Windows Server 2019 Features
Windows Server 2019 Features
Windows Server 2019 Features
Windows admin center is a locally deployed, browser-based app for managing servers, clusters,
hyper-converged infrastructure, and windows 10 pcs.
SYSTEM INSIGHTS:
system insights are a new feature available in windows server 2019 that brings local predictive
analytics capabities natively to windows server.
these predictive capabilities, each backed by a machine-learning model, locally analyze windows
and events, providing insight into the functioning of your servers and helping you reduce the
operational expenses associated with reactively managing issues in your windows server
deployment.
DESKTOP EXPERIENCE:
During setup of the operating system you can choose between server core installation or server
witth desktop experience installations.
The server core app compatibility feature on demand (FOD) significantly improves the app
compatibility of the windows server core installation option by including a subset of binaries and
components from windows server with the desktop experience, without adding the server desktop
experience graphical environment itself.
This is done to increase the functionality and compatibility of server core while keeping it as lean
as possible.
Upgraded HTTP/2's sever-side cipher suite negotiation for automatic mitigation of connection
failures and easy of deployment.
Changed our default TCP congestion provider to cubic to give you more throughput.
Storage migration service is a new technology that makes it easier to migrate servers to a newer
version of windows server.
It provides a graphical tool that inventories data on servers, transfers the data and configuration to
newer servers, and then optionally moves the identities of the old servers to the new servers so
that apps and users don't have to change anything.
ATP's deep platform sensors and response actions expose memory and kernel level attacks and
respond by suppressing malicious files and terminating malicious processes.
Windows Defender ATP Exploit Guard is a new set of host-intrusion prevention capabilities.
The four components (Attack Surface Reduction (ASR), Network protection, controlled folder
access, exploit protection) of windows defender exploit guard are designed to lock down the
device against a wide variety of attack vectors and block behaviors commonly used in malware
attacks, while enabling you to balance security risk and productivity requirements.
Attack Surface Reduction (ASR) is set controls that enterprises can enable to prevent malware
from getting on the machine by blocking suspicious malicious files (for example, office files),
Scripts, lateral movement, ransomware behavior, and email-based threats
NETWORK PRODECTION:
Network protection protects the end point against web-based threats by blocking any outbound through
windows defender SmartScreen.
CFA protects sensitive data from ransomware by blocking untrusted processes from accessing your
protected folders.
EXPLOIT PROTECTION:
Exploit protection is a set of mitigations for vulnerability exploits that can be easily configured to protect
your system and applications.
Shielded VM have been s popular features but in windows server 2016 they only support VMs
where windows are the guest OS.
Shielded VMs protect virtual machines from users of the host server, even these with local
administrator privileges.
Shielded VMs prevent rogue admins or hackers accessing VMs, virtual hard disk files, and
present migrations VMs and running shutdown and restart commands.
Now Linux can be used as a guest operating system in Shielded virtual machines.
It is now possible to run windows and Linux-based containers on the same container host, using
the same docker daemon.
This enables you to have a heterogenous container host environment while providing flexibility to
application developers.
ENCRYPTED NETWORKS:
Encrypted networks virtual network encryption allows encryption of virtual network traffic
between virtual machines that communicates with each other within subnets.
It also utilizes datagram transport layer security (DTLS) on the virtual subnet to encrypt packets.
DTLS protects against eavesdropping, tampering, and forgery by anyone with access to the
physical network.
In a workgroup all computer works independently, where one computer cannot control or manage
another computer
Workgroups provide easy sharing of files, printers and other networks resources. Being a peer-to-
peer network design. Each workgroup computer may both share and access resources if
configured to do so.
DOMAIN: {group ah manages pannalam, administrator pannalam, control pannalam} {its logical
collection of objects}
Domain is a logical collection of objects in a network with centralized administrator, control and
authentication.
In a domain all objects are centrally controlled maintained and managed by one or more master
computer called domain controllers.
DOMAIN CONTROLLER: {Domain ah manage pandra computer}
Domain controller is a computer in a domain which controls the domain.
Domain controller will be running with the domain management services, the domain
management service will be maintaining the domain database.
In windows environment the domain management service is active directory service (ADS).
NIC-Driver installed, link up, Static ip with preferred DNS server ip configured.
[Check network driver is installed or not. If not installed means installed this.]
[Active Directory services DNS kuda intergrated aagi than work aagum, AD configure pandrom na DNS
irukanum. Intergrated aagi work aagura nala same machine la ve work aagum[DNS & AD].
Active Directory Domain Services Installation:
(AD- ah backup adupom, normal ah run aagitu irukara server la backup edukalam, but andha backup ah
restore pannanum na run aagitu irukara server la restore panna mudiyathu, yena oru domain controller run
aagitu irukum pothu AD servicesum run aagitu irukum, AD services run aagitu irukum pothu AD
database file ah use aagitu irukum, current use la irukara file ah overwrite or replace panna mudiyathu. So
restore panna mudiyathu. Suppose restore pannanum na DSRM mode la than restore panna mudiyum. F8
key press panna indha mode varum. DSRM la enna password tharomo adha vachu than login panna
mudiyum.)
(*Active Directory database & SYSVOL Domain oda public file)
(2). CREATE DOMAIN USERS:
The profile data are stored on a share location of the file server.
The profile data is downloaded from the file server to the local system every time the user log on
to the client computer on the network.
Any changes made to the user profile will be saved on the file server at the time of logoff.
Mandatory user profile: [before on roaming – network system and user can’t change]
A mandatory user profile, which is a roaming profile that can be used to specify particular setting
for individuals or an entire group of users.
Any changes made to your user profile data/settings will not be saved to the server.
[logoff user renu (client) & login, check file server & see E:profiledate\renu -you can see this]
[go to user machine and check the user profile status- its showing roaming profile.]
[change any thig like desktop wallpaper, create files or folder something in desktop- in client(renu)]
[change pannathu fileserver1 save aagi irukum]