Unpacking Software Livestream

Join our monthly Unpacking Software livestream to hear about the latest news, chat and opinion on packaging, software deployment and lifecycle management!

Learn More

Chocolatey Product Spotlight

Join the Chocolatey Team on our regular monthly stream where we put a spotlight on the most recent Chocolatey product releases. You'll have a chance to have your questions answered in a live Ask Me Anything format.

Learn More

Chocolatey Coding Livestream

Join us for the Chocolatey Coding Livestream, where members of our team dive into the heart of open source development by coding live on various Chocolatey projects. Tune in to witness real-time coding, ask questions, and gain insights into the world of package management. Don't miss this opportunity to engage with our team and contribute to the future of Chocolatey!

Learn More

Calling All Chocolatiers! Whipping Up Windows Automation with Chocolatey Central Management

Webinar from
Wednesday, 17 January 2024

We are delighted to announce the release of Chocolatey Central Management v0.12.0, featuring seamless Deployment Plan creation, time-saving duplications, insightful Group Details, an upgraded Dashboard, bug fixes, user interface polishing, and refined documentation. As an added bonus we'll have members of our Solutions Engineering team on-hand to dive into some interesting ways you can leverage the new features available!

Watch On-Demand
Chocolatey Community Coffee Break

Join the Chocolatey Team as we discuss all things Community, what we do, how you can get involved and answer your Chocolatey questions.

Watch The Replays
Chocolatey and Intune Overview

Webinar Replay from
Wednesday, 30 March 2022

At Chocolatey Software we strive for simple, and teaching others. Let us teach you just how simple it could be to keep your 3rd party applications updated across your devices, all with Intune!

Watch On-Demand
Chocolatey For Business. In Azure. In One Click.

Livestream from
Thursday, 9 June 2022

Join James and Josh to show you how you can get the Chocolatey For Business recommended infrastructure and workflow, created, in Azure, in around 20 minutes.

Watch On-Demand
The Future of Chocolatey CLI

Livestream from
Thursday, 04 August 2022

Join Paul and Gary to hear more about the plans for the Chocolatey CLI in the not so distant future. We'll talk about some cool new features, long term asks from Customers and Community and how you can get involved!

Watch On-Demand
Hacktoberfest Tuesdays 2022

Livestreams from
October 2022

For Hacktoberfest, Chocolatey ran a livestream every Tuesday! Re-watch Cory, James, Gary, and Rain as they share knowledge on how to contribute to open-source projects such as Chocolatey CLI.

Watch On-Demand

Downloads:

247,631

Downloads of v 2.1809.1.20241223:

3,162

Last Update:

23 Dec 2024

Package Maintainer(s):

Software Author(s):

  • Microsoft

Tags:

rsat windows adminpak server features

Remote Server Administration Tools

  • 1
  • 2
  • 3

2.1809.1.20241223 | Updated: 23 Dec 2024

Downloads:

247,631

Downloads of v 2.1809.1.20241223:

3,162

Software Author(s):

  • Microsoft

Remote Server Administration Tools 2.1809.1.20241223

Legal Disclaimer: Neither this package nor Chocolatey Software, Inc. are affiliated with or endorsed by Microsoft. The inclusion of Microsoft trademark(s), if any, upon this webpage is solely to identify Microsoft goods or services and not for commercial purposes.

  • 1
  • 2
  • 3

All Checks are Passing

3 Passing Tests


Validation Testing Passed


Verification Testing Passed

Details

Scan Testing Successful:

No detections found in any package files

Details
Learn More

Deployment Method: Individual Install, Upgrade, & Uninstall

To install Remote Server Administration Tools, run the following command from the command line or from PowerShell:

>

To upgrade Remote Server Administration Tools, run the following command from the command line or from PowerShell:

>

To uninstall Remote Server Administration Tools, run the following command from the command line or from PowerShell:

>

Deployment Method:

NOTE

This applies to both open source and commercial editions of Chocolatey.

1. Enter Your Internal Repository Url

(this should look similar to https://community.chocolatey.org/api/v2/)


2. Setup Your Environment

1. Ensure you are set for organizational deployment

Please see the organizational deployment guide

2. Get the package into your environment

  • Open Source or Commercial:
    • Proxy Repository - Create a proxy nuget repository on Nexus, Artifactory Pro, or a proxy Chocolatey repository on ProGet. Point your upstream to https://community.chocolatey.org/api/v2/. Packages cache on first access automatically. Make sure your choco clients are using your proxy repository as a source and NOT the default community repository. See source command for more information.
    • You can also just download the package and push it to a repository Download

3. Copy Your Script

choco upgrade rsat -y --source="'INTERNAL REPO URL'" [other options]

See options you can pass to upgrade.

See best practices for scripting.

Add this to a PowerShell script or use a Batch script with tools and in places where you are calling directly to Chocolatey. If you are integrating, keep in mind enhanced exit codes.

If you do use a PowerShell script, use the following to ensure bad exit codes are shown as failures:


choco upgrade rsat -y --source="'INTERNAL REPO URL'" 
$exitCode = $LASTEXITCODE

Write-Verbose "Exit code was $exitCode"
$validExitCodes = @(0, 1605, 1614, 1641, 3010)
if ($validExitCodes -contains $exitCode) {
  Exit 0
}

Exit $exitCode

- name: Install rsat
  win_chocolatey:
    name: rsat
    version: '2.1809.1.20241223'
    source: INTERNAL REPO URL
    state: present

See docs at https://docs.ansible.com/ansible/latest/modules/win_chocolatey_module.html.


chocolatey_package 'rsat' do
  action    :install
  source   'INTERNAL REPO URL'
  version  '2.1809.1.20241223'
end

See docs at https://docs.chef.io/resource_chocolatey_package.html.


cChocoPackageInstaller rsat
{
    Name     = "rsat"
    Version  = "2.1809.1.20241223"
    Source   = "INTERNAL REPO URL"
}

Requires cChoco DSC Resource. See docs at https://github.com/chocolatey/cChoco.


package { 'rsat':
  ensure   => '2.1809.1.20241223',
  provider => 'chocolatey',
  source   => 'INTERNAL REPO URL',
}

Requires Puppet Chocolatey Provider module. See docs at https://forge.puppet.com/puppetlabs/chocolatey.


4. If applicable - Chocolatey configuration/installation

See infrastructure management matrix for Chocolatey configuration elements and examples.

Package Approved

This package was approved as a trusted package on 23 Dec 2024.

Description

Remote Server Administration Tools (RSAT) enables IT administrators to remotely manage roles and features in versions of Windows Server since 2008 R2 from a computer that is running Windows 10, Windows 8.1, Windows 8, Windows 7, or Windows Vista.

Notes

  • RSAT will install only on Business, Ultimate, Professional, Education, or Enterprise (or LTSB/LTSC) editions of Windows. You cannot install RSAT on computers that are running Home or Standard editions of Windows.
  • Windows Vista and Windows 7 are no longer supported, the RSAT downloads are unavailable, and this package will fail for those operating system versions.
  • This package will install the latest version of RSAT for the running Windows OS.
Windows 10 pre-1809 (1803, 1607, etc.)
  • Previously, different installers were required for different Windows 10 releases and/or different Server architectures, but Microsoft provides only one installer now. The documentation seems to indicate that it is valid for all pre-1809 releases, but this has not been verified.

Windows 10 release 1809+

With the September 2018 release of Windows, RSAT is no longer a single install nor is it associated with a specific server version. Each of the RSAT features are separately available through Features on Demand. This package should allow for download and installation of some or all of the RSAT features. All the (20+) available RSAT features will be installed unless you choose one or more of the most common features using the following parameters:

  • /AD - Install the Active Directory Management feature.
  • /GP - Install the Group Policy Management feature.
  • /SM - Install the Server Manager feature.
  • /CS - Install the Certificate Services feature.
  • /RD - Install the Remote Desktop Management feature.
  • /FS - Install the File Services Management feature.
  • /DNS - Install the Domain Name Services Management feature.
  • /DHCP - Install the DHCP Management feature.
  • /WSUS - Install the WSUS Management feature.
  • /BL - Install the BitLocker Drive Encryption Administration Utilities feature.

Example: choco install rsat --params '"/AD /GP /DHCP"'

Windows 11

Many enterprise users of Windows 11 have found that the "Features on Demand" method of installing RSAT does not work (Error 0x800f0954). However, the Win10 installer does appear to work for Windows 11. Thus, if this package fails (or claims to have installed despite the 0x800f0954 error) on a Windows 11 system, you can uninstall and then choose to use a /Win10 switch to override the "official" means of installing RSAT on Windows 11. Unlike Features on Demand, you will not be able to select which of the RSAT features you want.

Example: choco install rsate --params '"/Win10"'


tools\chocolateyinstall.ps1
$ErrorActionPreference = 'Stop'

$1809Build = 17763

$osInfo = Get-WmiObject Win32_OperatingSystem | Select-Object Version, ProductType, Caption, OperatingSystemSKU, BuildNumber

Write-host "Detected:  $($osInfo.Caption)" -ForegroundColor Cyan

$osInfo.Version = [version]$osInfo.Version
if ($osInfo.Version -lt [version]'6.0') {
   Throw 'The Remote System Administration Toolkit (RSAT) requires Windows Vista or later.'
}
# OperatingSystemSKU = 175 Windows 10 Enterprise multi-session, see also:
#     https://docs.microsoft.com/en-us/azure/virtual-desktop/configure-automatic-updates#create-a-query-based-collection
elseif ($osInfo.ProductType -ne 1 -and $osInfo.OperatingSystemSKU -ne 175) {
   Write-Warning 'The Remote System Administration Toolkit (RSAT) is built into Windows Server, so no need for an actual install.'
   Return
}
# See here for determining the edition of Windows via SKU:
#   https://superuser.com/questions/1328506/windows-edition-on-non-english-systems
#   https://learn.microsoft.com/en-us/windows/win32/api/sysinfoapi/nf-sysinfoapi-getproductinfo
# The list below are the valid SKUs for Windows editions believed to be capable of RSAT
elseif ((1,4,6,16,27,28,48,49,70,72,84,103,121,122,125,126,129,130,133,161,162,175,188,191) -notcontains ($osInfo.OperatingSystemSKU)) {
   Throw 'The Remote System Administration Toolkit (RSAT) can only install on Professional, Enterprise, or Education editions of Windows.'
}

. "$(Split-Path -Parent $MyInvocation.MyCommand.Definition)\helpers.ps1"
$Features = Get-ProcessorFeatures
if ($Features.'ARM_V8_INSTRUCTIONS') {
   Throw 'The Remote System Administration Toolkit (RSAT) does not work on ARM processors at this time.'
}

$pp = Get-PackageParameters

$web = New-Object Net.WebClient
if ($osInfo.Version.Major -eq 6) {
   switch ($osInfo.Version.Minor) {
      0 { # Vista
            Throw "$($osInfo.Caption) is not supported."}
      1 { # Win7
            Throw "$($osInfo.Caption) is not supported."}
      2 { # Win8
            $html = $web.DownloadString('https://www.microsoft.com/download/confirmation.aspx?id=28972') 
            $Checksum = '050aefe2568de7e9e28d75c6752a8287cbbb0f2a0f2be5dd0e0c75ba29aff941'
            $Checksum64 = '9799352c104d56a3bb7e5f931dadb4aa3361fce3d41be23699787a23347f207a' }
      3 { # Win8.1
            $html = $web.DownloadString('https://www.microsoft.com/download/confirmation.aspx?id=39296') 
            $Checksum = 'eb62cfabdc0c3231a1ba2d5310f4ff1daf6294b89b143cc10b255becb1da5b75'
            $Checksum64 = 'dea5540a59e018e04e088afb2aa326fb690d27a983fd3cbffefbfcfdde20a47d' }
   }
} elseif ($osInfo.Version.Major -eq 10) { # Windows 10
   if (($osInfo.BuildNumber -lt $1809Build) -or ($pp.Win10)) {
      # Documentation indicates that these work for all pre-1809 Win10 releases
      $Checksum = '99ed8359fcd5927cb4dd1ff83ce909bda87c12c4092cf81b121853e5ca8dd7ec'
      $Checksum64 = 'c01b90a7b79a4d5ac4ad89b404368e9053657d8e86bcbd60ee69fa1a6bc402c7'

      $html = $web.DownloadString('https://www.microsoft.com/en-us/download/details.aspx?id=45520')
      if ($pp.Win10) {
         Write-Host 'You have requested to install the last Win10 download regardless of Windows version.' -ForegroundColor Cyan
      } else {
         Write-Host "Installing tools for managing Windows prior to 1809 release." -ForegroundColor Cyan
      }
   }
}


If (($osInfo.Version.Major -ne 10) -or ($osInfo.BuildNumber -lt $1809Build) -or ($pp.Win10)) {
   $urls = select-string '"https[^"]*msu"' -input $html -AllMatches |
   ForEach-Object {$_.matches} | 
   ForEach-Object {$_.value.trim('"')} |
   Select-Object -unique

   $url        = $urls | where-Object {$_ -match 'x86' }
   $url64      = $urls | where-Object {$_ -match 'x64' }

   $packageArgs = @{
      PackageName   = $env:ChocolateyPackageName
      FileType      = 'msu'
      Url           = $url
      Url64bit      = $url64
      Checksum      = $Checksum
      Checksum64    = $Checksum64
      ChecksumType  = 'sha256'
      SilentArgs    = '/quiet /norestart'
      ValidExitCodes= @(0,3010,-2146233087,2359302)
   }
   Install-ChocolateyPackage @packageArgs

} else {
   # Based on https://github.com/imabdk/Powershell/blob/master/Install-RSATv1809v1903v1909v2004v20H2.ps1
   $WSUSKey = 'HKLM:\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU'
   if (Test-Path $WSUSKey) {
      Write-Verbose 'Saving UseWUServer value and temporarily disabling WSUS.'
      $Save = (Get-ItemProperty -Path $WSUSKey -Name 'UseWUServer' -ErrorAction SilentlyContinue).UseWUServer
      Set-ItemProperty -Path $WSUSKey -Name 'UseWUServer' -Value 0
      Restart-Service wuauserv
   }

   $WhereArray = @()
   if ($pp.AD) {$WhereArray += '($_.Name -like "Rsat.ActiveDirectory*")'}
   if ($pp.GP) {$WhereArray += '($_.Name -like "Rsat.GroupPolicy*")'}
   if ($pp.SM) {$WhereArray += '($_.Name -like "Rsat.ServerManager*")'}
   if ($pp.CS) {$WhereArray += '($_.Name -like "Rsat.CertificateServices*")'}
   if ($pp.RD) {$WhereArray += '($_.Name -like "Rsat.RemoteDesktop*")'}
   if ($pp.FS) {$WhereArray += '($_.Name -like "Rsat.FileServices*")'}
   if ($pp.DNS) {$WhereArray += '($_.Name -like "Rsat.DNS*")'}
   if ($pp.DHCP) {$WhereArray += '($_.Name -like "Rsat.DHCP*")'}
   if ($pp.WSUS) {$WhereArray += '($_.Name -like "Rsat.WSUS*")'}
   if ($pp.BL) {$WhereArray += '($_.Name -like "Rsat.BitLocker*")'} 

   if ($WhereArray.count -eq 0) {
      $WhereArray += '$_.Name -like "Rsat*"'
   }
   $WhereString = '$_.State -eq "NotPresent" -AND (' + ($WhereArray -join ' -OR ') + ')'

   $Tools = Get-WindowsCapability -Online | Where-Object $([scriptblock]::Create($WhereString))
   foreach ($Item in $Tools) {
      try {
         Write-Host "`nAdding $($Item.Name) to Windows"
         $DISMobject = Add-WindowsCapability -Online -Name $Item.Name
         if ($DISMobject.RestartNeeded) {
            Write-Warning 'A reboot is required.'
         }
      }
      catch { Write-Warning -Message $_.Exception.Message; break }
   }
   Write-Host "`n"
   Write-Verbose "Windows Feature install log is at $($DISMobject.LogPath)"

   if (Test-Path $WSUSKey) {
      If ($Save -ne $null) {
         Write-Verbose 'Restoring UseWUServer value and re-enabling WSUS.'
         Set-ItemProperty -Path $WSUSKey -Name 'UseWUServer' -Value $Save
      } else {
         Remove-ItemProperty -Path $WSUSKey -Name 'UseWUServer' -Force
      }
      Restart-Service wuauserv
   }
}
tools\chocolateyuninstall.ps1
$ErrorActionPreference = 'Stop'

$osInfo = Get-WmiObject Win32_OperatingSystem | Select-Object Version, ProductType, Caption, OperatingSystemSKU, BuildNumber
$osInfo.Version = [version]$osInfo.Version

if ($osInfo.ProductType -ne 1) {
   Write-Warning 'The Remote System Administration Toolkit (RSAT) is built into Windows Server, so it cannot be uninstalled.'
   Return
} 

If (($osInfo.Version.Major -ne 10) -or ($osInfo.BuildNumber -lt 17763)) {
   $packages = & "$env:windir\system32\dism.exe" /online /get-packages | 
                  Select-String -Pattern 'rsat|RemoteServerAdministrationTools' -AllMatches | 
                  ForEach-Object {$_.line.split(':')[-1].trim()}

   foreach ($package in $packages) {
      & "$env:windir\system32\dism.exe" /Online /Remove-Package /NoRestart /PackageName:$package
      if ($LASTEXITCODE) {
         throw "Error $LASTEXITCODE trying to remove $package`nYou may need to reboot first."
      }
   }
} else {
   # Apparently, some features must be removed after others.
   $WhereArray = @()
   $WhereArray += '($_.Name -notlike "Rsat.ActiveDirectory*")'
   $WhereArray += '($_.Name -notlike "Rsat.GroupPolicy*")'
   $WhereArray += '($_.Name -notlike "Rsat.ServerManager*")'

   $WhereString = '($_.Name -like "Rsat*") -AND ($_.State -eq "Installed") -AND ' + ($WhereArray -join ' -AND ')

   $Installed = Get-WindowsCapability -Online | Where-Object $([scriptblock]::Create($WhereString))

   foreach ($Item in $Installed) {
      try {
         Write-Host "`nRemoving $($Item.Name) from Windows"
         $DISMobject = Remove-WindowsCapability -Online -Name $Item.Name
         if ($DISMobject.RestartNeeded) {
            Write-Warning "A reboot is required."
         }
      } catch {
         Write-Warning -Message $_.Exception.Message; break
      }
   }

   # Go back and remove the rest.
   $Installed = Get-WindowsCapability -Online | Where-Object {$_.Name -like 'Rsat*' -AND $_.State -eq 'Installed'}

   foreach ($Item in $Installed) {
      try {
         Write-Host "`nRemoving $($Item.Name) from Windows"
         $DISMobject = Remove-WindowsCapability -Online -Name $Item.Name
         if ($DISMobject.RestartNeeded) {
            Write-Warning "A reboot is required."
         }
      } catch {
         Write-Warning -Message $_.Exception.Message; break
      }
   }
}

Write-Warning 'It is recommended that you restart the computer.'
tools\helpers.ps1
Function Get-ProcessorFeatures() {
   # This is available separately with more info here:
   #    https://github.com/teknowledgist/TeknowTools/tree/master/Get-ProcessorFeatures

   # https://www.p-invoke.net/kernel32/isprocessorfeaturepresent
   $Signature = @'
   [DllImport("Kernel32.dll")][return: MarshalAs(UnmanagedType.Bool)]
   public static extern bool IsProcessorFeaturePresent(
      uint ProcessorFeature
   );
'@

   $type = Add-Type -MemberDefinition $Signature -Name Win32Utils -Namespace GetProcessorFeatures -PassThru
   
   # https://learn.microsoft.com/en-us/windows/win32/api/processthreadsapi/nf-processthreadsapi-isprocessorfeaturepresent
   $FeatureIDs = [ordered]@{
      '0' = 'FLOATING_POINT_PRECISION_ERRATA' #On a Pentium, a floating-point precision error can occur in rare circumstances.   
      '1' = 'FLOATING_POINT_EMULATED' #Floating-point operations are emulated using a software emulator.   
      '2' = 'COMPARE_EXCHANGE_DOUBLE' #The atomic compare and exchange operation (cmpxchg) is available.   
      '3' = 'MMX_INSTRUCTIONS' #The MMX instruction set is available.   
      '6' = 'XMMI_INSTRUCTIONS' #The SSE instruction set is available.   
      '7' = '3DNOW_INSTRUCTIONS' #The 3D-Now instruction set is available.   
      '8' = 'RDTSC_INSTRUCTION' #The RDTSC instruction is available.   
      '9' = 'PAE_ENABLED' #The processor is Physical Address Extension (PAE)-enabled. All x64 processors always return a nonzero value for this feature.    
      '10' = 'XMMI64_INSTRUCTIONS' #The SSE2 instruction set is available. Windows�2000: Not supported.    
      '12' = 'NX_ENABLED' #Data execution prevention is enabled.  Windows�XP/2000: Not supported.    
      '13' = 'SSE3_INSTRUCTIONS' #The SSE3 instruction set is available. Windows Server�2003 and Windows�XP/2000: Not supported.    
      '14' = 'COMPARE_EXCHANGE128' #The  atomic compare and exchange 128-bit operation (cmpxchg16b) is available. Windows Server�2003 and Windows�XP/2000: Not supported.    
      '15' = 'COMPARE64_EXCHANGE128' #The atomic compare 64 and exchange 128-bit operation (cmp8xchg16) is available. Windows Server�2003 and Windows�XP/2000: Not supported.    
      '16' = 'CHANNELS_ENABLED' #The processor channels are enabled.   
      '17' = 'XSAVE_ENABLED' #The processor implements the XSAVE and XRSTOR instructions. Windows Server�2003/2008, Windows�2000/XP/Vista: Not supported.    
      '18' = 'ARM_VFP_32_REGISTERS' #The VFP/Neon: 32 x 64bit register bank is present. This flag has the same meaning as PF_ARM_VFP_EXTENDED_REGISTERS .   
      '20' = 'SECOND_LEVEL_ADDRESS_TRANSLATION' #Second Level Address Translation is supported by the hardware.   
      '21' = 'VIRT_FIRMWARE_ENABLED' #Virtualization is enabled in the firmware and made available by the operating system.   
      '22' = 'RDWRFSGSBASE' #RDFSBASE, RDGSBASE, WRFSBASE, and WRGSBASE instructions are available.   
      '23' = 'FASTFAIL' #_fastfail() is available.   
      '24' = 'ARM_DIVIDE_INSTRUCTION' #The divide instructions are available.   
      '25' = 'ARM_64BIT_LOADSTORE_ATOMIC' #The 64-bit load/store atomic instructions are available.   
      '26' = 'ARM_EXTERNAL_CACHE' #The external cache is available.   
      '27' = 'ARM_FMAC_INSTRUCTIONS' #The floating-point multiply-accumulate instruction is available.   
      '29' = 'ARM_V8_INSTRUCTIONS' #This Arm processor implements the Arm v8 instructions set.   
      '30' = 'ARM_V8_CRYPTO_INSTRUCTIONS' #This Arm processor implements the Arm v8 extra cryptographic instructions (for example, AES, SHA1 and SHA2).   
      '31' = 'ARM_V8_CRC32_INSTRUCTIONS' #This Arm processor implements the Arm v8 extra CRC32 instructions.   
      '34' = 'ARM_V81_ATOMIC_INSTRUCTIONS' #This Arm processor implements the Arm v8.1 atomic instructions (for example, CAS, SWP).   
      '36' = 'SSSE3_INSTRUCTIONS' #The SSSE3 instruction set is available.   
      '37' = 'SSE4_1_INSTRUCTIONS' #The SSE4_1 instruction set is available.   
      '38' = 'SSE4_2_INSTRUCTIONS' #The SSE4_2 instruction set is available.   
      '39' = 'AVX_INSTRUCTIONS' #The AVX instruction set is available.   
      '40' = 'AVX2_INSTRUCTIONS' #The AVX2 instruction set is available.   
      '41' = 'AVX512F_INSTRUCTIONS' #The AVX512F instruction set is available.   
      '43' = 'ARM_V82_DP_INSTRUCTIONS' #This Arm processor implements the Arm v8.2 DP instructions (for example, SDOT, UDOT). This feature is optional in Arm v8.2 implementations and mandatory in Arm v8.4 implementations.   
      '44' = 'ARM_V83_JSCVT_INSTRUCTIONS' #This Arm processor implements the Arm v8.3 JSCVT instructions (for example, FJCVTZS).   
      '45' = 'ARM_V83_LRCPC_INSTRUCTIONS' #This Arm processor implements the Arm v8.3 LRCPC instructions (for example, LDAPR). Note that certain Arm v8.2 CPUs may optionally support the LRCPC instructions.   
   }

   $Features = @{}
   Foreach ($ID in $FeatureIDs.keys) {
      $Features.Add($FeatureIDs["$ID"],$type::IsProcessorFeaturePresent($ID))
   }
   [PSCustomObject]$Features

}




Log in or click on link to see number of positives.

In cases where actual malware is found, the packages are subject to removal. Software sometimes has false positives. Moderators do not necessarily validate the safety of the underlying software, only that a package retrieves software from the official distribution point and/or validate embedded software against official distribution point (where distribution rights allow redistribution).

Chocolatey Pro provides runtime protection from possible malware.

Add to Builder Version Downloads Last Updated Status
Remote Server Administration Tools 2.1809.1.20241220 958 Friday, December 20, 2024 Approved
Remote Server Administration Tools 2.1809.1.20240710 11548 Wednesday, July 10, 2024 Approved
Remote Server Administration Tools 2.1809.0.20210815 91910 Sunday, August 15, 2021 Approved
Remote Server Administration Tools 2.1809.0.20210804 3157 Wednesday, August 4, 2021 Approved
Remote Server Administration Tools 2.1809.0.20210707 5871 Wednesday, July 7, 2021 Approved
Remote Server Administration Tools 2.1809.0.20200703 39909 Friday, July 3, 2020 Approved
Remote Server Administration Tools 2.1809.0.20200528 5165 Thursday, May 28, 2020 Approved
Remote Server Administration Tools 2.1809.0.20190205 45893 Wednesday, February 6, 2019 Approved
Remote Server Administration Tools 2.1809.0.20190111 1100 Monday, January 28, 2019 Approved
Remote Server Administration Tools 2.1809 3306 Wednesday, December 12, 2018 Approved
Remote Server Administration Tools 2.1803.0.201806011 6857 Monday, June 11, 2018 Approved
Remote Server Administration Tools 2.1803.0.20180604 1414 Monday, June 4, 2018 Approved
Remote Server Administration Tools 2.1803.0.20180601 608 Friday, June 1, 2018 Approved
Remote Server Administration Tools 2.1803 862 Thursday, May 31, 2018 Approved
rsat (Install) 2.1 14204 Monday, November 13, 2017 Approved
rsat (Install) 2.0 2278 Tuesday, August 29, 2017 Approved

This package has no dependencies.

Discussion for the Remote Server Administration Tools Package

Ground Rules:

  • This discussion is only about Remote Server Administration Tools and the Remote Server Administration Tools package. If you have feedback for Chocolatey, please contact the Google Group.
  • This discussion will carry over multiple versions. If you have a comment about a particular version, please note that in your comments.
  • The maintainers of this Chocolatey Package will be notified about new comments that are posted to this Disqus thread, however, it is NOT a guarantee that you will get a response. If you do not hear back from the maintainers after posting a message below, please follow up by using the link on the left side of this page or follow this link to contact maintainers. If you still hear nothing back, please follow the package triage process.
  • Tell us what you love about the package or Remote Server Administration Tools, or tell us what needs improvement.
  • Share your experiences with the package, or extra configuration or gotchas that you've found.
  • If you use a url, the comment will be flagged for moderation until you've been whitelisted. Disqus moderated comments are approved on a weekly schedule if not sooner. It could take between 1-5 days for your comment to show up.
comments powered by Disqus