<?xml version="1.0" encoding="utf-8"?>
<!-- generator="" -->
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Windows Servers</title>
		<description><![CDATA[Leading Network Security & Cyber Security site. Cisco Routing/Switching, VPN, Microsoft, SASE, SSE, F5, PaloAlto Firewalls, Protocol Analysis, Tips & more.]]></description>
		<link>https://www.firewall.cx/operating-systems/microsoft/windows-servers.html</link>
		<lastBuildDate>Sat, 11 Apr 2026 12:44:46 +1000</lastBuildDate>
		<generator></generator>
		<atom:link rel="self" type="application/rss+xml" href="https://www.firewall.cx/operating-systems/microsoft/windows-servers.feed?type=rss"/>
		<language>en-gb</language>
		<item>
			<title>Deploying Active Directory &amp; DNS Services on Windows Server 2022 &amp; Elevating it to Domain Controller Role</title>
			<link>https://www.firewall.cx/operating-systems/microsoft/windows-servers/deploying-ad-and-dns-windows-server-2022-elevating-to-domain-controller-role.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/operating-systems/microsoft/windows-servers/deploying-ad-and-dns-windows-server-2022-elevating-to-domain-controller-role.html</guid>
			<description><![CDATA[<p><img src="https://www.firewall.cx//images/stories/windows-servers/windows-server-2022-ad-dns-deployment/intro-windows-server-2022-ad-dns.webp" alt="Windows Server 2022 AD and DNS Deployment" width="503" height="329" loading="lazy"></p><p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/windows-servers/windows-server-2022-ad-dns-deployment/intro-windows-server-2022-ad-dns.webp" alt="intro windows server 2022 ad dns" width="300" height="196" style="margin: 7px; float: left;" />This article provides a comprehensive guide to <strong>deploying Active Directory</strong> and <strong>DNS Services</strong> on <strong>Windows Server 2022</strong>, encompassing the <strong>Essential</strong>, <strong>Standard</strong>, and <strong>Datacenter</strong> editions. Our guide also includes step-by-step instructions for <strong>promoting the Windows server to a Domain Controller (DC)</strong>. To enhance user experience, we've included plenty of helpful screenshots, ensuring a smooth and uncomplicated installation process.</p>
<p>&nbsp;</p>
<p><strong>Key Topics</strong></p>
<ul>
<li><a href="https://www.firewall.cx/operating-systems/microsoft/windows-servers/deploying-ad-and-dns-windows-server-2022-elevating-to-domain-controller-role.html#installation-of-ad-dns-service" title="Installation of Active Directory and DNS Services">Installation of Active Directory and DNS Services</a></li>
<li><a href="https://www.firewall.cx/operating-systems/microsoft/windows-servers/deploying-ad-and-dns-windows-server-2022-elevating-to-domain-controller-role.html#promoting-server-to-dc" title="Promoting the Windows server to a Domain Controller">Promoting the Windows server to a Domain Controller</a></li>
<li><a href="https://www.firewall.cx/operating-systems/microsoft/windows-servers/deploying-ad-and-dns-windows-server-2022-elevating-to-domain-controller-role.html#summary" title="summary">Summary</a></li>
</ul>
<p class="box-info" style="text-align: justify;">Explore our <a href="https://www.firewall.cx/operating-systems/microsoft/windows-servers.html" target="_blank" title="Window Server articles">dedicated section on Windows Servers</a> for a rich collection of articles providing in-depth coverage and insights into various aspects of Windows Server functionality.</p>
<h2><a id="installation-of-ad-dns-service">Installation of Active Directory and DNS Services</a></h2>
<p>To begin, in <strong>Server Manager</strong>, select <strong>Dashboard</strong> from the left pane, then <strong>Add roles and features</strong> from the right pane:</p>
]]></description>
			<category>Windows Servers</category>
			<pubDate>Fri, 24 Nov 2023 12:38:23 +1100</pubDate>
		</item>
		<item>
			<title>How to Enable ‘Web Server’ Certificate Template Option on Windows Certification Authority (CA) Server</title>
			<link>https://www.firewall.cx/operating-systems/microsoft/windows-servers/how-to-enaable-webserver-certificate-template.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/operating-systems/microsoft/windows-servers/how-to-enaable-webserver-certificate-template.html</guid>
			<description><![CDATA[<p style="text-align: justify;">In this article we will show you<strong> how to enable</strong> the ‘<strong>Web Server’</strong> <strong>certificate template</strong> option on a <strong>Windows Certification Authority</strong> (<strong>Windows CA</strong>) <strong>Server</strong>.&nbsp; The <strong>Web Server</strong> option is usually not present in a fresh <a href="https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-server-2016-certification-authority-installation-configuration.html" target="_blank" id="Windows CA server installation" title="Windows CA server installation"><strong>Windows CA server installation</strong> <strong>installation</strong></a> which can introduce difficulties for users or administrators who need the option to get their <strong>web server certificates signed</strong>:</p>
<p><img src="https://www.firewall.cx/images/stories/windows-server-2016/windows-ca-enable-webserver-certificate-template/windows-ca-web-server-certificate-template-missing.png" alt="windows ca web server certificate template missing" id="windows ca web server certificate template missing" style="margin: 7px auto; display: block; border: 1px solid #000000;" title="windows ca web server certificate template missing" /></p>
<p class="box-info">Recommended Article: <a href="https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-server-2016-certification-authority-installation-configuration.html" target="_blank" title="How to install and configure a Windows CA Server">How to install and configure a Windows CA Server</a></p>
<p style="text-align: justify;"><strong>Enabling</strong> the <strong>Web Server certificate template</strong> is a simple and <strong>non-disruptive process</strong>. From the <strong>Administrative Tools</strong>, open the <strong>Certification Authority</strong> tool. Next, <strong>right-click</strong> on the <strong>Certificate Templates</strong> folder and select <strong>Manage</strong>:</p>
<p><img src="https://www.firewall.cx/images/stories/windows-server-2016/windows-ca-enable-webserver-certificate-template/windows-ca-certificate-templates.png" alt="windows ca certificate templates" id="windows ca certificate templates" style="margin: 7px auto; border: 1px solid #000000; display: block;" title="windows ca certificate templates" /></p>
<p style="text-align: left;">This will open the <strong>Certificate Templates Console</strong> as shown below.&nbsp; <strong>Double-click</strong> on the <strong>Web Server </strong>template:</p>
<p><img src="https://www.firewall.cx/images/stories/windows-server-2016/windows-ca-enable-webserver-certificate-template/windows-ca-certificate-templates-console.png" alt="windows ca certificate templates console" id="windows ca certificate templates console" style="margin: 7px auto; border: 1px solid #000000; display: block;" title="windows ca certificate templates console" /></p>
<p style="text-align: justify;">The <strong>Web Server Properties</strong> window will now appear. <strong>Click </strong>on the <strong>Security tab</strong> and select the <strong>Authenticated Users</strong> from the <strong>Group or user names</strong> section.&nbsp; In the <strong>Permissions for Authenticated Users</strong> section <strong>tick</strong> the <strong>Allow</strong> action for the <strong>Enroll</strong> permission. When ready, <strong>click</strong> on <strong>OK</strong>:</p>
<p><img src="https://www.firewall.cx/images/stories/windows-server-2016/windows-ca-enable-webserver-certificate-template/windows-ca-web-server-properties.png" alt="windows ca web server properties" id="windows ca web server properties" style="margin: 7px auto; border: 1px solid #000000; display: block;" title="windows ca web server properties" /></p>
<p style="text-align: justify;">Congratulations - you’ve now successfully <strong>enabled</strong> the <strong>Web Server certificate template</strong> option. Your <strong>Windows CA server</strong> should now present the previously mission option as shown below:</p>
<p><img src="https://www.firewall.cx/images/stories/windows-server-2016/windows-ca-enable-webserver-certificate-template/windows-ca-web-server-certificate-template-enabled.png" alt="windows ca web server certificate template enabled" id="windows ca web server certificate template enabled" style="margin: 7px auto; border: 1px solid #000000; display: block;" title="windows ca web server certificate template enabled" /></p>
<h2 style="text-align: left;">Summary</h2>
<p style="text-align: justify;">This article explained <strong>how to enable</strong> the <strong>Web Server certificate template</strong> option on your <strong>Windows Certification Authority</strong> (<strong>Windows CA</strong>) <strong>Server</strong>. We included step-by-step screenshots to ensure its a detailed and yet simple process to follow.</p>]]></description>
			<category>Windows Servers</category>
			<pubDate>Mon, 22 Jun 2020 14:38:49 +1000</pubDate>
		</item>
		<item>
			<title>How to Install and Configure SNMP for Windows Server 2016</title>
			<link>https://www.firewall.cx/operating-systems/microsoft/windows-servers/install-and-configure-snmp-for-windows-server-2016.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/operating-systems/microsoft/windows-servers/install-and-configure-snmp-for-windows-server-2016.html</guid>
			<description><![CDATA[<p style="text-align: justify;"><strong>Simple Network Management Protocol</strong> (<strong>SNMP</strong>) is a <a href="https://www.firewall.cx/networking/network-protocols/tcp-udp-protocol.html" target="_blank" title="TCP Protocol">UDP protocol</a> that uses <strong>port 161</strong> to <strong>monitor</strong> and <strong>collect detailed information</strong> on any network device supporting the SNMP protocol. All <strong>Windows servers </strong>support <strong>SNMP</strong> and we’ll show you <strong>how to easily install and configure SNMP</strong> on your <strong>Windows 2016 or 2012 server</strong>, including <strong>Read Only</strong> (<strong>RO</strong>) or <strong>Read Write</strong> (<strong>RW</strong>) SNMP <strong>community string</strong>.</p>
<p style="text-align: justify;">In our example we will <strong>enable</strong> the <strong>SNMP agent</strong> and <strong>configure</strong> a <strong>SNMP community string</strong> to allow our <a href="https://clixtrac.com/goto/?225545" target="_blank" rel="nofollow noopener" title="Network Monitoring System"><strong>Network Monitoring System</strong></a> (NMS) monitor our server resources.</p>
<p class="box-info" style="text-align: justify;"><strong>Execution Time:</strong> 10 minutes</p>
<h2 style="text-align: left;">Step 1 – Install SNMP on Windows Server 2016</h2>
<p style="text-align: justify;"><strong>Open</strong> the <strong>Control Panel</strong> on your Windows Server and <strong>Double-click</strong> on the <strong>Program and Features</strong> icon:</p>
<p><img src="https://www.firewall.cx/images/stories/windows-server-2016/install-configure-snmp-service/windows-server-turn-features-on-off.png" alt="windows server turn features on off" id="windows-server-turn-features-on-off" style="margin: 7px auto; border: 1px solid #000000; display: block;" title="windows-server-turn-features-on-off" /></p>
<p style="text-align: justify;">This will open the <strong>Add Roles and Features Wizard</strong>. Keep <strong>clicking</strong> on the <strong>Next</strong> button until you reach the <strong>Features</strong> section. From there, select the <strong>SNMP Service</strong> option:</p>
<p><img src="https://www.firewall.cx/images/stories/windows-server-2016/install-configure-snmp-service/windows-server-snmp-service-installation.png" alt="windows server snmp service installation" id="windows-server-snmp-service-installation" style="margin: 7px auto; border: 1px solid #000000; display: block;" title="windows-server-snmp-service-installation" /></p>
<p style="text-align: justify;">When prompted, <strong>click</strong> on the <strong>Add Features</strong> button to include the installation of <strong>the Administration SNMP Tools</strong>:</p>
<p><img src="https://www.firewall.cx/images/stories/windows-server-2016/install-configure-snmp-service/windows-server-additional-snmp-tools.png" alt="windows server additional snmp tools" id="windows-server-additional-snmp-tools" style="margin: 7px auto; border: 1px solid #000000; display: block;" title="windows-server-additional-snmp-tools" /></p>
<p style="text-align: justify;">Optionally you can include the <strong>SNMP WMI Provider</strong> option located under the <strong>SNMP Service</strong>. When ready <strong>click</strong> on the <strong>Next</strong> button.</p>
<p style="text-align: justify;">This is the final screen – simply <strong>click</strong> on the <strong>Install</strong> button. Ensure the <span style="color: #000000;">“<em>Restart the destination server automatically if required</em>”</span> option is <strong>not</strong> selected:</p>
<p><img src="https://www.firewall.cx/images/stories/windows-server-2016/install-configure-snmp-service/windows-server-snmp-installation-confirmation.png" alt="windows server snmp installation confirmation" id="windows-server-snmp-installation-confirmation" style="display: block; margin: 7px auto; border: 1px solid #000000;" title="windows-server-snmp-installation-confirmation" /></p>
<p style="text-align: justify;">The <strong>SNMP Service</strong> will now be installed on your <strong>Windows 2016 Server</strong>. This process will require around <strong>3 minutes</strong> to complete. When done, <strong>click</strong> on the <strong>Close</strong> button to <strong>exit</strong> the installation wizard: <img src="https://www.firewall.cx/images/stories/windows-server-2016/install-configure-snmp-service/windows-server-snmp-installation-complete.png" alt="windows server snmp installation complete" id="windows-server-snmp-installation-complete" style="margin: 7px auto; border: 1px solid #000000; display: block;" title="windows-server-snmp-installation-complete" /></p>
<h2 style="text-align: left;">Step 2 – Configure SNMP Service &amp; Read-Only or Read-Write Community String</h2>
<p style="text-align: justify;"><strong>Configuring</strong> the <strong>Windows 2016 Server SNMP Service</strong> is a simple task. As an <strong>administrator</strong>, run <strong>services.msc</strong> or open the <strong>Services console</strong> from the <strong>Administrative Tools</strong>. <strong>Double-click</strong> the <strong>SNMP Service</strong> and go to the <strong>Security</strong> tab:</p>
<p><img src="https://www.firewall.cx/images/stories/windows-server-2016/install-configure-snmp-service/windows-server-snmp-service-configuration-1.png" alt="windows server snmp service configuration 1" id="windows-server-snmp-service-configuration-1" style="margin: 7px auto; border: 1px solid #000000; display: block;" title="windows-server-snmp-service-configuration-1" /></p>
<p style="text-align: justify;">To add a <strong>Read-Only</strong> community string, <strong>click</strong> on the <strong>Add button</strong> under the <strong>Accepted community names</strong>. Enter the desirable <strong>Community Name</strong> and set the <strong>Community rights</strong> to <strong>READ ONLY</strong>. When done, <strong>click</strong> on the <strong>Add</strong> button:</p>
<p><img src="https://www.firewall.cx/images/stories/windows-server-2016/install-configure-snmp-service/windows-server-snmp-service-configuration-2.png" alt="windows server snmp service configuration 2" id="windows-server-snmp-service-configuration-2" style="margin: 7px auto; border: 1px solid #000000; display: block;" title="windows-server-snmp-service-configuration-2" /></p>
<p style="text-align: justify;">Next, in the lower section of the window, <strong>click</strong> on the <strong>Add</strong> button and insert the IP address which will be allowed to poll this server via <strong>SNMP</strong>. This would be the IP address of your <a href="https://clixtrac.com/goto/?225545" target="_blank" rel="nofollow noopener" title="Network Monitoring Service"><strong>Network Monitoring Service</strong></a>. In our environment our NMS is 192.168.5.25. When done, <strong>click</strong> on <strong>Apply</strong> then the <strong>OK</strong> button:</p>
<p><img src="https://www.firewall.cx/images/stories/windows-server-2016/install-configure-snmp-service/windows-server-snmp-service-configuration-3.png" alt="windows server snmp service configuration 3" id="windows-server-snmp-service-configuration-3" style="margin: 7px auto; border: 1px solid #000000; display: block;" title="windows-server-snmp-service-configuration-3" /></p>
<p style="text-align: justify;">To confirm SNMP is working correctly, we configured our NMS to query and retrieve information from our server every 5 minutes. After a while we were able to see useful information populating our NMS:</p>
<p><img src="https://www.firewall.cx/images/stories/windows-server-2016/install-configure-snmp-service/windows-server-snmp-monitoring-1.png" alt="windows server snmp resource monitoring" title="windows server snmp resource monitoring" /></p>
<p>Depending on your <a href="https://clixtrac.com/goto/?225545" target="_blank" rel="nofollow noopener" title="Network Monitoring system"><strong>Network Monitoring System</strong></a> you'll be able to obtain detailed information on your server's status and state of its resources:</p>
<p><img src="https://www.firewall.cx/images/stories/windows-server-2016/install-configure-snmp-service/windows-server-snmp-monitoring-2.png" alt="windows server snmp resource monitoring" title="windows server snmp resource monitoring" /></p>
<h2 style="text-align: justify;">Summary</h2>
<p style="text-align: justify;">This article briefly explained the <strong>purpose of SNMP</strong> and how it can be used to monitor network devices and collect useful information such as <strong>CPU</strong>, <strong>RAM</strong> and <strong>Disk usage</strong>, <strong>processes running</strong>, <strong>host uptime</strong> and much more. We also showed <strong>how to install and configure the SNMP Service</strong> for <strong>Windows Server 2016</strong>. For more <strong>technical Windows articles</strong>, please visit our&nbsp;<a href="https://www.firewall.cx/operating-systems/microsoft/windows-servers.html" title="Windows Server section">Windows Server section</a>.</p>]]></description>
			<category>Windows Servers</category>
			<pubDate>Fri, 08 May 2020 11:36:15 +1000</pubDate>
		</item>
		<item>
			<title>Simple Guide on Installing &amp; Configuring a Windows 2016 Certification Authority Server</title>
			<link>https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-server-2016-certification-authority-installation-configuration.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-server-2016-certification-authority-installation-configuration.html</guid>
			<description><![CDATA[<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/windows-server-2016/certification-authority-server-installation/windows-ca-server.png" alt="windows ca server" id="windows-ca-server" style="margin-top: 7px; margin-bottom: 7px; float: left;" title="windows-ca-server" />A <strong>Windows Active Directory Certification Authority server</strong> (<strong>AD CA</strong>), also known as a <strong>Certificate Authority</strong>, is an essential service to every organization’s Active Directory as it can <strong>manage</strong>, <strong>issue</strong>, <strong>revoke</strong> and <strong>renew digital certificates</strong> used to verify the identity of users, computers and other network services.</p>
<p style="text-align: justify;">This guide will show you how to quickly <strong>install</strong> and <strong>setup</strong> a <strong>Certification Authority server</strong> on <strong>Windows 2016 server</strong>. The guide includes the <strong>installation</strong> of the <strong>Certification Authority Web Enrollment</strong> service to allow your organization to request, renew and download certificates via a simple web interface.</p>
<p class="box-info" style="text-align: justify;"><strong>Execution Time</strong>: 10 - 15 minutes</p>
<h2 style="text-align: left;">Step 1 – Installation of Windows Active Directory Certificate Services</h2>
<p style="text-align: justify;">Launch <strong>Server Manager</strong> and go to <strong>Manage &gt; Add Roles and Features</strong>:</p>
<p><img src="https://www.firewall.cx/images/stories/windows-server-2016/certification-authority-server-installation/windows-ca-server-installation-server-manager.png" alt="windows ca server installation server manager" id="windows-ca-server-installation-server-manager" style="display: block; margin: 7px auto; border: 1px solid #000000;" title="windows-ca-server-installation-server-manager" /></p>
<p style="text-align: justify;">&nbsp;At the next screen select simply click on the <strong>Next</strong> button:</p>
<p><img src="https://www.firewall.cx/images/stories/windows-server-2016/certification-authority-server-installation/windows-ca-server-installation-add-roles-features.png" alt="windows ca server installation add roles features" id="windows-ca-server-installation-add-roles-features" style="margin: 7px auto; border: 1px solid #000000; display: block;" title="windows-ca-server-installation-add-roles-features" /></p>
<p style="text-align: justify;">&nbsp;Ensure <strong>Role-based or feature-based installation</strong> is selected and <strong>click</strong> on <strong>Next</strong>:</p>
<p><img src="https://www.firewall.cx/images/stories/windows-server-2016/certification-authority-server-installation/windows-ca-server-installation-select-destination-server.png" alt="windows ca server installation select destination server" id="windows-ca-server-installation-select-destination-server" style="margin: 7px auto; display: block; border: 1px solid #000000;" title="windows-ca-server-installation-select-destination-server" /></p>
<p style="text-align: justify;">&nbsp;At the next screen select the <strong>destination server</strong> from the available <strong>Server Pool </strong>and<strong> click </strong>on the<strong> Next </strong>button:</p>
<p><img src="https://www.firewall.cx/images/stories/windows-server-2016/certification-authority-server-installation/windows-ca-server-installation-select-server.png" alt="windows ca server installation select server" id="windows-ca-server-installation-select-server" style="margin: 7px auto; border: 1px solid #000000; display: block;" title="windows-ca-server-installation-select-server" /></p>
<p style="text-align: justify;">Next, <strong>tick</strong> the <strong>Active Directory Certificate Services</strong> from the available roles:</p>
<p><img src="https://www.firewall.cx/images/stories/windows-server-2016/certification-authority-server-installation/windows-ca-server-installation-select-server-role.png" alt="windows ca server installation select server role" id="windows-ca-server-installation-select-server-role" style="margin: 7px auto; border: 1px solid #000000; display: block;" title="windows-ca-server-installation-select-server-role" /></p>
<p style="text-align: justify;">The <strong>Add Roles and Features Wizard</strong> will immediately pop up a new window requiring you to confirm the installation of additional tools needed to manage the CA feature. To confirm, <strong>click</strong> on the <strong>Add Features</strong> button:</p>
<p><img src="https://www.firewall.cx/images/stories/windows-server-2016/certification-authority-server-installation/windows-ca-server-installation-add-additional-features.png" alt="windows ca server installation add additional features" id="windows-ca-server-installation-add-additional-features" style="margin: 7px auto; display: block; border: 1px solid #000000;" title="windows-ca-server-installation-add-additional-features" /></p>
<p style="text-align: justify;">You will now return to the previous window. Simply <strong>click</strong> on the <strong>Next</strong> button to continue.</p>
<p style="text-align: justify;">At the <strong>Select Features</strong> window just <strong>click</strong> on the <strong>Next</strong> button:</p>
<p><img src="https://www.firewall.cx/images/stories/windows-server-2016/certification-authority-server-installation/windows-ca-server-installation-select-features.png" alt="windows ca server installation select features" id="windows ca server installation select features" style="margin: 7px auto; border: 1px solid #000000; display: block;" title="windows ca server installation select features" /></p>
<p style="text-align: justify;">The next section is around the <strong>Certificate Services</strong> we want to install. The initial window warns that once the computer/server name cannot be changed after a <strong>certification authority</strong> (<strong>CA</strong>) has been installed. Take a moment to read through the information and <strong>click</strong> on <strong>Next</strong> when ready:</p>
<p><img src="https://www.firewall.cx/images/stories/windows-server-2016/certification-authority-server-installation/windows-ca-server-installation-ad-cs.png" alt="windows ca server installation ad cs" id="windows-ca-server-installation-ad-cs" style="margin: 7px auto; border: 1px solid #000000; display: block;" title="windows-ca-server-installation-ad-cs" /></p>
<p style="text-align: justify;">The next window allows you to select the desired <strong>Certification Authority services</strong> to be installed. The first one, <strong>Certification Authority</strong> is selected by default however it is advisable to also select the <strong>Certification Authority Web Enrollment</strong> feature as it will provide a simple web interface from where you can submit certificate signing requests, download certificates and more.</p>
<p><img src="https://www.firewall.cx/images/stories/windows-server-2016/certification-authority-server-installation/windows-ca-server-installation-ad-cs-services.png" alt="windows ca server installation ad cs services" id="windows-ca-server-installation-ad-cs-services" style="margin: 7px auto; border: 1px solid #000000; display: block;" title="windows-ca-server-installation-ad-cs-services" /></p>
<p style="text-align: justify;">As soon as the <strong>Certification Authority Web Enrollment</strong> feature is selected a pop up window will appear requesting confirmation to install additional features needed. <strong>Click</strong> on <strong>Add Features</strong>:</p>
<p><img src="https://www.firewall.cx/images/stories/windows-server-2016/certification-authority-server-installation/windows-ca-server-installation-ad-cs-additional-features.png" alt="windows ca server installation ad cs additional features" id="windows-ca-server-installation-ad-cs-additional-features" style="display: block; margin: 7px auto; border: 1px solid #000000;" title="windows-ca-server-installation-ad-cs-additional-features" /></p>
<p style="text-align: justify;">You’ll now be returned back to the previous window, <strong>click</strong> on <strong>Next</strong> to continue.</p>
<p style="text-align: justify;">The next screen is required for the installation of <strong>IIS Web Services</strong>. If you already have IIS installed, you won’t need to run through these steps. <strong>Click</strong> on <strong>Next</strong> to continue:</p>
<p><img src="https://www.firewall.cx/images/stories/windows-server-2016/certification-authority-server-installation/windows-ca-server-installation-iis-web-server-role.png" alt="windows ca server installation iis web server role" id="windows-ca-server-installation-iis-web-server-role" style="margin: 7px auto; border: 1px solid #000000; display: block;" title="windows-ca-server-installation-iis-web-server-role" /></p>
<p style="text-align: justify;">At the next screen, <strong>IIS Web Server options</strong>, we can easily accept the default selected services. Feel free to scroll down and check the available options otherwise simply <strong>click</strong> on <strong>Next</strong> to continue:</p>
<p><img src="https://www.firewall.cx/images/stories/windows-server-2016/certification-authority-server-installation/windows-ca-server-installation-iis-web-server-features.png" alt="windows ca server installation iis web server features" id="windows-ca-server-installation-iis-web-server-features" style="margin: 7px auto; border: 1px solid #000000; display: block;" title="windows-ca-server-installation-iis-web-server-features" /></p>
<p style="text-align: justify;">The final window is a simple confirmation of all selected services and features. Note the <strong>automatic restart</strong> option at the top – it’s advisable not to use it as the Window Server might restart once installation is complete.</p>
<p style="text-align: justify;">When ready, <strong>click</strong> on the <strong>Install</strong> button to begin the installation:</p>
<p><img src="https://www.firewall.cx/images/stories/windows-server-2016/certification-authority-server-installation/windows-ca-server-installation-confirm-installation-options.png" alt="windows ca server installation confirm installation options" id="windows-ca-server-installation-confirm-installation-options" style="margin: 7px auto; display: block; border: 1px solid #000000;" title="windows-ca-server-installation-confirm-installation-options" /></p>
<p style="text-align: justify;">Installation can take from <strong>5 to 10 minutes</strong> depending on how busy the server is. Once complete it is necessary to <strong>configure Active Directory Certificate Services on the destination server</strong> by <strong>clicking</strong> on the link provided at the end of the installation wizard:</p>
<p><img src="https://www.firewall.cx/images/stories/windows-server-2016/certification-authority-server-installation/windows-ca-server-installation-progress.png" alt="windows ca server installation progress" id="windows-ca-server-installation-progress" style="margin: 7px auto; border: 1px solid #000000; display: block;" title="windows-ca-server-installation-progress" /></p>
<h2 style="text-align: justify;">Step 2 - Configuring Active Directory Certificate Services (AD CS)</h2>
<p style="text-align: justify;">Configuring <strong>Active Directory Certificate Services</strong> is a simple and quick process. You can initiate this process from the previous step or from the <strong>Server Manager</strong> <strong>Dashboard</strong> by <strong>clicking</strong> on the <strong>exclamation mark </strong>and selecting<strong> Configure Active Directory Certificate Services on the destination server</strong>:</p>
<p><img src="https://www.firewall.cx/images/stories/windows-server-2016/certification-authority-server-installation/windows-ca-server-installation-configuring-ca.png" alt="windows ca server installation configuring ca" id="windows-ca-server-installation-configuring-ca" style="margin: 7px auto; border: 1px solid #000000; display: block;" title="windows-ca-server-installation-configuring-ca" /></p>
<p style="text-align: justify;">Once the configuration process is initiated, the system will require credential confirmation to install the necessary role services. Enter a <strong>username</strong> that belongs to the <strong>Local</strong> and <strong>Enterprise</strong> <strong>Admin</strong> <strong>group</strong>. By default the <strong>Administrator username </strong>will appear<strong>. </strong>When ready <strong>click</strong> on <strong>Next</strong>:</p>
<p><img src="https://www.firewall.cx/images/stories/windows-server-2016/certification-authority-server-installation/windows-ca-server-configuration-credentials.png" alt="windows ca server configuration credentials" id="windows-ca-server-configuration-credentials" style="margin: 7px auto; display: block; border: 1px solid #000000;" title="windows-ca-server-configuration-credentials" /></p>
<p style="text-align: justify;">Next, select the <strong>Role Services</strong> to be configured. The two services available for us are <strong>Certification Authority</strong> and <strong>Certification Authority Web Enrollment</strong>. Select them both and <strong>click</strong> on <strong>Next</strong>:</p>
<p><img src="https://www.firewall.cx/images/stories/windows-server-2016/certification-authority-server-installation/windows-ca-server-configuration-role-services.png" alt="windows ca server configuration role services" id="windows-ca-server-configuration-role-services" style="display: block; margin: 7px auto; border: 1px solid #000000;" title="windows-ca-server-configuration-role-services" /></p>
<p style="text-align: justify;">At the next screen select <strong>Enterprise CA</strong> (default) as <strong>CA setup type</strong> and <strong>click</strong> on <strong>Next</strong>:</p>
<p><img src="https://www.firewall.cx/images/stories/windows-server-2016/certification-authority-server-installation/windows-ca-server-configuration-setup-type.png" alt="windows ca server configuration setup type" id="windows-ca-server-configuration-setup-type" style="margin: 7px auto; border: 1px solid #000000; display: block;" title="windows-ca-server-configuration-setup-type" /></p>
<p style="text-align: justify;">Next, assuming this is the first and possibly only CA in your organisation, select <strong>Root CA</strong> (default) as the <strong>type of CA</strong> and <strong>click</strong> on <strong>Next</strong>:</p>
<p><img src="https://www.firewall.cx/images/stories/windows-server-2016/certification-authority-server-installation/windows-ca-server-configuration-ca-type.png" alt="windows ca server configuration ca type" id="windows-ca-server-configuration-ca-type" style="margin: 7px auto; border: 1px solid #000000; display: block;" title="windows-ca-server-configuration-ca-type" /></p>
<p style="text-align: justify;">Next, we will create a <strong>new private key</strong> (default option) and <strong>click</strong> on <strong>Next</strong> to configure its options:</p>
<p><img src="https://www.firewall.cx/images/stories/windows-server-2016/certification-authority-server-installation/windows-ca-server-configuration-private-key.png" alt="windows ca server configuration private key" id="windows-ca-server-configuration-private-key" style="margin: 7px auto; border: 1px solid #000000; display: block;" title="windows-ca-server-configuration-private-key" /></p>
<p style="text-align: justify;">On the next screen we can leave all options to their default settings and continue. Alternatively a <strong>different hash algorithm</strong> can be selected e.g <strong>SHA384</strong> or <strong>SHA512</strong> with a larger <strong>Key Length</strong>. When ready, <strong>click</strong> on <strong>Next</strong>:</p>
<p><img src="https://www.firewall.cx/images/stories/windows-server-2016/certification-authority-server-installation/windows-ca-server-configuration-ca-cryptography.png" alt="windows ca server configuration ca cryptography" id="windows-ca-server-configuration-ca-cryptography" style="margin: 7px auto; border: 1px solid #000000; display: block;" title="windows-ca-server-configuration-ca-cryptography" /></p>
<p style="text-align: justify;">Here we can change or leave the suggested <strong>Common Name</strong> (<strong>CN</strong>) for our <strong>Certification Authority </strong>(<strong>CA</strong>). When ready, <strong>click</strong> on <strong>Next</strong>:</p>
<p><img src="https://www.firewall.cx/images/stories/windows-server-2016/certification-authority-server-installation/windows-ca-server-configuration-ca-name.png" alt="windows ca server configuration ca name" id="windows-ca-server-configuration-ca-name" style="margin: 7px auto; border: 1px solid #000000; display: block;" title="windows-ca-server-configuration-ca-name" /></p>
<p style="text-align: justify;">The <strong>Validity Period</strong> determines how long the certificate generated for our CA will be valid. By default this is <strong>5 years</strong> however it can be adjusted either way. Enter the desirable amount of years and <strong>click</strong> on <strong>Next</strong>:</p>
<p><img src="https://www.firewall.cx/images/stories/windows-server-2016/certification-authority-server-installation/windows-ca-server-configuration-certificate-validity-period.png" alt="windows ca server configuration certificate validity period" id="windows-ca-server-configuration-certificate-validity-period" style="margin: 7px auto; display: block; border: 1px solid #000000;" title="windows-ca-server-configuration-certificate-validity-period" /></p>
<p style="text-align: justify;">Last option is the <strong>configuration of the database locations</strong>. Accept the default locations and <strong>click</strong> on <strong>Next</strong>:</p>
<p><img src="https://www.firewall.cx/images/stories/windows-server-2016/certification-authority-server-installation/windows-ca-server-configuration-database-location.png" alt="windows ca server configuration database location" id="windows-ca-server-configuration-ca-type" style="margin: 7px auto; border: 1px solid #000000; display: block;" title="windows-ca-server-configuration-ca-type" /></p>
<p style="text-align: justify;">Finally, we are presented with a confirmation window with all settings. This is the last chance to change any settings or values. When ready, <strong>click</strong> on <strong>Configure</strong>:</p>
<p><img src="https://www.firewall.cx/images/stories/windows-server-2016/certification-authority-server-installation/windows-ca-server-configuration-confirmation-of-settings.png" alt="windows ca server configuration confirmation of settings" id="windows-ca-server-configuration-confirmation-of-settings" style="margin: 7px auto; border: 1px solid #000000; display: block;" title="windows-ca-server-configuration-confirmation-of-settings" /></p>
<p style="text-align: justify;">After a few seconds the <strong>Results window</strong> will appear confirming all roles, services and features have been successfully configured.&nbsp; <strong>Click</strong> on <strong>Close</strong> to exit the configuration wizard:</p>
<p><img src="https://www.firewall.cx/images/stories/windows-server-2016/certification-authority-server-installation/windows-ca-server-configuration-complete.png" alt="windows ca server configuration complete" id="windows-ca-server-configuration-complete" style="margin: 7px auto; border: 1px solid #000000; display: block;" title="windows-ca-server-configuration-complete" /></p>
<p style="text-align: justify;">We’ll now find the <strong>Certificate Authority</strong> MMC available in the <strong>Administrative Tools</strong>:</p>
<p><img src="https://www.firewall.cx/images/stories/windows-server-2016/certification-authority-server-installation/windows-ca-server-mmc-console.png" alt="windows ca server mmc console" id="windows-ca-server-mmc-console" style="display: block; margin: 7px auto; border: 1px solid #000000;" title="windows-ca-server-mmc-console" /></p>
<p style="text-align: justify;">We can also visit the CA Server’s web site to <strong>request</strong> and <strong>download signed certificates</strong> by visiting the URL:&nbsp; <strong>http://&lt;server IP&gt;/certsrv</strong> e.g <strong>http://192.168.1.10/certsrv</strong>:</p>
<p><img src="https://www.firewall.cx/images/stories/windows-server-2016/certification-authority-server-installation/windows-ca-server-webserver-access.png" alt="windows ca server webserver access" id="windows-ca-server-webserver-access" style="display: block; margin: 7px auto; border: 1px solid #000000;" title="windows-ca-server-webserver-access" /></p>
<h2 style="text-align: left;">Summary</h2>
<p style="text-align: justify;">This article explained the role and importance of a <strong>Windows Certificate Authority Server</strong> provided a step-by-step guide how to <strong>install</strong> and <strong>configure</strong> a <strong>Windows 2016 Certification Authority Server</strong> including the <strong>Certification Authority Web Enrollment</strong> component.</p>]]></description>
			<category>Windows Servers</category>
			<pubDate>Mon, 04 May 2020 17:09:26 +1000</pubDate>
		</item>
		<item>
			<title>Download Altaro Free VM Backup &amp; Win a PlayStation 4 Pro, Xbox One X, 3-Year Amazon Prime and more!</title>
			<link>https://www.firewall.cx/operating-systems/microsoft/windows-servers/altaro-sysadmin-2018.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/operating-systems/microsoft/windows-servers/altaro-sysadmin-2018.html</guid>
			<description><![CDATA[<p>We have some exciting news for you today!</p>
<p>Altaro has launched a great contest in celebration of <strong>SysAdmin Day</strong> on <strong>27<sup>th</sup> July</strong>!</p>
<p>They will be giving away <strong>Amazon eGift Cards</strong> to the <strong>first 100 eligible entries</strong> and <span style="text-decoration: underline;"><strong>1 Grand Prize to 1 lucky winner</strong></span>.</p>
<p class="box-info" style="text-align: justify;">The Grand Prize winner will be able to choose any prize from the following: a <strong>PlayStation 4 Pro</strong>, <strong>Xbox One X</strong>, a <strong>3-year membership of Amazon Prime</strong>, an <strong>Unlimited Plus Edition of Altaro VM Backup</strong>, and more!</p>
<p>All contest participants will even get <strong>FOREVER FREE backup for 2 VMs</strong> when they <a href="https://goo.gl/Zvedfs" target="_blank" rel="nofollow noopener" title="download Altaro VM Backup">download Altaro VM Backup</a>!</p>
<p><a href="https://goo.gl/Zvedfs" target="_blank" rel="nofollow noopener" title="Free Download - Win Grand Prizes"><img src="https://www.firewall.cx/images/stories/windows-server-2016/altaro-sysadmin-day-2018/altaro-2018-syadmin-day.png" alt="altaro 2018 syadmin day - Free Grand Prizes" style="display: block; margin-left: auto; margin-right: auto;" title="altaro 2018 syadmin day - Free Grand Prizes" /></a></p>
<p><strong>Want to WIN?</strong></p>
<p>Here’s what you need to do to:</p>
<ol>
<li style="text-align: justify;"><a href="https://goo.gl/Zvedfs" target="_blank" rel="nofollow noopener" title="Download Altaro VM Backup">Download Altaro VM Backup</a> from <a href="https://goo.gl/Zvedfs" target="_blank" rel="nofollow noopener" title="Free VMware and Hyper-V Backup - Download and Win Prizes!">https://goo.gl/Zvedfs</a> using a valid work email address</li>
<li style="text-align: justify;">Set up a virtual machine on Altaro VM Backup and <strong>take a screenshot</strong>. Only screenshots that show <strong>at least 1 VM added for backing up</strong> will be considered as eligible.</li>
<li style="text-align: justify;">Upload the screenshot and the <strong>Grand Prize choice</strong> at the link you will receive via email once you download Altaro VM Backup from the contest landing page.</li>
</ol>
<p>Good luck! </p>]]></description>
			<category>Windows Servers</category>
			<pubDate>Mon, 25 Jun 2018 21:03:14 +1000</pubDate>
		</item>
		<item>
			<title>Free Webinar: Migrating from Hyper-V to VMware</title>
			<link>https://www.firewall.cx/operating-systems/microsoft/windows-servers/webinar-migration-hyper-v-to-vmware.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/operating-systems/microsoft/windows-servers/webinar-migration-hyper-v-to-vmware.html</guid>
			<description><![CDATA[<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/windows-server-2016/hyper-v-vmware-migration-webinar.png" alt="hyper-v vmware migration webinar" style="margin: 7px; float: left;" title="hyper-v vmware migration webinar" />If your organization is planning to <strong>migration</strong> from a<strong> Hyper-V virtualization environment to VMware</strong> then this <strong>FREE</strong> webinar is just for you.</p>
<p style="text-align: justify;">Aimed toward <strong>Hyper-V and VMware admins</strong> this webinar will cover critical topics such as:</p>
<ul class="check" style="text-align: justify;">
<li>vSphere basics and a crash course in HA, DRS, and vMotion</li>
<li>Management differences between vSphere and Hyper-V</li>
<li>How to migrate VMs from Hyper-V to VMware using the VMware vSphere Converter</li>
</ul>
<p style="text-align: justify;">The entire session will be geared towards Hyper-V admins who are looking to broaden their horizons by adding VMware know-how to their toolbox.</p>
<p style="text-align: justify;"><strong>Webinar Date</strong>: Tuesday, June 27th 2017 - <a href="https://clixtrac.com/goto/?251271" target="_blank" rel="nofollow noopener" title="Click here to join">Click here to join</a>.</p>
<p style="text-align: justify;"><strong>Time</strong>: Time for US attendees: (10am PDT / 1pm EDT), Time for EU attendees: (2pm CEST)</p>
<p class="box-info"><a href="https://clixtrac.com/goto/?251271" target="_blank" rel="nofollow noopener" title="Free access to the Webinar event">While the event date has passed, it has been recorded and is available for viewing. All material are available as direct downloads. Click here to access the event.</a></p>]]></description>
			<category>Windows Servers</category>
			<pubDate>Sun, 25 Jun 2017 18:19:24 +1000</pubDate>
		</item>
		<item>
			<title>Guide to Windows Server 2016 Hyper-V Hypervisor: New Virtualization Features, Limitations, Backup, Checkpoints, Storage, Networking and more</title>
			<link>https://www.firewall.cx/operating-systems/microsoft/windows-servers/hyper-v-hypervisor-virtualization-guide-windows-2016.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/operating-systems/microsoft/windows-servers/hyper-v-hypervisor-virtualization-guide-windows-2016.html</guid>
			<description><![CDATA[<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/windows-server-2016/hyper-v-guide-features/hyper-v-server-2016.png" alt="Guide to Hyper-V Windows server 2016" style="margin: 7px; float: left;" title="Guide to Hyper-V Windows server 2016" />One of <strong>Windows Server 2016</strong> highlights is the newer <strong>Hyper-V server</strong> that not only extends the <strong>hypervisor’s features</strong> and <strong>capabilities</strong> but also introduces a number of new enhancements and concepts that take <strong>virtualization</strong> to a new level.</p>
<p style="text-align: justify;">There’s a lot of new exciting features we are covering so without any further delay, let’s take a look at what we have in hand for you:</p>
<ul style="margin-top: 0cm;">
<li><a href="https://www.firewall.cx/operating-systems/microsoft/windows-servers/hyper-v-hypervisor-virtualization-guide-windows-2016.html#hyper-v-hypervisor-technology" title="Hyper-V Hypervisor Technology Overview">Hyper-V Hypervisor Technology Overview</a></li>
<li><a href="https://www.firewall.cx/operating-systems/microsoft/windows-servers/hyper-v-hypervisor-virtualization-guide-windows-2016.html#hyper-v-in-windows-server-2016" title="Hyper-V in Windows Server 2016">Hyper-V in Windows Server 2016</a></li>
<li><a href="https://www.firewall.cx/operating-systems/microsoft/windows-servers/hyper-v-hypervisor-virtualization-guide-windows-2016.html#hyper-v-containers" title="Hyper-V Containers">Hyper-V Containers</a></li>
<li><a href="https://www.firewall.cx/operating-systems/microsoft/windows-servers/hyper-v-hypervisor-virtualization-guide-windows-2016.html#hyper-v-security-features" title="Hyper-V Security Features">Hyper-V Security Features</a></li>
<li><a href="https://www.firewall.cx/operating-systems/microsoft/windows-servers/hyper-v-hypervisor-virtualization-guide-windows-2016.html#gen2-vm-performance" title="Hyper-V Gen2 VM Performance and Features">Generation2 VMs Performance and Features</a>
<ul style="margin-top: 0cm;">
<li><a href="https://www.firewall.cx/operating-systems/microsoft/windows-servers/hyper-v-hypervisor-virtualization-guide-windows-2016.html#hyper-v-backups-and-checkpoints" title="Hyper-V Backups and Checkpoints">Hyper-V Backups &amp; Checkpoints</a></li>
<li><a href="https://www.firewall.cx/operating-systems/microsoft/windows-servers/hyper-v-hypervisor-virtualization-guide-windows-2016.html#rolling-cluster-upgrades" title="Hyper-V Rolling Cluster Upgrades">Hyper-V Rolling Cluster Upgrades</a></li>
<li><a href="https://www.firewall.cx/operating-systems/microsoft/windows-servers/hyper-v-hypervisor-virtualization-guide-windows-2016.html#networking" title="Hyper-V Networking">Hyper-V Networking</a></li>
<li><a href="https://www.firewall.cx/operating-systems/microsoft/windows-servers/hyper-v-hypervisor-virtualization-guide-windows-2016.html#storage" title="Hyper-V Storage">Hyper-V Storage</a></li>
<li><a href="https://www.firewall.cx/operating-systems/microsoft/windows-servers/hyper-v-hypervisor-virtualization-guide-windows-2016.html#hyper-v-improvements" title="Hyper-V Improvements">Miscellaneous Hyper-V Improvements</a></li>
</ul>
</li>
<li><a href="https://www.firewall.cx/operating-systems/microsoft/windows-servers/hyper-v-hypervisor-virtualization-guide-windows-2016.html#hyper-v-requirements-windows-server-2016" title="Hyper-V Requirements - Windows Server 2016">Hyper-V Requirements on Windows Server 2016</a></li>
<li><a href="https://www.firewall.cx/operating-systems/microsoft/windows-servers/hyper-v-hypervisor-virtualization-guide-windows-2016.html#hyper-v-shielded-virtual-machines" title="Hyper-V Shielded Virtual Machines">Hyper-V Shielded Virtual Machines</a></li>
<li><a href="https://www.firewall.cx/operating-systems/microsoft/windows-servers/hyper-v-hypervisor-virtualization-guide-windows-2016.html#discrete-device-management" title="Discrete Device Management">Discrete Device Management</a></li>
<li><a href="https://www.firewall.cx/operating-systems/microsoft/windows-servers/hyper-v-hypervisor-virtualization-guide-windows-2016.html#hyper-v-supported-guest-operating-systems" title="Hyper-V Supported Windows Guest Operating Systems">Hyper-V Supported Windows Guest O/S</a></li>
<li><a href="https://www.firewall.cx/operating-systems/microsoft/windows-servers/hyper-v-hypervisor-virtualization-guide-windows-2016.html#hyper-v-linux-support" title="Linux Support">Linux Support</a></li>
<li><a href="https://www.firewall.cx/operating-systems/microsoft/windows-servers/hyper-v-hypervisor-virtualization-guide-windows-2016.html#hyper-v-scalability" title="Hyper-V Scalability">Hyper-V Scalability</a></li>
</ul>
<p class="box-hint">Users new to Hyper-V can also read our <a href="https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-virtualization-hyper-v-concepts.html" target="_blank" title="Introduction to Hyper-V Concepts">Introduction to Hyper-V Concepts</a> article</p>
<h2><a name="hyper-v-hypervisor-technology">Hyper-V Hypervisor Technology Overview</a></h2>
<p style="text-align: justify;">Hyper-V was first released in 2008 as a re-brand of Microsoft’s Virtual PC. It lets users create a virtual machine (VM), a complete, software version of a computer. Users don’t have to install an OS through the normal route, and instead run a program on top of their current one.</p>
<p style="text-align: justify;">This is made possible by a hypervisor – a layer between the physical and virtual environments that can manage the system’s hardware between VMs. It isolates the host machine from its underlying hardware.</p>
<p style="text-align: justify;">This opens some natural benefits. Firstly, a virtual machine is in a separate environment to the host computer. As a result, any problems that occur do not affect the regular operating system. This makes virtual machines ideal testing environments.</p>
<p style="text-align: justify;">This is furthered by the ability to run multiple operating systems at once. Most modern computers have more hardware than needed for day to day tasks, and users can run, for example, a Windows, Windows Server, and Linux operating system simultaneously. Instead of requiring three different servers, only one is required. This cuts down on hardware, power, maintenance, and cooling costs.</p>
<p style="text-align: justify;">It also allows for more flexible deployment. At a hefty fee, admins can purchase a Windows Datacenter license and create infinite virtual machines without having to pay any extra. In testing or production environments, this cuts out vital slowdown while employees check licenses. With virtualization, new servers can be deployed in minutes.</p>
<p style="text-align: justify;">Another flexibility is hardware resources. Users can configure Hyper-V to utilize different amounts of resources, including the processor, storage, and memory. This is particularly useful if an organization uses a Virtual Desktop Infrastructure (VDI). A Windows operating system is hosted on a central server, and users are given virtual desktops over the network. Not only does this save on licensing costs, it means admins can scale the amount of resources users have depending on various factors.</p>
<p style="text-align: justify;">Hyper-V also lets admins make easy backups. It’s simple to copy a VM and restore it later if anything goes wrong. With Hyper-V, there are two options – saved states, and Volume Shadow Copy Service (VSS). VSS lets admins make backups even when files are in use, meaning the process can be completed on demand.</p>
<p style="text-align: justify;">This ease of movement can be useful in other scenarios. Built-in features like live and storage migration make virtual machines much more portable. Users can access the exact same environment on a different machine, without the need for complex procedures. That combines with security features like Secure Boot to protect the host OS from viruses, malware, and attacks.</p>
<p><a href="https://clixtrac.com/goto/?215955" target="_blank" rel="nofollow noopener" title="Free Hyper-V Backup"><img src="https://www.firewall.cx/images/stories/collaborations/hornet-security-800x140-v10.jpg" alt="Hyper-V Backup" width="800" height="140" style="display: block; margin-left: auto; margin-right: auto;" title="Free Hyper-V Backup" /></a></p>
<h2 style="text-align: left;"><a name="hyper-v-in-windows-server-2016">Hyper-V in Windows Server 2016</a></h2>
<p style="text-align: justify;">One of the most popular hosts for a virtual machine is Microsoft’s Windows Server OS. For the past few years, admins have been running Windows Server 2012 R2, a Windows 8.1-based platform. However, the release of Windows 10 has prompted a Windows Server 2016 variant, and it comes with plenty of new functionality.</p>
<p style="text-align: justify;">A big example is the introduction of Microsoft’s Nano Server. A purpose-built OS, Nano Server is a lightweight version of Windows Server Core that’s designed to run born-in-the-cloud applications and containers. It’s <del cite="mailto:Ingrid%20Bystrom" datetime="2017-02-26T20:50"></del>complementary to Windows Server 2016, has no GUI, and is optimized for Hyper-V. The service provides an environment with a low overhead and fewer avenues of attack.</p>
<p style="text-align: justify;">Windows Server 2016 also introduces nested virtualization. Essentially, this lets you run a VM inside another VM. Though it’s a strange concept, the usage scenarios are more common than you may think. Many companies now use the virtual infrastructure we mentioned earlier, and this means those systems can still use Hyper-V. It also makes for a good test environment, letting trainees try out different Oss and situations without the need for separate hardware.</p>
<p style="text-align: justify;">Other big improvements come to the Hyper-V manager. An updated WS-MAN management protocol lets admins do a live migration without having to enable extra settings in Azure Active Directory. This also enables CredSSP, Kerbos or NTLM authentication, and makes it easy to enable a host for remote management.</p>
<p style="text-align: justify;">This is furthered by support for alternate credentials when connecting to another Windows 10 or 2016 remote host. This <ins cite="mailto:Ingrid%20Bystrom" datetime="2017-02-26T20:51">i</ins>ncludes a save functionality so that you don’t have to type it every time. Though earlier versions don’t support this functionality, you can still use the Hyper-V manager in Windows Server 2016 to control earlier versions. The new manager supports Windows Server 2012, 2012 R2, Windows 8, and 8.1.</p>
<p style="text-align: justify;">The next major change is PowerShell Direct. The process runs between the host and virtual machine, meaning there’s less need to configure firewalls and networks. It lets users remotely run cmdlets in multiple VMs without complex setup. PowerShell functionality extends to NanoServers, where it can run directly.</p>
<h3 style="text-align: left;"><a name="hyper-v-containers">Hyper-V Containers</a></h3>
<p style="text-align: justify;">It’s no secret that containers are on the rise, and are becoming increasingly common in production scenarios. With Windows Server 2016, Microsoft has introduced Windows and <strong>Hyper-V Containers</strong> for the first time.</p>
<p><img src="https://www.firewall.cx/images/stories/vpn/socks5-proxy-guide/containers-hyper-v-2016.png" alt="" style="vertical-align: middle; display: block; margin-left: auto; margin-right: auto;" data-alt="Hyper-V Containers Explained" /></p>
<p style="text-align: justify;">For those unfamiliar, containers let users create an isolated environment in which to run an application. The environment lets an app run without affecting the rest of the system, and vice versa. In comparison to a VM, they’re more lightweight and don’t emulate hardware in the same way.</p>
<p style="text-align: center;" align="center"><img src="https://www.firewall.cx/images/stories/windows-server-2016/hyper-v-guide-features/hyper-v-containers.png" alt="hyper-v containers" title="hyper-v containers" /></p>
<p style="text-align: justify;">Traditionally, containers were limited to Linux Oss. Through a collaboration with Docker, Windows Server 2016 now offers two type of containers.</p>
<ul style="text-align: justify;">
<li>A Windows Server Container uses namespace and isolation technology, but shares a kernel with the container host and all other running containers.</li>
<li>A Hyper-V container instead runs each container in an optimized VM. In this case, the kernel isn’t shared with the host, or other containers.</li>
</ul>
<p style="text-align: justify;">Windows Containers have several important features, including HTTPS support, data management through container shared folders, and the ability to restrict container resources.</p>
<h3><a name="hyper-v-security-features">Hyper-V Security Features</a></h3>
<p style="text-align: justify;">Hyper-V on Windows Server 2016 also comes with new security features. The first is the ability to use Secure Boot with Linux VMs. This feature was previously restricted to Windows 8 and Server 2012, and checks the signature of boot software on launch to prevent malware and unauthorized OSs launching during start up.</p>
<p style="text-align: justify;">Host resource protection also has some security and stability improvements. It stops VMs from hogging system resources by monitoring activity and downgrading VMs with excessive usage. It can be enabled through PowerShell and prevents performance degradation with the host or other machines.</p>
<p style="text-align: justify;">Shielded virtual machines provide further protection. In essence, they provide a stronger barrier against spying by administrators and malware. Encryption is applied to the state and data, meaning admins can’t see the activities or intercept information. This combines with further encryption options for operating system disks on generation 1 virtual machines. Users can utilize BitLocker to do this, creating a small drive that contains the encryption key. To start the machine, hosts need either access to the private key or to be part of an authorized guarded fabric.</p>
<h3><a name="gen2-vm-performance">Generation 2 Virtual Machines, Performance and Features</a></h3>
<p style="text-align: justify;">Generation 2 VMs have some new features, too. Namely, they can use a lot more memory and virtual processors. Gen 2 supports up to 12 TB of virtual memory versus the previous 1 TB, and up to 24 TB per physical host server. It also supports 240 Virtual Processors instead of 64, and 512 logical processors rather than 320.</p>
<p style="text-align: justify;">The result is a huge increase in performance, suitable for large-scale online transaction processing and data warehousing. Microsoft benchmarks reveal up to 343,000 transactions per second with a 4 TB in-memory database and 128 virtual processors. That’s 95% of a physical server’s performance.</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/windows-server-2016/hyper-v-guide-features/hyper-v-gen2-vm-hardware.png" alt="hyper-v gen2 vm hardware" title="hyper-v gen2 vm hardware" /></p>
<p style="text-align: center;">Figure 2. Physical server vs. Hyper-V performance</p>
<p style="text-align: justify;">Generation 2 VMs also offer new, virtualization-based security. Microsoft’s Device Guard and Credential Guard offers protection against malware and operating systems in guest VMs that are version 8 or higher.</p>
<p style="text-align: justify;">Further functionality comes with the ability to hot add and remove network adapters and memory. In simple terms, this lets users add or remove network adapters while a machine is still running. While that feature is exclusive to Gen 2, both generations can now adjust the amount of memory utilised on-the-fly, even with the “dynamic memory” option disabled.</p>
<h3><a name="hyper-v-backups-and-checkpoints">Backups and Checkpoints</a></h3>
<p style="text-align: justify;">Though Hyper-V offers significantly easier backups, the VSS system can be a little unreliable. In 2016, Microsoft has built change tracking into Hyper-V, which makes it easier for third-party software vendors to create backup solutions.</p>
<p style="text-align: justify;">However, a backup system isn’t much use if you have faulty checkpoints and snapshots. In Windows Server 2012, snapshots could cause serious problems in a production environment. Restoring a VM from a snapshot could put the database server out of sync, creating problems down the line.</p>
<p style="text-align: justify;">Thankfully, this is remedied in Windows Server 2016. It introduces “production checkpoints”, which complies with support policies. The new checkpoints use VSS rather than saved states, greatly reducing the risks. The feature is enabled by default in Hyper-V.</p>
<h3><a name="rolling-cluster-upgrades">Rolling Cluster Upgrades</a></h3>
<p style="text-align: justify;">An efficient, reliable upgrade system is equally important. Microsoft has made upgrading from 2012 R2 to 2016 far easier than previous versions. Rather than requiring a separate cluster to start the migration process, 2016 introduces rolling cluster upgrades.</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/windows-server-2016/hyper-v-guide-features/hyper-v-cluster-upgrade.png" alt="hyper-v cluster upgrade path" title="hyper-v cluster upgrade path" /></p>
<p style="text-align: justify;">This lets admins upgrade a cluster without any downtime. Clusters run at the feature level of 2012 R2 until all the nodes are upgraded, at which point the user can either reverse it or enable the 2016 features with a PowerShell cmdlet.</p>
<h3><a name="networking">Networking</a></h3>
<p style="text-align: justify;">Further functionality is introduced to Hyper-V networking. Microsoft has enabled Remote direct memory access for switch embedded teaming (SET). This lets admins group up to eight network adapters into a single virtual one, whilst still able to use RMDA. For those unfamiliar, RDMA allows you to read and write memory without the use of a remote CPU, leading to less CPU utilization and latency.</p>
<p style="text-align: justify;">Another new feature is Virtual machine multi queues, or VMMQ. This builds on the previous VMQ by allowing multiple hardware queues for each VM. Thus, default queues are actually a set, with traffic spread between them.</p>
<h3><a name="storage">Storage</a></h3>
<p style="text-align: justify;">Windows Server 2016 also makes changes to storage options for a more manageable experience. Shared virtual hard disks can now be resized while the machine is still online. New functionality also extends to guest clusters, which can protect virtual hard disks with Hyper-V replica.</p>
<p style="text-align: justify;">Microsoft has updated its storage Quality of Service policies. QoS lets admins manage and monitor storage performance using scale-out file server roles. Windows Server 2016 makes several tweaks to that system.</p>
<p style="text-align: justify;">Storage QoS now makes sure a VM can’t take all the storage resources, cutting out other machines’ options. This combines with the ability to define performance minimum<del cite="mailto:Ingrid%20Bystrom" datetime="2017-02-26T20:57">’</del>s and maximums for individual VMs, providing a more reliable experience.</p>
<p style="text-align: justify;">Finally, the storage of virtual machines can be monitored as soon as they start. These details are all viewable from a new, single location.</p>
<p style="text-align: justify;">There are other options available for those struggling with storage space. Data Deduplication searches for redundant data by looking for duplicate files. The data is then sorted and compressed, optimizing the drive without compromising data integrity. Further improvements come in the form of a new VM configuration format. Vmcx files make data reading and writing more efficient, and lessen the chance of corruptions.</p>
<h3><a name="hyper-v-improvements">Miscellaneous Hyper-V Improvements</a></h3>
<p style="text-align: justify;">Though Windows Server 2016 introduces some major improvements, there are also smaller ones that are very interesting. One is the ability to connect PCIe hardware directly to a VM. Microsoft calls it <strong>Discrete Device Assignment</strong> and currently supports NVMe storage, allowing for fast SSD speeds.</p>
<p style="text-align: justify;">However, more exciting is the future of PCIe in Windows Server. Microsoft is working with GPU vendors to add support for specific GPUs, which could be useful for graphic intensive programs like rendering software and Photoshop.</p>
<p style="text-align: justify;">There’s also a minor but important feature for Always On computers. A Connected Standby power state is now available, even with the Hyper-V role installed. Connected Standby is available with select CPUs, and lets the PC listen for notifications in a similar way to phones. If a message appears, the screen will light up, notifying the user.</p>
<h2><a name="hyper-v-requirements-windows-server-2016">Hyper-V System Requirements on Windows Server 2016</a></h2>
<p style="text-align: justify;">Naturally, some of these new features come with hardware requirements. Though those prerequisites haven’t changed dramatically since 2012 R2, Hyper-V still won’t work with every system. This is especially true if you want to utilize new features such as shielded VM and discrete device assignment.</p>
<h3>General Requirements</h3>
<p style="text-align: justify;">First off, the general Hyper-V requirements. You’ll need the following specifications as a base, regardless of any extra features you want:</p>
<ul style="text-align: justify;">
<li>A processor that’s 64-bit and supports <strong>Second-Level Address Translation</strong> (<strong>SLAT</strong>). This is required for virtualization, but not for Hyper-V management tools.</li>
<li>At least 4 GB of RAM, preferably more, and higher amounts for multiple VMs.</li>
<li>VM Monitor Mode extensions</li>
<li>Virtualization turned on in BIOS of UEFI, including hardware-assisted virtualization and hardware-enforced Data Execution prevention (DEP).</li>
</ul>
<p style="text-align: justify;">There are several ways to tell if you meet these requirements, but the easiest is through command prompt or PowerShell. You can follow these steps:</p>
<ol>
<li style="text-align: justify;">Press <strong>Windows + R</strong></li>
<li style="text-align: justify;">Type <strong>cmd.exe</strong> (powershell.exe alternatively)</li>
<li style="text-align: justify;">In the command line, enter <strong>Systeminfo.exe </strong>and press <strong>Enter</strong></li>
<li style="text-align: justify;">View your report under <strong>Hyper-V Requirements</strong></li>
</ol>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/windows-server-2016/hyper-v-guide-features/hyper-v-requirement-cmd.png" alt="hyper-v-requirements via cmd or powershell prompt" title="hyper-v-requirements via cmd or powershell prompt" /></p>
<h3><a name="hyper-v-shielded-virtual-machines">Hyper-V Shielded Virtual Machines</a></h3>
<p style="text-align: justify;">As mentioned earlier, Shielded Virtual Machines have further requirements. The host needs the following:</p>
<ul class="checkbox" style="text-align: justify;">
<li>UEFI 2.3.1c for secure and measured booting</li>
<li>TMP v2.0 if you want platform security asset protection</li>
<li>IOMMU (Intel VT – D) for direct memory access protection</li>
</ul>
<p>&nbsp;</p>
<p><img src="https://www.firewall.cx/images/stories/vpn/socks5-proxy-guide/vm-shielded-hyper-v-2016.png" alt="vm-shielded-hyper-v-2016" style="vertical-align: middle; display: block; margin-left: auto; margin-right: auto;" title="vm-shielded-hyper-v-2016" /></p>
<p style="text-align: justify;">In addition, VMs need to be Generation 2, and the guest operating system must be Windows Server 2016, 2012 R2, or 2012.</p>
<h3><a name="discrete-device-management">Discrete Device Management</a></h3>
<p style="text-align: justify;">The feature with the most requirements is <strong>Discrete Device Management</strong>. Hosts need supported processors, chipsets and firmware table, as follows:</p>
<ul>
<li style="text-align: justify;"><strong>Processor: </strong>Support for Intel <strong>Extended Page Table</strong> (EPT) or AMD <strong>Nested Page Table</strong> (NPT)</li>
<li style="text-align: justify;"><strong>Chipset: </strong>Interrupt Remapping support, either Intel VT-d2, or AMD I/O memory management. It must also support DMA remapping and Access control services for PCI-e root ports.</li>
<li style="text-align: justify;"><strong>Firmware tables: </strong>I/O MMU exposure to the Windows hypervisor is a must, and needs to be enabled in UEFI or BIOS.</li>
</ul>
<h2><a name="hyper-v-supported-guest-operating-systems">Hyper-V Supported Guest Operating Systems</a></h2>
<p style="text-align: justify;">The availability of guest operating systems also varies slightly with Windows Server 2016. While Windows Server has the best virtual processor support, other systems still provide great functionality. Here’s the full list of Windows guest operating systems and their differences:</p>
<ul class="check" style="text-align: justify;">
<li><strong>Windows Server 2016: </strong>240 virtual processors (gen 2), 64 (gen 1)</li>
<li><strong>Windows Server 2012 R2: </strong>64 virtual processors</li>
<li><strong>Windows Server 2012: </strong>64 virtual processors</li>
<li><strong>Windows Server 2008 R2 with SP 1: </strong>64 virtual processors</li>
<li><strong>Windows Server 2008 with SP 2: </strong>4 virtual processors</li>
<li><strong>Windows Small Business Server 2011: </strong>4 virtual processors (standard edition) 2 (essentials edition)</li>
<li><strong>Windows 10: </strong>32 virtual processors</li>
<li><strong>Windows 8.1: </strong>32 virtual processors</li>
<li><strong>Windows 7 with SP 1: </strong>4 virtual processors (must be Professional, Enterprise, or Ultimate)</li>
<li><strong>Windows Vista with Service Pack 2 (SP2</strong>): 2 virtual processors (must be Business, Enterprise, or Ultimate)</li>
</ul>
<p style="text-align: justify;">Guest OSs also vary in the support for Integration Services. In general, Windows 8.1 (Windows Server 2012) or higher has Integration Services built-in. Other versions usually require an upgrade or install after the guest operating system is set up.</p>
<h3><a name="hyper-v-linux-support">Hyper-V Linux Support</a></h3>
<p style="text-align: justify;">Hyper-V support for Linux is a little more complex. Microsoft provides both emulated and Hyper-V specific devices, but the performance and features of emulated devices is limited. As a result, the software giant recommends using Hyper-V specific devices for Linux, alongside its <strong>Linux Integration Services</strong> (LIS) drivers.</p>
<p style="text-align: justify;">LIS is integrated into the Linux kernel and is regularly updated, but this may not extend to users on older distributions. Thus, some users must download LIS manually.</p>
<p style="text-align: justify;">That said, support for Linux in Windows Server 2016 is good, and builds on previous versions. Microsoft has LIS support for the following distributions:</p>
<h4>CentOS</h4>
<ul>
<li>RHEL/CentOS 7.x, 64-bit</li>
<li>RHEL/CentOS 6.x, 64-bit (No built-in LIS for 6.0-6.3)</li>
<li>RHEL/CentOS 5.x, 32-bit (No built-in LIS before 5.9</li>
</ul>
<p style="text-align: justify;">It’s worth noting that CentOS has some feature limitations, though these can vary depending on version. There are issues with StaticIP injection across the board when Network Manager is configured for a synthetic network adapter. In addition, VLAN trunking only works in 7.x, PCI pass through and SR-IOV only work on 7.3 and higher. Live virtual machine backups aren’t possible in 5.2, 5.3, or 5.4.</p>
<h4>Debian</h4>
<ul>
<li>Jessie [8.0-8.5]</li>
<li>Wheezy [7.0-7.11]</li>
</ul>
<p style="text-align: justify;">Debian also has some restrictions. The main one is the inability to create file systems on VHD’s larger than 2TB. There are live virtual machine backup problems here too, not working with ext2 filesystems.</p>
<h4>Oracle</h4>
<ul>
<li>Red Hat (No built-in LIS for 6.0-6.3)
<ul>
<li>6.x - 32-bit, 32-bit PAE, 64-bit</li>
<li>7.x - 64-bit</li>
</ul>
</li>
<li>Unbreakable Enterprise Kernel</li>
</ul>
<p style="text-align: justify;">With RedHat, VLAN trunking only works on versions 7.0-7.2. It also has issues with virtual fibre channels, where the machine may not be able to mount correctly if LUN 0 has not been populated. Both RedHat and UEK may have to undergo a filesystem check if there are open file handles during backup and may fail silently if there is an iSCSI or pass-through disk attached.</p>
<h4>SUSE</h4>
<ul>
<li>SLES SP2</li>
<li>SLES SP1 – 64-bit only</li>
<li>SLES 12 – 64-bit only</li>
<li>SLES 11 SP4</li>
<li>SLES 11 SP3</li>
<li>SLES 11 SP2</li>
<li>Open SUSE 12.3</li>
</ul>
<p style="text-align: justify;">SUSE has the same Static IP injection limitations as CentOS, so Network Manager must be turned off or configured correctly. Similarly, live backup issues mirror that of Oracle VMs. Finally, Windows Server 2016 users must type memory parameters in multiples of 128 MB or there will be Hot-Add failures and lack of a memory increase.</p>
<h4>Ubuntu</h4>
<ul>
<li>16.10</li>
<li>16.04</li>
<li>14.04</li>
<li>12.04</li>
</ul>
<p style="text-align: justify;">Ubuntu suffers from some of the limitations mentioned earlier. Specifically, there are static IP injection problems with Network Manager, virtual fibre channel issues if LUN 0 isn’t populated (except for 12.04), and similar problems with live backups in 14.04+.</p>
<p style="text-align: justify;">It’s worth noting that most of these problems can be solved by proper configuration. It’s worth checking the TechNet <a href="https://learn.microsoft.com/en-us/windows-server/virtualization/hyper-v/Supported-Linux-and-FreeBSD-virtual-machines-for-Hyper-V-on-Windows" target="_blank" rel="nofollow noopener" title="Technet Documentation">documentation</a> for a full list of issues and solutions for each version. Microsoft also has some <a href="https://learn.microsoft.com/en-us/windows-server/virtualization/hyper-v/Best-Practices-for-running-Linux-on-Hyper-V" target="_blank" rel="nofollow noopener" title="Hyper-V Best Practices">best practices</a> for running Linux on Hyper-V.</p>
<h2><a name="hyper-v-scalability">Hyper-V Scalability</a></h2>
<p style="text-align: justify;">Other than OS and feature support, Hyper-V varies in its scalability. While we have mentioned some of the virtual hardware increases in Gen 2 VMs, there are other factors to consider too. Here are the maximum numbers for each virtual machine component:</p>
<ul>
<li><strong>Checkpoints: </strong>50</li>
<li><strong>Memory: </strong>12 TB for Gen 2, 1 TB for Gen 1</li>
<li><strong>Serial ports:</strong> 2</li>
<li><strong>Virtual Fibre Channel adapters: </strong>4</li>
<li><strong>Virtual Floppy devices: </strong>1</li>
<li><strong>Virtual hard disk capacity: </strong>64 TB VHDX, 2040 GB VHD</li>
<li><strong>Virtual IDE disks: </strong>4</li>
<li><strong>Virtual processors: </strong> 240 for Gen 2, 64 for Gen 1, 320 for host OS</li>
<li><strong>Virtual SCSI controllers: </strong>4</li>
<li><strong>Virtual SCSI disks:</strong> 256</li>
<li><strong>Virtual network adapters: </strong>12 (8 Hyper-V specific, 4 legacy)</li>
</ul>
<p style="margin-left: 0cm;">There are also some limitations for each Hyper-V host, though many components are uncapped:</p>
<ul>
<li><strong>Logical processors: </strong>512 (320 for host OS partition)</li>
<li><strong>Memory:</strong> 24 TB</li>
<li><strong>Virtual machines per server: </strong>1024</li>
<li><strong>Virtual processors per server:</strong> 2048</li>
</ul>
<p style="text-align: justify;">Finally, Hyper-V has some <strong>Failover Clustering</strong> maximums. There’s a maximum of <strong>64 nodes per cluster</strong>, so admins need to be aware of that when planning. There’s also an <strong>8,000 per cluster</strong> limit for running virtual machines. However, this can vary significantly depending on the use of physical memory by each VM, number of disk spindles, and networking and storage bandwidth.</p>
<h2>Summary</h2>
<p style="text-align: justify;">Windows Server 2016 takes many of the traditional advantages of virtualization and extends them. With its latest release, Microsoft has managed to provide major increases in performance, security, and management without complex system requirements or lack of OS support.</p>
<p style="text-align: justify;">The Redmond giant’s latest server OS brings huge improvements in the form of Nano Servers, Containers, Shielded VMs, and hardware virtualization. The result is an undeniably better operating system for hosting Hyper-V machines.</p>
<p style="text-align: justify;">However, there are still some possible issues admins should be aware of. Windows Server 2016 collects telemetry data by default, and there’s no option to turn it off entirely. It consists of security information, basic device information, how apps are used, and more. Naturally, all this data is anonymised and is used to create significant improvements. Still, some users may not be happy with this change from 2012 R2.</p>
<p style="text-align: justify;">Microsoft is moving to a different update model with 2016, which can be positive in some cases but negative in others. The company rolls out <strong>two updates per month</strong>, <strong>one with security fixes</strong> and another with <strong>quality fixes</strong>. Each falls on a different day of the month.</p>
<p style="text-align: justify;">On the plus side, this removes the issue of security updates being unnecessary once the quality update rolls out. The annoyance comes from the automatic updates and restarts that are enabled by default. Naturally, admins don’t want their server restarting without their express permission, and it’s not uncommon for updates to cause an issue with certain applications. Though this can be configured in 2016, it’s not as simple as previous versions.</p>
<p style="text-align: justify;">Despite this, Windows Server 2016 remains a huge step forward for Hyper-V virtualization. It introduces some great new virtualization features, and its fleshed out free version makes it a natural choice for small businesses.</p>]]></description>
			<category>Windows Servers</category>
			<pubDate>Fri, 10 Mar 2017 16:36:53 +1100</pubDate>
		</item>
		<item>
			<title>Windows Server 2016 VM Backup with Altaro's New VM Backup with Augmented Inline Deduplication</title>
			<link>https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-server-2016-vm-backup-altaro.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-server-2016-vm-backup-altaro.html</guid>
			<description><![CDATA[<p style="text-align: justify;"><a href="https://clixtrac.com/goto/?215955" target="_blank" rel="nofollow noopener" title="Windows Server 2016 VM Backup - Hyper-V &amp; VMware"><img src="https://www.firewall.cx/images/stories/windows-server-2016/altaro-vm-backup-v7.png" alt="Windows Server 2016 VM Hyper-V &amp; VMware Backup Restore" style="margin: 7px; float: left;" title="Windows Server 2016 VM Hyper-V &amp; VMware Backup Restore" /></a>Altaro has released <a href="http://clixtrac.com/goto/?215955" target="_blank" rel="nofollow noopener" title="Altaro VM Backup V7"><strong>Altaro VM Backup</strong></a>, a faster and lighter upgrade to its flagship <strong>Hyper-V</strong> and <strong>VMware backup solution</strong>, which now supports all <strong>Windows Server editions</strong> and includes several highly-requested features including unique <a href="https://clixtrac.com/goto/?215955" target="_blank" rel="nofollow noopener" title="Augmented Inline Deduplication"><strong>Augmented Inline Deduplication technology</strong></a> and <strong>boot from backup</strong>.</p>
<p style="text-align: justify;">Altaro’s unique <strong>Augmented Inline Deduplication</strong> delivers <strong>faster backups and restores</strong> on local and offsite locations by making sure that <strong>only new data</strong> is transferred to the backup or offsite location. This <strong>augmented inline deduplication technology</strong> solves a common problem found in conventional backup solutions which deduplicates data after the transfer process. With <strong>Altaro VM Backup</strong>, that process happens before the data is transferred. This process not only provides <strong>quicker backups</strong>, but it also <strong>reduces the amount of storage needed to store said backups</strong> significantly more than any other solution on the market today.</p>
<p style="text-align: justify;">"VM Backup is an important milestone at Altaro” said David Vella, CEO of Altaro. "Not only does it fully support all Windows Servers, our new and unique Augmented Inline Deduplication technology offers our customers the best storage savings in the industry"</p>
<p style="text-align: justify;"><strong>Boot from Backup</strong> is another innovation in <strong>Altaro VM Backup </strong>that enables users to <strong>instantly boot any VM version from the backup location</strong> without affecting integrity of the backup. If disaster strikes, the VM can be booted up instantly from the backup drive with minimal downtime, while the VM is restored back to the Hypervisor in the background. A simple VM reboot completes the recovery process and preserves any changes done while the VM was booted.</p>
<p style="text-align: justify;">For more information about <strong>Altaro VM Backup</strong>, visit <a href="https://clixtrac.com/goto/?215955" target="_blank" rel="nofollow noopener" title="Altaro VM Backup">altaro.com/vm-backup</a></p>]]></description>
			<category>Windows Servers</category>
			<pubDate>Sun, 22 Jan 2017 02:28:03 +1100</pubDate>
		</item>
		<item>
			<title>Windows Server 2016 Licensing Made Easy – Understand Your Licensing Requirements &amp; Different Server Editions</title>
			<link>https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-server-2016-licensing-model.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-server-2016-licensing-model.html</guid>
			<description><![CDATA[<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/windows-server-2016-licensing-model-1a.png" alt="Windows Server 2016 Licensing" style="display: block; margin-left: auto; margin-right: auto; margin-top: 7px; float: left;" title="Windows Server 2016 Licensing" />This article describes the new <strong>Windows Server 2016 Licensing</strong> model (per-core licensing) Microsoft has implemented for its new server-based operating system. While the <a href="https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-2012-editions-licensing.html" target="_blank" title="Windows Server 2012 Licensing">Windows Server 2012 Licensing</a> model was fairly straight forward: <strong>per CPU Pair + CALS/DAL</strong> for <strong>Standard</strong> and <strong>Datacenter editions</strong>, Microsoft has decided to change its licensing arrangements thanks to the continuously increasing number of available cores per physical processor which has caused significant losses to its profits.</p>
<p style="text-align: justify;">Taking into consideration that the <a href="http://ark.intel.com/products/93790/Intel-Xeon-Processor-E7-8890-v4-60M-Cache-2_20-GHz" target="_blank" rel="nofollow noopener" title="Intel Xeon E7-8890v4">Intel Xeon E7-8890v4</a> contains a total of <strong>24 cores</strong> capable of supporting up to 48 threads, one can quickly understand the software giant’s intention and why it is no longer continuing the <strong>per CPU Pair</strong> model for its <strong>Standard</strong> and <strong>Datacenter</strong> server editions.</p>
<h2 style="text-align: left;">Windows Server 2016 License Models</h2>
<p style="text-align: justify;">The <strong>Windows Server 2016 licensing model</strong> consists of <strong>per-core/processor</strong> + <strong>Client Access Licenses</strong> (<strong>CALs</strong>). Each user or device accessing a <strong>Windows Server Standard</strong>, <strong>Datacenter</strong> or <strong>Multipoint</strong> edition requires a <strong>Windows CAL</strong> or a <strong>Windows Server</strong> and a <strong>Remote Desktop Services</strong> (<strong>RDS</strong>) <strong>CAL</strong>.</p>
<p style="text-align: justify;">In addition to these changes many would be surprised to know that there is now a <strong>minimum number</strong> of <strong>Per-Core licenses</strong> required <strong>per physical CPU</strong> and <strong>Server</strong>:</p>
<ul>
<li>A <strong>minimum</strong> of <strong>8 core licenses</strong> is required for each <strong>physical CPU.</strong></li>
<li>A minimum of <strong>16 core licenses</strong> is required for <strong>each server</strong>.</li>
<li>A <strong>2-core license pack</strong> is the minimum amount of core licenses you can purchase. E.g you’ll need <strong>four 2-core license packs</strong> (4x2) to fully license an <strong>8-core CPU</strong>.</li>
<li>The <strong>2-core license</strong> is priced at <strong>1/8</strong> (one eighth) the price of a <strong>2-CPU license</strong> for corresponding <strong>Windows 2012 R2 editions</strong> in order to keep the pricing similar. This means the pricing of a <strong>16-core Windows 2016 Datacenter server</strong> is equal to a <strong>2-CPU Windows 2012 R2 Datacenter server</strong>.</li>
</ul>
<h2 style="text-align: left;">How Licensing Changes Affect Small Windows Server Deployments</h2>
<p style="text-align: justify;">Thankfully not much. Microsoft has adjusted its <strong>per-Core license pricing</strong> in such a way so that a small deployment of up to <strong>16-cores per physical server</strong> will be the same pricing as a <strong>Windows server 2012 2-CPU</strong> License.</p>
<p class="box-info" style="text-align: justify;"><a href="https://clixtrac.com/goto/?215955" target="_blank" rel="nofollow noopener" title="Backup Hyper-V and VMware Environments FREE!">Running Windows or Linux Server under ESX or Hyper-V? Get an award-winning backup solution for Free! Download Now!</a></p>
<p style="text-align: justify;">The price difference becomes apparent for larger customers with a server deployed that exceeds <strong>8-cores per CPU</strong> and <strong>16-cores per server</strong>. These customers will end up paying additional money for their licenses. For example a server with <strong>2 x Intel Xeon E7-8890v4 CPUs</strong> means a total of <strong>48 cores</strong>. Installing a Windows server 2012 Standard server means that the initial license will cover up to <strong>16</strong> out of the <strong>48 cores</strong> and the customer will need to purchase <strong>additional licenses</strong> to cover the <strong>32 extra cores</strong>! It’s now clear why big customers are going to be paying the big bucks!</p>
<p style="text-align: justify;">The following table explains where additional licenses are required depending on the number of CPUs (processors) and cores per CPU. Remember - <strong>Minimum 8 cores/processor</strong>; <strong>16 cores/server</strong>:</p>
<p><img src="https://www.firewall.cx/images/stories/windows-server-2016-licensing-model-1.png" alt="Windows Server 2016 Licensing: Calculating Licensing needs per CPU &amp; Core" style="display: block; margin-left: auto; margin-right: auto;" title="Windows Server 2016 Licensing: Calculating Licensing needs per CPU &amp; Core" /></p>
<p style="text-align: center;" align="center">Figure 1. Windows Server 2016 Licensing: Calculating Licensing needs per CPU &amp; Core</p>
<h2 style="text-align: left;">Windows Server 2016 Editions Overview, Licensing Models &amp; CAL Requirements</h2>
<p style="text-align: justify;">Microsoft offers its <strong>Windows Server 2016</strong> in <strong>6 different editions</strong>. Let’s take a look at them and explain their primary role and usage:</p>
<p style="text-align: justify;"><strong>Windows Server 2016 Datacenter</strong>: This edition targets highly virtualized datacenter and cloud environments. Main characteristics include its support for <strong>unlimited Hyper-V containers</strong> or <strong>Operating System Environments</strong> (OSEs or virtual machines). It also supports an <strong>unlimited number of Windows Server containers</strong> and boasts features such <strong>Host Guardian Service</strong>, <strong>Storage Spaces Direct</strong> and <strong>Storage Replica</strong>, <strong>Shielded Virtual Machines (VMs)</strong>, <strong>Networking stack</strong> and more.</p>
<p style="text-align: justify;"><strong>Windows Server 2016 Standard</strong>: Used for physical servers or environments with minimal virtualized requirements. This edition supports two <strong>Hyper-V containers</strong> or <strong>Operating System Environments</strong> (OSEs or virtual machines) alongside the <strong>Host Guardian Service</strong>.</p>
<p style="text-align: justify;">The <strong>Host Guardian Service</strong> is a <strong>server role</strong> introduced in <strong>Windows Server 2016</strong> and found on <strong>Windows Datacenter</strong> and <strong>Standard edition</strong>. It serves as a <strong>critical security component</strong> in protecting the transport key, and works in conjunction with other Windows Server 2016 components to ensure high security levels for <strong>Shielded VMs</strong>.</p>
<h2 style="text-align: center;" align="center"><img src="https://www.firewall.cx/images/stories/windows-server-2016-licensing-model-2.png" alt="Host Guardian Service helps ensure high security levels for Shielded VMs" style="display: block; margin-left: auto; margin-right: auto;" title="Host Guardian Service helps ensure high security levels for Shielded VMs" /></h2>
<p style="text-align: center;" align="center">Figure 2. Host Guardian Service helps ensure high security levels for Shielded VMs</p>
<p style="text-align: justify;"><strong>Windows Server 2016 Essentials</strong>: Ideal for small businesses with no more than <strong>25-30 users</strong> and <strong>50 devices</strong>. This edition is also a great replacement for businesses running <strong>Windows Server 2012 Foundation</strong> as the same edition is not available for Windows Server 2016.</p>
<p style="text-align: justify;"><strong>Windows Server 2016 MultiPoint Premium Server</strong>: Allows multiple users to share a single computer while having their own applications and Windows experience and is suitable for academic environments.</p>
<p style="text-align: justify;"><strong>Windows Storage Server 2016</strong>: Suitable for dedicated storage solutions. It’s available in <strong>Standard</strong> and <strong>Workgroup</strong> editions and mainly used by OEM manufactureres.</p>
<p style="text-align: justify;"><strong>Microsoft Hyper-V Server 2016</strong>: The well-known <strong>Free Hypervisor</strong> which you can download. This is a stand-alone product that runs directly on the bare-metal server and is built using the same technology as the <strong>Hyper-V role</strong> on a <strong>Windows Server 2016</strong>.</p>
<p class="box-download" style="text-align: left;"><a href="https://www.firewall.cx/downloads/windows-server-datasheets-a-useful-resources.html" target="_blank" title="Download Free Microsoft Windows Server 2016 Licensing Datasheet">Readers can also download here the Free Microsoft Windows Server 2012/2016 Licensing Datasheet that provides additional useful information.</a></p>
<p style="text-align: left;">The table below shows the <strong>licensing model</strong> adopted by each Windows Server 2016 edition:</p>
<center>
<table border="1" style="border-collapse: collapse; margin-left: 7.3pt; margin-right: 7.3pt; width: 648px; height: 125px;" cellspacing="0" cellpadding="0" align="left">
<tbody>
<tr>
<td style="width: 285px; border-width: 1pt medium 1pt 1pt; border-style: solid none solid solid; background: #5b9bd5; padding: 0cm 5.4pt;" valign="top">
<p style="margin-bottom: 0.0001pt; line-height: normal; text-align: center;"><strong><span style="color: white;">Editions</span></strong></p>
</td>
<td style="width: 241px; border-width: 1pt medium; border-style: solid none; background: #5b9bd5; padding: 0cm 5.4pt;" valign="top">
<p style="margin-bottom: 0.0001pt; text-align: center; line-height: normal;" align="center"><strong><span style="color: white;">Licensing Model</span></strong></p>
</td>
<td style="width: 263px; border-width: 1pt 1pt 1pt medium; border-style: solid solid solid none; background: #5b9bd5; padding: 0cm 5.4pt;" valign="top">
<p style="margin-bottom: 0.0001pt; text-align: justify; line-height: normal;"><strong><span style="color: white;">CAL Requirements</span></strong></p>
</td>
</tr>
<tr>
<td style="width: 285px; border-width: medium 1pt 1pt; border-style: none solid solid; background: #deeaf6; padding: 0cm 5.4pt;" valign="top">
<p style="margin-bottom: 0.0001pt; text-align: justify; line-height: normal;">Windows Server 2016 Datacenter</p>
</td>
<td style="width: 241px; border-width: medium 1pt 1pt medium; border-style: none solid solid none; background: #deeaf6; padding: 0cm 5.4pt;" valign="top">
<p style="margin-bottom: 0.0001pt; text-align: center; line-height: normal;" align="center">Core-based</p>
</td>
<td style="width: 263px; border-width: medium 1pt 1pt medium; border-style: none solid solid none; background: #deeaf6; padding: 0cm 5.4pt;" valign="top">
<p style="margin-bottom: 0.0001pt; text-align: justify; line-height: normal;">Windows Server CAL</p>
</td>
</tr>
<tr>
<td style="width: 285px; border-width: medium 1pt 1pt; border-style: none solid solid; padding: 0cm 5.4pt;" valign="top">
<p style="margin-bottom: 0.0001pt; text-align: justify; line-height: normal;">Windows Server 2016 Standard</p>
</td>
<td style="width: 241px; border-width: medium 1pt 1pt medium; border-style: none solid solid none; padding: 0cm 5.4pt;" valign="top">
<p style="margin-bottom: 0.0001pt; text-align: center; line-height: normal;" align="center">Core-based</p>
</td>
<td style="width: 263px; border-width: medium 1pt 1pt medium; border-style: none solid solid none; padding: 0cm 5.4pt;" valign="top">
<p style="margin-bottom: 0.0001pt; text-align: justify; line-height: normal;">Windows Server CAL</p>
</td>
</tr>
<tr>
<td style="width: 285px; border-width: medium 1pt 1pt; border-style: none solid solid; background: #deeaf6; padding: 0cm 5.4pt;" valign="top">
<p style="margin-bottom: 0.0001pt; text-align: justify; line-height: normal;">Windows Server 2016 Essentials</p>
</td>
<td style="width: 241px; border-width: medium 1pt 1pt medium; border-style: none solid solid none; background: #deeaf6; padding: 0cm 5.4pt;" valign="top">
<p style="margin-bottom: 0.0001pt; text-align: center; line-height: normal;" align="center">Processor-based</p>
</td>
<td style="width: 263px; border-width: medium 1pt 1pt medium; border-style: none solid solid none; background: #deeaf6; padding: 0cm 5.4pt;" valign="top">
<p style="margin-bottom: 0.0001pt; text-align: justify; line-height: normal;">No CAL Required</p>
</td>
</tr>
<tr>
<td style="width: 285px; border-width: medium 1pt 1pt; border-style: none solid solid; padding: 0cm 5.4pt;" valign="top">
<p style="margin-bottom: 0.0001pt; line-height: normal; text-align: left;">Windows Server 2016 MultiPoint Premium</p>
</td>
<td style="width: 241px; border-width: medium 1pt 1pt medium; border-style: none solid solid none; padding: 0cm 5.4pt;" valign="top">
<p style="margin-bottom: 0.0001pt; text-align: center; line-height: normal;" align="center">Processor-based</p>
</td>
<td style="width: 263px; border-width: medium 1pt 1pt medium; border-style: none solid solid none; padding: 0cm 5.4pt;" valign="top">
<p style="margin-bottom: 0.0001pt; line-height: normal;">Windows Server CAL + Remote Desktop Services CAL</p>
</td>
</tr>
<tr>
<td style="width: 285px; border-width: medium 1pt 1pt; border-style: none solid solid; background: #deeaf6; padding: 0cm 5.4pt;" valign="top">
<p style="margin-bottom: 0.0001pt; text-align: justify; line-height: normal;">Windows Storage Server 2016</p>
</td>
<td style="width: 241px; border-width: medium 1pt 1pt medium; border-style: none solid solid none; background: #deeaf6; padding: 0cm 5.4pt;" valign="top">
<p style="margin-bottom: 0.0001pt; text-align: center; line-height: normal;" align="center">Processor-based</p>
</td>
<td style="width: 263px; border-width: medium 1pt 1pt medium; border-style: none solid solid none; background: #deeaf6; padding: 0cm 5.4pt;" valign="top">
<p style="margin-bottom: 0.0001pt; text-align: justify; line-height: normal;">No CAL Required</p>
</td>
</tr>
<tr>
<td style="width: 285px; border-width: medium 1pt 1pt; border-style: none solid solid; padding: 0cm 5.4pt;" valign="top">
<p style="margin-bottom: 0.0001pt; text-align: justify; line-height: normal;">Hyper-V Server 2016</p>
</td>
<td style="width: 241px; border-width: medium 1pt 1pt medium; border-style: none solid solid none; padding: 0cm 5.4pt;" valign="top">
<p style="margin-bottom: 0.0001pt; text-align: center; line-height: normal;" align="center">N/A</p>
</td>
<td style="width: 263px; border-width: medium 1pt 1pt medium; border-style: none solid solid none; padding: 0cm 5.4pt;" valign="top">
<p style="margin-bottom: 0.0001pt; text-align: center; line-height: normal;" align="center">N/A</p>
</td>
</tr>
</tbody>
</table>
</center>
<p style="text-align: center;" align="center">&nbsp;</p>
<p style="text-align: center;" align="center">&nbsp;</p>
<p style="text-align: center;" align="center">&nbsp;</p>
<p style="text-align: center;" align="center">&nbsp;</p>
<p style="text-align: center;" align="center">&nbsp;</p>
<p style="text-align: center;" align="center">&nbsp;</p>
<p style="text-align: center;" align="center">&nbsp;Table 1. Windows Server 2016 Editions and Licensing Models</p>
<h2 style="text-align: left;"><strong>Summary</strong></h2>
<p style="text-align: justify;">With <strong>Windows Server 2016</strong> out it’s only a matter of time before organizations begin to upgrade their servers and use it for new rollouts. Understanding the <strong>Windows Server 2016 Licensing model</strong> and <strong>server editions</strong> is critical to ensuring the right choices are made based on the organization’s requirements and server hardware availability. The new <strong>Windows Server core-based licensing</strong> can be slightly tricky so make sure you know your hardware and license theory well!</p>]]></description>
			<category>Windows Servers</category>
			<pubDate>Sun, 27 Nov 2016 13:33:26 +1100</pubDate>
		</item>
		<item>
			<title>Windows 2016 Server Licensing Explained – Free Webinar</title>
			<link>https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-server-2016-licensing-webinar.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-server-2016-licensing-webinar.html</guid>
			<description><![CDATA[<p style="text-align: justify;"><a href="https://clixtrac.com/goto/?238368" target="_blank" rel="nofollow noopener" title="Windows 2016 Server Licensing"><img src="https://www.firewall.cx/images/stories/windows-server-2016-licensing-webinar-1.jpg" alt="Windows Server 2016 Licensing" style="margin: 7px; float: left;" title="Windows Server 2016 Licensing" /></a>With <strong>Windows 2016 Server</strong> already making its way into data centers <strong>Windows 2016 Server Licensing </strong>is becoming a very hot topic. Windows 2016 Server is jam-packed with a number of advanced features including added layer of security, new deployment options, built-in Hyper-V containers, advanced networking options and cloud-ready services.</p>
<p class="box-info" style="text-align: justify;"><a href="https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-server-2016-licensing-model.html" target="_blank" title="Windows Server 2016 Licensing &amp; Server Editions">Check out our "Windows Server 2016 Licensing Made Easy – Understand Your Licensing Requirements &amp; Different Server Editions" article</a></p>
<p style="text-align: justify;">Altaro software, a reputable software vendor offering robust <strong>Virtualization Backup for Hyper-V &amp; VMware</strong>,is hosting a <strong>free Webinar</strong> on <strong>Tuesday the 29<sup>th</sup> of November 2016</strong> that will cover the following important topics:</p>
<ul>
<li>Licensing a Windows 2016 Server environment</li>
<li>Nested Hypervisors and containers in Windows 2016 Server</li>
<li>Understanding Licensing complexity</li>
</ul>
<p class="box-hint" style="text-align: justify;"><a href="https://clixtrac.com/goto/?238368" target="_blank" rel="nofollow noopener" title="Windows 2016 Server Licensing">While this event has passed, it is still available as a recorded session alongside with all material available as a free download. There is also a bonus Windows 2016 Server Licensing eBook available for free! Click here to access all resources!</a></p>
<p>&nbsp;</p>]]></description>
			<category>Windows Servers</category>
			<pubDate>Fri, 25 Nov 2016 16:44:00 +1100</pubDate>
		</item>
		<item>
			<title>Windows Server 2016 – Hyper-V Virtualization Update</title>
			<link>https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-server-2016-new-hyper-v-virtualization-features.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-server-2016-new-hyper-v-virtualization-features.html</guid>
			<description><![CDATA[<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/windows-server-2016-new-hyper-v-virtualization-features-1.png" alt="windows-server-2016-new-hyper-v-virtualization-features-1" style="margin: 7px; float: left;" title="Windows 2016 Hyper-V Virtualization Features" />The <strong>new Hyper-V virtualization features</strong> offered by <strong>Windows Server 2016</strong> are planning to make major changes in the virtualization market. From <strong>Nested Hyper-V</strong>, <strong>revolutionary security</strong>, <strong>new management options</strong> to <strong>service availability</strong>, <strong>storage</strong> and more.</p>
<p style="text-align: justify;">Learn all about the new <strong>hot virtualization features</strong> offered by <strong>Windows Server 2016</strong> by attending the free webinar hosted by <strong>Altaro</strong> and presented by two Microsoft Cloud and Datacenter Managerment MVP’s Andy Syrewicze and Aidan Finn.</p>
<p style="text-align: justify;"><a href="https://clixtrac.com/goto/?229236" target="_blank" rel="nofollow noopener" title="Free Windows 2016 Hyper-V Virtualization Webinar">To learn more about the free webinar and register click here</a>.</p>
<p class="box-hint">Note: While this webinar's date has passed, a complete recording is available, at the above url, alongside with all free downloadable material presented.</p>
<p>&nbsp;</p>]]></description>
			<category>Windows Servers</category>
			<pubDate>Mon, 13 Jun 2016 17:18:03 +1000</pubDate>
		</item>
		<item>
			<title>Windows 2012 Server NIC Teaming – Load Balancing/Failover (LBFO) and Cisco Catalyst EtherChannel LACP Configuration &amp; Verification</title>
			<link>https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-server-nic-teaming-load-balancing-failover-lacp.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-server-nic-teaming-load-balancing-failover-lacp.html</guid>
			<description><![CDATA[<p style="text-align: justify;"><strong>NIC Teaming</strong>, also known as <strong>Windows Load Balancing</strong> or <strong>Failover</strong> (<strong>LBFO</strong>), is an extremely useful feature supported by <strong>Windows Server 2012</strong> that allows the <strong>aggregation of multiple network interface cards</strong> to one or more virtual network adapters. This enables us to <strong>combine the bandwidth</strong> of every physical <strong>network card</strong> into the virtual network adapter, creating a single large network connection from the server to the network. Apart from the increased bandwidth, NIC Teaming offers additional advantages such as: Load balancing, redundant links to our network and failover capabilities.</p>
<p class="box-info" style="text-align: justify;"><a href="https://clixtrac.com/goto/?215955" target="_blank" rel="nofollow noopener" title="Backup Hyper-V and VMware Environments FREE!">Running Windows or Linux Server under ESX or Hyper-V? Get an award-winning backup solution for Free! Download Now!</a></p>
<p style="text-align: justify;">Windows Hyper-V is also capable of taking advantage of NIC Teaming, which further increases the reliability of our virtualization infrastructure and the bandwidth available to our VMs.</p>
<p><img src="https://www.firewall.cx/images/stories/windows-server-nic-teaming-load-balancing-failover-lacp-1.png" alt="windows-server-nic-teaming-load-balancing-failover-lacp-1" style="display: block; margin-left: auto; margin-right: auto;" title="Windows 2012 Server – Hyper-V NIC Teaming with Cisco Catalyst Switch" /></p>
<p style="text-align: center;" align="center">Figure 1. Windows 2012 Server – Hyper-V NIC Teaming with Cisco Catalyst Switch</p>
<p style="text-align: justify;">There are two basic NIC Teaming configurations: <strong>switch-independent teaming</strong> &amp; <strong>switch-dependent teaming</strong>. Let’s take a look at each configuration and its advantages.</p>
<h2 style="text-align: justify;">Switch-Independent Teaming</h2>
<p style="text-align: justify;">Switch-independent teaming offers the advantage of not requiring the switch to participate in the NIC Teaming process. Network cards from the server can connect to different switches within our network.</p>
<p style="text-align: justify;"><strong>Switch-independent teaming</strong> is preferred when bandwidth isn’t an issue and we are mostly interested in creating a fault tolerant connection by placing a team member into standby mode so that when one network adapter or link fails, the standby network adapter automatically takes over. When a failed network adapter returns to its normal operating mode, the standby member will return to its standby status.</p>
<p style="text-align: justify;"><strong>Switch-dependent teaming</strong> requires the switch to participate in the teaming process, during which Windows Server 2012 negotiates with the switch creating one virtual link that aggregates all physical network adapters’ bandwidth. For example, a server with four 1Gbps network cards can be configured to create a single 4Gbps connection to the network.</p>
<p style="text-align: justify;">Switch-dependent teaming supports two different modes: <strong>Generic or Static Teaming</strong> (<strong>IEEE 802.3ad</strong>) and <strong>Link Aggregation Control Protocol Teaming</strong> (<strong>IEEE 802.1ax, LACP</strong>). LACP is the default mode in which Windows NIC Teaming always operates.</p>
<h2 style="text-align: justify;">Load Balancing Mode - Load Distribution Algorithms</h2>
<p style="text-align: justify;"><strong>Load distribution algorithms</strong> are used to distribute outbound traffic amongst all available physical links, avoiding bottlenecks while at the same time utilizing all links. When configuring NIC Teaming in Windows Server 2012, we are required to select the required Load Balancing Mode that makes use of one of the following load distribution algorithms:</p>
<p style="text-align: justify;"><strong>Hyper-V</strong><strong> Switch Port</strong>: Used primarily when configuring NIC Teaming within a Hyper-V virtualized environment. When <strong>Virtual Machine Queues</strong> (VMQs) are used a queue can be placed on the specific network adapter where the traffic is expected to arrive thus providing greater flexibility in virtual environments.</p>
<p style="text-align: justify;"><strong>Address Hashing</strong>: This algorithm creates a hash based on one of the characteristics listed below and then assigns it to available network adapters to efficiently load balance traffic:</p>
<ul>
<li>Source and Destination TCP ports plus Source and Destination IP addresses</li>
<li>Source and Destination IP addresses only</li>
<li>Source and Destination MAC addresses only
<ul>
<li>Distributes outgoing traffic based on a hash of the TCP Ports and IP addresses with real-time rebalancing allowing flows to move backward and forward between networks adapters that are part of the same group.</li>
<li>Inbound traffic is distributed similar to the Hyper-V port algorithm</li>
</ul>
</li>
</ul>
<p style="text-align: justify;"><strong>Dynamic</strong>: The <strong>Dynamic algorithm</strong> combines the best aspects of the two previous algorithms to create an effective load balancing mechanism. Here’s what it does:</p>
<p style="text-align: justify;">The <strong>Dynamic algorithm</strong> is the preferred <strong>Load Balancing Mode</strong> for Windows 2012 and the one we are covering in this article.</p>
<p class="box-info" style="text-align: justify;"><a href="https://www.firewall.cx/operating-systems/microsoft/windows-servers.html" target="_blank" title="More Windows Server technical articles">Click here for more teachnical articles covering Windows Server</a></p>
<h2 style="text-align: justify;">Configuring NIC Teaming in Windows Server 2012</h2>
<p style="text-align: justify;">In this example, we’ll be teaming two 100Mbps network adapters on our server. Both network adapters are connected to the same switch and configured with an IP address within the same subnet 192.168.10.0/24.</p>
<p style="text-align: justify;">To begin, open <strong>Server Manager</strong> and locate the <strong>NIC Teaming</strong> section under <strong>Local Server</strong>:</p>
<p><img src="https://www.firewall.cx/images/stories/windows-server-nic-teaming-load-balancing-failover-lacp-2.png" alt="Locating NIC Teaming section in Server Manager Windows 2012 Server" style="display: block; margin-left: auto; margin-right: auto;" title="Locating NIC Teaming section in Server Manager Windows 2012 Server" /></p>
<p style="text-align: center;">Figure 2. Locating NIC Teaming section in Server Manager Windows 2012 Server</p>
<p style="text-align: justify;">The lower right section of the NIC Teaming window displays the available network adapters that can be assigned to a new team. In our case these are two 100Mbps Ethernet adapters.</p>
<p style="text-align: justify;">From the <strong>TEAM area</strong>, select <strong>Tasks</strong> and then <strong>New Team</strong> from the dropdown menu to create a new NIC Team:</p>
<p style="text-align: center;" align="center"><img src="https://www.firewall.cx/images/stories/windows-server-nic-teaming-load-balancing-failover-lacp-3.png" alt="Creating a new NIC Team in Windows Server 2012" style="display: block; margin-left: auto; margin-right: auto;" title="Creating a new NIC Team in Windows Server 2012" /> Figure 3. Creating a new NIC Team in Windows Server 2012</p>
<p style="text-align: justify;">At the <strong>NIC Teaming</strong> window select the adapters to be part of the new NIC Team. Ensure <strong>Teaming mode</strong> is set to the desired mode (<strong>LACP</strong> in our case) and <strong>Load balancing mode</strong> is set to <strong>Dynamic</strong>. The <strong>Standby Adapter</strong> option will be available when more than two network adapters are available for teaming. Optionally we can give the new NIC Team a unique name or leave it as is.</p>
<p style="text-align: justify;">Finally, we can select the default VLAN under the <strong>Primary Team Interface</strong> option (not shown below). When ready, <strong>click</strong> on <strong>OK</strong> to save the configuration and create the NIC Team:</p>
<p style="text-align: center;" align="center"><img src="https://www.firewall.cx/images/stories/windows-server-nic-teaming-load-balancing-failover-lacp-4.png" alt="Configuring Teaming Mode, Load Balancing Mode and NIC Team members" style="display: block; margin-left: auto; margin-right: auto;" title="Configuring Teaming Mode, Load Balancing Mode and NIC Team members" /> Figure 4. Configuring Teaming Mode, Load Balancing Mode and NIC Team members</p>
<p style="text-align: justify;">Notice how the <strong>State</strong> of each network adapter is reported as <strong>Active</strong> – this indicates the adapter is correctly functioning as a member of the NIC Team.</p>
<p style="text-align: justify;">When the new NIC Team window disappears we are brought back to the <strong>NIC Teaming window</strong> where Windows Server 2012 reports the NIC Teams currently configured, <strong>speed</strong>, <strong>status</strong>, <strong>Teaming Mode</strong> and <strong>Load Balancing mode</strong>:</p>
<p style="text-align: center;" align="center"><img src="https://www.firewall.cx/images/stories/windows-server-nic-teaming-load-balancing-failover-lacp-5.png" alt="Viewing NIC Teams, their status, speed, Teaming mode, Load balancing mode and more" style="display: block; margin-left: auto; margin-right: auto;" title="Viewing NIC Teams, their status, speed, Teaming mode, Load balancing mode and more" /> Figure 5. Viewing NIC Teams, their status, speed, Teaming mode, Load balancing mode and more</p>
<p style="text-align: justify;">As mentioned earlier, NIC Teaming creates a virtual adapter that combines the speed of all network adapters that are part of the NIC Team. As we can see below, Windows Server has created a <strong>200Mbps network adapter</strong> named <strong>Team-1</strong>:</p>
<p style="text-align: center;" align="center"><img src="https://www.firewall.cx/images/stories/windows-server-nic-teaming-load-balancing-failover-lacp-6.png" alt="The newly created NIC Team Adapter in Windows 2012 Server" style="display: block; margin-left: auto; margin-right: auto;" title="The newly created NIC Team Adapter in Windows 2012 Server" /> Figure 6. The newly created NIC Team Adapter in Windows 2012 Server</p>
<p style="text-align: justify;">We should note that the MAC address used by the virtual adapter will usually be the MAC address from either physical network adapters.</p>
<p class="box-info" style="text-align: justify;"><a href="https://clixtrac.com/goto/?215955" target="_blank" rel="nofollow noopener" title="Backup Hyper-V and VMware Environments FREE!">Free Virtualization Backup with Award Winning Altaro Backup - Free Download Now!</a></p>
<h2 style="text-align: justify;">Cisco Catalyst Switch Configuration</h2>
<p style="text-align: justify;">Depending on the type of NIC Teaming selected, the switch attached to the server might need to be configured. Cisco Catalyst switches fully support NIC Teaming and other types of link aggregation technologies through the use of <strong>EtherChannel</strong>. Cisco Catalyst provides support of the <strong>Link Aggregation Control Protocol</strong> (<strong>LACP</strong>) which also happens to be the default aggregation protocol when configuring EtherChannel.</p>
<p class="box-info" style="text-align: justify;">More Information on <a href="https://www.firewall.cx/cisco/cisco-switches.html" target="_blank" title="Cisco Switches and configuration articles">Cisco Switches and configuration articles</a> can be found in our dedicated <a href="https://www.firewall.cx/cisco/cisco-switches.html" target="_blank" title="Cisco Switches and configuration articles">Cisco Switches section</a></p>
<p style="text-align: justify;">Create the Etherchannel interface by dedicating an equal number of switch ports to that of the physical network adapters participating in the NIC Teaming. In our example, we’ve got two network adapters so we’ll be using two switch ports.</p>
<p style="text-align: justify;">Configure both switch ports to be part of <strong>Channel-Group 1</strong> and set it to <strong>active mode</strong>. The Port-Channel interface will be configured in <strong>Trunk mode</strong> for our example:</p>
<div class="box-content"><strong>interface Port-channel1</strong>
<div><strong>switchport mode trunk</strong></div>
<div><strong>switchport trunk native vlan 20</strong></div>
<div>!</div>
<div><strong>interface FastEthernet1/0/1</strong></div>
<div><strong>switchport mode trunk</strong></div>
<div><strong>channel-group 1 mode active</strong></div>
<div><strong>switchport trunk native vlan 20</strong></div>
<div>!</div>
<div><strong>interface FastEthernet1/0/2</strong></div>
<div><strong>switchport mode trunk</strong></div>
<div><strong>channel-group 1 mode active</strong></div>
<div><strong>switchport trunk native vlan 20</strong></div>
</div>
<p>Note: First create the Port-Channel interface and assign the physical interfaces to it using the <strong>channel-group 1 mode active</strong> command. After that, any commands entered under the <strong>Port-Channel interface</strong> will automatically be replicated to all port members (FastEthernet 1/0/1 &amp; 1/0/2 in our example).</p>
<p style="text-align: justify;">In case <a href="https://www.firewall.cx/networking/vlan-networks.html" target="_blank" title="VLAN Trunking support"><strong>VLAN Trunking support</strong></a> is required, do not forget to use the <strong>switchport mode trunk</strong> command to enable trunking and then <strong>switchport trunk native vlan X</strong> to configure the native VLAN for the EtherChannel, replacing <strong>X</strong> with the necessary vlan number.</p>
<p class="box-info" style="text-align: justify;">Additional Information: <a href="https://www.firewall.cx/cisco/cisco-switches/cisco-switches-basic-advanced-configuration.html" target="_blank" title="Configure VLANs and InterVLAN Routing on Cisco Catalyst switches">Configure VLANs and InterVLAN Routing on Cisco Catalyst switches</a></p>
<p style="text-align: justify;">At this point, we are able to connect our server to the network. The <strong>show interface port-channel 1</strong> command will provide a plethora of information about our <strong>Port-Channel</strong>, including bandwidth, interface members and other useful information:</p>
<div class="box-content" style="margin-bottom: 0.0001pt; text-align: justify;">FCX-3750-S# <strong><strong>show interface port-channel 1</strong></strong>
<div style="margin-bottom: 0.0001pt; text-align: justify;">&nbsp;</div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">Port-channel1 is up, line protocol is up (connected)</div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">Hardware is EtherChannel, address is 0015.627a.1585 (bia 0015.627a.1585)</div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">MTU 1500 bytes, <strong>BW 200000 Kbit</strong>, DLY 100 usec,</div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">&nbsp;&nbsp;&nbsp;&nbsp; reliability 255/255, txload 1/255, rxload 1/255</div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">Encapsulation ARPA, loopback not set</div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">Keepalive set (10 sec)</div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">Full-duplex, 200Mb/s, link type is auto, media type is unknown</div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">input flow-control is off, output flow-control is unsupported</div>
<div style="margin-bottom: 0.0001pt; text-align: justify;"><strong> Members in this channel: Fa1/0/1 Fa1/0/2 </strong></div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">ARP type: ARPA, ARP Timeout 04:00:00</div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">Last input never, output 00:00:01, output hang never</div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">Last clearing of "show interface" counters never</div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">Input queue: 0/75/0/0 (size/max/drops/flushes); Total output drops: 0</div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">Queueing strategy: fifo</div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">Output queue: 0/40 (size/max)</div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">5 minute input rate 0 bits/sec, 0 packets/sec</div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">5 minute output rate 7000 bits/sec, 7 packets/sec</div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">&nbsp;&nbsp;&nbsp;&nbsp; 9521 packets input, 7321804 bytes, 0 no buffer</div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">&nbsp;&nbsp;&nbsp;&nbsp; Received 3599 broadcasts (1623 multicasts)</div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">&nbsp;&nbsp;&nbsp;&nbsp; 0 runts, 0 giants, 0 throttles</div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">&nbsp;&nbsp;&nbsp;&nbsp; 0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored</div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">&nbsp;&nbsp;&nbsp;&nbsp; 0 watchdog, 1623 multicast, 0 pause input</div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">&nbsp;&nbsp;&nbsp;&nbsp; 0 input packets with dribble condition detected</div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">&nbsp;&nbsp;&nbsp;&nbsp; 12038 packets output, 1875191 bytes, 0 underruns</div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">&nbsp;&nbsp;&nbsp;&nbsp; 0 output errors, 0 collisions, 2 interface resets</div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">&nbsp;&nbsp;&nbsp;&nbsp; 0 babbles, 0 late collision, 0 deferred</div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">&nbsp;&nbsp;&nbsp;&nbsp; 0 lost carrier, 0 no carrier, 0 PAUSE output</div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">&nbsp;&nbsp;&nbsp;&nbsp; 0 output buffer failures, 0 output buffers swapped out</div>
</div>
<p style="margin-bottom: 0.0001pt; text-align: justify;">The <strong>show Etherchannel 1 summary</strong> command provides additional information, including the aggregation protocol used, port members, their status and more:</p>
<div class="box-content" style="margin-bottom: 0.0001pt; text-align: justify;">FCX-3750-S# <strong><strong>show etherchannel 1 summary</strong></strong>
<div style="margin-bottom: 0.0001pt; text-align: justify;">&nbsp;</div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">Flags: D - down&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; P - bundled in port-channel</div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; I - stand-alone s - suspended</div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; H - Hot-standby (LACP only)</div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; R - Layer3&nbsp;&nbsp;&nbsp;&nbsp; S - Layer2</div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; U - in use&nbsp;&nbsp;&nbsp;&nbsp; f - failed to allocate aggregator</div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; M - not in use, minimum links not met</div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; u - unsuitable for bundling</div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; w - waiting to be aggregated</div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; d - default port</div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">Number of channel-groups in use: 1</div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">Number of aggregators:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 1</div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">Group&nbsp;&nbsp;&nbsp;&nbsp; Port-channel&nbsp; &nbsp;&nbsp;&nbsp;&nbsp; Protocol&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Ports</div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">------+------------------+------------+------------------------</div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">1&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Po1(SU)&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; LACP&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Fa1/0/1(P) Fa1/0/2(P)</div>
</div>
<p style="text-align: justify;">This article covered <strong>Windows Server NIC Teaming</strong> and explained the different type of NIC Teaming, <strong>protocols involved</strong>, <strong>load &amp; balancing distribution algorithms</strong>, configuration of Windows 2012 Server plus configuration of <strong>Cisco Catalyst switch configuration</strong>. To read more on Cisco switches, make sure you visit our <a href="https://www.firewall.cx/cisco.html" target="_blank" title="Cisco Technical Knowledgebase">Cisco Technical Knowledgebase</a> which contains technical articles on Cisco switches, routers, firewalls and IP Telephony.</p>]]></description>
			<category>Windows Servers</category>
			<pubDate>Tue, 03 May 2016 00:59:23 +1000</pubDate>
		</item>
		<item>
			<title>The Importance of a Comprehensive Backup Strategy for Physical and Virtual Servers</title>
			<link>https://www.firewall.cx/operating-systems/microsoft/windows-servers/comprehensive-backup-strategy-physical-virtual-servers.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/operating-systems/microsoft/windows-servers/comprehensive-backup-strategy-physical-virtual-servers.html</guid>
			<description><![CDATA[<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/comprehensive-backup-strategy-physical-virtual-servers.jpg" alt="comprehensive-backup-strategy-physical-virtual-servers" width="215" height="118" style="margin: 7px; float: left;" title="Physical and Virtual Server Backup" />People and companies usually adopt a <strong>backup strategy</strong> suited to the needs of their working environment. As such, there is no absolute right or wrong method of backing up data however in order to <strong>backup</strong> and <strong>restore data</strong> swiftly and easily a <strong>comprehensive strategy</strong> is necessary, even though most <strong>virtualized platforms</strong> such as <strong>Hyper-V</strong> and <strong>VMware</strong> offer built-in backup-like features such as snapshots or ability to copy a whole <strong>virtual machine</strong> to another location.</p>
<p style="text-align: justify;">Broadly, this encompasses four rules which we've briefly outlined below:</p>
<ul class="check" style="text-align: justify;">
<li>Backups must be performed automatically</li>
<li>Backups must have redundancy</li>
<li>A copy of the backup must be available offsite</li>
<li>Backups must be regularly tested</li>
<li>Usage of high-quality backup applications for Virtualized environments e.g <a href="https://clixtrac.com/goto/?215955" target="_blank" rel="noopener" title="VM Backup">VM Backup</a></li>
</ul>
<p class="box-info" style="text-align: justify;"><a href="https://clixtrac.com/goto/?215955" target="_blank" rel="nofollow noopener" title="Backup Hyper-V and VMware Environments FREE!">Running Windows or Linux Server under ESX or Hyper-V? Get an award-winning backup solution for Free! Download Now!</a></p>
<p style="text-align: justify;">Most often, people will not remember to take backups on time. They may keep deferring the task because of laziness, oversight or work pressure. Whatever the cause, it defeats the very purpose of backing up. Therefore, a backup solution that automates the task is essential. Simply configure it once and let it take backups at regular intervals.</p>
<p style="text-align: justify;">Although backing up is essential and one backup is better than not backing up at all, there remains the risk of that single backup failing at the time of need. Therefore, your strategy must include having two different types of backup. Another advantage of this is you have greater flexibility when restoring data.</p>
<p style="text-align: justify;">Unexpected events can lead to data loss at any time. Fire, floods, theft, power surge, lightning strikes and so many other things can play havoc with the best laid plans. If your systems and backups are at the same location, you are most likely to lose both. As a contingency measure, you must keep a copy of the backup at a site physically and geographically separated from your primary workplace. Accomplishing offsite backups is simple with automatic cloud backup services that also allow automated updating.</p>
<p style="text-align: justify;">Your backups are stored on physical devices that can also fail. Testing them regularly is one way to avoid unpleasant surprises when you need them most. Have a backup verification day, at least once every few months, to test and verify the integrity of the drive. Essentially, you need to ensure it is possible to restore files and, in case of clone backups, boot from the drive.</p>
<h2 style="text-align: justify;">Full Backup</h2>
<p style="text-align: justify;">A full backup creates an image file containing all disk sectors with data from within the operating system. Although the simplest form of backup, it is the least flexible, most time consuming and a hugely space-intensive method. Full backups are usually done about once a week as part of an overall backup plan, such as after a major operating system upgrade or software install.</p>
<h2 style="text-align: justify;">Differential Backup</h2>
<p style="text-align: justify;">Typically, only a very small percentage of the information in a partition or disk changes daily or weekly, therefore it is enough to back up only the data that has changed. You are doing a differential backup if you are backing up only the files that have changed since the last full backup. Differential backups are faster and more flexible than full backups because of the lower amount of data involved. However, the amount of data being backed up grows with each differential backup. That makes it unwieldy to create more than one differential backup a day.</p>
<h2 style="text-align: justify;">Incremental Backup</h2>
<p style="text-align: justify;">You are doing an incremental backup if you are backing up only the data that changed since the last backup – whether full or incremental. Therefore, the shorter the time interval between incremental backups, the lower the amount of data to be backed up – you may backup hourly or even more frequently, depending on the importance of your work. Although incremental backups are the most flexible and granular of the three methods, restoring from incremental backups takes longer.</p>
<h2 style="text-align: justify;">Backing up Virtual Machines</h2>
<p style="text-align: justify;">While most companies have moved to a virtualized environments, the above backup methods are quickly being replaced by smarter and more efficient backup strategies. For example, <a href="https://clixtrac.com/goto/?215955" target="_blank" rel="nofollow noopener" title="Free Virtual Machine Backup">VM backup software</a>, free for two VMs, supports both Hyper-V and VMware and offers complete backup and restore functionality with the click of only a few buttons. It’s advanced backup algorithms and smart design makes backing up and restoring virtual machines or individual files/folders a very simple process.</p>]]></description>
			<category>Windows Servers</category>
			<pubDate>Tue, 22 Mar 2016 23:08:44 +1100</pubDate>
		</item>
		<item>
			<title>Free Webinar: Troubleshooting &amp; Fixing Microsoft Hyper-V Hosts &amp; Clusters</title>
			<link>https://www.firewall.cx/operating-systems/microsoft/windows-servers/free-webinar-troubleshooting-hyper-v.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/operating-systems/microsoft/windows-servers/free-webinar-troubleshooting-hyper-v.html</guid>
			<description><![CDATA[<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/free-webinar-troubleshooting-hyper-v-1.png" alt="free-webinar-troubleshooting-hyper-v-1" style="margin: 7px; float: left;" title="Free Hyper-V Webinar" />Users working with <strong>Hyper-V Virtualization</strong> would be interested to know that <strong>Altaro</strong> is hosting a free webinar on the 25th of February 2016 at 4pm CET / 10am EST. Microsoft Cloud and Datacenter Management MVPs Didier Van Hoye and Andy Syrewicze will be <strong>answering questions</strong> on <strong>how to fix a broken Hyper-V Host</strong> or <strong>Hyper-V Cluster</strong> and will also be sharing some tales from the trenches.</p>
<p style="text-align: justify;"><a href="https://clixtrac.com/goto/?220731" target="_blank" rel="nofollow noopener" title="Free Hyper-V Troubleshooting Webinar">Don't miss out on this exclusive Hyper-V webinar and make sure you grab your free copy of Altaro's Hyper-V &amp; VMware backup software!</a></p>
<p>&nbsp;</p>
<p class="box-hint">Note: While this event's date has passed, you can access the recorded version while also download all material provided. Simply follow the above link to access it.</p>]]></description>
			<category>Windows Servers</category>
			<pubDate>Tue, 16 Feb 2016 22:36:53 +1100</pubDate>
		</item>
		<item>
			<title>How to Easily Change Network Card Profile / Network Location (Private or Public) on Windows Server 2012 R2</title>
			<link>https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-server-2012-change-network-card-profile-between-private-public.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-server-2012-change-network-card-profile-between-private-public.html</guid>
			<description><![CDATA[<p style="text-align: justify;"><strong>Network Location Awareness</strong> (<strong>NLA</strong>) is a feature offered on <strong>Windows Server 2012 R2</strong> and all Windows workstation editions from <strong>Windows 8.1</strong> and above, including <strong>Windows 10</strong>. When <strong>connecting to a network</strong> (<strong>LAN</strong> or <strong>Wireless</strong>) it is often <strong>misidentified</strong> as a <strong>Public network</strong> instead of a <strong>Private network</strong> or vice versa. The same problem is also seen when adding an <strong>additional network card</strong> to a Windows 2012 server. This article explains how to use <strong>Windows PowerShell</strong> to <strong>quickly change</strong> any <strong>Network Card identification</strong> between a <strong>Public</strong> or <strong>Private Network</strong> and ensure the correct <strong>Firewall rules</strong> are applied (if in use).</p>
<p style="text-align: justify;">The screenshot below shows our Windows 2012 R2 server configured with two network cards. We’ve renamed the network cards to easily identify them, as such <strong>Ethernet0</strong> was renamed to “<strong>Ethernet0 – WAN Adapter</strong>”, while <strong>Ethernet1</strong> was renamed to “<strong>Ethernet1 – LAN Adapter</strong>”.</p>
<p class="box-info" style="text-align: justify;"><a href="https://clixtrac.com/goto/?215955" target="_blank" rel="nofollow noopener" title="Backup any Virtual Environment (Hyper-V or VMware) with Altaro, quickly and Free for a Limited Time – Download Now!">Backup any Virtual Environment (Hyper-V or VMware) with Altaro, quickly and Free for a Limited Time – Download Now!</a></p>
<p style="text-align: justify;">The Windows <strong>Network Location Awareness</strong> (<strong>NLA</strong>) has <strong>incorrectly identified</strong> <strong>Ethernet0</strong> to be connected to a <strong>Private network</strong>, while <strong>Ethernet1</strong> is also <strong>incorrectly identified</strong> to be connected to a <strong>Public network</strong>, as shown below:</p>
<p><img src="https://www.firewall.cx/images/stories/windows-server-2012-change-network-card-profile-between-private-public-1.png" alt="Windows Network Location Awareness (NLA) incorrectly identifies the Private &amp; Public networks on our network interface cards" style="display: block; margin-left: auto; margin-right: auto;" title="Windows Network Location Awareness (NLA) incorrectly identifies the Private &amp; Public networks on our network interface cards" /></p>
<p style="text-align: center;">Figure 1. Windows Network Location Awareness (NLA) incorrectly identifies the Private &amp; Public networks on our network interface cards</p>
<p style="text-align: justify;">We should note that <strong>incorrect network profiles</strong> (<strong>Private</strong> or <strong>Public</strong>) also means that the <strong>Windows Firewall</strong> is <strong>applying the incorrect rules</strong> to the <strong>network cards</strong>. For example, a <strong>Public network</strong> could have <strong>very strict rules configured</strong>, while the <strong>Private network</strong> might have <strong>less restrictive rules applied</strong>. As one can understand, this also creates a serious security hole and therefore the correct network profiles (Private or Public) must be applied to each network interface card (network adapter).</p>
<h2>Quickly Change Network Profiles (Public or Private) via PowerShell</h2>
<p style="text-align: justify;">To begin, <strong>launch</strong> the <strong>Windows PowerShell console</strong> by click on the PowerShell icon located on the taskbar:</p>
<p><img src="https://www.firewall.cx/images/stories/windows-server-2012-change-network-card-profile-between-private-public-2.png" alt="Launching the Windows PowerShell console" style="display: block; margin-left: auto; margin-right: auto;" title="Launching the Windows PowerShell console" /></p>
<p style="text-align: center;" align="center">Figure 2. Launching the Windows PowerShell console</p>
<p>Next, at the prompt enter the command <strong>Get-NetconnectionProfile</strong> to obtain a list of all network interfaces on the Windows Server, along with their identified network category (Private / Public):</p>
<p><img src="https://www.firewall.cx/images/stories/windows-server-2012-change-network-card-profile-between-private-public-3.png" alt="Executing Get-NetconnectionProfile PowerShell cmd to obtain network profile &amp; ID info" style="display: block; margin-left: auto; margin-right: auto;" title="Executing Get-NetconnectionProfile PowerShell cmd to obtain network profile &amp; ID info" /></p>
<p style="text-align: center;">Figure 3. Executing <strong>Get-NetconnectionProfile</strong> PowerShell cmd to obtain network profile &amp; ID info</p>
<p style="text-align: justify;">Notice that the command output is identical to what we saw in the <strong>Network and Sharing Center</strong> screenshot at the beginning of the article.</p>
<p style="text-align: justify;">Looking closely to the ouput, we’ll notice that each network card has an <strong>InterfaceAlias</strong> and <strong>InterfaceIndex</strong> value. The <strong>InterfaceAlias</strong> is the <strong>name</strong> of the network card, in our case <strong>Ethernet0 – WAN Adapter</strong> and <strong>Ethernet1 – LAN Adapter</strong> respectively, while the <strong>InterfaceIndex</strong> represents the index number of the <strong>physical interface</strong> - that is <strong>12</strong> for <strong>Ethernet0</strong> and <strong>24</strong> for <strong>Ethernet1</strong>.</p>
<p style="text-align: justify;">The final step is using the <strong>Set-NetConnectionProfile</strong> command used to configure each adapter to a network profile. First we set the <strong>LAN Network card</strong> (<strong>Ethernet 1</strong>) to the <strong>Private</strong> network profile and then the <strong>WAN Network card</strong> (<strong>Ethernet 0</strong>) to the <strong>Public</strong> network profile as shown below:</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/windows-server-2012-change-network-card-profile-between-private-public-4.png" alt="Changing network profile for both network cards using the Set-NetConnectionProfile command" style="display: block; margin-left: auto; margin-right: auto;" title="Changing network profile for both network cards using the Set-NetConnectionProfile command" /></p>
<p style="text-align: center;">Figure 4. Changing network profile for both network cards using the <strong>Set-NetConnectionProfile</strong> command</p>
<p style="text-align: justify;">Users can use either the <strong>–InterfaceAlias</strong> or <strong>-InterfaceIndex</strong> parameter to select the network interface to be changed. Here are the full commands for each parameter:</p>
<div class="box-download" style="text-align: justify;"><strong>Set-NetConnectionProfile -InterfaceAlias "Ethernet1 - LAN Adapter" -NetworkCategory Private</strong><br /><br />or<br /><br /> <strong>Set-NetConnectionProfile -InterfaceIndex 24 -NetworkCategory Private</strong></div>
<p class="box-info" style="text-align: justify;"><a href="https://clixtrac.com/goto/?215955" target="_blank" rel="nofollow noopener" title="Free Virtualization Backup">Don’t miss out on your Free Altaro Virtualization backup solution for Hyper-V &amp; VMware. Limited Time Download!</a></p>
<p style="text-align: justify;">Moving back to the <strong>Network and Sharing Center</strong>, we can see that both network interfaces are now bound to the correct network profile:</p>
<p><img src="https://www.firewall.cx/images/stories/windows-server-2012-change-network-card-profile-between-private-public-5.png" alt="Network interfaces are now bound to the correct network profile" style="display: block; margin-left: auto; margin-right: auto;" title="Network interfaces are now bound to the correct network profile" /></p>
<p style="text-align: center;" align="center">Figure 5. Network interfaces are now bound to the correct network profile</p>
<p>This article explained <strong>how to change the network profiles</strong> configured on a <strong>Windows Server 2012</strong> <strong>network interface cards</strong>. We talked about the <strong>importance</strong> of having the <strong>correct network profiles</strong> configured to each network interface card and how this affect the <strong>Windows Firewall rules</strong>. We also showed two different <strong>PowerShell commands</strong> (<strong>Set-NetConnectionProfile -InterfaceIndex </strong>&amp;<strong> Set-NetConnectionProfile –InterfaceAlias</strong>) that can be used to make the network profile changes.</p>]]></description>
			<category>Windows Servers</category>
			<pubDate>Wed, 20 Jan 2016 00:43:35 +1100</pubDate>
		</item>
		<item>
			<title>Free Webinar: Scripting &amp; Automation in Hyper-V without System Center Virtual Machine Manager (SCVMM)</title>
			<link>https://www.firewall.cx/operating-systems/microsoft/windows-servers/hyper-v-altaro-free-webinar-scripting-automation-hyper-v-without-scvmm.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/operating-systems/microsoft/windows-servers/hyper-v-altaro-free-webinar-scripting-automation-hyper-v-without-scvmm.html</guid>
			<description><![CDATA[<p style="text-align: justify;"><strong>System Center Virtual Machine Manager</strong> (SCVMM) provides some great automation <strong>benefits</strong> for those organizations that can afford the hefty price tag. However, if <strong>SCVMM</strong> isn’t a cost effective solution for your business, what are you to do? While <strong>VMM certainly makes automation much easier</strong>, you can achieve a good level of automation with <strong>PowerShell</strong> and the applicable <strong>PowerShell modules for Hyper-V</strong>, <strong>clustering</strong>, <strong>storage</strong>, and more.</p>
<p class="box-info"><a href="https://clixtrac.com/goto/?215955" target="_blank" rel="nofollow noopener" title="Click and Download Your Free Hyper-V or VMware backup solution Now!">Click and Download Your Free Hyper-V or VMware backup solution Now!</a></p>
<p style="text-align: justify;">Are you looking to get grips with automation and scripting?</p>
<p style="text-align: justify;">Join <strong>Thomas Maurer</strong>, Microsoft Datacenter and Cloud Management MVP, who will use this webinar to show you how to achieve automation in your Hyper-V environments, even if you don’t have SCVMM.</p>
<p style="text-align: justify;">Remember, any task you have to do more than once, should be automated. Bring some sanity to your virtual environment by adding some scripting and automation know-how to your toolbox.</p>
<p class="box-hint" style="text-align: justify;">Note: While the Webinar date has passed, you can still access the presentation and download all resources for free. Click below to access it:</p>
<p style="text-align: center;"><strong>Register for the webinar here:</strong></p>
<p style="text-align: center;"><a href="https://clixtrac.com/goto/?217051" target="_blank" rel="nofollow noopener" title="Scripting &amp; Automation in Hyper-V without SCVMM"><strong><img src="https://www.firewall.cx/images/stories/hyper-v-altaro-free-webinar-scripting-automation-hyper-v-without-scvmm-1.jpg" alt="hyper-v-altaro-free-webinar-scripting-automation-hyper-v-without-scvmm-1" title="Free Webinar Scripting &amp; Automation in Hyper-V without SCVMM" /></strong></a></p>
<h4>About the presenter:</h4>
<p><strong> Thomas Maurer </strong></p>
<p style="text-align: justify;">Thomas Maurer works as a Cloud Architect at itnetx gmbh, a consulting and engineering company located in Bern/Switzerland, which has been awarded by Microsoft as “Microsoft Datacenter Partner of the Year for the past three years (2011,2012,2013). Thomas is focused on Microsoft Technologies, especially Microsoft Cloud Solutions based Microsoft System Center, Microsoft Virtualization and Microsoft Azure. This includes Microsoft Hyper-V, Windows Server, Storage, Networking and Azure Pack as well as Service Management Automation.</p>
<h4>About the host:</h4>
<p><strong>Andrew Syrewicze</strong></p>
<p style="text-align: justify;">Andy is a Technical Evangelist for Altaro Software, providing technical marketing and pre-sales expertise. Prior to that Andy spent the last 12+ years providing technology solutions across several industry verticals including, education, fortune 500 manufacturing, healthcare and professional services working for MSPs and Internal IT Departments. During that time he became an expert in VMware, Linux, and Network Security, but his main focus over the last 7 years has been in Virtualization, Cloud Services and the Microsoft Server Stack, with an emphasis on Hyper-V.</p>]]></description>
			<category>Windows Servers</category>
			<pubDate>Thu, 03 Dec 2015 15:12:26 +1100</pubDate>
		</item>
		<item>
			<title>How to Install Desktop Icons (Computer, User’s Files, Network, Control Panel) on Windows 2012 Server. Bring Back The Traditional Windows (7,8) Desktop Icons!</title>
			<link>https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-server-2012-display-desktop-icons-computer-network-user-files.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-server-2012-display-desktop-icons-computer-network-user-files.html</guid>
			<description><![CDATA[<p style="text-align: justify;">One of the first things IT Administrators and IT Managers notice after a <strong>fresh installation</strong> of <strong>Windows 2012 Server</strong> is that there are <strong>no</strong> <strong>Desktop Icons</strong> apart from the Recycle Bin. <strong>Desktop icons</strong> such as <strong>Computer</strong>, <strong>User’s Files</strong>, <strong>Network</strong> &amp; <strong>Control Panel</strong> are <strong>not available</strong> by <strong>default</strong>. Desktop icons are now available through the <strong>Personalize menu</strong>, when <strong>right-clicking</strong> in an empty area on the desktop, however this menu option is not available by default.</p>
<p align="center"><img src="https://www.firewall.cx/images/stories/windows-server-2012-display-desktop-icons-computer-network-user-files-1.png" alt="windows-server-2012-display-desktop-icons-computer-network-user-files-1" style="display: block; margin-left: auto; margin-right: auto;" title="Personalize Menu is not available by default on Windows 2012 Server" /><br />Figure 1. Personalize Menu is not available by default on Windows 2012 Server</p>
<p style="text-align: justify;">To <strong>bring back</strong> the <strong>Desktop icons</strong>, administrators must first i<strong>nstall</strong> the <strong>Desktop Experience</strong> <strong>feature</strong> on Windows 2012 Server.</p>
<p class="box-info" style="text-align: justify;"><a href="https://clixtrac.com/goto/?215955" target="_blank" rel="nofollow noopener" title="Backup Hyper-V and VMware Environments FREE!">Running Windows 2012 Server in a virtual environment? Get an award-winning backup solution for Free!! Download Now!</a></p>
<p style="text-align: justify;">Note: Once the <strong>Desktop Experience Feature</strong> is installed, the server will require a restart.</p>
<p style="text-align: justify;">To do so, <strong>click</strong> on the <strong>Server Manager</strong> icon on the taskbar:</p>
<p style="text-align: justify;" align="center"><img src="https://www.firewall.cx/images/stories/windows-server-2012-display-desktop-icons-computer-network-user-files-2.png" alt="windows-server-2012-display-desktop-icons-computer-network-user-files-2" style="display: block; margin-left: auto; margin-right: auto;" title="Server Manager icon on Windows 2012 Server taskbar" /></p>
<p style="text-align: center;" align="center">Figure 2. Server Manager icon on Windows 2012 Server taskbar</p>
<p style="text-align: justify;">&nbsp;Now select <strong>Add Roles and Features</strong>:</p>
<p style="text-align: justify;" align="center"><img src="https://www.firewall.cx/images/stories/windows-server-2012-display-desktop-icons-computer-network-user-files-3.png" alt="windows-server-2012-display-desktop-icons-computer-network-user-files-3" style="display: block; margin-left: auto; margin-right: auto;" title="Selecting Add roles and features in Windows 2012 Server" /></p>
<p style="text-align: center;" align="center">Figure 3. Selecting Add roles and features in Windows 2012 Server</p>
<p style="text-align: justify;">&nbsp;</p>
<p style="text-align: justify;">Now, <strong>click</strong> <strong>Next</strong> on <strong>the Before you Begin</strong> page and at the <strong>Installation Type</strong> page select <strong>Role-based or feature-based installation</strong>. Next, select your server from the server pool and click <strong>Next</strong>:</p>
<p style="text-align: justify;" align="center"><img src="https://www.firewall.cx/images/stories/windows-server-2012-display-desktop-icons-computer-network-user-files-4.png" alt="windows-server-2012-display-desktop-icons-computer-network-user-files-4" style="display: block; margin-left: auto; margin-right: auto;" title="Selecting our destination server in Windows 2012 Server" /></p>
<p style="text-align: center;" align="center">Figure 4. Selecting our destination server</p>
<p style="text-align: justify;">At the next window, <strong>click</strong> on <strong>Features</strong> located at the <strong>left side</strong>, do not select anything from the <strong>Server Roles</strong> which is displayed by default. Under <strong>Features</strong>, scroll down to <strong>User Interfaces and Infrastructure</strong> and <strong>click</strong> to expand it. Now <strong>tick</strong> <strong>Desktop Experience</strong>:</p>
<p style="text-align: justify;" align="center"><img src="https://www.firewall.cx/images/stories/windows-server-2012-display-desktop-icons-computer-network-user-files-5.png" alt="windows-server-2012-display-desktop-icons-computer-network-user-files-5" style="display: block; margin-left: auto; margin-right: auto;" title="Selecting Desktop Experience under User Interfaces and Infrastructure - Windows 2012 Server" /></p>
<p style="text-align: center;" align="center">Figure 5. Selecting Desktop Experience under User Interfaces and Infrastructure</p>
<p style="text-align: justify;">When <strong>Desktop Experience</strong> is selected, a pop up window will ask us to confirm the installation of a few <strong>additional services or features</strong> required. At this point, simply <strong>click</strong> on <strong>Add Features</strong>. Now <strong>click</strong> on <strong>Next</strong> and then the <strong>Install</strong> button.</p>
<p style="text-align: justify;">This will install all necessary server components and add-ons:</p>
<p style="text-align: justify;" align="center"><img src="https://www.firewall.cx/images/stories/windows-server-2012-display-desktop-icons-computer-network-user-files-6.png" alt="windows-server-2012-display-desktop-icons-computer-network-user-files-6" style="display: block; margin-left: auto; margin-right: auto;" title="Installation of server components and add-ons - Windows 2012 Server" /></p>
<p style="text-align: center;" align="center">Figure 6. Installation of server components and add-ons - Windows 2012 Server</p>
<p style="text-align: justify;">Once complete, the server will require a restart. After the server restart, we can <strong>right-click</strong> in an empty area on our desktop and we’ll see the <strong>Personalize menu</strong>. Select it and then <strong>click</strong> on <strong>Change desktop icons</strong> from the next window:</p>
<p style="text-align: justify;" align="center"><img src="https://www.firewall.cx/images/stories/windows-server-2012-display-desktop-icons-computer-network-user-files-7.png" alt="windows-server-2012-display-desktop-icons-computer-network-user-files-7" style="display: block; margin-left: auto; margin-right: auto;" title="Selecting Change desktop icons - Windows 2012 Server" /></p>
<p style="text-align: center;" align="center">Figure 7. Selecting Change desktop icons - Windows 2012 Server</p>
<p style="text-align: justify;">Now simply select the desktop icons required to be displayed and <strong>click</strong> on <strong>OK</strong>:</p>
<p style="text-align: justify;" align="center"><img src="https://www.firewall.cx/images/stories/windows-server-2012-display-desktop-icons-computer-network-user-files-8.png" alt="windows-server-2012-display-desktop-icons-computer-network-user-files-8" style="display: block; margin-left: auto; margin-right: auto;" title="Select Desktop icons to be displayed on Windows 2012 Server Desktop" /></p>
<p style="text-align: center;" align="center">Figure 8. Select Desktop icons to be displayed on Windows 2012 Server Desktop</p>
<p class="box-info" style="text-align: justify;"><a href="https://clixtrac.com/goto/?215955" target="_blank" rel="nofollow noopener" title="Backup Hyper-V and VMware Environments Free!">Free Award-Winning Backup solution for VMware and Hyper-V virtualization environments. Click here!</a></p>
<p style="text-align: justify;">This article showed how to <strong>enable</strong> <strong>Desktop Icons</strong> (<strong>Computer</strong>, <strong>User files</strong>, <strong>Network</strong> , <strong>Control Panel</strong>) on <strong>Windows 2012 Server</strong>. We explained this process using a <strong>step-by-step process</strong> and included all necessary screenshots to ensure a <strong>quick</strong> and <strong>trouble-less installation</strong>. For more <strong>Windows 2012 Server tutorials</strong>, visit our <a href="https://www.firewall.cx/operating-systems/microsoft/windows-servers.html" title="Windows Server Tutorials">Windows Server Section</a>.</p>]]></description>
			<category>Windows Servers</category>
			<pubDate>Fri, 27 Nov 2015 09:30:00 +1100</pubDate>
		</item>
		<item>
			<title>Easy, Fast &amp; Reliable Hyper-V &amp; VMware Backup with Altaro's Free Backup Solution</title>
			<link>https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-hyper-v-free-backup.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-hyper-v-free-backup.html</guid>
			<description><![CDATA[<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/windows-hyper-v-free-backup-1a.jpg" alt="windows-hyper-v-free-backup-1a" style="margin: 7px; float: left;" title="Datacenter Virtualization - Hyper-V Backup" />As more companies around the world adopt the virtualization technology to increase efficiency and productivity, Microsoft’s <strong>Hyper-V virtualization</strong> platform is continuously gaining ground in the global virtualization market, as is the need for IT departments to provide <strong>rock-solid backup solutions</strong> for their <strong>Hyper-V virtualized environment</strong>.</p>
<p style="text-align: justify;">History has shown that <strong>backup procedures</strong> were always a major pitfall for most IT departments and companies. With virtualization environments, the need of a backup solution is more important than ever, especially when we consider that physical servers now host multiple virtual servers.</p>
<p style="text-align: justify;">While creating a <strong>backup plan</strong> and <strong>verifying backups</strong> can become an extremely <strong>complicated</strong> and <strong>time-consuming process</strong>, <strong>Altaro</strong> has managed to deliver a <strong>backup solution</strong> that <strong>guarantees</strong> the <strong>backup process</strong> of the <strong>virtualized environment</strong> and ensures the <strong>data integrity</strong> of servers. Furthermore, <strong>Altaro’s backup solution</strong> is complimented with a <strong>simple recovery procedure</strong>, guaranteeing quick and easy recovery from the failure of any virtual machine and hypervisor host.&nbsp;</p>
<p style="text-align: justify;">What’s even better is that <strong>Altaro’s Hyper-V &amp; VMware backup solution</strong> is <strong>completely free</strong> for a limited number of virtual servers!</p>
<p class="box-info" style="text-align: justify;"><a href="https://clixtrac.com/goto/?197423" target="_blank" rel="nofollow noopener" title="Free Hyper-V Backup">Download&nbsp;your Free Hyper-V &amp; VMware Altaro Backup Solution Now - Limited Offer!</a></p>
<p style="text-align: justify;"><strong>Altaro Hyper-V &amp; VMware backup</strong> is a feature-rich application that allows users to backup and restore<strong> VMs</strong> literally with just a few clicks. The user interface of <strong>Altaro VM backup</strong> is easy-to-use with all the necessary features to make the <strong>Hyper-V or VMware backup &amp; restore</strong> process, an easy and simple task.</p>
<h2 style="text-align: justify;">Main Features Of Altaro VM Backup</h2>
<ul class="checkbox">
<li style="text-align: justify;">User-friendly easy to use admin console.</li>
<li style="text-align: justify;">Supports Microsoft Windows Server 2012 R2, 2012, 2008 R2, Hyper-V &amp; ESX/ESXi server core.</li>
<li style="text-align: justify;">Backup virtual machines per schedule.</li>
<li style="text-align: justify;">Restore single or multiple virtual machines to different Hyper-V/VMware host or same host.</li>
<li style="text-align: justify;">Rename virtual machines while restoring the virtual machine to same host or different host.</li>
<li style="text-align: justify;">Backup Linux VMs without shutting down the machine.</li>
<li style="text-align: justify;">Secured backups with AES encryption.</li>
<li style="text-align: justify;">Reduced backup file size with powerful compression.</li>
<li style="text-align: justify;">Central Altaro Hyper-V backup management for multiple Hyper-V host.</li>
<li style="text-align: justify;">File level restore allows you to mount backup up VHDs and restore individual files without actually restoring the whole virtual machine.</li>
<li style="text-align: justify;">Business continuity with offsite backup with WAN acceleration.</li>
<li style="text-align: justify;">Backup Exchange Server VM (Supports Exchange 2007, 2010, 2013) and can restore Exchange item level restore options.</li>
<li style="text-align: justify;">Support backup for Hyper-V cluster shared volumes for larger deployments.</li>
<li style="text-align: justify;">Support for Microsoft SQL Database VM backup.</li>
<li style="text-align: justify;">Free for up to two Virtual Machines.</li>
<li style="text-align: justify;">Extremely low pricing per host (not per socket) provides unbeatable value.</li>
</ul>
<p style="text-align: justify;">It is evident that <strong>Altaro Hyper-V backup</strong> provides a plethora of features that makes it a viable solution for companies of any size.</p>
<h2 style="text-align: justify;">Altaro Hyper-V&nbsp; Backup Installation Requirements</h2>
<p style="text-align: justify;">Installing the <strong>Altaro Hyper-V backup</strong> application is no different than installing any other windows application, it is very easy. <br />It is important to note that <strong>Altaro Hyper-V backup</strong> must be installed in <strong>Hyper-V host machine</strong>, and not a guest machine. <strong>Altaro Hyper-V</strong> supports the following host server editions:</p>
<ul>
<li style="text-align: justify;">Windows 2008 R2 (all editions)</li>
<li style="text-align: justify;">Windows Hyper-V Server 2008 R2 (core installation)</li>
<li style="text-align: justify;">Windows Server 2012 (all editions)</li>
<li style="text-align: justify;">Windows Hyper-V Server 2012 (core installation)</li>
<li style="text-align: justify;">Windows Server 2012 R2 (all editions)</li>
<li style="text-align: justify;">Windows Hyper-V Server 2012 R2 (core installation)</li>
</ul>
<p style="text-align: justify;">Minimum system requirements of <strong>Altaro Hyper-V Backup</strong> are:</p>
<ul>
<li style="text-align: justify;">350 MB Memory</li>
<li style="text-align: justify;">1 GB free Hard Disk space for Altaro Hyper-V Backup Program and Settings files</li>
<li style="text-align: justify;">.NET Framework 3.5 on Windows Server 2008 R2</li>
<li style="text-align: justify;">.NET Framework 4.0 on Windows Server 2012</li>
</ul>
<p style="text-align: justify;">Following is a list of <strong>supported backup destinations</strong>. This is where you would save the backup of your Hyper-V virtual machines:</p>
<ul class="check">
<li style="text-align: justify;">USB External Drives</li>
<li style="text-align: justify;">eSata External Drives</li>
<li style="text-align: justify;">USB Flash Drives</li>
<li style="text-align: justify;">Fileserver Network Shares using UNC Paths</li>
<li style="text-align: justify;">NAS devices (Network Attached Storage) using UNC Paths</li>
<li style="text-align: justify;">RDX Cartridges</li>
<li style="text-align: justify;">PC Internal Hard Drives (recommended only for evaluation purposes)</li>
</ul>
<p class="box-info"><a href="https://clixtrac.com/goto/?197423" target="_blank" rel="nofollow noopener" title="Free Hyper-V Backup">Grab a Free Copy of VM Altaro Backup Solution Now!</a></p>
<h2 style="text-align: justify;">Installing Altaro Hyper-V Backup Software</h2>
<p style="text-align: justify;">First step is to grap a fresh copy of Altaro’s Hyper-V backup application by <a href="https://clixtrac.com/goto/?197423" target="_blank" rel="nofollow noopener" title="Hyper-V Backup Application Download">downloading the application</a> from Altaro’s website. <br />Run the installation file. We will receive the application’s welcome screen. Click <strong>Next&nbsp;</strong> to continue through the next windows until the installation is finally complete.<br /><br /></p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/windows-hyper-v-free-backup-1.png" alt="windows-hyper-v-free-backup-1" style="display: block; margin-left: auto; margin-right: auto;" title="Windows Hyper-V Free VM Backup" />Figure 1. Installation Welcome Screen</p>
<p style="text-align: justify;">After few moments, the installation completes. At this point, check the <strong>Launch Management Console</strong> and click <strong>Finish</strong>: <br />&nbsp;</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/windows-hyper-v-free-backup-2.png" alt="windows-hyper-v-free-backup-2" style="display: block; margin-left: auto; margin-right: auto;" title="Altaro Windows Hyper-V Free VM Backup Installation complete" /> Figure 2. Altaro Hyper-V Installation Complete</p>
<p style="text-align: justify;">At this point, <strong>Altaro Hyper-V Backup</strong> has been successfully installed on our <strong>Hyper-V server</strong> and is ready to run by ticking the <strong>Launch Management Console</strong> option and <strong>clicking</strong> on the <strong>Finish</strong> button.</p>
<p style="text-align: justify;">Alternatively, Administrators can also install the <strong>Altaro Hyper-V Backup</strong> application on a workstation or different server, connect remotely to the Hyper-V server and perform all necessary configuration and backup tasks from there.</p>
<p style="text-align: justify;">We found the ‘<strong>remote management</strong>’ capability extremely handy and proceeded to try it out on our Windows 7 workstation.<br />It’s worth noting that it makes no difference whether you select to run Altaro’s Hyper-V Backup directly on the Hyper-V host or remotely as we did.</p>
<p style="text-align: justify;">After installing the application on our Windows 7 workstation, we ran it and entered the necessary details to connect with the Hyper-V host:</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/windows-hyper-v-free-backup-3.png" alt="windows-hyper-v-free-backup-3" style="display: block; margin-left: auto; margin-right: auto;" title="Altaro Windows Hyper-V Free VM Backup Remote Control" />Figure 3. Connecting to the Hyper-V Agent Remotely</p>
<p style="text-align: justify;">Users running the application directly on the <strong>Hyper-V host</strong> would select the ‘<strong>This Machine</strong>’ option from above.</p>
<p style="text-align: left;">Once connected the <strong>Hyper-V agent</strong>, the <strong>Altaro Hyper-V Backup</strong> main screen appears:</p>
<p style="text-align: center;"><br /><a href="https://www.firewall.cx/images/stories/windows-hyper-v-free-backup-4b.png" target="_blank" title="Altaro Hyper-V Backup - Quick Setup Guide - Main Control Panel"><img src="https://www.firewall.cx/images/stories/windows-hyper-v-free-backup-4.png" alt="windows-hyper-v-free-backup-4" style="display: block; margin-left: auto; margin-right: auto;" title="Altaro Windows Hyper-V Free VM Backup Main Control Panel Quick Setup Guide" /></a> Figure 4. Altaro Hyper-V Backup - Main Screen (click to enlarge)</p>
<p style="text-align: justify;"><strong>Altaro’s Hyper-V Backup solution</strong> offers an extensive number of options. When running the application for the first time, it provides a quick <strong>3-step guide</strong> to help quickly setup a few mandatory options and begin performing your first Hyper-V backup in just a couple of minutes! &nbsp;</p>
<p style="text-align: justify;">In our upcoming articles, we’ll be taking a closer look on how Altaro’s Hyper-V Backup application manages to make life easy for Virtualization administrators, with its easy backup and restore procedures.</p>
<h2 style="text-align: justify;">Summary</h2>
<p style="text-align: justify;">This article introduced <strong>Altaro’s Hyper-V Backup application</strong> – a <strong>complete backup and restore solution</strong> that manages to take away the <strong>complexity</strong> of <strong>managing backup</strong> and <strong>restore procedures</strong> for any size <strong>Hyper-V virtualization environment</strong>. <strong>Altaro’s Hyper-V Backup solution</strong> is completely <strong>FREE</strong> for a limited number <strong>Virtual Machines</strong>!</p>]]></description>
			<category>Windows Servers</category>
			<pubDate>Sun, 12 Apr 2015 19:41:08 +1000</pubDate>
		</item>
		<item>
			<title>Troubleshooting Windows Server 2012 R2 Crashes. Analysis of Dump Files &amp; Options. Forcing System Server Crash (Physical/Virtual)</title>
			<link>https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-server-2012-troubleshooting-server-crashes-memory-dumps-debug.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-server-2012-troubleshooting-server-crashes-memory-dumps-debug.html</guid>
			<description><![CDATA[<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/windows-2012-troubleshooing-server-crashes-memory-dumps-debug-001a.png" alt="windows-2012-troubleshooing-server-crashes-memory-dumps-debug-001a" style="margin: 7px; float: left;" title="Windows Server 2012 Crash Dump Analysis" />There are umpteen reasons why your <strong>Windows Server 2012 R2</strong> decides to present you with a <strong>Blue Screen of Death (BSOD)</strong> or the <strong>stop screen</strong>. As <strong>virtual machines</strong> become more prominent in <strong>enterprise environments</strong>, the same problems that plagued physical servers earlier are now increasingly being observed for <strong>crashes of virtual machines</strong> as well.</p>
<p style="text-align: justify;">Microsoft designs and configures Windows systems to capture information about the state of the operating systems if a total system failure occurs, unlike a failure of an individual application. You can see and analyze the captured information in the <strong>dump files</strong>, the settings of which you can configure using the <strong>System Tool</strong> in the <strong>Control Panel</strong>. By default, BSOD provides <strong>minimal information</strong> about the possible <strong>cause of the system crash</strong> and this may suffice in most circumstances to help in identifying the cause of the crash.</p>
<p style="text-align: justify;">However, some crashes may require a <strong>deeper level of information</strong> than what the stop screen provides – for example, when your server simply hangs and becomes unresponsive. In that case, you may still be able to see the desktop, but moving the mouse or pressing keys on the keyboard produces no response. To resolve the issue, you need a <strong>memory dump</strong>. This is basically a <strong>binary file</strong> that contains a portion of the <strong>server's memory just before it crashed. Windows Server 2012 R2 provides five options for configuring memory dumps</strong>.</p>
<p class="box-info" style="text-align: justify;">SafeGuard your Hyper-V &amp; VMware servers from unrecoverable crashes with a reliable FREE Backup – Altaro’s VM Backup. <a href="https://clixtrac.com/goto/?203113" target="_blank" rel="nofollow noopener" title="Altaro Hyper-V Backup Download">Download Now</a>!</p>
<h2 style="text-align: justify;">Different Types Of Memory Dump Files</h2>
<p style="text-align: justify;"><strong>1. Automatic Memory Dump</strong></p>
<p style="text-align: justify;"><strong>Automatic memory dump</strong> is the <strong>default memory dump</strong> that Windows Server 2012 R2 starts off with. This is really not a new memory dump type, but is a Kernel memory dump that allows the SMSS process to reduce the page file to be smaller than the size of existing RAM. Therefore, this System Managed page file now reduces the size of page file on disk.</p>
<p style="text-align: justify;"><strong>2. Complete Memory Dump</strong></p>
<p style="text-align: justify;">A <strong>complete memory dump</strong> is a record of the complete contents of the physical memory or RAM in the computer at the time of crash. Therefore, this needs a page file that is at least as large as the size of the RAM present plus 1MB. The complete memory dump will usually contain data from the processes that were running when the dump was collected. A subsequent crash will overwrite the previous contents of the dump.</p>
<p style="text-align: justify;"><strong>3. Kernel Memory Dump</strong></p>
<p style="text-align: justify;">The <strong>kernel memory dump</strong> records only the read/write pages associated with the kernel-mode in physical memory at the time of crash. The <strong>non-paged memory</strong> saved in the kernel memory dump contains a <strong>list of running processes</strong>, <strong>state of the current thread</strong> and the<strong> list of loaded drivers</strong>. The amount of kernel-mode memory allocated by Windows and the drivers present on the system define the size of the kernel memory dump.</p>
<p style="text-align: justify;"><strong>4. Small Memory Dump</strong></p>
<p style="text-align: justify;">A <strong>small memory dump</strong> or a <strong>MiniDump</strong> is a record of the stop code, parameters, list of loaded device drivers, information about the current process and thread, and includes the kernel stack for the thread that caused the crash.</p>
<p style="text-align: justify;"><strong>5. No Memory Dump</strong></p>
<p style="text-align: justify;">Sometimes you may not want a memory dump when the server crashes.</p>
<h2 style="text-align: justify;">Configuring Dump File Settings</h2>
<p style="text-align: justify;">Windows Server 2012 R2 allows you to configure an <strong>Automatic memory dump</strong>. To start the configuration, you have to log in as a local administrator and click on <strong>Control Panel</strong> in the Start menu:</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/windows-2012-troubleshooing-server-crashes-memory-dumps-debug-001.png" alt="windows-2012-troubleshooing-server-crashes-memory-dumps-debug-001" style="margin: 0px; vertical-align: bottom;" title="Windows Server 2012: Invoking the Windows Server Control Panel" />&nbsp;</p>
<p style="text-align: center;">Figure 1. Invoking the Windows Server Control Panel</p>
<p style="text-align: justify;"><br />From the <strong>Control Panel</strong>,<strong> click</strong> on <strong>System and Security</strong> icon. Next, <strong>click</strong> on<strong> System</strong>:</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/windows-2012-troubleshooing-server-crashes-memory-dumps-debug-002.png" alt="windows-2012-troubleshooing-server-crashes-memory-dumps-debug-002" style="margin: 0px; vertical-align: bottom;" title="Windows Server 2012: System and Security" />&nbsp;</p>
<p style="text-align: center;">Figure 2. System and Security</p>
<p style="text-align: justify;">In the <strong>System Properties</strong> that opens up, click on the <strong>Advanced</strong> tab as shown below:</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/windows-2012-troubleshooing-server-crashes-memory-dumps-debug-003.png" alt="windows-2012-troubleshooing-server-crashes-memory-dumps-debug-003" style="margin: 0px; vertical-align: bottom;" title="Windows Server 2012: System Properties – Advanced Tab" />&nbsp;</p>
<p style="text-align: center;">Figure 3. System Properties – Advanced Tab</p>
<p style="text-align: justify;">&nbsp;In the <strong>Advanced System Properties</strong>, look for and <strong>click</strong> on <strong>Settings</strong> under <strong>Startup and Recovery</strong> section:</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/windows-2012-troubleshooing-server-crashes-memory-dumps-debug-004.png" alt="windows-2012-troubleshooing-server-crashes-memory-dumps-debug-004" style="margin: 0px; vertical-align: bottom;" title="Windows Server 2012: Startup and Recover dialog" />&nbsp;</p>
<p style="text-align: center;">Figure 4. Startup and Recover dialog</p>
<p style="text-align: center;">&nbsp;</p>
<p style="text-align: center;">&nbsp;<img src="https://www.firewall.cx/images/stories/windows-2012-troubleshooing-server-crashes-memory-dumps-debug-005.png" alt="windows-2012-troubleshooing-server-crashes-memory-dumps-debug-005" style="margin: 0px; vertical-align: bottom;" title="Windows Server 2012: The five types of debugging information (memory dumps) available" /></p>
<p style="text-align: center;">Figure 5. The five types of debugging information (memory dumps) available</p>
<p style="text-align: justify;">Here, you have the choice to let your server <strong>Automatically restart</strong> on <strong>System failure</strong>. Under <strong>Write Debugging information</strong>, you can select between one of the <strong>five types</strong> of memory dumps to be saved in the event of a server crash.<br />&nbsp;<br />You can also define the <strong>name of the dump file</strong> the server should create and specify its location. The <strong>default location</strong> is in the<strong> System Root</strong> and the <strong>default name</strong> of the file is <strong>MEMORY.DMP</strong>. If you do not want the previous file to be overwritten by the new dump file, <strong>remove the tick mark</strong> from <strong>Overwrite any existing file</strong> (visible in figure 4).</p>
<p style="text-align: justify;">When done, you will need to <strong>restart the server</strong> for the changes to take place.</p>
<h2 style="text-align: justify;">Manually Generating A Dump File</h2>
<p style="text-align: justify;">Although the server will create the dump files when it crashes, you do not have to wait indefinitely for the crash to occur. As described in Microsoft’s support pages Generating a System Dump via Keyboard and <a href="https://learn.microsoft.com/en-us/windows-hardware/drivers/debugger/forcing-a-system-crash-from-the-keyboard" target="_blank" rel="nofollow noopener" title="Forcing a System Crash via Keyboard">Forcing a System Crash via Keyboard</a>, you can induce the server to crash with a select combination of keys. Of the several methods described by Microsoft, we will discuss the method via USB keyboards.</p>
<h4 style="text-align: justify;">Forcing a System Crash From the Keyboard</h4>
<p style="text-align: justify;">Begin with a command prompt with administrative privileges. For this, begin with the <strong>Start menu</strong> and <strong>click</strong> on <strong>Command Prompt (Admin)</strong>:</p>
<p style="text-align: center;">&nbsp;<img src="https://www.firewall.cx/images/stories/windows-2012-troubleshooing-server-crashes-memory-dumps-debug-006.png" alt="windows-2012-troubleshooing-server-crashes-memory-dumps-debug-006" style="margin: 0px; vertical-align: bottom;" title="Windows Server 2012: Invoking the Command Prompt with Elevated Privileges" /></p>
<p style="text-align: center;">Figure 6. Invoking the Command Prompt with Elevated Privileges</p>
<p style="text-align: justify;">In the command prompt window that opens, <strong>type</strong> in “<strong>regedit</strong>” to and<strong> hit Enter</strong>:</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/windows-2012-troubleshooing-server-crashes-memory-dumps-debug-007.png" alt="windows-2012-troubleshooing-server-crashes-memory-dumps-debug-007" style="margin: 0px; vertical-align: bottom;" title="Windows Server 2012: Opening and Editing the Windows Registry" />&nbsp;</p>
<p style="text-align: center;">Figure 7. Opening and Editing the Windows Registry</p>
<p style="text-align: justify;">This opens the <strong>Registry Editor</strong> screen. Now expand all the way to the following section:</p>
<p class="box-info" style="text-align: justify;">HKEY_LOCAL_MACHINE\SYSTEM\CurrrentControlSet\Control\CrashControl</p>
<p style="text-align: justify;"><strong>Right-click</strong> on <strong>CrashControl</strong> and create a new <strong>DWORD</strong> with the name <strong>CrashDumpEnabled</strong> which will appear in the right hand pane. Next, modify its value by <strong>right-clicking</strong> on <strong>CrashDumpEnabled</strong> in the right hand pane and selecting <strong>Modify</strong>:</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/windows-2012-troubleshooing-server-crashes-memory-dumps-debug-008.png" alt="windows-2012-troubleshooing-server-crashes-memory-dumps-debug-008" style="margin: 0px; vertical-align: bottom;" title="Windows Server 2012: Editing the Registry. Modifying the new registry DWORD CrashDumpEnabled" /></p>
<p style="text-align: center;">Figure 8. Editing the Registry. Modifying the new registry DWORD CrashDumpEnabled</p>
<p style="text-align: justify;">In the Edit <strong>DWORD</strong> Value dialog that opens enter Value data as <strong>1</strong> and <strong>click</strong> on <strong>OK</strong>:</p>
<p style="text-align: center;">&nbsp;<img src="https://www.firewall.cx/images/stories/windows-2012-troubleshooing-server-crashes-memory-dumps-debug-009.png" alt="windows-2012-troubleshooing-server-crashes-memory-dumps-debug-009" style="margin: 0px; vertical-align: bottom;" title="Windows Server 2012: Editing the Value Data of CrashDumpEnabled" /></p>
<p style="text-align: center;">Figure 9. Editing the Value Data of CrashDumpEnabled</p>
<div style="text-align: justify;">Next step is to go to the following registry location:</div>
<p style="text-align: justify;"><span class="box-info">HKEY_LOCAL_MACHINE\SYSTEM\CurrrentControlSet\Services\kbdhid\Parameters</span></p>
<p style="text-align: justify;"><strong>Right-click</strong> on <strong>Parameters</strong> and create a <strong>new DWORD</strong> with the name <strong>CrashOnCtrlScroll</strong>, which will appear in the right pane:</p>
<p><img src="https://www.firewall.cx/images/stories/windows-2012-troubleshooing-server-crashes-memory-dumps-debug-010.png" alt="windows-2012-troubleshooing-server-crashes-memory-dumps-debug-010" style="margin: 0px auto; vertical-align: bottom; display: block;" title="Windows Server 2012: Editing the Registry. Creating the new Registry DWORD CrashOnCtrlScroll" /></p>
<p style="text-align: center;">Figure 10. Editing the Registry. Creating the new Registry DWORD <strong>CrashOnCtrlScroll</strong></p>
<p style="text-align: justify;">Now, modify the <strong>CrashOnCtrlScroll</strong> value by <strong>right-clicking</strong> on <strong>CrashOnCtrlScroll</strong> in the right pane and selecting <strong>Modify</strong>:</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/windows-2012-troubleshooing-server-crashes-memory-dumps-debug-011.png" alt="windows-2012-troubleshooing-server-crashes-memory-dumps-debug-011" style="margin: 0px; vertical-align: bottom;" title="Windows Server 2012: Modifying the Registry DWORD entry CrashOnCtrlScroll" />&nbsp;</p>
<p style="text-align: center;">Figure 11. Modifying the Registry DWORD entry <strong>CrashOnCtrlScroll</strong></p>
<p style="text-align: justify;">&nbsp;In the <strong>Edit DWORD</strong> Value dialog that opens, enter <strong>Value data</strong> as <strong>1</strong> and <strong>click</strong> on<strong> OK</strong>:</p>
<p style="text-align: center;">&nbsp;<img src="https://www.firewall.cx/images/stories/windows-2012-troubleshooing-server-crashes-memory-dumps-debug-012.png" alt="windows-2012-troubleshooing-server-crashes-memory-dumps-debug-012" style="margin: 0px; vertical-align: bottom;" title="Windows Server 2012: Editing the Value data of CrashOnCtrlScroll" /></p>
<p style="text-align: center;">Figure 12. Editing the Value data of CrashOnCtrlScroll</p>
<p style="text-align: justify;"><strong>Restart</strong> the server for the new values to take effect.</p>
<p style="text-align: justify;">Next, to crash the server, press the combination of keys:</p>
<p style="text-align: justify;"><strong>CTRL</strong> + <strong>SCROLL LOCK</strong> + <strong>SCROLL LOCK</strong></p>
<p style="text-align: justify;">Note: Press <strong>SCROLL LOCK</strong> key <strong>twice</strong> while holding down the <strong>CTRL</strong> key.</p>
<p style="text-align: justify;">The server will crash and restart and should have created a new dump file.</p>
<p class="box-info" style="text-align: justify;">Note: However, as described in the Microsoft support pages referred above, this method does not always work and for other methods, you can refer to additional Microsoft support pages <a href="https://learn.microsoft.com/en-US/troubleshoot/windows-client/performance/generate-a-kernel-or-complete-crash-dump" target="_blank" rel="nofollow noopener" title="Microsoft support page">here</a>.</p>
<p style="text-align: justify;">This article explained why <strong>Windows Server dump files</strong> are considered important and how we can<strong> configure Windows Server 2012 R2</strong> to save <strong>crash dump files</strong>. We saw the different <strong>memory Dumps (Automatic Memory Dump, Complete Memory Dump, Kernel Memory Dump, Small Memory Dump, No Memory Dump)</strong> and how to <strong>configure the dump’s settings</strong>. More articles on <strong>Windows Server 2012</strong> can be found in our <a href="https://www.firewall.cx/operating-systems/microsoft/windows-servers.html" title="Windows 2012 Server Section">Windows Server 2012 Section</a>.</p>]]></description>
			<category>Windows Servers</category>
			<pubDate>Wed, 08 Jul 2015 06:00:00 +1000</pubDate>
		</item>
		<item>
			<title>Installation and Configuration of Fine-Grained Password Policy for Windows Server 2012</title>
			<link>https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-server-2012-install-setup-fine-grained-password-policy.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-server-2012-install-setup-fine-grained-password-policy.html</guid>
			<description><![CDATA[<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/windows-2012-install-setup-fine-grained-password-policy-01a.jpg" alt="windows-2012-install-setup-fine-grained-password-policy-01a" style="margin: 7px; float: left;" title="Windows Server 2012 - Installation &amp; configuration of Fine-Grain Password Policies" />Microsoft introduced <strong>Fine-Grained Password Policy</strong> for the first time in <strong>Windows Server 2008</strong> and the policy has been part of every Windows Server since then. <strong>Fine-Grained Password Policy</strong> allows <strong>overcoming the limitations</strong> of only <strong>one password policy for a single domain</strong>. A brief example is that we <strong>apply different password</strong> and <strong>account lockout policies</strong> to different <strong>users</strong> in a<strong> domain</strong> with the help of<strong> Fine-Grained Password Policies</strong>.<br />&nbsp; <br />This article discusses the <strong>Fine-Grained Password Policy</strong> as applicable to Windows Server 2012, and the different ways of configuring this policy. <strong>Windows Server 2012</strong> allows<strong> two methods</strong> of <strong>configuring the Fine-Grained Password Policy</strong>:</p>
<p style="text-align: justify;">1. <strong>Using the Windows PowerShell</strong></p>
<p style="text-align: justify;">2. <strong>Using the Active Directory Administrative Center or ADAC</strong></p>
<p style="text-align: justify;">In earlier Windows Server editions, it was possible to <strong>configure Fine-Grained Password Policy</strong> only through the <strong>command line interface (CLI)</strong>. However with Windows Server 2012 a graphical user interface has been added, allowing the <strong>configuration</strong> of the <strong>Fine-Grained Password Policy</strong> via the <strong>Active Directory Administrative Center</strong>. We will discuss both the methods.</p>
<p style="text-align: justify;">Before you begin to implement the Fine-Grained Password Policy, you must make sure the domain functional level must be <strong>Windows Server 2008 or higher.</strong> Refer to relevant <a href="https://www.firewall.cx/operating-systems/microsoft/windows-servers.html" target="_blank" title="Windows Server 2012 section">Windows 2012 articles</a> on our website Firewall.cx.</p>
<p class="box-info" style="text-align: justify;">Backup your Windows Server 2012 R2 host using Altaro’s <a href="https://clixtrac.com/goto/?202958" target="_blank" rel="nofollow noopener" title="Free Hyper-V Backup">Free Hyper-V &amp; VMware Backup solution</a>. <a href="https://clixtrac.com/goto/?202958" target="_blank" rel="nofollow noopener" title="Download Free Hyper-V Backup">Download Now!</a></p>
<h2 style="text-align: left;">Configuring Fine-Grained Password Policy From Windows PowerShell</h2>
<p style="text-align: justify;">Use your <strong>administrative credentials</strong> to <strong>login</strong> to your Windows Server 2012 domain controller. Invoke the <strong>PowerShell console</strong> by <strong>Right clicking</strong> on the <strong>third icon</strong> from the left in the taskbar on the Windows Server desktop and then <strong>clicking</strong> on <strong>Run as Administrator</strong>.</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/windows-2012-install-setup-fine-grained-password-policy-01.png" alt="windows-2012-install-setup-fine-grained-password-policy-01" style="margin: 0px; vertical-align: bottom;" title="Executing Windows PowerShell as Administrator" /></p>
<p style="text-align: center;">Figure 1. Executing Windows PowerShell as Administrator</p>
<p style="text-align: justify;"><strong>Clicking</strong> on <strong>Yes</strong> to the <strong>UAC confirmation</strong> will open up an Administrator: Windows PowerShell console.</p>
<p style="text-align: justify;">Within the PowerShell console, <strong>type</strong> the following command in order to begin the creation of a new fine grained password policy and <strong>press Enter</strong>:</p>
<p class="box-content" style="text-align: left;">C:\Windows\system32&gt; <strong>New-ADFineGrainedPasswordPolicy</strong></p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/windows-2012-install-setup-fine-grained-password-policy-02.png" alt="windows-2012-install-setup-fine-grained-password-policy-02" style="margin: 0px; vertical-align: bottom;" title="Creating a new Fine Grained Password Policy via PowerShell" /></p>
<p style="text-align: center;">Figure 2. Creating a new Fine Grained Password Policy via PowerShell</p>
<p style="text-align: justify;"><strong>Type</strong> a <strong>name</strong> for the new policy at the <strong>Name:</strong> prompt and <strong>press Enter</strong>. In our example, we named our policy <strong>FGPP</strong>:</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/windows-2012-install-setup-fine-grained-password-policy-03.png" alt="windows-2012-install-setup-fine-grained-password-policy-03" style="margin: 0px; vertical-align: bottom;" title="Naming our Fine Grained Password Policy" /></p>
<p style="text-align: center;">Figure 3. Naming our Fine Grained Password Policy</p>
<p><strong>Type</strong> a <strong>precedence index number</strong> at the <strong>Precedence:</strong> prompt and <strong>press Enter</strong>. Note that policies that have a <strong>lower precedence number have a higher priority</strong> over those with higher precedence numbers. We’ve set our new policy with a precedence of 15: <img src="https://www.firewall.cx/images/stories/windows-2012-install-setup-fine-grained-password-policy-04.png" alt="windows-2012-install-setup-fine-grained-password-policy-04" style="margin: 0px auto; display: block; vertical-align: bottom;" title="Setting the Precedence index number of our Fine Grained Password Policy" /></p>
<p style="text-align: center;">Figure 4. Setting the Precedence index number of our Fine Grained Password Policy</p>
<p style="text-align: justify;">Now the policy is configured, but has <strong>all default values</strong>. If there is need to add specific parameters to the policy, you can do that by <strong>typing</strong> the following at the Windows PowerShell command prompt and <strong>press Enter</strong>:</p>
<p class="box-content">C:\Windows\system32&gt; <strong>New-ADFineGrainedPasswordPolicy -Name FGPP -DisplayName FGPP -Precedence 15 -ComplexityEnabled $true -ReversibleEncryptionEnabled $false -PasswordHistoryCount 20 -MinPasswordLength 10 -MinPasswordAge 3.00:30:00 -MaxPasswordAge 30.00:30:00 -LockoutThreshold 4 -LockoutObservationWindow 0.00:30:00 -LockoutDuration 0.00:45:00</strong></p>
<p style="text-align: justify;">In the above command,<strong> replace</strong> the name <strong>FGPP</strong> with <strong>the name of your password policy</strong>, which in our example is FGPP.</p>
<p style="text-align: justify;">The parameters used in the above are <strong>mandatory</strong> and pretty much self-explanatory:</p>
<p style="text-align: justify;">Attributes for <strong>Password Settings</strong> above include:</p>
<ul class="check">
<li style="text-align: justify;">Enforce password history</li>
<li style="text-align: justify;">Maximum password age</li>
<li style="text-align: justify;">Minimum password age</li>
<li style="text-align: justify;">Minimum password length</li>
<li style="text-align: justify;">Passwords must meet complexity requirements</li>
<li style="text-align: justify;">Store passwords using reversible encryption</li>
</ul>
<p style="text-align: justify;">Attributes involving <strong>account lockout settings</strong> include:</p>
<ul class="check">
<li class="zebra" style="text-align: justify;">Account lockout duration</li>
<li class="zebra" style="text-align: justify;">Account lockout threshold</li>
<li class="zebra" style="text-align: justify;">Reset account lockout after</li>
</ul>
<p style="text-align: justify;"><br />To apply the policy to a user/group or users/groups, use the following command at the PowerShell command prompt:</p>
<div class="box-content" style="text-align: left;">C:\Windows\system32&gt; <strong>Add-ADFineGrainedPasswordPolicySubject -Identity FGPP -Subjects “Chris_Partsenidis”</strong></div>
<p style="text-align: justify;">For confirming whether the policy has indeed been applied to the groups/users correctly, <strong>type</strong> the following command at the PowerShell command prompt and <strong>press Enter</strong>:</p>
<div class="box-content" style="text-align: left;">C:\Windows\system32&gt; <strong>Get-ADFineGrainedPasswordPolicy -Filter { name -like “FGPP” }</strong></div>
<p style="text-align: justify;">Remember, it is necessary to <strong>replace FGPP</strong> in the above <strong>with the name of your password policy</strong>. Also <strong>replace Chris_Partsenidis</strong> with the <strong>name of the group or user</strong> to whom you want to apply the policy.</p>
<p style="text-align: justify;">The screenshot below shows the execution of the commands and output:</p>
<p style="text-align: center;">&nbsp;<img src="https://www.firewall.cx/images/stories/windows-2012-install-setup-fine-grained-password-policy-05.png" alt="windows-2012-install-setup-fine-grained-password-policy-05" style="margin: 0px; vertical-align: bottom;" title="Applying and verifying a Fine Grained Password Policy to a User or Group" /></p>
<p style="text-align: center;">Figure 5. Applying and verifying a Fine Grained Password Policy to a User or Group</p>
<p style="text-align: justify;">Check the <strong>AppliesTo</strong> section from the output to verify if the policy is applied to the intended user or group.</p>
<h2 style="text-align: left;">Configuring Fine-Grained Password Policy Using The Active Directory Administrative Center (ADAC)</h2>
<p style="text-align: justify;">Use your <strong>administrative credentials</strong> to <strong>login</strong> to your Windows Server 2012 domain controller. Invoke the <strong>Server Manager Dashboard</strong> by<strong> left-clicking</strong> on the <strong>second icon</strong> in the taskbar on the Windows Server desktop:</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/windows-2012-install-setup-fine-grained-password-policy-06.png" alt="windows-2012-install-setup-fine-grained-password-policy-06" style="margin: 0px; vertical-align: bottom;" title="Opening Server Manager Dashboard" /></p>
<p style="text-align: center;">Figure 6. Opening Server Manager Dashboard</p>
<p style="text-align: justify;">In the <strong>Server Manager Dashboard</strong>, go to the <strong>top right hand corner</strong>, <strong>click</strong> on <strong>Tools</strong> and then <strong>click</strong> on <strong>Active Directory Administrative Center</strong>:</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/windows-2012-install-setup-fine-grained-password-policy-07.png" alt="windows-2012-install-setup-fine-grained-password-policy-07" style="margin: 0px; vertical-align: bottom;" title="Launching Active Directory Administrative Center" /></p>
<p style="text-align: center;">Figure 7. Launching Active Directory Administrative Center</p>
<p style="text-align: justify;">Once the <strong>Active Directory Administrative Center</strong> screen is open, from the<strong> left panel</strong>, <strong>select</strong> the <strong>Active Directory (local)</strong> to expand.</p>
<p style="text-align: justify;">In our example, the active directory is <strong>firewall (local)</strong>. <strong>Locate Systems, expand</strong> it and <strong>click</strong> on<strong> Password Settings Container</strong>:</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/windows-2012-install-setup-fine-grained-password-policy-08.png" alt="windows-2012-install-setup-fine-grained-password-policy-08" style="margin: 0px; vertical-align: bottom;" title="Locating the Password Settings Container" /></p>
<p style="text-align: center;">Figure 8. Locating the Password Settings Container</p>
<p style="text-align: justify;">On the <strong>right panel</strong>, under Tasks and Password Settings Container, <strong>click</strong> on <strong>New</strong>:</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/windows-2012-install-setup-fine-grained-password-policy-09.png" alt="windows-2012-install-setup-fine-grained-password-policy-09" style="margin: 0px; vertical-align: bottom;" title="Accessing Password Settings Container" /></p>
<p style="text-align: center;">Figure 9. Accessing Password Settings Container</p>
<p style="text-align: justify;">Now <strong>click</strong> on <strong>Settings</strong>, which will open up the Create Password Settings screen. <strong>Enter</strong> a <strong>name</strong> for the Fine-Grained Password Policy and a <strong>number</strong> for its precedence.</p>
<p style="text-align: justify;">For our example, we are using the name <strong>FGPP</strong> or <strong>Firewall Group Password Policy</strong> with a precedence index of 15. Also, <strong>configure</strong> the remainder of the <strong>policy settings</strong> as required:</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/windows-2012-install-setup-fine-grained-password-policy-010.png" alt="windows-2012-install-setup-fine-grained-password-policy-010" style="margin: 0px; vertical-align: bottom;" title="Configuring settings for our FGPP Policy" />&nbsp;<br />Figure 10. Configuring settings for our FGPP Policy</p>
<p style="text-align: justify;">Once satisfied with the settings, <strong>click</strong> on <strong>Add</strong> at the bottom right hand corner. This will open up the <strong>Select Users</strong> or <strong>Groups</strong> dialog.</p>
<p style="text-align: justify;"><strong>Click</strong> on <strong>Object Types</strong> to select either <strong>Users or Groups</strong> or both. <strong>Click</strong> on <strong>Locations</strong> to select the <strong>domain</strong>, which in our case is <strong>firewall.local</strong>.</p>
<p style="text-align: justify;">Under the object names to select, <strong>type</strong> the <strong>name of the group</strong> or <strong>user</strong> on whom you want to apply the password policy. In our example, this is <strong>Chris_Partsenidis</strong> as shown below:</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/windows-2012-install-setup-fine-grained-password-policy-011.png" alt="windows-2012-install-setup-fine-grained-password-policy-011" style="margin: 0px; vertical-align: bottom;" title="Selecting the Active Directory object to which the Fine Grained Password Policy will be applied to" /></p>
<p style="text-align: center;">Figure 11. Selecting the Active Directory object to which the Fine Grained Password Policy will be applied to</p>
<p style="text-align: justify;"><strong>Click</strong> on <strong>OK</strong>, and you will return to the <strong>Create Password Settings</strong> screen, which will now have the new name <strong>FGPP</strong> on top and the <strong>name of the user</strong> (to whom the policy will apply) at the bottom:</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/windows-2012-install-setup-fine-grained-password-policy-012.png" alt="windows-2012-install-setup-fine-grained-password-policy-012" style="margin: 0px; vertical-align: bottom;" title="Our Fine Grained Password Policy" /></p>
<p style="text-align: center;">Figure 12. Our Fine Grained Password Policy</p>
<p style="text-align: justify;"><strong>Click</strong> on <strong>OK</strong> to <strong>complete the process</strong> and go back to the <strong>Active Directory Administrative Center</strong>, which will now show the new<strong> Password Settings Container</strong> with the name <strong>FGPP</strong> and the precedence index in the center panel:</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/windows-2012-install-setup-fine-grained-password-policy-013.png" alt="windows-2012-install-setup-fine-grained-password-policy-013" style="margin: 0px; vertical-align: bottom;" title="Our Fine Grained Password Policy appearing in the Password Settings Container" /></p>
<p style="text-align: center;">Figure 13. Our Fine Grained Password Policy appearing in the Password Settings Container</p>
<p style="text-align: justify;">To modify any parameter, <strong>double click</strong> on the <strong>Password Settings Container</strong> in the central panel. Finally, when you are done, <strong>close</strong> the <strong>Active Directory Administrative Center</strong> window.</p>
<p style="text-align: justify;">This article covered the <strong>installation</strong> and <strong>configuration</strong> of <strong>Fine-Grained Password Policies</strong> for <strong>Windows Server 2012</strong>. We explained how Fine-Grained Password Policies can be <strong>installed</strong> via <strong>PowerShell</strong> and the<strong> Active Directory Administrative Center</strong>. Our <strong>step-by-step guide</strong> shows all the necessary details to ensure a<strong> successful installation</strong> and <strong>configuration</strong>. More <strong>high-quality articles</strong> can be found in visit our <a href="https://www.firewall.cx/operating-systems/microsoft/windows-servers.html" target="_self" title="Windows 2012 Section">Windows 2012 Section</a>.</p>]]></description>
			<category>Windows Servers</category>
			<pubDate>Fri, 03 Jul 2015 08:20:00 +1000</pubDate>
		</item>
		<item>
			<title>How to Install/Enable Telnet Client for Windows Server 2012 via GUI, Command Prompt and PowerShell</title>
			<link>https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-server-2012-install-telnet-client-via-gui-cmd-prompt-powershell.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-server-2012-install-telnet-client-via-gui-cmd-prompt-powershell.html</guid>
			<description><![CDATA[<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/windows-2012-install-telnet-client-via-gui-cmd-prompt-powershell-00.png" alt="windows-2012-install-telnet-client-via-gui-cmd-prompt-powershell-00" style="margin: 7px; float: left;" title="Windows Server 2012 Telnet Client Installation and Setup via Gui or Command Line" />IT professionals frequently need <strong>connectivity and management tools</strong>. The <strong>Telnet Client</strong> is one of the most basic <strong>tools</strong> for such activities. Using this tool, you can<strong> connect</strong> to a <strong>remote Telnet server</strong> and run applications on it. This is also a very useful tool for testing the connectivity to remote servers, such as those running<strong> SMTP services</strong>, <strong>web services</strong> and so on. In this article we will discuss <strong>how to install or enable Telnet client</strong> for <a href="https://www.firewall.cx/operating-systems/microsoft/windows-servers.html" target="_blank" title="Windows Server 2012 Technical Articles">Windows Server 2012</a>, using the <strong>GUI interface</strong> or <strong>command prompt</strong>.</p>
<p style="text-align: justify;">Microsoft operating systems since Windows NT have included the Telnet client as a feature. However, later Operating Systems beginning with the<strong> Windows Server 2008</strong> and <strong>Windows Vista</strong> prefer <strong>not to enable it by default</strong>. Although you can always use a third-party tool for assisting you in remote connections and for troubleshooting connectivity, you can enable the <strong>Telnet client</strong> on your Windows Server 2012 any time needed.</p>
<p class="box-info" style="text-align: justify;">Backup your Windows Server 2012 R2 host using Altaro’s <a href="https://clixtrac.com/goto/?202583" target="_blank" rel="nofollow noopener" title="Free Hyper-V Backup">Free Hyper-V &amp; VMware Backup solution</a>. <a href="https://clixtrac.com/goto/?202583" target="_blank" rel="nofollow noopener" title="Download Free Hyper-V Backup">Download Now!</a></p>
<p style="text-align: justify;">Primarily, there are<strong> three ways</strong> you can install or <strong>enable the Telnet client</strong> for <strong>Windows Server 2012</strong>. You can<strong> install</strong> the <strong>Telnet client</strong> from the <strong>Graphical User Interface</strong>, <strong>Windows command prompt</strong> or from <strong>PowerShell</strong>. We will discuss <strong>all the methods</strong> in this article.</p>
<h2 style="text-align: justify;">Installing Telnet Client From The GUI</h2>
<p style="text-align: justify;">Invoke the Server Manager by <strong>clicking</strong> on the<strong> second icon</strong> on the <strong>bottom taskbar</strong> on the desktop of the Windows Server 2012 R2:</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/windows-2012-install-telnet-client-via-gui-cmd-prompt-powershell-01.png" alt="windows-2012-install-telnet-client-via-gui-cmd-prompt-powershell-01" style="margin: 0px; vertical-align: bottom;" title="Launching Windows Server Dashboard" /></p>
<p style="text-align: center;">Figure 1. Launching Windows Server Dashboard</p>
<p style="text-align: left;">On the Dashboard, <strong>click</strong> on <strong>Add Roles and Features</strong>, which opens the Add roles and features wizard:</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/windows-2012-install-telnet-client-via-gui-cmd-prompt-powershell-02.png" alt="windows-2012-install-telnet-client-via-gui-cmd-prompt-powershell-02" style="margin: 0px; vertical-align: bottom;" title="Selecting Add roles and features on Windows 2012 Server" />&nbsp;<br />Figure 2. Selecting Add roles and features on Windows Server 2012</p>
<p><strong>Click</strong> on <strong>Installation Type</strong> and<strong> select Role Based</strong> or <strong>Feature Based Installation. <strong>Click</strong> </strong>on <strong><strong>Next</strong> </strong>to proceed:</p>
<p style="text-align: center;">&nbsp;<img src="https://www.firewall.cx/images/stories/windows-2012-install-telnet-client-via-gui-cmd-prompt-powershell-03.png" alt="windows-2012-install-telnet-client-via-gui-cmd-prompt-powershell-03" style="margin: 0px; vertical-align: bottom;" title="Windows Server 2012: Selecting Installation Type – Role-based or feature-based installation" /></p>
<p style="text-align: center;">Figure 3. Selecting Installation Type – Role-based or feature-based installation</p>
<p style="text-align: left;">On the next screen, you can<strong> Select a server from the server pool</strong>. We select the server<strong> FW-DC1.firewall.local:</strong></p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/windows-2012-install-telnet-client-via-gui-cmd-prompt-powershell-04.png" alt="windows-2012-install-telnet-client-via-gui-cmd-prompt-powershell-04" style="margin: 0px; vertical-align: bottom;" title="Windows Server 2012: Selecting our server, DC1.firewall.local" />&nbsp;<br />Figure 4. Selecting our server, DC1.firewall.local</p>
<p style="text-align: justify;"><strong>Clicking</strong> on <strong>Next</strong> brings you to the<strong> Server Roles</strong> screen. As there is nothing to be done here, <strong>click</strong> on <strong>Next</strong> to continue to the <strong>Features</strong> screen. Now <strong>Scroll down</strong> under the <strong>Features</strong> until you arrive at the <strong>Telnet Client</strong>. <strong>Click</strong> within the box in front of the entry <strong>Telnet Client</strong> to select it, then <strong>click</strong> on <strong>Next</strong> to continue:</p>
<p style="text-align: center;">&nbsp;<img src="https://www.firewall.cx/images/stories/windows-2012-install-telnet-client-via-gui-cmd-prompt-powershell-05.png" alt="windows-2012-install-telnet-client-via-gui-cmd-prompt-powershell-05" style="margin: 0px; vertical-align: bottom;" title="Windows Server 2012 Selecting the Telnet client for installation" /></p>
<p style="text-align: center;">Figure 5. Selecting the Telnet client for installation</p>
<p style="text-align: left;">The following screen asks you to <strong>Confirm Installation Selections</strong>. <strong>Click</strong> the <strong>Restart the destination server automatically if required</strong> tick box and <strong>click</strong> on <strong>Yes</strong> to confirm the automatic restart without notifications. Finally, <strong>click</strong> on <strong>Install</strong> to start the installation of the<strong> Telnet Client</strong>:</p>
<p style="text-align: center;">&nbsp;<img src="https://www.firewall.cx/images/stories/windows-2012-install-telnet-client-via-gui-cmd-prompt-powershell-06.png" alt="windows-2012-install-telnet-client-via-gui-cmd-prompt-powershell-06" style="margin: 0px; vertical-align: bottom;" title="Windows 2012 Server - Final confirmation and initiation of the Windows Telnet Client installation" /></p>
<p style="text-align: center;">Figure 6. Final confirmation and initiation of the Windows Telnet Client installation</p>
<p style="text-align: justify;">Once completed, the<strong> Results</strong> screen will inform the success or failure of the process:</p>
<p style="text-align: center;">&nbsp;<img src="https://www.firewall.cx/images/stories/windows-2012-install-telnet-client-via-gui-cmd-prompt-powershell-07.png" alt="windows-2012-install-telnet-client-via-gui-cmd-prompt-powershell-07" style="margin: 0px; vertical-align: bottom;" title="Windows Server 2012: Successful installation of Windows Server Telnet Client" /></p>
<p style="text-align: center;">Figure 7. Successful installation of Windows Server Telnet Client</p>
<p style="text-align: justify;"><strong>Click</strong> on <strong>Close</strong> to end the installation and return to the Server Manager screen.</p>
<p class="box-info">Running a Windows Hyper-V or VMware server? Hyper-V &amp; VMware backup made easy with Altaro’s <a href="https://clixtrac.com/goto/?202583" target="_blank" rel="nofollow noopener" title="Free Hyper-V Backup">Free VM Backup solution</a>. <a href="https://clixtrac.com/goto/?202583" target="_blank" rel="nofollow noopener" title="Download Free Hyper-V Backup">Download Now!</a></p>
<h2 style="text-align: justify;">Installing Telnet Client From The Command Prompt</h2>
<p style="text-align: justify;">You need to invoke the <strong>Command Prompt</strong> window as an Administrator. For this, <strong>right click</strong> on the <strong>Windows Start icon</strong> located on the lower left corner on the desktop taskbar, then <strong>Click</strong> on <strong>Command Prompt (Admin)</strong> and <strong>click</strong> on <strong>Yes</strong> to the <strong>User Account Control</strong> query that opens up.</p>
<p style="text-align: center;">&nbsp;<img src="https://www.firewall.cx/images/stories/windows-2012-install-telnet-client-via-gui-cmd-prompt-powershell-08.png" alt="windows-2012-install-telnet-client-via-gui-cmd-prompt-powershell-08" style="margin: 0px; vertical-align: bottom;" title="Wndows Server 2012 - Launching a Command Prompt with Administrator privileges" /></p>
<p style="text-align: center;">Figure 8. Launching a Command Prompt with Administrator privileges</p>
<p style="text-align: justify;">&nbsp;Once the <strong>Administrator: Command Prompt</strong> window opens, <strong>type</strong> the following command and <strong>press Enter</strong>:</p>
<div class="box-content">C:\Windows\system32&gt;<strong>dism /online /Enable-Feature /FeatureName:TelnetClient</strong></div>
<p style="text-align: center;">&nbsp;<img src="https://www.firewall.cx/images/stories/windows-2012-install-telnet-client-via-gui-cmd-prompt-powershell-09.png" alt="windows-2012-install-telnet-client-via-gui-cmd-prompt-powershell-09" style="margin: 0px; vertical-align: bottom;" title="Windows Server 2012 - Installing Telnet Client via Elevated Command Prompt" /></p>
<p style="text-align: center;">Figure 9. Installing Telnet Client via Elevated Command Prompt</p>
<p style="text-align: justify;">The command prompt will provide a real-time update within the command prompt window and inform you once the <strong>Telnet Client</strong> has been successfully installed.</p>
<p style="text-align: justify;">To exit the command prompt window, simply <strong>click</strong> on the <strong>X</strong> button (top right corner) or <strong>type Exit</strong> and <strong>press Enter</strong>.</p>
<p class="box-info" style="text-align: justify;">Note: It is possible to also <strong>install Windows Telnet Client on Windows 8 &amp; Windows 8.1</strong> using the same commands at the <strong>Command Line Prompt</strong> or <strong>PowerShell interface</strong>.</p>
<h2 style="text-align: justify;">Installing Telnet Client From PowerShell</h2>
<p style="text-align: justify;">You need to invoke the PowerShell with elevated permissions, i.e., run as Administrator. For this, <strong>right click</strong> on the <strong>third icon</strong> from the left on the bottom taskbar on the desktop of the Windows Server 2012 R2:</p>
<p style="text-align: center;">&nbsp;<img src="https://www.firewall.cx/images/stories/windows-2012-install-telnet-client-via-gui-cmd-prompt-powershell-010.png" alt="windows-2012-install-telnet-client-via-gui-cmd-prompt-powershell-010" style="margin: 0px; vertical-align: bottom;" title="Windows Server 2012 - Running PowerShell with Administrator privileges" /></p>
<p style="text-align: center;">Figure 10. Running PowerShell with Administrator privileges</p>
<p><strong>Click</strong> on <strong>Run as Administrator</strong> and <strong>click</strong> on <strong>Yes</strong> to the <strong>User Account Control query</strong> that opens up.</p>
<p>Within the PowerShell window, <strong>type</strong> the following two commands, <strong>pressing Enter</strong> after each one:</p>
<div class="box-content">PS C:\Windows\system32&gt; <strong>Import-Module servermanager<br /></strong>PS C:\Windows\system32&gt; <strong><strong>Add-WindowsFeature telnet-client</strong></strong></div>
<p style="text-align: center;">&nbsp;<img src="https://www.firewall.cx/images/stories/windows-2012-install-telnet-client-via-gui-cmd-prompt-powershell-011.png" alt="windows-2012-install-telnet-client-via-gui-cmd-prompt-powershell-011" style="margin: 0px; vertical-align: bottom;" title="Windows Server 2012 - Installing Telnet Client via PowerShell On Windows 2012 R2 Server" /></p>
<p style="text-align: center;">Figure 11. Installing Telnet Client via PowerShell On Windows 2012 R2 Server</p>
<p style="text-align: justify;">Windows PowerShell will commence installing Telnet Client and will inform you if the Telnet Client has been successfully installed and whether the server needs a restart.</p>
<p style="text-align: justify;"><strong>Type Exit</strong> and <strong>press Enter</strong> to close the Windows PowerShell window.</p>
<p style="text-align: justify;">This article showed <strong>how to install</strong> the <strong>Telnet Client</strong> on <strong>Windows Server 2012 R2</strong> using the <strong>Windows GUI Interface</strong>, <strong>Elevated Command prompt</strong> and <strong>Windows PowerShell</strong>. For more exciting articles on Windows 2012 R2 server, visit our <a href="https://www.firewall.cx/operating-systems/microsoft/windows-servers.html" target="_self" title="Windows 2012 Section">Windows 2012 Section</a>.</p>]]></description>
			<category>Windows Servers</category>
			<pubDate>Wed, 01 Jul 2015 00:29:00 +1000</pubDate>
		</item>
		<item>
			<title>How to Enable &amp; Configure Shadow Copy for Shared Folders on Windows Server 2012 R2</title>
			<link>https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-server-2012-shadow-copy-setup-generate-file-folder-snapshots.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-server-2012-shadow-copy-setup-generate-file-folder-snapshots.html</guid>
			<description><![CDATA[<p style="text-align: justify;">When you <strong>shadow copy a disk volume</strong>, you are actually <strong>generating a snapshot</strong> of the <strong>changes</strong> made to the <strong>folders and files</strong> within the <strong>disk volume</strong> at a <strong>certain point in time. Windows 2012 R2 shadow copy feature</strong> allows <strong>taking snapshots at set intervals</strong>, so that users <strong>can revert</strong> and <strong>restore their folders and files</strong> to a <strong>previous version</strong>.</p>
<p style="text-align: justify;">The <strong>shadow copy feature for backups</strong> is a <strong>much faster solution</strong> compared to the traditional backup solution. We should keep in mind that shadow copy is <strong>not meant as a replacement</strong> for the <strong>traditional backup process</strong>. The <strong>shadow copy process never copies all the files and folders</strong>, but only <strong>keeps track of the changes made</strong> to them. This is the reason <strong>shadow copy cannot replace the traditional backup</strong> process. Typically, shadow copies are useful in scenarios where one needs to restore an earlier version of files or folders.</p>
<p style="text-align: justify;">To <strong>configure shadow copy</strong> of a <strong>shared folder</strong> in <strong>Windows Server 2012</strong>, at first, you have to <strong>enable the shadow copy feature</strong> on the <strong>disk volume</strong> containing the shared folder. The <strong>shadow copy process</strong> works only at <strong>volume level</strong> and <strong>not on individual files or directories</strong>. Additionally, it works <strong>only on NTFS volumes</strong> and <strong>not on FAT volumes</strong>. After generating a snapshot of the data, the server keeps track of changes occurring to the data.</p>
<p style="text-align: justify;">Typically, the server stores the changes on the same volume as the original, but you can change the destination. Additionally, you can define the disk space allocated to shadow copies. As the allocated disk space fills up, the server deletes the oldest shadow copy snapshot, thereby making room for newer shadow copies. Once the server has deleted a shadow copy snapshot, <strong>you cannot retrieve it</strong>. Windows Server 2012 R2 can keep <strong>a maximum of 64 shadow copies</strong> per volume.</p>
<p class="box-info" style="text-align: justify;">Running a Windows Hyper-V or VMware Server?&nbsp; Hyper-V &amp; VMware Backup made easy with Altaro’s <a href="https://clixtrac.com/goto/?202588" target="_blank" rel="nofollow noopener" title="Free Hyper-V Backup Solution">Free VM Backup Solution</a>.&nbsp; <a href="https://clixtrac.com/goto/?202588" target="_blank" rel="nofollow noopener" title="Download Free Hyper-V Backup Solution">Download Now!</a></p>
<h2 style="text-align: justify;">Install File &amp; Storage Services</h2>
<p style="text-align: justify;">The shadow copy feature requires prior installation of all the File and Storage Services. For installing or verifying the installation of all the File and Storage Services, <strong>logon</strong> to the server as a<strong> local administrator</strong>, go to the<strong> Server Manager Dashboard</strong> and <strong>click</strong> on <strong>Add Roles and Features</strong>.</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/windows-2012-shadow-copy-setup-generate-file-folder-01.png" alt="windows-2012-shadow-copy-setup-generate-file-folder-01" width="650" height="437" style="margin: 0px; vertical-align: bottom;" title="Windows Server Server Manager Dashboard" /></p>
<p style="text-align: center;">Figure 1. Server Manager Dashboard</p>
<p style="text-align: justify;">This opens the <strong>Add Roles and Features Wizard</strong>, wherein go to <strong>Server Selection</strong> to select the server on which you want to install the File and Storage Services:</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/windows-2012-shadow-copy-setup-generate-file-folder-02.png" alt="windows-2012-shadow-copy-setup-generate-file-folder-02" width="650" height="463" style="margin: 0px; vertical-align: bottom;" title="Selecting our Windows 2012 R2 Server from the server pool" /></p>
<p style="text-align: center;">Figure 2. Selecting our Windows 2012 R2 Server from the server pool</p>
<p style="text-align: justify;"><strong>Click</strong> on <strong>Next</strong> and select <strong>Server Roles</strong>. <strong>Expand</strong> the <strong>File and Storage Services</strong> and the <strong>File and iSCSI Services</strong>. Check that tick marks are visible against all the services. <strong>Click</strong> on those missing the tick marks:</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/windows-2012-shadow-copy-setup-generate-file-folder-03.png" alt="windows-2012-shadow-copy-setup-generate-file-folder-03" width="650" height="463" style="margin: 0px; vertical-align: bottom;" title="Selecting File &amp; Storage Services, plus iSCSI Services for installation" /></p>
<p style="text-align: center;">Figure 3. Selecting File &amp; Storage Services, plus iSCSI Services for installation</p>
<p style="text-align: justify;"><strong>Click Next</strong> four times until you arrive at <strong>Confirmation</strong>:</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/windows-2012-shadow-copy-setup-generate-file-folder-04.png" alt="windows-2012-shadow-copy-setup-generate-file-folder-04" width="650" height="465" style="margin: 0px; vertical-align: bottom;" title="Add roles and Features – Final confirmation Window" /></p>
<p style="text-align: center;">Figure 4. Add roles and Features – Final confirmation Window</p>
<p style="text-align: justify;"><strong>Click</strong> on <strong>Install</strong> to enable all the <strong>File and Storage Services</strong>. Once the server has completed the installation, <strong>click</strong> on <strong>Close</strong>.</p>
<h2 style="text-align: justify;">Enabling The Shadow Copy Feature</h2>
<p style="text-align: justify;">After having confirmed that the server has enabled all <strong>File and Storage Services</strong>, go to the server desktop and open the <strong>File Explorer</strong>. You can do this by <strong>pressing</strong> the <strong>WINDOWS+E</strong> keys together on your keyboard or by <strong>clicking</strong> on the <strong>fourth icon</strong> from left on the <strong>bottom toolbar</strong> on the Windows Server 2012 R2 desktop:</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/windows-2012-shadow-copy-setup-generate-file-folder-05.png" alt="windows-2012-shadow-copy-setup-generate-file-folder-05" style="margin: 0px; vertical-align: bottom;" title="Opening Windows File Explorer" />&nbsp;</p>
<p style="text-align: center;">Figure 5. Opening Windows File Explorer</p>
<p style="text-align: justify;">We will <strong>enable shadow copy</strong> for the volume C:\. Within this volume, we have our folder <strong>C:\Users\Chris_Partsenidis_Share</strong> for which we would like to ensure shadow copy is enabled:</p>
<p><img src="https://www.firewall.cx/images/stories/windows-2012-shadow-copy-setup-generate-file-folder-06.png" alt="windows-2012-shadow-copy-setup-generate-file-folder-06" style="margin: 0px auto; vertical-align: bottom; display: block;" title="Location of the folder we will be using as a Shadow-Copy example" /></p>
<p style="text-align: center;">Figure 6. Location of the folder we will be using as a Shadow-Copy example</p>
<p style="text-align: justify;"><strong>Right-click</strong> on the Local Disk or <strong>volume C:\</strong> (Or any other volume depending on your requirements) and select <strong>Configure shadow copies</strong> from the drop-down menu:</p>
<p><img src="https://www.firewall.cx/images/stories/windows-2012-shadow-copy-setup-generate-file-folder-07.png" alt="windows-2012-shadow-copy-setup-generate-file-folder-07" style="margin: 0px auto; display: block; vertical-align: bottom;" title="How to enable Shadow Copy for a Windows Volume" /></p>
<p style="text-align: center;">Figure 7. How to enable Shadow Copy for a Windows Volume</p>
<p style="text-align: justify;">When the <strong>UAC confirmation dialog box opens</strong>, confirm with <strong>Yes</strong>. This opens the screen for <strong>Shadow Copies</strong>. Under <strong>Select a volume</strong>, <strong>click</strong> to select the <strong>volume C:\</strong> from the list or any other volume for which you want to <strong>turn on shadow copies</strong>. Now, <strong>click</strong> on <strong>Enable</strong>.</p>
<p style="text-align: justify;">A confirmation dialog will appear to <strong>Enable Shadow Copies</strong> along with a warning about file servers with high I/O loads:</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/windows-2012-shadow-copy-setup-generate-file-folder-08.png" alt="windows-2012-shadow-copy-setup-generate-file-folder-08" style="margin: 0px; vertical-align: bottom;" title="Enable Shadow Copy confirmation window" /></p>
<p style="text-align: center;">Figure 8. Enable Shadow Copy confirmation window</p>
<p style="text-align: justify;"><strong>Click</strong> on <strong>Yes</strong> to complete the process. You will be returned to the <strong>Shadow Copies screen</strong> and under <strong>Shadow copies</strong> of the selected volume, you can see the newly created Shadow Copy for volume C:\:</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/windows-2012-shadow-copy-setup-generate-file-folder-09.png" alt="windows-2012-shadow-copy-setup-generate-file-folder-09" style="margin: 0px; vertical-align: bottom;" title="Viewing the status of Shadow Copy for our Volume" />&nbsp;</p>
<p style="text-align: center;">Figure 9. Viewing the status of Shadow Copy for our Volume</p>
<p style="text-align: justify;"><strong>Click</strong> on <strong>Settings</strong> to open the <strong>Settings dialog</strong>. In the <strong>Settings dialog</strong>, under <strong>Maximum size</strong>, you can select either <strong>No limit</strong> for the space reserved or set a limit for it by selecting <strong>Use limit</strong>. Note that as stated in the dialog box, a <strong>minimum limit</strong> of <strong>300MB</strong> is necessary for the space reserved for shadow copies:</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/windows-2012-shadow-copy-setup-generate-file-folder-10.png" alt="windows-2012-shadow-copy-setup-generate-file-folder-10" style="margin: 0px; vertical-align: bottom;" title="Setting the maximum size to be used by Shadow Copy for our volume" />&nbsp;</p>
<p style="text-align: center;">Figure 10. Setting the maximum size to be used by Shadow Copy for our volume</p>
<p style="text-align: justify;">Next, you can either go with the <strong>default schedule</strong> of <strong>two snapshots of shadow copies every day</strong>, or define your own by <strong>clicking</strong> on <strong>Schedule</strong> to open the <strong>Schedule dialog</strong>:</p>
<p><img src="https://www.firewall.cx/images/stories/windows-2012-shadow-copy-setup-generate-file-folder-11.png" alt="windows-2012-shadow-copy-setup-generate-file-folder-11" style="margin: 0px auto; display: block; vertical-align: bottom;" title="Configuring the Shadow Copy Schedule" /></p>
<p style="text-align: center;">Figure 11. Configuring the Shadow Copy Schedule</p>
<p style="text-align: justify;">In the <strong>Schedule dialog</strong>, tweak the settings to fit your environment in the best possible way and <strong>click</strong> on <strong>Ok</strong> to return to the <strong>Shadow Copies dialog</strong>.</p>
<p style="text-align: justify;">To create a current snapshot, <strong>click</strong> on <strong>Create Now</strong> and under <strong>Shadow Copies of Selected Volume</strong>, a date and time entry will appear, signifying that the server has created a shadow copy snapshot. <strong>Click</strong> on <strong>Ok</strong> to close the dialog.</p>
<h2 style="text-align: justify;">Accessing Shadow Copies</h2>
<p style="text-align: justify;">Users can access the shared volume/folders from either their local server or from a client PC over the network. They can see the previous versions (shadow copies) of their folders and files from the <strong>Properties</strong> of the shared folder or file.</p>
<p style="text-align: justify;">Go to <strong>File explorer</strong> and <strong>click</strong> on a shared volume - <strong>volume C:\</strong> in our case. <strong>Select</strong> the shared folder within the shared volume – which, in our example, is <strong>C:\Users\Chris_Partsenidis</strong>. <strong>Right-click</strong> on the shared folder and go to <strong>Restore previous versions:</strong></p>
<p><img src="https://www.firewall.cx/images/stories/windows-2012-shadow-copy-setup-generate-file-folder-12.png" alt="windows-2012-shadow-copy-setup-generate-file-folder-12" style="margin: 0px auto; display: block; vertical-align: bottom;" title="Viewing the Shadow Copy status of our shared folder" /></p>
<p style="text-align: center;">Figure 12. Viewing the Shadow Copy status of our shared folder</p>
<p style="text-align: justify;">This opens the <strong>Properties dialog</strong> for the share folder - <strong>C:\Users\Chris_Partsenidis</strong>. The list under <strong>Folder versions</strong> has all the shadow copies created for the share folder – <strong>C:\Users\Chris_Partsenidis</strong>. From this list, you can select a specific previous version (shadow copy) and choose to <strong>Open</strong>, <strong>Copy</strong> or <strong>Restore</strong> it.</p>
<p><img src="https://www.firewall.cx/images/stories/windows-2012-shadow-copy-setup-generate-file-folder-13.png" alt="windows-2012-shadow-copy-setup-generate-file-folder-13" style="margin: 0px auto; display: block; vertical-align: bottom;" title="Accessing previous versions of our shared folder" /></p>
<p style="text-align: center;">Figure 13. Accessing previous versions of our shared folder</p>
<p style="text-align: justify;">After you have completed your work, click on <strong>Ok</strong> or <strong>Cancel</strong> to exit the dialog box.</p>
<p style="text-align: justify;">This article explained the purpose <strong>Windows Shadow Copy services</strong>, how to <strong>enable</strong> and <strong>configure Shadow Copy</strong> for a Windows Volume. We also saw how administrators and users can <strong>access previous versions</strong> of <strong>folders/files</strong> that are located in a <strong>shadow-copy enabled volume</strong>. </p>]]></description>
			<category>Windows Servers</category>
			<pubDate>Sun, 28 Jun 2015 02:14:39 +1000</pubDate>
		</item>
		<item>
			<title>Windows Server 2012 File Server Resources Manager (FSRM) Installation &amp; Configuration - Block Saving Of Specific File Types on Windows Server</title>
			<link>https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-2012-fsrm-installation-configuration-block-defined-file-types.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-2012-fsrm-installation-configuration-block-defined-file-types.html</guid>
			<description><![CDATA[<p style="text-align: justify;">The <strong>Windows Server 2008</strong> first carried <strong>FSRM</strong> or <strong>Fie Server Resources Manager</strong>, which allowed administrators to <strong>define the file types</strong> that users could<strong> save to file servers. Windows FSRM</strong> has been a part of all succeeding Windows Servers, and administrators can now<strong> block defined file types</strong> from being <strong>uploaded to a specific folder or to an entire volume on the server.</strong></p>
<p style="text-align: justify;">Before you can begin<strong> blocking file extensions</strong>, you may need to <strong>install and configure FSRM</strong> on your <a href="https://www.firewall.cx/operating-systems/microsoft/windows-servers.html" target="_blank" title="Windows Server 2012 R2">Windows Server 2012 R2</a><strong>. Installation of FSRM</strong> can be achieved through the <strong>Server Manager GUI</strong> or by using the <strong>PowerShell console</strong>.</p>
<p style="text-align: justify;">This article will examine the <strong>installation of FSRM</strong> using both methods, <strong>Server Manager GUI</strong> and <strong>Windows Server PowerShell console</strong>, while providing all necessary information to ensure a <strong>successful deployment and configuration of FSRM services</strong>.</p>
<p class="box-info"><a href="https://clixtrac.com/goto/?202189" target="_blank" rel="nofollow noopener" title="Free Hyper-V Backup">FREE Hyper-V &amp; VMware Backup</a>: Easy to use - Powerful features - Just works, no hassle: It's FREE for Firewall.cx readers! <a href="https://clixtrac.com/goto/?202189" target="_blank" rel="nofollow noopener" title="Free Hyper-V Backup Download">Download Now!</a></p>
<h2 style="text-align: justify;">Installing FSRM On Server 2012 Using The Server Manager GUI</h2>
<p style="text-align: justify;">Assuming you are logged in as the administrator, start with the <strong>Server Manager – click</strong> on the second icon from left on the bottom toolbar on the desktop as shown below:</p>
<p style="text-align: center;"><strong><img src="https://www.firewall.cx/images/stories/windows-2012-fsrm-installation-configuration-block-defined-file-types-1.png" alt="windows-2012-fsrm-installation-configuration-block-defined-file-types-1" style="margin: 0px; vertical-align: bottom;" title="Launching the Server Manager Dashboard" /></strong><span style="font-size: 10.0pt; font-family: 'Calibri',sans-serif; mso-ascii-theme-font: minor-latin; mso-fareast-font-family: Tahoma; mso-hansi-theme-font: minor-latin; mso-bidi-font-family: 'Times New Roman'; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;"></span></p>
<p style="text-align: center;"><span style="font-size: 10.0pt; font-family: 'Calibri',sans-serif; mso-ascii-theme-font: minor-latin; mso-fareast-font-family: Tahoma; mso-hansi-theme-font: minor-latin; mso-bidi-font-family: 'Times New Roman'; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;">Figure 1. Launching the Server Manager Dashboard</span></p>
<p style="text-align: justify;">This brings up the <strong>Server Manager Dashboard</strong>. Proceed to the top right hand corner and<strong> click</strong> on <strong>Manage</strong>, then <strong>click</strong> on <strong>Add Roles and Features</strong>.</p>
<div style="text-align: center;"><img src="https://www.firewall.cx/images/stories/windows-2012-fsrm-installation-configuration-block-defined-file-types-2.png" alt="windows-2012-fsrm-installation-configuration-block-defined-file-types-2" style="margin: 0px; vertical-align: bottom;" title="Opening Add Roles and Features Console" /></div>
<div style="text-align: center;">Figure 2. Opening Add Roles and Features console</div>
<p style="text-align: justify;">This opens the <strong>Add Roles and Features Wizard</strong>, where you need to <strong>click</strong> on <strong>Server Selection</strong>. Depending on how many servers you are currently managing, the right hand side will show one or multiple servers in the pool. Select the file server on which you want to install FSRM, and <strong>click</strong> on <strong>Next</strong> to proceed.</p>
<p style="text-align: center;">&nbsp;<img src="https://www.firewall.cx/images/stories/windows-2012-fsrm-installation-configuration-block-defined-file-types-3.png" alt="windows-2012-fsrm-installation-configuration-block-defined-file-types-3" style="margin: 0px; vertical-align: bottom;" title="Selecting a Server to add the FSRM role" /></p>
<p style="text-align: center;">Figure 3. Selecting a Server to add the FSRM role</p>
<p style="text-align: justify;">The next screen shows the server roles that you can install on the selected server. On the right hand side, locate <strong>File and Storage Services</strong> and <strong>expand</strong> it. Locate the <strong>File and iSCSI services</strong> and <strong>expand</strong> it. Now, locate the <strong>File Server Resource Manager</strong> entry.</p>
<p style="text-align: center;">&nbsp;<img src="https://www.firewall.cx/images/stories/windows-2012-fsrm-installation-configuration-block-defined-file-types-4.png" alt="windows-2012-fsrm-installation-configuration-block-defined-file-types-4" style="margin: 0px; vertical-align: bottom;" title="Selecting the File Server Resource Manager role for installation" /> <br />Figure 4. Selecting the File Server Resource Manager role for installation</p>
<p style="text-align: justify;"><strong>Click</strong> on the <strong>check box</strong> in front of the entry <strong>File Server Resource Manager</strong>. This will open up the confirmation dialog box for the additional features that you must first install before installing FSRM.</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/windows-2012-fsrm-installation-configuration-block-defined-file-types-5.png" alt="windows-2012-fsrm-installation-configuration-block-defined-file-types-5" style="margin: 0px; vertical-align: bottom;" title="Confirming the installation of additional role services required for FSRM" />&nbsp;<br />Figure 5. Confirming the installation of additional role services required for FSRM</p>
<p style="text-align: justify;"><strong>Click</strong> on <strong>Add Features</strong> and you are all set to install FSRM, as the check box for <strong>File Server Resource Manager</strong> now has a tick mark (shown below).</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/windows-2012-fsrm-installation-configuration-block-defined-file-types-6.png" alt="windows-2012-fsrm-installation-configuration-block-defined-file-types-6" style="margin: 0px; vertical-align: bottom;" title="Back to the Server Role installation – Confirming FSRM Role Selection" /></p>
<p style="text-align: center;">Figure 6. Back to the Server Role installation – Confirming FSRM Role Selection</p>
<p style="text-align: justify;"><strong>Clicking</strong> on <strong>Next</strong> allows you to <strong>Select one or more features to install on the selected server</strong>. We don’t need to add anything here at this stage, so click <strong>Next</strong> to go to the next step.</p>
<p style="text-align: justify;">This brings up a screen asking you to <strong>Confirm installation selections</strong>. This is the stage where you have the last chance to go back and make any changes, before the actual installation starts.</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/windows-2012-fsrm-installation-configuration-block-defined-file-types-7.png" alt="windows-2012-fsrm-installation-configuration-block-defined-file-types-7" style="margin: 0px; vertical-align: bottom;" title="Confirm installation selections" />&nbsp;<br />Figure 7. Confirm installation selections</p>
<p style="text-align: justify;"><strong>Click</strong> on <strong>Install</strong> to allow the installation to commence and show the progress on the progress bar on the <strong>Results</strong> screen. Once completed, you can see the Installation <strong>successful on …</strong> under the progress bar.</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/windows-2012-fsrm-installation-configuration-block-defined-file-types-8.png" alt="windows-2012-fsrm-installation-configuration-block-defined-file-types-8" style="margin: 0px; vertical-align: bottom;" title="Completion of FSRM role installation" />&nbsp;<br />Figure 8. Completion of FSRM role installation</p>
<p style="text-align: justify;"><strong>Click</strong> on <strong>Close</strong> to exit the process.</p>
<p style="text-align: justify;">To check if the FSRM has actually started running, go to the <strong>Server Manager Dashboard</strong> and <strong>click</strong> on <strong>File and Storage Services</strong> on the left hand side of the screen.</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/windows-2012-fsrm-installation-configuration-block-defined-file-types-9.png" alt="windows-2012-fsrm-installation-configuration-block-defined-file-types-9" style="margin: 0px; vertical-align: bottom;" title="Server Manager Dashboard" />&nbsp;<br />Figure 9. Server Manager Dashboard</p>
<p style="text-align: justify;">The <strong>Dashboard</strong> now shows all the servers running under the <strong>File and Storage Services</strong>. Go down to <strong>Services</strong> and you will see FSRM running with an automatic start up.</p>
<p style="text-align: center;">&nbsp;<img src="https://www.firewall.cx/images/stories/windows-2012-fsrm-installation-configuration-block-defined-file-types-10.png" alt="windows-2012-fsrm-installation-configuration-block-defined-file-types-10" style="margin: 0px; vertical-align: bottom;" title="File and Storage Services – Confirming FSRM Service" /></p>
<p style="text-align: center;">Figure 10. File and Storage Services – Confirming FSRM Service</p>
<h2 style="text-align: left;">Installing FSRM On Server 2012 Using The PowerShell Console</h2>
<p style="text-align: justify;">This is a comparatively easier and faster process compared to the GUI method.</p>
<p style="text-align: justify;">To <strong>invoke</strong> the <strong>PowerShell</strong>, <strong>click</strong> the <strong>third icon</strong> from left on the <strong>bottom toolbar</strong> on the desktop.</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/windows-2012-fsrm-installation-configuration-block-defined-file-types-11.png" alt="windows-2012-fsrm-installation-configuration-block-defined-file-types-11" style="margin: 0px; vertical-align: bottom;" title="Launching Windows PowerShell" />&nbsp;<br />Figure 11. Launching Windows PowerShell</p>
<p style="text-align: justify;">&nbsp;This will open up a console with an administrative level command prompt. At the command prompt, type:</p>
<div class="box-content" style="text-align: left;">C:\Users\Administrator&gt; <strong>Add-WindowsFeature –Name FS-Resource-Manager –IncludeManagementTools</strong></div>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/windows-2012-fsrm-installation-configuration-block-defined-file-types-12.png" alt="windows-2012-fsrm-installation-configuration-block-defined-file-types-12" style="margin: 0px; vertical-align: bottom;" title="Executing PowerShell command to install FSRM" /></p>
<p style="text-align: center;">Figure 12.&nbsp; Executing PowerShell command to install FSRM</p>
<p style="text-align: justify;">A successful installation will be indicated as <strong>True</strong> , under the <strong>Success column</strong> as shown above.</p>
<p class="box-info" style="text-align: justify;">FREE Hyper-V &amp; VMware Backup:&nbsp; Easy to use - Powerful features - Just works, no hassle: It's FREE for Firewall.cx readers! <a href="https://clixtrac.com/goto/?202189" target="_blank" rel="nofollow noopener" title="Free Hyper-V Backup">Download Now!</a><a href="http://clixtrac.com/goto/?202189" target="_blank" rel="nofollow noopener" title="Free Hyper-V Backup Download"></a></p>
<h2 style="text-align: justify;">Configuring File Screening</h2>
<p style="text-align: justify;"><strong>Invoke FSRM</strong> from the <strong>Tools menu</strong> on the top right hand corner of the <strong>Server Manager Dashboard</strong>.</p>
<p style="text-align: center;">&nbsp;<img src="https://www.firewall.cx/images/stories/windows-2012-fsrm-installation-configuration-block-defined-file-types-13.png" alt="windows-2012-fsrm-installation-configuration-block-defined-file-types-13" style="margin: 0px; vertical-align: bottom;" title="Running the File Server Resource Manager component" /></p>
<p style="text-align: center;">Figure 13. Running the File Server Resource Manager component</p>
<p style="text-align: justify;">The <strong>File Server Resource Manager</strong> screen opens up. On the left panel, <strong>expand</strong> the <strong>File Screening Management</strong> and go to <strong>File Groups</strong>. The central panel shows the <strong>File Groups</strong>, the <strong>Include Files</strong> and the <strong>Exclude Files</strong> in three columns.</p>
<p style="text-align: justify;">Under the column <strong>File Groups</strong>, you will find file types conveniently grouped together. The column <strong>Include Files</strong> lists all file extensions that are included in the <strong>specific file group</strong>. For a new server, the column <strong>Exclude Files</strong> is typically <strong>empty</strong>.</p>
<p style="text-align: center;">&nbsp;<img src="https://www.firewall.cx/images/stories/windows-2012-fsrm-installation-configuration-block-defined-file-types-14.png" alt="windows-2012-fsrm-installation-configuration-block-defined-file-types-14" style="margin: 0px; vertical-align: bottom;" title="File Groups, Include File and Exclude Files" /></p>
<p style="text-align: center;">Figure 14 – File Groups, Include File and Exclude Files</p>
<p style="text-align: justify;">On the left panel, go to <strong>File Screen Templates</strong> and <strong>click</strong> on it. The central panel shows predefined rules that apply to folders or volumes.</p>
<p style="text-align: center;">&nbsp;<img src="https://www.firewall.cx/images/stories/windows-2012-fsrm-installation-configuration-block-defined-file-types-15.png" alt="windows-2012-fsrm-installation-configuration-block-defined-file-types-15" style="margin: 0px; vertical-align: bottom;" title="File Server Resource Manager - File Screen Templates" /></p>
<p style="text-align: center;">Figure 15. File Server Resource Manager - File Screen Templates</p>
<p style="text-align: justify;">For instance, <strong>double-click</strong> on <strong>Block Image Files</strong> in the central panel. This opens up the <strong>File Screen Template Properties for Block Image Files</strong>. Here you can define all the actions that the server will take when it encounters a situation where a user is trying to save a file belonging to the excluded group.</p>
<p style="text-align: center;">&nbsp;<img src="https://www.firewall.cx/images/stories/windows-2012-fsrm-installation-configuration-block-defined-file-types-16.png" alt="windows-2012-fsrm-installation-configuration-block-defined-file-types-16" style="margin: 0px; vertical-align: bottom;" title="FSRM - File Screen Template Properties for Block Image Files" /></p>
<p style="text-align: center;">Figure 16. FSRM - File Screen Template Properties for Block Image Files</p>
<p style="text-align: justify;">You can choose to screen the specified file type either <strong>actively</strong> or <strong>passively</strong>. Active screening disallows users from saving the specified file group. With passive screening, users are not prevented from saving the files while the administrator can monitor their actions.</p>
<p style="text-align: justify;">The server can send from <strong>one</strong> to <strong>four</strong> basic alerts when it encounters an attempt to save a forbidden file. The server can send an <strong>Email message</strong> to the administrator, create an entry in the <strong>Event Log</strong>, <strong>run a specified Command</strong> or <strong>Script</strong> and or <strong>generate a Report</strong>. You can set up the details for each action on individual tabs. When completed, exit by clicking on <strong>OK</strong> or <strong>Cancel</strong>.</p>
<p style="text-align: justify;">To <strong>edit</strong> the existing template or to <strong>create</strong> a new one based on the chosen template, go to the <strong>File Screen Templates</strong> and in the central panel,<strong> right-click</strong> on the <strong>predefined template</strong> you would like to edit. From the <strong>Actions menu</strong> on the right panel, you can either <strong>Create File Screen Template</strong> or <strong>Edit Template Properties</strong>.</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/windows-2012-fsrm-installation-configuration-block-defined-file-types-17.png" alt="windows-2012-fsrm-installation-configuration-block-defined-file-types-17" style="margin: 0px; vertical-align: bottom;" title="FSRM – Creating or editing a File Screen Template" />&nbsp;<br />Figure 17. FSRM – Creating or editing a File Screen Template</p>
<p style="text-align: justify;"><strong>Clicking</strong> on <strong>Create File Screen Template</strong> opens up a dialog where you can <strong>click</strong> on <strong>Browse</strong> to select a folder or volume on which the new rule would be applied. Under <strong>How do you want to configure file screen properties?</strong> You can either Derive or Create the file screen properties. <strong>Click</strong> on <strong>Create</strong> to allow the new file screen rule to appear in the central panel.</p>
<p style="text-align: center;">&nbsp;<img src="https://www.firewall.cx/images/stories/windows-2012-fsrm-installation-configuration-block-defined-file-types-18.png" alt="windows-2012-fsrm-installation-configuration-block-defined-file-types-18" style="margin: 0px; vertical-align: bottom;" title="FSRM - Creating a File Screen" /></p>
<p style="text-align: center;">Figure 18. FSRM - Creating a File Screen</p>
<h2 style="text-align: left;">Creating Exceptions</h2>
<p style="text-align: justify;">Exceptions are useful when you want to allow a blocked file type to be saved in a specific location. Go to the <strong>left panel</strong> of the <strong>FSRM screen</strong> and <strong>right-click</strong> on <strong>File Screens</strong>.</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/windows-2012-fsrm-installation-configuration-block-defined-file-types-19.png" alt="windows-2012-fsrm-installation-configuration-block-defined-file-types-19" style="margin: 0px; vertical-align: bottom;" title="FSRM – Creating a File Screen Exception" /></p>
<p style="text-align: center;">Figure 19. FSRM – Creating a File Screen Exception</p>
<p style="text-align: justify;">From the menu on the right panel, <strong>click</strong> on <strong>Create File Screen Exception</strong>. On the menu that opens up, <strong>click</strong> on <strong>Browse</strong> to select a folder or volume on which the new rule would be applied and select the group you would like to exclude under the File groups. <strong>Click OK</strong> and complete the process.</p>
<p style="text-align: center;">&nbsp;<img src="https://www.firewall.cx/images/stories/windows-2012-fsrm-installation-configuration-block-defined-file-types-20.png" alt="windows-2012-fsrm-installation-configuration-block-defined-file-types-20" style="margin: 0px; vertical-align: bottom;" title="FSRM – File Screen Exception settings and options" /></p>
<p style="text-align: center;">Figure 20. FSRM – File Screen Exception settings and options</p>
<h2>Summary</h2>
<p style="text-align: justify;">This article showed how to we can use <strong>Windows Server File Server Resources Manager (FSRM)</strong> to <strong>block file types</strong> and <strong>extensions</strong> from being <strong>uploaded</strong> or <strong>saved</strong> to a <strong>directory</strong> or <strong>volume</strong> on a&nbsp; <strong>Windows 2012 R2 server</strong>.&nbsp; We explained how to perform <strong>installation of FSRM</strong> via <strong>GUI interface</strong> and <strong>Powershell</strong>, and covered the <strong>creation or editing of File Screen Templates</strong> used to block or permit access for specific files.</p>]]></description>
			<category>Windows Servers</category>
			<pubDate>Fri, 19 Jun 2015 21:55:12 +1000</pubDate>
		</item>
		<item>
			<title>New Upcoming Features in Hyper-V vNext  - Free Training From Leading Hyper-V Experts – Limited Seats!</title>
			<link>https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-virtualization-hyper-v-vnext-features-webinar.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-virtualization-hyper-v-vnext-features-webinar.html</guid>
			<description><![CDATA[<p style="text-align: justify;">With the release of <strong>Hyper-V vNext</strong> just around the corner, Altaro has organized a <a href="https://clixtrac.com/goto/?196022" target="_blank" rel="nofollow noopener" title="Free Hyper-V Training">Free webinar</a> that will take you right into the <strong>new Hyper-V vNext</strong> release. <strong>Microsoft Hyper-V MVP</strong>, Aidan Finn and <strong>Microsoft Sr. Technical Evangelist</strong> Rick Claus will take you through the new features, improvements, changes and much more, and will be available to <strong>answer any questions you might have</strong>.</p>
<p style="text-align: justify;">Don't lose this opportunity to stay ahead of the rest, learn about the <strong>new Hyper-V vNext</strong> features and have your questions answered by <strong>Microsoft Hyper-V experts</strong>!</p>
<div class="box-hint" style="text-align: justify;">Note: This Webinar date has passed, however the recording and all material presented are freely available by visiting the provided registration line below:</div>
<p><a href="https://clixtrac.com/goto/?196022" target="_blank" rel="nofollow noopener" title="Hyper-V vNext Webinar">Click here</a> to view this <a href="https://clixtrac.com/goto/?196022" target="_blank" rel="nofollow noopener" title="Free Hyper-V vNext Training">Free Webinar</a>.</p>
<p style="text-align: justify;"><a href="https://clixtrac.com/goto/?196022" target="_blank" rel="nofollow noopener" title="Free Hyper-V vNext Training from Altaro"><img src="https://www.firewall.cx/images/stories/windows-virtualization-hyper-v-vnext-features-webinar-1.jpg" alt="windows-virtualization-hyper-v-vnext-features-webinar-1" title="Free Hyper-V vNext Training from Altaro" /></a></p>]]></description>
			<category>Windows Servers</category>
			<pubDate>Mon, 23 Mar 2015 22:36:06 +1100</pubDate>
		</item>
		<item>
			<title>Free Webinar &amp; eBook on Microsoft Licensing for Virtual Environments (Hyper-V)</title>
			<link>https://www.firewall.cx/operating-systems/microsoft/windows-servers/hyper-v-altaro-free-webinar-ebook.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/operating-systems/microsoft/windows-servers/hyper-v-altaro-free-webinar-ebook.html</guid>
			<description><![CDATA[<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/hyper-v-altaro-free-webinar-ebook-1.png" alt="hyper-v-altaro-free-webinar-ebook-1" style="margin: 7px; float: left;" title="eBook Microsoft Licensing for Virtual Environments" />Microsoft Licensing for Virtual environments can become a very complicated topic, especially with all the misconceptions and false information out there. Thankfully Altaro, the leader in <a href="https://clixtrac.com/goto/?188522" target="_blank" rel="nofollow noopener" title="Hyper-V Backup Solutions">Hyper-V Backup solutions</a>, has gathered Hyper-V MVP experts Thomas Maurer and Andrew Syrewicze to walk us through the theory and present us with real licensing scenarios to help us gain a solid understanding of Microsoft licensing in virtual environments.</p>
<p style="text-align: justify;">Their Hyper-V experts will also be available to answer all questions presented during the <a href="https://clixtrac.com/goto/?188522" target="_blank" rel="nofollow noopener" title="Free Webinar &amp; Hyper-V Microsoft Licensing for Virtual Environments (Hyper-V)">free webinar</a>.&nbsp; Registration and participation for this webinar is complete free.</p>
<p>Webinar Details: This webinar has passed however a recorded version is available at the below url along with all necessary resources.</p>
<p>As a bonus, a <a href="https://clixtrac.com/goto/?188522" target="_blank" rel="nofollow noopener" title="Free eBook - Webinar on Microsoft Licensing for Virtual Environments (Hyper-V)">free eBook</a> written by Hyper-V expert Eric Siron, covering Licensing Microsoft Server in a Virtual Environment, is now available as a <a href="https://clixtrac.com/goto/?188522" target="_blank" rel="nofollow noopener" title="Free eBook - Webinar on Microsoft Licensing for Virtual Environments (Hyper-V)">free download</a>.</p>
<div class="box-info">To download your free eBook copy and register for the Free Webinar <a href="https://clixtrac.com/goto/?188522" target="_blank" rel="nofollow noopener" title="Free Webinar &amp; eBook on Microsoft Licensing for Virtual Environments (Hyper-V)">click here</a>. </div>
<p style="text-align: justify;">&nbsp;</p>]]></description>
			<category>Windows Servers</category>
			<pubDate>Mon, 01 Dec 2014 03:13:34 +1100</pubDate>
		</item>
		<item>
			<title>Free Hyper-V eBook - Create, Manage and Troubleshoot Your Hyper-V  VMs. Free PowerShell Scripts Included!</title>
			<link>https://www.firewall.cx/operating-systems/microsoft/windows-servers/hyper-v-altaro-cookbook-powershell.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/operating-systems/microsoft/windows-servers/hyper-v-altaro-cookbook-powershell.html</guid>
			<description><![CDATA[<p style="text-align: justify;"><a href="http://clixtrac.com/goto/?186009" target="_blank" rel="noopener" title="Free Download Now!"><img src="https://www.firewall.cx/images/stories/hyper-v-altaro-cookbook-1.jpg" alt="hyper-v-altaro-cookbook-1" style="margin: 7px; float: left;" title="Free Hyper-V PowerShell Scripts, event logs, Cmdlets and more" /></a>With the <a href="https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-virtualization-hyper-v-concepts.html" target="_blank" title="introduction of Hyper-V">introduction of Hyper-V</a> on the <a href="https://www.firewall.cx/operating-systems/microsoft/windows-servers.html" target="_blank" title="Windows Server">Windows Server</a> platform, virtualization has quickly become the de facto standard for all companies seeking to consolidate their server infrastructure. While we've covered a number of virtualization topics, including <a href="https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-2012-hyper-v-installation-configuration.html" target="_blank" title="Hyper-V Installation and setup">Hyper-V installation</a>, <a href="https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-hyper-v-creating-vm.html" target="_blank" title="Hyper-V Management &amp; Configuration">Management-Configuration</a>, <a href="https://www.firewall.cx/operating-systems/microsoft/windows-servers/hyper-v-server-backup-tool.html" target="_blank" title="Hyper-V Backups">Hyper-V Backups</a>, <a href="https://www.firewall.cx/operating-systems/microsoft/windows-servers/hyper-v-best-practices.html" target="_blank" title="Hyper-V Best Practices">Best Practices</a> and much more, <a href="https://clixtrac.com/goto/?186009" target="_blank" rel="nofollow noopener" title="PowerShell Hyper-V Information - eBook">this e-Book</a> offered by Altaro is all about getting the most out of your Hyper-V infrastructure.</p>
<p style="text-align: justify;">The <a href="https://clixtrac.com/goto/?186009" target="_blank" rel="nofollow noopener" title="Altaro PowerShell Hyper-V Cookbook">Altaro PowerShell Hyper-V Cookbook</a> has been written by Jeffery Hicks - a well known PowerShell MVP, covers a number of very important topics that are guaranteed to help you discover more about your Hyper-V server(s) and help you make the most out of what they can offer.</p>
<p style="text-align: justify;"><strong>Topics covered include:</strong></p>
<ul class="check" style="text-align: justify;">
<li>Hyper-V Cmdlets - Understand what they are, how to use them and create a Hyper-V virtual machine</li>
<li>Discover and display information about your VMs and Hyper-V host</li>
<li>Easily Identify VHD/VHDX files</li>
<li>Mount ISO files</li>
<li>Delete obsolete snapshots and query Hyper-V event logs</li>
<li>and much more!</li>
</ul>
<p class="box-info" style="text-align: justify;">&nbsp;Don't miss this opportunity and <a href="https://clixtrac.com/goto/?186009" target="_blank" rel="nofollow noopener" title="Free Altaro Hyper-V Cmdlets ebook">grab your free copy for a limited time</a>!</p>
<p>&nbsp;<strong>BONUS:</strong> All <strong>PowerShell scripts</strong> are included <span style="text-decoration: underline;">FREE</span> in a separate ZIP file! </p>]]></description>
			<category>Windows Servers</category>
			<pubDate>Thu, 30 Oct 2014 08:07:32 +1100</pubDate>
		</item>
		<item>
			<title>How to Install and Configure Windows 2012 DNS Server Role</title>
			<link>https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-2012-dns-server-installation-configuration.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-2012-dns-server-installation-configuration.html</guid>
			<description><![CDATA[<p style="text-align: justify;">Our <a href="https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-2012-dns-active-directory-importance.html" target="_blank" title="Introduction to Windows Server DNS">previous article</a> covered <a href="https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-2012-dns-active-directory-importance.html" target="_blank" title="The Importance of DNS for Active Directory Services">introduction to the Domain Name System (DNS)</a> and explained the <a href="https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-2012-dns-active-directory-importance.html" target="_blank" title="importance of the DNS Server role">importance of the DNS Server role</a> within the network infrastructure, especially when Active Directory is involved. This article will cover the <strong>installation of the DNS server role in Windows 2012 Server</strong> and will include all necessary information for the <strong>successful deployment and configuration</strong> of the <strong>DNS service</strong>. Users interested can also read our DNS articles covering the <a href="https://www.firewall.cx/operating-systems/linux-unix.html" target="_blank" title="Linux DNS Server">Linux operating system</a> or <a href="https://www.firewall.cx/networking/network-protocols/dns-protocol.html" target="_blank" title="DNS Protocol Analysis">analysis of the DNS Protocol</a> under our <a href="https://www.firewall.cx/networking/network-protocols.html" target="_blank" title="Network Protocols Section">Network Protocols</a> section.</p>
<p style="text-align: justify;">The DNS Server can be installed during the deployment of Active Directory Services or as a stand-alone service on any Windows server. We'll be covering both options in this article.</p>
<p class="box-info">FREE Hyper-V &amp; VMware Virtualization Backup:&nbsp; FREE for Firewall.cx readers for a Limited Time!&nbsp; <a href="https://clixtrac.com/goto/?180468" target="_blank" rel="nofollow noopener" title="Free Hyper-V Backup">Download Now!</a><strong><br /></strong></p>
<h2 style="text-align: justify;">DNS Server Installation via Active Directory Services Deployment</h2>
<p style="text-align: justify;">Administrators who are in the process <a href="https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-2012-active-directory-installation.html" target="_blank" title="Installing Active Directory Services - Active Directory Concepts">deploying Active Directory Services</a> will be prompted to install the DNS server role during the AD installation process, as shown in the <strong>figure 1</strong> below:</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/windows-2012-dns-server-installation-configuration-1.png" alt="windows-2012-dns-server-installation-configuration-1" style="display: block; margin-left: auto; margin-right: auto;" title="Windows 2012 DNS Installation via Active Directory Services Deployment" />Figure 1. DNS Installation via Active Directory Services Deployment</p>
<p style="text-align: justify;">Alternatively Administrators can select to install DNS server role later on or even on a different server, as shown next. We decided to install the DNS Server role on the <strong>Active Directory Domain Controller Server</strong>.</p>
<h2 style="text-align: justify;">DNS Server Installation on Domain Controller or Stand Alone Server</h2>
<p style="text-align: justify;">To begin the installation, open <strong>Server Manger</strong> and click <strong>Add Roles and Features</strong>. Click <strong>Next</strong> on <strong>Before you begin page</strong>. Now choose <strong>Role-based or feature-based installation</strong> and click <strong>Next</strong>:</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/windows-2012-dns-server-installation-configuration-2.png" alt="" style="display: block; margin-left: auto; margin-right: auto;" title="Windows 2012 DNS Server Installation - Add Role-based or Feature-based installation" data-alt="windows-2012-dns-server-installation-configuration-2" />Figure 2. Selecting Role-based or feature-based installation</p>
<p style="text-align: justify;">In the next screen, choose the <strong>Select a server from this server pool</strong> option and select the server for which the DNS server role is intended. Once selected, click the <strong>Next</strong> button as shown in <strong>figure 3</strong>:</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/windows-2012-dns-server-installation-configuration-3.png" alt="windows-2012-dns-server-installation-configuration-3" style="display: block; margin-left: auto; margin-right: auto;" title="Windows 2012 DNS Server Installation - Selecting server from server pool" />Figure 3. Selecting the Server that will host the DNS server role</p>
<p style="text-align: justify;">&nbsp;The next screen allows us to choose the role(s) that will be installed. Select the <strong>DNS server</strong> role from the list and click <strong>Next</strong> to continue:</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/windows-2012-dns-server-installation-configuration-4.png" alt="windows-2012-dns-server-installation-configuration-4" style="display: block; margin-left: auto; margin-right: auto;" title="Windows 2012 DNS Server Installation - DNS Server Role Selection" /> Figure 4. Selecting the DNS Server Role for installation</p>
<p style="text-align: justify;">The next screen is the <strong>Features page</strong>, where you can safely click <strong>Next</strong> without selecting any feature from the list.</p>
<p style="text-align: justify;">The next screen provides information on the DNS Server role that's about to be installed. Read the <strong>DNS Server information</strong> and click <strong>Next</strong>:</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/windows-2012-dns-server-installation-configuration-5.png" alt="windows-2012-dns-server-installation-configuration-5" style="display: block; margin-left: auto; margin-right: auto;" title="Windows 2012 DNS Server Installation - DNS Server information" />Figure 5. DNS Information</p>
<p style="text-align: justify;">The final screen is a confirmation of roles and services to be installed. When ready, click on the <strong>Install</strong> button to for the installation to begin:</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/windows-2012-dns-server-installation-configuration-6.png" alt="windows-2012-dns-server-installation-configuration-6" style="display: block; margin-left: auto; margin-right: auto;" title="Windows 2012 DNS Server Installation - Confirm installation selections" />Figure 6. Confirm Installation Selections</p>
<p style="text-align: justify;">The Wizard will provide an update on the installation progress as shown below. Once the installation has completed, click the <strong>Close</strong> button:</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/windows-2012-dns-server-installation-configuration-7.png" alt="windows-2012-dns-server-installation-configuration-7" style="display: block; margin-left: auto; margin-right: auto;" title="Windows 2012 DNS Server Installation - Installation Progress" />Figure 7. Installation Progress</p>
<p style="text-align: justify;">&nbsp;</p>
<p class="box-info">FREE Hyper-V &amp; VMware Virtualization Backup:&nbsp; FREE for Firewall.cx readers for a Limited Time!&nbsp; <a href="https://clixtrac.com/goto/?180468" target="_blank" rel="nofollow noopener" title="Free Hyper-V Backup">Download Now!</a><strong><br /></strong></p>
<h2 style="text-align: justify;">Configuring Properties of DNS Server</h2>
<p style="text-align: justify;">Upon the successful installation of the <strong>DNS server role</strong>, you can open the <strong>DNS Manager</strong> to configure the DNS Server. Once <strong>DNS Manager</strong> is open, expand the server, in our example the server is <strong>FW-DC1</strong>. Right below the server we can see the <strong>Forward Lookup Zones</strong> and <strong>Reverse Lookup Zones</strong> listed. Because this is an <strong>Active Directory Integrated DNS server</strong> there is a <strong>firewall.local</strong> and <strong>_msdcs.firewall.local</strong> zone installed by default, as shown in <strong>figure 8</strong>:</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/windows-2012-dns-server-installation-configuration-8.png" alt="windows-2012-dns-server-installation-configuration-8" style="display: block; margin-left: auto; margin-right: auto;" title="Windows 2012 DNS Server Installation - DNS Manager" />Figure 8. DNS Manager &amp; DNS Zones</p>
<p style="text-align: justify;">To configure the <strong>DNS server properties</strong>, right-click the <strong>DNS server</strong> and click <strong>properties</strong>. Next, select the <strong>Forwarders</strong> tab. Click <strong>Edit</strong> and add the IP address of DNS server that this server will query if it is unable to resolve the IP address of the listed domains. This is usually the ISP's DNS server or any public DNS server such as Google (e.g 8.8.8.8, 4.2.2.2). There is another feature called <strong>root hints</strong> which also does similar job (queries the Root DNS servers of the Internet) but we prefer using <strong>forwarders</strong> alongside with public DNS servers:</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/windows-2012-dns-server-installation-configuration-9.png" alt="windows-2012-dns-server-installation-configuration-9" style="display: block; margin-left: auto; margin-right: auto;" title="Windows 2012 - DNS Forwarders – Add your ISP or Public DNS Servers here" />Figure 9. DNS Forwarders – Add your ISP or Public DNS Servers here</p>
<p style="text-align: justify;">Next, click on the <strong>Advanced</strong> tab. Here you can configure advanced features such as <strong>round robin</strong> (in case of multiple DNS servers), <strong>scavenging period</strong> and so on. <strong>Scavenging</strong> is a feature often used as it deletes the stale or inactive DNS records after the configured period, set to<strong> 7 days</strong> in our example:</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/windows-2012-dns-server-installation-configuration-10.png" alt="windows-2012-dns-server-installation-configuration-10" style="display: block; margin-left: auto; margin-right: auto;" title="Windows 2012 - DNS Settings - Advanced Options - Scavenging" /> Figure 10. Advanced Options - Scavenging</p>
<p style="text-align: justify;">Next up is the <strong>Root Hints</strong> tab. Here, you will see list of <strong>13 Root Servers</strong>. These servers are used when our DNS server is unable to resolve DNS requests for its clients. The <strong>Root Servers</strong> are used when no <strong>DNS Forwarding</strong> is configured. As we can see, DNS forwarding is pretty much an optional but recommended configuration. It is highly unlikely administrators will ever need to change the <strong>Root Hints servers</strong>:</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/windows-2012-dns-server-installation-configuration-11.png" alt="windows-2012-dns-server-installation-configuration-11" style="display: block; margin-left: auto; margin-right: auto;" title="Windows 2012 - DNS Settings - Root Hints" />Figure 11. Root Hints</p>
<p style="text-align: justify;">Our next tab, <strong>Monitoring</strong> is also worth exploring. Here you can perform the <strong>DNS lookup test</strong> that will run queries against your newly installed DNS server. You can also configure automated test that will run at a configured time interval to ensure the DNS server is operating correctly:</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/windows-2012-dns-server-installation-configuration-12.png" alt="windows-2012-dns-server-installation-configuration-12" style="display: block; margin-left: auto; margin-right: auto;" title="Windows 2012 DNS Manager - Monitoring Tab – Configuring Automated DNS Test Queries" />Figure 12. Monitoring Tab – Configuring Automated DNS Test Queries</p>
<p style="text-align: justify;">Next, click on the <strong>Event Logging</strong> tab. Here you can configure options to <strong>log DNS events</strong>. By default, all events are logged. So you can configure to <strong>log only errors</strong>, <strong>warnings</strong>, combination of <strong>errors &amp; warnings</strong>, or <strong>turn off logging</strong> (<strong>No events</strong> option):</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/windows-2012-dns-server-installation-configuration-13.png" alt="windows-2012-dns-server-installation-configuration-13" style="display: block; margin-left: auto; margin-right: auto;" title="Windows 2012 DNS Manager - Event Logging" />Figure 13. Event Logging</p>
<p style="text-align: justify;">When Event Logging is <strong>enabled</strong>, you can view any type of logged events in the <strong>Event Viewer</strong> (Administrative Tools) console.</p>
<p style="text-align: justify;">The <strong>Debug Logging</strong> tab is next up. <strong>Debug Logging</strong> allows us to capture to a log file any packets sent and received by the DNS server. Think of it as <strong>Wireshark</strong> for your DNS server. You can <strong>log DNS packets</strong> and <strong>filter</strong> them by direction, <strong>protocols</strong>, <strong>IP addresses</strong>, and other parameters as shown below. You can setup the <strong>log file location</strong> and set the <strong>maximum file size</strong> in bytes:</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/windows-2012-dns-server-installation-configuration-14.png" alt="windows-2012-dns-server-installation-configuration-14" style="display: block; margin-left: auto; margin-right: auto;" title="Windows 2012 DNS Manager - Debug Logging – Capturing DNS Packets &amp; Configuring DNS Debugging" />Figure 14. Debug Logging – Capturing DNS Packets &amp; Configuring DNS Debugging</p>
<h2 style="text-align: justify;">Zone – Domain Properties</h2>
<p style="text-align: justify;">Each <strong>Zone</strong> or <strong>Domain</strong> has a specific set of <strong>properties</strong> which can be configured as shown in figure 15 below. In our example, <strong>firewall.local</strong> is an <strong>Active Directory-integrated zone</strong> as indicated by the <strong>Type field</strong>. Furthermore the zone's status is shown at the top area of the window – our zone is currently in the <strong>running</strong> state and can be paused by simply <strong>clicking</strong> on the <strong>pause button</strong> on the right:</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/windows-2012-dns-server-installation-configuration-15.png" alt="windows-2012-dns-server-installation-configuration-15" style="display: block; margin-left: auto; margin-right: auto;" title="Windows 2012 DNS Manager - Zone Properties" />Figure 15. Zone Properties</p>
<p style="text-align: justify;">Right below, you can change the zone type to <strong>primary</strong>, <strong>secondary</strong> or <strong>stub</strong>. You can also setup <strong>dynamic updates</strong> to be secure or not. Similarly, you can setup <strong>aging</strong> or <strong>scavenging properties</strong> to automate the cleanup of <strong>stale records</strong>.</p>
<p style="text-align: justify;">The <strong>Start of Authority</strong> (<strong>SOA</strong>) tab provides access to a number of important settings for our DNS server. Here, you can configure the <strong>serial number</strong> increments automatically every time there is a change in the DNS zone. The <strong>serial number</strong> is used by other DNS servers to identify if any changes have been made since the last time they replicated the zone. The <strong>Primary server</strong> field indicates which server is primary server where the <strong>zone</strong> or <strong>domain</strong> is hosted. In case there are multiple DNS servers in the network, we can easily select a different server from here:</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/windows-2012-dns-server-installation-configuration-16.png" alt="windows-2012-dns-server-installation-configuration-16" style="display: block; margin-left: auto; margin-right: auto;" title="Windows 2012 DNS Manager - Start Of Authority Settings" />Figure 16. Start Of Authority Settings</p>
<p style="text-align: justify;">In addition, you can also configure the <strong>TTL</strong> (<strong>Time to Live</strong>) value, <strong>refresh</strong>, <strong>retry intervals</strong> and <strong>expiry time</strong> of the record.</p>
<p style="text-align: justify;">Next is the <strong>Name Servers</strong> tab. In this tab, you can add list of <strong>name servers</strong> where this zone can be hosted:</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/windows-2012-dns-server-installation-configuration-17.png" alt="windows-2012-dns-server-installation-configuration-17" style="display: block; margin-left: auto; margin-right: auto;" title="Windows 2012 DNS Manager - Start Of Authority Settings" />Figure 17. DNS Name Servers</p>
<p style="text-align: justify;">Finally, the <strong>Zone Transfers</strong> tab. In this tab, you can <strong>add DNS servers</strong> which can <strong>copy zone information</strong> (<strong>zone transfer</strong>) from this DNS server:</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/windows-2012-dns-server-installation-configuration-18.png" alt="windows-2012-dns-server-installation-configuration-18" style="display: block; margin-left: auto; margin-right: auto;" title="Windows 2012 DNS Manager - Zone Transfers" />Figure 18. Zone Transfers</p>
<p style="text-align: justify;">Once all configuration changes have been completed, click <strong>Apply</strong> and your <strong>zone</strong> is good to go.</p>
<p class="box-info">FREE Hyper-V &amp; VMware Virtualization Backup:&nbsp; FREE for Firewall.cx readers for a Limited Time!&nbsp; <a href="https://clixtrac.com/goto/?180468" target="_blank" rel="nofollow noopener" title="Free Hyper-V Backup">Download Now!</a><strong><br /></strong></p>
<p style="text-align: justify;">This article showed <strong>how to install and configure Windows 2012 DNS Server Role</strong> and explained all <strong>DNS Server options available for configuration</strong>.</p>]]></description>
			<category>Windows Servers</category>
			<pubDate>Fri, 22 Aug 2014 07:30:00 +1000</pubDate>
		</item>
		<item>
			<title>Introduction to Windows DNS – The Importance of DNS for Active Directory Services</title>
			<link>https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-2012-dns-active-directory-importance.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-2012-dns-active-directory-importance.html</guid>
			<description><![CDATA[<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/windows-2012-dns-active-directory-importance-1.png" alt="windows-2012-dns-active-directory-importance-1" style="margin: 7px; float: left;" title="Importance of DNS Server for Active Directory" />The <strong>Domain Name System (DNS)</strong> is perhaps one of the most <strong>important services for Active Directory</strong>. <strong>DNS</strong> provides name resolution services for <strong>Active Directory</strong>, resolving <strong>hostnames</strong>, <strong>URLs</strong> and <strong>Fully Qualified Domain Names</strong> (<strong>FQDN</strong>) into IP addresses. The DNS Service uses UDP port 53 and in some cases TCP port 53 - when UDP DNS requests fail consistently. (Double-Check for Windows)</p>
<p style="text-align: justify;">In-Depth information and analysis of the <a href="https://www.firewall.cx/networking/network-protocols/dns-protocol.html" target="_blank" title="Domain Name System Protocol Structure">DNS protocol structure</a> can be found at our <a href="https://www.firewall.cx/networking/network-protocols/dns-protocol.html" target="_blank" title="DNS Protocol Analysis">DNS Protocol Analysis</a> article.</p>
<p class="box-info">FREE Hyper-V &amp; VMware Backup: Easy to use - Powerful features - Just works, no hassle: It's FREE for Firewall.cx readers! <a href="https://clixtrac.com/goto/?179155" target="_blank" rel="nofollow noopener" title="Free Hyper-V Backup Download">Download Now!</a></p>
<h2 style="text-align: justify;">How DNS Resolution Works</h2>
<p style="text-align: justify;">When installed on a Windows Server, DNS uses a database stored in Active Directory or in a file and contains lists of domain names and corresponding IP addresses. When a client requests a website by typing a domain (URL) inside the web browser, the very first thing the browser does is to resolve the domain to an IP address.</p>
<p style="text-align: justify;">To resolve the IP address the browser checks into various places. At first, it checks the local cache of the computer, if there is no entry for the domain in question, it then checks the local hosts file (C:\windows\system32\drivers\etc\hosts), and if no record is found their either, it finally queries the DNS server.</p>
<p style="text-align: justify;">The DNS server returns the IP address to the client and the browser forms the http request which is sent to the destination web server.</p>
<p style="text-align: justify;">The above series of events describes a typical http request to a site on the Internet. The same series of events are usually followed when requesting access to resources within the local network and Active Directory, with the only difference that the local DNS server is aware of all internal hosts and domains.</p>
<p style="text-align: justify;">A <strong>DNS Server</strong> can be configured in any server running <strong>Windows Server 2012</strong> operating system. The DNS server can be Active Directory integrated or not. A few important tasks a DNS server in Windows Server 2012 is used for are:</p>
<ul class="check">
<li style="text-align: justify;">Resolve host names to their corresponding IP address (DNS)</li>
<li style="text-align: justify;">Resolve IP address to their corresponding host name (Reverse DNS)</li>
<li style="text-align: justify;">Locate Global Catalog Servers and Domain Controllers</li>
<li style="text-align: justify;">Locate Mail Servers</li>
</ul>
<h2 style="text-align: justify;">DNS Zones &amp; Records</h2>
<p style="text-align: justify;">A DNS Server contains <strong>Forward Lookup Zone</strong> and <strong>Reverse Lookup Zone</strong>. Each zone contains different types of <strong>resource records</strong>. A <strong>Forward Lookup Zone</strong> maps <strong>host name to an IP address</strong> while <strong>Reverse Lookup Zone</strong> maps the <strong>IP address of the host name</strong>. The <strong>DNS Zone</strong> is stored in a file or in the Active Directory database. Only one copy of zone is writable and others are read-only if the zone is stored in Active Directory database. Resource records specify the type of resource.</p>
<p style="text-align: justify;"><strong>Resource records</strong> in <strong>Forward Lookup Zone</strong> include:</p>
<table border="1" style="width: 740px; height: 151px;" cellspacing="0" cellpadding="0">
<tbody>
<tr>
<td style="width: 353px; border: 1px solid windowtext; background: url('/none') repeat scroll 0% 0% #ccccff; padding: 0cm 5.4pt;" valign="top">
<p style="margin: 0cm 0cm 0.0001pt; line-height: normal; text-align: center;"><span style="font-family: arial,helvetica,sans-serif; color: #000000;"><strong><span style="font-size: 12pt;">Resource Type<br /></span></strong></span></p>
</td>
<td style="width: 353px; border-width: 1pt 1pt 1pt medium; border-style: solid solid solid none; border-color: -moz-use-text-color; background: url('/none') repeat scroll 0% 0% #ccccff; padding: 0cm 5.4pt;" valign="top">
<p style="margin: 0cm 0cm 0.0001pt; line-height: normal; text-align: center;"><span style="font-family: arial,helvetica,sans-serif; color: #000000;"><strong><span style="font-size: 12pt;">Record</span></strong></span></p>
</td>
</tr>
<tr>
<td style="width: 353px; border-width: medium 1pt 1pt; border-style: none solid solid; padding: 0cm 5.4pt; text-align: center;" valign="top">
<p><strong>Host Name<br /></strong></p>
</td>
<td style="width: 353px;" valign="top">
<p style="text-align: center;">A</p>
</td>
</tr>
<tr>
<td style="text-align: center; width: 353px;" valign="top">
<p><strong>Mail Exchange<br /></strong></p>
</td>
<td style="width: 353px;" valign="top">
<p style="text-align: center;">MX</p>
</td>
</tr>
<tr>
<td style="text-align: center; width: 353px;" valign="top">
<p><strong>Service</strong></p>
</td>
<td style="text-align: center; width: 353px;" valign="top">
<p>SRV</p>
</td>
</tr>
<tr>
<td style="text-align: center; width: 353px;" valign="top">
<p><strong>Start of Authority<br /></strong></p>
</td>
<td style="text-align: center; width: 353px;" valign="top">
<p>SOA</p>
</td>
</tr>
<tr>
<td style="text-align: center; width: 353px;" valign="top">
<p><strong>Alias</strong></p>
</td>
<td style="text-align: center; width: 353px;" valign="top">
<p>CNAME</p>
</td>
</tr>
<tr>
<td style="text-align: center; width: 353px;" valign="top">
<p>&nbsp;<strong>Name Server</strong></p>
</td>
<td style="text-align: center; width: 353px;" valign="top">
<p style="text-align: center;">&nbsp;NS</p>
</td>
</tr>
</tbody>
</table>
<p style="text-align: center;">Table 1. Resource Record Types</p>
<p style="text-align: justify;">Similarly, <strong>resource records</strong> in <strong>Reverse Lookup Zone</strong> include:</p>
<table border="1" style="width: 740px; height: 100px;" cellspacing="0" cellpadding="0">
<tbody>
<tr>
<td style="width: 353px; border: 1px solid windowtext; background: url('/none') repeat scroll 0% 0% #ccccff; padding: 0cm 5.4pt;" valign="top">
<p style="margin: 0cm 0cm 0.0001pt; line-height: normal; text-align: center;"><span style="font-family: arial,helvetica,sans-serif; color: #000000;"><strong><span style="font-size: 12pt;">Resource Type<br /></span></strong></span></p>
</td>
<td style="width: 353px; border-width: 1pt 1pt 1pt medium; border-style: solid solid solid none; border-color: -moz-use-text-color; background: url('/none') repeat scroll 0% 0% #ccccff; padding: 0cm 5.4pt;" valign="top">
<p style="margin: 0cm 0cm 0.0001pt; line-height: normal; text-align: center;"><span style="font-family: arial,helvetica,sans-serif; color: #000000;"><strong><span style="font-size: 12pt;">Record</span></strong></span></p>
</td>
</tr>
<tr>
<td style="width: 353px; border-width: medium 1pt 1pt; border-style: none solid solid; padding: 0cm 5.4pt; text-align: center;" valign="top">
<p><strong>Pointer<br /></strong></p>
</td>
<td style="width: 353px;" valign="top">
<p style="text-align: center;">PTR</p>
</td>
</tr>
<tr>
<td style="text-align: center; width: 353px;" valign="top">
<p><strong>Start of Authority<br /></strong></p>
</td>
<td style="width: 353px;" valign="top">
<p style="text-align: center;">SOA</p>
</td>
</tr>
<tr>
<td style="text-align: center; width: 353px;" valign="top">
<p><strong>Name Server<br /></strong></p>
</td>
<td style="text-align: center; width: 353px;" valign="top">
<p>NS</p>
</td>
</tr>
</tbody>
</table>
<p style="text-align: center;">Table 2. Reverse Lookup Zone Resource Record Types</p>
<p class="box-info">FREE Hyper-V &amp; VMware Backup: Easy to use - Powerful features - Just works, no hassle: It's FREE for Firewall.cx readers! <a href="https://clixtrac.com/goto/?179155" target="_blank" rel="nofollow noopener" title="Free Hyper-V Backup Download">Download Now!</a></p>
<h2 style="text-align: justify;">Types Of DNS Zone</h2>
<p style="text-align: justify;">There are four DNS zone types:</p>
<p style="text-align: justify;"><strong>Primary Zones</strong>: This is a <strong>Master DNS Server</strong> for a zone and stores the master copy of zone data in <strong>AD DS</strong> or in a local file. This zone is the primary source for information about this zone.</p>
<p style="text-align: justify;"><strong>Secondary Zones</strong>: This is a <strong>Secondary DNS Server</strong> for a zone and stores read-only copy of zone data in a local file. <strong>Secondary Zones</strong> cannot be stored in <strong>AD DS</strong>. The server that hosts <strong>Secondary Zones</strong>, retrieves DNS information from another DNS server where the original zone is hosted and must have network access to the remote DNS server.</p>
<p style="text-align: justify;"><strong>Stub Zones</strong>: A <strong>Stub Zone</strong> contains only those resource records that are required to identify the authoritative DNS servers of that zone. A <strong>Stub Zone</strong> contains only <strong>SOA</strong>, <strong>NS</strong> and <strong>A</strong> type <strong>resource records</strong> which are required to identify the authoritative name server.</p>
<p style="text-align: justify;"><strong>Active Directory-Integrated Zones</strong>: An <strong>Active Directory-Integrated Zone</strong> stores zone data in Active Directory. The DNS server can use Active Directory replication model to replicate DNS changes between <strong>Domain Controllers</strong>. This allows for multiple writable <strong>Domain Controllers</strong> in the network. Similarly, <strong>secure dynamic updates</strong> are also supported, which means that <a href="https://www.firewall.cx/operating-systems/microsoft/windows-workstations/windows-8-client-joining-active-directory.html" target="_blank" title="How to join a windows client to active directory">computers that have joined to the domain</a> can have their own DNS records in the DNS server.</p>
<p style="text-align: justify;">This article provided information about <strong>DNS services</strong> and a brief description of the <strong>DNS resolution process</strong>. We also explained the <strong>importance of DNS Services in Active Directory</strong> and saw which are the <strong>four different type of DNS Zones</strong>. Next article will show how to <a href="https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-2012-dns-server-installation-configuration.html" target="_blank" title="How to Install Windows 2012 DNS Server Role"><strong>install the DNS Server role in Windows Server 2012</strong></a>.</p>]]></description>
			<category>Windows Servers</category>
			<pubDate>Wed, 06 Aug 2014 05:36:44 +1000</pubDate>
		</item>
		<item>
			<title>Windows Server Group Policy Link Enforcement, Inheritance and Block Inheritance</title>
			<link>https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-2012-group-policy-enforcement.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-2012-group-policy-enforcement.html</guid>
			<description><![CDATA[<p style="line-height: 150%; text-align: justify;"><img src="https://www.firewall.cx/images/stories/windows-2012-group-policy-enforcement-4.png" alt="windows-2012-group-policy-enforcement-4" style="display: block; margin: 7px; float: left;" title="Windows 2012 Group Policy Enforcement" />Our previous article explained <a href="https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-2012-group-policies.html" target="_blank" title="What are group policies">what Group Policy Objects (GPO) are</a> and showed <a href="https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-2012-group-policies.html" target="_blank" title="How group policies can control workstations in an Active Directory">how group policies can be configured to help control computers and users within an Active Directory</a> domain. This article takes a look at <strong>Group Policy Enforcement</strong>, <strong>Inheritance</strong> and <strong>Block Inheritance</strong> throughout our <strong>Active Directory</strong> structure. Users seeking more technical articles on Windows 2012 Server can visit our <a href="https://www.firewall.cx/operating-systems/microsoft/windows-servers.html" target="_blank" title="Windows 2012 Server Section">dedicated Windows 2012 Server section</a>.</p>
<p style="line-height: 150%; text-align: justify;"><strong>Group Policy Enforcement</strong>, <strong>Inheritance</strong> and <strong>Block Inheritance</strong> provide administrators with the necessary flexibility allowing the successful Group Policy deployment within Active Directory, especially in large organizations where multiple GPOs are applied at different levels within the Active Directory, causing some GPOs to accidently override others.</p>
<p style="margin-top: 0cm; margin-right: 0cm; margin-bottom: 0.0001pt; line-height: 150%; page-break-after: avoid; text-align: justify;">Thankfully Active Directory provides a simple way for granular control of GPOs:</p>
<p style="margin-top: 0cm; margin-right: 0cm; margin-bottom: 0.0001pt; line-height: 150%; page-break-after: avoid; text-align: justify;">&nbsp;</p>
<p class="box-info">FREE Hyper-V &amp; VMware Backup: Easy to use - Powerful features - Just works, no hassle: It's FREE for Firewall.cx readers! <a href="https://clixtrac.com/goto/?179025" target="_blank" rel="nofollow noopener" title="Free Hyper-V Backup Download">Download Now!</a></p>
<p style="margin-top: 0cm; margin-right: 0cm; margin-bottom: 0.0001pt; line-height: 150%; page-break-after: avoid; text-align: justify;">&nbsp;</p>
<h2 style="margin-top: 0cm; margin-right: 0cm; margin-bottom: 0.0001pt; line-height: 150%; page-break-after: avoid; text-align: justify;">Group Policy Object Inheritance<span class="checkbox"></span></h2>
<p style="text-align: justify;"><strong>GPOs</strong> can be linked at <strong>Site</strong>, <strong>Domain</strong>, <strong>OUs</strong> and <strong>child OUs</strong>. By default, group policy settings that are linked to <strong>parent objects</strong> are <strong>inherited</strong> to the <strong>child objects</strong> in the active directory hierarchy. By default, <strong>Default Domain Policy</strong> is linked to the domain and is inherited to all the child objects of the domain hierarchy.</p>
<p style="margin-top: 0cm; margin-right: 0cm; margin-bottom: 0.0001pt; line-height: 150%; page-break-after: avoid; text-align: justify;"><strong>GPO inheritance</strong> let’s administrators to set common set of policies to the <strong>domain level</strong> or <strong>site level</strong> and configure more specific polices at the <strong>OU level</strong>. GPOs inherited from <strong>parent objects</strong> are processed <strong>before</strong> GPOs linked to the <strong>object itself</strong>.</p>
<p style="margin: 0cm 0cm 0.0001pt 18px; line-height: 150%; page-break-after: avoid; text-align: justify;">&nbsp;</p>
<p style="margin-top: 0cm; margin-right: 0cm; margin-bottom: 0.0001pt; line-height: 150%; page-break-after: avoid; text-align: justify;">As shown in the figure below, the <strong>Default Doman Policy</strong> GPO with <strong>precedence 2</strong> will be processed first, because the <strong>Default Domain Policy</strong> is applied at the <strong>domain level</strong> (firewall.local) where as the <strong>WallPaper GPO</strong> is applied at the <strong>organization unit</strong> level:</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/windows-2012-group-policy-enforcement-1.png" alt="windows-2012-group-policy-enforcement-1" style="border: 1px solid #000000; display: block; margin-left: auto; margin-right: auto;" title="Windows 2012 Group Policy Enforcement" /><span style="font-style: normal;">Figure </span><span style="font-style: normal;">1</span><span style="font-style: normal;">. Group Policy Inheritance</span></p>
<h2>Block Inheritance</h2>
<p style="text-align: justify;">As GPOs can be inherited by default, they can also be blocked, if required using the <strong>Block Inheritance</strong>. If the <strong>Block Inheritance</strong> setting is <strong>enabled</strong>, the inheritance of group policy setting is blocked. This setting is mostly used when the <strong>OU</strong> contains users or computers that require different settings than what is applied to the domain level.</p>
<p class="box-info">FREE Hyper-V &amp; VMware Backup: Easy to use - Powerful features - Just works, no hassle: It's FREE for Firewall.cx readers! <a href="https://clixtrac.com/goto/?179025" target="_blank" rel="nofollow noopener" title="Free Hyper-V Backup Download">Download Now!</a></p>
<p style="margin-top: 0cm; margin-right: 0cm; margin-bottom: 0.0001pt; line-height: 150%; page-break-after: avoid; text-align: justify;">As shown in the figure below, to configure <strong>blocking of GPO inheritance</strong>, <strong>right-click</strong> the OU container and select the <strong>Block Inheritance</strong> option from the list:</p>
<p style="text-align: center;"><span style="font-style: normal;"><img src="https://www.firewall.cx/images/stories/windows-2012-group-policy-enforcement-2.png" alt="" style="border: 1px solid #000000; display: block; margin-left: auto; margin-right: auto;" title="Windows 2012 GPO Block Inheritance" data-alt="windows-2012-group-policy-enforcement-2" />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Figure </span><span style="font-style: normal;">2</span><span style="font-style: normal;">. GPO Block Inheritance</span></p>
<h2>Enforced (No Override)</h2>
<p style="text-align: justify;">This option prevents a GPO from being overridden by other GPO. For example, if you apply a GPO to domain and check the <strong>Enforced</strong> option, then this policy will be enforced to all the child objects in active directory and takes precedence of child GPO objects even if you have configured another similar GPO child object with a different value. In previous Windows Server versions, the <strong>GPO enforced</strong> option used to be called <strong>No Override</strong>.</p>
<p style="line-height: 150%; text-align: justify;">To enable the <strong>GPO Enforced</strong> option, <strong>right-click</strong> on a particular GPO and <strong>click</strong> on the <strong>Enforced</strong> option:</p>
<p style="margin-left: 18pt; line-height: 150%; text-align: center;"><span style="font-style: normal;"><span style="font-style: normal;"><img src="https://www.firewall.cx/images/stories/windows-2012-group-policy-enforcement-3.png" alt="windows-2012-group-policy-enforcement-3" style="border: 1px solid #000000; display: block; margin-left: auto; margin-right: auto;" title="Windows 2012 Enforcing a GPO" /></span>Figure </span><span style="font-style: normal;">3</span><span style="font-style: normal;">. Enforcing a GPO</span></p>
<p style="line-height: 150%; text-align: justify;">This article explained the importance of GPO inheritance and how it can be enforced or blocked via <strong>Group Policy Enforcement</strong>, <strong>Inheritance</strong> and <strong>Block Inheritance</strong> throughout the <strong>Active Directory</strong>. For more information on Group Policies and how they are created or applied, refer to our article <a href="https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-2012-group-policies.html" target="_blank" title="Configuring Windows 2012 Active Directory Group Policies">Configuring Windows 2012 Active Directory Group Policies</a> or visit our <a href="https://www.firewall.cx/operating-systems/microsoft/windows-servers.html" target="_blank" title="Windows 2012 Server Section">Windows 2012 Server</a> Section.</p>
<p><br /><br /></p>]]></description>
			<category>Windows Servers</category>
			<pubDate>Sat, 02 Aug 2014 16:25:43 +1000</pubDate>
		</item>
		<item>
			<title>Understanding, Creating, Configuring &amp; Applying Windows Server 2012 Active Directory Group Policies</title>
			<link>https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-2012-group-policies.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-2012-group-policies.html</guid>
			<description><![CDATA[<p style="text-align: justify;">This article explains what <strong>Group Policies</strong> are and shows <strong>how to configure Windows Server 2012 Active Directory Group Policies</strong>. Our next article will cover how to properly <strong>enforce Group Policies</strong> (<strong>Group Policy Link Enforcement, Inheritance and Block Inheritance</strong>) on computers and users that a part of the company's Active Directory.</p>
<p class="box-info" style="text-align: justify;">FREE Hyper-V &amp; VMware Backup: Easy to use - Powerful features - Just works, no hassle: It's FREE for Firewall.cx readers! <a href="https://clixtrac.com/goto/?178327" target="_blank" rel="nofollow noopener" title="Free Hyper-V Backup Download">Download Now!</a></p>
<p style="text-align: justify;">Before we dive into <strong>Group Policy configuration</strong>, let's explain what exactly Group Policies are and how they can help an administrator control its users and computers.</p>
<p style="text-align: justify;">A <strong>Group Policy</strong> is a computer or user setting that can be configured by administrators to apply various <strong>computer specific</strong> or <strong>user specific registry settings</strong> to computers that have joined the domain (active directory). A simple example of a group policy is the user password expiration policy which forces users to change their password on a regular basis. Another example of a group policy would be the enforcement of a specific desktop background picture on every workstation or restricting users from accessing their Local Network Connection properties so they cannot change their IP address.</p>
<p style="text-align: justify;">A <strong>Group Policy Object</strong> (<strong>GPO</strong>) contains one or more group policy settings that can be applied to domain computers, users, or both. <strong>GPO objects</strong> are stored in <strong>active directory</strong>. You can open and configure GPO objects by using the <strong>GPMC</strong> (<strong>Group Policy Management Console</strong>) in Windows Server 2012:</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/windows-2012-group-policies-1.png" alt="windows-2012-group-policies-1" style="display: block; margin-left: auto; margin-right: auto; border: 1px solid #000000;" title="Windows 2012 Server Default Domain Policy" /> Figure 1. GPO Objects</p>
<p style="text-align: justify;"><strong>Group Policy Settings</strong> are the actual configuration settings that can be applied to a domain computer or user. Most of the settings have three states, <strong>Enabled</strong>, <strong>Disabled</strong> and <strong>Not Configured</strong>. <strong>Group Policy Management Editor</strong> provides access to hundreds of computer and user settings that can be applied to make many system changes to the desktop and server environment.</p>
<h2 style="text-align: justify;">Group Policy Settings</h2>
<p style="text-align: justify;"><strong>Group Policy Settings</strong> are divided into <strong>Computer Settings</strong> and <strong>User Settings</strong>. <strong>Computer Settings</strong> are applied to computer when the system starts and this modifies the <strong>HKEY Local Machine</strong> hive of registry. <strong>User Settings</strong> are applied when the users log in to the computer and this modifies the <strong>HKEY Local Machine</strong> hive.</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/windows-2012-group-policies-2.png" alt="windows-2012-group-policies-2" style="display: block; margin-left: auto; margin-right: auto; border: 1px solid #000000;" title="Windows 2012 Server Group Policy Settings" />Figure 2. Group Policy Settings</p>
<p style="text-align: justify;"><strong>Computer Settings</strong> and <strong>User Settings</strong> both have policies and preferences.</p>
<p style="text-align: justify;">These policies are:</p>
<p style="text-align: justify;"><strong>Software Settings</strong>: Software can be deployed to <strong>users</strong> or <strong>computer</strong> by the administrator. The software deployed to users will be available only to those specific users whereas software deployed to a computer will be available to any user that on the specific computer where the <strong>GPO</strong> is applied.</p>
<p style="text-align: justify;"><strong>Windows Settings</strong>: Windows settings can be applied to a user or a computer in order to modify the windows environment. Examples are: password policies, firewall policy, account lockout policy, scripts and so on. &nbsp;</p>
<p style="text-align: justify;"><strong>Administrative Templates</strong>: Contains a number of user and computer settings that can be applied to control the windows environment of users or computers. For example, specifying the desktop wallpaper, disabling access to non-essential areas of the computers (e.g Network desktop icon, control panel etc), folder redirection and many more.</p>
<p style="text-align: justify;"><strong>Preferences</strong> are a group policy extension that does the work which would otherwise require scripts. Preferences are used for both users and computers. You can use <strong>preferences</strong> to map network drives for users, map printers, configure internet options and more.</p>
<p style="text-align: justify;">Next, let’s take a look at how we can create and apply a <strong>Group Policy</strong>.</p>
<p class="box-info" style="text-align: justify;">FREE Hyper-V &amp; VMware Backup: Easy to use - Powerful features - Just works, no hassle: It's FREE for Firewall.cx readers! <a href="https://clixtrac.com/goto/?178327" target="_blank" rel="nofollow noopener" title="Free Hyper-V Backup Download">Download Now!</a></p>
<h2 style="text-align: justify;">Creating &amp; Applying Group Policy Objects</h2>
<p style="text-align: justify;">By default, <strong>GPOs</strong> can be created and applied by <strong>Domain Admins</strong>, <strong>Enterprise Admins</strong> and <strong>Group Policy Creator Owner</strong> user groups. After creating the <strong>GPO</strong>, you can <strong>apply</strong> or <strong>link</strong> the GPOs to <strong>sites</strong>, <strong>domains</strong> or <strong>Organizational Units</strong> (<strong>OUs</strong>), however you cannot apply GPO to users, groups, or computers. GPOs are processed in following top to bottom order:</p>
<ol>
<li style="text-align: justify;"><strong>Local Group Policy</strong>: Every windows operating system has local group policy installed by default. So this local group policy of the computer is applied at first.</li>
<li style="text-align: justify;"><strong>Site GPO</strong>: The <strong>GPOs</strong> linked to the <strong>Site</strong> is then processed. By default, there is no site level group policy configured.</li>
<li style="text-align: justify;"><strong>Domain GPO</strong>: Next, the <strong>GPO</strong> configured at <strong>domain level</strong> is processed. By default, GPO named <strong>default domain policy</strong> is applied at the domain level. This applies to all the objects of the domain. If there is policy conflict between <strong>domain</strong> and <strong>site level GPOs</strong>, then GPO applied to <strong>domain level</strong> takes the precedence.</li>
<li style="text-align: justify;"><strong>Organizational Unit GPO</strong>: - In the end, <strong>GPO</strong> configured at <strong>OU</strong> is applied. If there is any conflict between previously applied GPOs, the GPO applied to <strong>OU</strong> takes the <strong>most precedence</strong> over <strong>Domain</strong>, <strong>Site</strong> and <strong>Local Group Policy</strong>.</li>
</ol>
<p style="text-align: justify;">Let’s now take a look at a scenario to apply a <strong>group policy</strong> to <strong>domain joined computers</strong> to change the desktop background. We have a domain controller named <strong>FW-DC01</strong> and two clients <strong>FW-CL1</strong> and <strong>FW-CL2</strong> as shown in the diagram below. The goal here is to set the <strong>desktop wallpaper</strong> for these two clients from a <strong>group policy</strong>:</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/windows-2012-group-policies-3.png" alt="windows-2012-group-policies-3" style="display: block; margin-left: auto; margin-right: auto; border: 1px solid #000000;" title="Windows 2012 Server Active Directory Network Diagram" />Figure 3. GPO Scenario</p>
<p>In our earlier articles we showed <a href="https://www.firewall.cx/operating-systems/microsoft/windows-workstations/windows-8-client-joining-active-directory.html" target="_blank" title="How Windows 8 / Windows 8.1 join an Active Directory Domain">how Windows 8 / Windows 8.1 join an Active Directory domain</a>, <strong>FW-CL1</strong> and <strong>FW-CL2</strong> are workstations that have previously joined our domain – Active Directory. We have two users <strong>MJackson</strong> and <strong>PWall</strong> in the <strong>FW Users OU</strong>.</p>
<p style="text-align: justify;">Open the <strong>Group Policy Management Console</strong> (<strong>GPMC</strong>) by going into <strong>Server Manager&gt;Tools</strong> and select <strong>Group Policy Management</strong> as shown below:</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/windows-2012-group-policies-4.png" alt="windows-2012-group-policies-4" style="display: block; margin-left: auto; margin-right: auto; border: 1px solid #000000;" title="Windows 2012 Server Group Policy Management console" />Figure 4. Open GPMC</p>
<p style="text-align: justify;">As the <strong>GPMC</strong> opens up, you will see the <strong>tree hierarchy</strong> of the <strong>domain</strong>. Now expand the domain, <strong>firewall.local</strong> in our case, and you will see the <strong>FW Users OU</strong> which is where our users reside. From here, <strong>right-click</strong> this <strong>OU</strong> and select the first option <strong>Create a GPO in this domain and Link it here</strong>:</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/windows-2012-group-policies-5.png" alt="windows-2012-group-policies-5" style="display: block; margin-left: auto; margin-right: auto; border: 1px solid #000000;" title="Windows 2012 Server Create a GPO in this domain and Link it here" />Figure 5. Select FW Users and Create a GPO</p>
<p style="text-align: justify;">Now type the <strong>Name</strong> for this <strong>GPO</strong> object and click the <strong>OK</strong> button. We selected <strong>WallPaper GPO</strong>:</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/windows-2012-group-policies-6.png" alt="windows-2012-group-policies-6" style="display: block; margin-left: auto; margin-right: auto; border: 1px solid #000000;" title="Windows 2012 Server GPO name" />Figure 6. Creating our Wallpaper Group Policy Object</p>
<p style="text-align: justify;">Next, <strong>right-click</strong> the <strong>GPO object</strong> and click <strong>edit</strong>:</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/windows-2012-group-policies-7.png" alt="windows-2012-group-policies-7" style="display: block; margin-left: auto; margin-right: auto; border: 1px solid #000000;" title="Windows 2012 Server Editing a Group Policy Object " />Figure 7. Editing a Group Policy Object</p>
<p style="text-align: justify;">At this point we get to see and configure the policy that deals with the <strong>Desktop Wallpaper</strong>, however notice the number of different policies that allow us to configure and tweak various aspects of our domain users.</p>
<p style="text-align: justify;">To find the <strong>Desktop Wallpaper</strong>, go to <strong>Expand User Configuration&gt; Policies&gt; Administrative Templates&gt; Desktop&gt; Desktop</strong>. At this point we should be able to see the setting in right window. <strong>Right-click</strong> the <strong>Desktop Wallpaper</strong> setting and select <strong>Edit</strong>:</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/windows-2012-group-policies-8.png" alt="windows-2012-group-policies-8" style="display: block; margin-left: auto; margin-right: auto; border: 1px solid #000000;" title="Windows 2012 Server Selecting and editing Desktop Wallpaper policy" />Figure 8. Selecting and editing Desktop Wallpaper policy</p>
<p style="text-align: justify;">The settings of <strong>Desktop Wallpaper</strong> will now open. First we need to activate the policy by selecting the <strong>Enabled</strong> option on the left. Next, type the <strong>UNC path</strong> of shared wallpaper. Remember that we must <strong>share the folder</strong> that contains the wallpaper <strong>\\FW-DC1\WallPaper\</strong> and configure the <strong>share permission</strong> so that users can access it. Notice that we can even select to <strong>center</strong> our wallpaper (<strong>Wallpaper Style</strong>). When ready click <strong>Apply</strong> and then <strong>OK</strong>:</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/windows-2012-group-policies-9.png" alt="windows-2012-group-policies-9" style="display: block; margin-left: auto; margin-right: auto; border: 1px solid #000000;" title="Windows 2012 Server Selecting and editing Desktop Wallpaper policy" />Figure 9. Configure Desktop Wallpaper</p>
<p style="text-align: justify;">Now that we’ve configured our GPO, we need to apply it. To do so, we can simply log off and log back in the client computer or type following command in domain controller’s command prompt to apply the settings immediately:</p>
<div class="box-content" style="text-align: justify;">C:\&gt;&nbsp;<strong>gpupdate /force</strong></div>
<p style="text-align: justify;">Once our domain user logs in to their computer (<strong>FW-CL1</strong>), the new wallpaper policy will be applied and loaded on to the computer’s desktop.</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/windows-2012-group-policies-10.png" alt="windows-2012-group-policies-10" style="display: block; margin-left: auto; margin-right: auto; border: 1px solid #000000;" title="Windows 2012 Server User login" />Figure 10. User Login</p>
<p style="text-align: justify;">As we can see below, our user's desktop now has the background image configured in the group policy we created:</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/windows-2012-group-policies-11.png" alt="windows-2012-group-policies-11" style="display: block; margin-left: auto; margin-right: auto; border: 1px solid #000000;" title="Windows 2012 Server Active Directory User Desktop" />Figure 11. Computer Desktop Wallpaper Changed</p>
<p style="text-align: justify;">This example shows how one small configuration setting can be applied to all computers inside an organization. The power and flexibility of <strong>Group Policy Objects</strong> is truly unbelievable and as we’ve shown, it’s even easier to configure and apply them with just a few clicks on the domain controller!</p>
<p class="box-info" style="text-align: justify;">FREE Hyper-V &amp; VMware Backup: Easy to use - Powerful features - Just works, no hassle: It's FREE for Firewall.cx readers! <a href="https://clixtrac.com/goto/?178327" target="_blank" rel="nofollow noopener" title="Free Hyper-V Backup Download">Download Now!</a></p>
<p style="text-align: justify;">This article explained what <strong>Group Policies Objects</strong> are and showed <strong>how to Configure Windows 2012 Active Directory Group Policies</strong> to control our Active Directory users and computers. We also highly recommend our article on <a href="https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-2012-group-policy-enforcement.html" target="_blank" title="Group Policy Enforcement">Group Policy Enforcement, Inheritance</a> throughout the <strong>Active Directory</strong> structure. More articles on<strong> Windows 2012 &amp; <a href="https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-virtualization-hyper-v-concepts.html" target="_blank" title="Windows 2012 Hyper-V">Hyper-V</a></strong> can be found at our <a href="https://www.firewall.cx/operating-systems/microsoft/windows-servers.html" target="_blank" title="Windows 2012 Server">Windows 2012 Server</a> section.</p>
<p>&nbsp;</p>]]></description>
			<category>Windows Servers</category>
			<pubDate>Sat, 26 Jul 2014 13:10:52 +1000</pubDate>
		</item>
		<item>
			<title>Installing Active Directory Services &amp; Domain Controller via Windows PowerShell. Active Directory Concepts</title>
			<link>https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-2012-active-directory-services-dc-install-powershell.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-2012-active-directory-services-dc-install-powershell.html</guid>
			<description><![CDATA[<p style="text-align: justify;">This article serves as an <strong>Active Directory tutorial</strong> covering installation and setup of <strong>Windows 2012 Active Directory Services Role &amp; Domain Controller</strong> using Windows 2012 <strong>PowerShell</strong>.</p>
<p style="text-align: justify;">Our previous article covered the installation of&nbsp;<a href="https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-2012-active-directory-installation.html" target="_blank" title="Windows 2012 Active Directory Role and Domain Controller installation via Server Manager">Windows Server 2012 Active Directory Services role and Domain Controller installation using the Windows Server Manager (GUI)</a> interface.</p>
<p style="text-align: justify;"><!--[if gte mso 9]><xml>
 <o:OfficeDocumentSettings>
  <o:RelyOnVML/>
  <o:AllowPNG/>
 </o:OfficeDocumentSettings>
</xml><![endif]--></p>
<p style="text-align: justify;"><!--[if gte mso 9]><xml>
 <w:WordDocument>
  <w:View>Normal</w:View>
  <w:Zoom>0</w:Zoom>
  <w:TrackMoves/>
  <w:TrackFormatting/>
  <w:PunctuationKerning/>
  <w:ValidateAgainstSchemas/>
  <w:SaveIfXMLInvalid>false</w:SaveIfXMLInvalid>
  <w:IgnoreMixedContent>false</w:IgnoreMixedContent>
  <w:AlwaysShowPlaceholderText>false</w:AlwaysShowPlaceholderText>
  <w:DoNotPromoteQF/>
  <w:LidThemeOther>EN-US</w:LidThemeOther>
  <w:LidThemeAsian>X-NONE</w:LidThemeAsian>
  <w:LidThemeComplexScript>X-NONE</w:LidThemeComplexScript>
  <w:Compatibility>
   <w:BreakWrappedTables/>
   <w:SnapToGridInCell/>
   <w:WrapTextWithPunct/>
   <w:UseAsianBreakRules/>
   <w:DontGrowAutofit/>
   <w:SplitPgBreakAndParaMark/>
   <w:EnableOpenTypeKerning/>
   <w:DontFlipMirrorIndents/>
   <w:OverrideTableStyleHps/>
  </w:Compatibility>
  <m:mathPr>
   <m:mathFont m:val="Cambria Math"/>
   <m:brkBin m:val="before"/>
   <m:brkBinSub m:val="&#45;-"/>
   <m:smallFrac m:val="off"/>
   <m:dispDef/>
   <m:lMargin m:val="0"/>
   <m:rMargin m:val="0"/>
   <m:defJc m:val="centerGroup"/>
   <m:wrapIndent m:val="1440"/>
   <m:intLim m:val="subSup"/>
   <m:naryLim m:val="undOvr"/>
  </m:mathPr></w:WordDocument>
</xml><![endif]--><!--[if gte mso 9]><xml>
 <w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="true"
  DefSemiHidden="true" DefQFormat="false" DefPriority="99"
  LatentStyleCount="267">
  <w:LsdException Locked="false" Priority="0" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Normal"/>
  <w:LsdException Locked="false" Priority="9" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="heading 1"/>
  <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 2"/>
  <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 3"/>
  <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 4"/>
  <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 5"/>
  <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 6"/>
  <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 7"/>
  <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 8"/>
  <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 9"/>
  <w:LsdException Locked="false" Priority="39" Name="toc 1"/>
  <w:LsdException Locked="false" Priority="39" Name="toc 2"/>
  <w:LsdException Locked="false" Priority="39" Name="toc 3"/>
  <w:LsdException Locked="false" Priority="39" Name="toc 4"/>
  <w:LsdException Locked="false" Priority="39" Name="toc 5"/>
  <w:LsdException Locked="false" Priority="39" Name="toc 6"/>
  <w:LsdException Locked="false" Priority="39" Name="toc 7"/>
  <w:LsdException Locked="false" Priority="39" Name="toc 8"/>
  <w:LsdException Locked="false" Priority="39" Name="toc 9"/>
  <w:LsdException Locked="false" Priority="35" QFormat="true" Name="caption"/>
  <w:LsdException Locked="false" Priority="10" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Title"/>
  <w:LsdException Locked="false" Priority="1" Name="Default Paragraph Font"/>
  <w:LsdException Locked="false" Priority="11" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Subtitle"/>
  <w:LsdException Locked="false" Priority="22" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Strong"/>
  <w:LsdException Locked="false" Priority="20" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Emphasis"/>
  <w:LsdException Locked="false" Priority="59" SemiHidden="false"
   UnhideWhenUsed="false" Name="Table Grid"/>
  <w:LsdException Locked="false" UnhideWhenUsed="false" Name="Placeholder Text"/>
  <w:LsdException Locked="false" Priority="1" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="No Spacing"/>
  <w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading"/>
  <w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List"/>
  <w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid"/>
  <w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1"/>
  <w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2"/>
  <w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1"/>
  <w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2"/>
  <w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1"/>
  <w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2"/>
  <w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3"/>
  <w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List"/>
  <w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading"/>
  <w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List"/>
  <w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid"/>
  <w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading Accent 1"/>
  <w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List Accent 1"/>
  <w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid Accent 1"/>
  <w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1 Accent 1"/>
  <w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2 Accent 1"/>
  <w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1 Accent 1"/>
  <w:LsdException Locked="false" UnhideWhenUsed="false" Name="Revision"/>
  <w:LsdException Locked="false" Priority="34" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="List Paragraph"/>
  <w:LsdException Locked="false" Priority="29" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Quote"/>
  <w:LsdException Locked="false" Priority="30" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Intense Quote"/>
  <w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2 Accent 1"/>
  <w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1 Accent 1"/>
  <w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2 Accent 1"/>
  <w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3 Accent 1"/>
  <w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List Accent 1"/>
  <w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading Accent 1"/>
  <w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List Accent 1"/>
  <w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid Accent 1"/>
  <w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading Accent 2"/>
  <w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List Accent 2"/>
  <w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid Accent 2"/>
  <w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1 Accent 2"/>
  <w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2 Accent 2"/>
  <w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1 Accent 2"/>
  <w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2 Accent 2"/>
  <w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1 Accent 2"/>
  <w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2 Accent 2"/>
  <w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3 Accent 2"/>
  <w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List Accent 2"/>
  <w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading Accent 2"/>
  <w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List Accent 2"/>
  <w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid Accent 2"/>
  <w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading Accent 3"/>
  <w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List Accent 3"/>
  <w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid Accent 3"/>
  <w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1 Accent 3"/>
  <w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2 Accent 3"/>
  <w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1 Accent 3"/>
  <w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2 Accent 3"/>
  <w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1 Accent 3"/>
  <w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2 Accent 3"/>
  <w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3 Accent 3"/>
  <w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List Accent 3"/>
  <w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading Accent 3"/>
  <w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List Accent 3"/>
  <w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid Accent 3"/>
  <w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading Accent 4"/>
  <w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List Accent 4"/>
  <w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid Accent 4"/>
  <w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1 Accent 4"/>
  <w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2 Accent 4"/>
  <w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1 Accent 4"/>
  <w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2 Accent 4"/>
  <w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1 Accent 4"/>
  <w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2 Accent 4"/>
  <w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3 Accent 4"/>
  <w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List Accent 4"/>
  <w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading Accent 4"/>
  <w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List Accent 4"/>
  <w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid Accent 4"/>
  <w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading Accent 5"/>
  <w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List Accent 5"/>
  <w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid Accent 5"/>
  <w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1 Accent 5"/>
  <w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2 Accent 5"/>
  <w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1 Accent 5"/>
  <w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2 Accent 5"/>
  <w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1 Accent 5"/>
  <w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2 Accent 5"/>
  <w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3 Accent 5"/>
  <w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List Accent 5"/>
  <w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading Accent 5"/>
  <w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List Accent 5"/>
  <w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid Accent 5"/>
  <w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading Accent 6"/>
  <w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List Accent 6"/>
  <w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid Accent 6"/>
  <w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1 Accent 6"/>
  <w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2 Accent 6"/>
  <w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1 Accent 6"/>
  <w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2 Accent 6"/>
  <w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1 Accent 6"/>
  <w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2 Accent 6"/>
  <w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3 Accent 6"/>
  <w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List Accent 6"/>
  <w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading Accent 6"/>
  <w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List Accent 6"/>
  <w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid Accent 6"/>
  <w:LsdException Locked="false" Priority="19" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Subtle Emphasis"/>
  <w:LsdException Locked="false" Priority="21" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Intense Emphasis"/>
  <w:LsdException Locked="false" Priority="31" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Subtle Reference"/>
  <w:LsdException Locked="false" Priority="32" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Intense Reference"/>
  <w:LsdException Locked="false" Priority="33" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Book Title"/>
  <w:LsdException Locked="false" Priority="37" Name="Bibliography"/>
  <w:LsdException Locked="false" Priority="39" QFormat="true" Name="TOC Heading"/>
 </w:LatentStyles>
</xml><![endif]--><!--[if gte mso 10]>

<![endif]--></p>
<p class="box-info" style="text-align: justify; line-height: 150%;">FREE Hyper-V &amp; VMware Backup:&nbsp; FREE for Firewall.cx readers for a Limited Time!&nbsp; <a href="https://clixtrac.com/goto/?176385" target="_blank" rel="nofollow noopener" title="Free Hyper-V Backup">Download Now!</a></p>
<h2 class="MsoNormal" style="text-align: justify; line-height: 150%;">What Is Active Directory?</h2>
<p class="MsoNormal" style="text-align: justify; line-height: 150%;">Active Directory is a heart of Windows Server operating systems. Active Directory Domain Services (AD DS) is central repository of active directory objects like user accounts, computer accounts, groups, group policies and so on. Similarly, Active Directory authenticates user accounts and computer accounts when they login into the domain. Computers must be joined to the domain in order to authenticate Active Directory users.</p>
<p class="MsoNormal" style="text-align: justify; line-height: 150%;"><strong style="mso-bidi-font-weight: normal;">Active Directory</strong> is a database that is made up of several components which are important for us to understand before attempting to install and configure <strong style="mso-bidi-font-weight: normal;">Active Directory Services</strong> on Windows Server 2012. These components are:<span style="mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;"><span style="mso-list: Ignore;"></span></span></p>
<ol style="text-align: justify;">
<li class="MsoNormal" style="text-align: justify; line-height: 150%;"><strong style="mso-bidi-font-weight: normal;">Domain Controller (DC)</strong>: - Domain Controllers are servers where the <strong style="mso-bidi-font-weight: normal;">Active Directory Domain Services role</strong> is installed. The <strong style="mso-bidi-font-weight: normal;">DC</strong> stores copies of the <strong style="mso-bidi-font-weight: normal;">Active Directory Database</strong> (NTDS.DIT) and <strong style="mso-bidi-font-weight: normal;">SYSVOL</strong> (System Volume) folder.<span style="mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;"><span style="mso-list: Ignore;"></span></span></li>
<li class="MsoNormal" style="text-align: justify; line-height: 150%;"><strong style="mso-bidi-font-weight: normal;">Data Store</strong>: - It is the actual file (NTDS.DIT) that stores the Active Directory information.<span style="mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;"><span style="mso-list: Ignore;"><span style="font: 7.0pt 'Times New Roman';"></span></span></span></li>
<li class="MsoNormal" style="text-align: justify; line-height: 150%;"><strong style="mso-bidi-font-weight: normal;">Domain</strong>: - Active Directory <strong style="mso-bidi-font-weight: normal;">Domain</strong> is a group of computers and user accounts that share common administration within a central Active Directory database.<span style="mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;"><span style="mso-list: Ignore;"><span style="font: 7.0pt 'Times New Roman';"></span></span></span></li>
<li class="MsoNormal" style="text-align: justify; line-height: 150%;"><strong style="mso-bidi-font-weight: normal;">Forest</strong>: - Forest is a collection of Domains that share common Active Directory database. The first <strong style="mso-bidi-font-weight: normal;">Domain </strong>in a <strong style="mso-bidi-font-weight: normal;">Forest</strong> is called a <strong style="mso-bidi-font-weight: normal;">Forest Root Domain</strong>.<span style="mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;"><span style="mso-list: Ignore;"><span style="font: 7.0pt 'Times New Roman';"></span></span></span></li>
<li class="MsoNormal" style="text-align: justify; line-height: 150%;"><strong style="mso-bidi-font-weight: normal;">Tree</strong>: - A tree is a collection of domain names that share common root domain.</li>
<li class="MsoNormal" style="text-align: justify; line-height: 150%;"><strong style="mso-bidi-font-weight: normal;">Schema</strong>: - Schema defines the list of attributes and object types that all objects in the Active Directory database can have.<span style="mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;"><span style="mso-list: Ignore;"><span style="font: 7.0pt 'Times New Roman';"></span></span></span></li>
<li class="MsoNormal" style="text-align: justify; line-height: 150%;"><strong style="mso-bidi-font-weight: normal;">Organizational Units (OUs)</strong>: - OUs are simply container or folders in the Active Directory that stores other active directory objects such as user accounts, computer accounts and so on. OUs are also used to delegate control and apply group policies.</li>
<li class="MsoNormal" style="text-align: justify; line-height: 150%;"><strong style="mso-bidi-font-weight: normal;">Sites</strong>: - Sites are Active Directory object that represent physical locations. Sites are configured for proper replication of Active Directory database between sites.<span style="mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;"><span style="mso-list: Ignore;"><span style="font: 7.0pt 'Times New Roman';"></span></span></span></li>
<li class="MsoNormal" style="text-align: justify; line-height: 150%;"><strong style="mso-bidi-font-weight: normal;">Partition</strong>: - Active Directory database file is made up of multiple partitions which are also called <strong style="mso-bidi-font-weight: normal;">naming contexts</strong>. The Active Directory database consists of partitions such as <strong style="mso-bidi-font-weight: normal;">application</strong>, <strong style="mso-bidi-font-weight: normal;">schema</strong>, <strong style="mso-bidi-font-weight: normal;">configuration</strong>, <strong style="mso-bidi-font-weight: normal;">domain</strong> and <strong style="mso-bidi-font-weight: normal;">global catalog</strong>.</li>
</ol>
<h2 style="text-align: justify;">Checking Active Directory Domain Services Role Availability&nbsp;</h2>
<p>Another method of installing an <strong>Active Directory Services Role &amp;&nbsp; Domain Controller</strong> is with the use of Windows <strong>PowerShell</strong>. PowerShell is a powerful scripting tool and an alternative to the Windows GUI wizard we covered in our previous article. Open <strong>PowerShell</strong> as an <strong>Administrator</strong> and type the following cmdlet to check for the <strong>Active Directory Domain Services Role</strong> availability:</p>
<div class="box-content">PS C:\Users\Administrator&gt; <strong><span class="crayon-v">Get</span><span class="crayon-o">-</span><span class="crayon-i">WindowsFeature</span>&nbsp;<span class="crayon-v">AD</span><span class="crayon-o">-</span><span class="crayon-v">Domain</span><span class="crayon-o">-</span><span class="crayon-v">Services</span></strong></div>
<p style="text-align: justify;"><span class="crayon-v">The system should return the <strong>Install State</strong> as <strong>Available</strong>, indicating the role is available for immediate installation. We can now safely proceed to the next step.<br /></span></p>
<h2 style="text-align: justify;">Install Active Directory Services Role &amp; Domain Controller Using Windows PowerShell</h2>
<p>To initiate the installation of <strong>Active Directory Services Role</strong> on Windows Server 2012 R2, issue the following cmdlet:</p>
<div class="box-content" style="text-align: justify;">PS C:\Users\Administrator&gt; <strong>Install-WindowsFeature –Name AD-Domain-Services</strong></div>
<p style="text-align: justify;">The system will immediately begin the installation of the <strong>Active Directory Domain Services</strong> role and provide an update of the installation's progress:</p>
<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/windows-2012-active-directory-powershell-1.png" alt="windows-2012-active-directory-powershell-1" style="display: block; margin-left: auto; margin-right: auto;" title="Windows 2012 Active Directory Services Role Install via Powershell" /></p>
<p style="text-align: center;">Figure 1. Installing Active Directory Domain Services with PowerShell</p>
<p style="text-align: justify;">Once the installation is complete, the prompt is updated with a success message (Exit Code) as shown below:</p>
<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/windows-2012-active-directory-powershell-2.png" alt="windows-2012-active-directory-powershell-2" style="display: block; margin-left: auto; margin-right: auto;" title="Windows 2012 Active Directory Services Role Install complete " /></p>
<p style="text-align: center;">Figure 2. Finished Installing ADDS with PowerShell</p>
<div style="text-align: justify;">Next step is to promote the <strong>server</strong> to an <strong>active directory domain controller</strong>. To do so, you need to perform the prerequisite installation at the forest level by typing the following cmdlet in PowerShell:</div>
<div style="text-align: justify;"><br /><span class="box-content">PS C:\Users\Administrator&gt; <strong>Test-ADDSForestInstallation</strong></span></div>
<p style="text-align: justify;">The following figure shows the command execution and system output:</p>
<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/windows-2012-active-directory-powershell-3.png" alt="windows-2012-active-directory-powershell-3" style="display: block; margin-left: auto; margin-right: auto;" title="Windows 2012 Active Directory Services Role Install Prerequisites" /></p>
<p style="text-align: center;">Figure 3. Prerequisite Installation</p>
<p style="text-align: justify;">Now it's time to promote the server to a domain controller. For this step, we need to save all parameters in a PowerShell script (using notepad), which will then be used during the domain controller installation.</p>
<p class="box-info" style="text-align: justify; line-height: 150%;">FREE Hyper-V &amp; VMware Backup:&nbsp; FREE for Firewall.cx readers for a Limited Time!&nbsp; <a href="https://clixtrac.com/goto/?176385" target="_blank" rel="nofollow noopener" title="Free Hyper-V Backup">Download Now!</a></p>
<p style="text-align: justify;">Below are the options we used - these are identical to what we selected in our GUI Wizard installation covered in our&nbsp;<a href="https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-2012-active-directory-installation.html" target="_blank" title="Windows 2012 Active Directory Role and Domain Controller installation via Server Manager">Windows Server 2012 Active Directory Services role and Domain Controller installation using the Windows Server Manager (GUI)</a> article:</p>
<div class="box-content" style="text-align: justify;">#<br /># Windows PowerShell script for AD DS Deployment<br />#<br />Import-Module ADDSDeployment<br />Install-ADDSForest<br />-CreateDnsDelegation:$false<br />-DatabasePath "C:\Windows\NTDS"<br />-DomainMode "Win2012R2"<br />-DomainName "firewall.local"<br />-DomainNetbiosName "FIREWALL"<br />-ForestMode "Win2012R2"<br />-InstallDns:$true<br />-LogPath "C:\Windows\NTDS"<br />-NoRebootOnCompletion:$false<br />-SysvolPath "C:\Windows\SYSVOL"<br />-Force:$true</div>
<p style="text-align: justify;">Save the script at an easy accessible location e.g Desktop, with the name <strong>InstallDC.ps1</strong>.</p>
<div style="text-align: justify;">Before running the script, we need to change the execution policy of PowerShell to <strong>remote signed</strong>. This is accomplished with the following cmdlet:<br /><span class="box-content">PS C:\Users\Administrator\Desktop&gt; <strong>Set-executionpolicy remotesigned</strong></span></div>
<p style="text-align: justify;">The following figure shows the command execution and system output:</p>
<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/windows-2012-active-directory-powershell-4.png" alt="windows-2012-active-directory-powershell-4" style="display: block; margin-left: auto; margin-right: auto;" title="Windows 2012 Active Directory Domain Controller Set Execution Policy" /></p>
<p style="text-align: center;">Figure 4. Changing the Execution Policy of PowerShell</p>
<p style="text-align: justify;">Now we can execute our script from within PowerShell by changing the PowerShell directory to the location where the script resides and typing the following cmdlet:</p>
<div class="box-content" style="text-align: justify;">PS C:\Users\Administrator\Desktop&gt; <strong>.\InstallDC.ps1</strong></div>
<p style="text-align: justify;">Once executed, the server is promoted to Domain Controller and installation updates are provided at the PowerShell prompt:</p>
<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/windows-2012-active-directory-powershell-4.png" alt="windows-2012-active-directory-powershell-4" style="display: block; margin-left: auto; margin-right: auto;" title="Windows 2012 Active Directory Domain Controller Promoting Server to Domain Controller" /></p>
<p style="text-align: center;">Figure 5. Promoting Server to Domain Controller</p>
<!--[if gte mso 9]><xml>
 <w:WordDocument>
  <w:View>Normal</w:View>
  <w:Zoom>0</w:Zoom>
  <w:TrackMoves/>
  <w:TrackFormatting/>
  <w:PunctuationKerning/>
  <w:ValidateAgainstSchemas/>
  <w:SaveIfXMLInvalid>false</w:SaveIfXMLInvalid>
  <w:IgnoreMixedContent>false</w:IgnoreMixedContent>
  <w:AlwaysShowPlaceholderText>false</w:AlwaysShowPlaceholderText>
  <w:DoNotPromoteQF/>
  <w:LidThemeOther>EN-US</w:LidThemeOther>
  <w:LidThemeAsian>X-NONE</w:LidThemeAsian>
  <w:LidThemeComplexScript>X-NONE</w:LidThemeComplexScript>
  <w:Compatibility>
   <w:BreakWrappedTables/>
   <w:SnapToGridInCell/>
   <w:WrapTextWithPunct/>
   <w:UseAsianBreakRules/>
   <w:DontGrowAutofit/>
   <w:SplitPgBreakAndParaMark/>
   <w:EnableOpenTypeKerning/>
   <w:DontFlipMirrorIndents/>
   <w:OverrideTableStyleHps/>
  </w:Compatibility>
  <m:mathPr>
   <m:mathFont m:val="Cambria Math"/>
   <m:brkBin m:val="before"/>
   <m:brkBinSub m:val="&#45;-"/>
   <m:smallFrac m:val="off"/>
   <m:dispDef/>
   <m:lMargin m:val="0"/>
   <m:rMargin m:val="0"/>
   <m:defJc m:val="centerGroup"/>
   <m:wrapIndent m:val="1440"/>
   <m:intLim m:val="subSup"/>
   <m:naryLim m:val="undOvr"/>
  </m:mathPr></w:WordDocument>
</xml><![endif]--><!--[if gte mso 9]><xml>
 <w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="true"
  DefSemiHidden="true" DefQFormat="false" DefPriority="99"
  LatentStyleCount="267">
  <w:LsdException Locked="false" Priority="0" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Normal"/>
  <w:LsdException Locked="false" Priority="9" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="heading 1"/>
  <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 2"/>
  <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 3"/>
  <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 4"/>
  <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 5"/>
  <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 6"/>
  <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 7"/>
  <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 8"/>
  <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 9"/>
  <w:LsdException Locked="false" Priority="39" Name="toc 1"/>
  <w:LsdException Locked="false" Priority="39" Name="toc 2"/>
  <w:LsdException Locked="false" Priority="39" Name="toc 3"/>
  <w:LsdException Locked="false" Priority="39" Name="toc 4"/>
  <w:LsdException Locked="false" Priority="39" Name="toc 5"/>
  <w:LsdException Locked="false" Priority="39" Name="toc 6"/>
  <w:LsdException Locked="false" Priority="39" Name="toc 7"/>
  <w:LsdException Locked="false" Priority="39" Name="toc 8"/>
  <w:LsdException Locked="false" Priority="39" Name="toc 9"/>
  <w:LsdException Locked="false" Priority="35" QFormat="true" Name="caption"/>
  <w:LsdException Locked="false" Priority="10" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Title"/>
  <w:LsdException Locked="false" Priority="1" Name="Default Paragraph Font"/>
  <w:LsdException Locked="false" Priority="11" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Subtitle"/>
  <w:LsdException Locked="false" Priority="22" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Strong"/>
  <w:LsdException Locked="false" Priority="20" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Emphasis"/>
  <w:LsdException Locked="false" Priority="59" SemiHidden="false"
   UnhideWhenUsed="false" Name="Table Grid"/>
  <w:LsdException Locked="false" UnhideWhenUsed="false" Name="Placeholder Text"/>
  <w:LsdException Locked="false" Priority="1" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="No Spacing"/>
  <w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading"/>
  <w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List"/>
  <w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid"/>
  <w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1"/>
  <w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2"/>
  <w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1"/>
  <w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2"/>
  <w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1"/>
  <w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2"/>
  <w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3"/>
  <w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List"/>
  <w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading"/>
  <w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List"/>
  <w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid"/>
  <w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading Accent 1"/>
  <w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List Accent 1"/>
  <w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid Accent 1"/>
  <w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1 Accent 1"/>
  <w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2 Accent 1"/>
  <w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1 Accent 1"/>
  <w:LsdException Locked="false" UnhideWhenUsed="false" Name="Revision"/>
  <w:LsdException Locked="false" Priority="34" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="List Paragraph"/>
  <w:LsdException Locked="false" Priority="29" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Quote"/>
  <w:LsdException Locked="false" Priority="30" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Intense Quote"/>
  <w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2 Accent 1"/>
  <w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1 Accent 1"/>
  <w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2 Accent 1"/>
  <w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3 Accent 1"/>
  <w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List Accent 1"/>
  <w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading Accent 1"/>
  <w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List Accent 1"/>
  <w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid Accent 1"/>
  <w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading Accent 2"/>
  <w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List Accent 2"/>
  <w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid Accent 2"/>
  <w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1 Accent 2"/>
  <w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2 Accent 2"/>
  <w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1 Accent 2"/>
  <w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2 Accent 2"/>
  <w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1 Accent 2"/>
  <w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2 Accent 2"/>
  <w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3 Accent 2"/>
  <w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List Accent 2"/>
  <w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading Accent 2"/>
  <w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List Accent 2"/>
  <w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid Accent 2"/>
  <w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading Accent 3"/>
  <w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List Accent 3"/>
  <w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid Accent 3"/>
  <w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1 Accent 3"/>
  <w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2 Accent 3"/>
  <w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1 Accent 3"/>
  <w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2 Accent 3"/>
  <w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1 Accent 3"/>
  <w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2 Accent 3"/>
  <w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3 Accent 3"/>
  <w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List Accent 3"/>
  <w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading Accent 3"/>
  <w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List Accent 3"/>
  <w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid Accent 3"/>
  <w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading Accent 4"/>
  <w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List Accent 4"/>
  <w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid Accent 4"/>
  <w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1 Accent 4"/>
  <w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2 Accent 4"/>
  <w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1 Accent 4"/>
  <w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2 Accent 4"/>
  <w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1 Accent 4"/>
  <w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2 Accent 4"/>
  <w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3 Accent 4"/>
  <w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List Accent 4"/>
  <w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading Accent 4"/>
  <w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List Accent 4"/>
  <w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid Accent 4"/>
  <w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading Accent 5"/>
  <w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List Accent 5"/>
  <w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid Accent 5"/>
  <w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1 Accent 5"/>
  <w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2 Accent 5"/>
  <w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1 Accent 5"/>
  <w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2 Accent 5"/>
  <w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1 Accent 5"/>
  <w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2 Accent 5"/>
  <w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3 Accent 5"/>
  <w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List Accent 5"/>
  <w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading Accent 5"/>
  <w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List Accent 5"/>
  <w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid Accent 5"/>
  <w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading Accent 6"/>
  <w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List Accent 6"/>
  <w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid Accent 6"/>
  <w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1 Accent 6"/>
  <w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2 Accent 6"/>
  <w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1 Accent 6"/>
  <w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2 Accent 6"/>
  <w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1 Accent 6"/>
  <w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2 Accent 6"/>
  <w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3 Accent 6"/>
  <w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List Accent 6"/>
  <w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading Accent 6"/>
  <w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List Accent 6"/>
  <w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid Accent 6"/>
  <w:LsdException Locked="false" Priority="19" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Subtle Emphasis"/>
  <w:LsdException Locked="false" Priority="21" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Intense Emphasis"/>
  <w:LsdException Locked="false" Priority="31" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Subtle Reference"/>
  <w:LsdException Locked="false" Priority="32" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Intense Reference"/>
  <w:LsdException Locked="false" Priority="33" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Book Title"/>
  <w:LsdException Locked="false" Priority="37" Name="Bibliography"/>
  <w:LsdException Locked="false" Priority="39" QFormat="true" Name="TOC Heading"/>
 </w:LatentStyles>
</xml><![endif]--><!--[if gte mso 10]>

<![endif]--><!--[if gte mso 9]><xml>
 <o:OfficeDocumentSettings>
  <o:RelyOnVML/>
  <o:AllowPNG/>
 </o:OfficeDocumentSettings>
</xml><![endif]-->
<p style="text-align: justify;">After the installation is complete, the server will reboot and the server will have <strong>Active Directory Domain Services</strong> installed with the server being a <strong>Domain Controller</strong>.</p>
<p style="text-align: justify;">This completes the installation and setup of <strong>Windows 2012 Active Directory Services Role &amp; Domain Controller</strong> using Windows 2012 <strong>PowerShell</strong>.</p>
<p class="box-info" style="text-align: justify; line-height: 150%;">FREE Hyper-V &amp; VMware Backup:&nbsp; FREE for Firewall.cx readers for a Limited Time!&nbsp; <a href="https://clixtrac.com/goto/?176385" target="_blank" rel="nofollow noopener" title="Free Hyper-V Backup">Download Now!</a></p>
<!--[if gte mso 9]><xml>
 <w:WordDocument>
  <w:View>Normal</w:View>
  <w:Zoom>0</w:Zoom>
  <w:TrackMoves/>
  <w:TrackFormatting/>
  <w:PunctuationKerning/>
  <w:ValidateAgainstSchemas/>
  <w:SaveIfXMLInvalid>false</w:SaveIfXMLInvalid>
  <w:IgnoreMixedContent>false</w:IgnoreMixedContent>
  <w:AlwaysShowPlaceholderText>false</w:AlwaysShowPlaceholderText>
  <w:DoNotPromoteQF/>
  <w:LidThemeOther>EN-US</w:LidThemeOther>
  <w:LidThemeAsian>X-NONE</w:LidThemeAsian>
  <w:LidThemeComplexScript>X-NONE</w:LidThemeComplexScript>
  <w:Compatibility>
   <w:BreakWrappedTables/>
   <w:SnapToGridInCell/>
   <w:WrapTextWithPunct/>
   <w:UseAsianBreakRules/>
   <w:DontGrowAutofit/>
   <w:SplitPgBreakAndParaMark/>
   <w:EnableOpenTypeKerning/>
   <w:DontFlipMirrorIndents/>
   <w:OverrideTableStyleHps/>
  </w:Compatibility>
  <m:mathPr>
   <m:mathFont m:val="Cambria Math"/>
   <m:brkBin m:val="before"/>
   <m:brkBinSub m:val="&#45;-"/>
   <m:smallFrac m:val="off"/>
   <m:dispDef/>
   <m:lMargin m:val="0"/>
   <m:rMargin m:val="0"/>
   <m:defJc m:val="centerGroup"/>
   <m:wrapIndent m:val="1440"/>
   <m:intLim m:val="subSup"/>
   <m:naryLim m:val="undOvr"/>
  </m:mathPr></w:WordDocument>
</xml><![endif]--><!--[if gte mso 9]><xml>
 <w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="true"
  DefSemiHidden="true" DefQFormat="false" DefPriority="99"
  LatentStyleCount="267">
  <w:LsdException Locked="false" Priority="0" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Normal"/>
  <w:LsdException Locked="false" Priority="9" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="heading 1"/>
  <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 2"/>
  <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 3"/>
  <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 4"/>
  <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 5"/>
  <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 6"/>
  <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 7"/>
  <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 8"/>
  <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 9"/>
  <w:LsdException Locked="false" Priority="39" Name="toc 1"/>
  <w:LsdException Locked="false" Priority="39" Name="toc 2"/>
  <w:LsdException Locked="false" Priority="39" Name="toc 3"/>
  <w:LsdException Locked="false" Priority="39" Name="toc 4"/>
  <w:LsdException Locked="false" Priority="39" Name="toc 5"/>
  <w:LsdException Locked="false" Priority="39" Name="toc 6"/>
  <w:LsdException Locked="false" Priority="39" Name="toc 7"/>
  <w:LsdException Locked="false" Priority="39" Name="toc 8"/>
  <w:LsdException Locked="false" Priority="39" Name="toc 9"/>
  <w:LsdException Locked="false" Priority="35" QFormat="true" Name="caption"/>
  <w:LsdException Locked="false" Priority="10" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Title"/>
  <w:LsdException Locked="false" Priority="1" Name="Default Paragraph Font"/>
  <w:LsdException Locked="false" Priority="11" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Subtitle"/>
  <w:LsdException Locked="false" Priority="22" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Strong"/>
  <w:LsdException Locked="false" Priority="20" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Emphasis"/>
  <w:LsdException Locked="false" Priority="59" SemiHidden="false"
   UnhideWhenUsed="false" Name="Table Grid"/>
  <w:LsdException Locked="false" UnhideWhenUsed="false" Name="Placeholder Text"/>
  <w:LsdException Locked="false" Priority="1" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="No Spacing"/>
  <w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading"/>
  <w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List"/>
  <w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid"/>
  <w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1"/>
  <w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2"/>
  <w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1"/>
  <w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2"/>
  <w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1"/>
  <w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2"/>
  <w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3"/>
  <w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List"/>
  <w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading"/>
  <w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List"/>
  <w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid"/>
  <w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading Accent 1"/>
  <w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List Accent 1"/>
  <w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid Accent 1"/>
  <w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1 Accent 1"/>
  <w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2 Accent 1"/>
  <w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1 Accent 1"/>
  <w:LsdException Locked="false" UnhideWhenUsed="false" Name="Revision"/>
  <w:LsdException Locked="false" Priority="34" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="List Paragraph"/>
  <w:LsdException Locked="false" Priority="29" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Quote"/>
  <w:LsdException Locked="false" Priority="30" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Intense Quote"/>
  <w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2 Accent 1"/>
  <w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1 Accent 1"/>
  <w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2 Accent 1"/>
  <w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3 Accent 1"/>
  <w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List Accent 1"/>
  <w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading Accent 1"/>
  <w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List Accent 1"/>
  <w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid Accent 1"/>
  <w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading Accent 2"/>
  <w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List Accent 2"/>
  <w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid Accent 2"/>
  <w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1 Accent 2"/>
  <w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2 Accent 2"/>
  <w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1 Accent 2"/>
  <w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2 Accent 2"/>
  <w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1 Accent 2"/>
  <w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2 Accent 2"/>
  <w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3 Accent 2"/>
  <w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List Accent 2"/>
  <w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading Accent 2"/>
  <w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List Accent 2"/>
  <w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid Accent 2"/>
  <w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading Accent 3"/>
  <w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List Accent 3"/>
  <w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid Accent 3"/>
  <w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1 Accent 3"/>
  <w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2 Accent 3"/>
  <w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1 Accent 3"/>
  <w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2 Accent 3"/>
  <w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1 Accent 3"/>
  <w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2 Accent 3"/>
  <w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3 Accent 3"/>
  <w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List Accent 3"/>
  <w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading Accent 3"/>
  <w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List Accent 3"/>
  <w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid Accent 3"/>
  <w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading Accent 4"/>
  <w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List Accent 4"/>
  <w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid Accent 4"/>
  <w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1 Accent 4"/>
  <w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2 Accent 4"/>
  <w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1 Accent 4"/>
  <w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2 Accent 4"/>
  <w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1 Accent 4"/>
  <w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2 Accent 4"/>
  <w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3 Accent 4"/>
  <w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List Accent 4"/>
  <w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading Accent 4"/>
  <w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List Accent 4"/>
  <w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid Accent 4"/>
  <w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading Accent 5"/>
  <w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List Accent 5"/>
  <w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid Accent 5"/>
  <w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1 Accent 5"/>
  <w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2 Accent 5"/>
  <w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1 Accent 5"/>
  <w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2 Accent 5"/>
  <w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1 Accent 5"/>
  <w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2 Accent 5"/>
  <w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3 Accent 5"/>
  <w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List Accent 5"/>
  <w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading Accent 5"/>
  <w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List Accent 5"/>
  <w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid Accent 5"/>
  <w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading Accent 6"/>
  <w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List Accent 6"/>
  <w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid Accent 6"/>
  <w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1 Accent 6"/>
  <w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2 Accent 6"/>
  <w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1 Accent 6"/>
  <w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2 Accent 6"/>
  <w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1 Accent 6"/>
  <w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2 Accent 6"/>
  <w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3 Accent 6"/>
  <w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List Accent 6"/>
  <w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading Accent 6"/>
  <w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List Accent 6"/>
  <w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid Accent 6"/>
  <w:LsdException Locked="false" Priority="19" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Subtle Emphasis"/>
  <w:LsdException Locked="false" Priority="21" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Intense Emphasis"/>
  <w:LsdException Locked="false" Priority="31" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Subtle Reference"/>
  <w:LsdException Locked="false" Priority="32" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Intense Reference"/>
  <w:LsdException Locked="false" Priority="33" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Book Title"/>
  <w:LsdException Locked="false" Priority="37" Name="Bibliography"/>
  <w:LsdException Locked="false" Priority="39" QFormat="true" Name="TOC Heading"/>
 </w:LatentStyles>
</xml><![endif]--><!--[if gte mso 10]>

<![endif]-->]]></description>
			<category>Windows Servers</category>
			<pubDate>Mon, 30 Jun 2014 15:00:00 +1000</pubDate>
		</item>
		<item>
			<title>Installing Windows Server 2012 Active Directory via Server Manager. Active Directory Concepts</title>
			<link>https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-2012-active-directory-installation.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-2012-active-directory-installation.html</guid>
			<description><![CDATA[<p style="text-align: justify;">This article serves as an <strong>Active Directory tutorial</strong> covering <strong>installation and setup of a Windows 2012 Domain Controller</strong> using<strong> Windows Server Manager</strong> (GUI).</p>
<p style="text-align: justify;">Readers interested in performing the installation via <a href="https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-2012-active-directory-services-dc-install-powershell.html" target="_blank" title="Windows 2012 Server Active Directory Role &amp; Domain Controller installation via PowerShell">Windows PowerShell</a> can <a href="https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-2012-active-directory-services-dc-install-powershell.html" target="_blank" title="Windows 2012 Server Active Directory Role &amp; Domain Controller installation via PowerShell">read this article</a>.</p>
<p class="box-info">FREE Hyper-V &amp; VMware Backup:&nbsp; FREE for Firewall.cx readers for a Limited Time!&nbsp; <a href="https://clixtrac.com/goto/?176237" target="_blank" rel="nofollow noopener" title="Free Hyper-V Backup">Download Now!</a></p>
<h2>What is Active Directory?</h2>
<p style="text-align: justify;"><strong>Active Directory</strong> is a heart of Windows Server operating systems. <strong>Active Directory Domain Services</strong> (<strong>AD DS</strong>) is a central repository of active directory objects such as user accounts, computer accounts, groups, group policies and so on. Similarly, Active Directory authenticates user accounts and computer accounts when they login into the domain. Computers must be joined to the domain in order to authenticate Active Directory users.</p>
<p style="text-align: justify;"><strong>Active Directory</strong> is a database that is made up of several components which are important for us to understand before attempting to install and configure<strong> Active Directory Services</strong> on <strong>Windows Server 2012</strong>. These components are:</p>
<ol style="text-align: justify;">
<li><strong>Domain Controller (DC)</strong>: - Domain Controllers are servers where the <strong>Active Directory Domain Services</strong> role is installed. The <strong>DC</strong> stores copies of the <strong>Active Directory Database</strong> (NTDS.DIT) and <strong>SYSVOL</strong> (System Volume) folder.</li>
<li><strong>Data Store</strong>: - It is the actual file (NTDS.DIT) that stores the Active Directory information.</li>
<li><strong>Domain</strong>: - <strong>Active Directory Domain</strong> is a group of computers and user accounts that share common administration within a central Active Directory database.</li>
<li><strong>Forest</strong>: - Forest is a collection of Domains that share common Active Directory database. The first <strong>Domain</strong> in a <strong>Forest</strong> is called a <strong>Forest Root Domain</strong>.</li>
<li><strong>Tree</strong>: - A tree is a collection of domain names that share common root domain.</li>
<li><strong>Schema</strong>: - Schema defines the list of attributes and object types that all objects in the Active Directory database can have.</li>
<li><strong>Organizational Units (OUs)</strong>: - OUs are simply container or folders in the Active Directory that stores other active directory objects such as user accounts, computer accounts and so on. OUs are also used to delegate control and apply group policies.</li>
<li><strong>Sites</strong>: - Sites are Active Directory object that represent physical locations. Sites are configured for proper replication of Active Directory database between sites.</li>
<li><strong>Partition</strong>: - Active Directory database file is made up of multiple partitions which are also called <strong>naming contexts</strong>. The Active Directory database consists of partitions such as <strong>application</strong>, <strong>schema</strong>, <strong>configuration</strong>, <strong>domain</strong> and <strong>global catalog</strong>.</li>
</ol>
<h2 style="text-align: justify;">Installing Active Directory Domain Controller In Server 2012</h2>
<p style="text-align: justify;">In Windows Server 2012, the Active Directory Domain Controller role can be installed using the Server Manager or alternatively, using Windows PowerShell. The figure below represents our lab setup which includes a Windows Server 2012 (<strong>FW-DC01</strong>) waiting to have the Active Directory Domain Services server role installed on it:</p>
<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/windows-2012-active-directory-installation-1.png" alt="windows-2012-active-directory-installation-1" style="margin: 7px auto; display: block;" title="Windows 2012 R2 Domain Controller - Network Diagram" /></p>
<p style="text-align: justify;">Notice that there are two Windows 8 clients waiting to join the Active Directory domain once installed.</p>
<p style="text-align: justify;">A checklist before installing a Domain Controller in your network is always recommended. The list should include the following information:</p>
<ul class="check" style="text-align: justify;">
<li><strong>Server Host Name</strong> – A valid <strong>Hostname</strong> or <strong>Computer Name</strong> must be assigned to domain controller. We've selected <strong>FW-DC01</strong> as a server's host name.</li>
<li><strong>IP Address</strong> – You should configure a static IP address, which will not be changed later on. In our example, we've used 192.168.1.1/24 which is a <a href="https://www.firewall.cx/networking/network-protocols/ip-protocol/protocols-ip-network-id.html" target="_blank" title="Class C IP Address - Subnetting">Class C IP address</a>.</li>
<li><strong>Domain Name</strong> – Perhaps one of the most important items on our checklist. We've used <strong>firewall.local</strong> for our setup. While many will want to use an existing public domain, e.g their company's domain, it is highly recommended this practice is avoided at all costs as it can create a number of problems with DNS resolution when internal hosts or servers are trying to resolve hosts that exist on both private and public name spaces.</li>
</ul>
<p style="text-align: justify;">Microsoft doesn't recommend the usage of a <strong>public domain name</strong> in an internal domain controller, which is why we selected <strong>firewall.local</strong> instead of firewall.cx.</p>
<h2 style="text-align: justify;">Installing Active Directory Domain Controller Using Server Manager</h2>
<p style="text-align: justify;">Initiating the installation of Active Directory is a simple process; however it does require <strong>Administrator</strong> privileges. Open <strong>Server Manager</strong>, go to <strong>Manage</strong> and select <strong>Add Roles and Features</strong>:</p>
<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/windows-2012-active-directory-installation-2.png" alt="" style="margin: 7px auto; display: block; border: 1px solid #000000;" title="Windows 2012 R2 Domain Controller Installation - Server Manager" data-alt="windows-2012-active-directory-installation-2" /></p>
<p style="text-align: center;">Figure 2. Add Roles and Features</p>
<p style="text-align: justify;">Click <strong>Next</strong> on the <strong>Before you begin</strong> page.</p>
<p style="text-align: justify;">On the next screen, choose <strong>Role-based or feature-based Installation</strong> and click <strong>Next</strong>:</p>
<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/windows-2012-active-directory-installation-3.png" alt="windows-2012-active-directory-installation-3" style="margin: 7px auto; display: block;" title="Windows 2012 Active Directory Installation - Role-based or feature-based Installation " /></p>
<p style="text-align: center;">&nbsp;Figure 3. Choose Role Based Installation</p>
<p style="text-align: justify;">Select the destination server by choosing <strong>Select a server from the server pool</strong> option and select the server and click <strong>Next</strong>. In cases like our lab where there is only one server available, it must be selected:</p>
<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/windows-2012-active-directory-installation-4.png" alt="windows-2012-active-directory-installation-4" style="margin: 7px auto; display: block;" title="Windows 2012 Active Directory Installation - Select a server from the server pool " /></p>
<p style="text-align: center;">&nbsp;Figure 4. Select Destination Server</p>
<p style="text-align: justify;">In the <strong>Select server roles page</strong>, select the <strong>Active Directory Domain Services</strong> role and click <strong>Next</strong>:</p>
<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/windows-2012-active-directory-installation-5.png" alt="windows-2012-active-directory-installation-5" style="margin: 7px auto; display: block;" title="Windows 2012 Active Directory Installation -Select AD DS role" /></p>
<p style="text-align: center;">Figure 5. Select AD DS role</p>
<p style="text-align: justify;">The next page is the <strong>Features </strong>page which we can safely skip by clicking <strong>Next</strong></p>
<p style="text-align: justify;">The <strong>Active Directory Domain Services</strong> page contains limited information on requirements and best practices for <strong>Active Directory Domain Services</strong>:</p>
<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/windows-2012-active-directory-installation-6.png" alt="windows-2012-active-directory-installation-6" style="margin: 7px auto; display: block;" title="Windows 2012 Active Directory Installation -Active Directory Domain Services page" /></p>
<p style="text-align: center;">Figure 6. AD DS Page</p>
<p style="text-align: justify;">Once you've read the information provided, click <strong>Next</strong> to proceed to the final confirmation page.</p>
<p class="box-info">FREE Hyper-V &amp; VMware Backup:&nbsp; FREE for Firewall.cx readers for a Limited Time!&nbsp; <a href="https://clixtrac.com/goto/?176237" target="_blank" rel="nofollow noopener" title="Free Hyper-V Backup">Download Now!</a></p>
<p style="text-align: justify;">On the confirmation page, select <strong>Restart the destination server automatically if required</strong> and click on the <strong>Install</strong> button. By clicking <strong>Install</strong>, you confirm you are ready to begin the <strong>AD DS</strong> role installation:</p>
<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/windows-2012-active-directory-installation-7.png" alt="windows-2012-active-directory-installation-7" style="margin: 7px auto; display: block;" title="Windows 2012 Active Directory Installation -Active Directory Confirmation" /></p>
<p style="text-align: center;">Figure 7. AD DS Confirmation</p>
<p class="box-warning" style="text-align: justify;"><strong>Note:</strong> You cannot cancel a role installation once it begins</p>
<p style="text-align: justify;">The <strong>Add Roles and Feature Wizard</strong> will continuously provide updates during the <strong>Active Directory Domain Services</strong> role installation, as shown below:</p>
<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/windows-2012-active-directory-installation-8.png" alt="windows-2012-active-directory-installation-8" style="margin: 7px auto; display: block;" title="Windows 2012 Active Directory Installation Progress" /></p>
<p style="text-align: center;">Figure 8. Installation Progress</p>
<p style="text-align: justify;">Once the installation has completed successfully, we should expect to see the <strong>Installation succeeded</strong> message under the installation progress bar:</p>
<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/windows-2012-active-directory-installation-9.png" alt="windows-2012-active-directory-installation-9" style="margin: 7px auto; display: block;" title="Windows 2012 Active Directory Installation completed successfully" /></p>
<p style="text-align: center;">Figure 9. Successful Installation &amp; Promote Server to DC</p>
<h2 style="text-align: justify;">Promoting Server To Domain Controller</h2>
<p style="text-align: justify;">At this point we can choose to <strong>Promote this server to a domain controller</strong> by clicking on the appropriate link as highlighted above (<span style="color: #0000ff;">Blue arrow</span>).</p>
<p style="text-align: justify;">After selecting the <strong>Promote this server to a domain controller</strong> option, the <strong>Deployment Configuration</strong> page will appear. Assuming this is the first domain controller in the network, as is in our case, select the <strong>Add a new forest</strong> option to setup a new forest, and then type the fully qualified domain name under <strong>root domain name section</strong>. We've selected to use <strong>firewall.local</strong>:</p>
<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/windows-2012-active-directory-installation-10.png" alt="windows-2012-active-directory-installation-10" style="margin: 7px auto; display: block;" title="Windows 2012 Active Directory Installation - Configure Domain Name" /></p>
<p style="text-align: center;">Figure 10. Configure Domain Name</p>
<p style="text-align: justify;">Administrators who already have active directory installed would most likely select the <strong>Add a domain controller to an existing domain</strong> option. Having at least two Domain Controllers is highly advisable for redundancy purposes. When done click the <strong>Next</strong> button.</p>
<p style="text-align: justify;">Now select <strong>Windows Server 2012 R2</strong> for the <strong>Forest functional level</strong> and <strong>Domain functional level</strong>. By setting the domain and forest functional levels to the highest value that your environment can support, you'll be able to use as many Active Directory Domain Services as possible. If for example you do not plan to ever add domain controllers running <strong>Windows 2003</strong>, but might add a <strong>Windows 2008 server</strong> as a domain controller, you would select <strong>Windows Server 2008</strong> for the <strong>Domain functional level</strong>. Next, click on the <strong>Domain Name System (DNS) server</strong> option as shown in the below figure:</p>
<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/windows-2012-active-directory-installation-11.png" alt="windows-2012-active-directory-installation-11" style="margin: 7px auto; display: block;" title="Windows 2012 Active Directory Installation - DC Capabilities" /></p>
<p style="text-align: center;">Figure 11. DC Capabilities</p>
<p style="text-align: justify;">The DNS Server role can be later on installed. If for any reason you need to install the DNS Server role later on, please read our <a href="https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-2012-dns-server-installation-configuration.html" target="_blank" title="How to Install and Configure Windows 2012 DNS Server Role">How to Install and Configure Windows 2012 DNS Server Role</a> article.</p>
<p style="text-align: justify;">Since this is the first domain controller in the forest, <strong>Global Catalog (GC)</strong> will be selected by default. Now set the <strong>Directory Services Restore Mode (DSRM)</strong> password. <strong>DSRM</strong> is used to restore active directory in case of failure. Once done, click <strong>Next</strong>.</p>
<p style="text-align: justify;">The next window is the<strong> DNS Options</strong> page. Here we might encounter the following error which can be safely ignored simply because of the absence of a DNS server (which we are about to install):</p>
<div class="info" style="text-align: justify;">A delegation for this DNS server cannot be created because the authoritative parent zone cannot be found...</div>
<p style="text-align: justify;">Ignore the error and click <strong>Next</strong> to continue.</p>
<p style="text-align: justify;">In the next window, <strong>Additional Options</strong>, leave the default <strong>NetBIOS domain name</strong> and click <strong>Next</strong>. The Windows AD DS wizard will automatically remove the .local from the domain name to ensure compatibility with NetBIOS name resolution:</p>
<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/windows-2012-active-directory-installation-12.png" alt="windows-2012-active-directory-installation-12" style="margin: 7px auto; display: block;" title="Windows 2012 Active Directory Installation - Additional Options" /></p>
<p style="text-align: center;">Figure 12. Additional Options</p>
<p style="text-align: justify;">The next step involves the <strong>Paths</strong> selection which allows the selection of where to install the <strong>Database</strong>, <strong>Log Files</strong> and <strong>SYSVOL</strong> folders. You can either browse to a different location or leave the default settings (as we did). When complete, click <strong>Next</strong>:</p>
<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/windows-2012-active-directory-installation-13.png" alt="windows-2012-active-directory-installation-13" style="margin: 7px auto; display: block;" title="Windows 2012 Active Directory Installation - Paths" /></p>
<p style="text-align: center;">Figure 13. Paths</p>
<p class="box-info" style="text-align: left;"><strong>Note:</strong> When the installation is complete, the <strong>Database folder</strong> will contain a file named <strong>NTDS.DIT</strong>. This important file is database file of your active directory.</p>
<p style="text-align: justify;">Finally, the next screen allows us to perform a quick review of all selected options before initiating the installation: Once reviewed, click <strong>Next</strong>.</p>
<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/windows-2012-active-directory-installation-14.png" alt="windows-2012-active-directory-installation-14" style="margin: 7px auto; display: block;" title="Windows 2012 Active Directory Installation - Review Options" /></p>
<p style="text-align: center;">Figure 14. Review Options</p>
<p style="text-align: justify;">The server will now perform some prerequisites check. If successful, it will show green check mark on the top. Some warnings may appear, however if these are non-critical, we can still proceed with the installation. Click the <strong>Install</strong> button to promote this server to domain controller:</p>
<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/windows-2012-active-directory-installation-15.png" alt="windows-2012-active-directory-installation-15" style="margin: 7px auto; display: block;" title="Windows 2012 Active Directory Installation - Prerequisites Check" /></p>
<p style="text-align: center;">Figure 15. Prerequisites Check</p>
<p style="text-align: justify;">The installation begins and the server's installation progress is continuously updated:</p>
<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/windows-2012-active-directory-installation-16.png" alt="windows-2012-active-directory-installation-16" style="margin: 7px auto; display: block;" title="Windows 2012 Active Directory Installation - Installation Begins" /></p>
<p style="text-align: center;">Figure 16. Installation Begins</p>
<p style="text-align: justify;">When the installation of <strong>Active Directory</strong> is complete, the server will restart.</p>
<p style="text-align: justify;">Assuming we've restarted, we can now open <strong>Active Directory Users and Computers</strong> and begin creating user accounts, computer accounts, apply group policies, and so on.</p>
<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/windows-2012-active-directory-installation-17.png" alt="windows-2012-active-directory-installation-17" style="margin: 7px auto; display: block;" title="Windows 2012 Active Directory Installation - Active Directory Users and Computers" /></p>
<p style="text-align: center;">Figure 17. Active Directory Users and Computers</p>
<p>As expected, under the <strong>Domain Controllers</strong> section, we found our single domain controller. If we were to add our new domain controller to an existing active directory, then we would expect to find all domain controllers listed here.</p>
<p class="box-info">FREE Hyper-V &amp; VMware Backup:&nbsp; FREE for Firewall.cx readers for a Limited Time!&nbsp; <a href="https://clixtrac.com/goto/?176237" target="_blank" rel="nofollow noopener" title="Free Hyper-V Backup">Download Now!</a><strong><br /></strong></p>
<!--[if gte mso 9]><xml>
 <o:OfficeDocumentSettings>
  <o:RelyOnVML/>
  <o:AllowPNG/>
 </o:OfficeDocumentSettings>
</xml><![endif]--><!--[if gte mso 9]><xml>
 <w:WordDocument>
  <w:View>Normal</w:View>
  <w:Zoom>0</w:Zoom>
  <w:TrackMoves/>
  <w:TrackFormatting/>
  <w:PunctuationKerning/>
  <w:ValidateAgainstSchemas/>
  <w:SaveIfXMLInvalid>false</w:SaveIfXMLInvalid>
  <w:IgnoreMixedContent>false</w:IgnoreMixedContent>
  <w:AlwaysShowPlaceholderText>false</w:AlwaysShowPlaceholderText>
  <w:DoNotPromoteQF/>
  <w:LidThemeOther>EN-US</w:LidThemeOther>
  <w:LidThemeAsian>X-NONE</w:LidThemeAsian>
  <w:LidThemeComplexScript>X-NONE</w:LidThemeComplexScript>
  <w:Compatibility>
   <w:BreakWrappedTables/>
   <w:SnapToGridInCell/>
   <w:WrapTextWithPunct/>
   <w:UseAsianBreakRules/>
   <w:DontGrowAutofit/>
   <w:SplitPgBreakAndParaMark/>
   <w:EnableOpenTypeKerning/>
   <w:DontFlipMirrorIndents/>
   <w:OverrideTableStyleHps/>
  </w:Compatibility>
  <m:mathPr>
   <m:mathFont m:val="Cambria Math"/>
   <m:brkBin m:val="before"/>
   <m:brkBinSub m:val="&#45;-"/>
   <m:smallFrac m:val="off"/>
   <m:dispDef/>
   <m:lMargin m:val="0"/>
   <m:rMargin m:val="0"/>
   <m:defJc m:val="centerGroup"/>
   <m:wrapIndent m:val="1440"/>
   <m:intLim m:val="subSup"/>
   <m:naryLim m:val="undOvr"/>
  </m:mathPr></w:WordDocument>
</xml><![endif]--><!--[if gte mso 9]><xml>
 <w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="true"
  DefSemiHidden="true" DefQFormat="false" DefPriority="99"
  LatentStyleCount="267">
  <w:LsdException Locked="false" Priority="0" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Normal"/>
  <w:LsdException Locked="false" Priority="9" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="heading 1"/>
  <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 2"/>
  <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 3"/>
  <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 4"/>
  <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 5"/>
  <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 6"/>
  <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 7"/>
  <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 8"/>
  <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 9"/>
  <w:LsdException Locked="false" Priority="39" Name="toc 1"/>
  <w:LsdException Locked="false" Priority="39" Name="toc 2"/>
  <w:LsdException Locked="false" Priority="39" Name="toc 3"/>
  <w:LsdException Locked="false" Priority="39" Name="toc 4"/>
  <w:LsdException Locked="false" Priority="39" Name="toc 5"/>
  <w:LsdException Locked="false" Priority="39" Name="toc 6"/>
  <w:LsdException Locked="false" Priority="39" Name="toc 7"/>
  <w:LsdException Locked="false" Priority="39" Name="toc 8"/>
  <w:LsdException Locked="false" Priority="39" Name="toc 9"/>
  <w:LsdException Locked="false" Priority="35" QFormat="true" Name="caption"/>
  <w:LsdException Locked="false" Priority="10" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Title"/>
  <w:LsdException Locked="false" Priority="1" Name="Default Paragraph Font"/>
  <w:LsdException Locked="false" Priority="11" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Subtitle"/>
  <w:LsdException Locked="false" Priority="22" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Strong"/>
  <w:LsdException Locked="false" Priority="20" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Emphasis"/>
  <w:LsdException Locked="false" Priority="59" SemiHidden="false"
   UnhideWhenUsed="false" Name="Table Grid"/>
  <w:LsdException Locked="false" UnhideWhenUsed="false" Name="Placeholder Text"/>
  <w:LsdException Locked="false" Priority="1" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="No Spacing"/>
  <w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading"/>
  <w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List"/>
  <w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid"/>
  <w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1"/>
  <w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2"/>
  <w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1"/>
  <w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2"/>
  <w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1"/>
  <w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2"/>
  <w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3"/>
  <w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List"/>
  <w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading"/>
  <w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List"/>
  <w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid"/>
  <w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading Accent 1"/>
  <w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List Accent 1"/>
  <w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid Accent 1"/>
  <w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1 Accent 1"/>
  <w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2 Accent 1"/>
  <w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1 Accent 1"/>
  <w:LsdException Locked="false" UnhideWhenUsed="false" Name="Revision"/>
  <w:LsdException Locked="false" Priority="34" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="List Paragraph"/>
  <w:LsdException Locked="false" Priority="29" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Quote"/>
  <w:LsdException Locked="false" Priority="30" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Intense Quote"/>
  <w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2 Accent 1"/>
  <w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1 Accent 1"/>
  <w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2 Accent 1"/>
  <w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3 Accent 1"/>
  <w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List Accent 1"/>
  <w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading Accent 1"/>
  <w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List Accent 1"/>
  <w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid Accent 1"/>
  <w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading Accent 2"/>
  <w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List Accent 2"/>
  <w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid Accent 2"/>
  <w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1 Accent 2"/>
  <w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2 Accent 2"/>
  <w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1 Accent 2"/>
  <w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2 Accent 2"/>
  <w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1 Accent 2"/>
  <w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2 Accent 2"/>
  <w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3 Accent 2"/>
  <w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List Accent 2"/>
  <w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading Accent 2"/>
  <w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List Accent 2"/>
  <w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid Accent 2"/>
  <w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading Accent 3"/>
  <w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List Accent 3"/>
  <w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid Accent 3"/>
  <w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1 Accent 3"/>
  <w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2 Accent 3"/>
  <w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1 Accent 3"/>
  <w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2 Accent 3"/>
  <w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1 Accent 3"/>
  <w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2 Accent 3"/>
  <w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3 Accent 3"/>
  <w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List Accent 3"/>
  <w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading Accent 3"/>
  <w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List Accent 3"/>
  <w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid Accent 3"/>
  <w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading Accent 4"/>
  <w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List Accent 4"/>
  <w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid Accent 4"/>
  <w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1 Accent 4"/>
  <w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2 Accent 4"/>
  <w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1 Accent 4"/>
  <w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2 Accent 4"/>
  <w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1 Accent 4"/>
  <w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2 Accent 4"/>
  <w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3 Accent 4"/>
  <w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List Accent 4"/>
  <w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading Accent 4"/>
  <w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List Accent 4"/>
  <w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid Accent 4"/>
  <w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading Accent 5"/>
  <w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List Accent 5"/>
  <w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid Accent 5"/>
  <w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1 Accent 5"/>
  <w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2 Accent 5"/>
  <w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1 Accent 5"/>
  <w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2 Accent 5"/>
  <w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1 Accent 5"/>
  <w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2 Accent 5"/>
  <w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3 Accent 5"/>
  <w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List Accent 5"/>
  <w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading Accent 5"/>
  <w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List Accent 5"/>
  <w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid Accent 5"/>
  <w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading Accent 6"/>
  <w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List Accent 6"/>
  <w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid Accent 6"/>
  <w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1 Accent 6"/>
  <w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2 Accent 6"/>
  <w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1 Accent 6"/>
  <w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2 Accent 6"/>
  <w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1 Accent 6"/>
  <w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2 Accent 6"/>
  <w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3 Accent 6"/>
  <w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List Accent 6"/>
  <w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading Accent 6"/>
  <w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List Accent 6"/>
  <w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid Accent 6"/>
  <w:LsdException Locked="false" Priority="19" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Subtle Emphasis"/>
  <w:LsdException Locked="false" Priority="21" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Intense Emphasis"/>
  <w:LsdException Locked="false" Priority="31" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Subtle Reference"/>
  <w:LsdException Locked="false" Priority="32" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Intense Reference"/>
  <w:LsdException Locked="false" Priority="33" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Book Title"/>
  <w:LsdException Locked="false" Priority="37" Name="Bibliography"/>
  <w:LsdException Locked="false" Priority="39" QFormat="true" Name="TOC Heading"/>
 </w:LatentStyles>
</xml><![endif]--><!--[if gte mso 10]>

<![endif]-->]]></description>
			<category>Windows Servers</category>
			<pubDate>Fri, 27 Jun 2014 15:00:00 +1000</pubDate>
		</item>
		<item>
			<title>Hyper-V Best Practices - Replica, Cluster, Backup Advice</title>
			<link>https://www.firewall.cx/operating-systems/microsoft/windows-servers/hyper-v-best-practices.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/operating-systems/microsoft/windows-servers/hyper-v-best-practices.html</guid>
			<description><![CDATA[<p style="text-align: justify;"><strong><img src="https://www.firewall.cx/images/stories/hyper-v-best-practices-1a.png" alt="hyper-v-best-practices-1a" style="margin: 7px; border: 1px solid #000000; float: left;" title="Hyper-V Virtualization" />Hyper-V</strong> has proven to be a very cost effective solution for server consolidation. Evidence of this is also the fact that companies are beginning to move from VMware to the Hyper-V virtualization platform. This article will cover the Windows 2012<strong> Hyper-V best practices</strong>, and aims to help you run your Hyper-V virtualization environment as optimum as possible.</p>
<p style="text-align: justify;">Keeping your Hyper-V virtualization infrastructure running as smoothly as possible can be a daunting task, which is why we recommend engineers follow the best Hyper-V practices.</p>
<p style="text-align: justify;">Different organizations have different setups and requirements: some of you might be moving from VMware to Hyper-V virtualization, while others might be upgrading from an older Hyper-V virtualization server to a newer one. Each scenario must follow the baseline or best practices,&nbsp; to be able to run the virtualization infrastructure successfully – without problems.</p>
<div class="box-info">FREE Hyper-V Backup:&nbsp; Easy to use - Powerful features - Just works, no hassle:&nbsp;&nbsp; It's FREE for Firewall.cx readers!&nbsp; <a href="https://clixtrac.com/goto/?172170" target="_blank" rel="nofollow noopener" title="Free Hyper-V Backup">Download Now!</a><strong><br /></strong></div>
<h2 style="text-align: justify;">Hyper-V Best Practice List</h2>
<p style="text-align: justify;">Best practices for Hyper-V vary considerably depending on whether you're using clustered servers. As a general rule-of-thumb the best thing you can do is try to configure your host server and your Virtual Machines in a way that avoids resource contention to the greatest extent possible.</p>
<p style="text-align: justify;">Organizations who are considering migrating their infrastructure to Hyper-V, or are currently running on the Hyper-V virtualization platform, need to take note of the below important points that must not be overlooked:</p>
<h2 style="text-align: justify;">Processor</h2>
<div style="text-align: justify;">Minimum: A <strong>1.4 GHz 64-bit processor</strong> with <strong>hardware-assisted virtualization</strong>. This feature is available in processors that include a <strong>virtualization option</strong>—specifically, processors with <strong>Intel Virtualization Technology</strong> (Intel VT) or <strong>AMD Virtualization</strong> (AMD-V) technology.<br /><strong>Hardware-enforced Data Execution Prevention</strong> (DEP) must also be available and enabled. For Intel CPUs, this translates to enabling the <strong>Intel XD</strong> (“execute disable”) bit or while for AMD CPUs, the <strong>AMD NX</strong> (“no execute”) bit.</div>
<h2 style="text-align: justify;">Memory</h2>
<p style="text-align: justify;">Minimum: 512 MB.&nbsp; This is the bare minimum; however a logical approach would be at least 4 Gigs of RAM per virtual server.&nbsp; If one physical server is to host 4 Virtual Machines, then we would recommend at least 16GBs of Physical RAM, if not more.&nbsp; SQL servers and other RAM intensive services would certainly lift the memory requirements a lot higher. You can never have enough memory.</p>
<h2 style="text-align: justify;">Network Adapters</h2>
<p style="text-align: justify;">At least one network adapter is required, but two or more are always recommended. Hyper-V allows the creation of three different virtual switches: <strong>Internal Virtual Switches</strong>, <strong>Private Virtual Switches</strong> and <strong>External Virtual Switches</strong>.</p>
<p style="text-align: justify;">Internal virtual switches are used to allow the virtual machine to connect with its host machine (the physical machine that run’s Hyper-V). Private virtual switches are used when we only want to connect virtual machines, which run on the same host, between each other.&nbsp; External virtual switches are used to allow the virtual machine to connect with our LAN network and this is where physical network adapters come in hand.&nbsp; &nbsp;<br />Host machines with only one network adapter will be forced to share that network adapter with all its virtual machines. This is why it’s always best practice to have at least two network adapters available.&nbsp;</p>
<h2 style="text-align: justify;">Additional Considerations</h2>
<p style="text-align: justify;">The settings for hardware-assisted virtualization and hardware-enforced DEP are usually available from within in the system’s BIOS; however, the names of the settings may differ from the names identified previously.<br />For more information about whether a specific processor model supports Hyper-V (virtualization), it is recommended to check at the manufacturer’s website.</p>
<p style="text-align: justify;">As noted before, it is important to remember after modifying the settings for hardware-assisted virtualization or hardware-enforced DEP, you may need to turn off the power to the server and then turn it back on to ensure the new CPU settings are loaded.</p>
<h2 style="text-align: justify;">Microsoft Assessment &amp; Planning Toolkit</h2>
<p style="text-align: justify;"><a href="https://www.microsoft.com/en-us/download/details.aspx?id=7826" target="_blank" rel="nofollow noopener" title="Microsoft Assessment and Planning Toolkit">Microsoft Assessment and Planning Toolkit</a> (MAP) can be used to study existing infrastructure and determine the Hyper-V requirement. For organizations who are interested in server consolidation and virtualization through technologies such as Hyper-V, MAP helps gather performance metrics and generate server consolidation recommendations that identify the candidates for server virtualization and will even suggest how the physical servers might be placed in a virtualized environment.</p>
<p style="text-align: justify;">The diagram below shows the MAP phases involved to successfully create the necessary reports:</p>
<p><img src="https://www.firewall.cx/images/stories/hyper-v-best-practices-1.png" alt="hyper-v-best-practices-1" style="display: block; margin-left: auto; margin-right: auto;" title="Microsoft Assessment and Planning Toolkit (MAP)" /></p>
<p style="text-align: center;" align="center">Figure 1. MAP Phases</p>
<p style="text-align: justify;" align="center">Below is an overview of the Microsoft Assessment and Planning Toolkit application:</p>
<p><img src="https://www.firewall.cx/images/stories/hyper-v-best-practices-2.png" alt="hyper-v-best-practices-2" style="display: block; margin-left: auto; margin-right: auto;" title="Microsoft Assessment and Planning Toolkit (MAP) application" /></p>
<p style="text-align: center;" align="center">Figure 2. MAP Overview</p>
<p style="text-align: justify;">The following points are the best practices which should be considered before deploying your <strong>Windows Server 2012 Hyper-V infrastructure</strong>:</p>
<h2 style="text-align: justify;">Hyper-V Hosts (Physical Servers)</h2>
<ul class="checkbox">
<li style="text-align: justify;">Ensure hosts are up-to-date with recommended Microsoft updates</li>
<li style="text-align: justify;">Ensure hosts have the latest BIOS version, as well as other hardware devices (such as Synthetic Fiber Channel, NIC’s, Raid bios, etc.)</li>
<li style="text-align: justify;">Hosts must be part of a domain before you can create a Hyper-V High-Availability Cluster.</li>
<li style="text-align: justify;">RDP Printer Mapping should be disabled on hosts, to remove any chance of a printer driver causing instability issues on the host machine. To do this, follow the below steps: <strong>Computer Configuration –&gt; Policies –&gt; Administrative Templates –&gt; Windows Components –&gt; Remote Desktop Services –&gt; Remote Desktop Session Host –&gt; Printer Redirection –&gt; Do not allow client printer redirection –&gt; Set to "Enabled”</strong></li>
<li style="text-align: justify;"><strong>Do not install</strong> any other Roles on a host besides the <strong>Hyper-V</strong> role and the <strong>Remote Desktop Services</strong> roles. Optionally, if the host will become part of a cluster, you can install <strong>Failover Cluster Manager</strong>. In the event the host connects to an iSCSI SAN and/or Fiber Channel, you can also install <strong>Multipath I/O</strong>.</li>
<li style="text-align: justify;">Anti-virus software should exclude Hyper-V specific files using the <a href="https://social.technet.microsoft.com/wiki/contents/articles/2179.hyper-v-anti-virus-exclusions-for-hyper-v-hosts.aspx" target="_blank" rel="nofollow noopener" title="Hyper-V: Antivirus Exclusions for Hyper-V Hosts article">Hyper-V: Antivirus Exclusions for Hyper-V Hosts article</a> available from Microsoft.</li>
<li style="text-align: justify;">Default path for <strong>Virtual Hard Disks</strong> (VHD/VHDX) should be set to a <strong>non-system drive</strong>, due to this can cause disk latency as well as create the potential for the host running out of disk space.</li>
<li style="text-align: justify;">If you are using iSCSI: In Windows Firewall with Advanced Security, <strong>enable iSCSI Service</strong> (TCP-In) for <strong>Inbound</strong> and <strong>iSCSI Service</strong> (TCP-Out) for <strong>outbound</strong> in Firewall settings on each host. This will ensure iSCSI traffic is allowed to pass from host to the SAN device and back. Not enabling these rules will prevent iSCSI communication. To set the iSCSI firewall rules via <strong>netsh</strong>, you can use the following command:</li>
</ul>
<p class="box-content">PS C:\Windows\system32&gt; <strong>Netsh advfirewall firewall set rule group=”iSCSI Service” new enable=yes</strong></p>
<ul class="checkbox">
<li style="text-align: justify;">Periodically run performance counters against the host, to ensure optimal performance. Recommend using the Hyper-V performance counter that can be extracted from the (free) Codeplex PAL application.</li>
</ul>
<h2 style="text-align: justify;">Hyper-V Virtual Machines</h2>
<ul class="checkbox">
<li style="text-align: justify;">Ensure you are running only supported guests in your environment.</li>
<li style="text-align: justify;">Ensure you are using sophisticated backup software such as <a href="https://clixtrac.com/goto/?172170" target="_blank" rel="nofollow noopener" title="Altaro’s Hyper-V Backup">Altaro’s Hyper-V Backup</a> which also includes free lifetime backup for a specific amount of VMs</li>
<li style="text-align: justify;">If you are converting VMware virtual machines to Hyper-V, consider using MVMC (a free, stand-alone tool offered by Microsoft) or VMM.</li>
<li style="text-align: justify;"><a href="https://learn.microsoft.com/en-us/sysinternals/downloads/disk2vhd" target="_blank" rel="nofollow noopener" title="Disk2vhd">Disk2vhd </a>is a Tool which can be used to convert a Physical Machine to a Hyper-V Virtual Machine (P2V). The VHD file created can then be imported in to Hyper-V.</li>
</ul>
<div class="box-info">FREE Hyper-V Backup:&nbsp; FREE for Firewall.cx readers for a Limited Time!&nbsp; <a href="https://clixtrac.com/goto/?172170" target="_blank" rel="nofollow noopener" title="Free Hyper-V Backup">Download Now!</a><strong><br /></strong></div>
<h2 style="text-align: justify;">Hyper-V Physical NICs</h2>
<ul class="checkbox">
<li style="text-align: justify;">Ensure Network Adapters have the latest firmware and drivers, which often address known issues with hardware and performance.</li>
<li style="text-align: justify;"><strong>TCP Chimney Offload</strong> is not supported with Server 2012 software-based NIC teaming, because TCP Chimney has the entire networking stack offloaded to the NIC. If however software-based NIC teaming is not used, you can leave <strong>TCP Chimney Offload</strong> enabled. To disable <strong>TCP Chimney Offload</strong>, from an elevated command-prompt, type the following command:</li>
</ul>
<p class="box-content">PS C:\Windows\system32&gt; <strong>netsh int tcp set global chimney=disabled</strong></p>
<ul class="checkbox">
<li style="text-align: justify;"><strong>Jumbo frames</strong> should be turned on and set for <strong>9000</strong> or <strong>9014</strong> (depending on your hardware) for CSV, iSCSI and Live Migration networks. To verify Jumbo frames have been successfully configured, run the following command from all your Hyper-V host(s) to your iSCSI SAN:</li>
</ul>
<p class="box-content">PS C:\Windows\system32&gt; <strong>ping 10.50.2.35 –f –l 8000</strong></p>
<p style="text-align: justify; margin-left: 30px;">This command will ping the SAN (e.g. 10.50.2.35) with an 8K packet from the host. If replies are received, Jumbo frames are properly configured. Note that in the case a network switch exists between the host and iSCSI SAN, Jumbo frames must be enabled on that as well.</p>
<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/hyper-v-best-practices-3.png" alt="hyper-v-best-practices-3" style="display: block; margin-left: auto; margin-right: auto;" title="Hyper-V Jumbo Frame Support Test" /></p>
<p style="text-align: center;">&nbsp;Figure 3. Jumbo Frame Ping Test</p>
<ul class="checkbox">
<li style="text-align: justify;">Management NIC should be at the top (1st) in <strong>NIC Binding Order</strong>. To set the NIC binding order: <strong>Control Panel --&gt; Network and Internet --&gt; Network Connections</strong>. Next, select the <strong>advanced menu item</strong>, and select <strong>Advanced Settings</strong>. In the Advanced Settings window, select your <strong>management network</strong> under <strong>Connections</strong> and use the arrows on the right to move it to the top of the list.</li>
<li style="text-align: justify;">If using NIC teaming inside a guest VM, follow this order: Open the settings of the <strong>Virtual Machine</strong>, Under <strong>Network Adapter</strong>, select <strong>Advanced Features</strong>, in the right pane, under <strong>Network Teaming</strong>, tick the “<strong>Enable this network adapter to be part of a team in the guest operating system</strong>”. Once inside the VM, open <strong>Server Manager</strong>. In the <strong>All Servers</strong> view, <strong>enable NIC Teaming from Server</strong>:</li>
</ul>
<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/hyper-v-best-practices-4.png" alt="hyper-v-best-practices-4" style="display: block; margin-left: auto; margin-right: auto;" title="Hyper-V Enable Network Card Teaming" /></p>
<p style="text-align: center;">Figure 4. Enable NIC Teaming</p>
<h2 style="text-align: left;">Hyper-V&nbsp;Disks</h2>
<ul class="checkbox">
<li>
<div>New disks should use the <strong>VHDX format</strong>. Disks created in earlier Hyper-V iterations should be converted to VHDX, unless there is a need to move the VHD back to a 2008 Hyper-V host.</div>
</li>
<li>
<div>Disk used for CSV must be partitioned with NTFS. You cannot use a disk for a CSV that is formatted with FAT, FAT32, or Resilient File System (ReFS).</div>
</li>
<li>
<div>Disks should be fixed in a production environment, to increase disk throughput. Differencing and Dynamic disks are not recommended for production, due to increased disk read/write latency times (differencing/dynamic disks).</div>
</li>
<li>
<div><span style="text-decoration: underline;">Shared Virtual Hard Disk</span>: <strong>Do not use a shared VHDx</strong> file for the operating system disk. Servers should have a unique VHDx (for the OS) that only they can access. <strong>Shared Virtual Hard Disks</strong> are better used as data disks and for the disk witness.</div>
</li>
<li>
<div>Use caution when using snapshots. If not properly managed, snapshots can cause disk space issues, as well as additional physical I/O overhead.</div>
</li>
<li>
<div>Page file on Hyper-V Host should manage by the OS and not configured manually.</div>
</li>
<li>
<div>It is not supported to create a storage pool using Fiber Channel or iSCSI LUNs.</div>
</li>
</ul>
<h2 style="text-align: justify;">Hyper-V Memory</h2>
<ul class="checkbox">
<li style="text-align: justify;">Use <strong>Dynamic Memory</strong> on all VMs (unless not supported).</li>
<li style="text-align: justify;">Guest OS should be configured with (minimum) recommended memory</li>
</ul>
<h2 style="text-align: justify;">Hyper-V Clusters</h2>
<ul class="checkbox">
<li style="text-align: justify;">Set preferred network for CSV communication, to ensure the correct network is used for this traffic. The lowest metric in the output generated by the PowerShell command below, will be used for CSV traffic. First, open a PowerShell command-prompt (using “Run as administrator”) Secondly, you’ll need to import the “<strong>FailoverClusters</strong>” module. Type the following at the PowerShell command-prompt:</li>
</ul>
<p class="box-content">PS C:\Windows\system32&gt; <strong>Import-Module FailoverClusters</strong></p>
<p style="text-align: justify; margin-left: 30px;">Next, we’ll request a listing of networks used by the host, as well as the metric assigned. This can be done by typing the following:</p>
<p class="box-content">PS C:\Windows\system32&gt; <strong>Get-ClusterNetwork | ft Name, Metric, AutoMetric, Role</strong></p>
<p style="text-align: justify; margin-left: 30px;">In order to change which network interface is used for CSV traffic, use the following PowerShell command:</p>
<p class="box-content">PS C:\Windows\system32&gt; <strong>(Get-ClusterNetwork "CSV Network").Metric=900</strong></p>
<p style="text-align: justify; margin-left: 30px;">This will set the network named "<strong>CSV Network</strong>" to <strong>900</strong></p>
<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/hyper-v-best-practices-5.png" alt="hyper-v-best-practices-5" style="display: block; margin-left: auto; margin-right: auto;" title="Hyper-V Get-ClusterNetwork &quot;CSV Network&quot;).Metric=900" /></p>
<p style="text-align: center;">Figure 5. Get Cluster Network</p>
<ul class="checkbox">
<li style="text-align: justify;">Set preferred network for Live Migration, to ensure the correct network(s) are used for this traffic following these steps: Open <strong>Failover Cluster Manager</strong>, Expand the <strong>Cluster</strong> , Next, <strong>right-click</strong> on <strong>Networks</strong> and select <strong>Live Migration Settings</strong> , Use the <strong>Up/Down</strong> buttons to list the networks in order from most preferred (at the top) to least preferred (at the bottom) , <strong>Uncheck</strong> any networks you do not want used for Live Migration traffic , Select <strong>Apply</strong> and then press <strong>OK</strong> , Once you have made this change, it will be used for all VMs in the cluster</li>
<li style="text-align: justify;">The <strong>Host Shutdown Time</strong> (<strong>ShutdownTimeoutInMinutes</strong> registry entry) can be increased from the default time. This setting is usually increased when additional time is needed by VMs in order to ensure they have had enough time to shut down before the host reboots.</li>
</ul>
<p class="box-content" style="text-align: justify; margin-left: 30px;">Registry Key: <strong>HKLM\Cluster\ShutdownTimeoutInMinutes&nbsp;</strong></p>
<p style="text-align: justify; margin-left: 30px;">Enter minutes in <strong>Decimal value</strong>.</p>
<p style="text-align: justify; margin-left: 30px;">Note: Changing of this registy value requires a server reboot in order to take effect:</p>
<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/hyper-v-best-practices-6.png" alt="hyper-v-best-practices-6" style="display: block; margin-left: auto; margin-right: auto;" title="Hyper-V Host Shutdown Time Registry Tweak" /></p>
<p style="text-align: center;">Figure 6. Registry Shutdown Option</p>
<ul class="checkbox">
<li style="text-align: justify;">Run the <strong>Cluster Validation</strong> periodically to remediate any issues</li>
</ul>
<h2 style="text-align: justify;">Hyper-V Replica</h2>
<ul class="checkbox">
<li style="text-align: justify;">Run the <strong>Hyper-V Replica Capacity Planner</strong>. The Capacity Planner for Hyper-V Replica, allows you to plan your Hyper-V Replica deployment based on the workload, storage, network and server characteristics.</li>
<li style="text-align: justify;">Update inbound traffic on the firewall to allowTCP port 80 and/or port 443 traffic. (In Windows Firewall, enable “Hyper-V Replica HTTP Listener (TCP-In)” rule on each node of the cluster. Shell commands to achieve the above are:</li>
</ul>
<p class="box-content" style="text-align: justify; margin-left: 30px;">PS C:\Windows\system32&gt; <strong>netsh advfirewall firewall set rule group="Hyper-V Replica HTTP" new enable=yes</strong><br />PS C:\Windows\system32&gt; <strong>netsh advfirewall firewall set rule group="Hyper-V Replica HTTPS" new enable=yes</strong></p>
<ul class="checkbox">
<li style="text-align: justify;">Virtual hard disks with paging files should be excluded from replication, unless the page file is on the OS disk.</li>
<li style="text-align: justify;">Test failovers should be performed monthly, at a minimum, to verify that failover will succeed and that virtual machine workloads will operate as expected after failover</li>
</ul>
<h2 style="text-align: justify;">Hyper-V&nbsp;Cluster-Aware Updating</h2>
<ul class="checkbox">
<li style="text-align: justify;">Place all <strong>Cluster-Aware Updating</strong> (CAU) Run Profiles on a single File Share accessible to all potential CAU Update Coordinators. Run Profiles are configuration settings that can be saved as an XML file called an Updating Run Profile and reused for later Updating Runs.</li>
</ul>
<h2 style="text-align: justify;">Hyper-V&nbsp;SMB 3.0 File Shares</h2>
<ul class="checkbox">
<li style="text-align: justify;">An <strong>Active Directory</strong> infrastructure is required, so you can grant permissions to the computer account of the Hyper-V hosts.</li>
<li style="text-align: justify;"><strong>Loopback configurations</strong> (where the computer that is running Hyper-V is used as the file server for virtual machine storage) are not supported. Similarly, running the file share in VM’s that are hosted on computer nodes that will serve other VM’s is not supported.</li>
</ul>
<h2 style="text-align: justify;">Hyper-V&nbsp;Integration Services</h2>
<ul class="checkbox">
<li>Ensure <strong>Integration Services</strong> (IS) have been installed on all VMs. IC's <strong>significantly improve</strong> interaction between the VM and the physical host.</li>
</ul>
<h2 style="text-align: justify;">Hyper-V Offloaded Data Transfer (ODX) Usage</h2>
<ul class="checkbox">
<li style="text-align: justify;">If your SAN supports ODX; you should strongly consider enabling ODX on your Hyper-V hosts, as well as any VMs that connect directly to SAN storage LUNs.</li>
</ul>
<div style="padding-left: 30px;">To enable <strong>ODX</strong>, open PowerShell (using ‘<strong>Run as Administrator</strong>’) and type the following:</div>
<div style="margin-left: 30px;"><br /><span class="box-content">C:\&gt;<strong> Set-ItemProperty hklm:\system\currentcontrolset\control\filesystem -Name "FilterSupportedFeaturesMode" –Value 0</strong></span></div>
<p style="text-align: justify; margin-left: 30px;">Be sure to run this command on every Hyper-V host that connects to the SAN, as well as any VM that connects directly to the SAN.<br /><br />This concludes our Windows 2012 <strong>Hyper-V Best Practices</strong> article. We hope you’ve found the information provided useful and that it helps make your everyday administration a much easier task.</p>
<!--[if gte mso 9]><xml>
 <o:OfficeDocumentSettings>
  <o:RelyOnVML/>
  <o:AllowPNG/>
 </o:OfficeDocumentSettings>
</xml><![endif]--><!--[if gte mso 9]><xml>
 <w:WordDocument>
  <w:View>Normal</w:View>
  <w:Zoom>0</w:Zoom>
  <w:TrackMoves/>
  <w:TrackFormatting/>
  <w:PunctuationKerning/>
  <w:ValidateAgainstSchemas/>
  <w:SaveIfXMLInvalid>false</w:SaveIfXMLInvalid>
  <w:IgnoreMixedContent>false</w:IgnoreMixedContent>
  <w:AlwaysShowPlaceholderText>false</w:AlwaysShowPlaceholderText>
  <w:DoNotPromoteQF/>
  <w:LidThemeOther>EN-US</w:LidThemeOther>
  <w:LidThemeAsian>X-NONE</w:LidThemeAsian>
  <w:LidThemeComplexScript>X-NONE</w:LidThemeComplexScript>
  <w:Compatibility>
   <w:BreakWrappedTables/>
   <w:SnapToGridInCell/>
   <w:WrapTextWithPunct/>
   <w:UseAsianBreakRules/>
   <w:DontGrowAutofit/>
   <w:SplitPgBreakAndParaMark/>
   <w:EnableOpenTypeKerning/>
   <w:DontFlipMirrorIndents/>
   <w:OverrideTableStyleHps/>
  </w:Compatibility>
  <m:mathPr>
   <m:mathFont m:val="Cambria Math"/>
   <m:brkBin m:val="before"/>
   <m:brkBinSub m:val="&#45;-"/>
   <m:smallFrac m:val="off"/>
   <m:dispDef/>
   <m:lMargin m:val="0"/>
   <m:rMargin m:val="0"/>
   <m:defJc m:val="centerGroup"/>
   <m:wrapIndent m:val="1440"/>
   <m:intLim m:val="subSup"/>
   <m:naryLim m:val="undOvr"/>
  </m:mathPr></w:WordDocument>
</xml><![endif]--><!--[if gte mso 9]><xml>
 <w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="true"
  DefSemiHidden="true" DefQFormat="false" DefPriority="99"
  LatentStyleCount="267">
  <w:LsdException Locked="false" Priority="0" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Normal"/>
  <w:LsdException Locked="false" Priority="9" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="heading 1"/>
  <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 2"/>
  <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 3"/>
  <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 4"/>
  <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 5"/>
  <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 6"/>
  <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 7"/>
  <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 8"/>
  <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 9"/>
  <w:LsdException Locked="false" Priority="39" Name="toc 1"/>
  <w:LsdException Locked="false" Priority="39" Name="toc 2"/>
  <w:LsdException Locked="false" Priority="39" Name="toc 3"/>
  <w:LsdException Locked="false" Priority="39" Name="toc 4"/>
  <w:LsdException Locked="false" Priority="39" Name="toc 5"/>
  <w:LsdException Locked="false" Priority="39" Name="toc 6"/>
  <w:LsdException Locked="false" Priority="39" Name="toc 7"/>
  <w:LsdException Locked="false" Priority="39" Name="toc 8"/>
  <w:LsdException Locked="false" Priority="39" Name="toc 9"/>
  <w:LsdException Locked="false" Priority="35" QFormat="true" Name="caption"/>
  <w:LsdException Locked="false" Priority="10" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Title"/>
  <w:LsdException Locked="false" Priority="1" Name="Default Paragraph Font"/>
  <w:LsdException Locked="false" Priority="11" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Subtitle"/>
  <w:LsdException Locked="false" Priority="22" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Strong"/>
  <w:LsdException Locked="false" Priority="20" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Emphasis"/>
  <w:LsdException Locked="false" Priority="59" SemiHidden="false"
   UnhideWhenUsed="false" Name="Table Grid"/>
  <w:LsdException Locked="false" UnhideWhenUsed="false" Name="Placeholder Text"/>
  <w:LsdException Locked="false" Priority="1" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="No Spacing"/>
  <w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading"/>
  <w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List"/>
  <w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid"/>
  <w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1"/>
  <w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2"/>
  <w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1"/>
  <w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2"/>
  <w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1"/>
  <w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2"/>
  <w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3"/>
  <w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List"/>
  <w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading"/>
  <w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List"/>
  <w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid"/>
  <w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading Accent 1"/>
  <w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List Accent 1"/>
  <w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid Accent 1"/>
  <w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1 Accent 1"/>
  <w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2 Accent 1"/>
  <w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1 Accent 1"/>
  <w:LsdException Locked="false" UnhideWhenUsed="false" Name="Revision"/>
  <w:LsdException Locked="false" Priority="34" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="List Paragraph"/>
  <w:LsdException Locked="false" Priority="29" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Quote"/>
  <w:LsdException Locked="false" Priority="30" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Intense Quote"/>
  <w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2 Accent 1"/>
  <w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1 Accent 1"/>
  <w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2 Accent 1"/>
  <w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3 Accent 1"/>
  <w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List Accent 1"/>
  <w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading Accent 1"/>
  <w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List Accent 1"/>
  <w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid Accent 1"/>
  <w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading Accent 2"/>
  <w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List Accent 2"/>
  <w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid Accent 2"/>
  <w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1 Accent 2"/>
  <w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2 Accent 2"/>
  <w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1 Accent 2"/>
  <w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2 Accent 2"/>
  <w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1 Accent 2"/>
  <w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2 Accent 2"/>
  <w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3 Accent 2"/>
  <w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List Accent 2"/>
  <w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading Accent 2"/>
  <w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List Accent 2"/>
  <w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid Accent 2"/>
  <w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading Accent 3"/>
  <w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List Accent 3"/>
  <w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid Accent 3"/>
  <w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1 Accent 3"/>
  <w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2 Accent 3"/>
  <w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1 Accent 3"/>
  <w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2 Accent 3"/>
  <w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1 Accent 3"/>
  <w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2 Accent 3"/>
  <w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3 Accent 3"/>
  <w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List Accent 3"/>
  <w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading Accent 3"/>
  <w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List Accent 3"/>
  <w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid Accent 3"/>
  <w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading Accent 4"/>
  <w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List Accent 4"/>
  <w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid Accent 4"/>
  <w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1 Accent 4"/>
  <w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2 Accent 4"/>
  <w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1 Accent 4"/>
  <w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2 Accent 4"/>
  <w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1 Accent 4"/>
  <w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2 Accent 4"/>
  <w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3 Accent 4"/>
  <w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List Accent 4"/>
  <w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading Accent 4"/>
  <w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List Accent 4"/>
  <w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid Accent 4"/>
  <w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading Accent 5"/>
  <w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List Accent 5"/>
  <w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid Accent 5"/>
  <w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1 Accent 5"/>
  <w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2 Accent 5"/>
  <w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1 Accent 5"/>
  <w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2 Accent 5"/>
  <w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1 Accent 5"/>
  <w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2 Accent 5"/>
  <w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3 Accent 5"/>
  <w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List Accent 5"/>
  <w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading Accent 5"/>
  <w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List Accent 5"/>
  <w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid Accent 5"/>
  <w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading Accent 6"/>
  <w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List Accent 6"/>
  <w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid Accent 6"/>
  <w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1 Accent 6"/>
  <w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2 Accent 6"/>
  <w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1 Accent 6"/>
  <w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2 Accent 6"/>
  <w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1 Accent 6"/>
  <w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2 Accent 6"/>
  <w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3 Accent 6"/>
  <w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List Accent 6"/>
  <w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading Accent 6"/>
  <w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List Accent 6"/>
  <w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid Accent 6"/>
  <w:LsdException Locked="false" Priority="19" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Subtle Emphasis"/>
  <w:LsdException Locked="false" Priority="21" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Intense Emphasis"/>
  <w:LsdException Locked="false" Priority="31" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Subtle Reference"/>
  <w:LsdException Locked="false" Priority="32" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Intense Reference"/>
  <w:LsdException Locked="false" Priority="33" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Book Title"/>
  <w:LsdException Locked="false" Priority="37" Name="Bibliography"/>
  <w:LsdException Locked="false" Priority="39" QFormat="true" Name="TOC Heading"/>
 </w:LatentStyles>
</xml><![endif]--><!--[if gte mso 10]>

<![endif]-->
<p><br /><br /></p>]]></description>
			<category>Windows Servers</category>
			<pubDate>Thu, 15 May 2014 09:00:00 +1000</pubDate>
		</item>
		<item>
			<title>The Importance of a Hyper-V &amp; VMware Server Backup Tool - 20 Reasons Why You Should Use One</title>
			<link>https://www.firewall.cx/operating-systems/microsoft/windows-servers/hyper-v-server-backup-tool.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/operating-systems/microsoft/windows-servers/hyper-v-server-backup-tool.html</guid>
			<description><![CDATA[<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/hyper-v-backup-tool.jpg" alt="hyper-v-backup-tool" style="margin: 7px; float: left;" title="Hyper-V Server Backup Tools" />Using Hyper-V Server virtualization technology, you can virtualize your physical environment to reduce the cost of physical hardware. As part of IT best practices, you implement monitoring solutions to monitor the Hyper-V Servers and virtual machines running on them. You also take necessary actions to provide security to production environment by means of installing antivirus software. Then it also becomes necessary that you implement a backup mechanism to restore the business services as quickly as possible using a <strong>Hyper-V Server Backup tool</strong>.</p>
<p style="text-align: justify;">This article is written to let you know as to why it is important to choose a dedicated <a href="https://clixtrac.com/goto/?178323" target="_blank" rel="nofollow noopener" title="Hyper-V Backup Tool">Hyper-V Backup tool</a> rather than relying on the existing mechanism as explained in bullet points below.</p>
<p style="text-align: justify;">Users interested can also read our articles on <a href="https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-virtualization-hyper-v-concepts.html" target="_blank" title="Hyper-V Concepts/VDI">Hyper-V Concepts/VDI</a>, <a href="https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-2012-hyper-v-installation-configuration.html" target="_blank" title="how to install Hyper-V Server">how to install Hyper-V Server</a> &amp; <a href="https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-hyper-v-creating-vm.html" target="_blank" title="creating a Virtual Machine in Hyper-V">creating a Virtual Machine in Hyper-V</a>.</p>
<p class="box-info" style="text-align: justify;">FREE Hyper-V &amp; VMware Backup:&nbsp; Easy to use - Powerful features - Just works, no hassle:&nbsp;&nbsp; It's FREE for Firewall.cx readers!&nbsp; <a href="https://clixtrac.com/goto/?172170" target="_blank" rel="nofollow noopener" title="Free Hyper-V Backup">Download Now!</a></p>
<h2 style="text-align: justify;">1. Flexibility</h2>
<p style="text-align: justify;">Third-party backup products are designed in such a way that the product is easy to use when it comes to backup or restore a virtual machine running on the Hyper-V Server. For example, using third-party backup product, you can select a virtual machine to backup or restore. In case of any disaster with a virtual machine, it becomes easy for an IT administrator to use the flexible backup product’s console to restore a virtual machine from backup copies and restore the business services as quickly as possible.</p>
<h2 style="text-align: justify;">2. Verification Of Restores</h2>
<p style="text-align: justify;">Third-party backup products provide features to verify restores without impacting the production workload. IT administrators can use the verification feature to restore the backup copies to a standalone environment to make sure these backup copies can be restored successfully in the future, if required.</p>
<h2 style="text-align: justify;">3. Designed For Use With Hyper-V</h2>
<p style="text-align: justify;">A third-party backup product is designed to use with a specific technology. For example, SQL Server Backup products are designed to backup/restore SQL Server database. Similarly, third-party Hyper-V Backup Products are designed to use specifically with Hyper-V Servers. Since these dedicated Hyper-V backup products are integrated with Hyper-V closely, they are more trusted by the IT organizations.</p>
<h2 style="text-align: justify;">4. Full Backup Copy Of Virtual Machine</h2>
<p style="text-align: justify;">Although, starting with Windows Server 2012, Hyper-V Server offers replication services, sometimes referred as Hyper-V Replica, which can be used to build a disaster recovery scenario. The replication takes place every 5 minutes and changed data are replicated to the Hyper-V Servers located on the disaster recovery site. At the disaster site, you only have changed copies to restore virtual machine from a failure. What if you need to restore the full virtual machine? In that case, you would require the full backup copy of the virtual machine which is only possible if you are using a dedicated Hyper-V backup product.</p>
<h2 style="text-align: justify;">5. Maintaining Different Versions Of Backup Copies</h2>
<p style="text-align: justify;">There are several reasons to maintain different versions of backup copies. One of the reasons is to revert back configuration to a point-in-time and another reason is to restore the business services as quickly as possible from a backup copy of your choice. A dedicated Hyper-V backup product can maintain several backup copies of a virtual machine.</p>
<h2 style="text-align: justify;">6. Agentless Backups/Restores</h2>
<p style="text-align: justify;">Most of the third-party Hyper-V Backup products ship without an Agent. An agent is a piece of software which is installed on a Hyper-V server with communicates with the Backup software. In case of an agentless backup software, it is easy for administrators to perform backup/restore operations without worrying about the agent’s response.</p>
<h2 style="text-align: justify;">7. Timely Backing up virtual machines</h2>
<p style="text-align: justify;">As part of the standard IT process, many organizations have a strategy in place in which backups for critical IT components including virtual machines are scheduled in a timely manner. These backups ensure that in case of any disaster (including physical), the service can be restored from a backup copy taken from a dedicated backup product rather than relying on native methods. The backup copy not only allows you to restore services but also helps you understand the impact of restoring a backup copy which is older.</p>
<h2 style="text-align: justify;">8. Centralized Management</h2>
<p style="text-align: justify;">Backup software ships with a centralized management tool. The centralized management tool is capable of managing multiple Hyper-V Servers and checking the backup operations on multiple Hyper-V servers from a single console.</p>
<h2 style="text-align: justify;">9. Avoid Unnecessary Files Backup</h2>
<p style="text-align: justify;">Since the backup software is designed to work with a specific technology, it is designed in such a way that it excludes the files which are not necessary to include in the virtual machine backup copies. This helps in reducing the backup copy size.</p>
<h2 style="text-align: justify;">10. Compression</h2>
<p style="text-align: justify;">A dedicated Hyper-V backup product offers compressing backup data before it is written to the backup drive. You can enable/disable compression for all or selected virtual machines using the third-party backup product’s console.</p>
<h2 style="text-align: justify;">11. Encryption</h2>
<p style="text-align: justify;">Security is the major concern for IT organizations nowadays. Third-party Hyper-V Backup products use encryption technology to encrypt backup copies stored on a backup drive. These backup copies can only be read by the same Hyper-V backup product.</p>
<h2 style="text-align: justify;">12. Backup &amp; Offsite Location</h2>
<p style="text-align: justify;">As part of the IT processes, every organization ensures that the backup copies are kept at an off-site location and these backup copies can be retrieved easily when the disaster takes place at the production site. Native tools do not support taking backup to an off-site location. Third-party backup products can provide off-site backup feature in which backup copiescan be saved to an off-site location without requiring much network bandwidth.</p>
<h2 style="text-align: justify;">13. Incremental Backup Copies</h2>
<p style="text-align: justify;">A dedicated Hyper-V backup product ensures that only changed contents are backed up rather than taking a full backup copy every time the backup job runs.</p>
<h2 style="text-align: justify;">14. More Backup Options</h2>
<p style="text-align: justify;">Third-party backup products provide more backup options like taking daily backups or monthly backups which can be scheduled at a pre-defined interval using the centralized management console.</p>
<h2 style="text-align: justify;">15. Backup To External Sources</h2>
<p style="text-align: justify;">Third-party Hyper-V backup products support backing up virtual machines to external sources including USB external devices, eSata External drives, USB flash drives, Fileserver network shares, NAS devices, and RDX cartriges.</p>
<h2 style="text-align: justify;">16. Backup Retention Policies</h2>
<p style="text-align: justify;">Old backup copies can be deleted if they are not required. You can configure the backup retention policy for each virtual machine. A dedicated Hyper-V Backup product can take automatic actions to delete the older backup copies as per the retention policy you configure.</p>
<h2 style="text-align: justify;">17. Ability To Restore Individual Files Or Folders</h2>
<p style="text-align: justify;">Without using a dedicated Hyper-V backup product, it would be difficult for IT administrators to restore individual files/folders from a virtual machine backup copy. Some backup products provide a feature called “Exchange Level Item Restore” which can be used to restore selected emails or mailboxes from a backup copy of a virtual machine.</p>
<h2 style="text-align: justify;">18. Application Vendor Recommendation For Backup Products</h2>
<p style="text-align: justify;">Many of the application vendors require that an enterprise backup system is installed in the production environment to backup data of their applications running in the virtual machines. Since most of the vendors impose this requirement, or recommend to back up application data using a dedicated Hyper-V backup product, native backup tools fail to do so.</p>
<h2 style="text-align: justify;">19. Error &amp; Reporting</h2>
<p style="text-align: justify;">Error and Reporting are the main features a third-party backup product provides. It lets you take necessary actions if a failure takes place with a backup or restore operation. Using reporting feature of a backup product, you can know how many virtual machines have been backed up successfully and how many virtual machines have failed.</p>
<h1 style="text-align: justify;">20. Support</h1>
<p style="text-align: justify;">In case if you’re not able to restore virtual machine from a backup copy or hit with an error during the restore or backup operation, you can always contact product support to get you out from this situation. Many third-party backup products provide 24/7 support for their products.</p>
<p class="box-info" style="text-align: justify;">FREE Hyper-V &amp; VMware Backup:&nbsp; Easy to use - Powerful features - Just works, no hassle:&nbsp;&nbsp; It's FREE for Firewall.cx readers!&nbsp; <a href="https://clixtrac.com/goto/?172170" target="_blank" rel="nofollow noopener" title="Free Hyper-V Backup">Download Now!</a></p>
<h4 style="text-align: justify;">Altaro Hyper-V Backup</h4>
<p style="text-align: justify;"><a href="https://clixtrac.com/goto/?172170" target="_blank" rel="nofollow noopener" title="Hyper-V Backup">Altaro Hyper-V Backup</a> offers a simple, easy-to-use solution for backing up Hyper-V VMs. It includes features such as offsite backup, remote management, Exchange item-level Restore, Compression, Encryption, and much more at an affordable cost.</p>]]></description>
			<category>Windows Servers</category>
			<pubDate>Tue, 22 Apr 2014 01:56:39 +1000</pubDate>
		</item>
		<item>
			<title>How to Install Windows Server 2012 from USB Flash – ISO Image</title>
			<link>https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-2012-installation-from-usb-flash.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-2012-installation-from-usb-flash.html</guid>
			<description><![CDATA[<p style="margin-left: 0cm; line-height: 150%; text-align: justify;"><span style="color: black;">Most would remember the days we had to have a CDROM or DVDROM in order to proceed with the installation of an operating system. Today, it is very common installing an operating system direct from an ISO image. When dealing with virtualized systems, it becomes pretty much a necessity. </span></p>
<p style="margin-left: 0cm; line-height: 150%; text-align: justify;"><span style="color: black;">This article will show how to install Windows Server 2012 (the same process can be used for almost all other operating systems) from a USB Flash.</span></p>
<p style="margin-left: 0cm; line-height: 150%; text-align: justify;"><span style="color: black;">The only prerequisite for this process to work is that you have a USB Flash big enough to fit the ISO image and the server (or virtualization platform) supports booting from a USB Flash. If these two requirements are met, then it’s a pretty straight-forward process.</span></p>
<p class="box-info" style="line-height: 150%; text-align: justify;">&nbsp;FREE Hyper-V &amp; VMware Virtualization Backup:&nbsp; FREE for Firewall.cx readers for a Limited Time!&nbsp; <a href="https://clixtrac.com/goto/?178322" target="_blank" rel="nofollow noopener" title="Free Hyper-V Backup">Download Now!</a></p>
<h2 style="line-height: 150%; text-align: justify;"><span style="color: black;">The Windows 7 USB-DVD Tool</span></h2>
<p style="line-height: 150%; text-align: justify;"><span style="color: black;">The <a href="https://www.firewall.cx/downloads/administrator-utilities.html" target="_blank" title="Windows 7 USB/DVD Tool">Windows 7 USB/DVD Tool</a> is a freely distributed application available in our <a href="https://www.firewall.cx/downloads/administrator-utilities.html" target="_blank" title="Administrator Utilities download section">Administrator Utilities download section</a>. The application is required to transfer/copy the ISO Image of the operating system we want to install, to our USB Flash. The application is also able to burn the ISO image directly on a DVD – a very hand feature.</span></p>
<p style="line-height: 150%; text-align: justify;"><span style="color: black;">Download a copy, install and run it on the computer where the ISO image is available.</span></p>
<p style="line-height: 150%; text-align: justify;"><span style="color: black;">When the tool runs, browse to the path where the ISO image is located. <span style="color: black;">Once selected, click on <strong>Next</strong></span>:</span></p>
<p style="line-height: 150%;"><span style="color: black;"><img src="https://www.firewall.cx/images/stories/windows-2012-installation-usb-flash-1.png" alt="Installing Windows 2012 via USB Flash" style="display: block; margin-left: auto; margin-right: auto;" title="Installing Windows 2012 via USB Flash" /></span></p>
<p style="line-height: 150%; text-align: justify;"><span style="color: black;">At this point, we can choose to copy the image to our USB device (USB Flash) or directly on to a DVD. We select the <strong>USB Device</strong> option:</span></p>
<p style="line-height: 150%;"><span style="color: black;"><img src="https://www.firewall.cx/images/stories/windows-2012-installation-usb-flash-2.png" alt="windows-2012-installation-usb-flash-2" style="display: block; margin-left: auto; margin-right: auto;" title="Installing Windows 2012 via USB Flash - Selecting Media Type" /></span></p>
<p style="line-height: 150%; text-align: justify;"><span style="color: black;">In the next screen, we are required to select the correct USB device. If there are more than one USB storage devices connected, extra care must be taken to ensure the correct USB Flash is selected. In case no USB Flash has been connected, insert it now into your USB port and click on the <strong>refresh</strong> button for it to appear:</span></p>
<p style="line-height: 150%;"><span style="color: black;"><img src="https://www.firewall.cx/images/stories/windows-2012-installation-usb-flash-3.png" alt="windows-2012-installation-usb-flash-3" style="display: block; margin-left: auto; margin-right: auto;" title="Installing Windows 2012 via USB Flash - Insert USB Device" /></span></p>
<p style="line-height: 150%; text-align: justify;"><span style="color: black;">After selecting the appropriate USB device, click on <strong>Begin Copying</strong> to start the transfer of files to the USB Flash:</span></p>
<p style="line-height: 150%;"><span style="color: black;"><img src="https://www.firewall.cx/images/stories/windows-2012-installation-usb-flash-4.png" alt="windows-2012-installation-usb-flash-4" style="display: block; margin-left: auto; margin-right: auto;" title="Installing Windows 2012 via USB Flash - Copying Files and creating Bootable USB Device" /></span></p>
<p style="line-height: 150%; text-align: justify;"><span style="color: black;">Once the copy process is complete, we are ready to remove our USB Flash and connect it to our server:</span></p>
<p style="line-height: 150%;"><span style="color: black;"><img src="https://www.firewall.cx/images/stories/windows-2012-installation-usb-flash-6.png" alt="windows-2012-installation-usb-flash-6" style="display: block; margin-left: auto; margin-right: auto;" title="Installing Windows 2012 via USB Flash - USB Bootable device Ready" /></span></p>
<p class="box-info" style="line-height: 150%; text-align: justify;">&nbsp;<a href="http://clixtrac.com/goto/?178322" target="_blank" rel="nofollow noopener" title="Free Hyper-V Backup">FREE Hyper-V &amp; VMware Virtualization Backup</a>:&nbsp; FREE for Firewall.cx readers for a Limited Time!&nbsp; <a href="https://clixtrac.com/goto/?178322" target="_blank" rel="nofollow noopener" title="Free Hyper-V Backup">Download Now!</a></p>
<p style="line-height: 150%; text-align: justify;"><span style="color: black;">This completes our article on <strong>how to install Windows Server 2012 from USB Flash device</strong>. We recommend users visit our&nbsp;</span><span style="color: black;"><a href="https://www.firewall.cx/operating-systems/microsoft/windows-servers.html" title="Windows 2012 Server Section">Windows 2012 </a> </span><span style="color: black;">section and browse our growing database of high-quality <strong>Windows 2012</strong> and <strong>Hyper-V Virtualization</strong> articles.</span></p>]]></description>
			<category>Windows Servers</category>
			<pubDate>Mon, 10 Mar 2014 00:21:28 +1100</pubDate>
		</item>
		<item>
			<title>Creating a Virtual Machine in Windows Hyper-V. Configuring Virtual Disk, Virtual Switch, Integration Services and other Components</title>
			<link>https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-hyper-v-creating-vm.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-hyper-v-creating-vm.html</guid>
			<description><![CDATA[<p style="text-align: justify;"><span style="color: #000000;">Our previous articles covered</span><span style="color: black;"> <a href="https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-virtualization-hyper-v-concepts.html" target="_blank" title="basic concepts of Virtualization">basic concepts of Virtualization</a> along with the </span><a href="https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-2012-hyper-v-installation-configuration.html" target="_blank" title="installation and monitoring of Windows 2012 Hyper-V">installation and monitoring of Windows 2012 Hyper-V</a><span style="color: black;">. This article takes the next step, which is the installation of a guest host (<a href="https://www.firewall.cx/operating-systems/microsoft/windows-workstations.html" target="_blank" title="Windows 8 &amp; 8,1 Technical Articles">Windows 8.1</a>) on our <a href="https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-2012-hyper-v-installation-configuration.html" target="_blank" title="Windows Hyper-V Installation">Windows 2012 Hyper-V</a> enabled server. The aim of this article is to show how easily a guest operating system can be installed and configured, while explaining the installation and setup process. Additional <strong>Windows 2012 Server</strong> and <strong>Hyper-V</strong> technical articles can be found in our&nbsp;<span style="color: black;"><a href="https://www.firewall.cx/operating-systems/microsoft/windows-servers.html" target="_blank" title="Windows 2012 Server Technical articles">Windows 2012 Server</a></span> section.<br /></span></p>
<p class="box-info" style="text-align: justify; line-height: 150%;">FREE Hyper-V &amp; VMware Backup: Easy to use - Powerful features - Just works, no hassle: It's FREE for Firewall.cx readers! <a href="https://clixtrac.com/goto/?178324" target="_blank" rel="nofollow noopener" title="Free Hyper-V Backup">Download Now!</a></p>
<h2 style="text-align: justify; line-height: 150%;">Steps To Create A Virtual Machine In Hyper-V</h2>
<p style="text-align: justify; line-height: 150%;">T<span style="color: black;">o begin the creation of our first virtual machine, open the <strong>Hyper-V manager</strong> in <strong>Windows Server 2012</strong>. On the <strong>Actions</strong> pane located on the right side of the window, click <strong>New</strong> and select V<strong>irtual Machine:</strong> </span></p>
<p><img src="https://www.firewall.cx/images/stories/windows-hyper-v-host-1.png" alt="windows-hyper-v-host-1" style="display: block; margin-left: auto; margin-right: auto;" title="Windows Hyper-V Manager" /></p>
<p style="text-align: justify; line-height: 150%;">&nbsp;</p>
<p style="text-align: justify; line-height: 150%;"><span style="color: black;">Read the <strong>Before you begin page</strong> which contains imporant information and then click <strong>Next:</strong> </span></p>
<p><img src="https://www.firewall.cx/images/stories/windows-hyper-v-host-2.png" alt="Windows Hyper-V Creating new VM" style="display: block; margin-left: auto; margin-right: auto;" /></p>
<p style="text-align: justify; line-height: 150%;"><span style="color: black;">Type name of the virtual machine and configure the location to store virtual hard disk of this virtual machine. On server systems with shared storage devices, the virtual hard disk is best stored on the shared storage for performance and redundancy reasons, otherwise select a local hard disk drive. For the purpose of this lab, we will be using the server’s local <strong>C Drive</strong>:</span></p>
<p><img src="https://www.firewall.cx/images/stories/windows-hyper-v-host-3.png" alt="" style="display: block; margin-left: auto; margin-right: auto;" data-alt="Windows Hyper-V Specify VM Name" /></p>
<p style="text-align: justify; line-height: 150%;"><span style="color: black;">Choose the generation of virtual machine and click <strong>Next</strong>. <strong>Generation 2</strong> is new with Server 2012 <strong>R2</strong>. If the guest operating system will be running Windows Server 2012 or 64bit Windows 8, 8.1, select <strong>Generation 2</strong>, otherwise select Generation 1: </span></p>
<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/windows-hyper-v-host-4.png" alt="Hyper-V Installing VM &amp; Selecting VM Generation" style="display: block; margin-left: auto; margin-right: auto;" /></p>
<p style="text-align: justify; line-height: 150%;"><span style="color: black;">Next step involves assigning the amount of necessary memory. Under <strong>Assign Memory</strong> configure the memory and click <strong>Next</strong>. For the purpose of this lab, we will give our Windows 8.1 guest operating system 1 GB memory: </span></p>
<p><img src="https://www.firewall.cx/images/stories/windows-hyper-v-host-5.png" alt="Hyper-V Assigning Memory to VM" style="display: block; margin-left: auto; margin-right: auto;" /></p>
<p style="text-align: justify; line-height: 150%;"><span style="color: black;">Under <strong>configure networking</strong> tab, leave the default setting and click <strong>Next</strong>. You can create virtual switches later and re-configure the virtual machine settings as required: </span></p>
<p style="text-align: justify; line-height: 150%;"><img src="https://www.firewall.cx/images/stories/windows-hyper-v-host-6.png" alt="Hyper-V Installing VM - Configuring VM Switch" style="display: block; margin-left: auto; margin-right: auto;" /></p>
<p style="text-align: justify; line-height: 150%;"><span style="color: black;">Next, choose to create a virtual hard disk and specify the size. We allocated a 60 GB disk size for our Windows 8.1 installation. When ready, click <strong>Next</strong>: </span></p>
<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/windows-hyper-v-host-7.png" alt="Hyper-V Configuring Virtual Hard Disk" style="display: block; margin-left: auto; margin-right: auto;" /></p>
<p style="text-align: justify; line-height: 150%;"><span style="color: black;">One of the great benefits with virtual machines is that we can proceed with the installation of the new operating system using and ISO image, rather than a CD/DVD. </span></p>
<p style="text-align: justify; line-height: 150%;"><span style="color: black;">Browse to the selected ISO image and click the <strong>Next</strong> button. The virtual machine will try to boot from the selected ISO disk when it starts, so it is important to ensure the ISO image is bootable:</span></p>
<p style="text-align: justify; line-height: 150%;"><span style="color: black;"><img src="https://www.firewall.cx/images/stories/windows-hyper-v-host-8.png" alt="Hyper-V Installing VM from ISO Image" style="display: block; margin-left: auto; margin-right: auto;" /></span></p>
<p style="text-align: justify; line-height: 150%;"><span style="color: black;">The last step allows us to review the virtual machine’s configuration summary. When ready click the <strong>Finish</strong> button: </span></p>
<p><span style="color: black;"><img src="https://www.firewall.cx/images/stories/windows-hyper-v-host-9.png" alt="Hyper-V VM Summary Installation" style="display: block; margin-left: auto; margin-right: auto;" /></span></p>
<h2><span style="color: black;"><span style="font-size: 11pt; line-height: 107%; font-family: 'Calibri','sans-serif';"></span></span>Install Windows 8.1 Guest Operating System In Hyper-V Virtual Machine</h2>
<p style="text-align: justify; line-height: 150%;"><span style="color: black;">With the configuration of our virtual machine complete, it’s time to power on our virtual machine and install the operating system. Open <strong>Hyper-V Manager</strong>, and under the Virtual Machines section <strong>double-click</strong> the virtual machine created earlier. Click on the <strong>start</strong> button from the <strong>Action Menu</strong> to power on the virtual machine: </span></p>
<p style="text-align: justify;"><span style="color: black;"><img src="https://www.firewall.cx/images/stories/windows-hyper-v-host-10.png" alt="Hyper-V Starting a VM Machine" style="display: block; margin-left: auto; margin-right: auto; border: 1px solid #000000;" /></span></p>
<p style="text-align: justify; line-height: 150%;"><span style="color: black;">After the virtual machine completes its startup process, press any key to boot from the Windows 8.1 disk (ISO media) we configured previously. The Windows 8 installation screen will appear in a couple of seconds. Click <strong>Next</strong> followed by the <strong>Install Now</strong> button to begin the installation of Windows operating system on the virtual machine:</span></p>
<p style="text-align: justify; line-height: 150%;"><span style="color: black;"><img src="https://www.firewall.cx/images/stories/windows-hyper-v-host-11.png" alt="Hyper-V Begin Windows 8 VM installation" style="display: block; margin-left: auto; margin-right: auto;" /></span></p>
<p style="text-align: justify;">After accepting the <strong>End User License Agreement</strong> (<strong>EULA</strong>) we can continue our post-installation setup by configuring the hard disk. Windows will then begin its installation and update the screen as it progresses. <span style="text-align: justify;">Finally, once the installation is complete, we are presented with the <strong>Personalization screen</strong> and finally, the <strong>Start Screen</strong>:</span></p>
<p style="text-align: justify;"><span style="color: black;"><img src="https://www.firewall.cx/images/stories/windows-hyper-v-host-12.png" alt="Hyper-V VM Windows8 Start Screen" style="display: block; margin-left: auto; margin-right: auto;" /></span></p>
<p style="text-align: justify; line-height: 150%;"><span style="color: black;">After the operating system installation and configuration is complete, it is important to proceed with the installation of <strong>Integration Services</strong>. </span></p>
<p style="text-align: justify; line-height: 150%;"><strong><span style="color: black;">Integration Services</span></strong><span style="color: black;"> on Hyper-V is what <strong>VM Tools</strong> is for VMware. <strong>Integration Services</strong> will help significantly enhance the VM’s guest operating system performance, allow file copy from the host machine to the guest machine easily, time synchronization between host and guest machines, improve management of the VM by replacing the generic operating system drivers for the mouse, keyboard, video card, network and SCSI controller components.</span></p>
<p style="text-align: justify; line-height: 150%;"><span style="color: black;">Other services offered by <strong>Integration Services</strong> are:</span></p>
<ul class="check-green">
<li><span style="color: black;">Backup (Volume Snapshot)</span></li>
<li><span style="color: black;">Virtual Machine Connection Enhancements</span></li>
<li><span style="color: black;">Hyper-V Shutdown Service</span></li>
<li><span style="color: black;">Data Exchange</span></li>
</ul>
<p style="text-align: justify; line-height: 150%;">&nbsp;<span style="color: black;">To proceed with the installation of Integration Services, Go to the Virtual Machine’s console, selection <strong>Action</strong>, and click <strong>Insert Integration Services Setup Disk</strong> as shown below:</span></p>
<p style="text-align: justify; line-height: 150%;"><span style="color: black;"><img src="https://www.firewall.cx/images/stories/windows-hyper-v-host-13.png" alt="Hyper-V Host Intergration Services installation" style="display: block; margin-left: auto; margin-right: auto; border: 1px solid #000000;" /></span></p>
<p style="text-align: justify;">In the <strong>Upgrade Hyper-V Integration Services</strong> dialog box, click <strong>OK</strong> and when prompted, click <strong>Yes</strong> to restart the virtual machine.&nbsp; Using the&nbsp;<strong>Hyper-V Manager</strong> console, administrators can keep track of all VM's installed along side with their CPU Usage, Assigned memory and uptime:</p>
<p style="text-align: justify; line-height: 150%;"><span style="color: black;"><img src="https://www.firewall.cx/images/stories/windows-hyper-v-host-14.png" alt="Hyper-V Manager - VM Status" style="display: block; margin-left: auto; margin-right: auto; border: 1px solid #000000;" /></span></p>
<p class="box-info" style="text-align: justify; line-height: 150%;">FREE Hyper-V &amp; VMware Backup: Easy to use - Powerful features - Just works, no hassle: It's FREE for Firewall.cx readers! <a href="https://clixtrac.com/goto/?178324" target="_blank" rel="nofollow noopener" title="Free Hyper-V Backup">Download Now!</a></p>
<p style="text-align: justify; line-height: 150%;"><span>This completes our article covering the <strong>installation of a Virtual Machine within Hyper-V</strong> and setup of <strong>Integration Services</strong>. Additional Windows 2012 Server and Hyper-V technical articles can be found in our <a href="https://www.firewall.cx/operating-systems/microsoft/windows-servers.html" title="Windows 2012 Server Technical articles">Windows 2012 Server</a> section.</span></p>
<p>&nbsp;</p>]]></description>
			<category>Windows Servers</category>
			<pubDate>Thu, 06 Mar 2014 09:00:00 +1100</pubDate>
		</item>
		<item>
			<title>How to Install Windows 2012 Hyper-V via Server Manager &amp; Windows PowerShell. Monitoring Hyper-V Virtual Machines</title>
			<link>https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-2012-hyper-v-installation-configuration.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-2012-hyper-v-installation-configuration.html</guid>
			<description><![CDATA[<p style="text-align: justify;">Our <a href="https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-virtualization-hyper-v-concepts.html" target="_blank" title="Windows Server - Hyper-V Concepts">previous article</a> covered the <a href="https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-virtualization-hyper-v-concepts.html" target="_blank" title="Hyper-V Basic Concepts">basic concepts of Virtualization and Windows Server 2012 Hyper-V</a>.&nbsp; This article takes a closer look at Microsoft’s <strong>Hyper-V Virtualization</strong> platform and continues with the installation of the <strong>Hyper-V</strong> role via the Windows Server Manager interface and Windows PowerShell command prompt.</p>
<p class="box-info" style="text-align: justify;">FREE Hyper-V &amp; VMware Backup: Easy to use - Powerful features - Just works, no hassle: It's FREE for Firewall.cx readers! <a href="https://clixtrac.com/goto/?178325" target="_blank" rel="nofollow noopener" title="Free download Hyper-V Backup">Download Now!</a></p>
<p style="text-align: justify;">Hyper-V is a server role used to create virtualized environment by deploying different types of virtualization technologies such as server virtualization, network virtualization and desktop virtualization. The <strong>Hyper-V</strong> Server role can be installed in <strong>Server 2012 R2 Standard</strong>, <strong>Datacenter </strong>or <strong>Essentials edition</strong>. Hyper-V version 3.0 is the latest version of Hyper V server available in Windows Server 2012 R2 versions. Additional Windows 2012 Server and Hyper-V technical articles can be found in our <a href="https://www.firewall.cx/operating-systems/microsoft/windows-servers.html" target="_blank" title="Windows 2012 Server Technical articles">Windows 2012 Server</a> section.</p>
<p class="box-info">To learn more about the licensing restrictions on each Windows Server 2012 edition, read our article <a href="https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-2012-editions-licensing.html" target="_blank" title="Windows 2012 Server Foundation, Essential, Standard &amp; Datacenter Edition Differences, Licensing &amp; Supported Features.">Windows 2012 Server Foundation, Essential, Standard &amp; Datacenter Edition Differences, Licensing &amp; Supported Features.&nbsp;</a></p>
<h2>Hyper-V Hardware Requirements</h2>
<p style="text-align: justify;">The <strong>Hyper-V server role</strong> requires specific system-hardware requirements to be met. The minimum hardware requirements are listed in the table below:</p>
<div style="text-align: justify;" align="center">
<table border="1" cellspacing="0" cellpadding="0">
<tbody>
<tr style="background-color: #006666;">
<td style="width: 165px;" valign="top">
<p><span style="color: #ffffff;"><strong>Hardware</strong></span></p>
</td>
<td style="width: 521px;" valign="top">
<p><span style="color: #ffffff;"><strong>Minimum Requirements</strong></span></p>
</td>
</tr>
<tr>
<td style="width: 165px;" valign="top">
<p>Processor</p>
</td>
<td style="width: 521px;" valign="top">
<ul>
<li><strong>1.4Ghz 64-bit</strong> with <strong>hardware assisted virtualization</strong>. Available in processors that include a virtualization option—specifically, Intel Virtualization Technology (Intel VT) or AMD Virtualization (AMD-V)</li>
</ul>
<ul>
<li><strong>Hardware-enforced Data Execution Prevention</strong> (<strong>DEP</strong>) must be available and enabled. Specifically, you must enable the Intel XD bit (execute disable bit) or AMD NX bit (no execute bit).</li>
</ul>
</td>
</tr>
<tr>
<td style="width: 165px;" valign="top">
<p>Memory</p>
</td>
<td style="width: 521px;" valign="top">
<p>512 MB</p>
</td>
</tr>
<tr>
<td style="width: 165px;" valign="top">
<p>Network Adapter</p>
</td>
<td style="width: 521px;" valign="top">
<p>At least one Gigabit Ethernet adapter</p>
</td>
</tr>
<tr>
<td style="width: 165px;" valign="top">
<p>Disk Space</p>
</td>
<td style="width: 521px;" valign="top">
<p>32 GB</p>
</td>
</tr>
</tbody>
</table>
</div>
<p style="text-align: justify;">Keep in mind that the above table specifies the minimum requirements. If you wanted to install Hyper-V in a production environment along with a number of virtual machines, you will definitely need more than 512MB memory and 32GB disk space.</p>
<p class="box-info" style="text-align: justify;"><a href="https://www.firewall.cx/operating-systems/microsoft/windows-servers/hyper-v-hypervisor-virtualization-guide-windows-2016.html" target="_blank" title="Windows Server 2016 Hyper-V Requirements">Click here for Windows Server 2016 Hyper-V Requirements</a></p>
<h2>Installing The Hyper-V Server Role In Server 2012 Using Server Manager</h2>
<p style="text-align: justify;">In Windows Server 2012, you can install Hyper-V server role by using the<strong> Server Manager</strong> (GUI) or windows <strong>PowerShell</strong>. In both cases, the installation requires the user to be an <strong>Administrator</strong> or member of <strong>Administrators</strong> or <strong>Hyper-V</strong> administrators group.</p>
<p style="text-align: justify;">At first, open <strong>Server Manager</strong>. Click <strong>Manage</strong> and select the <strong>Add Roles and Features</strong> option:</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/windows-2012-hyper-v-install-config-1.png" alt="windows-2012-hyper-v-install-config-1" width="351" height="227" style="display: block; margin-left: auto; margin-right: auto;" title="Windows 2012 Hyper-V Installation &amp; Configuration - Server Manager" /><em>Add Role and Features</em></p>
<p class="box-info" style="text-align: justify;">FREE Hyper-V &amp; VMware Backup: Easy to use - Powerful features - Just works, no hassle: It's FREE for Firewall.cx readers! <a href="https://clixtrac.com/goto/?178325" target="_blank" rel="nofollow noopener" title="Free download Hyper-V Backup">Download Now!</a></p>
<p style="text-align: justify;">Click <strong>Next</strong> on the <strong>Before you begin</strong> page.</p>
<p style="text-align: justify;">Choose <strong>Role-based or feature-based Installation</strong> option and click <strong>Next</strong> button:</p>
<div><img src="https://www.firewall.cx/images/stories/windows-2012-hyper-v-install-config-2.png" alt="windows-2012-hyper-v-install-config-2" width="650" height="453" style="display: block; margin-left: auto; margin-right: auto;" title="Windows 2012 Hyper-V Installation &amp; Configuration - Add Roles and Features Wizard" /></div>
<div style="text-align: center;"><em>&nbsp;Choose Role-based or feature-based Installation</em></div>
<p style="text-align: justify;">In the next window, click on <strong>Select a server from the server pool</strong> option and select the server where you would like to install the <strong>Hyper-V server role</strong>. Click on <strong>Next</strong> after selecting the server:</p>
<div><img src="https://www.firewall.cx/images/stories/windows-2012-hyper-v-install-config-3.png" alt="windows-2012-hyper-v-install-config-3" width="650" height="456" style="display: block; margin-left: auto; margin-right: auto;" title="Windows 2012 Hyper-V Installation &amp; Configuration - Selecting Destination Server to install Hyper-V" /></div>
<div style="text-align: center;"><em>&nbsp;Select the Destination Server to Install Hyper-V</em></div>
<p style="text-align: justify;">The next screen lists the available roles for installation, check <strong>Hyper-V</strong> and click <strong>Next</strong>:</p>
<div><img src="https://www.firewall.cx/images/stories/windows-2012-hyper-v-install-config-4.png" alt="windows-2012-hyper-v-install-config-4" width="650" height="457" style="display: block; margin-left: auto; margin-right: auto;" title="Windows 2012 Hyper-V Installation &amp; Configuration - Selecting Hyper-V Role" /></div>
<div style="text-align: center;"><em>Selecting the Hyper-V Role for Installation</em></div>
<p style="text-align: justify;">Read the Hyper-V role information and click the <strong>Next</strong> button:</p>
<div style="text-align: center;"><img src="https://www.firewall.cx/images/stories/windows-2012-hyper-v-install-config-5.png" alt="windows-2012-hyper-v-install-config-5" width="650" height="457" title="Windows 2012 Hyper-V Installation &amp; Configuration" /></div>
<div style="text-align: center;"><em>&nbsp;Hyper -V Installation</em></div>
<p style="text-align: justify;">The next step involves the creation of <strong>Virtual Switches</strong>. Choose your server’s physical network adapters that will take part in the virtualization:</p>
<div style="text-align: center;"><img src="https://www.firewall.cx/images/stories/windows-2012-hyper-v-install-config-6.png" alt="windows-2012-hyper-v-install-config-6" width="650" height="461" title="Windows 2012 Hyper-V Installation &amp; Configuration - Creating Virtual Switches" /></div>
<div style="text-align: center;"><em>Creating Your Virtual Switches</em></div>
<p style="text-align: justify;">The selected physical network adapters (in case you have more than one available) will be used and shared by virtual machines to communicate with the physical network. After selecting the appropriate network adaptors, click <strong>Next</strong> to proceed to the <strong>Migration screen</strong>.</p>
<p style="text-align: justify;">Under <strong>Migration</strong>, leave the default settings as is and click <strong>Next</strong>:</p>
<div style="text-align: center;"><img src="https://www.firewall.cx/images/stories/windows-2012-hyper-v-install-config-7.png" alt="windows-2012-hyper-v-install-config-7" width="650" height="461" title="Windows 2012 Hyper-V Installation &amp; Configuration - Live Migration" /></div>
<div style="text-align: center;"><em>Leave Default Migration Settings</em></div>
<p style="text-align: justify;">These settings can also be modified later on. <strong>Live Migration</strong> is similar to <strong>VMware’s vMotion</strong>, allowing the real-time migration of virtual machines to another physical host (server).</p>
<p style="text-align: justify;">Under <strong>Default Stores</strong>, you can configure the location of hard disk files and configuration files of all virtual machines. This is a location where all the virtual machine data will reside. You can also configure a SMB shared folder (Windows network folder), local drive or even a shared storage device.</p>
<p style="text-align: justify;">We will leave the settings to their default location and click the <strong>Next</strong> button.</p>
<div style="text-align: center;"><img src="https://www.firewall.cx/images/stories/windows-2012-hyper-v-install-config-8.png" alt="windows-2012-hyper-v-install-config-8" width="650" height="461" title="Windows 2012 Hyper-V Installation &amp; Configuration - Selecting Storage Store" /></div>
<div style="text-align: center;"><em>Selecting a Location to Store the Virtual Machines</em></div>
<p style="text-align: justify;">The final screen allows us to review our configuration and proceed with the installation by clicking on the <strong>Install</strong> button:</p>
<div style="text-align: center;"><img src="https://www.firewall.cx/images/stories/windows-2012-hyper-v-install-config-9.png" alt="windows-2012-hyper-v-install-config-9" width="650" height="461" title="Windows 2012 Hyper-V Installation Confirmation" /></div>
<div style="text-align: center;"><em>Hyper-V Installation Confirmation</em></div>
<p style="text-align: justify;">&nbsp;Windows will now immediately begin the installation of the <strong>Hyper-V role </strong>and continuously update the installation window as shown below.</p>
<div style="text-align: center;"><img src="https://www.firewall.cx/images/stories/windows-2012-hyper-v-install-config-10.png" alt="windows-2012-hyper-v-install-config-10" width="650" height="457" title="Windows 2012 Hyper-V Installation Progress" /></div>
<div style="text-align: center;"><em>Hyper-V Installation Progress</em></div>
<p style="text-align: justify;">Once the installation of <strong>Hyper-V</strong> is complete, the Windows server will restart.</p>
<h2>Installing Hyper-V Role Using Windows PowerShell</h2>
<p style="text-align: justify;">The second way to install the <strong>Hyper-V</strong> role is via Windows <strong>PowerShell</strong>. Surprisingly enough, the installation is initiated with a single command.</p>
<p style="text-align: justify;">Type the following <strong>cmdlet</strong> in <strong>PowerShell</strong> to install the <strong>Hyper-V</strong> server role your Windows Server 2012:</p>
<p class="box-download">C:\Users\Administrator&gt; <strong>Install-WindowsFeature&nbsp; –Name Hyper-V&nbsp; –IncludeManagementTools&nbsp; –Restart</strong></p>
<div style="text-align: center;"><em><img src="https://www.firewall.cx/images/stories/windows-2012-hyper-v-install-config-11-large.png" alt="windows-2012-hyper-v-install-config-11-large" width="705" height="106" title="Windows 2012 Hyper-V Installation via PowerShell" />&nbsp;</em></div>
<div style="text-align: center;"><em>Hyper-V Installation with PowerShell<strong>&nbsp;&nbsp;&nbsp; </strong></em></div>
<p style="text-align: justify;">To install <strong>Hyper-V</strong> server role on remote computer, include the <strong>-ComputerName</strong> switch.&nbsp; In our example, the remote computer was named <strong>Voyager</strong>:</p>
<p class="box-download">C:\Users\Administrator&gt; <strong>Install-WindowsFeature –Name Hyper-V –ComputerName Voyager –IncludeManagementTools –Restart</strong></p>
<p style="text-align: justify;">Once the installation is complete, the server will restart. Once the server has booted, you can open <strong>Hyper-V Server Manager</strong> and begin creating the virtual machines:</p>
<div style="text-align: center;"><em><img src="https://www.firewall.cx/images/stories/windows-2012-hyper-v-install-config-12.png" alt="windows-2012-hyper-v-install-config-12" width="650" height="371" title="Windows 2012 Hyper-V Manager" /></em></div>
<div style="text-align: center;" align="center"><em>Hyper-V Manager</em> </div>
<h2>Monitoring Of Hyper-V Virtual Machines</h2>
<p style="text-align: justify;">When working in a virtualization environment, it is extremely important to keep an eye on virtualization service and ensure everything is running smoothly.</p>
<p style="text-align: justify;">Thankfully, Microsoft provides an easy way to monitor Hyper-V elements and take action before things get to a critical stage.</p>
<p style="text-align: justify;">The <strong>Hyper-V Manager</strong> console allows you to monitor processor, memory, networking, storage and overall health of the Hyper-V server and its virtual machines, while other Hyper-V monitoring metrics are accessible through <strong>Task Manager</strong>, <strong>Resource Monitor</strong>, <strong>Performance Monitor</strong> and <strong>Event Viewer</strong> to monitor different parameters of Hyper-V server.</p>
<p style="text-align: justify;">The screenshot below shows the <strong>Hyper-V Manager</strong> with one virtual machine installed.&nbsp; At a first glance, we can view the <strong>VM’s state</strong>, <strong>CPU Usage</strong>, <strong>Assigned Memory</strong> and <strong>Uptime</strong>:</p>
<div style="text-align: center;"><em><img src="https://www.firewall.cx/images/stories/windows-2012-hyper-v-install-config-13-large.png" alt="windows-2012-hyper-v-install-config-13-large" width="767" height="220" title="Windows 2012 Hyper-V - Viewing Virtual Machine Status" /></em></div>
<div style="text-align: center;"><em>View Virtual Machine Status</em></div>
<p style="text-align: justify;">Under Window’s <strong>Event Viewer</strong> we’ll find a number of advanced logs that provide a deeper view of the various <strong>Hyper-V</strong> components, as shown below:</p>
<div style="text-align: center;"><a href="https://www.firewall.cx/images/stories/windows-2012-hyper-v-install-config-14-large.png" class="jcepopup" title="Windows 2012 Hyper-V Installation &amp; Configuration - Hyper-V Events"><img src="https://www.firewall.cx/images/stories/windows-2012-hyper-v-install-config-14.png" alt="windows-2012-hyper-v-install-config-14" width="650" height="377" style="display: block; margin-left: auto; margin-right: auto;" title="Windows 2012 Hyper-V Events" /></a></div>
<div style="text-align: center;"><em>Hyper-V Events (click to enlarge)<br /></em></div>
<p style="text-align: justify;">Addition information on <strong>Hyper-V</strong> can be obtained through the usage of Window’s <strong>Performance Monitor</strong>, which provides a number of <strong>Hyper-V</strong> useful counters as shown below:</p>
<div style="text-align: center;"><img src="https://www.firewall.cx/images/stories/windows-2012-hyper-v-install-config-15.png" alt="windows-2012-hyper-v-install-config-15" width="650" height="377" title="Windows 2012 Hyper-V Performance Monitor" /></div>
<div style="text-align: center;"><em>Hyper-V Performance Monitor</em></div>
<p style="text-align: justify;">Most experienced virtualization administrators will agree that managing and monitoring a virtualization environment can be a full-time job. It is very important to ensure your virtualization strategy is well planned and VMs are hosted on servers with plenty of resources such as Physical CPUs, RAM and Disk storage space, to ensure they are not starved of these resources during periods of high-utilization.</p>
<p class="box-info" style="text-align: justify;">FREE Hyper-V &amp; VMware Backup: Easy to use - Powerful features - Just works, no hassle: It's FREE for Firewall.cx readers! <a href="https://clixtrac.com/goto/?178325" target="_blank" rel="nofollow noopener" title="Free download Hyper-V Backup">Download Now!</a></p>
<p style="text-align: justify;">Keeping an eye on <strong>Hyper-V’s Manager</strong>, <strong>Performance Monitor</strong> counters and <strong>Event Viewer</strong> will help make sure no critical errors or problems go without notice.</p>]]></description>
			<category>Windows Servers</category>
			<pubDate>Tue, 07 Jan 2014 08:00:00 +1100</pubDate>
		</item>
		<item>
			<title>Introduction To Windows Server 2012 R2 Virtualization - Understanding Hyper-V Concepts, Virtual Deployment Infrastructure  (VDI) and more</title>
			<link>https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-virtualization-hyper-v-concepts.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-virtualization-hyper-v-concepts.html</guid>
			<description><![CDATA[<div class="box-info">FREE Hyper-V &amp; VMware Backup:&nbsp; FREE for Firewall.cx readers for a Limited Time!&nbsp; <a href="https://clixtrac.com/goto/?172513" target="_blank" rel="nofollow noopener" title="Free Hyper-V Backup">Download Now!</a><strong><br /></strong></div>
<p style="text-align: justify;"><strong>Virtualization</strong> is an abstraction layer that creates separate distinct virtual environments allowing the operation of different operating systems, desktops and applications under the same or combined pool of resources. &nbsp;&nbsp;In the past couple of years, virtualization has gained an incredible rate of adoption as companies consolidate their existing server and network infrastructure, in hope to create a more efficient infrastructure that can keep up with their growing needs while at the same time keep the running and administration costs as low as possible. &nbsp;&nbsp;</p>
<p style="text-align: justify;">Our readers can visit our dedicated <a href="https://www.firewall.cx/operating-systems/microsoft/windows-servers.html" target="_blank" title="Windows Server 2012 Server section">Windows Server 2012 Server section</a> to read more on <a href="https://www.firewall.cx/operating-systems/microsoft/windows-servers.html" target="_blank" title="Windows Hyper-V virtualization">Windows Hyper-V Virtualization</a> and <a href="https://www.firewall.cx/operating-systems/microsoft/windows-servers.html" target="_blank" title="Windows Server 2012 Server section">Windows Server 2012</a> technical articles.</p>
<p style="text-align: justify;">When we hear the word ‘<strong>Virtualization’</strong>, most think about ‘server virtualization’ – which of course is the most widely applied scenario, however today the term <strong>virtualization</strong> also applies to a number of concepts including:</p>
<ul class="checkbox">
<li><strong>Server virtualization</strong>: - <strong>Server virtualization</strong> allows multiple operating systems to be installed on top of single physical server.</li>
<li><strong>Desktop virtualization</strong>: - <strong>Desktop virtualization</strong> allows deployment of multiple instances of virtual desktops to users through the LAN network or Internet. Users can access virtual desktops by using thin clients, laptops, or tablets.</li>
<li><strong>Network virtualization</strong>: - <strong>Network virtualization</strong> also known as <strong>Software Defined Networking</strong> (<strong>SDN</strong>) is a software version of network technologies like switches, routers, and firewalls. The <strong>SDN</strong> makes intelligent decisions while the physical networking device forwards traffic.</li>
<li><strong>Application virtualization</strong>: - <strong>Application virtualization</strong> allows an application to be streamed to many desktop users. Hosted <strong>application virtualization</strong> allows the users to access applications from their local computers that are physically running on a server somewhere else on the network.</li>
</ul>
<p style="text-align: justify;">This article will be focusing on the <strong>Server virtualization platform</strong>, which is currently the most active segment of the virtualization industry. &nbsp;As noted previously, with server virtualization a physical machine is divided into many virtual servers – each virtual server having its own operating system. &nbsp;The core element of server virtualization is the <strong>Hypervisor </strong>– a thin layer of software that sits between the hardware layer and the multiple operating systems (virtual servers) that run on the physical machine.</p>
<p style="text-align: justify;">The <strong>Hypervisor </strong>provides the virtual CPUs, memory and other components and intercepts virtual servers requests to the hardware. Currently, there are two types of Hypervisors:</p>
<p style="text-align: justify;"><strong>Type 1 Hypervisor</strong> – This is the type of hypervisor used for bare-metal servers. These hypervisors run directly on the physical server’s hardware and the operating systems run on top of it. Examples of <strong>Type-1 Hypervisors</strong> are Microsoft’s Hyper-V, VMware ESX, Citrix XenServer.</p>
<p style="text-align: justify;"><strong>Type 2 Hypervisor</strong> – This is the type of hypervisor that runs on top of existing operating systems. Examples of <strong>Type-2 Hypervisors</strong> are VMware Workstation, SWSoft’s Parallels Desktop and others.</p>
<div class="box-info">FREE Hyper-V &amp; VMware Backup:&nbsp; FREE for Firewall.cx readers for a Limited Time!&nbsp; <a href="https://clixtrac.com/goto/?172513" target="_blank" rel="nofollow noopener" title="Free Hyper-V Backup">Download Now!</a><strong><br /></strong></div>
<h2>Microsoft Server Virtualization – Hyper-V Basics</h2>
<p style="text-align: justify;">Microsoft introduced its server virtualization platform <strong>Hyper-V</strong> with the release of Windows Server 2008. <strong>Hyper-V</strong> is a server role that can be installed from Server Manager or PowerShell in Windows Server 2012.</p>
<p style="text-align: justify;">With the release of <strong>Windows Server 2012</strong> and <strong>Windows Server 2012 R2</strong>, Microsoft has made lot of improvements in their Hyper-V virtualization platform. Features like live migration, dynamic memory, network virtualization, remoteFX, Hyper-V Replica, etc. have been added to new <strong>Hyper-V 3.0</strong> in Server 2012.</p>
<p style="text-align: justify;">Hyper-V is a <strong>type 1 hypervisor</strong> that operates right above the hardware layer. The Windows Server 2012 operating system remains above the hypervisor layer, despite the fact the Hyper-V role is installed from within the Windows Server operating system. The physical server where Hypervisor or Hyper-V server role is installed is called the <strong>host machine</strong> or <strong>virtualization server</strong>. Similarly, the virtual machines installed on Hyper-V are called <strong>guest machines</strong>.</p>
<h2>Understanding Traditional vs Modern Server Deployment Models</h2>
<p style="text-align: justify;">Let’s take a look at the traditional way of server configuration. The figure below shows the typical traditional server deployment scenario where one server per application model is applied. In this deployment model, each application has its own dedicated physical server.</p>
<p style="text-align: center;" align="center"><strong><img src="https://www.firewall.cx/images/stories/windows-2012-hyper-v-concepts-vdi-1.png" alt="windows-hyper-v-concepts-vdi-1" width="633" height="323" style="display: block; margin-left: auto; margin-right: auto;" title="Windows 2012 Hyper-V Concepts - Traditional Server Deployment" /></strong><em>Traditional Server Deployment</em></p>
<p style="text-align: justify;">This traditional model of server deployment has many disadvantages such as increased setup costs, management &amp; backup overhead, increased physical space and power requirements, plus many more. Resource utilization of this type of server consolidation is usually below 10%. &nbsp;Practically, this means that we have 5 underutilized servers.</p>
<p style="text-align: justify;"><strong>Virtualization </strong>comes to dramatically change the above scenario.</p>
<p style="text-align: justify;">Using Microsoft’s <strong>Windows Server 2012</strong> along with the <strong>Hyper-V role</strong> installed, our traditional server deployment model is transformed into a single physical server with a generous amount of resources (CPU, Memory, Storage space, etc) ready to undertake the load of all virtual servers.</p>
<p style="text-align: justify;">The figure below shows how the traditional model of server deployment is now virtualized with Microsoft’s Hyper-V server:</p>
<p style="text-align: center;" align="center"><strong><strong><img src="https://www.firewall.cx/images/stories/windows-2012-hyper-v-concepts-vdi-2.png" alt="windows-hyper-v-concepts-vdi-2" width="623" height="238" style="display: block; margin-left: auto; margin-right: auto;" title="Windows 2012 Hyper-V Concepts - Hyper-V Server Consolidation" /></strong></strong><em>Hyper-V Server Consolidation</em></p>
<p style="text-align: justify;">As shown in the figure above, all the five servers are now virtualized into single physical server. It is important to note that even though these virtual machines run on top of the same hardware platform, each virtual server is completely isolated from other virtual machines.</p>
<p style="text-align: justify;">There are many benefits of this type of virtualized server consolidation. A few important benefits are reduced management overhead, faster server deployment, efficient resource utilization, reduced power consumption and so on.</p>
<h2>Network Virtualization With Hyper-V</h2>
<p style="text-align: justify;">With the power of network virtualization you can create multi-tenant environment and assign virtual machines or group of virtual machines to different organizations or different departments. In a traditional network, you would simply create different VLANs on physical switches to isolate them from the rest of the network(s). Likewise, in <strong>Hyper-V</strong>, you can also create VLANs and virtual switches to isolate them from the network in the same way.</p>
<p style="text-align: justify;">Readers can also refer to our <a href="https://www.firewall.cx/networking/vlan-networks.html" target="_blank" title="VLAN section">VLAN section</a> that analyses the concept of <a href="https://www.firewall.cx/networking/vlan-networks.html" target="_blank" title="VLANs and their characteristics">VLANs and their characteristics</a>.</p>
<p style="text-align: justify;">For example, you can configure a group of virtual machines on the 192.168.1.0/24 subnet and other group of virtual machines on 192.168.2.0/24 subnet.</p>
<div style="text-align: center;"><strong><img src="https://www.firewall.cx/images/stories/windows-2012-hyper-v-concepts-vdi-3.png" alt="windows-hyper-v-concepts-vdi-3" width="388" height="502" style="display: block; margin-left: auto; margin-right: auto;" title="Windows 2012 Hyper-V Concepts - Hyper-V Networking &amp; LAG/EtherChannel Trunk Links" /></strong><em>Hyper-V Networking</em></div>
<p style="text-align: justify;">Each virtual machine can have more than one virtual network adapter assigned to it. Like regular physical network adapters, the virtual network adapters can be configured with IP addresses, MAC addresses, NIC teaming and so on. These virtual network adapters are connected to a <strong>virtual switch</strong>. A <strong>Virtual switch </strong>is a software version of physical switch that is capable of forwarding traffic, VLAN traffic, and so on. The virtual switch is created from within the <strong>Hyper-V</strong> <strong>Manager </strong>and is then connected to one or more available physical network adapters of the host machine. The physical network adapters on the host machine are then connected to physical switch on the network.</p>
<p style="text-align: justify;">As shown in figure 1.3, three VLANs are created under same virtual switch. The host is then connected to the physical switch by usually combining the multiple physical network cards into one also called <strong>LAG </strong>(Link Aggregation Group) or <strong>EtherChannel </strong>(Cisco’s implementation of LAG) interface. <strong>LAG </strong>or <strong>EtherChannel </strong>combines the speed of both physical network adapters. &nbsp;If for example we have two 1Gbps physical network cards, with the use of LAG or EtherChannel, these are combine into a single <strong>2Gbps</strong> network card.</p>
<p style="text-align: justify;">&nbsp;Microsoft’s <strong>Hyper-V</strong> supports the creation of three different types of virtual switches:</p>
<ol style="text-align: justify;">
<li><strong>Internal</strong>: - The <strong>internal virtual</strong> <strong>switch</strong> can communicate only between virtual machines.&nbsp; A common example is a cluster based system where virtual servers connect with each other through a dedicated network connection. Internal virtual switches do not connect to the physical network infrastructure (e.g switches).</li>
<li><strong>External</strong>: - The <strong>external virtual switch</strong> can communicate directly with the physical network infrastructure. The virtual switch is used to for the seamless communication between the virtual machines and the physical network.</li>
<li><strong>Private</strong>: - The <strong>private virtual switch</strong> can communicate between virtual machines and the physical host only (physical hardware server).</li>
</ol>
<div class="box-info">FREE Hyper-V &amp; VMware Backup:&nbsp; FREE for Firewall.cx readers for a Limited Time!&nbsp; <a href="https://clixtrac.com/goto/?172513" target="_blank" rel="nofollow noopener" title="Free Hyper-V Backup">Download Now!</a><strong><br /></strong></div>
<h2>Virtual Deployment Infrastructure (VDI) Deployment With Hyper-V</h2>
<p style="text-align: justify;"><strong>VDI</strong> is a new way of delivering desktops to end users. In <strong>VDI</strong>, virtual desktops are hosted centrally as virtual machines and are provided or streamed to users via the network or Internet using <strong>Remote Desktop Protocol</strong> (<strong>RDP</strong>) service. These virtual desktops can be used or accessed by users with different types of devices like, PCs, laptops, tablets, smart phones, thin clients, and so on. <strong>VDI</strong> have created a new hype of <strong>Bring Your Own Device</strong> (<strong>BYOD</strong>) concept. With <strong>BYOD</strong> policy implemented in the organization, users can bring their own devices like laptops, tablets, etc. and the company delivers the required virtual desktop via the network infrastructure.</p>
<p style="text-align: justify;"><strong>VDI</strong> is an upcoming trend that offers many advantages such as:</p>
<ul class="check">
<li>Central management and control</li>
<li>Low cost since there is no need of desktop PCs. Alternate devices such as thin clients usually preferred</li>
<li>Low power consumption. Tablets, thin clients, laptops require low power compared to traditional desktop or tower PCs</li>
<li>Faster desktop deployments</li>
<li>More efficient backup</li>
</ul>
<p style="text-align: justify;"><strong>VDI</strong> is fully supported and can be implemented in Windows Server 2012 by installing <strong>Remote Desktop Services</strong> server role and configuring the virtualization host. You can create virtual machines running Windows XP/7/8 and easily assign the virtual machines to users.</p>
<p style="text-align: justify;">We’ve covered a few of the important virtualization features deployable with <strong>Windows Server 2012</strong> and <a href="https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-2012-hyper-v-installation-configuration.html" target="_blank" title="Hyper-V Installation"><strong>Hyper-V</strong></a>, that allow organizations to consolidate their server, network and desktop infrastructure, into a more efficient model.&nbsp;</p>
<p style="text-align: justify;">Our readers can visit our dedicated <a href="https://www.firewall.cx/operating-systems/microsoft/windows-servers.html" target="_blank" title="Windows Server 2012 Server section">Windows Server 2012 Server section</a> to read more on <a href="https://www.firewall.cx/operating-systems/microsoft/windows-servers.html" target="_blank" title="Windows Hyper-V virtualization">Windows Hyper-V Virtualization</a> and <a href="https://www.firewall.cx/operating-systems/microsoft/windows-servers.html" title="Windows Server 2012 Server section">Windows Server 2012</a> offerings.</p>]]></description>
			<category>Windows Servers</category>
			<pubDate>Mon, 30 Dec 2013 07:00:00 +1100</pubDate>
		</item>
		<item>
			<title>New Features in Windows Server 2012  - Why Upgrade to Windows 2012</title>
			<link>https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-server-2012-features-and-reasons-to-upgrade.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-server-2012-features-and-reasons-to-upgrade.html</guid>
			<description><![CDATA[<p style="text-align: justify;">There is no doubt that<strong> Cloud Computing</strong> is hot topic these days. Innovations in cloud computing models have made every industry and company IT departments to re-think their traditional model of computing. Realizing the benefits and challenges of cloud computing, Microsoft have jumped into the game of Cloud computing by releasing a cloud optimized server operating system called Windows Server 2012.</p>
<p>Windows Server 2012 has dozens of new features and services that makes it cloud ready. Windows Server 2012 <strong>R2</strong> is the latest version of server operating system from Microsoft and successor of Server 2012. For more technical articles on Windows 2012 Server and <a href="https://www.firewall.cx/operating-systems/microsoft/windows-servers.html" target="_blank" title="Windows 2012 Server Technical Articles">Hyper-V Virtualization</a>, visit our<a href="https://www.firewall.cx/operating-systems/microsoft/windows-servers.html" target="_blank" title="Windows 2012 Server Technical Articles">Windows 2012 Server</a> section.<br /><br />Lets take a look at some of the new features <strong>Windows Server 2012</strong> now supports:</p>
<p class="box-info" style="text-align: justify;">FREE Hyper-V &amp; VMware Backup: Easy to use - Powerful features - Just works, no hassle: It's FREE for Firewall.cx readers! <a href="https://clixtrac.com/goto/?178326" target="_blank" rel="nofollow noopener" title="Free Hyper-V Backup">Download Now!</a></p>
<h2>Windows Server Manager</h2>
<p style="text-align: justify;"><strong>Server Manager</strong> is one of the major changes of Windows Server 2012. With a new ‘look and feel’ of the Server Manager user interface, administrators now have the option to group multiple servers on their network and manage them centrally – a useful feature that will save valuable time. With this grouping feature, monitoring events, services, installed roles, performance, on multiple servers from a single window is easy, fast and requires very little effort.</p>
<p style="text-align: center;"><a href="https://www.firewall.cx/images/stories/windows-2012-features-1-large.png"><img src="https://www.firewall.cx/images/stories/windows-2012-features-1.jpg" alt="windows-2012-features-1" width="650" height="327" title="Windows Server 2012 - Server Manager Dashboard" /></a></p>
<p style="text-align: center;">Figure 1. Windows Server 2012 - Server Manager Dashboard (click to enlarge)</p>
<p style="text-align: justify;">Similar to the Server Manager of previous version of windows servers, it can be used to install in Windows Server 2012 to install server roles and features.<strong><br /></strong></p>
<h2>Windows PowerShell 3.0</h2>
<p style="text-align: justify;"><strong>PowerShell 3.0</strong> is another important improvement in Windows Server 2012. PowerShell is a command line and scripting tool designed to stretch greater control of window servers. The graphical user interface (GUI) of Windows Server 2012 is built on top of PowerShell 3.0. When you click buttons in GUI interface, PowerShell cmdlets &amp; scripts are actually running in the background ‘translating’ mouse button commands to executable commands and scripts. <br /><br />PowerShell scripts allow more tasks to be executed faster and within a short period of time, since the absence of the GUI interface means less crashes and problems.</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/windows-2012-features-2.png" alt="windows-2012-features-2" width="468" height="261" style="display: block; margin-left: auto; margin-right: auto;" title="Windows Server 2012 - PowerShell command prompt" />Figure 2. Windows Server 2012 PowerShell</p>
<p style="text-align: justify;">Hundreds of PowerShell cmdlets have been added to Windows Server 2012 and we expect a lot more to be added in the near future, expanding their functionality and providing a new faster and more stable way to administer a Windows Server 2012.</p>
<h2>Hyper-V 3.0</h2>
<div style="text-align: justify;">Similar to&nbsp; <a href="https://www.firewall.cx/operating-systems/virtualization-vm-backup.html" target="_blank" title="VMware’s ESXi hypervisor">VMware’s ESXi hypervisor</a>, <strong>Hyper-V</strong> is Microsoft’s offering of a virtualization platform. This important feature allows to run many instances of virtual machines on single physical Windows Server 2012. Hyper-V features such as live migration, dynamic memory, network virtualization, remoteFX, Hyper-V Replica, etc. have made the Hyper-V platform more competitive against other alternatives. <br /><br />The screenshot below shows the <strong>Hyper-V Manager console</strong>:</div>
<p style="text-align: center;"><a href="https://www.firewall.cx//component/jce/?view=popup&amp;tmpl=component" class="jcepopup" title="Windows Server 2012 - Hyper-V Manager" onclick="window.open(this.href+'&amp;img=images/stories/windows-2012-features-3-large.png&amp;title=Windows_Server_2012_-_Hyper-V_Manager','Windows%20Server%202012%20-%20Hyper-V%20Manager','scrollbars=yes,resizable=yes,location=yes,menubar=yes,status=yes,toolbar=yes,left=0,top=0');return false;"><img src="https://www.firewall.cx/images/stories/windows-2012-features-3.jpg" alt="windows-2012-features-3" width="650" height="370" style="display: block; margin-left: auto; margin-right: auto;" title="Windows Server 2012 - Hyper-V Manager" /></a>Figure 3. Windows Server 2012 - Hyper-V Manager (click to enlarge)</p>
<p style="text-align: justify;">When combined with <strong>Microsoft’s System Center</strong>, Windows Hyper-V becomes much more powerful and a very competitive solution that can even support private or public clouds.</p>
<h2>Hyper-V Replica</h2>
<p style="text-align: justify;">Windows Server 2012 Hyper-V roles introduces a new capability – <strong>Hyper-V Replica</strong> - a feature many administrators will welcome.</p>
<p style="text-align: justify;">This new feature allows the asynchronous replication of selected VMs to a backup replica server.&nbsp; On the local LAN, it means you get a full backup copy of your VMs to another hardware server, while on a WAN scale this can also be extended to backup VMs to a designated replicate site across a WAN infrastructure. Common examples of WAN backup replication are disaster recovery sites. The replication cycle has a minimum setting of 15 minute gaps between every replication. This means the backup VM will be 15 minutes behind its source - the primary VM.&nbsp;</p>
<p style="text-align: justify;">When installed, <strong>Hyper-V Replica</strong> creates a snapshot of whole server, which usually requires a lot of time depending on the amount of data, and from there on, only changes are replicated.&nbsp;</p>
<h2>Server Message Block (SMB) 3.0</h2>
<p style="text-align: justify;"><strong>SMB </strong>is a file sharing protocol used in windows servers. In Windows Server 2012, <strong>SMB </strong>is now up to version 3.0 with new interesting features such as support for deduplication, hot pluggable interfaces, multichannel, encryption, Volume Shadow Copy Service (VSS) for shared files, and many more.</p>
<p style="text-align: justify;">In addition, Hyper-V’s Virtual Hard Disk (VHD) files and virtual machines can also be hosted on shared folders. This allows the effective usage of shared folders, ensuring you make the most out of all available resources.</p>
<h2>Dynamic Access Control (DAC)</h2>
<p style="text-align: justify;"><strong>DAC </strong>is a central management system used to manage security permissions of files and folders.&nbsp; In a nutshell, <strong>DAC </strong>is new and flexible way of setting up permission on files and folders. With <strong>DAC</strong>, an administrator can now classify the data according to user claims, device claims and resource properties. Once data is classified, you can setup the permissions to control user access to the classified data.</p>
<h2>Storage Space</h2>
<p style="text-align: justify;"><strong>Storage Space</strong> is also another new feature of Windows Server 2012. This new feature pools different physical disks together and divides them into different spaces. These spaces are then used like regular disks. In the storage pool control panel (shown below), you can add any type or size of physical disks (e.g SSD, SCSI, SATA etc).&nbsp; You can also configure mirroring, raid redundancy and more.</p>
<p style="text-align: justify;">Likewise, you can add storage at any time and the new space will be automatically available for use in storage space. Provisioning is also supported in<strong> Storage Space</strong>, allowing you to specify whether the new space be thin provisioned or thick. With thin provisioning, disk space is incremented automatically on a “as needed” basis, eliminating the need of occupying unnecessary disk space.&nbsp;</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/windows-2012-features-4-large.png" alt="windows-2012-features-4-large" width="725" height="414" style="display: block; margin-left: auto; margin-right: auto;" title="Windows Server 2012 - Storage Space/Pools" /> Figure 4. Windows Server 2012 - Storage Space</p>
<p>Following are pointers on the main features provided by <strong>Storage Space</strong>:</p>
<ul class="checkbox">
<li>
<div>Obtain and easily manage reliable and scalable storage with reduced cost</div>
</li>
<li>
<div>Aggregate individual drives into storage pools that are managed as a single entity</div>
</li>
<li>
<div>Utilize simple inexpensive storage with or without external storage</div>
</li>
<li>
<div>Provision storage as needed from pools of storage you’ve created</div>
</li>
<li>
<div>Grow storage pools on demand</div>
</li>
<li>
<div>Use PowerShell to manage Storage Spaces for Windows 8 clients or Windows Server 2012</div>
</li>
<li>
<div>Delegate administration by specific pool</div>
</li>
<li>
<div>Use diverse types of storage in the same pool: SATA, SAS, USB, SCSI</div>
</li>
<li>
<div>Use existing tools for backup/restore as well as VSS for snapshots</div>
</li>
<li>
<div>Designate specific drives as hot spares</div>
</li>
<li>
<div>Automatic repair for pools containing hot spares with sufficient storage capacity to cover what was lost</div>
</li>
<li>
<div>Management can be local, remote, through MMC, or PowerShell</div>
</li>
</ul>
<h2>DirectAccess</h2>
<p style="text-align: justify;"><strong>DirectAccess </strong>is Microsoft’s answer to VPN connectivity, allowing remote clients to access your network under an encrypted connection.&nbsp; Thanks to its easy installation and improved friendly interface, administrators are able to quickly setup and manage VPN services on their Windows Server 2012 system.&nbsp;</p>
<p style="text-align: justify;"><strong>DirectAccess </strong>supports SSL (WebVPN) and IPSec protocols for VPN connections. A very interesting feature is the ‘Permanent VPN’ which allows mobile users to establish their VPN initially and then place it ‘on hold’ when their internet connectivity is lost.&nbsp; The VPN session will then automatically resume once the user has Internet access again.&nbsp;</p>
<p style="text-align: justify;">This time-saving feature ensures VPN users experience a seamlessly VPN connection to the office without the frustration of login in every time Internet connectivity is lost, while also allowing the automation of other tasks in the background (e.g Remote backup of files).</p>
<h2>Data Deduplication</h2>
<p style="text-align: justify;"><strong>Data Deduplication</strong> is a specialized data compression technique for eliminating duplicate copies of repeating data.&nbsp; In the deduplication process, unique chunks of data, or byte patterns, are identified and stored during a process of analysis. As the analysis continues, other chunks are compared to the stored copy and whenever a match occurs, the redundant chunk is replaced with a small reference that points to the stored chunk.&nbsp;</p>
<p style="text-align: justify;">We should note that <strong>Data Deduplication</strong> is not only a Windows 2012 Server feature, but a technology supported by many vendors such as EMC, NetApp, Symantec and others.</p>
<h2>Window-less Interface: CLI Only-Mode</h2>
<p style="text-align: justify;">Microsoft now supports Windows Server 2012 without a graphical user interface (GUI). This means you can install and configure a Windows Server 2012 with GUI and after finishing the setup, remove the GUI completely!&nbsp; You also have the option to install the Windows Server 2012 with GUI or without GUI.</p>
<p style="text-align: justify;">Running your server without a GUI interface will help save valuable resources and also increase the system’s stability.</p>
<h2>IP Address Management (IPAM)</h2>
<p style="text-align: justify;"><strong>IPAM </strong>is a central IP address management tool of your entire network. <strong>IPAM </strong>can work with DNS and DHCP to better allocate, discover, issue, lease and renew IP addresses. <strong>IPAM </strong>gives a central view of where IP addresses are being used within your network.</p>
<h2>Resilient File System (ReFS)</h2>
<p style="text-align: justify;"><strong>ReFS</strong> is Microsoft’s latest file system capable of replacing the well-known NTFS file system. The main advantage of <strong>ReFS </strong>is automatic error correction (verify and auto-corect process) regardless of the underlying hardware. <strong>ReFS </strong>uses checksum to detect and correct errors. The <strong>ReFS </strong>file system has the ability to support a maximum file size of 16 Exabytes (16.7 Million TBytes!) and a maximum volume size of 1 Yottabyte (1.1 Trilion TBytes)</p>
<p class="box-info" style="text-align: justify;">FREE Hyper-V &amp; VMware Backup: Easy to use - Powerful features - Just works, no hassle: It's FREE for Firewall.cx readers! <a href="https://clixtrac.com/goto/?178326" target="_blank" rel="nofollow noopener" title="Free Hyper-V Backup">Download Now!</a></p>
<h2>Summary</h2>
<p style="text-align: justify;">Undoubtedly Windows Server 2012 is packed with new features and additions, designed to help organizations take advantages of cost optimizing features like Hyper V, Storage Spaces, PowerShell 3.0, Data Deduplication, SMB 3.0, new Server Manager and others. Microsoft has also simplified the licensing schemes and introduced&nbsp; four editions of Server 2012. These are <strong>Foundation</strong>, <strong>Essentials</strong>, Standard and <strong>Datacenter edition</strong>. Follow <a href="https://www.firewall.cx/microsoft-knowledgebase/windows-2012/983-windows-2012-editions-licensing.html" target="_blank" title="Windows 2012 Server editions and licensing requirements">this link</a> to read our article covering <a href="https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-2012-editions-licensing.html" title="Windows 2012 Server editions and licensing requirements">Windows 2012 Server editions and licensing requirements</a>.</p>
<p>&nbsp;</p>]]></description>
			<category>Windows Servers</category>
			<pubDate>Mon, 23 Dec 2013 18:00:00 +1100</pubDate>
		</item>
		<item>
			<title>Windows 2012 Server Foundation, Essential, Standard &amp; Datacenter Edition Differences, Licensing &amp; Supported Features. </title>
			<link>https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-2012-editions-licensing.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-2012-editions-licensing.html</guid>
			<description><![CDATA[<div class="box-info">FREE Hyper-V &amp; VMware Virtualization Backup:&nbsp; FREE for Firewall.cx readers for a Limited Time!&nbsp; <a href="https://clixtrac.com/goto/?172528" target="_blank" rel="nofollow noopener" title="Free Hyper-V Backup">Download Now!</a><strong><br /></strong></div>
<h2 style="text-align: justify;">Windows Server 2012 Editions</h2>
<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/windows-2012-editions-licensing-1.jpg" alt="windows-2012" width="267" height="83" style="margin: 7px; float: left;" title="Windows 2012 Server Logo" />On the 1<sup>st</sup> of August, 2012 Microsoft released Windows Server 2012– the sixth release of the Windows Server product family. On May 21<sup>st</sup> 2013, Windows Server 2012 <strong>R2</strong> was introduced and is now the latest version of Windows Server in the market. &nbsp;Microsoft has released four different editions of Windows Server 2012 varying in cost, licensing and features. These four editions of <strong>Windows Server 2012 R2</strong> are: Windows 2012 <strong>Foundation</strong> edition, Windows 2012 <strong>Essentials</strong> edition, Windows 2012 <strong>Standard</strong> edition and Windows 2012 <strong>Datacenter</strong> edition.</p>
<p style="text-align: justify;">Let’s take a closer look at each Windows Server 2012 edition and what they have to offer.</p>
<p style="text-align: justify;">Users can also download the free <a href="https://www.firewall.cx/downloads/windows-server-datasheets-a-useful-resources.html" target="_blank" title="Windows Server 2012 R2 Licensing Datasheet">Windows Server 2012 R2 Licensing Datasheet</a> in our <a href="https://www.firewall.cx/downloads/windows-server-datasheets-a-useful-resources.html" target="_blank" title="Windows Server Datasheets &amp; Useful Resources">Windows Server Datasheets &amp; Useful Resources </a>download section, which provides a detailed overview of the <strong>Licensing for Windows Server 2012</strong> and contains extremly useful information on the various Windows Server 2012 edition, examples on how to calculate your licensing needs, Virtualization instances supported by every edition,&nbsp; server roles, common questions &amp; answers, plus much more.</p>
<p class="box-download" style="text-align: justify;">More technical articles covering <strong>Windows 2012 Server</strong> and <strong>Hyper-V Virtualization</strong> are available in our <a href="https://www.firewall.cx/operating-systems/microsoft/windows-servers.html" target="_blank" title="Windows 2012 Server Technical articles">Windows 2012 Server</a> section.</p>
<h2>Windows Server 2012 Foundation Edition</h2>
<p style="text-align: justify;">This edition of Windows Server 2012 is targeted towards small businesses of up to 15 users. The <strong>Windows</strong> <strong>Server 2012 R2</strong> <strong>Foundation</strong> <strong>edition</strong> comes pre-installed on hardware server with single physical processor and up to 32GB of DRAM memory. <strong>Foundation edition</strong> can be implemented in environments where features such as file sharing, printer sharing, security and remote access are required. Advanced server features such as Hyper V, RODC (Read Only Domain Controller), data deduplication, dynamic memory, IPAM (IP Address Management), server core, certificate service role, hot add memory, windows update services and failover clustering are not available in the <strong>Foundation edition</strong>.</p>
<h2>Windows Server 2012 Essentials Edition</h2>
<p style="text-align: justify;">The <strong>Windows</strong> <strong>Server 2012 R2</strong> <strong>Essentials edition</strong> is the next step up, also geared towards small businesses of up to 25 users. &nbsp;<strong>Windows Server 2012 R2 Essentials edition</strong> is available in retail stores around the world making it easy for businesses to install the new operating system without necessarily purchasing new hardware. Similar to the <strong>Foundation edition</strong>, the <strong>Essentials edition</strong> does not support many advanced server features, however it does provide support of features like Hyper V, dynamic memory and hot add/remove RAM.</p>
<p style="text-align: justify;"><strong>Windows Server 2012 R2 Essentials edition</strong> can run a single instance of virtual machine on Hyper V, a feature that was not available in Windows Server 2012 Essentials (non-R2) edition. This single virtual machine instance can be <strong>Windows Server 2012 R2 Essential edition</strong> only, seriously limiting the virtualization options but allowing companies to begin exploring the benefits of the virtualization platform.</p>
<h2>Windows Server 2012 Standard Edition</h2>
<p style="text-align: justify;">The <strong>Windows Server 2012 R2 Standard edition</strong> of windows server is used for medium to large businesses that require additional features not present in the Foundation &amp; Essential edition. The <strong>Standard edition</strong> is able to support an unlimited amount of users, as long as the required user licenses have been purchased.</p>
<p style="text-align: justify;">Advanced features such as certificate services role, Hyper V, RODC (Read Only Domain Controller), IPAM (IP Address Management), Data deduplication, server core, failover clustering and more, are available to <strong>Windows Server 2012 Standard edition</strong>. We should note that the Standard edition supports up to 2 Virtual Machines.</p>
<h2>Windows Server 2012 Datacenter Edition</h2>
<p style="text-align: justify;">The <strong>Windows Server 2012 R2 Datacenter edition</strong> is the flagship product created to meet the needs of medium to large enterprises. The major difference between the <strong>Standard</strong> and <strong>Datacenter edition</strong> is that the <strong>Datacenter edition</strong> allows the creation of unlimited Virtual Machines and is therefore suitable for environments with extensive use of virtualization technology.</p>
<p style="text-align: justify;">Before purchasing the Windows Server 2012 operating system, it is very important to understand the difference between various editions, the table below shows the difference between the <strong>four editions</strong> of <strong>Windows Server 2012</strong>:</p>
<div class="box-info">FREE Hyper-V &amp; VMware Virtualization Backup:&nbsp; FREE for Firewall.cx readers for a Limited Time!&nbsp; <a href="https://clixtrac.com/goto/?172528" target="_blank" rel="nofollow noopener" title="Free Hyper-V Backup">Download Now!</a><strong><br /></strong></div>
<table border="1" style="width: 672px; height: 561px;" cellspacing="0" cellpadding="0">
<tbody>
<tr style="background-color: #6699ff;">
<td style="text-align: center; width: 127px;" valign="top">
<p><span style="color: #000000;"><strong>&nbsp;Editions</strong></span></p>
</td>
<td style="width: 108px;" valign="top">
<p align="center"><span style="color: #000000;"><strong>Foundation</strong></span></p>
</td>
<td style="width: 141px;" valign="top">
<p align="center"><span style="color: #000000;"><strong>Essentials</strong></span></p>
</td>
<td style="width: 173px;" valign="top">
<p align="center"><span style="color: #000000;"><strong>Standard</strong></span></p>
</td>
<td style="width: 169px;" valign="top">
<p align="center"><span style="color: #000000;"><strong>Datacenter</strong></span></p>
</td>
</tr>
<tr>
<td style="background-color: #f5f5f5;">
<p><span style="color: #000000;"><strong>Distribution</strong></span></p>
</td>
<td style="width: 108px;" valign="top">
<p align="center">OEM Only</p>
</td>
<td style="width: 141px;" valign="top">
<p align="center">Retail, volume licensing, OEM</p>
</td>
<td style="width: 173px;" valign="top">
<p align="center">Retail, volume licensing, OEM</p>
</td>
<td style="width: 169px;" valign="top">
<p align="center">Volume licensing and OEM</p>
</td>
</tr>
<tr>
<td style="background-color: #f5f5f5;">
<p><span style="color: #000000;"><strong>Licensing Model</strong></span></p>
</td>
<td style="width: 108px;" valign="top">
<p align="center">Per Server</p>
</td>
<td style="width: 141px;" valign="top">
<p align="center">Per Server</p>
</td>
<td style="width: 173px;" valign="top">
<p align="center">Per CPU pair + CAL/DAL</p>
</td>
<td style="width: 169px;" valign="top">
<p align="center">Per CPU pair + CAL/DAL</p>
</td>
</tr>
<tr>
<td style="background-color: #f5f5f5;">
<p><span style="color: #000000;"><strong>Processor Chip Limit</strong></span></p>
</td>
<td style="width: 108px;" valign="top">
<p align="center">1</p>
</td>
<td style="width: 141px;" valign="top">
<p align="center">2</p>
</td>
<td style="width: 173px;" valign="top">
<p align="center">64</p>
</td>
<td style="width: 169px;" valign="top">
<p align="center">64</p>
</td>
</tr>
<tr>
<td style="background-color: #f5f5f5;">
<p><span style="color: #000000;"><strong>Memory Limit</strong></span></p>
</td>
<td style="width: 108px;" valign="top">
<p align="center">32GB</p>
</td>
<td style="width: 141px;" valign="top">
<p align="center">64GB</p>
</td>
<td style="width: 173px;" valign="top">
<p align="center">4TB</p>
</td>
<td style="width: 169px;" valign="top">
<p align="center">4TB</p>
</td>
</tr>
<tr>
<td style="background-color: #f5f5f5;">
<p><span style="color: #000000;"><strong>User Limit</strong></span></p>
</td>
<td style="width: 108px;" valign="top">
<p align="center">15</p>
</td>
<td style="width: 141px;" valign="top">
<p align="center">25</p>
</td>
<td style="width: 173px;" valign="top">
<p align="center">Unlimited</p>
</td>
<td style="width: 169px;" valign="top">
<p align="center">Unlimited</p>
</td>
</tr>
<tr>
<td style="background-color: #f5f5f5;">
<p><span style="color: #000000;"><strong>File Services limits</strong></span></p>
</td>
<td style="width: 108px;" valign="top">
<p align="center">1 standalone DFS root</p>
</td>
<td style="width: 141px;" valign="top">
<p align="center">1 standalone DFS root</p>
</td>
<td style="width: 173px;" valign="top">
<p align="center">Unlimited</p>
</td>
<td style="width: 169px;" valign="top">
<p align="center">Unlimited</p>
</td>
</tr>
<tr>
<td style="background-color: #f5f5f5;">
<p><span style="color: #000000;"><strong>Network Policy &amp; Access Services limits</strong></span></p>
</td>
<td style="width: 108px;" valign="top">
<p align="center">50 RRAS connections and 10 IAS connections</p>
</td>
<td style="width: 141px;" valign="top">
<p align="center">250 RRAS connections, 50 IAS connections, and 2 IAS Server Groups</p>
</td>
<td style="width: 173px;" valign="top">
<p align="center">Unlimited</p>
</td>
<td style="width: 169px;" valign="top">
<p align="center">Unlimited</p>
</td>
</tr>
<tr>
<td style="background-color: #f5f5f5;">
<p><span style="color: #000000;"><strong>Remote Desktop Services limits</strong></span></p>
</td>
<td style="width: 108px;" valign="top">
<p align="center">50 Remote Desktop Services connections</p>
</td>
<td style="width: 141px;" valign="top">
<p align="center">Gateway only</p>
</td>
<td style="width: 173px;" valign="top">
<p align="center">Unlimited</p>
</td>
<td style="width: 169px;" valign="top">
<p align="center">Unlimited</p>
</td>
</tr>
<tr>
<td style="background-color: #f5f5f5;">
<p><span style="color: #000000;"><strong>Virtualization rights</strong></span></p>
</td>
<td style="background-color: #c0c0c0; width: 108px;" valign="top">
<p align="center">n/a</p>
</td>
<td style="width: 141px;" valign="top">
<p align="center">Either in 1 VM or 1 physical server, but not both at once</p>
</td>
<td style="width: 173px;" valign="top">
<p align="center">2 VMs</p>
</td>
<td style="width: 169px;" valign="top">
<p align="center">Unlimited</p>
</td>
</tr>
<tr>
<td style="background-color: #f5f5f5;">
<p><span style="color: #000000;"><strong>DHCP, DNS, Fax server, Printing, &nbsp;IIS Services</strong></span></p>
</td>
<td style="width: 108px;" valign="top">
<p align="center">Yes</p>
</td>
<td style="width: 141px;" valign="top">
<p align="center">Yes</p>
</td>
<td style="width: 173px;" valign="top">
<p align="center">Yes</p>
</td>
<td style="width: 169px;" valign="top">
<p align="center">Yes</p>
</td>
</tr>
<tr>
<td style="background-color: #f5f5f5;">
<p><span style="color: #000000;"><strong>Windows Server Update Services</strong></span></p>
</td>
<td style="background-color: #c0c0c0; width: 108px;" valign="top">
<p align="center">No</p>
</td>
<td style="width: 141px;" valign="top">
<p align="center">Yes</p>
</td>
<td style="width: 173px;" valign="top">
<p align="center">Yes</p>
</td>
<td style="width: 169px;" valign="top">
<p align="center">Yes</p>
</td>
</tr>
<tr>
<td style="background-color: #f5f5f5;">
<p><span style="color: #000000;"><strong>Active Directory Services</strong></span></p>
</td>
<td style="width: 108px;" valign="top">
<p align="center">Yes, Must be root of forest and domain</p>
</td>
<td style="width: 141px;" valign="top">
<p align="center">Yes, Must be root of forest and domain</p>
</td>
<td style="width: 173px;" valign="top">
<p align="center">Yes</p>
</td>
<td style="width: 169px;" valign="top">
<p align="center">Yes</p>
</td>
</tr>
<tr>
<td style="background-color: #f5f5f5;">
<p><span style="color: #000000;"><strong>Active Directory Certificate Services</strong></span></p>
</td>
<td style="width: 108px;" valign="top">
<p align="center">Certificate Authorities only</p>
</td>
<td style="width: 141px;" valign="top">
<p align="center">Certificate Authorities only</p>
</td>
<td style="width: 173px;" valign="top">
<p align="center">Yes</p>
</td>
<td style="width: 169px;" valign="top">
<p align="center">Yes</p>
</td>
</tr>
<tr>
<td style="background-color: #f5f5f5;">
<p><span style="color: #000000;"><strong>Windows Powershell</strong></span></p>
</td>
<td style="width: 108px;" valign="top">
<p align="center">Yes</p>
</td>
<td style="width: 141px;" valign="top">
<p align="center">Yes</p>
</td>
<td style="width: 173px;" valign="top">
<p align="center">Yes</p>
</td>
<td style="width: 169px;" valign="top">
<p align="center">Yes</p>
</td>
</tr>
<tr>
<td style="background-color: #f5f5f5;">
<p><span style="color: #000000;"><strong>Server Core mode</strong></span></p>
</td>
<td style="background-color: #c0c0c0;">
<p align="center">No</p>
</td>
<td style="background-color: #c0c0c0;">
<p align="center">No</p>
</td>
<td style="width: 173px;" valign="top">
<p align="center">Yes</p>
</td>
<td style="width: 169px;" valign="top">
<p align="center">Yes</p>
</td>
</tr>
<tr>
<td style="background-color: #f5f5f5;">
<p><span style="color: #000000;"><strong>Hyper-V</strong></span></p>
</td>
<td style="background-color: #c0c0c0;">
<p align="center">No</p>
</td>
<td style="background-color: #c0c0c0;">
<p align="center">No</p>
</td>
<td style="width: 173px;" valign="top">
<p align="center">Yes</p>
</td>
<td style="width: 169px;" valign="top">
<p align="center">Yes</p>
</td>
</tr>
</tbody>
</table>
<h2 style="text-align: left;">Windows&nbsp; Server 2012 Licensing - Understanding Client Access License (CAL) &amp; Device Access License (DAL) Licensing Models</h2>
<p style="text-align: justify;">The <strong>standard</strong> and <strong>datacenter</strong> editions of Server 2012 support Client Access License (CAL) or Device Access License (DAL) licensing model. A CAL license is assigned to a user whereas a DAL license is assigned to device (computer). For example, a CAL assigned to a user, allows only that user to access the server via any device. Likewise, if a DAL is assigned to particular device, then any authenticated user using that device is allowed to access the server.</p>
<p style="text-align: justify;">We can use a simple example to help highlight the practical differences between CAL and DAL licensing models and understand the most cost-effective approach:</p>
<p style="text-align: justify;">Assume an environment with Windows Server 2012 R2 standard edition and a total of 50 users and 25 devices (workstations). In this case, we can purchase either 50 CAL licenses to cover the 50 users we have or alternatively 25 DAL licenses to cover the total amount of workstations that need to access the server. In this scenario, purchasing DALs is a more cost effective solution. &nbsp;</p>
<p style="text-align: justify;">If however we had 10 users with a total of 20 devices , e.g 2 devices per user (workstation &amp; laptop), then it more be more cost effective to purchase 10 CAL licenses.</p>
<h2 style="text-align: justify;">Windows Server 2012 Foundation Edition Licensing Model</h2>
<p style="text-align: justify;"><strong>Windows Server 2012 Foundation </strong>is available to OEMs (Original Equipment Manufacturers) only and therefore can only be purchased at the time of purchasing a n new hardware server. Windows 2012 Foundation edition supports up to 15 users. CALs or DALs <strong>are not</strong> required for the <strong>Foundation edition</strong> servers. In addition, <strong>Foundation edition</strong> owners cannot upgrade to other editions. The maximum number of SMB (Server Message Block or file sharing) connections to the server is 30. Similarly, maximum number of RRAS (Routing and Remote Access Service) and RDS (Remote Desktop Service) connections is 50.</p>
<h2>Windows Server 2012 Essentials Edition Licensing Model</h2>
<p style="text-align: justify;">The <strong>Essential edition</strong> of server 2012 is available to OEMs (with the purchase of new hardware) and also at retail stores. The user limit of this server edition is <strong>25</strong> and device limit is <strong>50</strong>. This means that a maximum of <strong>25 users</strong> amongst <strong>50 computers</strong> can access the Windows Server 2012 Essentials edition. For example, you have <strong>20 users</strong> rotating randomly amongst <strong>25 computers</strong> accessing the Server 2012 Essentials edition, without any problem. CALs or DALs are not required for Windows Server 2012 Essentials edition because no more than 25 users can access the server.</p>
<p style="text-align: justify;">&nbsp;A common question at this point is what if the organization expands and increases its users and computers?</p>
<p style="text-align: justify;">&nbsp;In these cases Microsoft provides an upgrade path allowing organizations to upgrade to the <strong>Windows Server 2012 Standard</strong> or <strong>Datacenter edition</strong> license and perform an in-place license transition. Once the transition is complete, the user limitation, and other features are unlocked without requiring migration or reinstallation of the server.</p>
<p style="text-align: justify;">Companies upgrading to a higher edition of Windows 2012 Server should keep in mind that it will be necessary to purchase the required amount of CALs or DALs according to their users or devices.</p>
<p style="text-align: justify;">Administrators will be happy to know that it is also possible to downgrade <strong>the Standard edition of Server 2012</strong> to the <strong>Essentials edition</strong>. For example, it is possible to run <strong>Essential edition of Server 2012</strong> as virtual machine utilizing one of two available virtual instances in Standard edition as shown in the figure below. This eliminates the needs to purchase <strong>Essential edition of Server 2012</strong>.</p>
<p class="box-info" style="text-align: justify;">&nbsp;FREE Hyper-V &amp; VMware Virtualization Backup:&nbsp; FREE for Firewall.cx readers for a Limited Time!&nbsp; <a href="https://clixtrac.com/goto/?172528" target="_blank" rel="nofollow noopener" title="Free Hyper-V Backup">Download Now!</a></p>
<p><img src="https://www.firewall.cx/images/stories/windows-2012-editions-licensing-2.gif" alt="" width="633" height="236" style="display: block; margin-left: auto; margin-right: auto;" title="Windows 2012 Hyper-V Instances: Standard &amp; Essentials" data-alt="windows-2012-editions-licensing-2" /></p>
<p style="text-align: justify;">With the release of <strong>Windows</strong> <strong>Server 2012 Essentials R2</strong>, Microsoft has updated its licensing model. Unlike <strong>Windows Server 2012 Essentials</strong> (<strong>non-R2</strong>), you can now run a single instance of a virtual machine.</p>
<p style="text-align: justify;">The Hyper-V role and Hyper-V Manager console are now included with <strong>Windows Server 2012 R2 Essentials</strong>. The server licensing rights have been expanded, allowing you to install an instance of <strong>Essentials</strong> on your physical server to run the Hyper-V role (with none of the other roles and features of the Essentials Experience installed), and a second instance of <strong>Essentials</strong> as a virtual machine (VM) on that same server with all the Essentials Experience roles and features.</p>
<h2>Windows Server 2012 Standard Edition &amp; Datacenter Edition Licensing Model</h2>
<p style="text-align: justify;">The license of Standard and Datacenter edition is based on sockets (CPUs) and CAL or DAL. Definition of a socket is a CPU or physical processor. Logical cores are not counted as sockets. A single license of <strong>Standard</strong> and <strong>Datacenter edition</strong> covers up to two physical processors per physical server. CAL or DAL licenses are then required so that clients/devices can access the Windows server. <strong>Standard edition</strong> allows up to <strong>2 virtual instances</strong> while the <strong>Datacenter edition</strong> allows unlimited number of virtual instances.</p>
<p style="text-align: justify;">For example, a Windows 2012 Server R2 Standard edition installed on a physical server with one socket (CPU) can support up to two instances of virtual machines. These virtual machines can be <strong>Server 2012 R2 Standard</strong> or <strong>Essentials</strong> edition. Similarly, if you install a <strong>Windows Server 2012 R2 Datacenter edition</strong>, then you can install an unlimited number of virtual machines.</p>
<p style="text-align: justify;">Let’s look at some examples on deploying <strong>Standard</strong> and <strong>Datacenter edition</strong> servers and calculating the licenses required:</p>
<p style="text-align: justify;"><strong>Scenario 1</strong>: Install Server 2012 Standard/Datacenter Edition on a server box with four physical processors and 80 users.</p>
<p style="text-align: justify;">In this scenario, we will be required to purchase <strong>two</strong> Standard/Datacenter Edition licenses because a single license covers up to two physical processors, plus 80 CAL licenses so our users can access the server resources.</p>
<p style="text-align: justify;"><strong>Scenario 2</strong>: Install Server 2012 Standard Edition on a physical server with 1 physical processor, running 8 instances of virtual machines. A total of 50 users will be accessing the server.</p>
<p style="text-align: justify;">Here, four <strong>Server 2012 Standard edition</strong> licenses are required and 50 CALs or DALs. Remember that a single <strong>Standard edition</strong> license covers up to <strong>two physical processors</strong> and up to <strong>two instances of virtual machines</strong>. Since the requirement is to run <strong>8 instances</strong> of virtual machines, we need four <strong>Standard edition</strong> licenses.</p>
<p style="text-align: justify;">If we decided to use the <strong>Datacenter edition</strong> in this scenario, a single license with 50 CAL would be enough to cover our needs, because the <strong>Datacenter edition</strong> license supports an unlimited number of virtual instances and up to <strong>two physical processors</strong>.</p>
<h2>Summary</h2>
<p style="text-align: justify;"><strong>Microsoft’s Windows Server 2012</strong> is an attractive server-based product designed to meet the demands of small to large enterprises and has a very flexible licensing model. It is very important to fully understand the licensing options and supported features on each of the 4 available editions, before proceeding with your purchase – a tactic that will help ensure costs are kept well within the allocated budget while the company’s needs are fully met.</p>]]></description>
			<category>Windows Servers</category>
			<pubDate>Sun, 01 Dec 2013 23:17:19 +1100</pubDate>
		</item>
		<item>
			<title>How to Recover &amp; Create &quot;Show Desktop&quot; Icon Function on Windows 7, Vista, XP and 2000</title>
			<link>https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-show-desktop.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-show-desktop.html</guid>
			<description><![CDATA[<p><br /><img src="https://www.firewall.cx//images/stories/windows-show-desktop-icon.png" alt="Wndows show desktop icon" width="71" height="100" style="margin: 7px; float: left;" />The <strong>Show Desktop </strong>feature, included with almost all versions of Windows up to Windows 7, allows a user to minimize or restore all open programs and easily view the desktop. To use this feature, a user must simply click <strong>Show Desktop </strong>on the Quicklaunch toolbar to the right of the taskbar.</p>
<p style="text-align: justify;">A common problem amongst Windows users is that the <strong>Show Desktop</strong> icon can accidentally be deleted, thus losing the ability to minimize all open programs and reveal your desktop.</p>
<p style="text-align: justify;">This short article will explain how you can recover and create the <strong>Show Desktop</strong> icon and restore this functionality. The instructions included are valid for Windows 95, 98, 2000, Windows Vista and Windows 7 operating systems.</p>
<p style="text-align: justify;">To recreate the <strong>Show Desktop</strong> icon, follow these steps:</p>
<p style="text-align: justify;">1) Click on <strong>Start</strong>, <strong>Run</strong>, type <strong>Notepad </strong>and click on <strong>OK </strong>or <strong>Hit Enter. </strong>Alternatively, open the Notepad application.</p>
<p style="text-align: justify;">2) Carefully copy and paste the following text into the Notepad window:</p>
<div class="box-content" style="text-align: justify;">&nbsp; [Shell]<br />&nbsp;&nbsp;&nbsp; Command=2<br />&nbsp;&nbsp;&nbsp; IconFile=explorer.exe,3<br />&nbsp;&nbsp;&nbsp; [Taskbar]<br />&nbsp;&nbsp;&nbsp; Command=ToggleDesktop</div>
<div style="text-align: justify;">On the <strong>Fil</strong>e menu, click <strong>Save As</strong>, then save the file to your desktop as<strong> Show desktop.scf</strong>. The <strong>Show Desktop</strong> icon is now created on your desktop.<br /><br />&nbsp;3) Finally, click and drag the <strong>Show Desktop </strong>icon to your Quick Launch toolbar.</div>]]></description>
			<category>Windows Servers</category>
			<pubDate>Mon, 26 Nov 2012 02:53:50 +1100</pubDate>
		</item>
		<item>
			<title>Windows 2003 DNS Server Installation &amp; Configuration</title>
			<link>https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-2003-dns-setup.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-2003-dns-setup.html</guid>
			<description><![CDATA[<p style="text-align: justify;"><a href="https://www.firewall.cx/networking/network-protocols/dns-protocol.html" target="_blank" title="DNS">DNS</a> is used for translating host names to IP addresses and the reverse, for both private and public networks (i.e.: the Internet). DNS does this by using records stored in its database. On the Internet DNS mainly stores records for public domain names and servers whereas in private networks it may store records for client computers, network servers and data pertaining to Active Directory.</p>
<p style="text-align: justify;">In this article, we will install and configure DNS on a standalone Windows Server 2003. We will begin by setting up a cache-only DNS server and progress to creating a primary forward lookup zone, a reverse lookup zone, and finally some resource records. At the end of this article we will have set up a DNS server capable of resolving internal and external host names to IP addresses and the reverse.</p>
<h2>Install DNS on Windows Server 2003</h2>
<p style="text-align: justify;">Before installing and configuring DNS on our server we have to perform some preliminary tasks. Specifically, we have to configure the server with a static IP address and a DNS suffix. The suffix will be used to fully-qualify the server name. To begin:</p>
<p style="text-align: justify;">1. Go to <strong>Start </strong> &gt; <strong>Control Panel </strong> &gt; <strong>Network Connections </strong>, right-click <strong>Local Area Connection </strong> and choose <strong>Properties </strong>.</p>
<p style="text-align: justify;">2. When the Local Area Connection Properties window comes up, select <strong>Internet Protocol (TCP/IP) </strong> and click <strong>Properties </strong>. When the Internet Protocol (TCP/IP) window comes up, enter an <strong>IP address </strong>, <strong>subnet mask </strong> and <strong>default gateway </strong>IP addresses that are all compatible with your LAN.</p>
<p style="text-align: justify;">Our LAN is on a 192.168.1.0/24 network, so our settings are as follows:</p>
<p align="center"><img src="https://www.firewall.cx/images/stories/tk-windows-dns-p1-1.jpg" alt="tk-windows-dns-p1-1" width="400" height="444" /></p>
<p style="text-align: justify;">3. For the <strong>Preferred DNS Server </strong>, enter the loopback address <strong>127.0.0.1 </strong>. This tells the server to use its own DNS server service for name resolution, rather than using a separate server. After filling out those fields , click the <strong>Advanced </strong> button.</p>
<p style="text-align: justify;">4. When the Advanced TCP/IP Settings window comes up, click the DNS tab, enter <em>firewall.test </em> on the <strong>DNS suffix for this connection </strong>text field, check <strong>Register this connection's address in DNS </strong>, check <strong> Use this connection's DNS suffix in DNS registration </strong>, and click <strong>OK </strong>, <strong> OK </strong>, and then <strong> Close:</strong></p>
<p align="center"><img src="https://www.firewall.cx/images/stories/tk-windows-dns-p1-2.jpg" alt="tk-windows-dns-p1-2" width="450" height="259" /></p>
<p>&nbsp;</p>
<p>Now that we have configured our server with a static IP address and a DNS suffix, we are ready to install our <strong>DNS Server</strong>. To do this:</p>
<p>1. Go to <strong>Start </strong> &gt; <strong>Control Panel </strong>&gt; <strong>Add or Remove Programs </strong>.</p>
<p>2. When the Add or Remove Program window launches, click <strong>Add/Remove Windows Components </strong> on the left pane.</p>
<p>3. When the Windows Components Wizard comes up, scroll down and highlight <strong>Networking Services </strong> and then click the <strong>Details </strong> button.</p>
<p>4. When the <strong>Networking Services</strong> window appears, place a check mark next to <strong>Domain Name System (DNS) </strong>and click <strong>OK </strong> and <strong>OK </strong> again.</p>
<p>&nbsp;</p>
<p align="center"><img src="https://www.firewall.cx/images/stories/tk-windows-dns-p1-3.jpg" alt="tk-windows-dns-p1-3" width="510" height="391" /></p>
<p style="text-align: justify;">Note that, during the install, Windows may generate an error claiming that it could not find a file needed for DNS installation. If this happens, insert your Windows Server 2003 CD into the server's CD-ROM drive and browse to the i386 directory. The wizard should automatically find the file and allow you to select it. After that, the wizard should resume the install.</p>
<p>After this, DNS should be successfully installed. To launch the DNS MMC, go to <strong>Start </strong> &gt; <strong>Administrative Tools </strong> &gt; <strong>DNS</strong></p>
<p align="center"><img src="https://www.firewall.cx/images/stories/tk-windows-dns-p1-4.jpg" alt="tk-windows-dns-p1-4" width="600" height="279" /></p>
<p style="text-align: justify;">As our DNS server was just installed it is not populated with anything. On the left pane of the DNS MMC, there is a server node with three nodes below it, titled <strong>Forward Lookup Zones</strong>, <strong>Reverse Lookup Zones</strong> and <strong>Event Viewer</strong>.</p>
<p style="text-align: justify;">The <strong>Forward Lookup Zones</strong> node stores zones that are used to map host names to IP addresses, whereas the Reverse Lookup Zones node stores zones that are used to map IP addresses to host names.</p>
<h2>Setting Up a Cache-Only DNS Server</h2>
<p style="text-align: justify;">A cache-only DNS server contains no zones or resource records. Its only function is to cache answers to queries that it processes, that way if the server receives the same query again later, rather than go through the recursion process again to answer the query, the cache-only DNS server would just return the cached response, thereby saving time. With that said, our newly installed DNS server is already a cache-only DNS server!</p>
<h2>Creating a Primary Forward Lookup Zone</h2>
<p style="text-align: justify;">With its limited functionality, a cache-only DNS server is best suited for a small office environment or a small remote branch office. However, in a large enterprise where Active Directory is typically deployed, more features would be needed from a DNS server, such as the ability to store records for computers, servers and Active Directory. The DNS server stores those records in a database, or a <em>zone </em>.</p>
<p style="text-align: justify;">DNS has a few different types of zones, and each has a different function. We will first create a primary forward lookup zone titled <em>firewall.test </em>. We do not want to name it <em>firewall.cx </em>, or any variation that uses a valid top-level domain name, as this would potentially disrupt the clients' abilities to access the real websites for those domains.</p>
<p>1. On the DNS MMC, right-click the <strong>Forward Lookup Zones </strong> node and choose <strong>New Zone </strong>.</p>
<p>2. When the New Zone Wizard comes up, click <strong>Next </strong>.</p>
<p>3. On the Zone Type screen, make sure that <strong>Primary zone </strong> is selected and click <strong>Next </strong>.</p>
<p>4. On the Zone Name screen, type <strong><em>firewall.test </em></strong>.</p>
<p>5. On the Zone File screen, click <strong>Next </strong>.</p>
<p>6. On the Dynamic Update screen, make sure that “ <strong>Do not allow dynamic updates </strong>” is selected and click <strong>Next </strong>.</p>
<p>7. On the next screen, click <strong>Finish </strong>.</p>
<p>We now have a foundation that we can place resource records in for name resolution by internal clients.</p>
<h2>Creating a Primary Reverse Lookup Zone</h2>
<p>Contrary to the forward lookup zone, a reverse lookup zone is used by the DNS server to resolve IP addresses to host names. Not as frequently used as forward lookup zones, reverse lookup zones are often used by anti-spam systems in countering spam and by monitoring systems when logging events or issues. To create a reverse lookup zone:</p>
<p>1. On the DNS MMC, right-click the <strong>Reverse Lookup Zones </strong> node and choose <strong>New Zone </strong>.</p>
<p>2. When the New Zone Wizard comes up, click <strong>Next </strong>.</p>
<p>3. On the Zone Type screen, make sure that <strong>Primary zone </strong> is selected and click <strong>Next </strong>.</p>
<p>4. On the Reverse Lookup Zone Name screen, enter <strong>192.168.1 </strong> and click <strong>Next </strong>.</p>
<p>5. On the Zone File screen, click <strong>Next </strong>.</p>
<p>6. On the Dynamic Update screen, make sure that “Do not allow dynamic updates” is selected and click <strong>Next </strong>.</p>
<p>7. On the next screen, click <strong>Finish </strong>.</p>
<p align="center"><img src="https://www.firewall.cx/images/stories/tk-windows-dns-p1-5.jpg" alt="tk-windows-dns-p1-5" width="500" height="383" /></p>
<p style="text-align: justify;">There is now a reverse lookup zone titled <em>192.168.1.x Subnet </em> on the left pane of the DNS MMC. This will be used to store PTR records for computers and servers in those subnets.</p>
<p style="text-align: justify;">Using the instructions above, go ahead and create two additional reverse lookup zones, one for a 192.168.2.x subnet and for a 192.168.3.x subnet.</p>
<h2 style="text-align: left;">Creating Resource Records</h2>
<p style="text-align: justify;">DNS uses resource records (RRs) to tie host names to IP addresses and the reverse. There are different types of resource records, and the DNS server will respond with the record that is requested in a query.</p>
<p style="text-align: justify;">The most common resource records are: Host (A); Mail Exchanger (MX); Alias (CNAME); and Service Location (SRV) for Active Directory zones. As such, we will create all but SRV records because Active Directory will create those automatically:</p>
<p>1. On the DNS MMC, expand the <strong>Forward Lookup Zones </strong>node followed by the <strong>firewall.test </strong> zone.</p>
<p>2. Right-click <strong>firewall.test </strong> zone and choose <strong>Other New Records </strong>.</p>
<p>3. On the Resource Record Type window, select <strong>Host (A) </strong> and click <strong>Create Record </strong></p>
<p style="text-align: justify;">4. On the New Resource Record window, type “ <strong>webserver001 </strong>” on the Host text field, type “ <strong>192.168.2.200” </strong> in the IP address text field, check the box next to “Create associated pointer (PTR) record” and click <strong>OK </strong>.</p>
<p style="text-align: justify;">This tells DNS to create a PTR record in the appropriate reverse lookup zone. And, for demonstration purposes, it does not matter whether this server actually exists or not.</p>
<p style="text-align: justify;">5. Back at the Resource Record Type window, select <strong>Host (A) </strong> again and click <strong>Create Record </strong>.</p>
<p style="text-align: justify;">6. On the New Resource Record window, type “ <strong>mailserver001 </strong>” on the Host text field and type “ <strong>192.168.3.200” </strong> in the IP address text field. Make sure that the check box next to “Create associated pointer (PTR) record” is checked and click <strong>OK </strong>. A corresponding PTR record will be created in the appropriate reverse lookup zone.</p>
<p style="text-align: justify;">7. Back at the Resource Record Type window, select <strong>Alias (CNAME) </strong>and click <strong>Create Record </strong>.</p>
<p style="text-align: justify;">8. On the New Resource Record window, type “ <strong>www </strong>” on the <strong>Alias name </strong> text field, then click <strong>Browse </strong>.</p>
<p style="text-align: justify;">9. On the Browse window, double-click the server name, then double-click Forward Lookup Zones, then double-click <em>firewall.test </em>, and finally double-click <em>webserver001 </em>. This should populate the webserver001's fully qualified domain name in the <strong>Fully qualified domain name (FQDN) </strong><strong>for target host </strong> text field. Click <strong>OK </strong> afterwards.</p>
<p style="text-align: justify;">10. Back at the Resource Record Type window, select <strong>Mail Exchanger (MX) </strong>and click <strong>Create Record </strong>.</p>
<p style="text-align: justify;">11. On the New Resource Record window, click <strong>Browse </strong>, double-click the server name, then double-click Forward Lookup Zones, then double-click firewall.test, and finally double-click <em>mailserver001 </em>. This should populate the mailserver001's fully qualified domain name in the <strong>Fully qualified domain name (FQDN) </strong><strong>of mail server </strong> text field. Click <strong>OK </strong> afterwards.</p>
<p style="text-align: justify;">12. Back at the Resource Record Type window, click <strong>Done </strong>.</p>
<h2>Summary</h2>
<p>Our standalone Windows Server 2003 DNS server now has a primary forward lookup zone, a primary reverse lookup zone, and multiple resource records. As a standard function, it will also cache the answers to queries that it has already resolved.</p>]]></description>
			<category>Windows Servers</category>
			<pubDate>Mon, 13 Jun 2011 02:26:48 +1000</pubDate>
		</item>
		<item>
			<title>Windows 2003 DHCP Server Advanced Configuration - Part 2</title>
			<link>https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-2003-dhcp-adv-p2.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-2003-dhcp-adv-p2.html</guid>
			<description><![CDATA[<p style="text-align: justify;"><a href="https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-2003-dhcp-adv-p1.html" target="_blank" title="Windows 2003 DHCP Server Advanced Configuration - Part 1">Part 1 of our Windows 2003 DHCP Server Advanced Configuration</a> article explained the creation and configuration of <strong>DHCP Scope options</strong> and how to configure various DHCP server settings. This article focuses on backing up and restoring the DHCP server database, troubleshooting DHCP using a packet analyser and more.</p>
<h2 style="text-align: left;">Backing up the DHCP database</h2>
<p style="text-align: justify;">Our DHCP server is fully functional but it may not always remain that way. We definitely want to back it up so we can quickly restore the functionality in the event of a disaster.</p>
<p style="text-align: justify;">The DHCP scopes, settings and configuration are actually kept in a database file, and the database is automatically backed up every 60 minutes. But to manually back it up:</p>
<ul style="text-align: justify;">
<li>On the <strong>DHCP MMC</strong>, <strong>right-click</strong> the server node and choose <strong>Backup</strong></li>
<li>When the Browse for Folder window comes up, verify that it points to <strong>C :\windows\system32\dhcp\backup</strong> and click <strong>OK: </strong></li>
</ul>
<p align="center"><img src="https://www.firewall.cx/images/stories/tk-windows-dhcp-2k3-advanced-12.gif" alt="tk-windows-dhcp-2k3-advanced-12" width="323" height="312" style="display: block; margin-left: auto; margin-right: auto;" /></p>
<h2 style="text-align: left;">Restoring the DHCP Database</h2>
<p style="text-align: justify;">Let us imagine that a disaster with the DHCP server did occur and that we now have to restore the DHCP functionality. Restoring the DHCP database is just as simple as backing it up:</p>
<ol style="text-align: justify;">
<li>1. On the DHCP MMC, right-click the server node and choose <strong>Restore</strong></li>
<li>2. When the Browse for Folder window comes up, click <strong>OK</strong></li>
<li>3. You will receive a prompt informing you that the DHCP service will need to be stopped and restarted for the restore to take place. Click <strong>OK</strong></li>
</ol>
<p style="text-align: justify;">The DHCP database will then be restored.</p>
<h2 style="text-align: left;">Troubleshooting DHCP</h2>
<p style="text-align: justify;">Let us imagine that, after restoring the database, the DHCP server developed some issues and started malfunctioning. Luckily, DHCP comes equipped with several tools to help us troubleshoot.</p>
<h2 style="text-align: left;">Event Viewer</h2>
<p style="text-align: justify;">The Event Viewer displays events that the server has reported and whether those events represent actual issues or normal operation. Most of the issue events related to DHCP will be reported in the System log of the Event Viewer with a <em>Source </em> of DHCPServer.</p>
<p style="text-align: justify;">To view the <strong>Event Viewer</strong>:</p>
<ol style="text-align: justify;">
<li>Go to <strong>Start </strong> &gt; <strong>Administrative Tools </strong> &gt; <strong>Event Viewer</strong></li>
<li>When the Event Viewer window comes up, click the <strong>System </strong> log on the left pane and its events will be displayed on the right pane.</li>
</ol>
<p style="text-align: justify;">Depending on how active the server is, the System log may be cluttered with Information, Warning and Error events that are unrelated to DHCP. To see only DHCP issues, filtering non-important events is necessary. To do this:</p>
<ol style="text-align: justify;">
<li>Go to the <strong>View </strong> &gt; <strong>Filter</strong></li>
<li>When the System Properties window comes up, click on the Event Source drop-down menu and select <strong>DHCPServer </strong>. This tells the log to display only DHCP server events.</li>
<li>Next, uncheck the box next to <strong>Information </strong>. This tells the log to display only events regarding issues.</li>
<li>(Optional) On the From and To drop-down menus on the bottom, adjust the time and date frame to when an issue was suspected to have occurred.</li>
<li>When finished, click <strong>OK</strong></li>
</ol>
<p style="text-align: justify;">The System log is now displaying only DHCP Warning and Error events. This should cause any DHCP-related issues to stick out:</p>
<p align="center"><img src="https://www.firewall.cx/images/stories/tk-windows-dhcp-2k3-advanced-13.gif" alt="tk-windows-dhcp-2k3-advanced-13" width="599" height="222" style="display: block; margin-left: auto; margin-right: auto;" /></p>
<p style="text-align: justify;">Every event has an Event ID. In case a particular event's description is too vague to understand, you may have to research the Event ID for further clarification.</p>
<h2 style="text-align: left;">DHCP Audit Logs</h2>
<p style="text-align: justify;">Another DHCP troubleshooting tool is the DHCP audit logs. These logs display detailed information about what the DHCP server has been doing. If a client leases an IP address, renews its IP address, or releases its IP address, the DHCP server will audit this activity.</p>
<p style="text-align: justify;">More concerning events are also audited: if the DHCP server service stops, encounters a rogue DHCP server in the network, or fails to start, the server will audit this issue as well. These logs provide closer visibility into what the DHCP server is doing.</p>
<p style="text-align: justify;">To access the DHCP audit logs:</p>
<ol style="text-align: justify;">
<li>Go to <strong>Start </strong> &gt; <strong>Run</strong></li>
<li>When the Run box comes up, type <strong><em>c:\windows\system32 </em></strong>and click <strong>OK</strong></li>
<li>When the System32 folder comes up, navigate to and double-click the <strong>dhcp </strong> folder.</li>
</ol>
<p style="text-align: justify;">In the dhcp folder, the log files will be titled DhcpSrvLog <em>-%WeekDay%. </em>log, where <em>%WeekDay% </em> is a week day. There should be one for the past six days.</p>
<p align="center"><img src="https://www.firewall.cx/images/stories/tk-windows-dhcp-2k3-advanced-14.gif" alt="tk-windows-dhcp-2k3-advanced-14" width="570" height="268" style="display: block; margin-left: auto; margin-right: auto;" /></p>
<p style="text-align: justify;">The log may appear overwhelming, but it is very simple to read. Each line contains several pieces of information but the most important is the code at the beginning of the line, since that describes what is being audited. That code is defined on the top portion of the log file. As each line is comma-separated you can actually save the log file in .csv format and open it in Excel for easier and more convenient reading and analysis.</p>
<h2 style="text-align: left;">Protocol Analyzer</h2>
<p style="text-align: justify;">Although a <a href="https://www.firewall.cx/tools-tips-reviews/network-protocol-analyzers.html" title="Network protocol analyzer">Network protocol analyzer</a> is not an official DHCP troubleshooting tool, it is nonetheless an excellent tool for troubleshooting issues where the server is not servicing clients. In such situations you would use the protocol analyzer on the server to determine whether DHCP Discover/Request packets from clients are arriving at the server at all or if they are arriving but being ignored by the server.</p>
<p style="text-align: justify;">If you find that the packets are not arriving at the server at all, you would have isolated the problem to most likely being a routing issue or an issue with any relay agents/configured IP helpers in the network.</p>
<p style="text-align: justify;">However, if you find that the packets are arriving but being ignored by the server, then you would have isolated the problem to either residing on the server or the configuration of DHCP.</p>
<p style="text-align: justify;">The screen shot below, of Wireshark, shows that the server received a DHCP Discover packet from a client and properly responded to it.</p>
<p align="center"><img src="https://www.firewall.cx/images/stories/tk-windows-dhcp-2k3-advanced-15.gif" alt="tk-windows-dhcp-2k3-advanced-15" width="590" height="164" style="display: block; margin-left: auto; margin-right: auto;" /></p>
<h2>DHCP Migration</h2>
<p style="text-align: justify;">Continuing from our previous storyline, let us pretend that we found the issue that was affecting our DHCP server but to fix it we would have to take the DHCP server offline for a considerable amount of time, so for the time being we will just setup a different server as our DHCP server.</p>
<p style="text-align: justify;">To accomplish this, we will have to transfer the DHCP database to our new server. Migrating the DHCP database is not only done in situations such as this. When a DHCP server is decommissioned, for example, you would need to transfer the DHCP database to the new server.</p>
<p style="text-align: justify;">Although the transfer can technically be done in more than one way, presented below is one method. Regardless of the approach chosen, you should aim to minimize the amount of time that both DHCP servers are simultaneously active and able to service clients as this would increase the chances of one server leasing an IP address that is already in use.</p>
<ol style="text-align: justify;">
<li>On the old server, go to <strong>Start </strong> &gt; <strong>Run </strong>, type <em>cmd </em>, and click <strong>OK </strong>.</li>
<li>When the Command Prompt window comes up, type <em>netsh dhcp server export c:\dhcp_backup.txt </em><em>all </em>and hit Enter. This command exports all the scopes in the DHCP database to a file titled <em>dhcp_backup.txt </em>.</li>
<li>Copy the export file ( <em>dhcp_backup.txt </em>) to the new server.</li>
<li>On the new server, install the DHCP server role. Do not authorize the DHCP server yet.</li>
<li>On the new server, go to <strong>Start </strong> &gt; <strong>Run </strong>, type <em>cmd </em>, and click <strong>OK </strong>.</li>
<li>When the Command Prompt window comes up, type <em>netsh dhcp server import c:\dhcp_backup.txt </em><em>all </em>and hit Enter. This command imports all the scopes in the DHCP database from the file titled <em>dhcp_backup.txt </em>.</li>
<li>On the new server, enable conflict detection so IP addresses that have been leased out by the old server since the start of the migration are not reissued.</li>
</ol>
<p style="margin-left: 60px;">a. On the DHCP MMC, right-click the server node and choose <strong>Properties </strong></p>
<p style="margin-left: 60px;">b. When the Properties window comes up, click the <strong>Advanced </strong> tab.</p>
<p style="margin-left: 60px;">c. On <strong>Conflict Detection Attempts </strong>, increase the number to 2 just to be safe. This tells the server to ping an IP address before it assigns it. If there is a response, then the DHCP server will not lease out the IP address since that address would already be assigned.</p>
<p style="margin-left: 60px;">d. Click <strong>OK</strong></p>
<p style="padding-left: 30px; text-align: justify;">8. On the new server, authorize the DHCP server.</p>
<p style="padding-left: 30px; text-align: justify;">9. On the old server, unauthorized the DHCP server.</p>
<p style="text-align: justify;">Although we could perform a migration by simply backing up the DHCP database on the old server using the backup procedure and restoring it on the new server using the restore procedure, this approach also restores the old DHCP server's configuration settings, such as audit settings, conflict detection settings, DDNS settings, etc. It may not always be desirable to transfer those settings in a migration. The procedure described above only transfers the scopes and their settings.</p>
<h2 style="text-align: justify;">Conclusion</h2>
<p style="text-align: justify;">Without careful observation, the full capabilities of DHCP can be overlooked. The protocol, in combination with the DHCP MMC, provides numerous methods to control client configuration settings and server administrative functions.</p>]]></description>
			<category>Windows Servers</category>
			<pubDate>Mon, 13 Jun 2011 02:02:50 +1000</pubDate>
		</item>
		<item>
			<title>Windows 2003 DHCP Server Advanced Configuration - Part 1</title>
			<link>https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-2003-dhcp-adv-p1.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-2003-dhcp-adv-p1.html</guid>
			<description><![CDATA[<p>In this article, we will cover more <strong>advanced DHCP features</strong> and topics such as <strong>server options</strong>, <strong>superscopes</strong>, <strong>multicast scopes</strong>, <strong>dynamic DNS</strong>, <strong>DHCP database backup</strong> and <strong>restoration</strong>, <strong>DHCP migration</strong>, and <strong>DHCP troubleshooting</strong>. We will cover these topics in two ways: by building out from our earlier implementation and by using our imagination!</p>
<p style="text-align: justify;">Ok, using our imagination for this purpose may seem silly but doing so will give us the opportunity to indirectly learn how, why, and where these advanced DHCP features and topics come into play in a real-world network and how other networking technologies are involved in a DHCP implementation.</p>
<p style="text-align: justify;">We will imagine that we are building our DHCP server for a company that has two buildings, Building A and Building B, each with a single floor (for now). Building A is on a 192.168.0.0/24 network and Building B is on a 192.168.1.0/24 network.</p>
<p style="text-align: justify;">Although each building has its own DNS server (192.168.0.252 and 192.168.1.252), WINS server (192.168.0.251 and 192.168.1.251) and Cisco Catalyst 4507R-E switch (192.168.0.254 and 192.168.1.254), only a single DHCP server exists – it is the one that we have been building and it resides in Building A.</p>
<p style="text-align: justify;">The clients and servers in each building connect to their respective Cisco Catalyst switches and the switches are uplinked to a Cisco router for Internet connectivity. The only notable configuration is with the Building B switch: It is configured with the <em>ip helper-address 192.168.0.253 </em> command.</p>
<p style="text-align: justify;">The <em>ip helper-address</em> command tells the switch to forward DHCP requests in the local subnet to the DHCP server, since the clients in Building B cannot initially communicate with the DHCP server directly. We are not concerned with any other configuration or networking technologies for now.</p>
<h2 style="text-align: left;">Server Options</h2>
<p style="text-align: justify;">The specifications of our imaginary company state that the company has two buildings – Building A and Building B. In our first article, we created a scope called “Building A, Floor 1” so a scope for our first building is already made. In this article, we will create a scope for Building B, Floor 1, using the instructions from our <a href="https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-2003-dhcp-setup.html" target="_blank" title="Basic DHCP Configuration article">Basic DHCP Configuration article</a> and the following specifications for the scope:</p>
<p align="center"><img src="https://www.firewall.cx/images/stories/tk-windows-dhcp-2k3-advanced-1.gif" alt="tk-windows-dhcp-2k3-advanced-1" width="359" height="262" /></p>
<p style="text-align: justify;">After creating the scope, we want to activate it as well.</p>
<p style="text-align: justify;">Notice that, in creating this scope, we had to input a lot of the same information from our “Building A, Floor 1” scope. In the event that we had several other scopes to create, we would surely not want to be inputting the same information each time for each scope.</p>
<p style="text-align: justify;">That is where server options are useful. Server options allow you to specify options that all the scopes have in common. In creating two scopes, we noticed that our scopes had the following in common:</p>
<ul style="text-align: justify;">
<li>DNS servers</li>
<li>WINS servers</li>
<li>Domain name</li>
</ul>
<p>To avoid having to enter this information again, we will create these options as server options. To do this:</p>
<p>1. On the DHCP MMC, right-click <strong>Server Options </strong> and choose <strong>Configure Options</strong></p>
<p align="center"><img src="https://www.firewall.cx/images/stories/tk-windows-dhcp-2k3-advanced-2.gif" alt="tk-windows-dhcp-2k3-advanced-2" width="351" height="180" style="display: block; margin-left: auto; margin-right: auto;" /></p>
<p>When the Server Options window comes up, take a moment to scroll down through the long list of available options. Not all options are needed or used in every environment. In some cases, however, a needed option is not available. For example, Cisco IP phones require Option 150 but because that option is not available it would have to be defined manually. Other than that, options <strong>006 DNS Servers</strong>, <strong>015 DNS Domain</strong>, and <strong>003 Router</strong> are generally sufficient.</p>
<p>2. Scroll down to option <strong>006 DNS Servers </strong>and place a checkmark in its box. This will activate the <strong>Data Entry </strong> section. In that section, type <strong>192.168.0.252 </strong> for the <strong>IP Address </strong>and click <strong>Add</strong>. Then enter <strong>192.168.1.252 </strong> as another <strong>IP Address </strong> and click <strong>Add </strong> again. This will add those two servers as DNS servers.</p>
<p>3. Scroll down to option <strong> 015 DNS Domain Name </strong>and place a checkmark in its box. This will activate the <strong>Data Entry </strong> section. In that section, enter <strong>firewall.cx</strong> in the <strong>String Value </strong>text field.</p>
<p>4. Scroll down to option <strong>044 WINS/NBNS Servers </strong> and place a checkmark in its box. This will activate the <strong>Data Entry </strong> section. In that section, enter <strong>192.168.0.251 </strong> for the IP Address and click Add. Then enter <strong>192.168.1.251 </strong> as another IP Address and click Add again. This will add those two servers as WINS servers.</p>
<p>5. Scroll down to option <strong> 046 WINS/NBT Node Type </strong> and place a checkmark in its box to activate the <strong>Data Entry </strong> section. In that section, enter “0x8” for the <strong>Byte </strong>text field and click <strong>OK </strong>. This will set the workstation node type to 'Hybrid' which is preffered.</p>
<p style="text-align: justify;">Back on the DHCP MMC, if you click on the Server Options node you will see the following:</p>
<p align="center"><img src="https://www.firewall.cx/images/stories/tk-windows-dhcp-2k3-advanced-3.gif" alt="tk-windows-dhcp-2k3-advanced-3" width="599" height="311" style="display: block; margin-left: auto; margin-right: auto;" /></p>
<p style="text-align: justify;">Subsequent scopes will inherit these options if no scope options are specified. However, if scope options are specified then the scope options would override the server options in assignment.</p>
<p>If we did have Cisco IP phones in our environment we would define Option 150 as follows:</p>
<p>1. Right-click the server node on the DHCP MMC and choose <strong>Set Predefined Options</strong></p>
<p>2. When the Predefined Options and Values window comes up, click <strong>Add</strong></p>
<p>3. When the Options Type window comes up, type a name for the option such as “TFTP Server for Cisco IP Phones”.</p>
<p>4. On the <strong>Data Type </strong>drop-down menu, select IP Address.</p>
<p>5. On the Code text field, enter 150.</p>
<p>6. On the <strong>Description </strong> text field, type a description for the scope, such as “Used by Cisco IP Phones”.</p>
<p>7. Check the box next to <strong>Array</strong></p>
<p>8. Click <strong>OK </strong> twice.</p>
<p style="text-align: justify;">If you go back to the Scope/Server Options window again, you will see Option 150 available.</p>
<p align="center"><img src="https://www.firewall.cx/images/stories/tk-windows-dhcp-2k3-advanced-4.gif" alt="tk-windows-dhcp-2k3-advanced-4" width="368" height="407" style="display: block; margin-left: auto; margin-right: auto;" /></p>
<h2 style="text-align: justify;">Dynamic DNS</h2>
<p style="text-align: justify;">At this point, our imaginary network can service a significant number of clients, but those clients can only be referenced by IP address. Sometimes it is necessary or helpful to reference clients by their host names rather than IP addresses.</p>
<p style="text-align: justify;">DNS resolves client host names to IP addresses. But for DNS to be able to do that, client host names and IP addresses must already be registered in DNS. Servers are typically registered manually in DNS by the administrator, but workstations are not. So how do client workstations get registered in DNS? The answer is to use dynamic DNS (DDNS), a feature that will allow clients, or the DHCP server itself, to register clients in DNS automatically upon the client's assignment of an IP address. Fortunately, DDNS is setup to automatically work in a domain environment, granted that DNS is also setup correctly in the network.</p>
<p style="text-align: justify;">To view the options available for DDNS:</p>
<ol style="text-align: justify;">
<li>On the <strong>DHCP MMC</strong>, <strong>right-click</strong> the server node and choose <strong>Properties</strong></li>
<li>When the <strong>Properties</strong> window comes up, click the <strong>DNS </strong> tab.</li>
</ol>
<p style="text-align: justify;">If the network has some clients that are not in the domain, have legacy Windows operating systems, or are not capable of registering their host names and IP addresses in DNS, the two options marked below would need to be selected:</p>
<p align="center"><img src="https://www.firewall.cx/images/stories/tk-windows-dhcp-2k3-advanced-5.jpg" alt="tk-windows-dhcp-2k3-advanced-5" width="368" height="409" style="display: block; margin-left: auto; margin-right: auto;" /></p>
<p style="text-align: justify;">But if that were the case, you would also have to specify credentials that the DHCP server would use for DDNS on behalf of the clients. To do this, you would:</p>
<ol style="text-align: justify;">
<li>Click the <strong>Advanced </strong> tab on the Properties window.</li>
</ol>
<p align="center"><img src="https://www.firewall.cx/images/stories/tk-windows-dhcp-2k3-advanced-6.jpg" alt="tk-windows-dhcp-2k3-advanced-6" width="368" height="408" /></p>
<p>&nbsp;</p>
<p>1.Click the <strong>Credentials </strong> button.</p>
<p>2. When the <strong>DNS Dynamic Update Credentials</strong> window comes up, enter an <strong>administrator</strong> username and password and <em>firewall </em> for the domain. In a real-world environment, you would create a separate username and password that would be used solely for DDNS and enter it here instead.</p>
<p>3. Click <strong>OK </strong> twice to exit the Properties window.</p>
<h2>Superscopes</h2>
<p style="text-align: justify;">Let us imagine that the number of client workstations in Floor 1 of Building A was expanded beyond the number of available IP addresses that our “Building A, Floor 1” scope could offer. What would we do to provide IP addresses to those additional clients?</p>
<p style="text-align: justify;">The following options may appear to be solutions, but they are not always feasible:</p>
<ol style="text-align: justify;">
<li>Extend the scope to include more IP addresses.</li>
<li>Create an additional scope for that network segment.</li>
<li>Delete and recreate the scope with a different subnetmask that allows for more hosts.</li>
</ol>
<p style="text-align: justify;">The problem with the first option is that you may not always be able to extend the scope, depending on the scope's subnetmask and whether consecutive scopes were created based on that subnetting. The problem with the second option is that even if you create an additional scope, the DHCP server would not automatically lease out those IP addresses to clients of that physical network segment. Although the third option could work, this option may not always be optimal depending on how much additional network-based changes would also be needed to reach the solution.</p>
<p style="text-align: justify;">There are a few options to solve this issue:</p>
<ol style="text-align: justify;">
<li>Place the additional clients in a separate VLAN and create a scope for that VLAN that is in a completely different network</li>
<li>Create a superscope that includes the exhausted scope and a new scope with available IP addresses</li>
</ol>
<p style="text-align: justify;">The first option could solve the problem but, since this is a DHCP article, we will address the problem by using DHCP features, so the second option will be our choice!</p>
<p style="text-align: justify;"><strong>Superscopes</strong> allow you to join scopes from separate networks into one scope. Then, when one of the scopes runs out of IP addresses, the DHCP server would automatically start leasing out IP addresses from the other scopes in that superscope. However, solely creating a superscope is not the complete solution. As some clients in that network segment would have IP addresses from a different network, the segment's router interface would also have to be assigned an additional IP address that is in the same network as the additional scope.</p>
<p style="text-align: justify;">To use this solution, we first have to create the additional scope. Here are the scope specifications:</p>
<p align="center"><img src="https://www.firewall.cx/images/stories/tk-windows-dhcp-2k3-advanced-7.gif" alt="tk-windows-dhcp-2k3-advanced-7" width="413" height="272" style="display: block; margin-left: auto; margin-right: auto;" /></p>
<p style="text-align: justify;">The scope will inherit the server options for DNS domain name, DNS server and WINS server. Activate the scope when done.</p>
<p style="text-align: justify;">Now we will create a superscope and place the two Building A scopes in it:</p>
<ol>
<li>On the DHCP MMC, right-click the server node and choose <strong>New Superscope</strong></li>
<li>When the New Superscope Wizard comes up, click <strong>Nex</strong>t</li>
<li>On the next screen, you are prompted to enter a name for the scope. Enter “All of Building A, Floor 1” and click <strong>Next</strong></li>
<li>On the next screen, you are asked to select the scopes that will be part of the superscope. Select the scopes shown below and then click <strong>Next</strong></li>
</ol>
<p align="center"><img src="https://www.firewall.cx/images/stories/tk-windows-dhcp-2k3-advanced-8.gif" alt="tk-windows-dhcp-2k3-advanced-8" width="440" height="337" style="display: block; margin-left: auto; margin-right: auto;" /></p>
<p align="left">&nbsp;</p>
<p style="padding-left: 30px;" align="left">5. On the next screen, click <strong>Finish </strong> to complete the wizard.</p>
<p style="text-align: justify;">Back on the <strong>DHCP MCC</strong>, you will see that the two scopes selected earlier have been placed under a <strong>new scope</strong> – “<strong>Superscope All of Building A, Floor 1</strong>”.</p>
<p align="center"><img src="https://www.firewall.cx/images/stories/tk-windows-dhcp-2k3-advanced-9.gif" alt="tk-windows-dhcp-2k3-advanced-9" width="599" height="301" style="display: block; margin-left: auto; margin-right: auto;" /></p>
<p style="text-align: justify;" align="center">&nbsp;</p>
<p style="text-align: justify;">Now when the scope titled “<strong>Building A, Floor 1</strong>” runs out of IP addresses, the server will start issuing IP addresses in “<strong>Building A, Floor 1 – Extended</strong>”.</p>
<h2>Multicast Scopes</h2>
<p style="text-align: justify;">The most common systems and applications that use multicasting have multicast IP addresses statically configured or hard-coded in some way. However, for systems and applications that need multicast IP addresses dynamically assigned, they lease them from a MADCAP (Multicast Address Dynamic Client Allocation Protocol) server, such as Windows Server 2003.</p>
<p style="text-align: justify;">One example of such an application that leased a multicast IP address from a MADCAP server is an old application from Windows 2000 called Phone Dialer. This application allowed the creation of video conferences that people could attend. When creating a conference, the application would lease a multicast IP address from the MADCAP server and stream to that IP address. Clients wishing to join the conference would “join” that established multicast group.</p>
<p>Setting up a multicast scope is similar to setting up a standard scope:</p>
<ol>
<li>On the DHCP MMC, right-click the server node and choose <strong>New Multicast Scope</strong></li>
<li>When the New Multicast Scope Wizard comes up, click <strong>Next</strong></li>
<li>On the next screen, specify a Scope Name of “Video Conferencing” and a Scope Description of “Multicast scope for conference presenters.” Afterwards, click <strong>Next</strong></li>
</ol>
<p style="padding-left: 30px;" align="left"><img src="https://www.firewall.cx/images/stories/tk-windows-dhcp-2k3-advanced-10.gif" alt="tk-windows-dhcp-2k3-advanced-10" width="440" height="337" style="display: block; margin-left: auto; margin-right: auto;" /></p>
<p style="padding-left: 30px;" align="left">4. On the next screen, enter 239.192.1.0 in the <strong>Start IP Address </strong> field and 239.192.1.255 in the <strong>End IP Address </strong> field. Since this scope will only service video conferences within the company, we define an IP address range in the multicast organization local scope range. Leave the <strong>TTL </strong> at 32. Click <strong>Next </strong> when done.</p>
<p style="text-align: justify;">&nbsp;</p>
<p><img src="https://www.firewall.cx/images/stories/tk-windows-dhcp-2k3-advanced-11.gif" alt="tk-windows-dhcp-2k3-advanced-11" width="440" height="337" style="display: block; margin-left: auto; margin-right: auto;" /></p>
<ol>
<li>On the next screen, click <strong>Next </strong> again. No exclusions need to be defined.</li>
<li>On the next screen, set the <strong>Days </strong> to 1 and click <strong>Next</strong></li>
<li>On the next screen, click <strong>Next </strong> to activate the scope.</li>
<li>On the next screen, click <strong>Finish</strong></li>
<li>Back on the DHCP MMC, expand the multicast scope that we just created and select <strong>Address Pool </strong>. Notice that an exclusion range encompassing the entire pool is also created. Select it and delete it.</li>
</ol>
<p style="text-align: justify;">The DHCP server can now provide multicast IP addresses. For the most part, the multicast scope functions the same as a standard scope. One different feature is that you can set a multicast scope to automatically expire and delete itself at a certain time.</p>
<p>To configure this:</p>
<ol>
<li>Right-click the multicast scope and choose <strong>Properties</strong></li>
<li>When the Properties window comes up, click the Lifetime tab.</li>
<li>On the Lifetime tab, select “Multicast scope expires on” and select when you would like it to expire. When this date and time is reached, the server automatically deletes the scope. <strong><br /> </strong></li>
</ol>
<h2 style="text-align: left;">Conclusion</h2>
<p style="text-align: justify;">The Advanced DHCP configuration article continues with <a href="https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-2003-dhcp-adv-p2.html" title="Advanced DHCP Server Configuration - Part 2">part 2</a>, covering the DHCP database backup and restoration, troubleshooting the DHCP service using audit logs and finally DHCP Migration.</p>
<p style="text-align: justify;">To continue with our article, please click here: <a href="https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-2003-dhcp-adv-p2.html" title="Windows 2003 Advanced DHCP Server Configuration - Part 2">Windows 2003 Advanced DHCP Server Configuration - Part 2</a>.</p>]]></description>
			<category>Windows Servers</category>
			<pubDate>Sat, 11 Jun 2011 18:48:21 +1000</pubDate>
		</item>
		<item>
			<title>Windows 2003 DHCP Server Installation &amp; Configuration</title>
			<link>https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-2003-dhcp-setup.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-2003-dhcp-setup.html</guid>
			<description><![CDATA[<p style="text-align: justify;"><strong>DHCP</strong> (<strong>Dynamic Host Configuration Protocol</strong>) is a protocol that allows clients on a network to request network configuration settings from a server running the DHCP server service which, in our case, will be Windows Server 2003. Additionally the protocol allows the clients to self-configure those network configuration settings without the intervention of an administrator. Some of the settings that a DHCP server can provide to its clients include the IP addresses for the DNS servers, the IP addresses for the WINS servers, the IP address for the default gateway (usually a router) and, of course, an IP address for the client itself.</p>
<p style="text-align: justify;">This article will discuss and walk you through the steps of <strong>installing and configuring DHCP on a Windows Server 2003</strong> member server, specifically focusing on setting up a scope and its accompanying settings. The same configuration can be applied to a standalone server even though the step-by-step details differ slightly. The upcoming '<strong>Advanced DHCP Server Configuration on Windows 2003</strong>' article will discuss other DHCP options and features such as superscopes, multicast scopes, dynamic DNS, DHCP Backup and more.</p>
<p style="text-align: justify;">While our articles make use of specific IP addresses and network settings, you can change these settings as needed to make them compatible with your LAN – This won't require you to make changes to your LAN, but you'll need to have a slightly stronger understanding of DHCP and TCP/IP.</p>
<h2 style="text-align: left;">Assigning the Server a Static IP Address</h2>
<p style="text-align: justify;">Before we install the DHCP server service on Windows Server 2003, we need to assign the Windows server a static IP address. To do this:</p>
<p style="text-align: justify;">1. Go to <strong>Start </strong> &gt; <strong>Control Panel </strong> &gt; <strong>Network Connections </strong>, right-click <strong>Local Area Connection </strong> and choose <strong>Properties </strong>.</p>
<p style="text-align: justify;">2.&nbsp; When the <strong>Local Area Connection Properties </strong> window comes up, select <strong>Internet Protocol (TCP/IP) </strong> and click the <strong>Properties </strong> button.</p>
<p style="text-align: justify;">3.&nbsp; When the <strong>Internet Protocol (TCP/IP) </strong> window comes up, enter an <strong>IP address </strong>, <strong>subnet mask </strong> and <strong>default gateway </strong> IP address that is compatible with your LAN.</p>
<p style="text-align: justify;">We've configured our settings according to our network, as shown below:</p>
<p align="center"><img src="https://www.firewall.cx/images/stories/tk-windows-dhcp-2k3-basic-1.gif" alt="tk-windows-dhcp-2k3-basic-1" width="404" height="448" /></p>
<p style="text-align: justify;">4. Enter <strong>192.168.0.252 </strong> for the Preferred DNS server and <strong>192.168.1.252 </strong> for the Alternate DNS server. The Preferred and Alternate DNS server IP addresses are optional for the functionality of the DHCP server, but we will populate them since you typically would in a real-world network. Usually these fields are populated with the IP addresses of your Active Directory domain controllers.</p>
<p style="text-align: justify;">5. After filling out those fields, click <strong>OK </strong> and <strong>OK </strong>to save and close all windows.</p>
<h2 style="text-align: left;">Install DHCP Server Service on Windows Server 2003</h2>
<p style="text-align: justify;">Our server now has a static IP address and we are now ready to install the DHCP server service. To do this:</p>
<p style="text-align: justify;">1. Go to <strong>Start </strong> &gt; <strong>Control Panel </strong>&gt; <strong>Add or Remove Programs </strong>.</p>
<p style="text-align: justify;">2. When the <strong>Add or Remove Programs </strong> window launches, click <strong>Add/Remove Windows Components </strong> in the left pane.</p>
<p style="text-align: justify;">3. When the <strong>Windows Components Wizard </strong> comes up, scroll down and highlight <strong>Networking Services </strong>and then click the <strong>Details </strong> button.</p>
<p align="center"><img src="https://www.firewall.cx/images/stories/tk-windows-dhcp-2k3-basic-2.gif" alt="tk-windows-dhcp-2k3-basic-2" width="503" height="407" style="display: block; margin-left: auto; margin-right: auto;" /></p>
<p style="text-align: justify;">4. When the <strong>Networking Services </strong> window comes up, place a check mark next to <strong>Dynamic Host Configuration Protocol (DHCP) </strong>and click <strong> OK </strong>and <strong>OK </strong> again.</p>
<p align="center"><img src="https://www.firewall.cx/images/stories/tk-windows-dhcp-2k3-basic-3.gif" alt="tk-windows-dhcp-2k3-basic-3" width="449" height="343" style="display: block; margin-left: auto; margin-right: auto;" /></p>
<p style="text-align: justify;">Note that, during the install, Windows may generate an error claiming that it could not find a file needed for DHCP installation. If this happens, insert your Windows Server 2003 CD into the server's CD-ROM drive and browse to the i386 directory. The wizard should automatically find the file and allow you to select it. After that, the wizard should resume the installation process.</p>
<h2 style="text-align: left;">Configure DHCP on Windows Server 2003</h2>
<p style="text-align: justify;">DHCP has now been successfully installed and we are ready to configure it. We will create a new scope and configure some of the scope's options. To begin:</p>
<p style="text-align: justify;">1. Launch the DHCP MMC by going to <strong>Start </strong> &gt; <strong>Administrative Tools </strong> &gt; <strong>DHCP </strong>.</p>
<p style="text-align: justify;">Currently, the DHCP MMC looks empty and the server node in the left pane has a red arrow pointing down. Keep that in mind because it will be significant later on.</p>
<p align="center"><img src="https://www.firewall.cx/images/stories/tk-windows-dhcp-2k3-basic-4.gif" alt="tk-windows-dhcp-2k3-basic-4" width="600" height="170" style="display: block; margin-left: auto; margin-right: auto;" /></p>
<p style="text-align: justify;">2. <strong>Right-click</strong> the server node in the left pane and choose <strong>New Scope </strong>. This will launch the New Scope Wizard.</p>
<p style="text-align: justify;">3. On the New Scope Wizard, click <strong>Next </strong>.</p>
<p style="text-align: justify;"><strong>4. Specify a scope name and scope description</strong>. For the scope <strong>Name </strong>, enter “ <strong>Building A, Floor 1 </strong>.” For the scope <strong>Description </strong>, enter “ <strong>This scope is for Floor 1 of Building A </strong>.” Afterwards, click <strong>Next </strong>.</p>
<p align="center"><img src="https://www.firewall.cx/images/stories/tk-windows-dhcp-2k3-basic-5.gif" alt="tk-windows-dhcp-2k3-basic-5" width="503" height="384" style="display: block; margin-left: auto; margin-right: auto;" /></p>
<p style="text-align: justify;" align="left">The scope name can be anything, but we certainly want to name it something that describes the scope's purpose. The scope Description is not required. It is there in case we needed to provide a broader description of the scope.</p>
<p style="text-align: justify;"><strong>5. Specify an IP address range and subnet mask</strong>. For the <strong>Start IP address </strong> enter <strong>192.168.0.1, </strong>for the <strong>End IP address </strong>enter <strong> 192.168.0.254 </strong>. Finally, specify a <strong>subnet mask </strong> of <strong>255.255.255.0 </strong> and click <strong>Next</strong>.</p>
<p style="text-align: justify;">Specifying the IP address range of a scope requires some knowledge of subnetting. Each scope in a DHCP server holds a pool of IP addresses to give out to clients, and the range of IP addresses must be within the allowed range of the subnet (that you specify on the subnet mask field).</p>
<p style="text-align: justify;">For simplicity we entered a classful, class C IP address range from 192.168.0.1 to 192.168.0.254. Notice that the range encompasses the IP address of our server, the DNS servers and the default gateway, meaning that the DHCP server could potentially assign a client an IP address that is already in use! Do not worry -- we will take care of that later.</p>
<p align="center"><img src="https://www.firewall.cx/images/stories/tk-windows-dhcp-2k3-basic-6.gif" alt="tk-windows-dhcp-2k3-basic-6" width="503" height="385" style="display: block; margin-left: auto; margin-right: auto;" /></p>
<p style="text-align: justify;">&nbsp;</p>
<p style="text-align: justify;"><strong>6. Specify IP addresses to exclude from assignment</strong>. For the <strong>Start IP address </strong>, enter <strong>192.168.0.240</strong> and for the <strong>End IP address </strong> enter <strong>192.168.0.254 </strong>, click <strong>Add </strong>, and then click <strong>Next</strong>.</p>
<p align="center"><img src="https://www.firewall.cx/images/stories/tk-windows-dhcp-2k3-basic-7.gif" alt="tk-windows-dhcp-2k3-basic-7" width="503" height="385" style="display: block; margin-left: auto; margin-right: auto;" /></p>
<p style="text-align: justify;">&nbsp;</p>
<p style="text-align: justify;">Certain network devices, such as servers, will need statically configured IP addresses. The IP addresses may sometimes be within the range of IP addresses defined for a scope. In those cases, you have to exclude the IP addresses from being assigned out by DHCP.</p>
<p style="text-align: justify;">We have the opportunity here to define those IP addresses that are to be excluded. We specified IP addresses 192.168.0.240 to 192.168.0.254 to ensure we've included our servers plus a few spare IP addresses for future use.</p>
<p style="text-align: justify;"><strong>7. Specify the lease duration for the scope</strong>. Verify that <strong>Days </strong> is <strong>8 </strong> and click <strong>Next</strong>.</p>
<p style="text-align: justify;">The lease duration is how long clients should keep their IP addresses before having to renew them.</p>
<p align="center"><img src="https://www.firewall.cx/images/stories/tk-windows-dhcp-2k3-basic-8.gif" alt="tk-windows-dhcp-2k3-basic-8" width="503" height="385" style="display: block; margin-left: auto; margin-right: auto;" /></p>
<p style="text-align: justify;">There are a few considerations at this point. If a short lease duration is configured, clients will be renewing their IP addresses more frequently. The result will be additional network traffic and additional strain on the DHCP server. On the other hand if a long lease duration is configured, IP addresses previously obtained by decommissioned clients would remain leased and unavailable to future clients until the leases either expire or are manually deleted.</p>
<p style="text-align: justify;">Additionally if network changes occur, such as the implementation of a new DNS server, those clients would not receive those updates until their leases expire or the computers are restarted.</p>
<p style="text-align: justify;">As Microsoft states, “<em>lease durations should typically be equal to the average time the computer is connected to the same physical network.</em>” You would typically leave the default lease duration in an environment where computers are rarely moved or replaced, such as a wired network. In an environment where computers are often moved and replaced, such as a wireless network, you would want to specify a short duration since a new wireless client could roam within range at any time.</p>
<p style="text-align: justify;"><strong>8. Configure DHCP Options</strong>. Make sure “ <strong>Yes, I want to configure these settings now </strong>” is selected and click <strong>Next </strong> to begin configuring DHCP options.</p>
<p style="text-align: justify;">DHCP options are additional settings that the DHCP server can provide to clients when it issues them with IP addresses. These are the other settings that help clients communicate on the network. In the New Scope Wizard we can only configure a few options but from the DHCP MMC we have several more options.</p>
<p style="text-align: justify;"><strong>9. Specify the router IP address</strong>. Enter <strong>192.168.0.254 </strong>as the IP address of the subnet's router, click <strong>Add </strong>, and then click <strong>Next </strong>.</p>
<p style="text-align: justify;">The first option we can configure is the IP address for the subnet's router for which this scope is providing IP addresses. Keep in mind that this IP address must be in the same network as the IP addresses in the range that we created earlier.</p>
<p align="center"><img src="https://www.firewall.cx/images/stories/tk-windows-dhcp-2k3-basic-9.gif" alt="tk-windows-dhcp-2k3-basic-9" width="503" height="385" style="display: block; margin-left: auto; margin-right: auto;" /></p>
<p style="text-align: justify;" align="center">&nbsp;</p>
<p style="text-align: justify;" align="left"><strong>10. Configure domain name and DNS servers</strong>. On the next page, enter <strong>“firewall.cx" </strong> for the domain name. Then enter <strong>192.168.0.252 </strong> for the IP address of a DNS server, click <strong>Add </strong>, enter <strong>192.168.1.252 </strong> as the IP address for another DNS server, and click <strong>Add </strong> again. When finished, click <strong>Next.</strong></p>
<p style="text-align: justify;" align="left">If you had a DNS infrastructure in place, you could have simply typed in the fully qualified domain name of the DNS server and clicked <strong>Resolve </strong>.</p>
<p style="text-align: justify;" align="left">The DNS servers will be used by clients primarily for name resolution, but also for other purposes that are beyond the scope of this article. The DNS domain name will be used by clients when registering their hostnames to the DNS zones on the DNS servers (covered in the '<strong>Advanced DHCP Server Configuration on Windows 2003</strong>' article).</p>
<p align="center"><img src="https://www.firewall.cx/images/stories/tk-windows-dhcp-2k3-basic-10.gif" alt="tk-windows-dhcp-2k3-basic-10" width="503" height="385" style="display: block; margin-left: auto; margin-right: auto;" /></p>
<p style="text-align: justify;" align="center">&nbsp;</p>
<p style="text-align: justify;"><strong>11. Configure WINS servers</strong>. On the next screen, enter <strong>192.168.0.251 </strong> as the IP address for the first WINS server, click <strong>Add </strong>, enter <strong>192.168.1.251 </strong>as the IP address for the second WINS server, click <strong>Add </strong>again, and then click <strong>Finish </strong>.</p>
<p align="center"><img src="https://www.firewall.cx/images/stories/tk-windows-dhcp-2k3-basic-11.gif" alt="tk-windows-dhcp-2k3-basic-11" width="503" height="385" style="display: block; margin-left: auto; margin-right: auto;" /></p>
<p style="text-align: justify;">&nbsp;</p>
<p style="text-align: justify;"><strong>12. Finally, the wizard asks whether you want to activate the scope</strong>. For now, choose “ <strong>No, I will activate this scope later </strong>” and click <strong>Next </strong> and then <strong>Finish </strong> to conclude the New Scope Wizard and return to the DHCP MMC.</p>
<p style="text-align: justify;">At this point we almost have a functional DHCP server. Let us go ahead and expand the scope node in the left pane of the DHCP MMC to see the new available nodes:</p>
<p style="text-align: justify;">&nbsp; <strong>Address Pool </strong> – Shows the IP address range the scope offers along with any IP address exclusions.</p>
<p style="text-align: justify;">&nbsp; <strong>Address Leases </strong> – Shows all the leased IP addresses.</p>
<p style="text-align: justify;">&nbsp; <strong>Reservations </strong> – Shows the IP addresses that are reserved. Reservations are made by specifying the MAC address that the server would “listen to” when IP address requests are received by the server. Certain network devices, such as networked printers, are best configured with reserved IP addresses rather than static IP addresses.</p>
<p style="text-align: justify;">&nbsp; <strong>Scope Options </strong> – Shows configured scope options. Some of the visible options now are router, DNS, domain name and WINS options.</p>
<p style="text-align: justify;">&nbsp; <strong>Server Options </strong> – Shows configured server options. This is similar to scope options except that these options are either inherited by all the scopes or overridden by them (covered in '<strong>Advanced DHCP Server Configuration on Windows 2003</strong>' article).</p>
<p style="text-align: justify;">Earlier, we only defined exclusions for our servers, router plus a few more spare IP addresses. In case you need to exclude more IP addresses, you can do it at this point by following these instructions:</p>
<p style="text-align: justify;"><strong>13. Select and right-click Address Pool </strong> and choose <strong>New Exclusion Range</strong>.</p>
<p style="text-align: justify;"><strong>14.</strong> When the <strong>Add Exclusion</strong> window comes up, enter the required range and then click <strong>Add</strong>. In our example, we've excluded the addition range 192.168.0.230 - 192.168.0.232.</p>
<p align="center"><img src="https://www.firewall.cx/images/stories/tk-windows-dhcp-2k3-basic-12.gif" alt="tk-windows-dhcp-2k3-basic-12" width="600" height="274" style="display: block; margin-left: auto; margin-right: auto;" /></p>
<p style="text-align: justify;">Notice that the server node and scope node still has a red arrow pointing down. These red arrows pointing down mean that the server and scope are not “turned on”.</p>
<p style="text-align: justify;">The concept of “turning on” the scope is called “activating” and the concept of “turning on” the server for DHCP service is called “authorizing”. Security has some influence in the concept of authorizing a DHCP server and, to authorize a DHCP server, you must be a member of the Enterprise Admins Active Directory group.</p>
<p style="text-align: justify;"><strong>15. Right-click the server (server001.firewall.cx)</strong> and choose <strong>Authorize </strong>, then right-click the scope (Building A, Floor 1) and choose <strong>Activate </strong>. If the red arrows remain, refresh the MMC by going to <strong>Action </strong> &gt; <strong>Refresh </strong>.</p>
<p align="center"><img src="https://www.firewall.cx/images/stories/tk-windows-dhcp-2k3-basic-13.gif" alt="tk-windows-dhcp-2k3-basic-13" width="600" height="299" style="display: block; margin-left: auto; margin-right: auto;" /></p>
<p style="text-align: justify;">Congratulations! At this point, you should have a working DHCP server capable of providing IP addresses!</p>]]></description>
			<category>Windows Servers</category>
			<pubDate>Sat, 11 Jun 2011 18:33:10 +1000</pubDate>
		</item>
		<item>
			<title>Renaming Windows 2000 Domain Name</title>
			<link>https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-2000-domain-rename.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-2000-domain-rename.html</guid>
			<description><![CDATA[<p>Sometimes renaming a domain is an essential business requirement. There are many situations, such as mergers, change of company name or migration from a test environment to a production environment, that require you to change the existing domain name.</p>
<p>However, changing a domain name in Windows Server 2000 is not a simple or straightforward process. It is a time consuming and complex procedure, which requires extensive work.</p>
<p>The renaming of a Windows 2000 domain may impact other server applications that are running in the domain, such as Exchange Server and other custom applications that are closely integrated with Active Directory and use hard coded NETBIOS names.</p>
<p>The major task in renaming a domain is to revert the Windows Server 2000 to Windows NT and then upgrade it to Windows Server 2000 with a new DNS (FQDN) name. If there is more than one domain controller in the domain then all the Windows 2000 domain controllers must be demoted to member servers before renaming the desired domain controller.</p>
<h2>Requirements</h2>
<p>Renaming the Windows 2000 domain is only possible if the default functional level of the domain is set to mixed mode. The Windows 2000 mixed mode function level means that there is at least one NT 4.0 BDC in the domain/Forest. The functional level of the domain must be in mixed mode because you need use NT 4.0 BDC to complete the renaming procedure.</p>
<p class="box-hint"><strong>Note: </strong> If the default functional level of the domain is set to native mode, you cannot revert to mixed mode and cannot rename the domain.</p>
<p>If you have one or more child domains then you have to downgrade all the child domains to Windows NT before downgrading the parent domain. You need to then upgrade the parent domain with new FQDN and then upgrade the child domain/s.</p>
<h2>Steps To Be Taken</h2>
<p>To rename a Windows 2000 domain, you need to follow these steps:</p>
<p>1. Verify that at least one Windows NT 4.0 BDC, having Service Pack 6 or 6a installed on it, exists in the domain.</p>
<p>2. Backup all the domain controllers in the domain.</p>
<p>3. If required, install another Windows NT 4.0 BDC in the domain and force replication to ensure that the backup of all the security information, domain user accounts and SAM database exists. You can use <strong>net accounts /sync </strong>command on the Windows NT 4.0 BDC to force replication.</p>
<p>4. If you have just one domain controller, simply isolate it from the network by removing all the cables.</p>
<p>If you have more than one domain controller, you need to demote all the Windows 2000 domain controllers to member servers, leaving just one Windows 2000 domain controller, by using <strong>dcpromo </strong>command.</p>
<p>Then isolate the last Windows 2000 domain controller after ensuring that a Windows NT 4.0 BDC is present on the network.</p>
<p>5. Demote the last Windows 2000 domain controller by using <strong>dcpromo </strong>command ensuring that the <strong>last domain controller </strong>option is selected as the <strong>domain </strong>option.</p>
<p><strong>Note: </strong>To run <strong>dcpromo </strong>command on the last Windows 2000 domain controller, connect it to an isolated active hub because <strong>dcpromo </strong>command requires an active connection.</p>
<p>6. Promote Windows NT BDC to a PDC and then upgrade it to Windows 2000.</p>
<p>7. Provide the desired domain name at the time of Active Directory installation.</p>
<p>8. Promote all the demoted member servers back to Windows 2000 domain controllers by running <strong>dcpromo </strong>on them.</p>
<h2>Article Summary</h2>
<p>In this article we have seen the different scenarios and methods of renaming a Windows 2000 domain. We have learnt that renaming a Windows 2000 domain is a fairly complex process. We must keep in mind that changing domain name in Windows 2000 should not be performed unless it is absolutely necessary.</p>
<p>Careful planning while deciding on the FQDN/DNS name of the Windows 2000 domain at the time of installation can avoid the trouble of renaming a Windows 2000 domain.</p>
<p>If you have found the article useful, we would really appreciate you sharing it with others by using the provided services on the top left corner of this article. Sharing our articles takes only a minute of your time and helps Firewall.cx reach more people through such services.</p>]]></description>
			<category>Windows Servers</category>
			<pubDate>Sat, 11 Jun 2011 18:14:59 +1000</pubDate>
		</item>
		<item>
			<title>Active Directory Tombstone Lifetime Modification</title>
			<link>https://www.firewall.cx/operating-systems/microsoft/windows-servers/active-directory-tombstone.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/operating-systems/microsoft/windows-servers/active-directory-tombstone.html</guid>
			<description><![CDATA[<p style="text-align: justify;"><strong>Tombstone</strong> is a <strong>container object</strong> that contains the deleted objects from Active Directory. Actually when an object is deleted from Active Directory, it is not physically removed from the Active Directory for some days. Rather, the Active Directory sets the ‘isDeleted' attribute of the deleted object to TRUE and move it to a special container called Tombstone, previously known as CN=Deleted Objects.<br /><br />The tombstones cannot be accessed through <strong>Windows Directories</strong> or through <strong>Microsoft Management Console</strong> (<strong>MMC</strong>) snap-ins. However, tombstones are available to <strong>Directory Replication Process</strong>, so that the tombstones are replicated to all the domain controllers in the domain. This process ensures that the object deleted is deleted from all the computers throughout the Active Directory.<br /><br />The <strong>tombstone lifetime attribute</strong> is the attribute that contains a time period after which the object is physically deleted from the Active Directory. The default value for the tombstone lifetime attribute is 60 days. However, you can change this value if required. Usually tombstone lifetime value is kept longer than the expected replication latency between the domain controllers so that the tombstone is not deleted before the objects are replicated across the forest.</p>
<p style="text-align: justify;"><br />The tombstone lifetime attribute remains same on all the domain controllers and it is deleted from all the servers at the same time. This is because the expiration of a tombstone lifetime is based on the time when an object was deleted logically from the Active Directory, rather than the time when it is received as a tombstone on a server through replication.</p>
<h2 style="text-align: left;">Changing Tombstone Lifetime Attribute</h2>
<p>The tombstone lifetime attribute can be modified in three ways: Using <strong>ADSIEdit tool</strong>, using <strong>LDIF</strong> file, and through <strong>VBScript</strong>.</p>
<h3 style="text-align: left;">Using ADSIEdit Tool</h3>
<p>The easiest method to modify tombstone lifetime in Active Directory is by using ADSIEdit. The ADSIEdit tool is not installed automatically when you install Windows Server 2003. You need to install it separately by installing support tools from Windows Server 2003 CD.<br />If you haven't got your CD's in hand, you can simply download the Windows 2003 SP1 Support Tools from Firewall.cx <a href="https://www.firewall.cx/download-s02-mat.php" target="_new">here</a>.<br />To install ADSIEdit tool and to modify tombstone lifetime in Active Directory using this tool, you need to:</p>
<ol>
<li>Insert the Windows Server 2003 CD.</li>
<li>Browse the CD to locate the Support\Tools directory.</li>
<li>Double-click the suptools.msi to proceed with the installation of support tools.</li>
<li>Select <strong>Run </strong> command from the <strong>Start </strong> menu.</li>
<li>Type ADSIEdit.msc to open the ADSI Editor, as shown below:</li>
</ol>
<p><img src="https://www.firewall.cx/images/stories/tk-windows-tombstone-1.gif" alt="tk-windows-tombstone-1" width="347" height="179" style="display: block; margin-left: auto; margin-right: auto;" /><br /><br />The <strong>ADSI Edit </strong> window appears:<br /><img src="https://www.firewall.cx/images/stories/tk-windows-tombstone-2.gif" alt="tk-windows-tombstone-2" width="626" height="246" style="display: block; margin-left: auto; margin-right: auto;" /><br /><br />6. Expand <strong>Configuration </strong> node then subsequently expand <strong>CN=Configuration, DC Firewall, DC=cx node</strong>. <br /> 7. Expand <strong> CN-Services </strong>node. <br /> 8. Drill down to <strong> CN=Directory Service </strong>under <strong> CN Windows NT </strong>, as shown in the figure below:<br /><img src="https://www.firewall.cx/images/stories/tk-windows-tombstone-3.gif" alt="tk-windows-tombstone-3" width="626" height="404" style="display: block; margin-left: auto; margin-right: auto;" /><br /><br />9. Right-click <strong>CN=Directory Service </strong> and select <strong>Properties </strong> from the menu that appears<br />The <strong>CN=Directory Service Properties </strong>window appears, as shown below:<br />10. Double-click the <strong>tombstoneLifetime </strong> attribute in the <strong>Attributes </strong> list.<br /><img src="https://www.firewall.cx/images/stories/tk-windows-tombstone-4.gif" alt="tk-windows-tombstone-4" width="404" height="448" style="display: block; margin-left: auto; margin-right: auto;" /><br /><br />The <strong>Integer Attribute Editor </strong> window appears, as shown below:<br /><img src="https://www.firewall.cx/images/stories/tk-windows-tombstone-5.gif" alt="tk-windows-tombstone-5" width="415" height="450" style="display: block; margin-left: auto; margin-right: auto;" /><br /><br />11. Set the number of days that tombstone objects should remain in Active Directory in the <strong>Value </strong> field.<br />12. Click <strong>OK </strong>.<br />The Tombstone Lifetime has now been successfully changed.</p>
<h2>Other Ways Of Changing The Tombstone Lifetime Attribute</h2>
<h3>Using an LDIF file</h3>
<p>To change the tombstone lifetime attribute using LDIF file, you need to create a LDIF file using notepad and then execute it using LDIFDE tool. To change the tombstone lifetime attribute using LDIF file, you need to:<br />1. Create a <strong>text</strong> file using notepad with the following content:</p>
<p class="box-content">dn: cn=Directory Service,cn=Windows NT,cn=Services,cn=Configuration, , &lt;ForestRootDN&gt; changetype: modify <br />replace: tombstoneLifetime <br />tombstoneLifetime: &lt;NumberOfDays&gt;</p>
<p>2. Provide the appropriate values in the text between &lt;&gt;. For example put the name of your Active Directory Forest Root domain in the <strong>&lt;ForestRootDN&gt;</strong> and put the number of days you want to set for tombstone lifetime in <strong>&lt;NumberOfDays&gt;</strong><em>. </em><br /><br />3. Don't forget to put "<strong>-</strong>" on the last line.<br /><br />4. Save the file with <strong>.ldf</strong> extension.<br /><br />5. <strong>Open</strong> the <strong>Command Prompt</strong> and type the following command on the command prompt:<br /><span class="box-content">c:\&gt; <strong>Ldifde –v –I –f &lt;Path to tombstoneLifetime.ldf&gt;</strong> </span>The Tombstone Lifetime is successfully changed.</p>
<h3>Using a VBScript</h3>
<p>To change tombstone lifetime using VBScript, you need to type the following code with appropriate values and execute the script.</p>
<p class="box-content">intTombstoneLifetime = &lt;NumberOfDays&gt; &nbsp; <br /> set objRootDSE = GetObject("LDAP://RootDSE") <br /> set objDSCont = GetObject("LDAP://cn=Directory Service,cn=Windows NT," &amp; _ "cn=Services," &amp; objRootDSE.Get("configurationNamingContext") ) <br /> objDSCont.Put "tombstoneLifetime", intTombstoneLifetime <br /> objDSCont.SetInfo <br />WScript.Echo "The tombstone lifetime is set to " &amp; _ intTombstoneLifetime <em><br /></em></p>
<h2>Article Summary</h2>
<p>This article explained what the <strong>Active Directory Tombstone attribute</strong> is and how you can change it to control delete operations performed by the Active Directory replication process. We covered three different methods in great detail to give all the necessary information so these actions can be covered by any Windows Administrator.</p>]]></description>
			<category>Windows Servers</category>
			<pubDate>Sat, 11 Jun 2011 18:03:23 +1000</pubDate>
		</item>
		<item>
			<title>Configuring Windows Server Roaming Profiles</title>
			<link>https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-roaming-profiles.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-roaming-profiles.html</guid>
			<description><![CDATA[<p><strong>Windows roaming profiles</strong> allow the mobile users of a company to always work with their personal settings from any network computer in a domain. Roaming profiles are a collection of personal user settings of a user, saved at a central location on a network.</p>
<p style="text-align: justify;">These settings and configurations are recovered on any network computer as soon as users log in with their credentials.</p>
<p style="text-align: justify;">The <strong>roaming user profiles functionality</strong> is very useful because it allows mobile users to log on to a variety of computers located at different places and get the same look and feel of their own personalized desktops. However, roaming user profiles in Windows Server 2003 does not allow you to use encrypted files.</p>
<p style="text-align: justify;">A roaming profile is made up of folders that appear under the &lt;username&gt; folder under <strong>Documents and Setting</strong>, as shown below:</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/tk-windows-roaming-profiles-1.gif" alt="tk-windows-roaming-profiles-1" width="264" height="423" /></p>
<p style="text-align: justify;">The detailed description of each folder is as follows:</p>
<ul>
<li><strong>Desktop</strong>: This folder contains all the files, folders, and shortcuts data that is responsible for the appearance of your desktop screen.</li>
<li><strong>Favorites</strong>: This folder contains the shortcuts of the favorite and frequently visited websites of the user.</li>
<li><strong>Local Settings</strong>: This folder contains temporary files, history, and the application data.</li>
<li><strong>My Documents</strong>: This folder contains documents, music, pictures, and other items.</li>
<li><strong>The Recent</strong>: This folder contains the most recently accessed files and folders by the user.</li>
<li><strong>Start Menu</strong>: This folder contains the Start menu items.</li>
<li><strong>Cookies</strong>: This folder contains all cookies stored on the user's computer.</li>
<li><strong>NetHood</strong>: This folder contains shortcuts to sites in My Network Places .</li>
<li><strong>PrintHood</strong>: This folder contains the shortcuts of printers configured for the user's computer.</li>
<li><strong>Application Data</strong>: This folder contains the program-specific and the security settings of the applications that the user has used.</li>
<li><strong>Templates</strong>: This folder contains the templates for applications such as Microsoft Word and Excel.</li>
<li><strong>SendTo</strong>: This folder contains the popular Send To destination on right-clicking a menu.</li>
</ul>
<h2>Creating Roaming User Profiles</h2>
<p style="text-align: justify;">You can create roaming user profiles on <strong>Windows NT Server 4.0</strong>, <strong>Windows 2000 Server</strong>, or <strong>Windows Server 2003</strong> based computers. In addition, you can use Windows NT Workstation 4.0, Windows XP Professional, or Windows 2000 Professional based computer that is running Windows NT Server Administration Tools to create roaming user profiles.</p>
<p style="text-align: justify;">The three major steps involved in creating a roaming user profile include creating a temporary user profile on a local computer, copying that profile to a network server, and then defining the user's profile location through the group policy.</p>
<p style="text-align: justify;">To create a <strong>roaming user profile</strong>, follow the steps given below:</p>
<p style="text-align: justify;">1. Log on as <strong>Administrator</strong>, or as a user of <strong>local administrator group</strong> or <strong>Account Operators local group</strong> in the domain:</p>
<p><img src="https://www.firewall.cx/images/stories/tk-windows-roaming-profiles-2.gif" alt="tk-windows-roaming-profiles-2" width="468" height="415" style="display: block; margin-left: auto; margin-right: auto;" /></p>
<p style="text-align: justify;">&nbsp;</p>
<p style="text-align: justify;">2. Open<strong> Administrative Tools</strong> in the <strong>Control Panel</strong> and then click <strong>Active Directory Users and Computers</strong>, as shown above.</p>
<p style="text-align: justify;">3. Click <strong>Users </strong>folder under <strong>Local Users and Groups</strong> node, Right-click <strong>Users </strong>and then click <strong>New User</strong> in the menu that appears, as shown below:</p>
<p style="text-align: justify;"><strong>Note</strong>: If you are using Active Directory then click <strong>Users </strong>folder under <strong>Active Directory Users and Computers</strong> node.</p>
<p><img src="https://www.firewall.cx/images/stories/tk-windows-roaming-profiles-3.gif" alt="tk-windows-roaming-profiles-3" width="620" height="412" style="display: block; margin-left: auto; margin-right: auto;" /></p>
<p style="text-align: center;">The <strong>New User</strong> dialog box appears as shown below.</p>
<p style="text-align: center;">&nbsp;</p>
<p style="text-align: justify;">4. Provide the <strong>User logon name</strong> and the <strong>Password </strong>for the user for whom the roaming profile is being created in their respective fields. Click on <strong>Next</strong>:</p>
<p><img src="https://www.firewall.cx/images/stories/tk-windows-roaming-profiles-4.gif" alt="tk-windows-roaming-profiles-4" width="441" height="371" style="display: block; margin-left: auto; margin-right: auto;" /></p>
<p style="text-align: justify;">&nbsp;</p>
<p style="text-align: justify;">5. Enter the <strong>user password</strong> and <strong>clear</strong> the <strong>User must change password at next logon</strong> option as shown below:</p>
<p><img src="https://www.firewall.cx/images/stories/tk-windows-roaming-profiles-4a.gif" alt="tk-windows-roaming-profiles-4a" width="441" height="371" style="display: block; margin-left: auto; margin-right: auto;" /></p>
<p style="text-align: justify;">&nbsp;</p>
<p style="text-align: justify;">6. Click <strong>Create </strong>, click <strong>Close</strong>, and then quit the <strong>Computer Management</strong> snap-in.</p>
<p style="text-align: justify;">7. <strong>Log off</strong> the computer and then <strong>Log on to your workstation</strong> using the <strong>user account</strong> that you have just created on your server.</p>
<p style="text-align: justify;">8. Verify that a folder with the user name is created under the <strong>Documents and Settings</strong> folder, as shown below:</p>
<p><img src="https://www.firewall.cx/images/stories/tk-windows-roaming-profiles-5.gif" alt="tk-windows-roaming-profiles-5" width="537" height="422" style="display: block; margin-left: auto; margin-right: auto;" /></p>
<p style="text-align: justify;">9. Configure your <strong>desktop</strong> by adding <strong>shortcuts</strong> and modifying its appearance.</p>
<p style="text-align: justify;">8. Configure the <strong>Start menu</strong> by adding desired options to it.</p>
<p style="text-align: justify;">10. Log off.</p>
<h2>Copying The Profile To Your Server</h2>
<p style="text-align: justify;">A temporary profile with all the required settings is configured on your local computer. You need to now copy this local profile to a network server which can be accessed centrally by all the computers.</p>
<p style="text-align: justify;">Try not to user a domain controller for this purpose because domain controllers have many other tasks to do, so it is better to keep them away from this task. You can however, choose a member server for this purpose. Make sure that the member server you choose is regularly backed up otherwise you may loose all your roaming profiles.</p>
<p style="text-align: justify;">To copy the profile to a network server, you need to:</p>
<p style="text-align: justify;">1. Log on as Administrator and then create a <strong>Profile </strong>folder on a network server.</p>
<p style="text-align: justify;">Windows uses <strong>Profile </strong>folder by default to store roaming user profiles. Although you can give a different name to this folder but this folder is traditionally named as <strong>Profile </strong>folder.</p>
<p style="text-align: justify;">2. Share the <strong>Profile </strong>folder and give everyone the full control at share level.</p>
<p style="text-align: justify;">3. Open <strong>Control Panel</strong> , and then click <strong>System </strong>icon. The <strong>System Properties</strong> dialog box appears.</p>
<p style="text-align: justify;">4. Click <strong>Advanced tab</strong>, and then click <strong>Settings </strong>under <strong>User Profiles</strong> section, as shown below:</p>
<p><img src="https://www.firewall.cx/images/stories/tk-windows-roaming-profiles-6.gif" alt="tk-windows-roaming-profiles-6" width="419" height="486" style="display: block; margin-left: auto; margin-right: auto;" /></p>
<p style="text-align: center;">&nbsp;The User Profiles dialog box appears.</p>
<p style="text-align: justify;">&nbsp;</p>
<p style="text-align: justify;">5. <strong>Click</strong> the <strong>temporary user profile</strong> that you had created and then click <strong>Copy To</strong>, as shown in the Figure below:</p>
<p><img src="https://www.firewall.cx/images/stories/tk-windows-roaming-profiles-7.gif" alt="tk-windows-roaming-profiles-7" width="389" height="414" style="display: block; margin-left: auto; margin-right: auto;" /></p>
<p style="text-align: justify;">&nbsp;</p>
<p style="text-align: justify;">Next, The <strong>Copy To</strong> dialog box appears, a shown below.</p>
<p style="text-align: justify;">6. Type the <strong>network path</strong> of the Profile folder in the <strong>Copy Profile To</strong> field.</p>
<p style="text-align: justify;">A folder with the temporary user name will be created automatically under the Profiles folder.</p>
<p style="text-align: justify;">7. Click <strong>Change</strong>.</p>
<p><img src="https://www.firewall.cx/images/stories/tk-windows-roaming-profiles-8.gif" alt="tk-windows-roaming-profiles-8" width="451" height="414" style="display: block; margin-left: auto; margin-right: auto;" /></p>
<p style="text-align: justify;">&nbsp;</p>
<p style="text-align: justify;">8. The <strong>Select User or Group</strong> dialog box appears.</p>
<p style="text-align: justify;">9. Enter the name of the temporary user that you have created.</p>
<p style="text-align: justify;">10. Click <strong>OK </strong>four times on all the windows that you have opened recently.</p>
<p style="text-align: justify;">11. Open <strong>Administrative Tools</strong> in the <strong>Control Panel</strong> and then click <strong>Computer Management</strong>, as shown in the second screenshot in this article.</p>
<p style="text-align: justify;">12. Click <strong>Users </strong>folder under <strong>Local Users and Groups</strong> node, as shown below:</p>
<p style="text-align: justify;">13. Double-click the temporary user account that you had created.</p>
<p style="text-align: justify;">14. The <strong>Properties </strong>window for the user account appears as shown in the figure below.</p>
<p style="text-align: justify;">15. Click the <strong>Profile </strong>tab and then type the path of Profile folder that you had created on a network server in the<strong> Profile path</strong> field:</p>
<p><img src="https://www.firewall.cx/images/stories/tk-windows-roaming-profiles-9.gif" alt="tk-windows-roaming-profiles-9" width="538" height="571" style="display: block; margin-left: auto; margin-right: auto;" /></p>
<p style="text-align: justify;">&nbsp;</p>
<p style="text-align: justify;">16. Click <strong>OK </strong>and then quit the <strong>Computer Management</strong> snap-in.</p>
<p style="text-align: justify;">This completes the process of creating a roaming user profile. Now when the user logs into any computer in the domain using his/her credentials, a copy of the user profile stored on the network will be copied to that computer with all the latest changes that the user might have made.</p>
<p style="text-align: justify;">Usually when there are a few roaming profiles enabled in a domain then the login and log off become extremely slow. This happens mostly when roaming users save large files on their computers. Each time a logs off or logs on to a different computer the large files take long time to save on the network and recover from the network.</p>
<p style="text-align: justify;">The solution to this problem is to use <strong>Folder Redirection</strong> along with roaming user profiles. The Folder redirection feature allows you to redirect folders such as Application Data, Desktop, My Documents, and Start Menu to a different network location. These folders are typically used to save the large files. When Folder Redirection is used then Windows understand that those particular folders need not be touched each time a roaming user logs in/off. These folders will only be touched by Windows when a user actually tries to open a file from them.</p>
<p style="text-align: justify;">Another solution to control the growing size user profiles is to create <strong>Mandatory User Profiles </strong>for the users. However, you can use such profiles when you want to provide identical desktop configurations to all the roaming users. When mandatory user profiles are configured for the users, the users are not allowed to change their profile settings and thus the profiles size always remain manageable. To make a roaming user profile mandatory, you need to rename the <strong>Ntuser.dat</strong> file as <strong>Ntuser.man</strong> in the user's profile folder.</p>
<h2>Article Summary</h2>
<p style="text-align: justify;">Roaming user profiles are simply collections of settings and configurations that are stored on a network location for each user. Once you perform some fairly simple configurations, every time a user logs on to a machine in your domain with his domain credentials, that user's settings will follow him and automatically be applied to his log-on session for that particular machine.</p>
<p style="text-align: justify;">This article covered the creation of roaming user profiles in a Windows server active directory.</p>
<p style="text-align: justify;">If you have found the article useful, we would really appreciate you sharing it with others by using the provided services on the top left corner of this article. Sharing our articles takes only a minute of your time and helps Firewall.cx reach more people through such services.</p>]]></description>
			<category>Windows Servers</category>
			<pubDate>Sat, 11 Jun 2011 07:59:47 +1000</pubDate>
		</item>
		<item>
			<title>Configuring Domain Group Policy for Windows 2003</title>
			<link>https://www.firewall.cx/operating-systems/microsoft/windows-servers/domain-group-policy.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/operating-systems/microsoft/windows-servers/domain-group-policy.html</guid>
			<description><![CDATA[<p><strong>Windows 2003 Group Policies</strong> allow the administrators to manage a group of people accessing a resource efficiently. The group policies can be used to control both the users and computers.</p>
<p style="text-align: justify;">They give better productivity to administrators and save their time by allowing them to manage all the users and computers centrally in just one go.</p>
<p style="text-align: justify;">The group policies are of two types, <strong>Local Group Policy</strong> and <strong>Domain-based Group Policy</strong>. As the name suggests, the <strong>Local Group Policies</strong> allow the <strong>local administrator</strong> to manage all the users of a computer to access the resources and features available on the computer. For example an administrator can remove the use of <strong>Run command</strong> from the <strong>start menu</strong>. This will ensure that the users will not find <strong>Run command</strong> on that computer.</p>
<p style="text-align: justify;">The <strong>Domain-based Group Policies</strong> on the other hand allow the domain/enterprise administrators to manage all the users and the computers of a domain/ forest centrally. They can define the settings and the allowed actions for users and computers across sites, domains, and OUs through group policies.</p>
<p style="text-align: justify;">There are more than <strong>2000 pre-created group policy settings</strong> available in <strong>Windows Server 2003</strong>. A <strong>default group policy</strong> already exists. You only need to modify it by setting values of different policy settings according to your specific requirements. You can also create new group policies to meet your specific business requirements. The group policies allow you to implement:</p>
<ul>
<li><strong>Registry based settings</strong>: Allows you to create a policy to administer operating system components and applications.</li>
<li><strong>Security settings</strong>: Allows you to set security options for users and computers to restrict them to run files based on path, hash, publisher criteria, or URL zone.</li>
<li><strong>Software restrictions</strong>: Allows you to create a policy that would restrict users to run unwanted applications and protect computers against virus and hacking attack.</li>
<li><strong>Software distribution and installation</strong>: Allows you to either assign or publish software application to domain users centrally with the help of a group policy.</li>
<li>Automation of tasks using computer and User Scripts</li>
<li><strong>Roaming user profiles</strong>: Allow mobile users to see a familiar and consistent desktop environment on all the computers of the domain by storing their profile centrally on a server.</li>
<li><strong>Internet Explorer maintenance</strong>: Allow administrators to manage the IE settings of the user's computers in a domain by setting the security zones, privacy settings, and other parameters centrally with the help of group policy.</li>
</ul>
<h2>Configuring a Domain-Based Group Policy</h2>
<p style="text-align: justify;">Just as you used group policy editor to create a local computer policy, to create a domain-based group policy you need to use <strong>Active Users and Computers snap-in</strong> from where you can open the <strong>GPMC</strong>.</p>
<p style="text-align: justify;">Follow the steps below to create a domain-based group policy</p>
<p style="text-align: justify;">1. Select <strong>Active Directory Users and Computers</strong> tool from the <strong>Administrative Tools</strong>.</p>
<p style="text-align: justify;">2. Expand <strong>Active Directory Users and Computers</strong> node, as shown below.</p>
<p style="text-align: justify;">3. <strong>Right-click</strong> the domain name and select <strong>Properties</strong> from the menu that appears:</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/tk-windows-gp-domain-1.gif" alt="tk-windows-gp-domain-1" width="588" height="537" /></p>
<p style="text-align: center;">The properties window of the domain appears. </p>
<p style="text-align: justify;">4. Click the <strong>Group Policy</strong> tab.</p>
<p style="text-align: justify;">5. The <strong>Group Policy</strong> tab appears with a <strong>Default Domain Policy</strong> already created in it, as shown in here:</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/tk-windows-gp-domain-2.gif" alt="tk-windows-gp-domain-2" width="404" height="450" /></p>
<p style="text-align: justify;">&nbsp;</p>
<p style="text-align: justify;">You can edit the <strong>Default Domain Policy</strong> or create a new policy. However, it is not recommended to modify the <strong>Default Domain Policy</strong> for regular settings.</p>
<p style="text-align: justify;">We will select to create a new policy instead. Click <strong>New </strong>to create a new group policy or group policy object. A new group policy object appears below the <strong>Default Domain Policy</strong> in the <strong>Group Policy tab</strong>, as shown below:</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/tk-windows-gp-domain-3.gif" alt="tk-windows-gp-domain-3" width="404" height="450" /></p>
<p style="text-align: justify;">&nbsp;</p>
<p style="text-align: justify;">Once you rename this group policy, you can either double-click on it, or select it and click <strong>Edit</strong>.</p>
<p style="text-align: justify;">You'll next be presented with the <strong>Group Policy Object Editor</strong> from where you can select the changes you wish to apply to the specific <strong>Group Policy</strong>:</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/tk-windows-gp-domain-4.gif" alt="tk-windows-gp-domain-4" width="573" height="465" /></p>
<p style="text-align: justify;">&nbsp;</p>
<p style="text-align: justify;">In this example, we have selected to <strong>Remove Run menu from Start Menu</strong> as shown above. <strong>Double-click</strong> on the selected setting and the properties of the settings will appear. Select <strong>Enabled </strong>to enable this setting. Clicking on <strong>Explain </strong>will provide plenty of additional information to help you understand the effects of this setting.</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/tk-windows-gp-domain-5.gif" alt="tk-windows-gp-domain-5" width="404" height="448" /></p>
<p style="text-align: justify;">When done, click on <strong>OK </strong>to save the new setting.</p>
<p style="text-align: justify;">Similarly you can set other settings for the policy. After setting all the desired options, close the <strong>Group Policy Object editor</strong> . You new group policy will take effect.</p>
<h2>Article Summary</h2>
<p style="text-align: justify;"><strong>Domain Group Policies</strong> give the administrator great control over its domain users by enhancing security levels and restricting access to specific areas of the operating system. These policies can be applied to every organisation unit, group or user in the active directory or selectively to the areas you need. This article shows you how to create a domain group policy that can then be applied as required.</p>
<p style="text-align: justify;">If you have found the article useful, we would really appreciate you sharing it with others by using the provided services on the top left corner of this article. Sharing our articles takes only a minute of your time and helps Firewall.cx reach more people through such services.</p>
<div id="_mcePaste" class="mcePaste" style="overflow: hidden; position: absolute; left: -10000px; top: 171px; width: 1px; height: 1px;">Windows 2003 Group Policies allow the administrators to manage a group of people accessing a resource efficiently. The group policies can be used to control both the users and computers. <br /><br />They give better productivity to administrators and save their time by allowing them to manage all the users and computers centrally in just one go. <br /><br />The group policies are of two types, Local Group Policy and Domain-based Group Policy. As the name suggests, the Local Group Policies allow the local administrator to manage all the users of a computer to access the resources and features available on the computer. For example an administrator can remove the use of Run command from the start menu. This will ensure that the users will not find Run command on that computer.<br /><br />The Domain-based Group Policies on the other hand allow the domain/enterprise administrators to manage all the users and the computers of a domain/ forest centrally. They can define the settings and the allowed actions for users and computers across sites, domains, and OUs through group policies.<br /><br />There are more than 2000 pre-created group policy settings available in Windows Server 2003/ Windows XP. A default group policy already exists. You only need to modify it by setting values of different policy settings according to your specific requirements. You can also create new group policies to meet your specific business requirements. The group policies allow you to implement:<br /><br />Registry based settings : Allows you to create a policy to administer operating system components and applications. <br /><br />Security settings : Allows you to set security options for users and computers to restrict them to run files based on path, hash, publisher criteria, or URL zone. <br /><br />Software restrictions : Allows you to create a policy that would restrict users to run unwanted applications and protect computers against virus and hacking attack. <br /><br />Software distribution and installation : Allows you to either assign or publish software application to domain users centrally with the help of a group policy. <br /><br />Automation of tasks using computer and User Scripts <br /><br />Roaming user profiles : Allow mobile users to see a familiar and consistent desktop environment on all the computers of the domain by storing their profile centrally on a server. <br /><br />Internet Explorer maintenance : Allow administrators to manage the IE settings of the user's computers in a domain by setting the security zones, privacy settings, and other parameters centrally with the help of group policy. <br /><br /><br /><br /><br /><br />Configuring a Domain-Based Group Policy<br /><br />Just as you used group policy editor to create a local computer policy, to create a domain-based group policy you need to use Active Users and Computers snap-in from where you can open the GPMC . <br /><br /><br /><br />Follow the steps below to create a domain-based group policy <br /><br />1. Select Active Directory Users and Computers tool from the Administrative Tools. <br />2. Expand Active Directory Users and Computers node, as shown below. <br />3. Right-click the domain name and select Properties from the menu that appears. <br /><br /><br /><br /><br /><br />The properties window of the domain appears.<br /><br />4. Click the Group Policy tab. <br />5. The Group Policy tab appears with a Default Domain Policy already created in it, as shown in here:<br /><br /><br /><br />You can edit the Default Domain Policy or create a new policy. However, it is not recommended to modify the Default Domain Policy for regular settings. <br /><br />We will select to create a new policy instead. Click New to create a new group policy or group policy object. A new group policy object appears below the Default Domain Policy in the Group Policy tab, as shown below:<br /><br /><br /><br />Once you rename this group policy, you can either double-click on it, or select it and click Edit.<br /><br />You'll next be presented with the Group Policy Object Editor from where you can select the changes you wish to apply to the specific Group Policy:<br /><br /><br /><br />In this example, we have selected to Remove Run menu from Start Menu as shown above. Double-click on the selected setting and the properties of the settings will appear. Select Enabled to enable this setting. Clicking on Explain will provide plenty of additional information to help you understand the effects of this setting. <br /><br /><br /><br /><br /><br />When done, click on OK to save the new setting. <br /><br />Similarly you can set other settings for the policy. After setting all the desired options, close the Group Policy Object editor . You new group policy will take effect.<br /><br /><br /><br />Article Summary<br /><br />Domain Group Policies give the administrator great control over its domain users by enhancing security levels and restricting access to specific areas of the operating system. These policies can be applied to every organisation unit, group or user in the active directory or selectively to the areas you need. This article shows you how to create a domain group policy that can then be applied as required. <br /><br />If you have found the article useful, we would really appreciate you sharing it with others by using the provided services on the top left corner of this article. Sharing our articles takes only a minute of your time and helps Firewall.cx reach more people through such services. <br /><br /><br /><br />About the writers<br /><br />GFI Software provides the single best source of network security, content security and messaging software for small to medium sized businesses.<br /><br />Alan Drury is member of the Firewall.cx team and senior engineer at a large multinational company, supporting complex large Windows networks. <br /><br />Chris Partsenidis is a CCNA certified Engineer, MCP, LCP, Founder &amp; Senior Editor of Firewall.cx<br /><br /></div>]]></description>
			<category>Windows Servers</category>
			<pubDate>Sat, 11 Jun 2011 07:46:45 +1000</pubDate>
		</item>
		<item>
			<title>Configuring Local Group Policy for Windows 2003</title>
			<link>https://www.firewall.cx/operating-systems/microsoft/windows-servers/local-group-policy.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/operating-systems/microsoft/windows-servers/local-group-policy.html</guid>
			<description><![CDATA[<p><strong style="text-align: justify;">Windows 2003 Group Policies</strong> allow the administrators to efficiently manage a group of people accessing a resource. <strong>Group policies</strong> can be used to control both the users and the computers.</p>
<p style="text-align: justify;">They give better productivity to administrators and save their time by allowing them to manage all the users and computers centrally in just one go.</p>
<p style="text-align: justify;"><strong>Group policies</strong> are of two types, <strong>Local Group Policy</strong> and <strong>Domain-based Group Policy</strong>. As the name suggests, <strong>Local Group Policies</strong> allow the local administrator to manage all the users of a computer to access the resources and features available on the computer. For example an administrator can remove the use of the <strong>Run command</strong> from the start menu. This will ensure that the users will not find <strong>Run command</strong> on that computer.</p>
<p style="text-align: justify;"><strong>Domain-based Group Policies</strong> allow the <strong>domain / enterprise administrators</strong> to manage all the users and the computers of a <strong>domain / forest</strong> centrally. They can define the settings and the allowed actions for users and computers across sites, domains and OUs through group policies.</p>
<p style="text-align: justify;">There are more than 2000 pre-created group policy settings available in Windows Server 2003 / Windows XP. A default group policy already exists. You only need to modify the values of different policy settings according to your specific requirements. You can create new group policies to meet your specific business requirements. Group policies allow you to implement:</p>
<p style="text-align: justify;"><strong>Registry based settings:</strong> Allows you to create a policy to administer operating system components and applications.</p>
<p style="text-align: justify;"><strong>Security settings: </strong>Allows you to set security options for users and computers to restrict them to run files based on path, hash, publisher criteria or URL zone.</p>
<p style="text-align: justify;"><strong>Software restrictions: </strong>Allows you to create a policy that would restrict users running unwanted applications and protect computers against virus and hacking attacks.</p>
<p style="text-align: justify;"><strong>Software distribution and installation:</strong> Allows you to either assign or publish software application to domain users centrally with the help of a group policy.</p>
<p style="text-align: justify;"><strong>Roaming user profiles:</strong> Allows mobile users to see a familiar and consistent desktop environment on all the computers of the domain by storing their profile centrally on a server.</p>
<p style="text-align: justify;"><strong>Internet Explorer maintenance:</strong> Allows administrators to manage the IE settings of the users' computers in a domain by setting the security zones, privacy settings and other parameters centrally with the help of group policy.</p>
<h2>Using Local Group Policy</h2>
<p style="text-align: justify;"><strong>Local Group Policies</strong> affect only the users who log in to the local machine but domain-based policies affect all the users of the domain. If you are creating domain-based policies then you can create policy at three levels: <strong>sites</strong>, <strong>domains</strong> and <strong>OUs</strong>. Besides, you have to make sure that each computer must belong to only one domain and only one site.</p>
<p style="text-align: justify;">A <strong>Group Policy Object</strong> (<strong>GPO</strong>) is stored on a per domain basis. However, it can be associated with multiple domains, sites and OUs and a single domain, site or OU can have multiple GPOs. Besides this, any domain, site or OU can be associated with any GPO across domains.</p>
<p style="text-align: justify;">When a GPO is defined it is inherited by all the objects under it and is applied in a cumulative fashion successively starting from local computer to site, domain and each nested OU. For example if a GPO is created at domain level then it will affect all the domain members and all the OUs beneath it.</p>
<p style="text-align: justify;">After applying all the policies in hierarchy, the end result of the policy that takes effect on a user or a computer is called the <strong>Resultant Set of Policy</strong> (<strong>RSoP</strong>).</p>
<p style="text-align: justify;">To use <strong>GPOs</strong> with greater precision, you can apply <strong>Windows Management Instrumentation</strong> (<strong>WMI</strong>) filters and <strong>Discretionary Access Control List</strong> (<strong>DACL</strong>) permissions. The <strong>WMI</strong> filters allow you to apply <strong>GPOs</strong> only to specific computers that meet a specific condition. For example, you can apply a GPO to all the computers that have more than 500 MB of free disk space. The <strong>DACL</strong> permissions allow you to apply GPOs based on the user's membership in security groups.</p>
<p style="text-align: justify;"><strong>Windows Server 2003</strong> provides a <strong>GPMC</strong> (<strong>Group Policy Management Console</strong>) that allows you to manage group policy implementations centrally. It provides a unified view of local computer, sites, domains and OUs (organizational units). You can have the following tools in a single console:</p>
<ul class="check">
<li style="text-align: justify;"><strong>Active Directory Users and Computers</strong></li>
<li style="text-align: justify;"><strong>Active Directory Sites and Services</strong></li>
<li style="text-align: justify;"><strong>Resultant Set of Policy MMC snap-in</strong></li>
<li style="text-align: justify;"><strong>ACL Editor</strong></li>
<li style="text-align: justify;"><strong>Delegation Wizard</strong></li>
</ul>
<p style="text-align: justify;">The screenshot below shows four tools in a single console.</p>
<p style="text-align: center;"><img src="https://www.firewall.cx//images/stories/tk-windows-gp-local-1.gif" alt="tk-windows-gp-local-1" width="513" height="289" /></p>
<p>&nbsp;</p>
<p style="text-align: justify;">A group policy can be configured for computers or users or both, as shown here:</p>
<p><img src="https://www.firewall.cx//images/stories/tk-windows-gp-local-2.gif" alt="tk-windows-gp-local-2" width="603" height="350" style="display: block; margin-left: auto; margin-right: auto;" /></p>
<p style="text-align: justify;">The <strong>Group Policy editor</strong> can be run using the <strong>gpedit.msc</strong> command.</p>
<p style="text-align: justify;">Both the policies are applied at the periodic refresh of Group Policies and can be used to specify the desktop settings, operating system behavior, user logon and logoff scripts, application settings, security settings, assigned and published applications options and folder redirection options.</p>
<p style="text-align: justify;">Computer-related policies are applied when the computer is rebooted and User-related policies are applied when users log on to the computer.</p>
<h2>Configuring a Local Group Policy</h2>
<p style="text-align: justify;">To configure a local group policy, you need to access the group policy editor. You can use <strong>Group Policy Editor</strong> by logging in as a local administrator from any member server of a domain or a workgroup server but not from a domain controller.</p>
<p style="text-align: justify;">Sometimes this tool, or other Active directory tools that you need to manage group policy, does not appear in <strong>Administrative Tools</strong>. In that case you need to follow <strong>steps 1-10</strong> given below to add <strong>Group Policy Editor</strong> tool in the console.</p>
<p style="text-align: justify;">1. Click <strong>Start-&gt;Run</strong> and type <strong>mmc</strong>. The Console window appears, as shown below:</p>
<p style="text-align: justify;">2. Select <strong>Add/remove Snap-in</strong> from the File menu.&nbsp;</p>
<p><img src="https://www.firewall.cx//images/stories/tk-windows-gp-local-3.gif" alt="tk-windows-gp-local-3" width="572" height="295" style="display: block; margin-left: auto; margin-right: auto;" /></p>
<p style="text-align: justify;">&nbsp;</p>
<p style="text-align: justify;">The <strong>Add/Remove Snap-in </strong>window appears, as shown below:</p>
<p style="text-align: justify;">3. Click <strong>Add</strong>.</p>
<p style="text-align: justify;">4. The <strong>Add Standalone Snap-in</strong> window appears.</p>
<p style="text-align: justify;">5. Select <strong>Group Policy Object Editor</strong> snap-in from the list.</p>
<p style="text-align: justify;">6. Click <strong>Add </strong>and then click <strong>OK </strong>in <strong>Add/remove Snap-in</strong> window.</p>
<p><img src="https://www.firewall.cx//images/stories/tk-windows-gp-local-4.gif" alt="tk-windows-gp-local-4" width="559" height="461" style="display: block; margin-left: auto; margin-right: auto;" /></p>
<p style="text-align: justify;">&nbsp;</p>
<p style="text-align: justify;">The <strong>Select Group Policy</strong> Object window appears, as shown below:</p>
<p style="text-align: justify;">7. Keep the default value “<strong>Local Computer</strong>”</p>
<p style="text-align: justify;">8. Click <strong>Finish</strong>.</p>
<p><img src="https://www.firewall.cx//images/stories/tk-windows-gp-local-5.gif" alt="tk-windows-gp-local-5" width="523" height="446" style="display: block; margin-left: auto; margin-right: auto;" /></p>
<p style="text-align: justify;">&nbsp;</p>
<p style="text-align: justify;">The <strong>Local Computer Policy MMC</strong> appears, as shown below.</p>
<p style="text-align: justify;">You can now set the <strong>Computer Configuration</strong> or <strong>User Configuration</strong> policies as desired. This example takes <strong>User Configuration</strong> setting.</p>
<p style="text-align: justify;">9. Expand <strong>User Configuration</strong> node:</p>
<p><img src="https://www.firewall.cx//images/stories/tk-windows-gp-local-6.gif" alt="tk-windows-gp-local-6" width="572" height="295" style="display: block; margin-left: auto; margin-right: auto;" /></p>
<p style="text-align: justify;">&nbsp;</p>
<p style="text-align: justify;">10. Expand <strong>Administrative Templates</strong> and then select the <strong>Start Menu and Taskbar</strong> node, as shown in Figure 7.</p>
<p style="text-align: justify;">11. <strong>Double-click</strong> the settings for the policy that you want to modify from the right panel. In this example double-click <strong>Remove Run Menu from Start Menu.</strong></p>
<p><img src="https://www.firewall.cx//images/stories/tk-windows-gp-local-7.gif" alt="tk-windows-gp-local-7" width="628" height="426" style="display: block; margin-left: auto; margin-right: auto;" /></p>
<p style="text-align: justify;">&nbsp;</p>
<p style="text-align: justify;">The properties window of the setting appears as shown in the below screenshot:</p>
<p style="text-align: justify;">12. Click <strong>Enabled </strong>to enable this setting.</p>
<p><img src="https://www.firewall.cx//images/stories/tk-windows-gp-local-8.gif" alt="tk-windows-gp-local-8" width="404" height="448" style="display: block; margin-left: auto; margin-right: auto;" /></p>
<p style="text-align: justify;">Once you click on '<strong>OK</strong>', the local policy that you have applied will take effect and all the users who would log on to this computer will not be able to see the <strong>Run </strong>menu item of the <strong>Start </strong>menu.</p>
<p style="text-align: justify;">This completes our <strong>Local Group Policy</strong> configuration section. Next section covers <a href="https://www.firewall.cx/operating-systems/microsoft/windows-servers/domain-group-policy.html" target="_blank" title="Domain Group Policies">Domain Group Policies</a>, that will help you configure and control user access throughout the <strong>Active Directory Domain</strong>.</p>
<h2>Article Summary</h2>
<p style="text-align: justify;"><strong>Group Policies</strong> are an Administrator's best friend. <strong>Group Policies</strong> can control every aspect of a user's desktop, providing enhanced security measures and restricting access to specified resouces. Group policies can be applied to a <strong>local server</strong>, as shown on this article, or to a <a href="https://www.firewall.cx/operating-systems/microsoft/windows-servers/domain-group-policy.html" title="Domain Group Policies">whole domain</a>.</p>
<p style="text-align: justify;">If you have found the article useful, we would really appreciate you sharing it with others by using the provided services on the top left corner of this article. Sharing our articles takes only a minute of your time and helps Firewall.cx reach more people through such services.</p>
<p>&nbsp;</p>]]></description>
			<category>Windows Servers</category>
			<pubDate>Sat, 11 Jun 2011 07:29:48 +1000</pubDate>
		</item>
		<item>
			<title>Creating Windows Users and Groups with Windows 2003</title>
			<link>https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-2003-users-groups.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/operating-systems/microsoft/windows-servers/windows-2003-users-groups.html</guid>
			<description><![CDATA[<p style="text-align: justify;">In a Windows server environment, it is very important that only authenticated users are allowed to log in for security reasons. To fulfill this requirement the creation of <strong>User accounts</strong> and <strong>Groups</strong> is essential.</p>
<h2>User Accounts</h2>
<p style="text-align: justify;">In <strong>Windows Server 2003</strong> computers there are two types of user accounts. These types are <strong>local and domain user accounts</strong>. The <strong>local user accounts</strong> are the single user accounts that are locally created on a Windows Server 2003 computer to allow a user to log on to a local computer. The <strong>local user accounts</strong> are stored in <strong>Security Accounts Manager</strong> (<strong>SAM</strong>) database locally on the hard disk. The local user accounts allow you to access local resources on a computer</p>
<p style="text-align: justify;">On the other hand the <strong>domain user accounts</strong> are created on <strong>domain controllers</strong> and are saved in <strong>Active Directory</strong>. These accounts allow to you access resources anywhere on the network. On a Windows Server 2003 computer, which is a member of a domain, you need a <strong>local user account</strong> to log in locally on the computer and a domain user account to log in to the domain. Although you can have a same login and password for both the accounts, they are still entirely different account types.</p>
<p style="text-align: justify;">You become a <strong>local administrator</strong> on your computer automatically because local computer account is created when a server is created. A <strong>domain administrator</strong> can be <strong>local administrator</strong> on all the member computers of the domain because by default the <strong>domain administrators</strong> are added to the <strong>local administrators group</strong> of the computers that belong to the domain.</p>
<p style="text-align: justify;">This article discusses about <strong>creating local</strong> as well as <strong>domain user accounts</strong>, <strong>creating groups</strong> and then <strong>adding members to groups</strong>.</p>
<h2>Creating a Local User Account</h2>
<p style="text-align: justify;">To create a local user account, you need to:</p>
<p style="text-align: justify;">1. Log on as Administrator, or as a user of local administrator group or Account Operators local group in the domain.</p>
<p style="text-align: justify;">2. Open <strong>Administrative Tools</strong> in the <strong>Control Panel</strong> and then click <strong>Computer Management</strong>, as shown in Figure 1.</p>
<p style="text-align: center;"><img src="https://www.firewall.cx//images/stories/tk-windows-user-groups-1.gif" alt="tk-windows-user-groups-1" width="468" height="432" /></p>
<p style="text-align: center;">Figure 1</p>
<p style="text-align: center;">&nbsp;</p>
<p style="text-align: justify;">3. Click <strong>Users </strong>folder under <strong>Local Users and Groups</strong> node, as shown in Figure 2.</p>
<p style="text-align: center;"><img src="https://www.firewall.cx//images/stories/tk-windows-user-groups-2.gif" alt="tk-windows-user-groups-2" width="543" height="364" /></p>
<p style="text-align: center;">Figure 2</p>
<p style="text-align: justify;">4. Right-click<strong> Users</strong> and then click <strong>New User</strong> in the menu that appears, as shown in Figure 3:</p>
<p style="text-align: center;"><img src="https://www.firewall.cx//images/stories/tk-windows-user-groups-3.gif" alt="tk-windows-user-groups-3" width="543" height="366" /></p>
<p style="text-align: center;">Figure 3</p>
<p style="text-align: justify;">The <strong>New User</strong> dialog box appears as shown below in Figure 4.</p>
<p style="text-align: justify;">5. Provide the <strong>User name</strong> and the <strong>Password </strong>for the user in their respective fields.</p>
<p style="text-align: justify;">6. Select the desired password settings requirement.</p>
<p>Select <strong>User must change password at next logon option</strong> if you want the user to change the password when the user first logs into computer. Select <strong>User cannot change password</strong> option if you do not want the user to change the password. Select<strong> Password never expires</strong> option if you do not want the password to become obsolete after a number of days. Select <strong>Account is disabled</strong> to disable this user account.</p>
<p>7. Click <strong>Create </strong>, and then click <strong>Close:</strong></p>
<p><img src="https://www.firewall.cx//images/stories/tk-windows-user-groups-4.gif" alt="tk-windows-user-groups-4" width="384" height="379" style="display: block; margin-left: auto; margin-right: auto;" /></p>
<p style="text-align: center;">&nbsp;Figure 4</p>
<p>The user account will appear on clicking <strong>Users </strong>node under<strong> Local Users and Groups</strong> on the right panel of the window.</p>
<p>You can now associate the user to a group. To associate the user to a group, you need to:</p>
<p>8. Click <strong>Users </strong>folder under <strong>Local Users and Groups</strong> node.</p>
<p>9. Right-click the user and then select <strong>Properties </strong>from the menu that appears, as shown in Figure 5:</p>
<p><img src="https://www.firewall.cx//images/stories/tk-windows-user-groups-5.gif" alt="tk-windows-user-groups-5" width="542" height="368" style="display: block; margin-left: auto; margin-right: auto;" /></p>
<p style="text-align: center;">&nbsp;Figure 5</p>
<p>The <strong>Properties</strong> dialog box of the user account appears, as shown in Figure 6:</p>
<p style="text-align: justify;">10. Click <strong>Member of</strong> tab. <br /><br />The group(s) with which the user is currently associated appears.<br /><br />11. Click <strong>Add</strong>.</p>
<p><img src="https://www.firewall.cx//images/stories/tk-windows-user-groups-6.gif" alt="tk-windows-user-groups-6" width="404" height="466" style="display: block; margin-left: auto; margin-right: auto;" /></p>
<p style="text-align: center;">&nbsp;Figure 6</p>
<p style="text-align: justify;">The <strong>Select Groups</strong> dialog box appears, as shown in Figure 7.</p>
<p style="text-align: justify;">12. <strong>Select</strong> the name of the group/object that you want the user to associate with from the <strong>Enter the object names to select </strong>field.</p>
<p style="text-align: justify;">If the group/object names do not appear, you can click <strong>Advanced </strong>button to find them. Also if you want to choose different locations from the network or choose check the users available, then click <strong>Locations </strong>or <strong>Check Names</strong> buttons.</p>
<p style="text-align: justify;">13. Click <strong>OK </strong>.</p>
<p style="text-align: center;"><img src="https://www.firewall.cx//images/stories/tk-windows-user-groups-7.gif" alt="tk-windows-user-groups-7" width="463" height="246" /></p>
<p style="text-align: center;">Figure 7</p>
<p style="text-align: justify;">The selected group will be associated with the user and will appear in the <strong>Properties</strong> window of the user, as shown in Figure 8:</p>
<p style="text-align: center;"><img src="https://www.firewall.cx//images/stories/tk-windows-user-groups-8.gif" alt="tk-windows-user-groups-8" width="403" height="465" /></p>
<p style="text-align: center;">Figure 8</p>
<h2>Creating a Domain User Account</h2>
<p style="text-align: justify;">The process of creating a domain user account is more or less similar to the process of creating a local user account. The only difference is a few different options in the same type of screens and a few steps more in between.</p>
<p style="text-align: justify;">For example you need<strong> Active Directory Users and Computers</strong> MMC (Microsoft Management Console) to create domain account users instead of <strong>Local Users and Computers</strong> MMC. Also when you create a user in domain then a domain is associated with the user by default. However, you can change the domain if you want.</p>
<p style="text-align: justify;">Besides all this, although, a domain user account can be created in the <strong>Users </strong>container, it is always better to create it in the desired <strong>Organization Unit</strong> (<strong>OU</strong>).</p>
<p style="text-align: justify;">To create a domain user account follow the steps given below:</p>
<p style="text-align: justify;">1. Log on as Administrator and open <strong>Active Directory Users and Computers</strong> MMC from the <strong>Administrative Tools</strong> in <strong>Control Panel</strong>, as shown in Figure 9.</p>
<p style="text-align: justify;">2. Expand the OU in which you want to create a user, right-click the OU and select <strong>New-&gt;User</strong> from the menu that appears.</p>
<p style="text-align: center;"><img src="https://www.firewall.cx//images/stories/tk-windows-user-groups-9.gif" alt="tk-windows-user-groups-9" width="578" height="499" /></p>
<p style="text-align: center;">&nbsp;Figure 9</p>
<p style="text-align: justify;">3. Alternatively, you can click on <strong>Action </strong>menu and select <strong>New-&gt;User</strong> from the menu that appears.</p>
<p style="text-align: justify;">The <strong>New Object –User</strong> dialog box appears, as shown in Figure 10.</p>
<p style="text-align: justify;">4. Provide the <strong>First name</strong>, <strong>Last name</strong>, and <strong>Full name</strong> in their respective fields.</p>
<p style="text-align: justify;">5. Provide a unique logon name in <strong>User logon name</strong> field and then select a domain from the dropdown next to <strong>User logon name </strong>field if you want to change the domain name.</p>
<p style="text-align: justify;">The domain and the user name that you have provided will appear in the <strong>User logon name (pre-Windows 2000)</strong> fields to ensure that user is allowed to log on to domain computers that are using earlier versions of Windows such as Windows NT.</p>
<p style="text-align: center;"><img src="https://www.firewall.cx//images/stories/tk-windows-user-groups-10.gif" alt="tk-windows-user-groups-10" width="439" height="369" /></p>
<p style="text-align: center;">Figure 10</p>
<p style="text-align: justify;">6. Click <strong>Next</strong>.</p>
<p style="text-align: justify;">The second screen of <strong>New Object –User</strong> dialog box appears similar to Figure 4.</p>
<p style="text-align: justify;">7. Provide the <strong>User </strong>name and the <strong>Password </strong>in their respective fields.</p>
<p style="text-align: justify;">8. Select the desired password settings requirement:</p>
<p style="text-align: justify;">Select <strong>User must change password at next logon</strong> option if you want the user to change the password when the user first logs into computer. Select <strong>User cannot change password</strong> option if you do not want the user to change the password. Select <strong>Password never expires</strong> option if you do not want the password to become obsolete after a number of days. Select <strong>Account is disabled</strong> to disable this user account.</p>
<p style="text-align: justify;">9. Click <strong>Next</strong>.</p>
<p style="text-align: justify;">10. Verify the user details that you had provided and click <strong>Finish </strong>on the third screen of <strong>New Object –User</strong> dialog box.</p>
<p style="text-align: justify;">11. Follow the steps 9-13 mentioned in <strong>Creating a Local User Account</strong> section to associate a user to a group.</p>
<h2>Creating Groups</h2>
<p style="text-align: justify;">Just like user accounts, the groups on a <strong>Windows Server 2003</strong> are also of two types, the built in local groups and built in domain groups. The example of certain built in domain groups are: <strong>Account Operators</strong>, <strong>Administrators</strong>, <strong>Backup Operators</strong>, <strong>Network Configuration Operators</strong>, <strong>Performance Monitor Users</strong>, and <strong>Users</strong>. Similarly certain built in <strong>local groups</strong> are: <strong>Administrators</strong>, <strong>Users</strong>, <strong>Guests</strong>, and <strong>Backup operators</strong>.</p>
<p style="text-align: justify;">The built-in groups are created automatically when the operating system is installed and become a part of a domain. However, sometimes you need to create your own groups to meet your business requirements. The custom groups allow you limit the access of resources on a network to users as per your business requirements. To create custom groups in domain, you need to:</p>
<p style="text-align: justify;">1. Log on as Administrator and open <strong>Active Directory Users and Computers </strong>MMC from the <strong>Administrative Tools </strong>in <strong>Control Panel</strong>, as shown in Figure 9.</p>
<p style="text-align: justify;">2. <strong>Right-click</strong> the <strong>OU</strong> and select <strong>New-&gt;Group</strong> from the menu that appears.</p>
<p style="text-align: justify;">The <strong>New Object –Group</strong> dialog box appears, as shown in Figure 10.</p>
<p style="text-align: justify;">3. Provide the name of the group in the <strong>Group name</strong> field.</p>
<p style="text-align: justify;">The group name that you have provided will appear in the <strong>Group name (pre-Windows 2000)</strong> field to ensure that group is functional on domain computers that are using earlier versions of Windows such as Windows NT.</p>
<p style="text-align: justify;">4. Select the desired group scope of the group from the <strong>Group scope</strong> options.</p>
<p style="text-align: justify;">If the <strong>Domain Local</strong> Scope is selected the members can come from any domain but the members can access resources only from the local domain.</p>
<p style="text-align: justify;">If <strong>Global </strong>scope is selected then members can come only from local domain but can access resources in any domain.</p>
<p style="text-align: justify;">If <strong>Universal </strong>scope is selected then members can come from any domain and members can access resources from any domain.</p>
<p style="text-align: justify;">5. Select the group type from the <strong>Group Type</strong> options.</p>
<p style="text-align: justify;">The group type can be <strong>Security </strong>or <strong>Distribution </strong>. The Security groups are only used to assign and gain permissions to access resources and Distribution groups are used for no-security related tasks such as sending emails to all the group members.</p>
<p style="text-align: center;"><img src="https://www.firewall.cx//images/stories/tk-windows-user-groups-11.gif" alt="tk-windows-user-groups-11" width="439" height="369" /></p>
<p style="text-align: center;">Figure 11</p>
<p style="text-align: justify;">6. Click <strong>OK</strong>.</p>
<p style="text-align: justify;">You can add members to group just as you add groups to members. Just right-click the group in <strong>Active Directory Users and Computers</strong> node in the <strong>Active Directory Users and Computers</strong> snap-in, select <strong>Properties</strong>, click <strong>Members</strong> tab from the Properties window of the group and then follow the steps from 11-13 from <strong>Creating Local User Accounts</strong> section.</p>
<h2>Article Summary</h2>
<p style="text-align: justify;">Dealing with <strong>User &amp; Group accounts</strong> in a <strong>Windows Server environment</strong> is a very important everyday task for any Administrator. This article covered <strong>basic administration</strong> of <strong>user and group accounts</strong> at both <strong>local</strong> and <strong>domain</strong> environments.</p>]]></description>
			<category>Windows Servers</category>
			<pubDate>Fri, 10 Jun 2011 08:09:42 +1000</pubDate>
		</item>
	</channel>
</rss>
