Recent Discussions
Support for M365 Apps (O365) on Windows 2022
We have a large number of Windows Server 2016 with M365 Apps (O365) and need to upgrade these servers now (end of support for WS2016 is Jan 2022). The next server product to install for us would be Windows Server 2022, unfortunately there is no support for M365 apps (O365). In general, it looks like the support of M365 Apps for Server OS will be discontinued 2025. RE2OqRI (microsoft.com) We want to get a statement from Microsoft as to whether Microsoft intends to support M365 Apps (O365) on Windows Server 2022 at some point. Now we have to make a strategic decision. The time is not long until 2025! The way is not to AVD or Microsoft Azure HCI, but the way is away from the concept of application (or desktop) "remoting" and thus we as customers are no longer available for AVD and Windows 365!Solved95KViews30likes131CommentsServer 2025 Core ADDS DC, Network Profile Showing as "Public" and not as "DomainAuthenticated"
OS: Windows Server 20225 Standard Core (no GUI), build 26085.1 Role: ADDS, DNS ForestMode: Windows2025Forest DomainMode: Windows2025Domain Platform: Hyper-V guest When standing up a clean Windows Server 2025 using server core and configuring it as a domain controller, the network category (profile) always shows as "public." A clean load of Windows Server 2022 with server core as a domain controller has the same behavior. However, in Server 2022, the fix is to add DNS as a required service to the nlasvc (Network Location Awareness) service. Once that is done, the network category reflects "DomainAuthenticed" and persists between reboots. In Server 2025, the nlasvc service does not have the same requiredservices as Windows Server 2022, and it does not start automatically. Even after configuring the nlasvc service the same way it is in Server 2022 and adding DNS as a required service, the network category still reflects "public." The only way to get the network category to properly reflect the "DomainAuthenticated" status is to disable and reenable the network adapter after each reboot.10KViews12likes54CommentsAnnouncing Windows Server 2019 Preview Build 17623
Hello Windows Insiders! Today we are pleased to release the first build of the Windows Server 2019, our next Long-Term Servicing Channel (LTSC) release that contains both the Desktop Experience as well as Server Core in all 18 server languages, as well as the first build of the next Windows Server Semi-Annual Channel release. What’s New in Windows Server 2019 Build 17623 For every preview release, we will provide a focus area that we would like you to take a look at and provide us with feedback on. We encourage you to try out any functionality in the release and we welcome your feedback. Validation for every preview: There are two major areas that we would like you to try out in each preview release and report back any issues: In-place OS Upgrade (from Windows Server 2012 R2, Windows Server 2016) Application compatibility – please let us know if any server roles or applications stops working or fails to function as it used to Extending your Clusters with Cluster Sets “Cluster Sets” is the new cloud scale-out technology in this Preview release that increases cluster node count in a single SDDC (Software-Defined Data Center) cloud by orders of magnitude. A Cluster Set is a loosely-coupled grouping of multiple Failover Clusters: compute, storage or hyper-converged. Cluster Sets technology enables virtual machine fluidity across member clusters within a Cluster Set and a unified storage namespace across the "set" in support of virtual machine fluidity. While preserving existing Failover Cluster management experiences on member clusters, a Cluster Set instance additionally offers key use cases around lifecycle management of a Cluster Set at the aggregate. Windows Defender Advanced Threat Protection We provide deep platform sensors and response actions, providing visibility to memory and kernel level attacker activities and abilities to take actions on compromised machines in response to incidents such as remote collection of additional forensic data, remediating malicious files, terminating malicious processes etc. If you’re already using Windows Defender Advanced Threat Protection (ATP), preview these features by simply installing the latest preview build of Windows Server, and onboard it to Windows Defender ATP. Otherwise, sign up for the Windows Defender ATP trial on Windows Defender Advanced Threat Protection. Windows Defender ATP Exploit Guard Windows Defender ATP Exploit Guard is a new set of host intrusion prevention capabilities. The four components of Windows Defender Exploit Guard are designed to lock down the device against a wide variety of attack vectors and block behaviors commonly used in malware attacks, while enabling enterprises to balance their security risk and productivity requirements. Attack Surface Reduction (ASR): A set of controls that enterprises can enable to prevent malware from getting on the machine by blocking suspicious malicious files (e.g.: Office docs), scripts, lateral movement, ransomware behavior, and email-based threats Network protection: Protects the endpoint against web-based threats by blocking any outbound process on the device to untrusted hosts/IP through Windows Defender SmartScreen Controlled folder access: Protects sensitive data from ransomware by blocking untrusted processes from accessing your protected folders Exploit protection: A set of vulnerability exploit mitigations (replacing EMET) that can be easily configured to protect your system and applications To deploy a default set of Exploit Guard policy on Windows Server, you can run the following cmdlets: Set-MpPreference -EnableControlledFolderAccess Enabled Set-MpPreference -EnableNetworkProtection Enabled Add-MpPreference -AttackSurfaceReductionRules_Ids 75668C1F-73B5-4CF0-BB93-3ECF5CB7CC84 -AttackSurfaceReductionRules_Actions Enabled Add-MpPreference -AttackSurfaceReductionRules_Ids 3B576869-A4EC-4529-8536-B80A7769E899 -AttackSurfaceReductionRules_Actions Enabled Add-MpPreference -AttackSurfaceReductionRules_Ids D4F940AB-401B-4EfC-AADC-AD5F3C50688A -AttackSurfaceReductionRules_Actions Enabled Add-MpPreference -AttackSurfaceReductionRules_Ids D3E037E1-3EB8-44C8-A917-57927947596D -AttackSurfaceReductionRules_Actions Enabled Add-MpPreference -AttackSurfaceReductionRules_Ids 5BEB7EFE-FD9A-4556-801D-275E5FFC04CC -AttackSurfaceReductionRules_Actions Enabled Add-MpPreference -AttackSurfaceReductionRules_Ids BE9BA2D9-53EA-4CDC-84E5-9B1EEEE46550 -AttackSurfaceReductionRules_Actions Enabled Add-MpPreference -AttackSurfaceReductionRules_Ids 92E97FA1-2EDF-4476-BDD6-9DD0B4DDDC7B -AttackSurfaceReductionRules_Actions Enabled Add-MpPreference -AttackSurfaceReductionRules_Ids D1E49AAC-8F56-4280-B9BA-993A6D77406C -AttackSurfaceReductionRules_Actions Disabled Add-MpPreference -AttackSurfaceReductionRules_Ids 01443614-cd74-433a-b99e-2ecdc07bfc25 -AttackSurfaceReductionRules_Actions Enabled $url = 'https://demo.wd.microsoft.com/Content/ProcessMitigation.xml' Invoke-WebRequest $url -OutFile ProcessMitigation.xml Write-Host "Enabling Exploit Protection" Set-ProcessMitigation -PolicyFilePath ProcessMitigation.xml Windows Defender Application Control Windows Defender Application Control—also known as Code Integrity (CI) policy—was released in Windows Server 2016. Customer feedback has suggested that it is a great concept, but hard to deploy. To address this, we are building default CI policies, which will allow all Windows in-box files and Microsoft applications, such as SQL Server, and block known executables that can bypass CI. The package contains an audit version and an enforced version. If the server doesn’t require additional drivers/applications, you can deploy the enforced version. Otherwise, you can use the audit policy, check uncovered executables, and then merge them into the default CI policy. To deploy the default code integrity policy, run the following commands: Copy-Item C:\CI\ServerDefault-EnforcedCI.bin C:\Windows\System32\CodeIntegrity\SiPolicy.p7b Reboot the server to allow code integrity service to load the policy. Failover Cluster removing use of NTLM authentication Windows Server Failover Clusters no longer use NTLM authentication by exclusively using Kerberos and certificate based authentication. There are no changes required by the user, or deployment tools, to take advantage of this security enhancement. It also allows failover clusters to be deployed in environments where NTLM has been disabled. Shielded virtual machines: Offline mode, VMConnect and Shielded Linux support You can now run shielded virtual machines on machines with intermittent connectivity to the Host Guardian Service by leveraging the new fallback HGS and offline mode features. Fallback HGS allows you to configure a second set of URLs for Hyper-V to try if it can’t reach your primary HGS server. To see how this can be used in a branch-office scenario, see Improved branch office support for shielded VMs in Windows Server, version 1709 on our blog. Offline mode allows you to continue to start up your shielded VMs, even if HGS can’t be reached, as long as the VM has started successfully once, and the host’s security configuration has not changed. (To enable offline mode, run the following command on the Host Guardian Service: Set-HgsKeyProtectionConfiguration –AllowKeyMaterialCaching.) We’ve also made it easier to troubleshoot your shielded virtual machines by enabling support for VMConnect Enhanced Session Mode and PowerShell Direct. These tools are particularly useful if you’ve lost network connectivity to your VM and need to update its configuration to restore access. These features do not need to be configured, and they will automatically become available when a shielded VM is placed on a Hyper-V host running build 17040 or later. For customers who run mixed-OS environments, we now support running Ubuntu, Red Hat Enterprise Linux, and SUSE Linux Enterprise Server inside shielded virtual machines. Try it out—Create a Linux shielded VM template disk—and send us your feedback in the Feedback Hub. Encrypted Network in SDN Network traffic going out from a VM host can be snooped on and/or manipulated by anyone with access to the physical fabric. While shielded VMs protect VM data from theft and manipulation, similar protection is required for network traffic to and from a VM. While the tenant can setup protection such as IPSEC, this is difficult due to configuration complexity and heterogeneous environments. Encrypted Networks is a feature which provides simple to configure DTLS-based encryption using the Network Controller to manage the end-to-end encryption and protect data as it travels through the wires and network devices between the hosts It is configured by the Administrator on a per-subnet basis. This enables the VM to VM traffic within the VM subnet to be automatically encrypted as it leaves the host and prevents snooping and manipulation of traffic on the wire. This is done without requiring any configuration changes in the VMs themselves. Try it out—Configure Encryption for a Virtual Subnet—and send us your feedback in the Feedback Hub. Software Defined Datacenter If you are using Storage Spaces Direct, take a look at performance history for Storage Spaces Direct. Performance history for Storage Spaces Direct Administrators of Storage Spaces Direct can now get easy access to historical performance and capacity data from their cluster. Did CPU usage spike last night? When did this drive become slow? Which virtual machine used the most memory last month? Is network activity trending up or down? The cluster is pushing 1,000,000 IOPS – is that my new record? Previously, you’d need external tooling to answer these questions. No more! Previously, you’d need external tooling to answer these questions. No more! Beautiful new charts in Project Honolulu (and new PowerShell cmdlets, for those so inclined) empower you to answer these questions. There’s nothing to install, configure, or start – it’s built-in and always-on. Learn more at https://aka.ms/clusterperformancehistory. Available Content Windows Server 2019 Build 17623 is available in ISO format in 18 languages. This build and all future pre-release builds will require use of activation keys during setup. The following keys allow for unlimited activations: Datacenter Edition 6XBNX-4JQGW-QX6QG-74P76-72V67 Standard Edition MFY9F-XBN2F-TYFMP-CCV49-RMYVH Windows Server vNext Semi-Annual Build 17623 The Server Core Edition is available in English only, in ISO or VHDX format. The images are pre-keyed - no need to enter a key during setup. Symbols are available on the public symbol server – see Update on Microsoft’s Symbol Server blog post and Using the Microsoft Symbol Server. As before, matching Windows Server container images will be available via Docker Hub. For more information about Windows Server containers and Insider builds, click here. This build will expire July 2nd, 2018 How to Download To obtain the Insider software downloads, registered Insiders may navigate directly to the Windows Server Insider Preview download page. If you have not yet registered as an Insider, see GETTING STARTED WITH SERVER on the Windows Insiders for Business portal. It's all about your feedback! The most important part of a frequent release cycle is to hear what’s working and what needs to be improved, so your feedback is extremely valued. Use your registered Windows 10 Insider device and use the Feedback Hub application. In the app, choose the Server category and then the appropriate subcategory for your feedback. Please indicate what build number you are providing feedback on. We also encourage you to visit the Windows Server Insiders space on the Microsoft Tech Communities forum to collaborate, share and learn from experts. Known issues In‑place OS upgrade: Domain Controllers. During an in-place OS upgrade, Active Directory (AD) Domain Controllers (DC) might not be upgraded correctly. So, back up any AD DCs before performing an in-place OS upgrade. Editing or creating policies for AppLocker can cause the MMC snap-in to crash when generated rules for a packaged app. After upgrading the operating system, the AppX database may have corrupted entries, which causes problems for components that use those entries. Testing of the Windows core may fail because of a timeout while attempting to load the test libraries Terms of Use All pre-release software made available to you via the Windows Server Insider program are governed by the Insider Terms of Use, which takes precedence over any license agreement that may be in the product.22KViews12likes0CommentsWindows Server 2022 adds support for Microsoft 365 Apps
Updating our support policy through October 2026 Based on feedback from customers, we are happy to share that we are updating our support policy for Microsoft 365 Apps on Windows Server 2022. Support for on-premises and Azure deployments will be available through October 2026. This covers the period in which Windows Server 2022 is in mainstream support. Support for running Microsoft 365 Apps on Windows Server 2022 is currently in preview. If you want to begin testing on Windows Server 2022, we recommend that you use the most current, supported version of Microsoft 365 Apps available in Current Channel. We will provide information about which versions of Microsoft 365 Apps are supported on Windows Server 2022 at a later date. We will be updating our support pages and documentation in the coming days.43KViews11likes25CommentsAccessing trials and kits for Windows Server
Updated May 20, 2022: This issue is now resolved. Please visit the Microsoft Evaluation Center at www.microsoft.com/EvalCenter for access to the latest trials and evaluations for Windows client, Windows Server, and other Microsoft products and kits. As you may have noticed, the Microsoft Evaluation Center is temporarily unavailable. While work is underway to restore this valuable service, you can access Windows Server and Windows client trials, evaluations, and related kits at the links below. Windows Server 180-day evaluations Windows Server 2022 Windows Server 2019 de-de: ISO de-de: ISO en-us: ISO en-us: ISO en-us: VHD en-us: VHD en-us: LOF - ISO en-us: FOD - ISO es-es: ISO es-es: ISO fr-fr: ISO fr-fr: ISO it-it: ISO it-it: ISO ja-jp: ISO ja-jp: ISO ru-ru: ISO ru-ru: ISO zh-cn: ISO zh-cn: ISO Windows Server on Azure Windows Server on Azure Create a Windows Server VM in Azure LOF = language packs and optional features FOD = features on demand Windows Virtual Hardware Lab Kit (VHLK) VHD version VHLK for Windows 11 VHLK for Windows Server 2022 VHLK for Windows 10, version 2004 Windows client 90-day evaluations Windows 11 Enterprise Windows 10 Enterprise Windows 10 Enterprise LTSC de-de: x64 de-de: x64 | x86 de-de: x64 | x86 en-gb: x64 en-gb: x64 | x86 en-gb: x64 | x86 en-us: x64 en-us: x64 | x86 en-us: x64 | x86 es-es: x64 es-es: x64 | x86 es-es: x64 | x86 fr-fr: x64 fr-fr: x64 | x86 fr-fr: x64 | x86 it-it: x64 it-it: x64 | x86 it-it: x64 | x86 ja-jp: x64 ja-jp: x64 | x86 ja-jp: x64 | x86 ko-kr: x64 ko-kr: x64 | x86 ko-kr: x64 | x86 pt-br: x64 pt-br: x64 | x86 pt-br: x64 | x86 zh-cn: x64 zh-cn: x64 | x86 zh-cn: x64 | x86 zh-tw: x64 zh-tw: x64 | x86 zh-tw: x64 | x86 Deployment lab kits Lab kit Windows 11 and Office 365 Deployment Lab Kit (+ lab guides) Windows 10 and Office 365 Deployment Lab Kit (+ lab guides) Note: The Deployment Lab Kits include the 90-day evaluations of Windows 11 or Windows 10 listed above. They are updated every 90 days with a fresh version of the 90-day evaluation software. As a result, please note that the Windows 10 deployment lab kit will be refreshed by May 16 th with a new 90-day evaluation of Windows 10 Enterprise.97KViews10likes37CommentsWindows Server 2025 Public Preview
Windows Server 2025 Public Preview See Ian LeGrow's blog post: Gain enhanced security and performance with Windows Server 2025—now in preview - Microsoft Windows Server Blog Today we are pleased to announce the availability of Windows Server 2025 public preview to the Microsoft Eval Center and VSS developer/IT communities. This preview contains both the Desktop Experience and Server Core installation options for Datacenter and Standard editions. Visit the Microsoft Eval Center to download the Windows Server 2025 preview and try out the new features and experiences that Windows Server has to offer. Visual Studio Subscriptions customers can access the Windows Server 2025 preview software through Subscriber Downloads to begin software and LOB application development and deployment validations to support customers and businesses in adopting and deploying Windows Server 2025. See What's new in Windows Server 2025 for more information on what is coming later this Fall. We value your feedback! The most important part of the release cycle is to hear what's working and what needs to be improved, so your feedback is extremely valued. Please use the new Feedback Hub app for Windows Server if you are running a Desktop version of Server. If you are using a Core edition, or if you are unable to use the Feedback Hub app, you can use your registered Windows 10 or Windows 11 Insider device and use the Feedback Hub application. In the app, choose the Windows Server category and then the appropriate subcategory for your feedback. In the title of the Feedback, please indicate the build number you are providing feedback on as shown below to ensure that your issue is attributed to the right version: [Server #####] Title of my feedback See Give Feedback on Windows Server via Feedback Hub for specifics. The Windows Server Insiders space on the Microsoft Tech Communities supports preview builds of the next version of Windows Server. Use the forum to collaborate, share and learn from experts. For versions that have been released to general availability in market, try the Windows Server for IT Pro forum or contact Support for Business. Diagnostic and Usage Information Microsoft collects this information over the internet to help keep Windows secure and up to date, troubleshoot problems, and make product improvements. Microsoft server operating systems can be configured to turn diagnostic data off, send Required diagnostic data, or send Optional diagnostic data. During previews, Microsoft asks that you change the default setting to Optional to provide the best automatic feedback and help us improve the final product. Administrators can change the level of information collection through Settings. For details, see http://aka.ms/winserverdata. Also see the Microsoft Privacy Statement.Windows Server on ARM64 (Insider Previews)
When will there be a preview build of Windows Server on ARM? There is demand for it from developers, and devops personal as well. It is known that it already partial exists due to the article on Azure Host OS. Azure Host OS – Cloud Host - Microsoft Community Hub Please release this so we can test it against our code.38KViews9likes21CommentsMicrosoft Hyper-V Server 2019 is live on the Microsoft Evaluation Center!!
https://www.microsoft.com/en-us/evalcenter/evaluate-hyper-v-server-2019 Also live on Visual Studio Subscriptions on 6/19/19: https://my.visualstudio.com/Downloads?q=Microsoft%20Hyper-V%20Server%202019. Thank you for your patience.31KViews8likes33CommentsWindows Admin Center 2410: cannot add computers
After a fresh installation of Windows Admin Center 2410, I cannot add any servers, clusters, PCs etc. WAC gives me "You can add this computer to your list of connections, but we can't confirm it's available" when I enter a computer name (either of FQDN or computer name alone). When I change to the Search Active Directory tab, I get: "We can’t search Active Directory because the Windows Admin Center computer isn’t joined to an Active Directory domain. It’s also possible that your account doesn’t have permission to read from Active Directory." The account I use is a domain admin, and the server running WAC is definitely joined to the AD DS. The server had the previous version of WAC installed where everything worked. Now, with the new version, that's no longer the case...3.4KViews8likes14CommentsAnnouncing Windows Server 2025 Security Baseline Preview
Announcing Windows Server 2025 Security Baseline Preview Hello Windows Server Insiders! Today we are pleased to announce the Windows Server 2025 Security Baseline Preview. You can enable security right from the start by applying the recommended security posture for your device or VM role through application of a tailored security baseline, with over 350 preconfigured Windows security settings that help you apply and enforce granular security settings that support best practices recommended by Microsoft and Industry standards. We have organized the Windows Server 2025 Security Baseline content into three categories based on your server role: Domain Controller (DC) Member Server Workgroup Member In addition, you can apply baselines with dedicated security settings specific to: Windows Defender Antivirus (48) Secured-Core (6) Main Highlights of the security baseline are the following enforcements: Secured-Core – UEFI MAT, Secure Boot, Signed Boot Chain Account and password policies Security Policies and Security Options Protocols: TLS Enforced >1.2+, SMB 3.0+, Kerberos AES, etc. Credentials Protections (LSASS/PPL) And many more. Please review the GitHub repository for what settings comprise of each definition: https://github.com/microsoft/osconfig/blob/main/security/SecurityBaseline_WindowsServer_2025-2409.csv Customer Experience: The customer experience to apply baselines for individual machines, including image customizations are: PowerShell cmdlets Windows Admin Center (WAC) For at-scale operations, you can apply baseline and monitor using Azure Policy and Azure Automanage Machine Configuration and see your compliance score. The baseline experience is powered by ‘OSConfig - our newly introduced security configuration platform’. Once applied, your baseline settings are protected from any drift automatically, which is one of the key features of the security platform. The WAC, Azure Policy and Azure Automanage Machine Configuration experiences will be released soon to the Windows Insider Program. This mechanism will not work for any earlier version of Windows Server. 1. Download prerelease modules from the PowerShell Gallery If you have not previously configured your system to pull modules from the PowerShell Gallery, please do so using the following steps: a. Open an elevated PowerShell window (not the x86 version) b. Run Install-PackageProvider NuGet, PowerShellGet -Force c. Open a new elevated PowerShell window d. Run Set-PSRepository -Name PSGallery -InstallationPolicy Trusted 2. Install the OSConfig PowerShell module Run Install-Module -Name Microsoft.OSConfig -AllowPrerelease -Scope AllUsers -Repository PSGallery -Force To verify if the OSConfig module is installed, run Get-Module -ListAvailable -Name Microsoft.OSConfig 3. Apply the Security Baseline via PowerShell cmdlets For domain-joined device, run Set-OSConfigDesiredConfiguration -Scenario SecurityBaseline\WS2025\MemberServer -Default For workgroup device, run Set-OSConfigDesiredConfiguration -Scenario SecurityBaseline\WS2025\WorkgroupMember -Default For domain controller device, run Set-OSConfigDesiredConfiguration -Scenario SecurityBaseline/WS2025/DomainController -Default For Secured-core, Run Set-OSConfigDesiredConfiguration -Scenario SecuredCore -Default For Defender Antivirus, Run Set-OSConfigDesiredConfiguration -Scenario Defender\Antivirus -Default Restart machine 4. Customize the Security Baseline via PowerShell cmdlets Example using AuditDetailedFileShare for Member Server device (where the default value is 2) Run Set-OSConfigDesiredConfiguration -Scenario SecurityBaseline\WS2025\MemberServer -Name AuditDetailedFileShare -Value 3 Run Get-OSConfigDesiredConfiguration -Scenario SecurityBaseline\WS2025\MemberServer -Name AuditDetailedFileShare Check that the value is now 3. 5. View compliance of the Security Baseline via PowerShell cmdlets Run Get-OSConfigDesiredConfiguration -Scenario SecuredCoreState Run Get-OSConfigDesiredConfiguration -Scenario SecurityBaseline\WS2025\MemberServer | ft Name, @{ Name = "Status"; Expression={$_.Compliance.Status} }, @{ Name = "Reason"; Expression={$_.Compliance.Reason} } -AutoSize -Wrap 6. Most Common tasks impacted/Known Issues after applying baseline Note: (Please read before exercising the scenario! Also, these scripts are for preview only and should not be used in production.) Password requirements are Complexity and Minimum of 14-character length. This only applies to local user accounts; when signing in with a domain account, domain requirements prevail for domain accounts. TLS connections are subject to a minimum of TLS/DTLS 1.2 or higher. May prevent connections to older systems. Copy/Paste of files from RDP sessions is disabled. If you need to use this function, run: Set-OSConfigDesiredConfiguration -Scenario SecurityBaseline\WS2025\[role being applied] -Name RemoteDesktopServicesDoNotAllowDriveRedirection -Value 0 and then reboot. SMB connections are subject to a minimum of 3.0 or higher (available as of WS2012). Connecting to non-windows systems (like Linux SAMBA) must support SMB 3.0, or adjustments to the baseline are needed. You may run into a few user rights errors depending on your domain configuration. It does not impact the rest of the security baseline and can be ignored. We are working on fixing it. See MSLearn doc for details. If you are configuring the same settings with two different tools (one being OSConfig in this case), there will be conflicts, especially with drift control involved. See MSLearn doc for details. In case you are blocked or experiencing a work disruption after applying the security baseline: File a bug in feedback hub under Category Windows Server-> Security Configuration Management You should preview the security baseline only on test systems. While there is a ‘Remove’ command, not all configurations can be reversed. Open an elevated PowerShell window, run Remove-OSConfigDesiredConfiguration -Scenario SecurityBaseline\WS2025\MemberServer and then reboot. We value your feedback! Please provide feedback as to what is working and what needs to be improved as your feedback is extremely valued to make the product experience better. Please use Feedback Hub app for Windows Server 2025. Category: Windows Server->Security Configuration Management You can also reach us via email at heseccon@microsoft.com Edge Security Connect. What’s coming? We will also share a Windows Admin Center, Azure Policy and Azure Automanage Machine Configuration experience, to try out for getting full E2E experience & Application control for Windows Insider Program!!HOW-TO: Import Out of Band Updates to WSUS using Microsoft Edge Chromium IE Mode and PowerShell
----- I recommend using https://www.powershellgallery.com/packages/Import-WSUSUpdate Full instructions to install the module are located here - https://www.ajtek.ca/blog/the-new-way-to-import-updates-into-wsus/ ----- History: 09/12/2023 - adding PowerShell method to the OP 07/30/2023 - please follow the latest comments for the updated approach using PowerShell. The method in the OP has become obsolete 01/13/2022 - update links and clarification to prevent an error "This update cannot be imported into Windows Server Update Services, because it is not compatible with your version of WSUS", added Troubleshooting and Q&A section. 02/11/2021 - initial version PREREQUISITES: Windows 10 / 11 / Windows Server 2016 or later with WSUS RSAT Tool installed. latest Microsoft Edge installed, version 97 as of time of writing. Internet Explorer (mode) is installed in Settings > Apps > Optional Features or equivalent location in Windows 11 HOW-TO: - Open Edge 97 or later - Open Microsoft Edge Options > Default Browser - Change "Allow Sites to be reloaded in Internet Explorer Mode" to 'Allow' - Add links to add to Microsoft Edge IE Mode - Remove all other links in the scope of *.catalog.update.microsoft.com, only these shall remain for the catalog.update.microsoft.com page. https://catalog.update.microsoft.com/ https://catalog.update.microsoft.com/v7/site/Home.aspx see screenshots below for better illustration. - Close Edge and all catalog tabs if there were any open, especially if you use "Open tabs from the previous session" feature - Open WSUS MMC and right click Updates from the tree > Import Updates - The link in Edge should open in IE mode, there are several indicators on this the open tab to point to https://catalog.update.microsoft.com/v7/site/Home.aspx?SKU=WSUS&Version=10.0.xxxxx.xxxx&ServerName=YOURSERVER.CONTOSO.LOCAL&PortNumber=8531&Ssl=True&Protocol=1.20 NOTES 1.When the link opened in importing updates from WSUS MMC does not contain the "v7/site/" part or does contain a https://www.update instead of https://catalog.update your configuration is wrong. 2. The "Default" setting will not be sufficient to allow the installation and use of the ActiveX plugin. Go back to your update catalog tab, Install the ActiveX if you have not done on this box already. Check if you have not setup restrictions to execute or install ActiveX plugins in IE directly or via group policy. 3. Edge now has the ability to an IE Mode button. Also it has a new feature to automatically add pages to the exception list. Do not use this ability as shown in the picture for this use case as it might add wrong exceptions to the list. 4. When there are wrong exceptions in the exception list for IE mode it might not work correctly and cause a missing but very important redirection, which ultimately cause the import to fail. More troubleshooting assistance below. LINKS STARTING FROM DECEMBER 2021 / JANUARY 2022: Links to add to Microsoft Edge IE Mode https://catalog.update.microsoft.com/ https://catalog.update.microsoft.com/v7/site/Home.aspx TROUBLESHOOTING: Q 1: Microsoft Edge does not allow me to configure any IE Site Mode links (greyed out). A: Either you have not enabled "Allow Sites to be reloaded in Internet Explorer Mode" to 'Allow', or your enterprise has set policies to prevent that. This should be clearly indicated by a lock and message in the Edge settings tab. Q 2: I have followed this guide or a previous version. I can see the cart to import into WSUS but cannot import any or just specific updates. Others fail with a message "This update cannot be imported into Windows Server Update Services, because it is not compatible with your version of WSUS". A: This is a "known" issue and the guide has been updated to reflect this issue and a potential change on the server-side. Please make sure only the two links are included in your IE mode list. They may not include www in the link name. You need to include both links, not just one or the other as in the previous version of this guide. Q 3: May I use the new Edge feature in Settings > Appearance > Internet Explorer Mode button A: I would recommend to refrain using this feature, as the mechanism between WSUS update import and the browser is extremly picky. It would not work if you just copy the same link into a browser tab. The feature of the cart to import into WSUS will be likely missing and you can just download to the Download folder instead. Q 4: Edge offers me to restart this tab in IE mode next time. A: you should not receive this message, otherwise the exceptions as stated in the guide are invalid or you have more than the stated links in place. Go through the guide again and double-check. Do not use this otherwise nice feature. It will cause to add more catalog links to the exception list which will cause an issue to import updates to WSUS, as described in Q #2. Thanks for the hint Eric_VanAelstyn, thanks to abbodi1406 for additional hints after this guide got invalid a redirection change in December 2021 / January 2022. cc AriaUpdated MissyQ cc for the other teams as I did not want to repost it in Edge and Servicing communities, unless you insist 🙂Solved160KViews8likes40CommentsAzure üzerinde Windows Server 2022 Datacenter Preview deneyimi (tr-TR)
Azure üzerinde Windows Server 2022 preview versiyonunu incelemek ve test etmek isterseniz Azure marketinde bulunan Microsoft Server Operating Systems Preview işinize yarayacaktır. Windows Server 2022 için Core ve GUI opsiyonları ile ilgili deneyimi edinebilirsiniz. Azure arama bölümüne “Microsoft Server Operating Systems Preview” yazarak marketten seçip gelen ekran üzerinde oluştur butonuna basarak Windows Server 2022 deneyimimiz için VM hazırlıklarına başlıyoruz. “Sanal makine oluştur” bölümünde “temel ayarlar” sekmesinde abonelik, kaynak grubu, sanal makine adı, bölge, görüntü, boyut, kullanıcı adı ve şifremizi belirliyoruz. Burada önemli olan görüntü olarak Windows Server 2022 Datacenter – 1.nesil seçmiş olmanızdır. Erişim portunuzu ve lisans opsiyonları kendinize göre düzenleyebilirsiniz. “diskler” sekmesinde tercihinize göre disk tipinizi seçiniz. “Ağ iletişimi” sekmesinde seçimlerinizi tanımlayınız. Mevcut bir networkunuz yoksa bu bölümde oluşturabilirsiniz. Azure network detaylı kurulum ve yapılandırma için tıklayınız. “yönetim” sekmesinde yönetimsel tercihlerinizi kişiselleştirebilirsiniz. “gelişmiş” sekmesinde kritik olarak VM neslini tercihinizi belirlemenizdir. Ben 1. Nesil olarak seçimimi yapıyorum “Etiketler” sekmesinde kendinize göre etiketleme yapabilirsiniz. VM kurulumumuzda son olarak “Gözden geçir + oluştur” sekmesinde özetimizi kontrol ediyoruz ve “oluştur” butonuna basıyoruz. Oluştur bastıktan sonra dağıtım başlayacaktır. Tebrikler Windows server 2022 Datacenter sürümümüz azure üzerinde işleme hazırdır. İyi eğlenceler Bizi Windows Server 2022 de neler bekliyor: Güvenli çekirdekli sunucu ile kolayca etkinleştirilen tehditlere karşı gelişmiş çok katmanlı koruma özelliği. Varsayılan olarak etkinleştirilen HTTPS ve TLS 1.3 desteği dahil, aktarım sırasında ek bir güvenlik katmanı ile iş açısından kritik varlıklara güvenli bağlantı yapabilme imkanı. Azure Arc ile Windows Server’ı daha etkin bir şekilde yönetip, kontrol edebilme özelliği En son Windows Admin Center ile daha iyi sanal makine yönetimi elde edebilme ki eski sürümlerde de oldukça başarılı bir şekilde WAC Windows Server 2022 ile daha ileri seviyede devam edecek gibi görünüyor. Storage Migration Service’inde (Depolama Geçiş Hizmeti) desteklenen yeni senaryo ile dosya sunucularını şirket içinden Azure’a taşıma imkanı sunacak. Daha hızlı indirme ve basitleştirilmiş ağ ilkesi uygulaması için daha küçük imaj boyutuyla konteyner uygulama dağıtımını iyileştirebilme. Windows Admin Center’daki yeni konteynere alma aracıyla .NET uygulamalarını güncelleyebilme imkanı.2.5KViews8likes0CommentsWindows Server 2022 Product Key
Good Morning everyone! I am new to using Server Insider builds, (i have used normal Win10 builds for many years) just wondering where i could find & use a product key to activate Windows Server 2022 (latest built). Any help would be great 😄 Thanks, JaySolved381KViews8likes26CommentsMost Common Mistakes in Active Directory ...
Here are some useful links to help you avoid making these common mistakes with Active Directory... Most Common Mistakes in Active Directory and Domain Services – Part 1 – MEA SI Blog https://blogs.technet.microsoft.com/meamcs/2018/12/31/most-common-mistakes-in-active-directory-and-domain-services-part-1/ Most Common Mistakes in Active Directory and Domain Services – Part 2 – MEA SI Blog https://blogs.technet.microsoft.com/meamcs/2019/01/08/most-common-mistakes-in-active-directory-and-domain-services-part-2/3.3KViews7likes3CommentsActive Directory Advanced Threat Hunting - Tracing the cause of account lockouts and password errors
Dear Microsoft Active Directory friends, In this article we are going on a "search for clues" :-). In the life of an IT administrator, you have certainly often had to reset a user's password or remove an account lockout. Now the question arises on which system the account was locked or on which system the password was entered incorrectly. In order to determine this information with PowerShell, some preparations must be made. "Advanced Audit Policy Configuration" must be configured in the group policies. This article from Microsoft provides a good starting point: https://learn.microsoft.com/en-us/defender-for-identity/deploy/event-collection-overview In my example, I have adapted the Default Domain Controls Policy. Before we begin, here is some important information about MITRE techniques: Account Access Removal: https://attack.mitre.org/techniques/T1531/ User Account: https://attack.mitre.org/datasources/DS0002/ Brute Force: Password Spraying: https://attack.mitre.org/techniques/T1110/003/ Account lockouts are logged in the Windows event logs with the ID 4740. We will therefore focus on this event ID first. The start of the PowerShell script looks like this: #Prep work for lockouts, Account lockout Event ID $LockOutID = 4740 #Find the PDC (Get-ADDomain).PDCEmulator $PDCEmulator = (Get-ADDomain).PDCEmulator #Connect to the PDC Enter-PSSession -ComputerName $PDCEmulator #Query event log Get-WinEvent -ComputerName $PDCEmulator -FilterHashtable @{ LogName = 'Security' ID = $LockOutID } #Parse the event and assign to a variable $events = Get-WinEvent -ComputerName $PDCEmulator -FilterHashtable @{ LogName = 'Security' ID = $LockOutID } #Examine some properties $events[0].Message #Regex? $events[0].Message -match 'Caller Computer Name:\s+(?<caller>[^\s]+)' $Matches.caller #Cool, but not as easy as: $events[0].Properties $events[0].Properties[1].Value #For all events: ForEach($event in $events){ [pscustomobject]@{ UserName = $event.Properties[0].Value CallerComputer = $event.Properties[1].Value TimeStamp = $event.TimeCreated } } #And we'll make that a function Function Get-ADUserLockouts { [CmdletBinding( DefaultParameterSetName = 'All' )] Param ( [Parameter( ValueFromPipeline = $true, ParameterSetName = 'ByUser' )] [Microsoft.ActiveDirectory.Management.ADUser]$Identity ) Begin{ $LockOutID = 4740 $PDCEmulator = (Get-ADDomain).PDCEmulator } Process { If($PSCmdlet.ParameterSetName -eq 'All'){ #Query event log $events = Get-WinEvent -ComputerName $PDCEmulator -FilterHashtable @{ LogName = 'Security' ID = $LockOutID } }ElseIf($PSCmdlet.ParameterSetName -eq 'ByUser'){ $user = Get-ADUser $Identity #Query event log $events = Get-WinEvent -ComputerName $PDCEmulator -FilterHashtable @{ LogName = 'Security' ID = $LockOutID } | Where-Object {$_.Properties[0].Value -eq $user.SamAccountName} } ForEach($event in $events){ [pscustomobject]@{ UserName = $event.Properties[0].Value CallerComputer = $event.Properties[1].Value TimeStamp = $event.TimeCreated } } } End{} } #Usage Get-ADUserLockouts #Single user Get-ADUser 'jesse.pinkman' | Get-ADUserLockouts Now we come to the incorrectly entered passwords. These events are logged in the Windows event logs with the ID 4625. #Prep work for bad passwords - Event ID $badPwId = 4625 #Get the events from the PDC $events = Get-WinEvent -ComputerName $PDCEmulator -FilterHashtable @{ LogName = 'Security' ID = $badPwId } #Correlate the logon types $LogonType = @{ '2' = 'Interactive' '3' = 'Network' '4' = 'Batch' '5' = 'Service' '7' = 'Unlock' '8' = 'Networkcleartext' '9' = 'NewCredentials' '10' = 'RemoteInteractive' '11' = 'CachedInteractive' } #Format the properties ForEach($event in $events){ [pscustomobject]@{ TargetAccount = $event.properties.Value[5] LogonType = $LogonType["$($event.properties.Value[10])"] CallingComputer = $event.Properties.Value[13] IPAddress = $event.Properties.Value[19] TimeStamp = $event.TimeCreated } } #Bring it all together in a function Function Get-ADUserBadPasswords { [CmdletBinding( DefaultParameterSetName = 'All' )] Param ( [Parameter( ValueFromPipeline = $true, ParameterSetName = 'ByUser' )] [Microsoft.ActiveDirectory.Management.ADUser]$Identity ) Begin { $badPwId = 4625 $PDCEmulator = (Get-ADDomain).PDCEmulator $LogonType = @{ '2' = 'Interactive' '3' = 'Network' '4' = 'Batch' '5' = 'Service' '7' = 'Unlock' '8' = 'Networkcleartext' '9' = 'NewCredentials' '10' = 'RemoteInteractive' '11' = 'CachedInteractive' } } Process { If($PSCmdlet.ParameterSetName -eq 'All'){ #Query event log $events = Get-WinEvent -ComputerName $PDCEmulator -FilterHashtable @{ LogName = 'Security' ID = $badPwId } }ElseIf($PSCmdlet.ParameterSetName -eq 'ByUser'){ $user = Get-ADUser $Identity #Query event log $events = Get-WinEvent -ComputerName $PDCEmulator -FilterHashtable @{ LogName = 'Security' ID = $badPwId } | Where-Object {$_.Properties[5].Value -eq $user.SamAccountName} } ForEach($event in $events){ [pscustomobject]@{ TargetAccount = $event.properties.Value[5] LogonType = $LogonType["$($event.properties.Value[10])"] CallingComputer = $event.Properties.Value[13] IPAddress = $event.Properties.Value[19] TimeStamp = $event.TimeCreated } } } End{} } #Usage Get-ADUserBadPasswords | Format-Table #Single account Get-ADUser administrator | Get-ADUserBadPasswords | Format-Table I hope that this information is helpful to you and that you have been given a good "little" foundation. This article/information is by no means complete and exhaustive. But I still hope that this information is helpful to you. Thank you for taking the time to read the article. Happy Hunting, Tom Wechsler P.S. All scripts (#PowerShell, Azure CLI, #Terraform, #ARM) that I use can be found on github! https://github.com/tomwechslerAzure üzerinde Windows Server 2019 in-place upgrade Windows Server 2022 Preview (tr-TR)
Azure üzerinde bulunan Windows Server 2019 sunucunuzu Windows Server 2022 preview versiyonuna in-place upgade için Windows Server 2022 ISO nuzu aşağıdaki linkten indirebilirsiniz. İşlemlere başlamadan sunucuzun image azlı yedeğini aldığınızdan emin olunuz yükleme sırasında oluşabilecek bir sorun durumunda veri kaybetmemek için in-place upgrade işlemlerinde bir yedeğiniz olmasını tavsiye ediyorum. Bizi Windows Server 2022 de neler bekliyor: Güvenli çekirdekli sunucu ile kolayca etkinleştirilen tehditlere karşı gelişmiş çok katmanlı koruma özelliği. Varsayılan olarak etkinleştirilen HTTPS ve TLS 1.3 desteği dahil, aktarım sırasında ek bir güvenlik katmanı ile iş açısından kritik varlıklara güvenli bağlantı yapabilme imkanı. Azure Arc ile Windows Server’ı daha etkin bir şekilde yönetip, kontrol edebilme özelliği En son Windows Admin Center ile daha iyi sanal makine yönetimi elde edebilme ki eski sürümlerde de oldukça başarılı bir şekilde WAC Windows Server 2022 ile daha ileri seviyede devam edecek gibi görünüyor. Storage Migration Service’inde (Depolama Geçiş Hizmeti) desteklenen yeni senaryo ile dosya sunucularını şirket içinden Azure’a taşıma imkanı sunacak. Daha hızlı indirme ve basitleştirilmiş ağ ilkesi uygulaması için daha küçük imaj boyutuyla konteyner uygulama dağıtımını iyileştirebilme. Windows Admin Center’daki yeni konteynere alma aracıyla .NET uygulamalarını güncelleyebilme imkanı. Windows server 2022 iso download: target=_blankhttps://www.microsoft.com/en-us/evalcenter/evaluate-windows-server-2022-preview İndirmiş olduğunuz isoyu çift tıklayarak Windows Server 2019 sisteminize mount ediniz. Mount etmiş olduğunuz isoyu çalıştırınız. Güncelleme ve sistem gereksinimleri kontrolünden sonra yükseltmek istediğimiz Windows Server 2022 versiyonu için hazır duruma gelecektir. Yüksetlme yapmak istediğiniz işletim sistemini seçiniz. Ben mevcut sürümümde olduğu gibi Windows Server 2022 Datacenter Experience seçiyorum. Lisans sözleşmesini kabul ediyoruz. Güncelleme ve sistem gereksinimleri kontrolünden sonra yükleme için hazır duruma gelecektir. Install Butonuna basarak yükleme işlemini başlatabilirsiniz. Sunucunuz üzerinde ki role and features ve data durumuna göre bir sonraki ekranda dosyaları korumak istiyor musunuz yada bir temiz kurulum mu istiyorsunuz soracaktır tercihinize göre seçim yapabilirsiniz. Not: Mevcut sistemin güncel ve sağlam yedeği olduğundan emin olunuz. Bu sürüm preview sürümü olduğu için temiz kurulum ile devam ediyorum. Yükleme işlemi kullanmış olduğunuz azure vm size göre değişiklik gösterebilir. Ortalama 30 ile 60 dk arasına yükleme işleminiz tamamlanacaktır. Yükleme tamamlandığında sisteminiz otomatik yeniden başlayacaktır. Yükleme işleminiz tamamlandığında Windows Server 2022 işletim sisteminiz hazır olacaktır. Windows Server 2022 preview kurulum ve ilk inceleme detayları için aşağıdaki videoyu inceleyebilirsiniz. h target=_blankttps://www.youtube.com/watch?v=qhy1FDpqGe4 Süreci sizde test etmek yada deneme isterseniz aşağıdaki linkten Azure üzerinde hızlıca Windows Server 2019 kurulumu yapabilir ve bu makaledeki işlemleri deneyebilirsiniz. h target=_blankttps://techcommunity.microsoft.com/t5/azure/azure-cloud-shell-ile-windows-server-2019-vm-olusturma-tr-tr/m-p/13958022.5KViews7likes0CommentsAnnouncing a Windows Server AMA
We are very excited to announce a Windows Server AMA! The AMA will take place on Wednesday, June 2, 2021, from 10:00 a.m. to 11:00 a.m. PT in the Windows Server AMA space. Add the event to your calendar and view it in your time zone here. An AMA is a live text-based online event similar to a “YamJam” on Yammer or an “Ask Me Anything” on Reddit. This AMA gives you the opportunity to connect with Microsoft product experts who will be on hand to answer your questions and listen to feedback. The space will be open 24 hours before the event, so feel free to post your questions anytime beforehand during that period if it fits your schedule or time zone better.5.8KViews7likes2CommentsWindows Server 2022 Preview Available on Microsoft Evaluation Center
Hello Windows Insiders! Windows Server 2022 brings innovation to Windows Server that enables customers to run their existing and new business critical applications with confidence. Windows Server 2022 brings the latest in security innovation, unique hybrid capabilities, and enhancements for modern applications. As a part of the release, we are bringing Secured-core to Windows Server to secure system running applications and services on Windows Server 2022. Secured-core builds on technologies such as System Guard and Windows Server Virtualization-based Security to minimize risk from firmware vulnerabilities and advanced malware. The new release also provides secured connectivity enabled by industry standard AES 256 encryption. Also, this release packs in significant improvements to Windows container runtime such as cross-version compatibility and containerization tools for .NET, ASP.NET and IIS applications. Try the preview here: Microsoft Evaluation Center. Evaluation versions do not require a product key, and expire in 180 days. We value your feedback! The most important part of a frequent release cycle is to hear what's working and what needs to be improved, so your feedback is extremely valued. For Windows Server, use your registered Windows 10 Insider device and use the Feedback Hub application. In the app, choose the Windows Server category and then the appropriate subcategory for your feedback. In the title of the Feedback, please indicate the build number you are providing feedback on as shown below: [Server #####] Title of my feedback See Share Feedback on Windows Server via Feedback Hub for specifics. We also encourage you to visit the Windows Server Insiders space on the Microsoft Tech Communities forum to collaborate, share and learn from experts. Terms of Use Evaluation editions are provided for use "as-is" and are not supported in production environments. Users are responsible for installing any updates made available from Windows Update.9KViews7likes0Comments
Events
Recent Blogs
- Security helps protect sensitive data and critical infrastructure. Cyberattacks are on the rise, and it is more critical than ever to ensure that your Windows Server infrastructure is secure. To help...Mar 04, 2025596Views2likes0Comments
- To enhance security and protect against cyber threats, the Data Encryption Standard (DES) encryption algorithm will be intentionally removed from Kerberos after Windows Server 2025 and Windows 11, ve...Feb 28, 20254.4KViews0likes2Comments