Work Independently of Windows Server Science
Work Independently of Windows Server Science
Outline:
Authorization Certificate.
5. Interacting with the main server. WAC for managing core servers. Sconfig utility
1. Active Directory structure, creating GPOs.
Group Policy structure is modeled after the Active
Directory structure, in that it has both physical and logical
components. At the core of Active Directory's physical
architecture is an extensible storage engine that reads and writes
information to the Active Directory data store. This engine makes
use of the logical, object-based hierarchy that represents data
store information.
GPO status
Administrative credentials
Group policy can represent policy settings in the locally in the file
system or in Active Directory Domain Services. When used with
Active Directory, Group Policy settings are contained in a Group
Policy Object (GPO). A GPO is a virtual collection of policy settings,
security permissions, and scope of management (SOM) that you
can apply to users and computers in Active Directory. A GPO has
a unique name, such as a GUID. Clients evaluate GPO settings
using the hierarchical nature of Active Directory.
To learn more about how Group Policies work, see Group Policy
Processing.
n this article
1. Prerequisites
2. Download and Import the Root Certificate from the CA
3. Create a certificate template: Enterprise CAs
4. Request a certificate using a request file
Show 6 more
Prerequisites
Copy
- Subject="CN=server.contoso.com" ; (this should be the FQDN or
how the system shows in DNS)
- [Key Usage]
- Key Exportable=TRUE ; This setting is required for Server
Authentication
- HashAlgorithm = SHA256
- KeyLength=2048
- KeySpec=1
- KeyUsage=0xf0
- MachineKeySet=TRUE
- [EnhancedKeyUsageExtension]
- OID=1.3.6.1.5.5.7.3.1 ; Server Authentication
- OID=1.3.6.1.5.5.7.3.2 ; Client Authentication
- [Compatibility Settings]
- Compatible with Windows Server 2003 ; (or newer based on
environment)
- [Cryptography Settings]
- Provider Category: Legacy Cryptography Service Provider
- Algorithm name: RSA
- Minimum Key Size: 2048 ; (2048 or 4096 as per security
requirement.)
- Providers: "Microsoft RSA Schannel Cryptographic Provider
and Microsoft Enhan
PowerShellCopy
Install-WindowsFeature RSAT-ADCS
Understand IPv6
IPv6 has such a large address space that you should use
consistent IPv6 address block sizes that over-allocate IPv6
addresses. This networking strategy contrasts with IPv4. The
limited number of IPv4 addresses forces you to use the smallest
possible subnet size. This table gives you a sense of the increased
size of IPv6:
Expand table
IP Number of IP addresses
version
IPv4 4,294,967,296
IPv6 340,282,366,920,938,463,463,374,607,431,768,211,456
Transition to IPv6
You should align your plan for assigning IPv6 addresses to your
Azure networks with your organization's IPv6 addressing plan.
Your organization should already have a plan for on-premises IPv6
use, so that you can allocate space between different locations
without overlapping. If you don't have a plan, you should define
one before you start your implementation on Azure. For more
information, see Plan for IP addressing.
Expand table
Scope Size Number of instances
Azure environment /36 1
Region /44 256
Virtual network /56 4,096 per region
Subnet /64 256 per virtual network
Important
VPN (RAS)
With VPN and Routing service, you can also choose to deploy
Always On VPN. Always On VPN enables Windows 10 clients to
securely access shared resources, intranet Web sites, and the
applications on an internal network without having to manually
connect. For more information, see Always On VPN
DirectAccess
Important
Routing service
Copy
Install-RemoteAccess -VpnType RoutingOnly
Copy
Install-RemoteAccess -VpnType SstpProxy
Next Steps
Now you've learned about what the Remote Access role is, here
are some articles that might help you during deployment:
You can configure your PC for remote access with a few easy
steps.
1. On the device you want to connect to, select Start and
then choose the Settings icon on the left.
2. Select the System group followed by the Remote
Desktop item.
3. Use the slider to enable Remote Desktop.
4. It's also recommended to keep the PC awake and
discoverable to facilitate connections. Select Show
settings to enable.
5. As needed, add users who can connect remotely by
clicking Select users that can remotely access this
PC. Members of the Administrators group automatically
have access.
6. Make note of the name of this PC under How to
connect to this PC. You'll need this to configure the
clients.
If you only want to access your PC when you are physically using
it, you don't need to enable Remote Desktop. Enabling Remote
Desktop opens a port on your PC that is visible to your local
network.
5. Interacting with the main server.
WAC for managing core servers.
Sconfig utility
You can manage a Server Core server in the following ways:
You can also add hardware and manage drivers locally, as long as
you do that from the command line.
Copy
cmdkey /add:<ServerName> /user:<UserName>
/pass:<password>
PowerShellCopy
Enable-NetFirewallRule -DisplayGroup "Windows Remote
Management"
PowerShellCopy
Enable-NetFirewallRule -DisplayGroup "<rulegroup>"
Expand table
MMC snap-in Rule group
Event Viewer Remote Event Log
Management
Services Remote Service
Management
Shared Folders File and Printer Sharing
Task Scheduler Performance Logs and
Alerts,
File and Printer Sharing
Disk Management Remote Volume
Management
Windows Defender Firewall with Advanced Windows Defender Firewall
Security
Remote Management
Note