
AllowRspndrOnDomain = 1
AllowRspndrOnPublicNet = 0
ProhibitRspndrOnPrivateNet = 0

Allow operation while in public network:
EnableRspndr = 1
AllowRspndrOnDomain = 0
AllowRspndrOnPublicNet = 1
ProhibitRspndrOnPrivateNet = 0

Prohibit operation while in private network:
EnableRspndr = 1
AllowRspndrOnDomain = 0
AllowRspndrOnPublicNet = 0
ProhibitRspndrOnPrivateNet = 1

Disabled:
EnableRspndr = 0
AllowRspndrOnDomain = 0
AllowRspndrOnPublicNet = 0
ProhibitRspndrOnPrivateNet = 0

To finish press ok button and close Registry Editor window

Note: Manual editing of this registry key will not be reflected in Group Policy. If you modify this GPO from
Group Policy this registry key will be rewritten.
Description Gpedit Regedit Back CMD VBScript Up
Type cmd, right click on cmd icon under the Programs and click on Run as administrator
Please confirm User Account Control pop-up
Please select, right and copy a registry key from below, then right click on command prompt window
, select Paste and press Enter

Enabled:
REG add "HKLM\SOFTWARE\Policies\Microsoft\Windows\LLTD" /v EnableRspndr /t REG_DWORD /d 1 /f
REG add "HKLM\SOFTWARE\Policies\Microsoft\Windows\LLTD" /v AllowRspndrOnDomain /t REG_DWORD /d 0 /f
REG add "HKLM\SOFTWARE\Policies\Microsoft\Windows\LLTD" /v AllowRspndrOnPublicNet /t REG_DWORD /d 0 /f
REG add "HKLM\SOFTWARE\Policies\Microsoft\Windows\LLTD" /v ProhibitRspndrOnPrivateNet /t REG_DWORD /d 0 /f

Allow operation while in domain:
REG add "HKLM\SOFTWARE\Policies\Microsoft\Windows\LLTD" /v EnableRspndr /t REG_DWORD /d 1 /f
REG add "HKLM\SOFTWARE\Policies\Microsoft\Windows\LLTD" /v AllowRspndrOnDomain /t REG_DWORD /d 1 /f
REG add "HKLM\SOFTWARE\Policies\Microsoft\Windows\LLTD" /v AllowRspndrOnPublicNet /t REG_DWORD /d 0 /f
REG add "HKLM\SOFTWARE\Policies\Microsoft\Windows\LLTD" /v ProhibitRspndrOnPrivateNet /t REG_DWORD /d 0 /f

Allow operation while in public network:
REG add "HKLM\SOFTWARE\Policies\Microsoft\Windows\LLTD" /v EnableRspndr /t REG_DWORD /d 1 /f
REG add "HKLM\SOFTWARE\Policies\Microsoft\Windows\LLTD" /v AllowRspndrOnDomain /t REG_DWORD /d 0 /f
REG add "HKLM\SOFTWARE\Policies\Microsoft\Windows\LLTD" /v AllowRspndrOnPublicNet /t REG_DWORD /d 1 /f
REG add "HKLM\SOFTWARE\Policies\Microsoft\Windows\LLTD" /v ProhibitRspndrOnPrivateNet /t REG_DWORD /d 0 /f

Prohibit operation while in private network:
REG add "HKLM\SOFTWARE\Policies\Microsoft\Windows\LLTD" /v EnableRspndr /t REG_DWORD /d 1 /f
REG add "HKLM\SOFTWARE\Policies\Microsoft\Windows\LLTD" /v AllowRspndrOnDomain /t REG_DWORD /d 0 /f
REG add "HKLM\SOFTWARE\Policies\Microsoft\Windows\LLTD" /v AllowRspndrOnPublicNet /t REG_DWORD /d 0 /f
REG add "HKLM\SOFTWARE\Policies\Microsoft\Windows\LLTD" /v ProhibitRspndrOnPrivateNet /t REG_DWORD /d 1 /f

Disabled:
REG add "HKLM\SOFTWARE\Policies\Microsoft\Windows\LLTD" /v EnableRspndr /t REG_DWORD /d 0 /f
REG add "HKLM\SOFTWARE\Policies\Microsoft\Windows\LLTD" /v AllowRspndrOnDomain /t REG_DWORD /d 0 /f
REG add "HKLM\SOFTWARE\Policies\Microsoft\Windows\LLTD" /v AllowRspndrOnPublicNet /t REG_DWORD /d 0 /f
REG add "HKLM\SOFTWARE\Policies\Microsoft\Windows\LLTD" /v ProhibitRspndrOnPrivateNet /t REG_DWORD /d 0 /f

Not Configured:
REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows\LLTD" /v EnableRspndr /f
REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows\LLTD" /v AllowRspndrOnDomain /f
REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows\LLTD" /v AllowRspndrOnPublicNet /f
REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows\LLTD" /v ProhibitRspndrOnPrivateNet /f

Note: Manual editing of this registry key will not be reflected in Group Policy. If you modify this GPO from
Group Policy this registry key will be rewritten.
CMD:          

Please perform the following steps:

Please go to Pearl button (Start) and click on the Search programs and files
For more information about the change from Start to Pearl button click here
PowerShell Script
   
Description Gpedit Regedit Back CMD VBScript Up
VBScript:          

Const HKEY_LOCAL_MACHINE = &H80000002
strComputer = "."
Set oReg=GetObject("winmgmts:{impersonationLevel=impersonate}!\\" & _
strComputer & "\root\default:StdRegProv")

strKeyPath = "SOFTWARE\Policies\Microsoft\Windows\LLTD"
oReg.CreateKey HKEY_LOCAL_MACHINE,strKeyPath
strValueName1 = "EnableRspndr"
strValueName2 = "AllowRspndrOnDomain"
strValueName3 = "AllowRspndrOnPublicNet"
strValueName4 = "ProhibitRspndrOnPrivateNet"
dwValue1 = 0
dwValue2 = 1
'Enabled:
oReg.SetDWORDValue HKEY_LOCAL_MACHINE,strKeyPath,strValueName1,dwValue2
oReg.SetDWORDValue HKEY_LOCAL_MACHINE,strKeyPath,strValueName2,dwValue1
oReg.SetDWORDValue HKEY_LOCAL_MACHINE,strKeyPath,strValueName3,dwValue1
oReg.SetDWORDValue HKEY_LOCAL_MACHINE,strKeyPath,strValueName4,dwValue1
'Allow operation while in domain:
'oReg.SetDWORDValue HKEY_LOCAL_MACHINE,strKeyPath,strValueName1,dwValue2
'oReg.SetDWORDValue HKEY_LOCAL_MACHINE,strKeyPath,strValueName2,dwValue2
'oReg.SetDWORDValue HKEY_LOCAL_MACHINE,strKeyPath,strValueName3,dwValue1
'oReg.SetDWORDValue HKEY_LOCAL_MACHINE,strKeyPath,strValueName4,dwValue1
'Allow operation while in public network:
'oReg.SetDWORDValue HKEY_LOCAL_MACHINE,strKeyPath,strValueName1,dwValue2
'oReg.SetDWORDValue HKEY_LOCAL_MACHINE,strKeyPath,strValueName2,dwValue1
'oReg.SetDWORDValue HKEY_LOCAL_MACHINE,strKeyPath,strValueName3,dwValue2
'oReg.SetDWORDValue HKEY_LOCAL_MACHINE,strKeyPath,strValueName4,dwValue1
'Prohibit operation while in private network:
'oReg.SetDWORDValue HKEY_LOCAL_MACHINE,strKeyPath,strValueName1,dwValue2
'oReg.SetDWORDValue HKEY_LOCAL_MACHINE,strKeyPath,strValueName2,dwValue1
'oReg.SetDWORDValue HKEY_LOCAL_MACHINE,strKeyPath,strValueName3,dwValue1
'oReg.SetDWORDValue HKEY_LOCAL_MACHINE,strKeyPath,strValueName4,dwValue2
'Disabled:
'oReg.SetDWORDValue HKEY_LOCAL_MACHINE,strKeyPath,strValueName1,dwValue1
'oReg.SetDWORDValue HKEY_LOCAL_MACHINE,strKeyPath,strValueName2,dwValue1
'oReg.SetDWORDValue HKEY_LOCAL_MACHINE,strKeyPath,strValueName3,dwValue1
'oReg.SetDWORDValue HKEY_LOCAL_MACHINE,strKeyPath,strValueName4,dwValue1
'Not Configured
'oReg.DeleteValue HKEY_LOCAL_MACHINE,strKeyPath,strValueName1
'oReg.DeleteValue HKEY_LOCAL_MACHINE,strKeyPath,strValueName2
'oReg.DeleteValue HKEY_LOCAL_MACHINE,strKeyPath,strValueName3
'oReg.DeleteValue HKEY_LOCAL_MACHINE,strKeyPath,strValueName4
PowerShell Script
   
Description Gpedit Regedit Back CMD VBScript Up
PowerShell Script :          

Enabled

$RegKey = "HKLM:\SOFTWARE\Policies\Microsoft\Windows"
If(Test-Path ($RegKey + "\LLTD"))
{
 $RegKey = "HKLM:\SOFTWARE\Policies\Microsoft\Windows\LLTD"
  ##Enabled
 New-ItemProperty -path $RegKey -name EnableRspndr -value 1 -PropertyType DWord -Force
 New-ItemProperty -path $RegKey -name AllowRspndrOnDomain -value 0 -PropertyType DWord -Force
 New-ItemProperty -path $RegKey -name AllowRspndrOnPublicNet -value 0 -PropertyType DWord -Force
 New-ItemProperty -path $RegKey -name ProhibitRspndrOnPrivateNet -value 0 -PropertyType DWord -Force
  ##Allow operation while in domain
 ##New-ItemProperty -path $RegKey -name EnableRspndr -value 1 -PropertyType DWord -Force
 ##New-ItemProperty -path $RegKey -name AllowRspndrOnDomain -value 1 -PropertyType DWord -Force
 ##New-ItemProperty -path $RegKey -name AllowRspndrOnPublicNet -value 0 -PropertyType DWord -Force
 ##New-ItemProperty -path $RegKey -name ProhibitRspndrOnPrivateNet -value 0 -PropertyType DWord -Force
  ##Allow operation while in public network
 ##New-ItemProperty -path $RegKey -name EnableRspndr -value 1 -PropertyType DWord -Force
 ##New-ItemProperty -path $RegKey -name AllowRspndrOnDomain -value 0 -PropertyType DWord -Force
 ##New-ItemProperty -path $RegKey -name AllowRspndrOnPublicNet -value 1 -PropertyType DWord -Force
 ##New-ItemProperty -path $RegKey -name ProhibitRspndrOnPrivateNet -value 0 -PropertyType DWord -Force
  ##Prohibit operation while in private network
 ##New-ItemProperty -path $RegKey -name EnableRspndr -value 1 -PropertyType DWord -Force
 ##New-ItemProperty -path $RegKey -name AllowRspndrOnDomain -value 0 -PropertyType DWord -Force
 ##New-ItemProperty -path $RegKey -name AllowRspndrOnPublicNet -value 0 -PropertyType DWord -Force
 ##New-ItemProperty -path $RegKey -name ProhibitRspndrOnPrivateNet -value 1 -PropertyType DWord -Force
  ##Disabled
 ##New-ItemProperty -path $RegKey -name EnableRspndr -value 0 -PropertyType DWord -Force
 ##New-ItemProperty -path $RegKey -name AllowRspndrOnDomain -value 0 -PropertyType DWord -Force
 ##New-ItemProperty -path $RegKey -name AllowRspndrOnPublicNet -value 0 -PropertyType DWord -Force
 ##New-ItemProperty -path $RegKey -name ProhibitRspndrOnPrivateNet -value 0 -PropertyType DWord -Force
}
else
{
 New-Item -path $RegKey -name LLTD
 $RegKey = "HKLM:\SOFTWARE\Policies\Microsoft\Windows\LLTD"
  ##Enabled
 New-ItemProperty -path $RegKey -name EnableRspndr -value 1 -PropertyType DWord
 New-ItemProperty -path $RegKey -name AllowRspndrOnDomain -value 0 -PropertyType DWord
 New-ItemProperty -path $RegKey -name AllowRspndrOnPublicNet -value 0 -PropertyType DWord
 New-ItemProperty -path $RegKey -name ProhibitRspndrOnPrivateNet -value 0 -PropertyType DWord
  ##Allow operation while in domain
 ##New-ItemProperty -path $RegKey -name EnableRspndr -value 1 -PropertyType DWord
 ##New-ItemProperty -path $RegKey -name AllowRspndrOnDomain -value 1 -PropertyType DWord
 ##New-ItemProperty -path $RegKey -name AllowRspndrOnPublicNet -value 0 -PropertyType DWord
 ##New-ItemProperty -path $RegKey -name ProhibitRspndrOnPrivateNet -value 0 -PropertyType DWord
  ##Allow operation while in public network
 ##New-ItemProperty -path $RegKey -name EnableRspndr -value 1 -PropertyType DWord
 ##New-ItemProperty -path $RegKey -name AllowRspndrOnDomain -value 0 -PropertyType DWord
 ##New-ItemProperty -path $RegKey -name AllowRspndrOnPublicNet -value 1 -PropertyType DWord
 ##New-ItemProperty -path $RegKey -name ProhibitRspndrOnPrivateNet -value 0 -PropertyType DWord
  ##Prohibit operation while in private network
 ##New-ItemProperty -path $RegKey -name EnableRspndr -value 1 -PropertyType DWord
 ##New-ItemProperty -path $RegKey -name AllowRspndrOnDomain -value 0 -PropertyType DWord
 ##New-ItemProperty -path $RegKey -name AllowRspndrOnPublicNet -value 0 -PropertyType DWord
 ##New-ItemProperty -path $RegKey -name ProhibitRspndrOnPrivateNet -value 1 -PropertyType DWord
  ##Disabled
 ##New-ItemProperty -path $RegKey -name EnableRspndr -value 0 -PropertyType DWord
 ##New-ItemProperty -path $RegKey -name AllowRspndrOnDomain -value 0 -PropertyType DWord
 ##New-ItemProperty -path $RegKey -name AllowRspndrOnPublicNet -value 0 -PropertyType DWord
 ##New-ItemProperty -path $RegKey -name ProhibitRspndrOnPrivateNet -value 0 -PropertyType DWord
}

Not Configured\Disabled

$RegKey = "HKLM:\SOFTWARE\Policies\Microsoft\Windows"
Remove-ItemProperty -Path($RegKey + "\LLTD") -name EnableRspndr
Remove-ItemProperty -Path($RegKey + "\LLTD") -name AllowRspndrOnDomain
Remove-ItemProperty -Path($RegKey + "\LLTD") -name AllowRspndrOnPublicNet
Remove-ItemProperty -Path($RegKey + "\LLTD") -name ProhibitRspndrOnPrivateNet
If( (Get-Item -Path($RegKey + "\LLTD")).ValueCount -eq 0 -and (Get-Item -Path($RegKey + "\LLTD")).SubKeyCount -eq 0)
{
 Remove-Item -Path($RegKey + "\LLTD")
}
Up Back PowerShell Script