Windows server 2012 r2 standard installation guide pdf free download. 70-410Training Guide Installing and Configuring Windows Server 2012 R2
Looking for:
- Windows server 2012 r2 standard installation guide pdf free downloadDownload Windows Server R2 Test Lab Guide from Official Microsoft Download Center.Performing an in-place upgrade of Windows Server | Compute Engine Documentation | Google Cloud
Use the remote PowerShell session to check the Windows Setup log files and the event log. If you can't connect to the instance by using Windows Remote Management WinRM , you can cancel the upgrade and analyze the log files from a different VM instance.
To do this, follow these steps:. Stop the VM instance. Detach the boot disk from the instance. Create a new, temporary Windows Server instance, and attach the boot disk of the original instance as an additional disk. Use the temporary Windows Server instance to analyze the setup log and event log files of the instance that you were trying to upgrade.
After you have completed the analysis, detach the disk from the temporary instance and reattach it as a boot disk to the original VM instance. For information about troubleshooting your Windows Server instances, see Tips and troubleshooting for Windows instances.
To avoid incurring further costs after you have completed this process, delete the installation disk. You can create an installation disk based on the Google-provided image at any time. If you don't plan to upgrade more VM instances in the same zone, delete the installation disk:.
In Cloud Shell, delete the win-installers disk that you created earlier:. Learn how to bring existing licenses to Compute Engine. Learn how to connect to Windows instances. Learn about sole-tenant nodes on Compute Engine. Work through more Windows tutorials. Except as otherwise noted, the content of this page is licensed under the Creative Commons Attribution 4. For details, see the Google Developers Site Policies.
Overview close Accelerate your digital transformation Whether your business is early in its journey or well on its way to digital transformation, Google Cloud can help solve your toughest challenges.
Learn more. Key benefits Why Google Cloud. Run your apps wherever you need them. Keep your data secure and compliant. Build on the same infrastructure as Google. Data Cloud. Make smarter decisions with unified data. Scale with open, flexible technology. Run on the cleanest cloud in the industry. Connect your teams with AI-powered apps.
Reduce cost, increase operational agility, and capture new market opportunities. Analytics and collaboration tools for the retail value chain. Solutions for CPG digital transformation and brand growth. Computing, data management, and analytics tools for financial services. Advance research at scale and empower healthcare innovation. Solutions for content production and distribution operations.
Hybrid and multi-cloud services to deploy and monetize 5G. AI-driven solutions to build and scale games faster. Migration and AI tools to optimize the manufacturing value chain. Digital supply chain solutions built in the cloud. Data storage, AI, and analytics solutions for government agencies. Teaching tools to provide more engaging learning experiences. Develop and run applications anywhere, using cloud-native technologies like containers, serverless, and service mesh.
Hybrid and Multi-cloud Application Platform. Platform for modernizing legacy apps and building new apps. Accelerate application design and development with an API-first approach. Fully managed environment for developing, deploying and scaling apps. Processes and resources for implementing DevOps in your org.
End-to-end automation from source to production. Fast feedback on code changes at scale. Automated tools and prescriptive guidance for moving to the cloud.
Program that uses DORA to improve your software delivery capabilities. Services and infrastructure for building web apps and websites. Tools and resources for adopting SRE in your org. Add intelligence and efficiency to your business with AI and machine learning. AI model for speaking with customers and assisting human agents. Document processing and data capture automated at scale.
End-to-end solution for creating products with personalized ownership experiences. Google-quality search and product recommendations for retailers.
Speed up the pace of innovation without coding, using APIs, apps, and automation. Attract and empower an ecosystem of developers and partners. Cloud services for extending and modernizing legacy apps. Simplify and accelerate secure delivery of open banking compliant APIs.
Migrate and manage enterprise data with security, reliability, high availability, and fully managed data services. Guides and tools to simplify your database migration life cycle. Upgrades to modernize your operational database infrastructure. Database services to migrate, manage, and modernize data. Rehost, replatform, rewrite your Oracle workloads.
Fully managed open source databases with enterprise-grade support. Unify data across your organization with an open and simplified approach to data-driven transformation that is unmatched for speed, scale, and security with AI built-in. Generate instant insights from data at any scale with a serverless, fully managed analytics platform that significantly simplifies analytics.
An initiative to ensure that global businesses have more seamless access and insights into the data required for digital transformation. Digital Transformation Accelerate business recovery and ensure a better future with solutions that enable hybrid and multi-cloud, generate intelligent insights, and keep your workers connected.
Digital Innovation. Reimagine your operations and unlock new opportunities. Prioritize investments and optimize costs. Get work done more safely and securely. How Google is helping healthcare meet extraordinary challenges. Discovery and analysis tools for moving to the cloud. Compute, storage, and networking options to support any workload. Tools and partners for running Windows workloads. Migration solutions for VMs, apps, databases, and more. Automatic cloud resource optimization and increased security.
End-to-end migration program to simplify your path to the cloud. Ensure your business continuity needs are met. Change the way teams work with solutions designed for humans and built for impact. Collaboration and productivity tools for enterprises. Secure video meetings and modern collaboration for teams. Unified platform for IT admins to manage user devices and apps.
Enterprise search for employees to quickly find company information. Detect, investigate, and respond to online threats to help protect your business. Solution for analyzing petabytes of security telemetry.
Threat and fraud protection for your web applications and APIs. Solutions for each phase of the security and resilience life cycle. Solution to modernize your governance, risk, and compliance function with automation. Solution for improving end-to-end software supply chain security.
Data warehouse to jumpstart your migration and unlock insights. Services for building and modernizing your data lake. Run and write Spark where you need it, serverless and integrated. Insights from ingesting, processing, and analyzing event streams. Solutions for modernizing your BI stack and creating rich data experiences. Put your data to work with Data Science on Google Cloud.
Solutions for collecting, analyzing, and activating customer data. Solutions for building a more prosperous and sustainable business. Data from Google, public, and commercial providers to enrich your analytics and AI initiatives. Accelerate startup and SMB growth with tailored solutions and programs. Get financial, business, and technical support to take your startup to the next level.
Explore solutions for web hosting, app development, AI, and analytics. Build better SaaS products, scale efficiently, and grow your business. Command-line tools and libraries for Google Cloud. Managed environment for running containerized apps.
Data warehouse for business agility and insights. Content delivery network for delivering web and video. Streaming analytics for stream and batch processing. Monitoring, logging, and application performance suite. Fully managed environment for running containerized apps.
Platform for modernizing existing apps and building new ones. Unified platform for training, running, and managing ML models.
Single interface for the entire Data Science workflow. Options for training deep learning and ML models cost-effectively. Custom machine learning model development, with minimal effort. Sentiment analysis and classification of unstructured text.
Speech recognition and transcription across languages. Language detection, translation, and glossary support. Video classification and recognition using machine learning.
Custom and pre-trained models to detect emotion, text, and more. Lifelike conversational AI with state-of-the-art virtual agents. API Management. Manage the full life cycle of APIs anywhere with visibility and control. API-first integration to connect existing data and applications. Solution to bridge existing care systems and apps on Google Cloud. No-code development platform to build and extend applications.
Develop, deploy, secure, and manage APIs with a fully managed gateway. Serverless application platform for apps and back ends. Server and virtual machine migration to Compute Engine. Compute instances for batch jobs and fault-tolerant workloads.
Reinforced virtual machines on Google Cloud. Dedicated hardware for compliance, licensing, and management. Infrastructure to run specialized workloads on Google Cloud.
Usage recommendations for Google Cloud products and services. Fully managed, native VMware Cloud Foundation software stack. Registry for storing, managing, and securing Docker images. Container environment security for each stage of the life cycle. Solution for running build steps in a Docker container. Containers with data science frameworks, libraries, and tools.
Containerized apps with prebuilt deployment and unified billing. Package manager for build artifacts and dependencies. Components to create Kubernetes-native cloud-based software. IDE support to write, run, and debug Kubernetes applications. Platform for BI, data applications, and embedded analytics.
Messaging service for event ingestion and delivery. Service for running Apache Spark and Apache Hadoop clusters. Data integration for building and managing data pipelines. Workflow orchestration service built on Apache Airflow. Service to prepare data for analysis and machine learning. Intelligent data fabric for unifying data management across silos. Metadata service for discovering, understanding, and managing data. Service for securely and efficiently exchanging data analytics assets.
Fully managed, PostgreSQL-compatible database for demanding enterprise workloads. Cloud-native wide-column database for large scale, low-latency workloads. Cloud-native document database for building rich mobile, web, and IoT apps. In-memory database for managed Redis and Memcached. Cloud-native relational database with unlimited scale and Serverless, minimal downtime migrations to the cloud. Infrastructure to run specialized Oracle workloads on Google Cloud.
NoSQL database for storing and syncing data in real time. Serverless change data capture and replication service. Universal package manager for build artifacts and dependencies.
Continuous integration and continuous delivery platform. Service for creating and managing Google Cloud resources. Command line tools and libraries for Google Cloud. Cron job scheduler for task automation and management. Private Git repository to store, manage, and track code. Task management service for asynchronous task execution. Fully managed continuous delivery to Google Kubernetes Engine. Full cloud control from Windows PowerShell.
Healthcare and Life Sciences. Solution for bridging existing care systems and apps on Google Cloud. Tools for managing, processing, and transforming biomedical data. Real-time insights from unstructured medical text. Integration that provides a serverless development platform on GKE. Tool to move workloads and existing applications to GKE.
Service for executing builds on Google Cloud infrastructure. Traffic control pane and management for open service mesh.
API management, development, and security platform. Fully managed solutions for the edge and data centers. Internet of Things. IoT device management, integration, and connection service. Automate policy and security for your deployments. Dashboard to view and export Google Cloud carbon emissions reports. Programmatic interfaces for Google Cloud services. Web-based interface for managing and monitoring cloud apps. App to manage Google Cloud services from your mobile device.
Interactive shell environment with a built-in command line. Kubernetes add-on for managing Google Cloud resources. Tools for monitoring, controlling, and optimizing your costs.
Tools for easily managing performance, security, and cost. Service catalog for admins managing internal enterprise solutions. Open source tool to provision Google Cloud resources with declarative configuration files. Media and Gaming. Game server management service running on Google Kubernetes Engine. Service to convert live video and package for streaming.
Open source render manager for visual effects and animation. Convert video files and package them for optimized delivery. Service for dynamic or server-side ad insertion. App migration to the cloud for low-cost refresh cycles. Data import service for scheduling and moving data into BigQuery. Reference templates for Deployment Manager and Terraform. Components for migrating VMs and physical servers to Compute Engine. Storage server for moving large volumes of data to Google Cloud.
Data transfers from online and on-premises sources to Cloud Storage. Migrate and run your VMware workloads natively on Google Cloud. Security policies and defense against web and DDoS attacks.
Content delivery network for serving web and video content. Domain name system for reliable and low-latency name lookups. Service for distributing traffic across applications and regions. NAT service for giving private instances internet access. Connectivity options for VPN, peering, and enterprise needs. Connectivity management to help simplify and scale networks. Network monitoring, verification, and optimization platform.
Cloud network options based on performance, availability, and cost. Google Cloud audit, platform, and application logs management. Infrastructure and application health with rich metrics. Application error identification and analysis.
GKE app development and troubleshooting. Tracing system collecting latency data from applications. CPU and heap profiler for analyzing application performance. Real-time application state inspection and in-production debugging. Tools for easily optimizing performance, security, and cost. Permissions management system for Google Cloud resources. Compliance and security controls for sensitive workloads.
Manage encryption keys on Google Cloud. This is not a mandatory site system but you need both the Application Catalog website point and the Application Catalog web service point if you want to provide your user with a Self-Service application catalog web portal. The Application Catalog web service point and the Application Catalog website point are hierarchy-wide options. The Application Catalog web service point must reside in the same forest as the site database.
If you have more geographically distributed users, consider deploying additional application catalogs to keep responsiveness high and user satisfaction up. Use client settings to configure collections of computers to use different Application Catalog servers. Read more on how to provide a great application catalog experience to your user in this Technet blog article. If your client needs HTTPS connections, you must first deploy a web server certificate to the site system.
If you need to allow Internet clients to access the application catalog, you also need to deploy a web server certificate to the Management Point configured to support Internet clients.
When supporting Internet clients, Microsoft recommends that you install the Application Catalog website point in a perimeter network, and the Application Catalog web service point on the intranet.
For more information about certificates see the following Technet article. Using Windows Server , the following features must be installed before the role installation:. For this post, we will be installing both roles on our stand-alone Primary site using HTTP connections. If you split the roles between different machines, do the installation section twice, once for the first site system selecting Application Catalog web service point during role selection and a second time on the other site system selecting Application Catalog website point during role selection.
Ensure that the client settings for your clients are set correctly to access the Application Catalog. The AISP is a hierarchy-wide option. SCCM supports a single instance of this site system role in a hierarchy and only at the top-level site. In order to have inventory data, first ensure that Hardware Inventory is enabled in your Client Settings.
On the machine that will receive the CRP role, install the following using Windows server role and features:. Once all the above has been configured and verified, you are ready to create your certificate profile in SCCM. Several distribution points can provide better access to available software, updates, and operation systems. On the DP, add a group that contains your site system computer account in the Administrators group. Configuration Manager requires some roles and features to be installed on the server prior to the DP installation.
IIS needs to be installed on the server but it will automatically be installed using the site installation wizard. For Windows only, you need to enable Powershell 3. Now that the Distribution point server is ready to receive a new role, we need to add the server to the site server list. That results in errors but be patient and the installation should succeed anyway. You can now replicate your content to your newly created DP.
Replicate manually all your content or add your DP in an existing DP group. If you have multiple Distribution Points, I suggest you read our post on 8 ways to monitor your distribution points. This post explains in detail the various options to make sure that your DP is healthy. You can also check our custom report about Distribution Point Monitoring to display all your DP status using a single click.
The Endpoint Protection Point provides the default settings for all antimalware policies and installs the Endpoint Protection client on the Site System server to provide a data source from which the SCCM database resolves malware IDs to names. This Site System is a hierarchy-wide option. SCCM supports a single instance of this site system role in a hierarchy and only at the top-level site in the hierarchy.
After the installation, you must add Endpoint Protection definition files in your Software Update Point. We have a complete guide to managing endpoint protection.
You can download it from our product page. This is not a mandatory site system but you need both Enrollment Point and Enrollment Proxy Point if you want to enroll legacy mobile devices, Mac computers and to provision Intel AMT-based computers.
Since modern mobile devices are mostly managed using Windows Intune , this post will focus mainly on Mac computer enrollment. When you support mobile devices on the Internet, as a security best practice, install the Enrollment Proxy Point in a perimeter network and the Enrollment Point on the intranet. If you split the roles between different machine, do the installation section twice, once for the first site system selecting Enrollment Point during role selection and a second time on the other site system selecting Enrollment Proxy Point during role selection.
The FSP helps monitor client installation and identify unmanaged clients that cannot communicate with their management point. This is not a mandatory Site System but we recommend to install a FSP for better client management and monitoring. You can also check if reports that depend on the FSP are populated with data. See the full list of reports that rely on the FSP here. The Management Point is the primary point of contact between Configuration Manager clients and the site server.
Management Points can provide clients with installation prerequisites, configuration details, advertisements and software distribution package source file locations. Additionally, Management Points receive inventory data, software metering information and state messages from clients.
Multiple Management Points are used for load-balancing traffic and for clients to continue receiving their policy after Management Point failure. Read about how clients choose their Management Point in this Technet article. The Management Point is a site-wide option. By default, when you install a Secondary site, a Management Point is installed on the Secondary site server. Secondary sites do not support more than one Management Point and this Management Point cannot support mobile devices that are enrolled by Configuration Manager.
See the full Supported Configuration in the following Technet article. On Windows , the following features must be installed before the Management Point Installation:. This role can be installed on a remote machine, the process is the same but the location of the logs is different.
Continue through the wizard and reboot the computer at the end of the installation if instructed to do so. Before configuring the reporting point, some configuration needs to be made on the SQL side. The virtual instance needs to be created for SCCM to connect and store its reports.
If you install SSRS later, then you will have to go back and configure it as a subsequent step. This wizard creates two databases: ReportServer , used to store report definitions and security, and ReportServerTempDB which is used as scratch space when preparing reports. This step sets up the SSRS web service.
The web service is the program that runs in the background that communicates between the web page, which you will set up next, and the databases. This step sets up the Report Manager web site where you will publish reports.
Using the simple recovery model improves performance and saves your server hard drive and possibly a large transaction log file. Check for the following logs for reporting point installation status.
Both logs are under the SCCM logs file locations. This Site System is a site-wide option. When using WSUS 3. This has changed with and The problem is that will still cause some trouble with the post-install task. Bonus link : I suggest that you read the excellent article written by Kent Agerlund on how to avoid what he calls the House of Cards.
The State Migration Point stores user state data when a computer is migrated to a new operating system. The State Migration Point is a site-wide option. The State Migration Point can be installed on the site server computer or on a remote computer.
It can be co-located on a server that has the distribution point role. If you have any error in the installation process refer to this post that explains the permission needed for the SMP to install correctly. This package is specified when you add the Capture User State step to your task sequence. This is not a mandatory site system but you need a System Health Validator Point if you plan to use NAP evaluation in your software update deployments.
This site system integrates with an existing NAP server in your infrastructure. The System Health Validator Point is a hierarchy-wide option. In order to enable Network Access Protection on your clients, you must configure your client settings :. From Technet :. Each hierarchy supports a single instance of this role. The site system role can only be installed at the top-tier site of your hierarchy On a Central Administration Site or a stand-alone Primary Site. If you select to skip the role installation, you can manually add it to SCCM using the following steps.
Now that all our site servers are installed, we are now ready to configure the various aspect of SCCM. We will start our configuration with the SCCM boundaries. To use a boundary, you must add the boundary to one or more boundary groups. Boundary groups are collections of boundaries. By using boundary groups, clients on the intranet can find an assigned site and locate content when they have to install software, such as applications, software updates, and operating system images.
A boundary does not enable clients to be managed at the network location. To manage a client, the boundary must be a member of a boundary group. Simple Boundaries on do nothing, they must be added to one or more boundary groups in order to work. Microsoft recommends the following :. When a client requests content, and the client network location belongs to multiple boundary groups, Configuration Manager sends the client a list of all Distribution Points that have the content.
This behavior enables the client to select the nearest server from which to transfer the content or state migration information. In our various SCCM installations, our clients are often confused about this topic.
That way, all my clients for my 4 locations will be assigned to my Montreal Primary Site. For Content Location, we want clients to get their content locally at their respective location. This is a simple but typical scenario. You can have multiples boundaries and Site System in your Boundary Groups if needed. Client settings are used to configure your deployed agents. This is where you decide any configuration like :. In previous versions of SCCM, client settings were specific to the site.
You had 1 client settings that applied to all your hierarchy. In SCCM you can specify clients setting at the collection level. You can have different settings for specific collections, overlapping settings are set using a priority setting. When you modify the Default Client Settings , the settings are applied to all clients in the hierarchy automatically. You do not need to deploy the Default Client Settings to apply it.
By default, it has a priority value This is the lower priority. All other custom client settings can have a priority value of 1 to which will always override the Default Client Settings. The higher Priority is 1. The Technet documentation is pretty clear and many of the client settings are self-explanatory. We cannot make any recommendations either as each environment has its own needs and limitations.
When you deploy a custom client settings, they override the Default Client Settings. Before you begin, ensure that you created a collection that contains the devices that require these custom client settings. For our blog post, we will set the Client Policy polling interval to 15 minutes. When you create a new client setting, it automatically takes the next available priority.
Beginning with 1 Before deploying it, make sure that your priority is well set for your needs. A higher priority 1 will override any settings with a lower priority.
Now that your client settings are created, you need to deploy it to a collection. This new client settings will apply to only this collection and depending on the priority, will override the settings. Client computers will apply your custom settings when they download their next client policy.
You can trigger it manually to speed up the process. We already cover this in a previous article. After you completed your SCCM installation, you certainly want to start managing some systems. This blog article will explain the various discovery methods and will describe how to configure it.
SCCM discovery methods identifies computer and user resources that you can manage by using Configuration Manager. It can also discover the network infrastructure in your environment. Discovery creates a discovery data record DDR for each discovered object and stores this information in the Configuration Manager database.
When discovery of a resource is successful, discovery puts information about the resource in a file that is referred to as a discovery data record DDR. DDRs are in turn processed by site servers and entered into the Configuration Manager database where they are then replicated by database-replication with all sites. The replication makes discovery data available at each site in the hierarchy, regardless of where it was discovered or processed.
You can use discovery information to create custom queries and collections that logically group resources for management tasks such as the assignment of custom client settings and software deployments.
Computers must be discovered before you can use client push installation to install the Configuration Manager client on devices. In simple words, it means that SCCM needs to discover a device before it can manage them.
The problem is that if you have a thousand computers, it can be a fastidious process. By using Active Directory System Discovery, all your computers will be shown on the console, from there you can choose to install the client using various SCCM methods.
There are 5 Types of Discovery Methods that can be configured. Discovers computers in your organization from specified locations in Active Directory. In order to push the SCCM client to the computers, the resources must be discovered first. You can specify to discover only computers that have logged on to the domain in a given period of time.
This option is useful to exclude obsolete computer accounts from Active Directory. You also have the option to fetch custom Active Directory Attributes.
This is useful if your organization store custom information in AD. You can read our blog post concerning this topic. Discovers groups from specified locations in Active Directory.
The discovery process discovers local, global or universal security groups. When you configure the Group discovery you have the option to discover the membership of distribution groups. With the Active Directory Group Discovery, you can also discover the computers that have logged in to the domain in a given period of time.
Once discovered, you can use group information for example to create deployment based on Active Directory groups. Be careful when configuring this method: If you discover a group that contains a computer object that is NOT discovered in Active Directory System Discovery, the computer will be discovered. The discovery process discovers user accounts from specified locations in Active Directory. This is useful if your organization store custom information in AD about your users.
Once discovered, you can use group information for example to create user-based deployment. Discovers Active Directory sites and subnets, and creates Configuration Manager boundaries for each site and subnet from the forests which have been configured for discovery. Using this discovery method you can automatically create the Active Directory or IP subnet boundaries that are within the discovered Active Directory Forests.
This is very useful if you have multiple AD Site and Subnet, instead of creating them manually, use this method to do the job for you. Heartbeat Discovery runs on every client and to update their discovery records in the database. Heartbeat Discovery can force the discovery of a computer as a new resource record, or can repopulate the database record of a computer that was deleted from the database.
The Network Discovery searches your network infrastructure for network devices that have an IP address. It also discovers devices that might not be found by other discovery methods. This includes printers, routers, and bridges. We never saw any customers using this method in production. Each Configuration Manager site supports maintenance tasks that help maintain the operational efficiency of the site database. By default, several maintenance tasks are enabled in each site, and all tasks support independent schedules.
Maintenance tasks are set up individually for each site and apply to the database at that site. However, some tasks, like Delete Aged Discovery Data , affect information that is available in all sites in a hierarchy. To enable or disable the task without editing the task properties, choose the Enable or Disable button. The button label changes depending on the current configuration of the task. When you are finished configuring the maintenance tasks, choose OK to finish the procedure.
Backup Site Server : Use this task to prepare for the recovery of critical data. You can create a backup of your critical information to restore a site and the Configuration Manager database. For more information, see our next section that covers it. Check Application Title with Inventory Information : Use this task to maintain consistency between software titles that are reported in the software inventory and software titles in the Asset Intelligence catalog.
Central administration site : Enabled. The installed flag prevents automatic client push installation to a computer that might have an active Configuration Manager client. Delete Aged Application Request Data : Use this task to delete aged application requests from the database.
Delete Aged Client Download History : Use this task to delete historical data about the download source used by clients. Delete Aged Client Operations : Use this task to delete all aged data for client operations from the site database. For example, this includes data for aged or expired client notifications like download requests for machine or user policy , and for Endpoint Protection like requests by an administrative user for clients to run a scan or download updated definitions.
Delete Aged Client Presence History : Use this task to delete history information about the online status of clients recorded by client notification that is older than the specified time. Delete Aged Cloud Management Gateway Traffic Data : Use this task to delete all aged data about the traffic that passes through the cloud management gateway from the site database.
For example, this includes data about the number of requests, total request bytes, total response bytes, number of failed requests, and a maximum number of concurrent requests.
Delete Aged Collected Files : Use this task to delete aged information about collected files from the database. This task also deletes the collected files from the site server folder structure at the selected site. This information is used as part of completing user state restores. By default, Extraction Views are disabled.
- Windows server 2012 r2 standard installation guide pdf free download
Windows server 2012 r2 standard installation guide pdf free download
Windows Server is the platform for building an infrastructure of connected applications, networks, and web services, from the workgroup to the data center. Skip to main content. Windows Server documentation Windows Server is the platform for building an infrastructure of connected applications, networks, and web services, from the workgroup to the data center.
Get Started Get started with Windows Server What's new What's new in Windows Server ? Overview Windows Admin Center. Overview Hyper-converged infrastructure. How-To Guide Connect to Azure hybrid services. Upgrade Windows Server R2. Upgrade Windows Server Securing privileged access.
Failover Clustering What's new in Failover Clustering. Create a failover cluster. Cluster-Aware Updating overview. Management Use Windows Admin Center to manage your environment. System Insights overview. Performance tuning guidelines for Windows Server Networking What's new in networking.
Software-defined Networking SDN overview. Network controller. Remote Remote Desktop Services overview. Remote Desktop clients.
Remote Desktop - Allow access to your PC. Security and assurance Windows Authentication overview. Getting started with group-managed service accounts. Credentials processes in Windows Authentication. Storage What's new in storage. Disk management overview. Understanding cluster and pool quorum. Troubleshoot Troubleshoot Windows Admin Center. Troubleshoot failover clustering using Windows Error Reporting. Troubleshoot disk management. Virtualization Containers on Windows overview.
Hyper-V on Windows Server. Hyper-V Virtual Switch overview. Windows Server Essentials Technical content for for IT professionals administering Windows Server Essentials, the cloud-connected first server designed for small businesses with up to 25 users and 50 devices.
Comments
Post a Comment