0% found this document useful (0 votes)
34 views28 pages

Work Independently of Windows Server Science

Uploaded by

sultanesonaliyev
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
34 views28 pages

Work Independently of Windows Server Science

Uploaded by

sultanesonaliyev
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 28

Work independently of

windows server science

Outline:

1. Active Directory structure, creating GPOs.

2. Creating and issuing a new certificate template, obtaining a Public SSL

Authorization Certificate.

3. Accessing IPv6. Networking toolset. Creating a routing table.

4. Remote access on Windows Server

5. Interacting with the main server. WAC for managing core servers. Sconfig utility
1. Active Directory structure, creating GPOs.
Group Policy structure is modeled after the Active
Directory structure, in that it has both physical and logical
components. At the core of Active Directory's physical
architecture is an extensible storage engine that reads and writes
information to the Active Directory data store. This engine makes
use of the logical, object-based hierarchy that represents data
store information.

Group Policy structure is similar to that of Active Directory,


because it maintains both a logical and physical representation
of GPOs, as follows:

Logical component: Consists of a Group Policy container object,


which is stored in the Group Policy Objects container of Active
Directory. The Group Policy container object contains attributes
that specify basic GPO information, such as the following:

 GPO display name

 GPO path to the extension policy and Group Policy


template (GPT) files.

 GPO version number

 GPO status

 Access control list (ACL)

 GUID-references to the CSEs that are to be invoked


when the core Group Policy engine on the Group Policy
client processes the GPO.

When the Group Policy administrator creates a GPO, Active


Directory creates a Group Policy container object for that GPO, as
described in section 2.1.3.2.1. This Group Policy container is a
container object of the groupPolicyContainer class and is named
with a GUID that identifies the GPO. The Group Policy container is
stored under the CN=Policies,CN=System container within the
domain. The Administrative tool and the Group Policy client locate
this container according to its DN, which is the exact path to the
Group Policy container object in the Active Directory data store.
Physical component: Consists of the Group Policy file share
component that stores GPT and Group Policy extension settings
on a domain controller or other server.

The physical component of a GPO is represented through a series


of files containing Administrative template and extension policy
settings that are stored on disk. These files contain numerous
policy settings along with the state of these settings. These files
are stored in Machine and User subdirectories along with the
associated GPO version file gpt.ini, in the following path, which is
also known as the GPO path: <dns domain name>\<Group Policy
file share-name>\<dns domain name>\Policies\<guid>\.

Whenever the Group Policy administrator creates a new GPO, the


<guid> folder in this path is automatically created and named
with the GUID of the GPO. Within the <guid> folder are Machine
and User subdirectories that contain extension policy
settings and Administrative template configuration items. During
policy administration, when the Group Policy administrator
creates or modifies Group Policy extension or Administrative
template settings, the Administrative tool locates the policy files
according to the <guid> in the GPO path. During policy
application, the Group Policy client locates the policy files in the
same manner

Applies To: Windows Server 2012

To create a new GPO, use the Active Directory Users and


Computers MMC snap-in.

Administrative credentials

To complete this procedure, you must be a member of the


Domain Administrators group, or otherwise be delegated
permissions to create new GPOs.

To create a new GPO

1. On a computer that has the Group Policy Management


feature installed, click the Start charm, and then click
the Group Policy Management tile.
2. In the navigation pane, expand
**Forest:**YourForestName, expand Domains,
expand YourDomainName, and then click Group Policy
Objects.
3. Click Action, and then click New.
4. In the Name text box, type the name for your new GPO.

Note Be sure to use a name that clearly indicates the purpose of


the GPO. Check to see if your organization has a naming
convention for GPOs.

5. Leave Source Starter GPO set to (none), and then


click OK.
6. If your GPO will not contain any user settings, then you
can improve performance by disabling the User
Configuration section of the GPO. To do this, perform
these steps:

a. In the navigation pane, click the new GPO.


b. In the details pane, click the Details tab.
c. Change the GPO Status to User configuration
settings disabled.

What is a Group Policy

Group policy can represent policy settings in the locally in the file
system or in Active Directory Domain Services. When used with
Active Directory, Group Policy settings are contained in a Group
Policy Object (GPO). A GPO is a virtual collection of policy settings,
security permissions, and scope of management (SOM) that you
can apply to users and computers in Active Directory. A GPO has
a unique name, such as a GUID. Clients evaluate GPO settings
using the hierarchical nature of Active Directory.

Policy settings are divided into policy settings that affect a


computer and policy settings that affect a user. Computer-related
policies specify system behavior, application settings, security
settings, assigned applications, and computer startup and
shutdown scripts. User-related policies specify system behavior,
application settings, security settings, assigned and published
applications, user logon and logoff scripts, and folder redirection.
Computer settings override user-related settings.

To create Group Policy, an administrator can use the Local Group


Policy Editor (gpedit.msc), which can be a stand-alone tool and
the settings stored locally. We recommend that you use the
Group Policy Object Editor as an extension to an Active Directory-
related MMC snap-in. The Group Policy Object Editor allows you to
link GPOs to selected Active Directory sites, domains, and
organizational units (OUs). Linking applies the policy settings in
the GPO to the users and computers in those Active Directory
objects. GPOs are stored in both Active Directory and in the
SYSVOL folder on each domain controller.

How Group Policy works

For computers, Group Policy is applied when the computer starts.


For users, Group Policy is applied at sign in. This initial processing
of policy can also be referred to as a foreground policy
application.

The foreground application of Group Policy can be synchronous or


asynchronous. In synchronous mode, the computer doesn't
complete the system start until computer policy is applied
successfully. The user logon process doesn't complete until user
policy is applied successfully. In asynchronous mode, if there are
no policy changes that require synchronous processing, the
computer can complete the start sequence before the application
of computer policy is complete. The shell can be available to the
user before the application of user policy is complete. The system
then periodically applies (refreshes) Group Policy in the
background. During a refresh, policy settings are applied
asynchronously.

To learn more about how Group Policies work, see Group Policy
Processing.

What is an Organizational Unit (OU)

An OU is the lowest-level Active Directory container to which you


can assign Group Policy settings. Typically, you assign most GPOs
at the OU level, so make sure that your OU structure supports
your Group Policy-based client-management strategy. You might
also apply some Group Policy settings at the domain level,
particularly password policies. Few policy settings are applied at
the site level. A well-designed OU structure that reflects the
administrative structure of your organization and takes advantage
of GPO inheritance simplifies the application of Group Policy. For
example, a well-designed OU structure can prevent duplicating
certain GPOs so that you can apply these GPOs to different parts
of the organization. If possible, create OUs to delegate
administrative authority and to help implement Group Policy.
2. Creating and issuing a new certificate template,
obtaining a Public SSL Authorization Certificate.

n this article

1. Prerequisites
2. Download and Import the Root Certificate from the CA
3. Create a certificate template: Enterprise CAs
4. Request a certificate using a request file
Show 6 more

This article describes how to obtain a certificate and use with


Operations Manager Management Server, Gateway, or Agent
using either a Stand-Alone or Enterprise Active Directory
Certificate Services (AD CS) Certificate Authority (CA) server on
the Windows platform.

 To request and accept a certificate, use


the certreq command-line utility. To submit and retrieve
a certificate, use a web interface.

Prerequisites

Ensure you've the following:

AD-CS installed and configured in the environment with


web services or a third party Certificate Authority with
certificates that match the required settings shown.
 HTTPS binding and its associated certificate installed. For
information about creating an HTTPS binding, see How to
Configure an HTTPS Binding for a Windows Server CA.
 A typical desktop experience and not Core servers.
Important

Cryptography API Key Storage Provider (KSP) is not supported for


Operations Manager certificates.
Note

If your organization doesn't use AD CS or uses an external


certificate authority, use the instructions provided for that
application to create a certificate and ensure it meets the
following requirements for Operations Manager, and then follow
the Import and Installation steps provided:

Copy
- Subject="CN=server.contoso.com" ; (this should be the FQDN or
how the system shows in DNS)

- [Key Usage]
- Key Exportable=TRUE ; This setting is required for Server
Authentication
- HashAlgorithm = SHA256
- KeyLength=2048
- KeySpec=1
- KeyUsage=0xf0
- MachineKeySet=TRUE

- [EnhancedKeyUsageExtension]
- OID=1.3.6.1.5.5.7.3.1 ; Server Authentication
- OID=1.3.6.1.5.5.7.3.2 ; Client Authentication

- [Compatibility Settings]
- Compatible with Windows Server 2003 ; (or newer based on
environment)

- [Cryptography Settings]
- Provider Category: Legacy Cryptography Service Provider
- Algorithm name: RSA
- Minimum Key Size: 2048 ; (2048 or 4096 as per security
requirement.)
- Providers: "Microsoft RSA Schannel Cryptographic Provider
and Microsoft Enhan

You can use this procedure to configure the certificate template


that Active Directory® Certificate Services (AD CS) uses as the
basis for server certificates that are enrolled to servers on your
network.
While configuring this template, you can specify the servers by
Active Directory group that should automatically receive a server
certificate from AD CS.

The procedure below includes instructions for configuring the


template to issue certificates to all of the following server types:

 Servers that are running the Remote Access service,


including RAS Gateway servers, that are members of
the RAS and IAS Servers group.
 Servers that are running the Network Policy Server (NPS)
service that are members of the RAS and IAS
Servers group.

Membership in both the Enterprise Admins and the root


domain's Domain Admins group is the minimum required to
complete this procedure.

To configure the certificate template

1. On CA1, in Server Manager, click Tools, and then


click Certification Authority. The Certification
Authority Microsoft Management Console (MMC) opens.

2. In the MMC, double-click the CA name, right-


click Certificate Templates, and then click Manage.

3. The Certificate Templates console opens. All of the


certificate templates are displayed in the details pane.

4. In the details pane, click the RAS and IAS


Server template.

5. Click the Action menu, and then click Duplicate


Template. The template Properties dialog box opens.

6. Click the Security tab.

7. On the Security tab, in Group or user names,


click RAS and IAS servers.

8. In Permissions for RAS and IAS servers,


under Allow, ensure that Enroll is selected, and then
select the Autoenroll check box. Click OK, and close
the Certificate Templates MMC.
9. In the Certification Authority MMC, click Certificate
Templates. On the Action menu, point to New, and
then click Certificate Template to Issue. The Enable
Certificate Templates dialog box opens.

10. In Enable Certificate Templates, click the name of


the certificate template that you just configured, and
then click OK. For example, if you did not change the
default certificate template name, click Copy of RAS
and IAS Server, and then click OK.

How to manage templates

You must be a member of Domain Admins to access and


administer certificate templates for a domain. To add this snap-in,
install the AD CS management tools on the management
computer. The AD CS management tools are part of the Remote
Server Administration Tools (RSAT). You can install the
management tools on a Windows Server computer by running the
following PowerShell command from an elevated PowerShell
session:

PowerShellCopy
Install-WindowsFeature RSAT-ADCS

To configure an MMC to use the Certificate Templates snap-in:

1. Right click Start, click Run, and then type mmc.


2. On the File menu, click Add/Remove Snap-in.
3. On the Add and Remove Snap-ins dialog box, double-
click the Certificate Templates snap-in to add it to the
list. Click OK.

Create a new certificate template

You can create a new certificate template by duplicating an


existing template and using the existing template's properties as
the default for the new template. Review the list of default
certificate templates, and examine their properties to identify the
existing certificate template that most closely meets your needs.
Membership in Domain Admins, or equivalent, is the minimum
required to complete this procedure.

To create a new certificate template:


1. Open the Certificate Templates snap-in and connect to
the AC CS Enterprise root or subordinate server.
2. Right-click the template to copy from, and then click
Duplicate Template.
3.Accessing IPv6. Networking toolset. Creating a
routing table.
This guide outlines strategies for transitioning an IPv4 network
environment in Azure to IPv6. This transition is necessary as the
number of internet-connected devices expands and IPv4
addresses near exhaustion. The IPv6 protocol provides a larger
pool of internet addresses to accommodate future growth and
offers enhanced security features (native IPSec), flow labeling,
and simplified network configurations. This article helps you
understand IPv6, acquire IPv6 addresses, and transition to IPv6.

Understand IPv6

IPv6 has such a large address space that you should use
consistent IPv6 address block sizes that over-allocate IPv6
addresses. This networking strategy contrasts with IPv4. The
limited number of IPv4 addresses forces you to use the smallest
possible subnet size. This table gives you a sense of the increased
size of IPv6:

Expand table
IP Number of IP addresses
version
IPv4 4,294,967,296
IPv6 340,282,366,920,938,463,463,374,607,431,768,211,456

Dual stacking. Azure virtual networks support dual stacking. A


network that supports dual stacking can process IPv4 and IPv6
traffic simultaneously. You can assign a new IPv6 address block to
a subnet that has an existing IPv4 block. Services that use IPv6
can coexist with services that use IPv4. You can therefore start
the IPv6 transition before all services support IPv6.

IPv6 in Azure. In your Azure environment, network interfaces


receive one of three types of IPv6 addresses:

 Private IP addresses. To enable IPv6 on private IP


addresses, you apply an IPv6 address range to the
virtual network and its subnets. The network interfaces
in subnets get a static or dynamic address, depending
on your configuration. You can see the IP address
assignment in the Azure portal. You can also see it in the
virtual machine configuration, if you use virtual
machines. In the operating system, this address is shown
as the IPv6 address.
 Public IP addresses. You can apply public IPv6 addresses
to network interfaces. Public IP addresses must be
globally unique and routable on the internet. You need
to generate a unique IPv6 address that can be used for
public endpoints on Azure, like load balancers or
application gateways. You can use the New-
AzPublicIpAddress cmdlet to create an IPv6 public
address in PowerShell.

The operating system configuration doesn't show the


public IP address, but you can see the public IP address
in the Azure portal. You can use public IPv6 addresses
for inbound and outbound communication to and from
the internet. You might need to update the route table
with user defined routes to support IPv6. Many
organizations use shared network virtual appliances
(NVAs) for public communication and don't assign a
public IP address to network interfaces. You aren't
charged for Azure public IPv6 addresses, although you're
charged for IPv4 addresses. For more information, see IP
Addresses pricing.

 Link-local addresses. Link-local addresses are a special


type of private IP address. In IPv6, link-local addresses
are automatically configured on all interfaces. They're
used for communication within a single network segment
and aren't routable on the internet. They come from
the fe80::/10 space instead of from your subnet's
address block. You can see the fe80::/10 address
assigned to your interface from within the operating
system.

For more information about other specialty address blocks,


see IANA IPv6 Special-Purpose Address Registry.

Acquire IPv6 addresses

If your organization already has IPv6 addresses, you can benefit


from using them in your Azure environment. If not, you need to
acquire new ones. Using existing addresses can be more cost-
effective and efficient, but acquiring new ones ensures that you
have a sufficient and continuous block of addresses for your
needs. It also reduces the chance of address conflicts. If you don't
have IPv6 space secured for your organization, you can use global
addresses or local addresses.

Global addresses: Global addresses are public IP addresses that


are unique across the internet. You can contact a registrar to
request a continuous block of general allocation or global
addresses. These IPv6 addresses can be used in subnets, virtual
networks, and regional supernets in Azure. To have sufficient
space for growth in multiple regions, you should plan to allocate a
/36 address space to your whole Azure environment. You can use
global addresses for both private networks and public endpoints,
or you can allocate different ranges. Unique global addresses
can't have IP address conflicts.

Local addresses: Local addresses are private IP addresses that


are used within a virtual network. You can use IPs in the unique
local address range. This address range functions like the IPv4
private address range, such as the 10.0.0.0/8 address space. IPv6
reserves the fc00::/7 address blocks for unique local addresses.
These addresses aren't globally reachable, even though they're a
part of the IPv6 Global Unicast Address range.

If you use the unique local address range, your IP addresses


might overlap with the IP address range of another organization.
If there's an overlap, you might experience challenges with
integrating networks. For more information, see the Unique Local
IPv6 Unicast Addresses memo.

Transition to IPv6

You should align your plan for assigning IPv6 addresses to your
Azure networks with your organization's IPv6 addressing plan.
Your organization should already have a plan for on-premises IPv6
use, so that you can allocate space between different locations
without overlapping. If you don't have a plan, you should define
one before you start your implementation on Azure. For more
information, see Plan for IP addressing.

Some of the practices that are necessary in IPv4 to conserve


addresses aren't applicable in IPv6. You should over-allocate IPv6
addresses and use a standard block size for the Azure
environment, regions, virtual networks, and subnets, as shown in
the following table. These recommendations apply to IPv6, not to
IPv4 environments. For more information, see Plan for IP
addressing.

Expand table
Scope Size Number of instances
Azure environment /36 1
Region /44 256
Virtual network /56 4,096 per region
Subnet /64 256 per virtual network

Transitioning regions to IPv6. You should use a supernet and


assign a /44 IPv6 address space to each Azure region. As with
IPv4, a supernet doesn't have a technical representation in Azure.
Instead, you assign and track it in your IP Address Management
system (IPAM). This table illustrates what the address blocks
would look like for multiple regions:

After this IP address space is allocated to the region, you can


deploy new networks and workloads by defining virtual networks
and subnets from that IP space.

Transitioning virtual networks to IPv6. You should assign a


/56 IPv6 address space to each virtual network. This assignment
facilitates networking management and streamlines the creation
process. It enables you to create 4,096 virtual networks in a
region and 256 subnets in a single virtual network.

Transitioning subnets to IPv6. You can continue to use your


existing subnet architecture and assign a /64 address block to
each subnet. This subnet size also enables you to plan your
network conceptually. You don't need to worry about resizing
subnets due to address exhaustion.

One significant difference between IPv6 networks and IPv4


networks on Azure is the minimum size of subnets. The minimum
size of IPv6 subnets on Azure is /64. Each subnet contains
18,446,744,073,709,551,616 hosts, minus

Reusing IPv4 addresses. As you transition to IPv6 addresses,


you can repurpose private IPv4 addresses in different virtual
networks within your Azure environment. This transferability
enables you to maintain active services while transitioning to IPv6
and effectively manage your IP space during the transition. The
reuse option gives you a larger effective IPv4 space. For any
peered virtual network, you must ensure that the IPv4 address
ranges don't overlap.
4. Remote access on Windows
Server
When you install the Remote Access Server Role with the Add
Roles and Features Wizard or Windows PowerShell, you can
choose to install one or more of the following three role services:

 Direct Access and VPN (RAS) service


 Routing service
 Web Application Proxy service

Anyone of these services can be installed either individually or on


the same server.

Important

Don't attempt to deploy Remote Access on a virtual machine (VM)


in Microsoft Azure. Using Remote Access in Microsoft Azure is not
supported. You can't use Remote Access in an Azure VM to deploy
VPN, DirectAccess, or any other Remote Access feature in
Windows Server. For more information, see Microsoft server
software support for Microsoft Azure virtual machines.

DirectAccess and VPN service

VPN (RAS)

The VPN service uses the connectivity of the internet and a


combination of tunneling and data encryption technologies to
connect to remote clients and offices.

With VPN and Routing service, you can also choose to deploy
Always On VPN. Always On VPN enables Windows 10 clients to
securely access shared resources, intranet Web sites, and the
applications on an internal network without having to manually
connect. For more information, see Always On VPN

DirectAccess

DirectAccess allows connectivity for remote users to organization


network resources without the need for traditional VPN
connections. With DirectAccess connections, remote client
computers are always connected to your organization. There's no
need for remote users to start and stop connections, as is
required with VPN connections. In addition, your IT administrators
can manage DirectAccess client computers whenever they're'
running and Internet connected.

Important

For Windows 10 or later, it is recommended to connect using


Always On VPN. DirectAccess should be used only for clients
earlier than Windows 10.

Routing service

The Routing service allows you to route network traffic between


subnets on your Local Area Network. Routing provides support for
the following technologies:

 Network Address Translation (NAT) routers


 LAN routers running Border Gateway Protocol (BGP)
 Routing Information Protocol (RIP)
 Multicast-capable routers using Internet Group
Management Protocol (IGMP)
 Demand-dial routing
 Unicast IP Routing

As a full-featured router, you can deploy RAS on either a physical


computer or as a virtual machine (VM) on a computer that's
running Hyper-V.

To install Remote Access as a LAN router, either use the Add


Roles and Features Wizard in Server Manager and select
the Remote Access server role and the Routing role service; or
type the following command from an elevated Windows
PowerShell prompt, and then press ENTER.

Copy
Install-RemoteAccess -VpnType RoutingOnly

Web Application Proxy service

Web Application Proxy service provides reverse proxy


functionality for web applications inside your corporate network to
allow users on any device to access them from outside the
corporate network. Web Application Proxy pre-authenticates
access to web applications using Active Directory Federation
Services (AD FS), and also functions as an AD FS proxy.

To install Remote Access as a Web Application Proxy, either use


the Add Roles and Features Wizard in Server Manager and select
the Remote Access server role and the Web Application
Proxy role service; or type the following command at a Windows
PowerShell prompt, and then press ENTER.

Copy
Install-RemoteAccess -VpnType SstpProxy

For more information, see Web Application Proxy.

For more information about other networking technologies,


see Networking in Windows Server.

Next Steps

Now you've learned about what the Remote Access role is, here
are some articles that might help you during deployment:

 Always On VPN Deployment Guide


 Border Gateway Protocol (BGP)
 RAS Gateway
 RAS Gateway for SDN
 Virtual Private Networking (VPN)

How to enable Remote Desktop

The simplest way to allow access to your PC from a remote device


is by using the Remote Desktop options under Settings. Since this
functionality was added in the Windows 10 Fall Creators update
(1709), a separate downloadable app is also available that
provides similar functionality for earlier versions of Windows.

Windows 10 Fall Creator Update (1709) or later

You can configure your PC for remote access with a few easy
steps.
1. On the device you want to connect to, select Start and
then choose the Settings icon on the left.
2. Select the System group followed by the Remote
Desktop item.
3. Use the slider to enable Remote Desktop.
4. It's also recommended to keep the PC awake and
discoverable to facilitate connections. Select Show
settings to enable.
5. As needed, add users who can connect remotely by
clicking Select users that can remotely access this
PC. Members of the Administrators group automatically
have access.
6. Make note of the name of this PC under How to
connect to this PC. You'll need this to configure the
clients.

Windows 7 and early version of Windows 10

To configure your PC for remote access, download and run


the Microsoft Remote Desktop Assistant. This assistant updates
your system settings to enable remote access, ensures your
computer is awake for connections, and checks that your firewall
allows Remote Desktop connections.

Connect from a client device

To use Remote Desktop to connect to the remote PC you set up,


type Remote Desktop Connection on your local PC, and then
select Remote Desktop Connection. Enter the name of the
remote PC, then select Connect.

On your Mac, iOS, or Android device, open the Remote Desktop


app (available for free from the app stores). Add the name of the
remote PC, and then wait for the connection to complete.

Should I enable Remote Desktop?

If you only want to access your PC when you are physically using
it, you don't need to enable Remote Desktop. Enabling Remote
Desktop opens a port on your PC that is visible to your local
network.
5. Interacting with the main server.
WAC for managing core servers.
Sconfig utility
You can manage a Server Core server in the following ways:

 Using Windows Admin Center


 Using Remote Server Administration Tools running on
Windows 10
 Locally and remotely using Windows PowerShell
 Remotely using Server Manager
 Remotely using an MMC snap-in
 Remotely with Remote Desktop Services

You can also add hardware and manage drivers locally, as long as
you do that from the command line.

There are some important limitations and tips to keep in mind


when you work with Server Core:

 If you close all command prompt windows and want to


open a new Command Prompt window, you can do that
from the Task Manager. Press CTRL+ALT+DELETE,
click Start Task Manager, click More Details > File >
Run, and then type cmd.exe. (Type Powershell.exe to
open a PowerShell command window.) Alternatively, you
can sign out and then sign back in.
 Any command or tool that attempts to start Windows
Explorer won't work. For example, running start . from a
command prompt won't work.
 There's no support for HTML rendering or HTML help in
Server Core.
 Server Core supports Windows Installer in quiet mode so
that you can install tools and utilities from Windows
Installer files. When installing Windows Installer
packages on Server Core, use the /qb option to display
the basic user interface.
 To change the time zone, run Set-Date.
 To change international settings, run control intl.cpl.
 Control.exe won't run on its own. You must run it with
either Timedate.cpl or Intl.cpl.
 Winver.exe isn't available in Server Core. To obtain
version information use Systeminfo.exe.
Managing Server Core with Windows Admin Center

Windows Admin Center is a browser-based management app that


enables on-premises administration of Windows Servers with no
Azure or cloud dependency. Windows Admin Center gives you full
control over all aspects of your server infrastructure and is useful
for management on private networks that aren't connected to the
Internet. You can install Windows Admin Center on Windows 10,
on a gateway server, or on an installation of Windows Server with
Desktop Experience, and then connect to the Server Core system
that you want to manage.

Managing Server Core remotely with Server Manager

Server Manager is a management console in Windows Server that


helps you provision and manage both local and remote Windows-
based servers from your desktops, without requiring either
physical access to servers, or the need to enable Remote Desktop
protocol (RDP) connections to each server. Server Manager
supports remote, multi-server management.

To enable your local server to be managed by Server Manager


running on a remote server, run the Windows PowerShell
cmdlet Configure-SMRemoting.exe –Enable.

Managing with Microsoft Management Console

You can use many snap-ins for Microsoft Management Console


(MMC) remotely to manage your Server Core server.

To use an MMC snap-in to manage a Server Core server that is a


domain member:

1. Start an MMC snap-in, such as Computer Management.


2. Right-click the snap-in, and then click Connect to
another computer.
3. Type the computer name of the Server Core server, and
then click OK. You can now use the MMC snap-in to
manage the Server Core server as you would any other
PC or server.

To use an MMC snap-in to manage a Server Core server


that isn't a domain member:
1. Establish alternate credentials to use to connect to the
Server Core computer by typing the following command
at a command prompt on the remote computer:

Copy
cmdkey /add:<ServerName> /user:<UserName>
/pass:<password>

If you want to be prompted for a password, omit


the /pass option.

2. When prompted, type the password for the user name


you specified. If the firewall on the Server Core server
isn't already configured to allow MMC snap-ins to
connect, follow the steps below to configure Windows
Firewall to allow MMC snap-in. Then continue with step
3.

3. On a different computer, start an MMC snap-in, such


as Computer Management.

4. In the left pane, right-click the snap-in, and then


click Connect to another computer. (For example, in
the Computer Management example, you would right-
click Computer Management (Local).)

5. In Another computer, type the computer name of the


Server Core server, and then click OK. You can now use
the MMC snap-in to manage the Server Core server as
you would any other computer running a Windows
Server operating system.

To configure Windows Firewall to allow MMC snap-in(s) to connect

To allow all MMC snap-ins to connect, run the following command:

PowerShellCopy
Enable-NetFirewallRule -DisplayGroup "Windows Remote
Management"

To allow only specific MMC snap-ins to connect, run the following:

PowerShellCopy
Enable-NetFirewallRule -DisplayGroup "<rulegroup>"

Where rulegroup is one of the following, depending on which


snap-in you want to connect:

Expand table
MMC snap-in Rule group
Event Viewer Remote Event Log
Management
Services Remote Service
Management
Shared Folders File and Printer Sharing
Task Scheduler Performance Logs and
Alerts,
File and Printer Sharing
Disk Management Remote Volume
Management
Windows Defender Firewall with Advanced Windows Defender Firewall
Security
Remote Management
Note

Some MMC snap-ins don't have a corresponding rule group that


allows them to connect through the firewall. However, enabling
the rule groups for Event Viewer, Services, or Shared Folders will
allow most other snap-ins to connect.

Additionally, certain snap-ins require further configuration before


they can connect through Windows Firewall:

 Disk Management. You must first start the Virtual Disk


Service (VDS) on the Server Core computer. You must
also configure the Disk Management rules appropriately
on the computer that is running the MMC snap-in.

You might also like