Server
50 TopicsServer 2025 Core ADDS DC, Network Profile Showing as "Public" and not as "DomainAuthenticated"
OS: Windows Server 20225 Standard Core (no GUI), build 26085.1 Role: ADDS, DNS ForestMode: Windows2025Forest DomainMode: Windows2025Domain Platform: Hyper-V guest When standing up a clean Windows Server 2025 using server core and configuring it as a domain controller, the network category (profile) always shows as "public." A clean load of Windows Server 2022 with server core as a domain controller has the same behavior. However, in Server 2022, the fix is to add DNS as a required service to the nlasvc (Network Location Awareness) service. Once that is done, the network category reflects "DomainAuthenticed" and persists between reboots. In Server 2025, the nlasvc service does not have the same requiredservices as Windows Server 2022, and it does not start automatically. Even after configuring the nlasvc service the same way it is in Server 2022 and adding DNS as a required service, the network category still reflects "public." The only way to get the network category to properly reflect the "DomainAuthenticated" status is to disable and reenable the network adapter after each reboot.10KViews12likes54CommentsWindows Server 2022 Product Key
Good Morning everyone! I am new to using Server Insider builds, (i have used normal Win10 builds for many years) just wondering where i could find & use a product key to activate Windows Server 2022 (latest built). Any help would be great 😄 Thanks, JaySolved381KViews8likes26CommentsPowerShell 7 – Latest Features, Roadmap and a chat with the PowerShell Product Group
Whether you are brand new to or a long-time user this session will get you up to speed on putting the latest features by the PowerShell team into action to solve the challenges you face today in operations.9KViews2likes0CommentsGUIDE: Where to find information about Windows Updates and release information (any version)
WINDOWS RELEASE HEALTH DASHBOARD Contains all links below, except for old OSes, Azure Stack HCI, Microcode Updates, Flight hub, Servicing Stack Updates https://docs.microsoft.com/windows/release-health/ RESOLVED AND KNOWN ISSUES All OS, except Azure Stack HCI OS Expand categories on the drop-down menu left hand side https://docs.microsoft.com/windows/release-health/windows-message-center RELEASE INFORMATION + SUPPORT LIFECYCLE Gives an overview about Windows 10 release dates and end of support / supported OS versions and recommended versions. Azure Stack HCI OS https://docs.microsoft.com/azure-stack/hci/release-information Windows Server 2016 - 2022 LTSC, Windows Version version xxxx SAC https://docs.microsoft.com/windows/release-health/windows-server-release-info Windows 11 GAC (+ former SAC) https://docs.microsoft.com/windows/release-health/windows11-release-information Windows 10 GAC (+ former SAC) https://docs.microsoft.com/windows/release-health/release-information Windows 10 2015 - 2021 LTSC https://docs.microsoft.com/windows/whats-new/ltsc/ INSIDER FLIGHT HUB Announces changes for Windows 10 / 11 Insider builds Dev, Beta and release preview builds and patches as well as Windows Feature Pack Updates descriptions (excluding Windows Server Insider and ADK) https://docs.microsoft.com/windows-insider/flight-hub/ INTEL MICROCODE UPDATES Tables top to bottom contains the higher level of security / number of mitigations. Means the bottom table has the highest level of protection / mitigation. These are partly part of the OS depending on the version; therefore, some Windows versions are not listed. If you use WSUS consider importing these updates. Unfortunately they are not part of any product category, even though they are security releated. https://support.microsoft.com/topic/summary-of-intel-microcode-updates-08c99af2-075a-4e16-1ef1-5f6e4d8637c4 Microsoft is making available Intel-validated microcode updates that are related to Spectre Variant 2 (CVE 2017-5715 [“Branch Target Injection”]). Spectre Variant 3a (CVE-2018-3640: "Rogue System Register Read (RSRE)") Spectre Variant 4 (CVE-2018-3639: "Speculative Store Bypass (SSB)"), and L1TF (CVE-2018-3620, CVE-2018-3646: "L1 Terminal Fault"). The following table lists specific Microsoft Knowledge Base articles by Windows version. The article contains links to the available Intel microcode updates by CPU. KB number and description Windows version Source KB4589212: Intel microcode updates Windows 10, version 2004 and 20H2, and Windows Server, version 2004 and 20H2 Microsoft Update Catalog KB4497165 Intel microcode updates Windows 10, version 1903 and 1909, Windows Server, version 1903 and 1909 Microsoft Update Catalog KB4494174 Intel microcode updates Windows 10, version 1809, Windows Server 2019 Microsoft Update Catalog KB4494451 Intel microcode updates Windows 10, version 1803, and Windows Server, version 1803 Microsoft Update Catalog KB4494452 Intel microcode updates Windows 10, version 1709, and Windows Server 2016, version 1709 Microsoft Update Catalog KB4494453 Intel microcode updates Windows 10, version 1703 Microsoft Update Catalog KB4494175 Intel microcode updates Windows 10, version 1607, and Windows Server 2016 Microsoft Update Catalog KB4494454 Intel microcode updates Windows 10 (RTM) Microsoft Update Catalog SERVICING STACK UPDATES These special updates for maintain the servicing stack of Windows (which is responsible for updates, dism, adding and removing features etc) have to be installed before any regular update. Currently Windows 10 1909, Windows Server 2019 and Azure Stack HCI OS have combined CUs, means the SSU is already integrated and will care for the correct installation order. Windows Client OS, Windows Server, Azure Stack HCI OS 21H2 and later version have integrated SSU into the CU. Possibly this will be backported to earlier versions. For https://msrc.microsoft.com/update-guide/vulnerability/ADV990001 WINDOWS UPDATE HISTORY aka Release Notes Check the KBs, release date, changes, known issues and remediations of Windows Updates per Windows Version AZURE STACK HCI OS Azure Stack HCI OS 21H2 (release + public preview) Build 20348 https://support.microsoft.com/en-us/topic/release-notes-for-azure-stack-hci-version-21h2-5c5e6adf-e006-4a29-be22-f6faeff90173 Azure Stack HCI OS 20H2 Build 17784 https://support.microsoft.com/topic/release-notes-for-azure-stack-hci-64c79b7f-d536-015d-b8dd-575f01090efd WINDOWS SERVER LTSC Windows Server 2022 LTSC build 20348, internal 21H2 http://support.microsoft.com/help/5005454 Windows Server 2019 LTSC build 17763, internal 1809 https://support.microsoft.com/topic/windows-10-and-windows-server-2019-update-history-725fc2e1-4443-6831-a5ca-51ff5cbcb059 Windows Server 2016 LTSC build 14393, internal 1607 https://support.microsoft.com/topic/windows-10-and-windows-server-2016-update-history-4acfbc84-a290-1b54-536a-1c0430e9f3fd Windows Server 2012 R2 / 2012 R2 Update 1 KB2919355 / ESU (soon) build 6.3.9200 / build 6.3.9600 Mind that you cannot install updates after KB2919355 if this update and prerequisites are not installed https://support.microsoft.com/topic/windows-8-1-and-windows-server-2012-r2-update-history-47d81dd2-6804-b6ae-4112-20089467c7a6 Windows Server 2012 + ESU (soon) build 6.2.9200 https://support.microsoft.com/topic/windows-server-2012-update-history-abfb9afd-2ebf-1c19-4224-ad86f8741edd Windows Server 2008 R2 Service Pack 1 (SP1) + ESU build 6.1.7601 https://support.microsoft.com/topic/windows-7-sp1-and-windows-server-2008-r2-sp1-update-history-720c2590-fd58-26ba-16cc-6d8f3b547599 Windows Server 2008 Service Pack 2 (SP2) build 6.0.6002 https://support.microsoft.com/topic/updateverlauf-f%C3%BCr-windows-server-2008-sp2-9197740a-7430-f69f-19ff-4998a4e8b25b WINDOWS SERVER VERSION, GAC (+ former SAC) This special core version of Windows Server, eligble to use with active Software Assurance for Windows Server started with 1709 ends with 20H2. For Update history check the Windows 10 release notes. I have not listed them specifically due to their very specific usecase and probably low installation count. WINDOWS OS LTSC (Long-Term Support Channel) Windows 10 21H2 LTSC https://support.microsoft.com/topic/windows-10-update-history-857b8ccb-71e4-49e5-b3f6-7073197d98fb (link unconfirmed to apply for LTSC as of 13.01.2022) Windows 10 1809 LTSC Build 17763 https://support.microsoft.com/topic/windows-10-and-windows-server-2019-update-history-725fc2e1-4443-6831-a5ca-51ff5cbcb059 Windows 10 1607 LTSC Build 14393 https://support.microsoft.com/topic/windows-10-and-windows-server-2016-update-history-4acfbc84-a290-1b54-536a-1c0430e9f3fd Windows 10 1507 LTSC Build 10240 Note that this build has no sub build numbers yet so you cannot recognize in the version which update / CU is installed https://support.microsoft.com/topic/windows-10-update-history-93345c32-4ae1-6d1c-f885-6c0b718adf3b WINDOWS OS, SAC (naming till 21H1), GAC (General Availability Channel, naming for 21H2 and later) Windows 11 version 21H2 Build 22000 https://support.microsoft.com/topic/windows-11-update-history-a19cd327-b57f-44b9-84e0-26ced7109ba9 Windows 10 version 21H2 Build 19044 https://support.microsoft.com/topic/windows-10-update-history-857b8ccb-71e4-49e5-b3f6-7073197d98fb Windows 10 version 21H1 Build 19043 https://support.microsoft.com/topic/windows-10-update-history-1b6aac92-bf01-42b5-b158-f80c6d93eb11 Windows 10 version 20H2 Build 19042 https://support.microsoft.com/topic/windows-10-update-history-7dd3071a-3906-fa2c-c342-f7f86728a6e3 Windows 10 version 2004 Build 19041 https://support.microsoft.com/topic/windows-10-update-history-24ea91f4-36e7-d8fd-0ddb-d79d9d0cdbda Windows 10 version 1909 Build 18363 https://support.microsoft.com/topic/windows-10-update-history-53c270dc-954f-41f7-7ced-488578904dfe Windows 10 version 1903 Build 18362 https://support.microsoft.com/topic/windows-10-update-history-e6058e7c-4116-38f1-b984-4fcacfba5e5d Windows 10 version 1809 Build 17763 https://support.microsoft.com/topic/windows-10-and-windows-server-2019-update-history-725fc2e1-4443-6831-a5ca-51ff5cbcb059 Windows 10 version 1803 Build 17134 https://support.microsoft.com/topic/windows-10-update-history-0d8c2da6-3dba-66e4-2ef2-059192bf7869 Windows 10 version 1709 Build 16299 https://support.microsoft.com/topic/windows-10-and-windows-server-update-history-8e779ac1-e840-d3b8-524e-91037bf7645a Windows 10 version 1703 Build 15063 https://support.microsoft.com/topic/windows-10-update-history-83aa43c0-82e0-92d8-1580-10642c9ed612 Windows 10 version 1607 Build 14393 https://support.microsoft.com/topic/windows-10-and-windows-server-2016-update-history-4acfbc84-a290-1b54-536a-1c0430e9f3fd Windows 10 version 1511 Build 10586 https://support.microsoft.com/topic/windows-10-update-history-2ad7900f-882c-1dfc-f9d7-82b7ca162010 Windows 10 version 1507 Build 10240 Note that this build has no sub build numbers yet so you cannot recognize in the version which update / CU is installed https://support.microsoft.com/topic/windows-10-update-history-93345c32-4ae1-6d1c-f885-6c0b718adf3b Windows 8.1 + 8.1 Update 1 KB2919355 build 6.3.9200 / 6.3.9600 Mind that you cannot install updates after KB2919355 if this update and prerequisites are not installed https://support.microsoft.com/topic/windows-8-1-and-windows-server-2012-r2-update-history-47d81dd2-6804-b6ae-4112-20089467c7a6 Windows 8.0 build 6.2 https://support.microsoft.com/topic/windows-server-2012-update-history-abfb9afd-2ebf-1c19-4224-ad86f8741edd Windows 7.0 Service Pack 1 (SP1) build 6.1.7601 https://support.microsoft.com/topic/windows-7-sp1-and-windows-server-2008-r2-sp1-update-history-720c2590-fd58-26ba-16cc-6d8f3b547599 Windows Vista Service Pack 2 (SP2) build 6.0.6002 https://support.microsoft.com/en-us/topic/windows-server-2008-sp2-update-history-9197740a-7430-f69f-19ff-4998a4e8b25b HISTORY: 13.01.2022 - added release information for Azure Stack HCI, Windows 10 LTSC, corrections on naming conventions of SAC, GAC, LTSC 13.12.2021 - corrected some links that directly linked to en-us instead of the generic page which would redirect to localized pages, - added Windows 10 21H2 SAC link. - honoured naming convention branch > channel. - added General availability channel which is the successor of the SAC (Semi Annual Channel starting with 21H2 releases. 03.11.2021 - Added information for Windows 11 21H1 13.10.2021 - Added information to Azure Stack HCI 21H2 release, other docs still not mention it except update history 07.10.2021 - Added Intel Microcode updates for all available threats and versions 07.10.2021 - Updated one available link for Windows 11. Update histories for 21H2 version W10/W11 are still missing 17.09.2021 - fixed some links pointing to a specific language 17.09.2021 - formatting, seperating LTSC from SAC for Windows 10, added SSUs 17.09.2021 - initial version8.5KViews2likes5CommentsServer 2022 Preview missing Let's Encrypt Root certificate
First posted to LetsEncrypt.org and was advised to post this issue here. https://community.letsencrypt.org/t/fyi-windows-server-2022-does-not-have-root-certificate/157208 At the time I'm writing this, Microsoft Windows Server 2022 has not been released and is only available in "Preview". Having said that I've installed the "Preview", installed all patches, and experienced the following errors when connecting to resources that use LE certificate. This happened when using Edge and Chrome. Your connection isn't private Attackers might be trying to steal your information from website.domain.com (for example, passwords, messages, or credit cards). NET::ERR_CERT_AUTHORITY_INVALID Firefox worked fine since it uses its own certificate store. After adding the root certificate to the root store, all was fine. The following output shows the certs currently in the root store by default as well as the PowerShell & OS version: PS C:\> gci Cert:\LocalMachine\Root PSParentPath: Microsoft.PowerShell.Security\Certificate::LocalMachine\Root Thumbprint Subject ---------- ------- CDD4EEAE6000AC7F40C3802C171E30148030C072 CN=Microsoft Root Certificate Authority, DC=microsoft, DC=com BE36A4562FB2EE05DBB3D32323ADF445084ED656 CN=Thawte Timestamping CA, OU=Thawte Certification, O=Thawte, L=Durbanville, S=Western Cape, C=ZA A43489159A520F0D93D032CCAF37E7FE20A8B419 CN=Microsoft Root Authority, OU=Microsoft Corporation, OU=Copyright (c) 1997 Microsoft Corp. 92B46C76E13054E104F230517E6E504D43AB10B5 CN=Symantec Enterprise Mobile Root for Microsoft, O=Symantec Corporation, C=US 8F43288AD272F3103B6FB1428485EA3014C0BCFE CN=Microsoft Root Certificate Authority 2011, O=Microsoft Corporation, L=Redmond, S=Washington, C=US 7F88CD7223F3C813818C994614A89C99FA3B5247 CN=Microsoft Authenticode(tm) Root Authority, O=MSFT, C=US 3B1EFD3A66EA28B16697394703A72CA340A05BD5 CN=Microsoft Root Certificate Authority 2010, O=Microsoft Corporation, L=Redmond, S=Washington, C=US 31F9FC8BA3805986B721EA7295C65B3A44534274 CN=Microsoft ECC TS Root Certificate Authority 2018, O=Microsoft Corporation, L=Redmond, S=Washington, C=US 245C97DF7514E7CF2DF8BE72AE957B9E04741E85 OU=Copyright (c) 1997 Microsoft Corp., OU=Microsoft Time Stamping Service Root, OU=Microsoft Corporation, O=Microsoft Trust Network 18F7C1FCC3090203FD5BAA2F861A754976C8DD25 OU="NO LIABILITY ACCEPTED, (c)97 VeriSign, Inc.", OU=VeriSign Time Stamping Service Root, OU="VeriSign, Inc.", O=VeriSign Trust Network 06F1AA330B927B753A40E68CDF22E34BCBEF3352 CN=Microsoft ECC Product Root Certificate Authority 2018, O=Microsoft Corporation, L=Redmond, S=Washington, C=US 0119E81BE9A14CD8E22F40AC118C687ECBA3F4D8 CN=Microsoft Time Stamp Root Certificate Authority 2014, O=Microsoft Corporation, L=Redmond, S=Washington, C=US DF3C24F9BFD666761B268073FE06D1CC8D4F82A4 CN=DigiCert Global Root G2, OU=www.digicert.com, O=DigiCert Inc, C=US D4DE20D05E66FC53FE1A50882C78DB2852CAE474 CN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IE B1BC968BD4F49D622AA89A81F2150152A41D829C CN=GlobalSign Root CA, OU=Root CA, O=GlobalSign nv-sa, C=BE A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 CN=DigiCert Global Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US 75E0ABB6138512271C04F85FDDDE38E4B7242EFE CN=GlobalSign, O=GlobalSign, OU=GlobalSign Root CA - R2 742C3192E607E424EB4549542BE1BBC53E6174E2 OU=Class 3 Public Primary Certification Authority, O="VeriSign, Inc.", C=US 0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 CN=DigiCert Assured ID Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US PS C:\> $PSVersionTable Name Value ---- ----- PSVersion 5.1.20348.1 PSEdition Desktop PSCompatibleVersions {1.0, 2.0, 3.0, 4.0...} BuildVersion 10.0.20348.1 CLRVersion 4.0.30319.42000 WSManStackVersion 3.0 PSRemotingProtocolVersion 2.3 SerializationVersion 1.1.0.1 PS C:\> gwmi win32_operatingsystem | fl Caption, Version, BuildNumber Caption : Microsoft Windows Server 2022 Datacenter Evaluation Version : 10.0.20348 BuildNumber : 20348 EDIT @petercooperjr in the previously mentioned Let's Encrypt thread offered this feedback. Thanks. I don't know if it'd help whomever looks at it, but if you look at the Microsoft Trusted Root Program's page of their current trusted roots, you can see that ISRG Root X1 is there. (And it looks like ISRG Root X2 is there too!) docs.microsoft.com List of Participants - Microsoft Trusted Root Program This document provides details about the participating Certificate Authorities in the Microsoft Trusted Root Program.7.6KViews2likes2CommentsUpgrading from Windows Server 2016 to 2019
Is Windows Server 2019 considered a safe upgrade from Windows Server 2016? Is it like installing a new build in Windows 10 (e.g. going from 1703 to 1709)? or is it more substantial than that? traditionally we haven't done in-place upgrades of Server OS, but wondered if 2019 is different, and more like a build upgrade than an OS upgrade? And is there instructions for doing an upgrade of 2016 to 2019?10KViews2likes5CommentsWindows Updates and Defender Updates on Azure VM
Hi all, We want to build a locked down Azure VM with no public IP address. Is it possible for this VM to still get updates and report without a public IP address. Or is it a case that we really need a public IP address and then a firewall for this to be secure?Solved634Views1like2CommentsAnnouncing Windows Server Preview Build 25967
Announcing Windows Server Preview Build 25967 Hello Windows Server Insiders! Today we are pleased to release a new build of the next Windows Server Long-Term Servicing Channel (LTSC) Preview that contains both the Desktop Experience and Server Core installation options for Datacenter and Standard editions, and Azure Edition (for VM evaluation only). Branding has not yet been updated and remains as Windows Server 2022 in this preview - when reporting issues please refer to "VNext" rather than Windows Server 2022 which is currently in market. What's New Azure Arc-enabled Servers onboarding experience is now available in the latest Windows Server Insider Desktop build. Find the new Azure Arc icon in the system tray (bottom right corner of the taskbar). Try installing and configuring the (free) Azure Connected Machine Agent using the Azure Arc Setup wizard that can be launched from the system tray icon. Once Azure Arc is enabled on your server, find status information in the system tray icon. Server Datacenter Insiders! Take Terminal command line utility on Windows Server for a test run! Search for "Terminal" on the latest Server Datacenter Insider build and launch the application. Storage Replica Enhanced Log is now available in the latest Windows Server Insider build. Enhanced Log provides improved performance for block replication by removing file system abstractions – and their performance costs – from the Storage Replica log implementation. More info, and deployment instruction, is available on Learn: link. Known Issues If you are validating upgrades from Windows Server 2019 or 2022, we do not recommend that you use this build as intermittent upgrade failures have been identified for this build. This build has an issue where archiving eventlogs with "wevetutil al" command causes the Windows Event Log service to crash, and the archive operation to fail. The service must be restarted by executing "Start-Service EventLog" from an administrative command line prompt. If you have Secure Launch/DRTM code path enabled, we do not recommend that you install this build. Available Downloads Downloads to certain countries may not be available. See Microsoft suspends new sales in Russia - Microsoft On the Issues Windows Server Long-Term Servicing Channel Preview in ISO format in 18 languages, and in VHDX format in English only. Windows Server Datacenter Azure Edition Preview in ISO and VHDX format, English only. Microsoft Server Languages and Optional Features Preview Keys: Keys are valid for preview builds only Server Standard: MFY9F-XBN2F-TYFMP-CCV49-RMYVH Datacenter: 2KNJJ-33Y9H-2GXGX-KMQWH-G6H67 Azure Edition does not accept a key Symbols: available on the public symbol server – see Using the Microsoft Symbol Server. Expiration: This Windows Server Preview will expire September 15, 2024. How to Download Registered Insiders may navigate directly to the Windows Server Insider Preview download page. If you have not yet registered as an Insider, see GETTING STARTED WITH SERVER on the Windows Insiders for Business portal. We value your feedback! The most important part of the release cycle is to hear what's working and what needs to be improved, so your feedback is extremely valued. For Windows Server, use your registered Windows 10 or Windows 11 Insider device and use the Feedback Hub application. In the app, choose the Windows Server category and then the appropriate subcategory for your feedback. In the title of the Feedback, please indicate the build number you are providing feedback on as shown below to ensure that your issue is attributed to the right version: [Server #####] Title of my feedback See Give Feedback on Windows Server via Feedback Hub for specifics. The Windows Server Insiders space on the Microsoft Tech Communities supports preview builds of the next version of Windows Server. Use the forum to collaborate, share and learn from experts. For versions that have been released to general availability in market, try the Windows Server for IT Pro forum or contact Support for Business. Diagnostic and Usage Information Microsoft collects this information over the internet to help keep Windows secure and up to date, troubleshoot problems, and make product improvements. Microsoft server operating systems can be configured to turn diagnostic data off, send Required diagnostic data, or send Optional diagnostic data. During previews, Microsoft asks that you change the default setting to Optional to provide the best automatic feedback and help us improve the final product. Administrators can change the level of information collection through Settings. For details, see http://aka.ms/winserverdata. Also see the Microsoft Privacy Statement. Terms of Use This is pre-release software - it is provided for use "as-is" and is not supported in production environments. Users are responsible for installing any updates that may be made available from Windows Update. All pre-release software made available to you via the Windows Server Insider program is governed by the Insider Terms of Use.5.3KViews1like0Comments