containers
111 TopicsWindows Server, IIS & Docker Container
Hi , Let say, I have 5 .NET API Containerize using Docker Container on Windows Server 2022. This 5 Container can be accessed using IP Address and Port on each My question is, What happen with my IIS on Windows Server 2022 ? Is that unused ? If unused, can I use this IIS to publish other .NET Application using Direct file deploy ? Please help22Views0likes1Commentfeature Installation Error
I am facing this issue in Windows Server 2019 STD. i am also tried to solve this issue to select sources\sxs path from the OS media but still i am getting the same error. Mistakenly i have removed .Net framework from this server and after that i am facing this issue. please help me to solve this issue.27Views0likes0CommentsWindows Server 2025 Desktop Experience: Hyper-V cannot be installed
I have a lab with various Servers running Windows Server 2025. Some of them are installed without Desktop Experience, some with. Aside from Desktop Experience, the VMs and the operating are configured the same way using automated setup scripts. I exposed the VirtualizationExtensions for all VMs on the host using Set-VMProcessor -ExposeVirtualizationExtensions $true. Moreover, I configured all VMs to use static memory assignment. However, when I try to install Hyper-V on Windows Servers 2025 with Desktop Experience, I receive the error Hyper-V cannot be installed because virtualization support is not enabled in the BIOS. The issue occurs without any updates installed as well as with KB5050009 (2025-01 Cumulative Update for Microsoft server operating system 24H2 for x64 based Systems) installed. On machines without Desktop Experience, Hyper-V can be installed without any issues. As a side note, on VMs using Windows 11 24H2 on the same host, I can install Hyper-V without any issues.458Views0likes4CommentsNew survey - Windows Server application survey!
Happy new year everyone! With the new year, it's time to make plans and goals for the new cycle. At Microsoft, we're always planning for what's ahead, what we want to accomplish, and how can we delight our customers. That planning and the resulting prioritization is based on what we hear from our customers. So, from time to time we publish surveys to get a broader sense of what customers are thinking, how our products can help them succeed, and make sure we align our goals. Today, I'm here to ask for your input - we just released a new survey focused on understanding how customers approach Windows Server application modernization. This survey is focused on understanding how customers approach modernization of Windows Server apps, what are the challenges, how they think about the modernization process, what spins up the process, etc. This is of immeasurable value to us and will help us prioritize the work for the coming years. To answer the survey, please access: https://aka.ms/WSAppModSurvey. Feel free to share the link above with anyone and thank you in advance for your support!135Views1like0CommentsAnnouncing Windows Server 2025 Security Baseline Preview
Announcing Windows Server 2025 Security Baseline Preview Hello Windows Server Insiders! Today we are pleased to announce the Windows Server 2025 Security Baseline Preview. You can enable security right from the start by applying the recommended security posture for your device or VM role through application of a tailored security baseline, with over 350 preconfigured Windows security settings that help you apply and enforce granular security settings that support best practices recommended by Microsoft and Industry standards. We have organized the Windows Server 2025 Security Baseline content into three categories based on your server role: Domain Controller (DC) Member Server Workgroup Member In addition, you can apply baselines with dedicated security settings specific to: Windows Defender Antivirus (48) Secured-Core (6) Main Highlights of the security baseline are the following enforcements: Secured-Core – UEFI MAT, Secure Boot, Signed Boot Chain Account and password policies Security Policies and Security Options Protocols: TLS Enforced >1.2+, SMB 3.0+, Kerberos AES, etc. Credentials Protections (LSASS/PPL) And many more. Please review the GitHub repository for what settings comprise of each definition: https://github.com/microsoft/osconfig/blob/main/security/SecurityBaseline_WindowsServer_2025-2409.csv Customer Experience: The customer experience to apply baselines for individual machines, including image customizations are: PowerShell cmdlets Windows Admin Center (WAC) For at-scale operations, you can apply baseline and monitor using Azure Policy and Azure Automanage Machine Configuration and see your compliance score. The baseline experience is powered by ‘OSConfig - our newly introduced security configuration platform’. Once applied, your baseline settings are protected from any drift automatically, which is one of the key features of the security platform. The WAC, Azure Policy and Azure Automanage Machine Configuration experiences will be released soon to the Windows Insider Program. This mechanism will not work for any earlier version of Windows Server. 1. Download prerelease modules from the PowerShell Gallery If you have not previously configured your system to pull modules from the PowerShell Gallery, please do so using the following steps: a. Open an elevated PowerShell window (not the x86 version) b. Run Install-PackageProvider NuGet, PowerShellGet -Force c. Open a new elevated PowerShell window d. Run Set-PSRepository -Name PSGallery -InstallationPolicy Trusted 2. Install the OSConfig PowerShell module Run Install-Module -Name Microsoft.OSConfig -AllowPrerelease -Scope AllUsers -Repository PSGallery -Force To verify if the OSConfig module is installed, run Get-Module -ListAvailable -Name Microsoft.OSConfig 3. Apply the Security Baseline via PowerShell cmdlets For domain-joined device, run Set-OSConfigDesiredConfiguration -Scenario SecurityBaseline\WS2025\MemberServer -Default For workgroup device, run Set-OSConfigDesiredConfiguration -Scenario SecurityBaseline\WS2025\WorkgroupMember -Default For domain controller device, run Set-OSConfigDesiredConfiguration -Scenario SecurityBaseline/WS2025/DomainController -Default For Secured-core, Run Set-OSConfigDesiredConfiguration -Scenario SecuredCore -Default For Defender Antivirus, Run Set-OSConfigDesiredConfiguration -Scenario Defender\Antivirus -Default Restart machine 4. Customize the Security Baseline via PowerShell cmdlets Example using AuditDetailedFileShare for Member Server device (where the default value is 2) Run Set-OSConfigDesiredConfiguration -Scenario SecurityBaseline\WS2025\MemberServer -Name AuditDetailedFileShare -Value 3 Run Get-OSConfigDesiredConfiguration -Scenario SecurityBaseline\WS2025\MemberServer -Name AuditDetailedFileShare Check that the value is now 3. 5. View compliance of the Security Baseline via PowerShell cmdlets Run Get-OSConfigDesiredConfiguration -Scenario SecuredCoreState Run Get-OSConfigDesiredConfiguration -Scenario SecurityBaseline\WS2025\MemberServer | ft Name, @{ Name = "Status"; Expression={$_.Compliance.Status} }, @{ Name = "Reason"; Expression={$_.Compliance.Reason} } -AutoSize -Wrap 6. Most Common tasks impacted/Known Issues after applying baseline Note: (Please read before exercising the scenario! Also, these scripts are for preview only and should not be used in production.) Password requirements are Complexity and Minimum of 14-character length. This only applies to local user accounts; when signing in with a domain account, domain requirements prevail for domain accounts. TLS connections are subject to a minimum of TLS/DTLS 1.2 or higher. May prevent connections to older systems. Copy/Paste of files from RDP sessions is disabled. If you need to use this function, run: Set-OSConfigDesiredConfiguration -Scenario SecurityBaseline\WS2025\[role being applied] -Name RemoteDesktopServicesDoNotAllowDriveRedirection -Value 0 and then reboot. SMB connections are subject to a minimum of 3.0 or higher (available as of WS2012). Connecting to non-windows systems (like Linux SAMBA) must support SMB 3.0, or adjustments to the baseline are needed. You may run into a few user rights errors depending on your domain configuration. It does not impact the rest of the security baseline and can be ignored. We are working on fixing it. See MSLearn doc for details. If you are configuring the same settings with two different tools (one being OSConfig in this case), there will be conflicts, especially with drift control involved. See MSLearn doc for details. In case you are blocked or experiencing a work disruption after applying the security baseline: File a bug in feedback hub under Category Windows Server-> Security Configuration Management You should preview the security baseline only on test systems. While there is a ‘Remove’ command, not all configurations can be reversed. Open an elevated PowerShell window, run Remove-OSConfigDesiredConfiguration -Scenario SecurityBaseline\WS2025\MemberServer and then reboot. We value your feedback! Please provide feedback as to what is working and what needs to be improved as your feedback is extremely valued to make the product experience better. Please use Feedback Hub app for Windows Server 2025. Category: Windows Server->Security Configuration Management You can also reach us via email at heseccon@microsoft.com Edge Security Connect. What’s coming? We will also share a Windows Admin Center, Azure Policy and Azure Automanage Machine Configuration experience, to try out for getting full E2E experience & Application control for Windows Insider Program!!16KViews8likes0CommentsWhat is Microsoft doing do battle the decline of Windows Server in the cloud?
What is Microsoft doing do battle the decline of Windows Server in the cloud? This is based on the news coming from the cma battle in the UK: https://www.theregister.com/2024/07/24/microsoft_cloud_cma/ This coming from someone that has invested 15+ years in learning and using Windows Server. Are there any hints as to how Microsoft might look at fixing this?219Views0likes0CommentsUnable to import WS2025 Container image on WS2025 Host VM
I am trying to import WS2025 container image (major version 26080) to WS2025 host (major version 26100) and getting this exception: ctr: failed to extract layer sha256:f7edee802958b0e48757365259e389019fdf788dde24558570930c19918cc97d: hcsshim::ProcessUtilityVMImage To use this container image, you must join the Windows Insider Program. Please see https://go.microsoft.com/fwlink/?[REDACTED] for more information.: unknown Importing the same container image on a host with the previous OS version 26063 works well, without this problem. This is happening during custom image building on Azure Image Builder subscription, where I have no GUI nor account. How I can workaround this?Solved1.3KViews0likes6CommentsAzure VM Agent Status not ready
I have created a red hat openshift private cluster but the VMS are stuck in the state of "agent status not ready." I have followed these troubleshooting steps: Linux Virtual Machine Agent Status "Not Ready" - Microsoft Community Hub However, all of them seem to point to trying to check and see what is on the VM itself. I am unable to do this because I can't SSH into the machine. Has anyone else ran into this issue and been able to resolve it? I am deploying it via CLI as I was not able to do it via GUI for some reason. This is my script: #az login az account set --name "accountnamehidden" #az provider register -n Microsoft.RedHatOpenShift --wait #az provider register -n Microsoft.Compute --wait #az provider register -n Microsoft.Storage --wait #az provider register -n Microsoft.Authorization --wait $LOCATION= "eastus" # the location of your cluster $RESOURCEGROUP= "sample-rg" # the name of the resource group where you want to create your cluster $CLUSTER= "K8sDev1test" # the name of your cluster $arovnet= "sample-vnet" $mastersubnet = "k8sDev1-master-ue-snet" $workersubnet = "k8sDev1-worker-ue-snet" az aro create --resource-group "samplerg" --vnet-resource-group "sample-vnet-rg" --name $CLUSTER --vnet $arovnet --master-subnet "k8sDev1-master-ue-snet" --worker-subnet "k8sDev1-worker-ue-snet" --apiserver-visibility Private --ingress-visibility Private --fips true --outbound-type UserDefinedRouting --client-id hidden --client-secret hidden