{"id":208586,"date":"2024-02-23T15:10:17","date_gmt":"2024-02-23T15:10:17","guid":{"rendered":"https:\/\/www.ninjaone.com\/script-hub\/microsoft-store-aktivieren-powershell\/"},"modified":"2024-03-04T19:17:44","modified_gmt":"2024-03-04T19:17:44","slug":"microsoft-store-aktivieren-powershell","status":"publish","type":"script_hub","link":"https:\/\/www.ninjaone.com\/de\/script-hub\/microsoft-store-aktivieren-powershell\/","title":{"rendered":"So aktivieren Sie den Microsoft Store f\u00fcr alle Benutzer mit PowerShell"},"content":{"rendered":"<p>Da Unternehmen zunehmend digitale L\u00f6sungen integrieren, wird die Verwaltung und Bereitstellung von Software immer wichtiger. Innerhalb dieses Rahmens ist der Windows Store von Microsoft ein zentrales Element, das eine gro\u00dfe Auswahl an Anwendungen und Diensten bietet. Es ist wichtig zu verstehen, wie <strong>der Microsoft Store f\u00fcr alle Benutzer aktiviert werden kann<\/strong>, insbesondere f\u00fcr gro\u00dfe IT-Unternehmen.<\/p>\n<h2>Hintergrund<\/h2>\n<p>Der Windows Store von Microsoft wurde eingef\u00fchrt, um den Prozess der Anwendungsbereitstellung zu vereinfachen. Es kann jedoch Szenarien geben, in denen der Windows Store entweder standardm\u00e4\u00dfig oder durch bestimmte Richtlinien deaktiviert ist. F\u00fcr IT-Fachleute und <a href=\"https:\/\/www.ninjaone.com\/de\/was-ist-ein-msp\">Managed Service Provider (MSPs)<\/a> ist die M\u00f6glichkeit, diese Funktion f\u00fcr mehrere Benutzerprofile zu aktivieren, nicht nur ein Vorteil, sondern eine Notwendigkeit. Daf\u00fcr gibt es das vorgestellte Skript, ein leistungsstarkes Tool, das darauf zugeschnitten ist, den Windows Store f\u00fcr alle Benutzer zu aktivieren, sowohl f\u00fcr bestehende als auch f\u00fcr neu erstellte.<\/p>\n<h2>Das Skript:<\/h2>\n<pre class=\"EnlighterJSRAW\" data-enlighter-language=\"powershell\">#Requires -Version 5.1\r\n\r\n&lt;#\r\n.SYNOPSIS\r\n    Enables the Windows Store for all users and newly created users.\r\n.DESCRIPTION\r\n    Enables the Windows Store for all users and newly created users.\r\n    No parameters needed\r\n    Enables the Windows Store for all users and newly created users.\r\n.EXAMPLE\r\n    (No Parameters)\r\n    Enables the Windows Store for all users and newly created users.\r\n.OUTPUTS\r\n    None\r\n.NOTES\r\n    Minimum OS Architecture Supported: Windows 10, Server 2016\r\n    Release Notes:\r\n    Initial Release\r\nBy using this script, you indicate your acceptance of the following legal terms as well as our Terms of Use at https:\/\/www.ninjaone.com\/terms-of-use.\r\n    Ownership Rights: NinjaOne owns and will continue to own all right, title, and interest in and to the script (including the copyright). NinjaOne is giving you a limited license to use the script in accordance with these legal terms. \r\n    Use Limitation: You may only use the script for your legitimate personal or internal business purposes, and you may not share the script with another party. \r\n    Republication Prohibition: Under no circumstances are you permitted to re-publish the script in any script library or website belonging to or under the control of any other software provider. \r\n    Warranty Disclaimer: The script is provided \u201cas is\u201d and \u201cas available\u201d, without warranty of any kind. NinjaOne makes no promise or guarantee that the script will be free from defects or that it will meet your specific needs or expectations. \r\n    Assumption of Risk: Your use of the script is at your own risk. You acknowledge that there are certain inherent risks in using the script, and you understand and assume each of those risks. \r\n    Waiver and Release: You will not hold NinjaOne responsible for any adverse or unintended consequences resulting from your use of the script, and you waive any legal or equitable rights or remedies you may have against NinjaOne relating to your use of the script. \r\n    EULA: If you are a NinjaOne customer, your use of the script is subject to the End User License Agreement applicable to you (EULA).\r\n#&gt;\r\n\r\n[CmdletBinding()]\r\nparam ()\r\n\r\nbegin {\r\n    function Test-IsElevated {\r\n        $id = [System.Security.Principal.WindowsIdentity]::GetCurrent()\r\n        $p = New-Object System.Security.Principal.WindowsPrincipal($id)\r\n        $p.IsInRole([System.Security.Principal.WindowsBuiltInRole]::Administrator)\r\n    }\r\n\r\n    function Test-IsSystem {\r\n        $id = [System.Security.Principal.WindowsIdentity]::GetCurrent()\r\n        return $id.Name -like \"NT AUTHORITY*\" -or $id.IsSystem\r\n    }\r\n\r\n    if (!(Test-IsElevated) -and !(Test-IsSystem)) {\r\n        Write-Error -Message \"Access Denied. Please run with Administrator privileges.\"\r\n        exit 1\r\n    }\r\n    \r\n    # Setting up some functions to be used later.\r\n    function Set-HKProperty {\r\n        param (\r\n            $Path,\r\n            $Name,\r\n            $Value,\r\n            [ValidateSet('DWord', 'QWord', 'String', 'ExpandedString', 'Binary', 'MultiString', 'Unknown')]\r\n            $PropertyType = 'DWord'\r\n        )\r\n        if (-not $(Test-Path -Path $Path)) {\r\n            # Check if path does not exist and create the path\r\n            New-Item -Path $Path -Force | Out-Null\r\n        }\r\n        if ((Get-ItemProperty -Path $Path -Name $Name -ErrorAction Ignore)) {\r\n            # Update property and print out what it was changed from and changed to\r\n            $CurrentValue = (Get-ItemProperty -Path $Path -Name $Name -ErrorAction Ignore).$Name\r\n            try {\r\n                Set-ItemProperty -Path $Path -Name $Name -Value $Value -Force -Confirm:$false -ErrorAction Stop | Out-Null\r\n            }\r\n            catch {\r\n                Write-Error \"[Error] Unable to Set registry key for $Name please see below error!\"\r\n                Write-Error $_\r\n                exit 1\r\n            }\r\n            Write-Host \"$Path$Name changed from $CurrentValue to $($(Get-ItemProperty -Path $Path -Name $Name -ErrorAction Ignore).$Name)\"\r\n        }\r\n        else {\r\n            # Create property with value\r\n            try {\r\n                New-ItemProperty -Path $Path -Name $Name -Value $Value -PropertyType $PropertyType -Force -Confirm:$false -ErrorAction Stop | Out-Null\r\n            }\r\n            catch {\r\n                Write-Error \"[Error] Unable to Set registry key for $Name please see below error!\"\r\n                Write-Error $_\r\n                exit 1\r\n            }\r\n            Write-Host \"Set $Path$Name to $($(Get-ItemProperty -Path $Path -Name $Name -ErrorAction Ignore).$Name)\"\r\n        }\r\n    }\r\n\r\n    # This will get all the registry path's for all actual users (not system or network service account but actual users.)\r\n    function Get-UserHives {\r\n        param (\r\n            [Parameter()]\r\n            [ValidateSet('AzureAD', 'DomainAndLocal', 'All')]\r\n            [String]$Type = \"All\",\r\n            [Parameter()]\r\n            [String[]]$ExcludedUsers,\r\n            [Parameter()]\r\n            [switch]$IncludeDefault\r\n        )\r\n\r\n        # User account SID's follow a particular patter depending on if they're azure AD or a Domain account or a local \"workgroup\" account.\r\n        $Patterns = switch ($Type) {\r\n            \"AzureAD\" { \"S-1-12-1-(d+-?){4}$\" }\r\n            \"DomainAndLocal\" { \"S-1-5-21-(d+-?){4}$\" }\r\n            \"All\" { \"S-1-12-1-(d+-?){4}$\" ; \"S-1-5-21-(d+-?){4}$\" } \r\n        }\r\n\r\n        # We'll need the NTuser.dat file to load each users registry hive. So we grab it if their account sid matches the above pattern. \r\n        $UserProfiles = Foreach ($Pattern in $Patterns) { \r\n            Get-ItemProperty \"HKLM:SOFTWAREMicrosoftWindows NTCurrentVersionProfileList*\" |\r\n                Where-Object { $_.PSChildName -match $Pattern } | \r\n                Select-Object @{Name = \"SID\"; Expression = { $_.PSChildName } }, \r\n                @{Name = \"UserHive\"; Expression = { \"$($_.ProfileImagePath)NTuser.dat\" } }, \r\n                @{Name = \"UserName\"; Expression = { \"$($_.ProfileImagePath | Split-Path -Leaf)\" } }\r\n        }\r\n\r\n        # There are some situations where grabbing the .Default user's info is needed.\r\n        switch ($IncludeDefault) {\r\n            $True {\r\n                $DefaultProfile = \"\" | Select-Object UserName, SID, UserHive\r\n                $DefaultProfile.UserName = \"Default\"\r\n                $DefaultProfile.SID = \"DefaultProfile\"\r\n                $DefaultProfile.Userhive = \"$env:SystemDriveUsersDefaultNTUSER.DAT\"\r\n\r\n                # It was easier to write-output twice than combine the two objects.\r\n                $DefaultProfile | Where-Object { $ExcludedUsers -notcontains $_.UserName } | Write-Output\r\n            }\r\n        }\r\n\r\n        $UserProfiles | Where-Object { $ExcludedUsers -notcontains $_.UserName } | Write-Output\r\n    }\r\n}\r\nprocess {\r\n    $Path = \"SoftwarePoliciesMicrosoftWindowsStore\"\r\n    $Name = \"RemoveWindowsStore\"\r\n    $Value = 0\r\n\r\n    # Get each user profile SID and Path to the profile. If there are any exclusions we'll have to take them into account.\r\n    $UserProfiles = Get-UserHives -IncludeDefault\r\n\r\n    # If the Disable-WindowsStore script was used we'll need to check applocker\r\n    [xml]$AppLockerXML = Get-AppLockerPolicy -Local -Xml\r\n    if ($AppLockerXML.AppLockerPolicy.RuleCollection.FilePublisherRule) {\r\n        $AppLockerXML.AppLockerPolicy.RuleCollection.FilePublisherRule | ForEach-Object { \r\n            if (($_.Action -eq \"Deny\") -and ($_.Conditions.FilePublisherCondition.ProductName -like \"*Microsoft.WindowsStore*\")) {\r\n                Write-Warning \"Removing AppLocker file publishing rules for the Windows Store!\" \r\n                [Void]$_.ParentNode.RemoveChild($_)\r\n            }       \r\n        }\r\n\r\n        if($AppLockerXML.AppLockerPolicy.RuleCollection.FilePublisherRule.id.Count -eq \"1\" -and $AppLockerXML.AppLockerPolicy.RuleCollection.FilePublisherRule.Name -eq \"(Default Rule) All signed packaged apps\"){\r\n            \r\n            $AppLockerXML.AppLockerPolicy.RuleCollection.FilePublisherRule | ForEach-Object {\r\n                if($_.ParentNode){\r\n                    [Void]$_.ParentNode.RemoveChild($_)\r\n                }\r\n            }\r\n\r\n            $AppLockerXML.AppLockerPolicy.RuleCollection | ForEach-Object {\r\n                if($_.Type -eq \"Appx\"){\r\n                    $_.EnforcementMode = \"NotConfigured\"\r\n                }\r\n            }\r\n        }\r\n\r\n        $AppLockerXML.Save(\"$env:TEMPapplocker.xml\")\r\n        Set-AppLockerPolicy -XmlPolicy \"$env:TEMPapplocker.xml\"\r\n        Remove-Item \"$env:TEMPapplocker.xml\"\r\n    }\r\n\r\n    $script:DisabledWinRun = $true\r\n    $failedUsers = @()\r\n    # Loop through each profile on the machine\r\n    Foreach ($UserProfile in $UserProfiles) {\r\n        # Load User ntuser.dat if it's not already loaded\r\n        If (($ProfileWasLoaded = Test-Path Registry::HKEY_USERS$($UserProfile.SID)) -eq $false) {\r\n            Start-Process -FilePath \"cmd.exe\" -ArgumentList \"\/C reg.exe LOAD HKU$($UserProfile.SID) `\"$($UserProfile.UserHive)`\"\" -Wait -WindowStyle Hidden\r\n        }\r\n        # Manipulate the registry\r\n        $key = \"Registry::HKEY_USERS$($UserProfile.SID)$($Path)\"\r\n        Set-HKProperty -Path $key -Name $Name -Value $Value -PropertyType DWord\r\n\r\n        if ($(Get-ItemProperty -Path $key -Name $Name -ErrorAction Ignore).$Name -ne $Value) {\r\n            $script:DisabledWinRun = $false\r\n            $failedUsers += $UserProfile.UserName\r\n        }\r\n        \r\n        # Unload NTuser.dat\r\n        If ($ProfileWasLoaded -eq $false) {\r\n            [gc]::Collect()\r\n            Start-Sleep 1\r\n            Start-Process -FilePath \"cmd.exe\" -ArgumentList \"\/C reg.exe UNLOAD HKU$($UserProfile.SID)\" -Wait -WindowStyle Hidden | Out-Null\r\n        }\r\n    }\r\n\r\n    Start-Sleep -Seconds 30\r\n    if ($script:DisabledWinRun) {\r\n        # All $UserProfiles updated\r\n        exit 0\r\n    }\r\n    else {\r\n        $failedUsers | ForEach-Object { Write-Error \"Failed to update user `\"$_`\"\" }\r\n        Write-Error \"One or more user profiles failed to update\"\r\n        exit 1\r\n    }\r\n}\r\nend {}<\/pre>\n<p>&nbsp;<\/p>\n\n<div class=\"in-context-cta\"><p style=\"text-align: center;\">Zugriff auf \u00fcber 300 Skripte im NinjaOne Dojo<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/www.ninjaone.com\/de\/kostenlosetestversionformular\/\">Zugang erhalten<\/a><\/p>\n<\/div>\n<h2>Detailansicht<\/h2>\n<p>Das Skript arbeitet in einer klaren Reihenfolge:<\/p>\n<h3>Initialisierung:<\/h3>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\">Zwei Funktionen, <strong>Test-IsElevated<\/strong> und <strong>Test-IsSystem<\/strong>, pr\u00fcfen, ob das Skript die erforderlichen Berechtigungen besitzt.<\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"2\" data-aria-level=\"1\">Das Skript richtet dann eine weitere Funktion, <strong>Set-HKProperty<\/strong>, ein, um Registrierungsvorg\u00e4nge zu erleichtern.<\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"3\" data-aria-level=\"1\">Eine komplexere Funktion, <strong>Get-UserHives<\/strong>, ruft die Registrierungspfade f\u00fcr alle aktuellen Benutzer ab.<\/li>\n<\/ul>\n<h3>Prozess:<\/h3>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\">Legt den Pfad, den Namen und den Wert f\u00fcr die Aktivierung des Windows Stores fest.<\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"2\" data-aria-level=\"1\">Ruft Benutzerprofile ab und pr\u00fcft, ob es App Locker-Regeln gibt, die den Zugriff auf den Windows Store verhindern k\u00f6nnten, und nimmt gegebenenfalls \u00c4nderungen vor.<\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"3\" data-aria-level=\"1\">Durchl\u00e4uft jedes Benutzerprofil und manipuliert die Registrierung, um sicherzustellen, dass der Windows Store aktiviert ist.<\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"4\" data-aria-level=\"1\">Best\u00e4tigt den Erfolg der Operation.<\/li>\n<\/ul>\n<h3>Beendigung:<\/h3>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"2\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\">Das Skript endet mit einer Statusr\u00fcckmeldung.<\/li>\n<\/ul>\n<h2>Potenzielle Anwendungsf\u00e4lle<\/h2>\n<p>Fallstudie: Stellen Sie sich vor, eine gro\u00dfe Bildungseinrichtung migriert ihre Software-Infrastruktur. Sie haben sich vor kurzem in das Microsoft-\u00d6kosystem integriert, mussten aber feststellen, dass der Windows Store f\u00fcr Studenten und Lehrkr\u00e4fte unzug\u00e4nglich ist. Anstatt Tausende von Profilen einzeln zu konfigurieren, k\u00fcmmert sich unser Skript nahtlos und auf einen Schlag um das Problem und gew\u00e4hrleistet so den rechtzeitigen Zugang zu den erforderlichen Anwendungen f\u00fcr alle.<\/p>\n<h2>Vergleiche<\/h2>\n<p>Manuelle Konfigurationen oder der Einsatz separater Tools sind zwar m\u00f6glich, k\u00f6nnen aber umst\u00e4ndlich und fehleranf\u00e4llig sein, vor allem in gr\u00f6\u00dferem Umfang. Dieses Skript automatisiert und optimiert den Prozess, wodurch die Wahrscheinlichkeit von Fehlern erheblich reduziert und gleichzeitig Zeit gespart wird.<\/p>\n<h2>FAQs<\/h2>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><strong>Sind f\u00fcr die Ausf\u00fchrung dieses Skripts Administratorrechte erforderlich?<\/strong><br \/>\nJa, es erfordert administrative Rechte.<\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"2\" data-aria-level=\"1\"><strong>Funktioniert dieses Skript auch unter \u00e4lteren Windows-Versionen?<\/strong><br \/>\nEs ist f\u00fcr Windows 10 und Server 2016 aufw\u00e4rts konzipiert.<\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"2\" data-aria-level=\"1\"><strong>K\u00f6nnen bestimmte Benutzer ausgeschlossen werden?<\/strong><br \/>\nJa, Ausschl\u00fcsse k\u00f6nnen \u00fcber die Parameter der Funktion <strong>Get-UserHives<\/strong> behandelt werden.<\/li>\n<\/ul>\n<h2>Auswirkungen<\/h2>\n<p>Das Skript vereinfacht zwar die Aktivierung des Windows Store erheblich, aber der unkontrollierte Zugriff kann dazu f\u00fchren, dass Benutzer ungepr\u00fcfte Anwendungen verwenden. IT-Fachleute sollten f\u00fcr ein ausgewogenes Verh\u00e4ltnis zwischen Zug\u00e4nglichkeit und Sicherheit sorgen und m\u00f6gliche Schwachstellen ber\u00fccksichtigen.<\/p>\n<h2>Empfehlungen<\/h2>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\">Sichern Sie immer die aktuellen Einstellungen, bevor Sie solche Skripte einsetzen.<\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"2\" data-aria-level=\"1\">\u00dcberpr\u00fcfen Sie regelm\u00e4\u00dfig die aktivierten Anwendungen im Windows Store, um sicherzustellen, dass sie den Unternehmensrichtlinien entsprechen.<\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"3\" data-aria-level=\"1\">Kl\u00e4ren Sie die Benutzer regelm\u00e4\u00dfig \u00fcber sichere Anwendungspraktiken auf.<\/li>\n<\/ul>\n<h2>Abschlie\u00dfende \u00dcberlegungen<\/h2>\n<p><a href=\"https:\/\/www.ninjaone.de\/\" target=\"_blank\" rel=\"noopener\">NinjaOne<\/a> erg\u00e4nzt mit seinem ganzheitlichen IT-Ansatz Tools wie dieses Skript und bietet eine optimierte Verwaltung und einen umfassenderen \u00dcberblick. Durch die Integration beider Systeme k\u00f6nnen IT-Experten nicht nur den Microsoft Store nahtlos aktivieren, sondern auch seine optimale und sichere Nutzung gew\u00e4hrleisten.<\/p>\n","protected":false},"author":35,"featured_media":143996,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","_lmt_disableupdate":"no","_lmt_disable":""},"operating_system":[4212],"use_cases":[4309],"class_list":["post-208586","script_hub","type-script_hub","status-publish","has-post-thumbnail","hentry","script_hub_category-windows","use_cases-benutzerinnen-und-zugangsverwaltung"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.ninjaone.com\/de\/wp-json\/wp\/v2\/script_hub\/208586","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ninjaone.com\/de\/wp-json\/wp\/v2\/script_hub"}],"about":[{"href":"https:\/\/www.ninjaone.com\/de\/wp-json\/wp\/v2\/types\/script_hub"}],"author":[{"embeddable":true,"href":"https:\/\/www.ninjaone.com\/de\/wp-json\/wp\/v2\/users\/35"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ninjaone.com\/de\/wp-json\/wp\/v2\/comments?post=208586"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ninjaone.com\/de\/wp-json\/wp\/v2\/media\/143996"}],"wp:attachment":[{"href":"https:\/\/www.ninjaone.com\/de\/wp-json\/wp\/v2\/media?parent=208586"}],"wp:term":[{"taxonomy":"script_hub_category","embeddable":true,"href":"https:\/\/www.ninjaone.com\/de\/wp-json\/wp\/v2\/operating_system?post=208586"},{"taxonomy":"use_cases","embeddable":true,"href":"https:\/\/www.ninjaone.com\/de\/wp-json\/wp\/v2\/use_cases?post=208586"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}