Troubleshooting is about three big things: predicting what can happen, determining the anomalies, and investigating why that anomalies happened. Many network admins break down network infrastructure problems by analyzing the Layer 3 path through the network, hop by hop, in both directions. This process helps them isolate the problem; once they determine which hop in […]
Every admin has made an error while creating a group policy and blew up an important machine. Murphy’s law states that you will then be unable to get the policy to repeal itself on the machine. Well this handy little tip will save the day. delete the following file while you are logged in a […]
Can’t Use apt-get i.e. /boot is 100% full NOTE: this is only if you can’t use apt to clean up due to a 100% full /boot 1. Get the list of kernel images Get the list of kernel images and determine what you can do without. This command will show installed kernels except the currently […]
The 2960G is a great gig switch that is being pulled from corporations and flooding the grey market. The switch is great for home lab use etc. Most people do not know that if you are running a later version of IOS on it it will also do layer 3 routing! this is how you […]
if you spend any time working on networks you are going to come across the need to identify a device connected to a port on a switch. I use primarily cisco equipment and finding the IPs can be quite a pain in the neck if you are searching the mac on the interface then looking […]
On newer generation computers you may have noticed that the windows key sticker is no longer on the bottom or side of the unit. This can make for some frustration when trying to do a clean rebuild. Well chances are the key is stored int he BIOS of the machine and if you are in […]
If you work with Cisco gear then you need to keep your code updated to stay ahead of security pugs with IOS etc. I always forget a command or 2 so I figured I would write it down for myself as well as others. I am going to go over tftp updating using cli as […]
HOWTO: Configure Windows DHCP for Nortel IP telephones In this example we will configure Windows DHCP for Nortel IP telephones. In addition to your standard Option 003 Router you will also need a custom scope option in order for an Nortel IP phone to boot properly using DHCP. 1. Open the DHCP MMC under Control Panel>Administrative Tools>DHCP […]
As many have heard over the past year older versions of SSL have been compromised and should no longer be used by servers to negotiate communications. however disabling these deprecated SSL versions can be a bit of a headache. I would strongly suggest anyone with public facing servers test them to be safe. I personally […]
This applies for Exchange 2010 as well as Exchange 2013. I just tested this out on both and they both work. Essentially we had a problem, users were not smart enough to go to https://owa.domain.com or https://mail.domain.com/owa (Mostly the HTTPS:// part). With this, users can go to “owa.domain.com” or “mail.domain.com/owa” and it will automatically forward […]
How to Disable Driver Signature Verification on 64-Bit Windows 8.1 or 10 (So That You Can Install Unsigned Drivers) 64-Bit editions of Windows require digitally signed drivers. The problem is that many devices ship with unsigned drivers. Today, we’ll show you how to install them regardless. Digitally signed drivers include an electronic fingerprint that indicates […]
Windows 10 has hit and it is a fast stable operating system. however MS has given us some features that we should be disabling immediately. For example windows updates delivery optimization uses your computer to send windows updates to other folks on the internet. You can disable it by knowing where to go to disable […]
I came across this startling info on a blog and had to share the original information is located at http://lauren.vortex.com/archive/001116.html most importantly it not only tells you about the issue but also tells you how to correct it! very good info Lauren Weinstein! A couple of days ago I discussed a number of privacy and other […]
Every network admin has had to remove a print server from their environment and set up a new one. While installing a print server can be tedious job. the worst part for me has always been updating the installed printers on all of my clients. well with this little vbscript it is no problem at […]
Great info from tech republic – never even knew about this neat little trick! Control panel settings and configurations are typically scattered all over in Windows 8, unless you know about god mode. For the record, I like Microsoft Windows 8. However, just like any operating system, it is not perfect – there are always annoyances. […]
Recently I needed to disable proxy settings on windows machines in a network. I was trying to remove an old proxy based web content filter (eeewww). I know it is only a few clicks but I am all about not using the sneaker net if i can avoid it. Plus it is always nice to […]
I am sure you have installed a GBIC in a Cisco switch that was not manufactured by Cisco. and your switch no doubt shut down the SFP port and gave the following error %PHY-4-UNSUPPORTED_TRANSCEIVER: Unsupported transceiver found in Gi1/0/0 %GBIC_SECURITY_CRYPT-4-VN_DATA_CRC_ERROR: GBIC in port 65538 has bad crc well here is how we fix that […]
I have had many people ask me about commands on switches and I was going to make a cheat sheet but Erik Rodriguez did such a nice job I am going to share his work Great job Erik Cisco IOS Cheat Sheet By Erik Rodriguez These commands are used on all Cisco devices running the […]
Most domain admins these days are following the very smart practice of using a normal user account for their day to day work and another for their domain admin tasks. Usually it is the same username with da at the end, beginning or something similar. The trouble comes in when a admin wants to use […]
I have run into several SB installs with very high memory utilization issues lately. I started poking around and noticed it was MS SQL chewing up all the memory. I thought this was odd so I hit good old google and sure enough it is a very common issue for WSUS to go a bit […]
As most everyone has heard SSL 2.0 has been compromised. Most PCI certification authorities are requiring SSL 2.0 to be disabled. I am sure with poodle SSL 3.0 is not far behind but that is for another article. I have written the following batch file to make all the needed changes and save some legwork. […]
These are notes I’ve compiled after many years of supporting Northern Telecom/Nortel Networks SL1, Meridian 1 and NCS 1000 phone systems. While graphical tools exist, many times it’s easier to connect via serial terminal or a telnet session and use the command line for common tasks. ADD AN AREA CODE > LD 90 REQ NEW […]
Many times I came across one issue… how to grant access to CLI (Command Line Interface) on Cisco devices without creating separate username and password for each user on each device? In order to resolve that I did use AAA features of Cisco IOS and built-in Windows Server 2008 R2 component – NPS (Network Policy […]
Many windows admins these days are very busy upgrading/replacing windows XP. I am not going to go into how very important to remove windows XP machines from our environments since it is now EOL and no patches will be released any longer. What I am going to show you is how to find all those […]
We just recently begun building an Exchange 2013 DAG to support out email environment. This is part of an internal shift to Lync 2013 and Exchange 2013 for unified communications. We followed Microsoft instructions on building my first 2013 machine, migrated a single test mailbox and started testing. We found no mail flow between […]
VMWare Converter uses a protocol called NFC for the cloning process. To increase security, encryption was introduced with Converter 5.0 for the data transfer. Unfortunately this comes at the expense of performance. If you do not need this security feature, it is possible to improve the speed and performance of your conversions dramatically. To achieve […]
If you have a career in technology then you know how important certifications are to obtain a good position. I have been taking exams for quite some time and along the way I have found that practice exams are the best way to prepare. You can enroll in boot camps and they are great however […]
I have been pulling my hair out for a couple days trying to figure to get the EFA spam filter tagged messages to automatically go to my exchange outlook users junk mail folders. I finally figured it out and I would like to share it. First what are we trying to accomplish with this. the […]
That’s right, you can pull all of your email users into E.F.A. and authenticate against AD (probably any LDAP server)! I plan on making this a configuration option in a later release of E.F.A. For now, follow these steps. 1) Create a user and password (proxy service account) in AD to allow username lookups 2) […]
EFA Project works great out of the box. However I did run across one issue. By default it only scans messages that are 200k and smaller. This worked great in the past when bandwidth was expensive and spammers were using plain text. however these days they are sending pictures to get by spam filters etc. […]
If you are like me spam and virus filtering for email servers is a very costly and time consuming task. There are many great retail solutions that do a excellent job of filtering. But they are costly and generally licensed on a per mailbox basis. Some would say that most newer mail servers such as […]
Exchange 2013 451 4.7.0 Temporary server error. Please try again later. PRX5 In Exchange 2013 RTM and Exchange 2013 CU1 you may occasionally receive the following errors in your Outlook clients as seen below. <strong>451 4.7.0 Temporary server error. Please try again later. PRX5</strong> And in the connectivity logs you may see NS server […]
I have run into the max message size limit alot lately especially in sbs 2011 installs. most people need the limit increased to at least 20 meg. you can follow this documentation to do so. this can also be done with the gui however the exchange powershell makes these changes much faster. Size limits […]
The issue and solution described here is by design, but not known by every customer so here’s my short write-up on this subject. Recently, I was at a customer reporting issues with several users not being able to synchronize their mobile devices using ActiveSync. The customer was running Exchange 2013 SP1 and used various […]
Hi Windows Lovers!? (Looking to install Windows Server? The same steps apply, but for a server specific guide, go here Create a bootable Windows Server 2012 R2 installation USB flash drive) This time I’ll help you find a way to install Windows 8.1 quick and easy, from a simple USB flash drive. It’s a piece of […]
Show Exchange Message Size Limits in SBS 2008/2011 It seems like every month I get a call about someone not being able to send or receive an email due to size limits. If you know where all the limits are in the Exchange Management Console (and if you’re aware of the 30% bloating that happens […]
You get “Iashlpr initialization failed” error after installing DHCP on Windows 2008R2 After installing DHCP server on windows 2008 R2, you notice that your system event log will be filled with Errors Event ID: 1070 “Iashlpr initialization failed: The DHCP service was unable to access path specified for the audit log. So DHCP server cannot […]
Enable Remote Management You may receive the following, somewhat misleading, error panel when attempting to remotely manage a Core machine. The panel correctly tells you that you have to enable the windows firewall rules. It tells you the wrong rule sets when the machine you are trying to manage is a server 2012 instance, probably […]
Activating Server Core Depending on the output of the command you entered to check the status you can activate your Server Core installation in a couple of ways: Activating with a pre-entered product key When you entered a product key when you installed Windows Server 2008 but didn’t select the option to activate automatically you […]
With working on my MCSE for server 2012 I needed to learn how to use windows server 2012 core. unfortunately configuring basic settings from the power shell is a whole lot different than the gui. You can configure everything and then uninstall the GUI but that is not really the correct way to do it. […]
Upon deploying my first windows 2012 r2 essentials box with anywhere access enabled. I was surprised that I could only access the servers dashboard remotely. That is obviously a problem for working on the server remotely. Oddly enough it is not a very well known fix to change it. First thing log in to the […]
new wireless lan controller keeps failing rdius authentication with errors like this RADIUS server 10.x.x.x:1645 deactivated in global list RADIUS server 10.x.x.x:1645 failed to respond to request (ID 65) for client 00:0b:6b:87:54:d2 /user ‘unknown’ the problem is 2 fold the cisco wireless lan controller radius configuration defaults to a time out of 2 seconds. you […]
Tutorial: 802.1X Authentication via WiFi – Active Directory Network Policy Server Cisco WLAN Group Policy Here is how to implement 802.1X authentication in a Windows Server 2008 R2 domain environment using Protected-EAP authentication. I have designed the tutorial to be worked on in the specific order to prevent downtime if deployed during the day. By […]
Issue “Please insert overwritable media into the robotic library using the import command is displayed and the job status Queued during a backup job and overwritable media is available in the library and media sets. Error Alert:: Please insert overwritable media into the robotic library using the import command Cause Even after Basic troubleshooting […]
Had a puzzler last week. Client called up to say one of his contacts couldn’t email him. It was being rejected. Message Rejections will be a common problem for many people, and the best thing to do is get a copy of the rejection message or what i call NDR (Non Delivery Receipt (or Report) […]
If you need to export a list of user mailboxes (because your boss is making you or you simply have nothing better to do), it is quite an easy task if you have Exchange 2007 and up because of PowerShell snapins. You can just fire up PowerShell and import the Exchange 2010 Module. Add-PSSnapin Microsoft.Exchange.Management.PowerShell.E2010 Then: […]
Iperf is a neat little tool with the simple goal of helping administrators measure the performance of their network. Worthy of mention is the fact that it can measure both TCP and UDP performance on a network. Iperf is cross platform software and open source. You can download Iperf.exe from: Iperf.exe Linhost.info or Iperf.exe Ucf.edu We will […]
HOWTO: Configure Windows DHCP for Avaya IP telephones In this example we will configure Windows DHCP for Avaya IP telephones. In addition to your standard Option 003 Router you will also need a custom scope option in order for an Avaya IP phone to boot properly using DHCP. While I do reference the IP Office […]
Steps to take if your web application does not support the new Internet Explorer version 10. Find the recommended browser for your particular web application, by searching the KnowledgeBase for “recommended browser” for your application. You can test if Internet Explorer 10 will work by clicking the Compatibility View icon on the IE address […]
I was an early adopter of windows 8. And I do admit it is a very fast stable OS but MS really blundered in my opinion when it took away windows basic functionality we have used for the past 25 years. Yup I mean the trusty start button! I can understand getting away from that older technology […]
I have quite a few things going on at work at the moment. We are retiring an old Windows 2003 domain controller and bringing in a fresh new Server 2008 R2 DC as its replacement. This old server had many things on it which needed to be migrated off. Microsoft Certificate Authority was one of […]
As many folk have probably run into the domain admin from time to time is asked to obtain emails etc. from users mailboxes for whatever reason. You could reset the users password and login that way but what if you do not want to do that? well you can give a user access to all […]
There may come a time when you want to move a SharePoint content database from one disk on your SQL Server to another. Perhaps you installed SharePoint in standalone mode and don’t like the location it chose or you just need to move some stuff around. The following assumes you are moving the database from one disk […]
I am sure many of you have tried to open a document that has been emailed to you only to have word give you the ambiguous nondescript error about not being able to open the document. well here is how to get rid of it. BTW it is also easily remedied via group policy which is how […]
With the release of Windows Server 2008 and IIS 7, Microsoft has included PHP5 FASTCGI support. ISAPI is still faster in my opinion, and if used correctly, very stable. PHP uses a 32-bit DLL so it will not work with an x64 system. There are several ports of PHP to x64, but all have proved […]
I was cleaning up orphaned roaming profiles on one of my citrix boxes and ran across a profile I could not delete. in the past a quick reboot of the server solved the issue but not this time. every time I tried to delete the folder I got the “unable to delete directory: Access denied” […]
If you are administering a large domain I am sure you have the headache of trying to keep user accounts current. people come and people go and the network admin is usually the last person any one tells. Unfortunately that leaves a serious security vulnerability for you to deal with. possible high level accounts just hanging out in limbo. […]
10. Run Automatic Maintenance on a Schedule Windows 8 has a new feature that runs automatic maintenance tasks like software updates, security scanning, and other diagnostic tests daily. By default, it runs them at 3AM, of if you’re using your computer, the next time your computer becomes idle. You can change this time in the […]
Windows 8 is provoking a Marmite-like reaction among users, but that doesn’t mean you’ll fall directly into the love or hate camps. It’s more likely you’ll find certain new features useful and others unnecessary. If you’re pining for features no longer present, this article is for you.In this how-to guide, I’ll reveal how to water […]
Ok so you took the plunge and are running some version of VMware. Now you want to squeeze every bit of performance out of your hardware possible. In a previous post we went over changing your scsi controller to a para virtual adaptor fit hat is optimized for vm performance. Next up your network adaptor! […]
Why would I want to do this? well para virtual scsi controllers do not require as much system resources from the host to run and therefore give you better performance. woohoo how do we do this? http://kb.vmware.com/selfservice/microsites/search.do?language=en_US&cmd=displayKC&externalId=1002149 1. While the VM is running, add a new disk with SCSI ID 1:0 (or 2:0 if 1:x already exists) […]
If you are using a tape library with Symantec Backup Exec you have probably been annoyed hen you went to the library to remove a tape to see the library is locked message. I know it has caused me to use a couple not so work friendly words. Well here is a easy way to […]
Well everyone has shelled out their hard earned cash on a antivirus product at some time or another. Well no need to do that any longer there are many free options out there these days avg for instance http://free.avg.com/us-en/homepage and MS security essentials http://windows.microsoft.com/en-US/windows/products/security-essentials I personally use and recommend MS security essentials for simple reasoning. MS makes […]
So you have exchange server and a webserver on your network with only one server. So what do y0u to get the folks that forget to put the https on the beginning of your webmail url to the right spot. If you had multiple ips it would be easy just redirecting all ssl traffic to a […]
Most drivers these days are signed by manufacturers for security reasons as well as monetary for MS but that’s another discussion all together. But if you are like me and need to use legacy or obscure hardware than windows 8 poses a particular issue out of the box. I personally use a USB to serial adaptor for […]
An often asked question is how to reclaim space after a service pack installation. We’ve talked about VSP1CLN and COMPCLN for Windows Vista and 2008. Now that SP1 is out, it’s time to talk about how to do this on Win7/R2. It’s a DISM command now: DISM.exe /Image:C:\test\offline /Cleanup-Image /spsuperseded /hidesp NOTE: This command is […]
You get “Iashlpr initialization failed” error after installing DHCP on Windows 2008R2
After installing DHCP server on windows 2008 R2, you notice that your system event log will be filled with Errors Event ID: 1070 “Iashlpr initialization failed: The DHCP service was unable to access path specified for the audit log. So DHCP server cannot talk to NPS server. It could be that IAS service is not started.”
Event ID: 1070
Iashlpr initialization failed: The DHCP service was unable to access path specified for the audit log. So DHCP server cannot talk to NPS server
At first I have ignored this error since it wasn’t affecting my DHCP Server behavior, everything was working fine, and clients were obtaining proper IP addresses and network settings.
So I have decided to go back and check the DHCP configuration once again, and have a look on the Event ID:1070 already mentioned above. After a bit of research on the error I found it is a good time to understand the relation between the DHCP and NPS server http://technet.microsoft.com/en-us/library/cc726898(WS.10).aspx . Since this is a new behavior with windows server 2008. To make a story short I have concluded that my DHCP server is looking for the NPS server For NAP integration however I didn’t setup any NPS server on the machine and I am not intending to use it, so I thought I would give it a try and try to disable NAP on my DHCP server for all the scopes. So I went to the IPv4 properties and opened the “Network Access protection” Tab examined everything and I disabled the NAP for all the scopes.
After disabling NAP I have restarted the DHCP services, and all the error Events that were occurring has disappeared, and then I went back and run the Fwctools on my clients and got successful results, same as the TMG firewall client Auto Detect worked properly.
you may notice the above snapshot that the DHCP server behavior when Network Policy Server (NPS) is unreachable is set to full however this didn’t keep the DHCP server from dropping WPAD queries. So I think it might be either a bug in DHCP 2008 R2 or this settings works only when you already have NPS Services installed but not reachable, which find doesn’t makes sence.
Hope that this information will be helpful for you
- COM+ Network Access (DCOM-In)
- Remote Event Log Management
- Windows Management Instrumentation (WMI)
- Remote Event Log Management
netsh advfirewall firewall set rule group=”Windows Management Instrumentation (WMI)” new enable=yes
netsh advfirewall firewall set rule group=“remote event log management” new enable=yes
The Computer Management control panel (mmc) should now be able to remotely connect to and manage your core server.
Depending on the output of the command you entered to check the status you can activate your Server Core installation in a couple of ways:
Activating with a pre-entered product key
When you entered a product key when you installed Windows Server 2008 but didn’t select the option to activate automatically you need to give a command to start activation:
start /w slmgr.vbs -ato
When done check the status of Windows Product Activation again.
Entering a product key and activating
When you choose to install Windows Server 2008 without entering a product key at the product key screen you need to enter a product key and activate your installation after that. To enter your 25-digit product key and activate afterwards, simply type the following commands:
start /w slmgr.vbs -ipk ABCDE-FGHIJ-KLMNO-PQRST-UVWXY
start /w slmgr.vbs -ato
Where you need to replace ABCDE-FGHIJ-KLMNO-PQRST-UVWXY with the Windows product key from your Certificate of Authenticity. When done check the status of Windows Product Activation again.
Switching from KMS to MAK
When the string VOLUME_KMSCLIENT appears as output of the slmgr.vbs -dli command, it means your Server Core installation is using KMS activation, which is one of the activation options in Volume Activation 2.0. If you don’t have a KMS server or know the server isn’t going to be in the vicinity of your KMS Server every week you’re going to have a problem.
You can manually activate your installation of Windows Server 2008 by entering your Multiple Activation Key (MAK). You can find your Multiple Activation Keys (MAKs) below the list with other product keys when logged in to your MSDN Subscription.
To switch from KMS to MAK simply enter your Multiple Activation Key and activate afterwards. The commands are the same as in the previous activation method:
start /w slmgr.vbs -ipk ABCDE-FGHIJ-KLMNO-PQRST-UVWXY
start /w slmgr.vbs -ato
Setting different KMS settings
A Windows Server 2008 installation will try to reach a Key Management Services (KMS) Server every 10.080 minutes (every week) to check its license. By default Windows Server 2008 and Windows Vista, configured as KMS clients will lookup the KMS Server in DNS requesting the contents of the SRV record for _vlmcs._tcp and connect using TCP 1688.
Although you can’t change this time skew, you can edit the name and portnumber of the KMS server your Windows Server 2008 installation will try to reach. Particularly in scenarios where security is at stake you can manually enter KMS Server information to your Windows Server 2008 installation using the following command:
start /w slmgr.vbs -skms fqdn.of.the.KMS.server[:port]
Where fqdn.of.the.KMS.server can be replaced with the Fully Qualified Domain Name (FQDN) of your Key Management Services (KMS) Server. Optionally you can specify a port to connect with when you don’t want communication over TCP 1688. Of course your KMS Server on the other side must be configured properly as well.
To reset your KMS client to default settings use the following command:
start /w slmgr.vbs -ckms
Activating without Internet
Server Core might be used in environments without Internet access. I know this sounds silly but I know of a few and I don’t go out as much as some of my fellow bloggers do…
In this scenario you activate your Server Core installation by first running:
start /w slmgr.vbs –dti
Write down the Installation ID, which consists of nine blocks of six digits. After that call your local Microsoft Activation Call Center and write down the activation key, which consists of eight blocks of six digits you receive in response to punching in the Installation ID.
start /w slmgr.vbs –atp GUID ActivationID
Where ActivationID must be notated as one long 48-digit string.
Run the command to check your licensing information (above) to confirm your Server Core installation was activated properly.
Switching from MAK to KMS
Another scenario might be you want to switch back from using a Multiple Activation Key (MAK) to Key Management Services (KMS) Servers. This might be due to the fact you want more control over your in-use licenses.
To switch you need to enter your KMS product key. If you were paying attention before you might have already found the problem: Windows Server 2008 media that use KMS by default, don’t allow you to enter a product key, nor do they have a Certificate of Authenticity with a product key on it… now where do you get the KMS product key!?
That’s easy. It’s located on the Windows Server 2008 DVD/ISO in the file pid.txt in the sources folder. To switch from MAK to KMS simply enter your Multiple Activation Key and activate afterwards. The commands are the same as for switching from KMS to MAK:
start /w slmgr.vbs -ipk ABCDE-FGHIJ-KLMNO-PQRST-UVWXY
start /w slmgr.vbs -ato
Where ABCDE-FGHIJ-KLMNO-PQRST-UVWXY is your KMS product key.When done check the status of Windows Product Activation again.
this usefull information is thanks to http://blogs.dirteam.com/blogs/sanderberkouwer/archive/2008/04/01/activating-server-core.aspx
With working on my MCSE for server 2012 I needed to learn how to use windows server 2012 core. unfortunately configuring basic settings from the power shell is a whole lot different than the gui. You can configure everything and then uninstall the GUI but that is not really the correct way to do it. please use the following commands to get you through the initial configuration
Rename the computer
After you install Windows Server 2012, the computer is assigned an automatically generated name. In most cases, you won’t want to keep the random name, you’ll want to assign a name for the computer that matches your organization’s naming conventions. Instead of navigating through all of the Windows UI to rename and restart the computer, try opening Windows PowerShell and typing the following commands, making sure to replace “ComputerName” with the actual name that you want to use:
Configure a static IP address
Most servers are configured with a static IP address rather than having DHCP client enabled and receiving an IP address dynamically from a DHCP server. You can use the command below to configure the Internet Protocol version 4 (IPv4) properties of a network connection with a static IP address. Before running this command, ensure that you replace the example parameter values with values that are appropriate for your network.
New-NetIPAddress -IPAddress 10.0.0.2 -InterfaceAlias “Ethernet” -DefaultGateway 10.0.0.1 -AddressFamily IPv4 -PrefixLength 24
Configure a network connection with a new DNS server address
If you add a DNS server to your network, you can use the following command to configure IPv4 properties of a statically configured network connection with the IP address of the new DNS server.
Set-DnsClientServerAddress -InterfaceAlias “Ethernet” -ServerAddresses 10.10.10.1
Join a computer to a domain
To join a computer to a domain, you can run the following command after replacing the domain name with one that’s appropriate for your deployment:
Add-Computer -DomainName corp.contoso.com
When you’re prompted to do so, type the user name and password for an account that has permission to join a computer to the domain. To restart the computer, use the following command:
Install Active Directory Domain Services (AD DS) and DNS and create a new domain in a new forest
If you have a test environment, you probably recreate it on a frequent basis for new configurations and new tests. Or you might be setting up a new organization domain and network. Either way, the following commands install AD DS and DNS with a new forest, new root domain, and domain name of corp.contoso.com to help you speed-install these roles.
Install-WindowsFeature AD-Domain-Services -IncludeManagementTools
Install-ADDSForest -DomainName corp.contoso.com
Note that you can install all of the Windows Server 2012 server roles by using the command Install-WindowsFeature, which really streamlines the configuration of servers.
Create a DNS Reverse Lookup Zone
After you install DNS, it’s recommended that you create a DNS Reverse Lookup Zone. You can use the following command to configure a reverse lookup zone for a network with the network ID 10.0.0.x:
Add-DnsServerPrimaryZone 0.0.10.in-addr.arpa -ZoneFile 0.0.10.in-addr.arpa.dns
Create a new user account in Active Directory Users and Computers
You can use the following command – after you change the parameter values – to create a new user account in Active Directory. Keep in mind that when you run this command, you’ll need to type in the password value at the Windows PowerShell prompt, so this particular method of using this command is not intended for use in scripts.
New-ADUser -SamAccountName User1 -AccountPassword (read-host “Set user password” -assecurestring) -name “User1” -enabled $true -PasswordNeverExpires $true -ChangePasswordAtLogon $false
If you want to assign Active Directory Group membership to the account you just created, you can use this next command. This example assigns group membership to both Enterprise Admins and Domain Admins, so make sure you change these values and the domain name when you use the command, if these are not the memberships and name that you want to assign.
Add-ADPrincipalGroupMembership -Identity “CN=User1,CN=Users,DC=corp,DC=contoso,DC=com” -MemberOf “CN=Enterprise Admins,CN=Users,DC=corp,DC=contoso,DC=com”,”CN=Domain Admins,CN=Users,DC=corp,DC=contoso,DC=com”
I hope these commands help you configure your network and get started with Windows PowerShell in Windows Server 2012. Also, you can find these commands – and many more – in the Core Network Guide and Companion Guides for Windows Server 2012, which are on the Web at http://technet.microsoft.com/en-us/library/hh882373 .
Upon deploying my first windows 2012 r2 essentials box with anywhere access enabled. I was surprised that I could only access the servers dashboard remotely. That is obviously a problem for working on the server remotely. Oddly enough it is not a very well known fix to change it.
First thing log in to the console and see open the dashboard
Click the settings on the upper right corner
Click anywhere access
Click server connection options
select open remote desktop and click ok.
That is it now you can RDP into the server.
If you find this useful please leave a comment
new wireless lan controller keeps failing rdius authentication with errors like this
RADIUS server 10.x.x.x:1645 deactivated in global list
RADIUS server 10.x.x.x:1645 failed to respond to request (ID 65) for client 00:0b:6b:87:54:d2 /user ‘unknown’
the problem is 2 fold the cisco wireless lan controller radius configuration defaults to a time out of 2 seconds.
you can find this in security/radius/authentication/and your server
change that to 20 seconds
save your configuration
now ssh into the controller using putty or some other app.
run the following command
config radius aggressive-failover disable’
save your configuration and reboot the controller and you should have no more troubles with the radius authentication.