Archive | Windows Server 2016 RSS for this section

How to identify FSMO Roles owner

 

This topic is not new to administrators. I have just wondered if I could simplify that action somehow and I realized that this would be possible.

I’m learning C# coding with .NET so I decided to try creating a simple application (of course with GUI) to do the job itself without an administrator’s involvement.

So, you can download simple application written by me in C# using .NET framework and execute it on any domain member workstation/server, does not have to be necessarily Domain Controller (but may be), and get results on the screen.

The only one requirement is to have appropriate version of .NET framework installed on a machine from which this application is executed.

To simplify the entire process, I have compiled the application with .NET 3.5 and .NET 4.5 versions.

Both applications are identical but the only one difference is that one supports .NET 3.5 and the other one .NET 4.5

You can use .NET 3.5 application of Windows Vista/7/2008/2008R2 and .Net 4.5 on Windows 8/8.1/10/2012/2012R2/2016 as those .NET versions are defaults for that servers.

Of course you can always use the existing methods like command-line utilities or check that with PowerShell or even with Microsoft GUI consoles. The first two of them requires some knowledge about command and cmd-let syntax and the last one needs couple of consoles to check all of them.

My application is nothing new but helps a little bit. Just execute it and get results on the screen, that’s all.

Get FSMO Roles GUI

Get FSMO Roles GUI

When you click on any of server names in application’s window, you will copy server’s name into clipboard

Get FSMO GUI copy role owner name

Get FSMO GUI copy role owner name

and you can paste it, in example, to your documentation.

Copied FSMO Roles owner

Copied FSMO Roles owner

So, let’s give a try to the app to do a job for you. Download it and execute within a domain from any supported operating system with appropriate .NET framework installed on it.

  • Get FSMO GUI application for .NET 3.5
    (MD5 checksum: dcda3cca863320077b05f71a2dea4cc1)
    
    (SHA-1 checksum: 74e07d284e670a142bf0a02de8a7daeb975dbf0f)
    
    (SHA-256 checksum:55083852d36a8c5839f74a2ef8b91e18d2db327779d76b717ef9210679a20826)
  • Get FSMO GUI application for .NET 4.5
    (MD5 checksum: 2618e57525f60b98a2ce30da1776e272)
    
    (SHA-1 checksum: 023c7e0c77007ae746e6c8de0d1e7f30f97daf1d)
    
    (SHA-256 checksum: f23280ea26917c7005114d7a106f479808b377bd14179407ddfc22ce18cb410c)

I hope it would be useful for you.

Author: Krzysztof Pytko

Configuring a forest root domain on Windows Server 2016

 

You may heard that new Microsoft Windows Server 2016 has been released. This Windows version you can download for free from Microsoft Technet Evaluation Center at this link

Domain Controller promotion process did not change from previous Windows Server 2012/2012R2 version and there is still no possibility to do that over dcpromo utility. First of all, you need to install Active Directory Domain Services role from Server Manager console.

But before you will do that, let’s see what information do you need to start promoting DC.

  • Company name – which will be helpful in choosing forest/domain name
  • Network configuration – valid IP addresses range for our company, router’s IP (as default gateway)
  • ISP DNS servers on any public DNS servers to be able to access the Internet resources from our company
  • Services we need to run – what additional services will be required to fulfil a company requirements

Let’s start collecting them all.

  • Company name – Test Environment
  • Network configuration – IP addresses range 192.168.1.0/24; the first available IP address is a router (default gateway)
  • Public DNS servers – 8.8.4.4 and 8.8.8.8 (Google public DNS servers)
  • Services – Active Directory: Directory Services, DNS server(s)

Now, you can install your first Windows Server 2016 and configure it. After that you would be able to promote this server as a Domain Controller.

When your server is installed, then you need to log on there on local administrator account and you can start its preparation.

Open Server Manager (or wait short time because it runs itself by default), set up static IP address for your server (in this case it’s 192.168.1.10 with 255.255.255.0 network mask), configure time zone and change server name accordingly to naming convention in your company.

You may also set up there other options like NIC teaming, remote management and remote access.

This is very important part of network configuration before promoting server as a Domain Controller. In DNS preferred IP address type 127.0.0.1 (loopback interface) or the same IP address as server is configured 192.168.1.10 to point the server to DNS itself.

To configure network parameters, click on “Local Server” node on the left side of Server Manager

Local server configuration

Local server configuration

and then click on “Ethernet” to configure these settings

Network card configuration

Network card configuration

You will see “Network connections” where you network card is being seen

Network card

Network card

edit its properties and set up required IP information under IPv4 section

IPv4 settings

IPv4 settings

Under its properties put valid IP address, network mask, default gateway and DNS server IP address

IPv4 settings

IPv4 settings

Now, let’s configure server name and reboot it to be able start Domain Controller promotion. To change server name, click on “Computer name” section and provide appropriate name

Server name change

Server name change

Server name change

Server name change

Server name change

Server name change

Server name change

Server name change

apply changes and reboot server. When your server is up and running again, you can start promotion process.

Install Active Directory: Directory Services role and after all, follow post-install steps which promotes server to Domain Controller. To do that open Server Manager and go to “Add roles and features” on Dashboard screen

Adding roles

Adding roles

You will see a wizard which will guide you through role installation process. Go further up to a screen with roles selection using default options and choose “Active Directory Domain Services” role. Confirm all dependent roles/features to be installed with AD:DS role

Active Directory Domain Services role installation

Active Directory Domain Services role installation

confirm also features which will be installed with selected role

AD:DS role installation

AD:DS role installation

Go “Next” to screen with installation summary and click “Install”

Roles and features installation

Roles and features installation

and wait until Active Directory: Domain Services role will be installed

Role installation

Role installation

When role is installed, you will see yellow exclamation mark in notification area

Post-installation steps

Post-installation steps

That means, there are additional steps to do after role installation. Click on that field and you will see what do to next

Post-installation steps

Post-installation steps

Click on “Promote this server to a domain controller” and promotion wizard will be displayed.

It is similar to previous wizard from DCPROMO on older OS versions. Promotion process is much more simple than previously and requires less steps to be finished.

In your case, you are configuring new forest root domain, so you need to choose “Add a new forest” option and specify DNS domain name for this new forest. As it was mentioned before, in this example you will use testenv.local as DNS domain name

Domain Controller promotion

Domain Controller promotion

On the next screen, you need to specify Domain and Forest Functional Levels.

When you are configuring new forest root domain then you cannot set up Windows Server 2003 Domain or Forest Functional Level. The lowest possible mode is Windows Server 2008. You need to know that when you are planning new infrastructure because Windows Server 2003 Domain Controllers are not supported in this scenario anymore because Windows Server 2003 support is end.

Information! Currently, the highest possible Domain and Forest Functional Level is Windows Server 2012R2! It looks like Technical Preview version is not ready for new levels or they are unstable to be implemented yet.

For more details about raising domain and forest functional levels, please check another articles on my blog:

Important! When you set up Domain/Forest Functional level it cannot be changed to lower mode, so be careful when you choose them. If you are not sure which functional level is adequate for you, choose the lower one. You can always raise it without any business continuity disruption later.

Define if that server would have DNS role installed and if it would be Global Catalog. As this is the first Domain Controller, all these roles must be installed.

Specify Directory Services Restore Mode (DSRM) password which will be also used for domain administrator account at this stage

Domain Controller promotion

Domain Controller promotion

As this is the first Domain Controller and forest root domain, do not worry about DNS delegation and go to the next step

Domain Controller promotion

Domain Controller promotion

When you specified DNS domain name, you need to type also NetBIOS domain name. By default wizard suggests the first part from DNS domain name. If you have no reasons to use different NetBIOS name, I would suggest to leave that as after this name change, you will have an issue with Active Directory Administrative Center which does not recognize changed NetBIOS domain name (it uses the first part of  DNS domain name).

Domain Controller promotion

Domain Controller promotion

Specify location of AD database and SYSVOL. You may leave defaults or move them to dedicated drive

Domain Controller promotion

Domain Controller promotion

You will see summary screen with all details before installation. As in Windows Server 2012 everything from Server Manager is translated into PowerShell and executed in the background, you may click on “View script” to see what will be done to install and configure Domain Controller

PowerShell script for Domain Controller promotion

PowerShell script for Domain Controller promotion

when you are ready, click on next to go to the final screen where script will be executed in a background

Domain Controller promotion

Domain Controller promotion

If all prerequisites will pass, you can start installation

Domain Controller promotion

Domain Controller promotion

Wait a while and server will be rebooted. After reboot, your server will be a Domain Controller.

Congratulations! Your Domain Controller for a forest root domain is ready! You can log on, onto it, using password specified during server preparation process (the same password as for local Administrator or probably the same as for Directory Services Restoration Mode 🙂 )

Domain Controller desktop

Domain Controller desktop

Log on, using domain administrator credentials into your new Domain Controller.

We have to configure DNS server to send unresolved DNS queries to ISP DNS server(s) or any other public DNS server(s). This configuration is necessary to be able to access the Internet resources from our internal network.

If you do not have public DNS server(s) IP address or you do not want to define them, do not put anything under “Forwarders” tab and by default “Root hints” will be used. For that, skip few below steps.

Open DNS management console from Tools in Server Manager and select server name.

DNS forwarders configuration

DNS forwarders configuration

In the right pane at the bottom of that window, double click on Forwarders

DNS forwarders configuration

DNS forwarders configuration

When Forwarders window appears, click on “Edit” button to put there public DNS server for the Internet access

DNS forwarders configuration

DNS forwarders configuration

You should see a window, where you can put ISP or public DNS servers. Add DNS to the list. In this case we will use Google public DNS servers (8.8.4.4. and 8.8.8.8) Wait until they will be validated and close console

DNS forwarders configuration

DNS forwarders configuration

After all, you should consider Domain Controller and DNS server redundancy in your network by placing additional server with these roles. Another very important part is performing System State backup of Domain Controllers regularly.

In case of lack hardware resources in your network, you can consider placing DHCP server on this Domain Controller. However, it’s not recommended to install additional roles on DCs because of security reasons and right delegation scenarios.

Author: Krzysztof Pytko

Be Wary of your Network Events Activities – Audit Active Directory for Enhanced Security

 

The role of auditing network events/activities in maintaining a secure IT environment

If you’re an IT administrator, you probably already know that most security breaches occur because of insider abuse/misuse and the total number of breaches is increasing exponentially each year. The majority of organisations house sensitive data somewhere on their system that, if exposed, could be costly and damaging to the reputation of the business.

Thankfully, Windows comes pre-packed with numerous auditing capabilities that can be used to track events or activities within the network. In this blog, we will discuss the nine audit settings that you can configure through the Windows operating system that will allow you to better monitor your Active Directory environment.

1. Audit Account Logon Events

When active, this audit setting monitors each time your computer is validating the credentials of user accounts with the right level of authority to generate account logon events.

Audit account logon events Properties

There are only two audit options that are available – successful attempts and failed attempts. You can check either one or both options (or neither if you require no auditing) as per your Active Directory monitoring requirements. In the above image, we have checked the “success” option.

After configuring this setting, you can view successful audit events in the audit log generated in the Event Viewer. All you need to do is navigate to the Windows Logs -> Security in the left panel and all the audit success events will be shown in the right panel. Click on a particular event to get detailed information in the lower right section of the window.

Refer to the highlighted portion in the below image for reference.

Event viewer console

2. Audit Account Management

Configuring this audit setting enables you to audit user account management and get details on the following:

  • User accounts or groups that are created, changed, or deleted
  • User accounts that are renamed, disabled or enabled
  • User accounts where the password has been set or changed

Audit account management Properties

3. Audit Directory Service Access

This audit setting determines whether the operating system you have on your computer audits users or user accounts attempting to access objects in the Active Directory. The only objects that can be audited are ones in which the SACL (System Access Control List) is specified by the user and the requested access type, including “Write”, “Read” or “modify,” matches with the settings that have been configured in the SACL.

4. Audit Logon Events

This setting enables users to audit every instance of a user attempting to log in and out of the system.

5. Audit Object Access

The “Audit Object Access” setting enables auditing of user attempts to access objects that are not present in the Active Directory; such as files, emails, Exchange groups or SharePoint items. However, the system will only generate audits for those objects specified in the System Access Control List.

6. Audit Policy Change

Configuring this setting enables users to audit each instance of users attempting to modify critical policies – including trust policy, account policy, audit policy and the user rights assignment policy.

7. Audit Privilege Use

This audit setting is configured to monitor the levels of permissions and rights that each user has to perform specific tasks. Defining this policy setting not only helps track the actions of privileged users but also facilitates in ensuring they don’t misuse the rights granted to them. If you wish to generate an audit entry when a user succeeds in exercising the right or permission assigned to him/her, check the “Success” option. To generate audit entries where the exercise of a user right fails, select the “Failure” option.

8. Audit Process Tracking

Configuring this security setting tracks any process-related activities including the creation of process, duplication handling, termination of process and objects that have been accessed indirectly.

9. Audit System Events

“Audit System Events” monitors details of users who attempt a security system startup or shutdown, try to change system time or aim to load extensible authentication components for personal benefits or other malicious purposes.

Defining this security policy allows you to keep track of the loss of audited events that have occurred due to the auditing system failure. It also shows you whether the security log size has exceeded the configured warning threshold level.

The Alternative

Enabling all these settings and keeping track of them can be quite a laborious and time consuming task. Often, administrators seek the help of third-party solutions to automate the auditing and monitoring of their critical IT systems. LepideAuditor for Active Directory tracks changes across Active Directory and sends real-time alerts and notifications straight to the inbox and generates detailed reports with just a single click.

How to install server GUI on Windows Server 2016 from PowerShell

 

As you probably know, Microsoft Windows Server 2016 Technical Preview 3 has been released and you can get it from Microsoft Technet Evaluation center for free.

You can install server system with or without GUI, you have two choices:

  • install core edition

Windows Server 2016 Technical Preview 3

  • install server with GUI

Windows Server 2016 Technical Preview 3 – Server with Desktop Experience

Windows Server 2016 installation type

Windows Server 2016 installation type

if you choose the second installation option, that’s all in this case. After server OS installation you will get Windows Server desktop with complete GUI.

What if you decided to install full core edition and after some time you don’t want to use it anymore. There is an option to use PowerShell and install missing features to have full server with GUI. This time with Windows Server 2016 it is not so simple as it was in Windows Server 2012/2012R2.

When you try to install missing feature from PowerShell console and your server has no access to the Internet, installation fails!

This happens because from Windows Server 2016, GUI features are removed from installation image and you cannot simply activate them to turn on/off core edition.

Open PowerShell console and search for features name to install

Get-WindowsFeature -Name *GUI*
Get-WindowsFeature PowerShell cmd-let

Get-WindowsFeature PowerShell cmd-let

in “Install state” column you will see that features state is “removed”.

If you simply try to install these features and your server has no access to the Internet or installation source is not defined by Group Policy, operation will fail. This is highly possible that your server has no access to the Internet and if this is the first Windows Server 2016 installation, you would probably not have central location where shared components for this system are available.

In case where your server has access to the Internet, simply type in PowerShell console this syntax and wait couple of minutes

Install-WindowsFeature -Name Server-Gui-Shell,Server-Gui-Mgmt-Infra
Install-WindowsFeature PowerShell cmd-let

Install-WindowsFeature PowerShell cmd-let

but if you have no access to the Internet, you will see similar error in the console

Error during Windows feature installation

Error during Windows feature installation

then you have to use your installation media to successfully install server GUI features. Before you can do that, you need to identify appropriate index of Windows Server 2016 edition from which you want to install features. They are only available in full editions, so you need to skip indexes for core editions in the list. To get information of available editions in install.wim installation file, you need to use below PowerShell cmd-let

Get-WindowsImage -ImagePath d:\sources\install.wim

where d:\ is a letter of you drive with installation media

install.wim Windows Server 2016 editions and their index

install.wim Windows Server 2016 editions and their index

Check index number for Standard of Datacenter edition and remember it. As you can see in the screen above, appropriate image index is 2 or 4

In these images, all required features are available and they can be used as a source of installation.

To install feature from non-default location, you need to specify -Source switch to Install-WindowsFeature cmd-let. The switch requires appropriate syntax

InstallationProvider:WIMFileLocation:ImageIndex

wim:d:\sources\install.wim:2

or

wim:d:\sources\install.wim:4

the full installation syntax is available below

Install-WindowsFeature -Name Server-Gui-Shell,Server-Gui-Mgmt-Infra -Source wim:d:\sources\install.wim:2
Install-WindowsFeature cmd-let with -Source switch

Install-WindowsFeature cmd-let with -Source switch

and now, you installation should succeed even if your server does not have an access to the Internet

Windows feature installation progress

Windows feature installation progress

after some time, you would be prompted to reboot the server to apply the changes

Prompt for server restart

Prompt for server restart

use PowerShell cmd-let to restart server and wait couple of minutes to apply changes

Restart-Computer
Restarting server

Restarting server

when server is booting you should see on the screen features configuration

Feature configuration at server's startup

Feature configuration at server’s startup

when it is done, you should see logon screen

Log in into Windows Server 2016

Log in into Windows Server 2016

Provide appropriate credentials and check if you can see desktop

Server GUI in Windows Server 2016

Server GUI in Windows Server 2016

If you are able to see START tile and other desktop features, congratulations. Everything is configured properly. You can do whatever you want with your server, now.

 

Author: Krzysztof Pytko