Reviewers Guide Beta Update
Reviewers Guide Beta Update
Reviewers Guide Beta Update
Page #1
Summary The Windows Server 2008 R2 Reviewers Guide provides a technical overview of the incremental features and functions that make Windows Server 2008 R2 the next-generation Microsoft Windows Server operating system and successor to Microsoft Windows Server 2008. This guide also provides information about the benefits Windows Server 2008 R2 offers diverse users, as well as information about different scenarios. Currently, this guide is focused solely on the pre-beta iteration of Windows Server 2008 R2.
Page #2
Table of Contents
1 Windows Server 2008 R2 Reviewers Guide .......................................................................1 Table of Contents................................................................................................................3 Introduction to Windows Server 2008 R2............................................................................5 Overview.........................................................................................................................5 Using this Guide..............................................................................................................5 Getting Started...................................................................................................................7 System Requirements.....................................................................................................7 Installation and Activation................................................................................................8 Virtualization.....................................................................................................................11 Improved Virtualization with Hyper-V .........................................................................12 Terminal Services Becomes Remote Desktop Services for Improved Presentation Virtualization..............................................................................................................26 Management.....................................................................................................................34 Improved Data Center Power Consumption Management.............................................34 Improved Remote Administration...................................................................................40 Reduced Administrative Effort for Interactive Administrative Tasks.................................41 Enhanced Command-line and Automated Management................................................42 Improved Identity Management.....................................................................................45 Improved Compliance with Established Standards and Best Practices..........................58 Web..................................................................................................................................59 Reduced Effort to Administer and Support Web-based Applications...............................59 Improved FTP Services.................................................................................................64 Ability to Extend Functionality and Features..................................................................65 Improved .NET Support.................................................................................................66 Improved Application Pool Security................................................................................66 IIS.NET Community Portal.............................................................................................66 Solid Foundation for Enterprise Workloads.......................................................................67 Scalability and Reliability...............................................................................................67 Page #3
Page #4
Overview
Windows Server 2008 R2, builds on the award-winning foundation of Windows Server 2008, expanding existing technology and adding new features to enable IT professionals to increase the reliability and flexibility of their server infrastructures. New virtualization tools, Web resources, management enhancements, and exciting Windows 7 integration help save time, reduce costs, and provide a platform for a dynamic and efficiently managed data center. Powerful tools such as Internet Information Services (IIS) version 7.0, updated Server Manager and Hyper-V platforms and Windows PowerShell version 2.0 combine to give customers greater control, increased efficiency and the ability to react to front-line business needs faster than ever before.
Page #5
Figure 1: Windows Server 2008 R2 technology investments The key technology investments in Windows Server 2008 R2 include: Virtualization. With its server virtualization technology, Windows Server 2008 R2 enables you to reduce costs, increase hardware utilization, optimize your infrastructure, and improve server availability. Management. Windows Server 2008 R2 reduces the amount of effort you expend managing your physical and virtual data centers by providing enhanced management consoles and automation for repetitive day-to-day administrative tasks. Web. Windows Server 2008 R2 gives you the ability to deliver rich Web-based experiences efficiently and effectively, with improved administration and diagnostics, development and application tools, and lower infrastructure costs. Scalability and Reliability. With enterprise IT departments shouldering everheavier burdens, Windows Server 2008 R2 has been designed specifically with heavier workloads for both across server and client computing. On the server side, R2 includes architectural enhancements for more compute
Page #6
power and role componentization as well as specific features enhancing reliability and security. Better Together With Windows 7. Windows Server 2008 R2 includes technology improvements designed with Windows 7 enterprise users in mind, augmenting the network experience, security and manageability.
Getting Started
To evaluate Windows Server 2008 R2, you need to install Windows Server 2008 R2 in your test or evaluation environment. After you install Windows Server 2008 R2, you can use this guide to help you explore the key technology investments for yourself.
System Requirements
Before you install Windows Server 2008 R2, you need to ensure that the physical or virtual computer being used in your evaluation has the appropriate system resources. The following table lists the system requirements for Windows Server 2008 R2. Table 11: Window Server 2008 R2 System Requirements
Component Processor Requirement Minimum: 1.4GHz x64 processor Recommended: 2GHz or faster
Memory
Minimum: 512MB RAM Recommended: 2GB RAM or greater Maximum 32GB (Standard) or 2TB (Enterprise and Datacenter Editions) Minimum: 10GB Recommended: 40GB or greater Note: Computers with more than 16GB of RAM will require more disk space for paging, hibernation, and dump files DVD-ROM drive Super VGA (800 x 600) or higher-resolution monitor Keyboard Microsoft Mouse or compatible pointing device
The actual requirements will vary based on your system configuration and the applications and features you choose to install. Processor performance is Page #7
dependent upon not only the clock frequency of the processor, but also the number of cores and the size of the processor cache. Disk space requirements for the system partition are approximate. Additional available hard-disk space may be required if you are installing over a network.
Page #8
Figure 2: Windows Server 2008 R2 operating system installation options Notice that Windows Server 2008 R2 is now available only over a 64-bit processor architecture. Although you can install Windows Server 2008 R2 by using the Full Installation or Server Core Installation option, this guide assumes that you select the Full Installation option. Note: After you have completed your installation, you cannot change the installation option from the Full Installation option to the Server Core installation, or vice versa, without reinstalling Windows Server 2008 R2. The Windows Server 2008 R2 installation process continues until Windows Server 2008 R2 starts for the first time. After Windows Server 2008 R2 starts, log on as a user that is a member of the local Administrators group. Add, partition, and format any additional disks you require for your evaluation. Add any additional network adapters that you require for your evaluation. Configure the IP addressing settings for all network adapters to allow the appropriate connectivity within your environment. Page #9
Note: Ensure that you provide statically configured IP version 4 (IPv4) and IP version 6 (IPv6) addresses as required for your evaluation. Do not use IP addresses that are dynamically assigned by Dynamic Host Configuration Protocol (DHCP). Add the appropriate Windows Server 2008 R2 server roles and features by using Server Manager. Configure each server role and feature as required for your evaluation. Start your evaluation of Windows Server 2008 R2.
Page #10
Virtualization
Virtualization is a major part of todays data centers. The operating efficiencies offered by virtualization allow organizations to dramatically reduce operational effort and power consumption. Windows Server 2008 R2 provides the following virtualization types: Client and Server virtualization provided by Hyper-V. Hyper-V virtualizes the system resources of a physical computer. Computer virtualization allows you to provide a virtualized environment for operating systems and applications. When used alone, Hyper-V is typically used for server computer virtualization. When Hyper-V is used in conjunction with Virtual Desktop Infrastructure (VDI), Hyper-V is used for client computer virtualization. Presentation virtualization. This type of virtualization provided by Remote Desktop Services RemoteApp (see below for more information on the Terminal Services name change in Windows Server 2008 R2) virtualizes a processing environment and isolates the processing from the graphics and I/O, making it possible to run an application in one location but have it be controlled in another. Presentation virtualization allows end users to run a single application, or a complete desktop offering multiple applications. Note: There are other types of virtualization that are not discussed in this guide, such as application virtualization provided by Microsoft App-V. For more information on all Microsoft virtualization products and technologies, see the Microsoft Virtualization home page at http://www.microsoft.com/virtualization/default.mspx.
Page #11
Page #12
Figure 3: Cluster Shared Volumes Because CSV provides a consistent file namespace to all nodes in the cluster, any files stored on a CSV have the same name and path from any node in the cluster. CSV volumes are stored as directories and subdirectories beneath the ClusterStorage root folder, as illustrated in the following figure.
Page #13
Figure 4: Example of single namespace in CSV As illustrated in the previous figure, the CSV volumes (Volume1, Volume2, and Volume3) are stored in the ClusterStorage folder. If the ClusterStorage folder exists in the root of E:, the fully qualified path to each of the CSV volumes would be as follows: E:\ClusterStorage\Volume1\root E:\ClusterStorage\Volume2\root E:\ClusterStorage\Volume3\root All cluster nodes would access the shared volumes by using these fully qualified paths. While CSVs are currently employed mainly for Live Migration, their benefits will extend beyond that single scenario. For one, theyre easy to configure using simple NTFS rather than some other proprietary format. That means administrators wont have to reformat their SANs to take advantage of CSVs. It also means administrators will have an easier time showing users only a single data repository rather than a small forest of silosno more drive letter metaphors for end-users just convenient networked storage. And last, CSVs dont require config and management tools of their own. Windows Server administrators used to the tools in Windows Server 2008 can continue using those same consoles and theyll simply work with CSVs in R2.
where I/O can be rerouted within the failover cluster based on connection availability, as illustrated in the following figure.
Figure 5: Dynamic IO redirection for Cluster Shared Volumes The first type of failure that can be redirected is the failure of a cluster node connection to the shared storage between cluster nodes, typically on a Storage Area Network (SAN). As shown in the following figure, if the SAN connection on Node 2 fails, the I/O operations are redirected over the network to Node 1. Node 1 then performs the I/O operation to the SAN. This allows you do a Live Migration of the VM running on Node 2 to Node 1.
Page #15
Figure 6: IO connectivity fault tolerance for CSV The next type of failure that can be redirected is the failure of network connectivity for a cluster node. As shown in the following figure, the primary network connection between Node 1 and Node 2 fails. Node 2 automatically reroutes network traffic over a redundant network connection and Node 1 performs the network I/O.
Page #16
Figure 7: Network fault tolerance for CSV The next type of failure that can be redirected is the failure of an entire cluster node. As shown in the following figure, Node 1 has ownership of a volume that is used by the VM running on Node 2. In the event of a complete failure of Node 1, ownership of the volume is changed to Node 2 without any interruption of service to the VM running on Node 2.
Page #17
Page #18
Page #19
Page #20
Figure 10: Creation of target virtual machine on target cluster node All of the current memory in the source virtual machine is copied to the target virtual machine, as illustrated in the previous figure. Clients connected to the source virtual machine continue to run on the source virtual machine and create mirrored memory pages as illustrated in the following figure. The mirrored memory pages are tracked and continue an iterative copy of the dirty memory pages until all memory pages are copied to the target virtual machine, as illustrated in the following figure.
Page #21
Figure 11: Iterative copy of mirrored memory from source to target virtual machine When all memory pages are copied to the target virtual machine, clients are automatically redirected to the target virtual machine and the source virtual machine is deleted, as illustrated in the following figure.
Page #22
Page #23
Windows Server 2008 R2 also supports the ability to boot a computer from a .vhd file stored on a local hard disk. This allows you to use preconfigured .vhd files for deploying virtual and physical computers. This helps reduce the number of images you need to manage and provides an easier method for test deployment prior to deployment in your production environment.
Page #25
Terminal Services Becomes Remote Desktop Services for Improved Presentation Virtualization
Terminal Services is one of the most widely used features in previous versions of Windows Server. Terminal Services makes it possible to remotely run an application in one location but have it be controlled and managed in another. Microsoft has evolved this concept considerably in Windows Server 2008 R2, so weve decided to rename Terminal Services to Remote Desktop Services (RDS) to better reflect these exciting new features and capabilities. The goal of RDS is to provide both users and administrators with both the features and the flexibility necessary to build the most robust access experience in any deployment scenario. Remote Desktop Services in Windows Server 2008 R2 covers the same basic technology features as did Terminal Services, so this name change necessarily filters down as well. The table below summarizes the new names for TS-to-RDS technologies in R2. Table 2: New Remote Desktop Services Names for Corresponding Terminal Services Names Terminal Services name Terminal Services Terminal Services RemoteApp Terminal Services Gateway Terminal Services Session Broker Terminal Services Web Access Terminal Services CAL Terminal Services Easy Print Remote Desktop Services name Remote Desktop Services RemoteApp Remote Desktop Gateway Remote Desktop Connection Broker Remote Desktop Web Access Remote Desktop CAL Remote Desktop Easy Print
Page #26
deployments and as a platform for partner solutions, which can extend scalability and manageability to address the needs of more demanding enterprise deployments. VDI includes the following technologies to provide a comprehensive solution: Hyper-V Live Migration System Center Virtual Machine Manager 2008 Microsoft Application Virtualization version 4.5 in Microsoft Desktop Optimization Pack (MDOP). Vista Enterprise VECD licensing Provides simplified publishing of, and access to, remote desktops and applications. The feeds described above provide access in Windows 7, but using the new RemoteApp & Desktop Web Access, users will also be able connect to these resources from Windows Vista and Windows XP. Improved integration with Windows 7 user interface. Once accessed, RAD-delivered programs and desktops show up in the Start Menu with the same look and feel of locally installed applications. A new System Tray icon shows connectivity status to all the remote desktop and RemoteApp connections to which the user is currently subscribed. The experience is designed so that many users wont be able to tell the difference between a local and remote application.
Page #28
Figure 13: Updates to the Terminal Services Connection Broker Improving User Experience through new Remote Desktop Protocol capabilities. These new capabilities, enabled with Windows Server 2008 R2 in combination with Windows7, improve significantly the experience of remote users, making it more similar to the experience enjoyed by users accessing local computing resources. These improvements include: Multimedia Redirection: Provides high-quality multimedia by redirecting multimedia files and streams so that audio and video content is sent in its original format from the server to the client and rendered using the clients local media playback capabilities. True multiple monitor support: Enables support for up to 10 monitors in almost any size, resolution or layout with RemoteApp and remote desktops; applications will behave just like they do when running locally in multimonitor configurations. Audio Input & Recording: VDI supports any microphone connected to a users local machine, enables audio recording support for RemoteApp and Page #29
Remote Desktop. This is useful for VoIP scenarios and also enables speech recognition. Aero Glass support: VDI provides users with the ability to use the AeroGlass UI for client desktops; ensuring that remote desktop sessions look and feel like local desktop sessions. Direct X redirection: DirectX 9, 10 and 11 applications will render on the server and will be remoted using bitmaps (requiring Direct3D-compatible hardware). If the application supports the new DirectX 10.1 API with remoting extensions the DirectX (2D& 3D) graphics are redirected to the local client to harness the power of the GPU on the users local device, removing the need for a GPU on the server. Improved audio/video synchronization: RDP improvements in Windows Server 2008 R2 are designed to provide closer synchronization of audio and video in most scenarios. Language Bar Redirection: Users can easily and seamlessly control the language setting (e.g. right to left) for RemoteApp programs using the local language bar. Task Scheduler: This adds the ability in Task Scheduler to ensure that scheduled applications never appear to users connecting with RemoteApp. This reduces user confusion. While RAD improves the end-user experience, RAD also reduces the desktop and application management effort by providing a dedicated management interface that lets IT managers assign remote resources to users quickly and dynamically. Windows Server 2008 R2 includes the following RAD management capabilities to help reduce administrative effort: RemoteApp & Desktop Connections control panel applet. Users can easily connect to RemoteApp programs and Remote Desktops using the RemoteApp & Desktop Connections control panel applet in Windows 7. Single administrative infrastructure. Both RemoteApp & Desktop connections and RemoteApp and Desktop Web Access are managed from a single management console. This ensures that connections can still be used from Windows XP and Vista by using a Web page. Designed for computers that are domain members and standalone computers: The RemoteApp & Desktop feature is easy to configure and use for computers that are members of Active Directory domains and for standalone computers.
Page #30
Always up to date. Once a workspace is configured, that workspace keeps itself up to date until it is removed from the users desktop. When an admin adds an application or update it automatically appears on users Start menu and via that users Web Access page. Single sign-on experience within a workspace. Ensures that only a single logon is required to access all applications and resources with a RAD connection. RemoteApp & Desktop Web Access. This capability provides full integration with RemoteApp & Desktop Connections to ensure a consistent list of applications is available to the user at all times, no matter the desktop OS used. The default web page provides a fresh and inviting look and feel and includes a new Web-based login with integrated single sign-on.
Figure 14: Remote Desktop Services Web Access expands RDS features cross-OS
Administrators faced with larger RAD deployment scenarios will also find additional management features in Windows Server 2008 R2s Remote Desktop Services aimed at improving the management experience for all existing scenarios previously addressed by Terminal Services as well as the exciting new scenarios available via RAD. These improved management features include: PowerShell Provider. Easily manage multiple servers and repetitive tasks almost all Remote Desktop Services administrative tasks can now be Page #31
scripted; view and edit configuration settings for the Remote Desktop Gateway, Remote Desktop Server and more. Profile Improvements. The user profile cache quota removes the need to delete profiles at logoff, speeding up user logon. Group policy caching can now be performed across an RDS farm to speed up group policy processing during logon Microsoft Installer (MSI) compatibility. Microsoft has fixed multiple MSIrelated issues with Windows Server 2008s Terminal Services to ensure that MSI install packages can be installed normally and that per-user install settings are correctly propagated. The updates also remove the need to put the server in install mode, meaning users no longer need to be logged off during RAD management operations. Remote Desktop Gateway. RDG securely provides access to RAD resources from the Internet without the need for opening additional ports or the use of a VPN. RDG provides this by tunneling RDP over HTTPS and incorporating several new security features: Silent Session Re-authentication. The Gateway administrator can now configure the RDG to run periodic user authentication and authorization on all live connections. This ensures that any changes to user profiles are enforced. For users whose profiles havent changed, the experience is seamless. Secure device redirection. The Gateway administrator can be assured that device redirection settings are always enforced even from unmanaged clients like kiosks. Pluggable Authentication. For corporations that have specific need to implement their own authentication and authorization technologies, these customers now have the flexibility to plug-in their preferred authentication/authorization mechanisms. Idle & session timeout. Administrators now have the flexibility of disconnecting idle sessions or limiting how long users can be connected. Consent Signing. If your business demands that remote users adhere to legal terms & conditions before accessing corporate resources, the consent signing feature helps you do just that. Administrative messaging. The Gateway also provides the flexibility to provide broadcast messages to users before launching any administration activities such as maintenance or upgrades. Partners and Independent Software Vendors (ISVs) also get tools with the new service to more easily enable third-party software manufacturers to built RADoptimized products. These tools include: Page #32
RemoteApp& Desktop Web Access Customization. It is now possible to easily extend the look and feel of web access by both customers and partners using support for cascading style sheets. Developers can also create custom Web sites that consume the RAD connection XML feed and transform these with XSLT. RemoteApp & Desktop Connection. Though RAD connections are currently only used for Remote Desktop Services, it is possible to extend both the server-side infrastructure and Windows 7 client shell to add support for any type of application or service even ones that dont use RDP or remoting protocols. This provides a single UI and point of discoverability for any service. Session broker extensibility. The session broker offers broad extensibility to enable customers and ISVs to take advantage of the built-in RDP redirection features while providing significant additional unique value through the various types of plug-ins; for example: Policy (policy plug-in), which determines the proper farm or VM for a connection, Load Balancing (filter plug-in), which chooses the proper endpoint based on load, and Orchestration (filter plug-in), which prepares a VM to accept RDP connections.
Page #33
Management
The ongoing management of servers in the data center is one of most timeconsuming task facing IT professionals today. Any management strategy you deploy must support the management of both your physical and virtual environments. Another design goal for Windows Server 2008 R2 is to reduce the ongoing management of Windows Server 2008 R2 and to reduce the administrative effort for common day-to-day operational tasks. These administrative tasks can be performed on the server or remotely. Management improvements in Windows Server 2008 R2 include: Improved data center power consumption management, Improved remote administration, Reduced administrative effort for administrative tasks performed interactively, Enhanced command-line and automated management by using PowerShell version 2.0, Improved identity management provided by Microsoft Active Directory Domain Services and Active Directory Federated Services, and Improved compliance with established standards and best practices.
Reduced processor power consumption by adjusting processor speed Reduced storage power consumption
Figure 15: Core Parking in minimal power consumption configuration Page #35
If additional processing power is required, the Core Parking feature activates inactive processor cores to handle the increased processing requirements, as illustrated in the following figure.
Figure 16: Core Parking with increased processing requirements You can configure Core Parking by using the Group Policy settings in Windows Server 2008 R2 Active Directory Domain Services.
are the processor performance states within the ACPI specification. Depending on the processor architecture, Windows Server 2008 R2 can adjust the Pstates of individual processors and provide very fine control over power consumption, as illustrated in the following figure.
Page #37
You can configure how P-states are adjusted in Windows Server 2008 R2 by using Active Directory Group Policy settings.
Page #38
Figure 18: Data center with local storage in each server computer Windows Server 2008 R2 supports the ability to boot from a SAN, which eliminates the need for local hard disks in the individual server computers. In addition, performance for accessing storage on SANs has been greatly improved. The following figure shows how booting from a SAN can dramatically reduce the number of hard disks and decrease power consumption as a result. Page #39
Page #40
Improved remote management through graphical management consoles. Server Manager has been updated to allow remote administration of servers. In addition, many of the management consoles have improved integration with Server Manager and, as a result, support remote management scenarios. For more detailed information about each management console, see Management Console Improvements later in this guide. Improved remote management from command-line and automated scripts. PowerShell version 2.0 offers a number of improvements for remote management scenarios. These improvements allow you to run scripts on one or more remote computers or to allow multiple IT professionals to simultaneously run scripts on a single computer. For more detailed information about these remote management scenarios, see Enhanced Remote PowerShell Scenarios later in this guide.
Page #41
Table 32: Updated & Redesigned Management Consoles in Windows Server 2008 R2 Management Console
Server Manager
Improvements Support for remote management of computers Improved integration with many role and role services management consoles
Improved tools for day-to-day tasks Tight integration with System Center Virtual Machine Manager for managing multiple Hyper-V servers.
information about constrained runspaces, see Improved Security for Management under Management in the upcoming Windows Server 2008 R2 Technical Overview. Enhanced GUIs for creating and debugging PowerShell scripts and viewing PowerShell script output by using Graphical PowerShell and the Out-GridView cmdlet. For more information about Graphical PowerShell and the Out-GridView cmdlet, see Enhanced Graphical User Interfaces under Management in the upcoming Windows Server 2008 R2 Technical Overview. Extended scripting functionality that supports creation of more powerful scripts with less development effort. For more information on this topic, see Extended Scripting Functionality under Management in the upcoming Windows Server 2008 R2 Technical Overview. Improved portability of PowerShell scripts and cmdlets between multiple computers. For more information about this topic, see Improved Portability of PowerShell Scripts and Cmdlets under Management in the upcoming Windows Server 2008 R2 Technical Overview. During your review of PowerShell version 2.0 in Windows Server 2008 R2, you will want to familiarize yourself with the new GUI tools, Graphical PowerShell and the Out-GridView cmdlet. As illustrated in the following figure, Graphical PowerShell provides a GUI that allows you to interactively create and debug PowerShell scripts within an integrated development environment similar to Visual Studio.
Page #43
Figure 20: Graphical PowerShell user interface with Active Directory Provider Graphical PowerShell includes the following features: Syntax coloring for PowerShell scripts (similar to syntax coloring in Visual Studio) Support for Unicode characters Support for composing and debugging multiple PowerShell scripts in a multitabbed interface Ability to run an entire script, or a portion of a script, within the integrated development environment Support for up to eight PowerShell runspaces within the integrated development environment Note: Graphical PowerShell feature requires Microsoft .NET Framework 3.0. The new Out-GridView cmdlet displays the results of other commands in an interactive table, where you can search, sort, and group the results. For example, you can send the results of a get-process, get-wmiobject, or get-
Page #44
eventlog command to Out-GridView and use the table features to examine the data. Note: The Out-GridView cmdlet feature requires Microsoft .NET Framework 3.0. Also during your review, you will want to familiarize yourself with the new and updated cmdlets available in PowerShell version 2.0 and Windows Server 2008 R2, a very few of which are listed in the following figure.
Page #45
Windows Server 2008 R2 includes identity management improvements in the Active Directory Domain Services and Active Directory Federated Services server roles.
Pane, type
cmdlets
Enter.
Get-Command *ad*
Browse an Active Directory domain In the Command Pane, enter the following commands, pressing Enter after each command (where domain_name is the name of your domain and top_level_domain is your top level domain). Cd AD: PWD DIR | Format-Table -Auto CD "DC=domain_name,_name DC=top_level_doman" DIR | ft a Tip: You can press the TAB key to auto complete many of these commands and save a great deal of typing. List all user objects In the Command Pane, enter the following commands, pressing Enter after each command. CD CN=Users Dir | ft a Get-ADObject Filter {name -like *} Get-ADUser Filter {name -like *} Get-ADUser -Filter {name -like "*"} | Select Name, Enabled | Format-Table -Auto Enable the Guest user object In the Command Pane, enter the following commands, pressing Enter after each command. Enable-ADAccount Identity Guest Get-ADUser -Filter {name -like "*"} | Select Name, Enabled | Format-Table -Auto Display information about the Domain Admins group In the Command Pane, enter the following commands, pressing Enter after each command (where domain_name is the name of your domain and top_level_domain is your top level domain). Get-ADGroup -SearchBase "DC=domain_name,DC=top_level_domain" -SearchScope Subtree -Filter {Name -Like "*Domain Admins*"} -Properties Extended Display information about a domain In the Command Pane, type the following command and then press Enter (where domain_name is the name of your domain).
Page #47
Get-ADDomain domain_name The output of this command allows you to easily determine things such as operations master roles. Display information about domain controllers Display information about the domain password policy In the Command Pane, type the following command and then press Enter. Get-ADDomainController Discover In the Command Pane, type the following command and then press Enter (where domain_name is the fully qualified domain name of your domain). Get-ADDefaultDomainPasswordPolicy domain_name Create a new organizational unit In the Command Pane, type the following command and then press Enter (where where domain_name is the name of your domain and top_level_domain is your top level domain). New-ADOrganizationalUnit Name Europe Path DC=domain_name,DC=top_level_domain Display the properties of the new organizational unit In the Command Pane, type the following command and then press Enter (where where domain_name is the name of your domain and top_level_domain is your top level domain). Get-ADOrganizationalUnit OU=Europe,DC=domain_name,DC=top_level_domain Properties Extended Delete the new organizational unit In the Command Pane, type the following commands and then press Enter after each command (where where domain_name is the name of your domain and top_level_domain is your top level domain). CD AD: CD DC=domain_name,DC=top_level_domain Set-ADorganizationalUnit Europe ProtectedFromAccidentalDeletion $False Remove-ADOrganizationalUnit Europe Close the PowerShell V2 Graphical Console Close the PowerShell V2 Graphical Console.
Page #48
Page #49
Figure 22: Active Directory Administrative Center management console Active Directory Administrative Center is a task-based management console that is based on the new PowerShell cmdlets in Windows Server 2008 R2. Active Directory Administrative Center is designed to help reduce the administrative effort for performing common administrative tasks.
Page #50
Overview. Using the fly-out menu system, navigate to organizational_unit (where organizational_unit is the name of the organizational unit where you want to create an organizational unit). Tip: Click the right arrow next to the domain root to begin using the fly-out menu system. As you navigate, type the first few letters of each organizational unit to shorten the navigation. Create an organizational unit In the Tasks pane, click New, and then click Organizational Unit. The Create dialog box appears. In the Create dialog box, in Name, type Demonstration OU, and then click OK. Create a user Using the fly-out menu system, navigate to Demonstration OU. In the Tasks pane, click New, and then click User. The Create dialog box appears. Compete the Create dialog box by using the following information, and then click OK: First Name: Pilar Last Name: Ackerman User logon: pilarau Select Password never expires check box. Clear Change password at next logon check box. Password: P@ssw0rd Create a new group Using the fly-out menu system, navigate to Demonstration OU. In the Tasks pane, click New, and then click Group. The Create dialog box appears. Compete the Create dialog box by using the following information, and then click OK: Name: Support Select Protect from Accidental Deletion check box. Add a user to a group In Search, type Pilar Ackerman. In the Results pane, click Pilar Ackerman. In the Tasks pane, click Add to group. In the Select Groups dialog box, in Enter the object names to select, type Support, click Check Names, and then click OK.
Page #51
In Windows PowerShell, type the following command and then press Enter. Get-ADOptionalFeature Filter Name Like * In the output you should see the: EnabledScopes property is currently empty, which indicates that this feature is not enabled. RequiredForestMode property indicates the prerequisites for enabling this feature.
In Windows PowerShell, type the following command and then press Enter (where forest is the name of your forest).
Page #52
Enable-ADOptionalFeature Recycle Bin Feature Scope Forest Target forest Note: The Recycle Bin feature is disabled by default. To confirm the command, press Enter. Note: Once you enabled the Recycle Bin feature, you cannot disable the feature at a later time. Verify the Recycle Bin feature is enabled In Windows PowerShell, type the following command and then press Enter. Get-ADOptionalFeature Filter Name Like * The value of the EnabledScopes property reflects that the Recycle Bin is enabled.
Delete Objects in Active Directory Perform the steps in the following table while logged on as a member of the Enterprise Admins security group. Table 76: Delete Objects in Active Directory
High-level task Start the Active Directory Administrative Center Navigate to an organizational unit Using the fly-out menu system, navigate to Demonstration OU Tip: Click the right arrow next to the domain root to begin using the fly-out menu system. As you navigate, type the first few letters of each organizational unit to shorten the navigation. Delete an organizational unit In the Tasks pane, click Delete. In the Delete Confirmation dialog box, click Yes. Details On the Start menu, point to Administrative Tools, and then click Active Directory Administrative Center.
Verify the deleted objects are in the Active Directory Recycle Bin Perform the steps in the following table while logged on as a member of the Enterprise Admins security group. Table 87: Verify the deleted objects are in the Active Directory Recycle Bin
High-level task Details
Page #53
On the Start menu, point to Administrative Tools, and then click Active Directory PowerShell Snap-in.
In Windows PowerShell, type the following command and then press Enter (where domain is your domain name and top_level_domain is your top level domain name). Get-ADObject SearchBase CN=Deleted Objects,DC=domain,DC=top_level_domain ldapFilter (objectClass=*) -includeDeletedObjects
This command displays the entire contents of the recycle bin. Leave the output of this command on the screen as you will use it in the next step. Verify the Pilar Ackerman user object is in the Recycle Bin In Windows PowerShell, type the following command and then press Enter. Get-ADObject Filter Name Like *Pilar Ackerman* SearchScope Subtree includeDeletedObjects
The output of this command will show the details for the Pilar Ackerman user object. The distinguished name indicates this object is in the Recycle Bin. Verify the Demonstration OU is in the Recycle Bin In Windows PowerShell, type the following command and then press Enter. Get-ADObject Filter Name Like *Demonstration OU* SearchScope Subtree IncludeDeletedObjects
The output of this command will show the details for the Demonstration OU organizational unit. The distinguished name indicates this object is in the Recycle Bin.
Recover Deleted Objects in Active Directory Recycle Bin Perform the steps in the following table while logged on as a member of the Enterprise Admins security group. Table 98: Recover Deleted Objects in Active Directory Recycle Bin
High-level task Details
Page #54
On the Start menu, point to Administrative Tools, and then click Active Directory PowerShell Snap-in.
In Windows PowerShell, copy the objectGUID value for the object Pilar Ackerman to the clipboard. Tip: To copy text from a command prompt, right click and then select Mark. Highlight the text to copy and then press Enter. The objectGUID was listed in a previous output. In Windows PowerShell, type the following command and then press Enter (where objectGUID is the objectGUID for Pilar Ackerman). Restore-ADObject Identity objectGUID Tip: To paste, right-click and then click Paste. The command fails with an error message indicating that the objects parent object does not exist.
Identify the parent container for the Pilar Ackerman user object Restore the deleted organizational unit
In Windows PowerShell, type the following command and then press Enter. Get-ADObject Filter Name Like *Pilar Ackerman* SearchScope Subtree includeDeletedObjects properties lastKnownParent This command displays the last known parent object, which you can tell, is also in the Recycle Bin. In Windows PowerShell, type the following command and then press Enter (where objectGUID is the objectGUID of the Demonstration OU organizational unit). Restore-ADObject Identity objectGUID Tip: To complete this command, copy the value of the objectGUID property from the Demonstration OU object, which can be found from the output of the last command.
In Windows PowerShell, type the following command and then press Enter (where domain is your domain name and top_level_domain is your top level domain name). Get-ADObject ldapFilter (lastKnownParent=OU=Demonstration OU, DC=domain,DC=top_level_domain) includeDeletedObjects | RestoreADObject This command lists all objects that have the last known parent attribute as the Demonstrated OU and pipes them into the Restore-ADObject
Page #55
Cmdlet.
Verify the Deleted Objects Are Recovered Perform the steps in the following table while logged on as a member of the Enterprise Admins security group. Table 109: Verify the Deleted Objects Are Recovered
High-level task Start the Active Directory Administrative Center Verify the Demonstration OU organizational unit has been recovered Using the fly-out menu system, navigate to Demonstration OU Tip: Click the right arrow next to the domain root to begin using the fly-out menu system. As you navigate, type the first few letters of each organizational unit to shorten the navigation. Verify the Pilar Ackerman user object has been recovered In Search, type Pilar Ackerman The Pilar Ackerman user object should appear in the results pane. Details On the Start menu, point to Administrative Tools, and then click Active Directory Administrative Center.
Page #56
This command creates a computer account in Active Directory and stores the computer account password and related information in an encrypted file. The encrypted file can then be used to offline domain join a computer. Display the contents of the provisioning file At the command prompt, type the following command and then press Enter. Type DEN-SRV-01.DJoin Note: The contents of the .DJoin file are encrypted. Verify the computer account is created in Active Directory On the Start menu, point to Administrative Tools and then click Active Directory Administrative Center. Using the fly-out menu system, navigate to domain_name\Computers (where domain is the name of your domain). Tip: Click the right arrow next to the domain root to begin using the fly-out menu system. As you navigate, type the first few letters of each organizational unit to shorten the navigation. In the information pane, note that the computer account DEN-SVR-01 has been created. To join the computer to the domain The following command would be run on DEN-SRV-01 to join that computer to the domain DJOIN /Requestodj /LoadFile DEN-SVR-01.DJoin /WindowsPath \Mount\Windows Note: Do not run this command. It is provided for reference purposes only. This command is intended to be run against an offline copy of Windows such as a WIM file or VHD that has been mounted as a drive or folder in the file system.
Page #57
federated domains. This enables a variety of advanced authentication scenarios, such as smart cards, for example.
Page #58
Web
Windows Server 2008 R2 includes many enhancements that make this release the most robust Windows Server Web application platform yet. It offers an updated Web server role- Internet Information Services (IIS) 7.5- and greater support for .NET on Server Core. Design goals for IIS 7.5 concentrated on improvements that enable Web administrators to more easily deploy and manage Web applications, and that increase both reliability and scalability. Additionally, IIS 7.5 has streamlined management capabilities and provides more ways than ever to customize your Web serving environment.
Page #59
Using PowerShell allows administrators to take advantage of several important features: Simplifying the administration by scripting common management tasks Executing repetitive tasks automatically Consolidating key Web metrics from all Web servers in real-time.
On a more granular level, the IIS-specific cmdlets included with Windows Server 2008 R2 ease the administrative burden for many low-level day-to-day tasks. For example, these cmdlets allow administrators to add and change configuration properties of Web sites and Web-based applications as well as virtual directories and application pools. Users more familiar with Windows PowerShell will be able to execute advanced configuration tasks and even integrate existing Windows PowerShell scripts with other Windows PowerShell providers across different Windows Server 2008 R2 feature areas. A few common scenarios for PowerShell within IIS 7.5 management might include: Adding/modifying/deleting sites and applications Migrating site settings Configuring SSL and other security settings Restricting access by IP address Backing up IIS configuration and content
Page #60
Figure 23: Configuration Editor user interface IIS Manager UI Extensions Utilizing the extensible and modular architecture introduced with IIS 7.0, the new IIS 7.5 integrates and enhances existing extensions and allows for further enhancements and customizations in the future. The FastCGI module, for example, allows management of FastCGI settings while the ASP.NET module allows management of authorization and custom error settings. Request Filtering The Request Filter module in Windows Server 2008 R2 will include the filtering features previously found in URLScan 3.1. By blocking specific HTTP requests, the Request Filter module helps prevent potentially harmful requests from being processed by Web applications on the server. The Request Filtering user interface (illustrated in the following figure) provides a graphical user interface for configuring the Request Filtering module.
Page #61
Page #62
Page #63
Figure 253: Integration of the FTP server administration in Internet Information Service Manager Extended support for new Internet standards. The new FTP server includes support for emerging standard, including: Page #64
Improved security by supporting FTP over secure sockets layer (SSL). Support of extended character sets by including UTF8 support. Extended IP addressing features provided by IPv6. Improved integration with web-based applications and services. With the new FTP server, you can specify a, virtual host name for an FTP site. This allows you to create multiple FTP sites that use the same IP address, but are differentiated by using unique virtual host names. This allows you to provide FTP and Web content from the same Web site simply by binding an FTP site to a Web site. Reduced effort for support and troubleshooting FTPrelated issues. Improved logging that now supports all FTP-related traffic, unique tracking for FTP sessions, FTP sub statuses, an additional detail field in FTP logs, and more.
Page #65
Figure 26: Architecture of IIS Extensions in IIS 7.5 in Windows Server 2008 R2 Extensions can be created by Microsoft, partners, independent software vendors, and your organization. Microsoft has developed IIS Extensions since the RTM version of Windows Server 2008. These IIS Extensions are available for download from http://iis.net. Many of the IIS Extensions developed by Microsoft will be shipped as a part of Windows Server 2008 R2, including: WebDAV Integrated and enhanced Administration Pack Windows PowerShell Provider for IIS
Page #66
Page #67
Improved Support for Applications and Services That Require Persistent Connections As illustrated in the following figure, the IP Stickiness feature in Network Load Balancing allows you to configure longer affinity between client and cluster nodes. By default, Network Load Balancing distributes each request to different nodes in the clusters. Some applications and services, such as a shopping cart application, require that a persistent connection be maintained with a specific cluster node.
Page #69
You can configure a time-out setting for connection state to a range of hours or even weeks in length. Examples of applications and services that can utilize this feature include: Universal Access Gateway (UAG), which uses an SSLbased virtual private network (VPN). Web-based applications that maintain user information, such as an ASP.NET shopping cart application. Improved Health Monitoring and Awareness for Applications and Services As illustrated in the following figure, the Network Load Balancing Management Pack for Windows Server 2008 R2 allows you to monitor the health of applications and services running in Network Load Balancing clusters.
Page #70
Reduced processor utilization to achieve wire speed storage performance. Wire speed refers to the hypothetical maximum data transmission rate of a cable or other transmission medium. Wire speed is dependent on the physical and electrical properties of the cable, combined with the lowest level of the connection protocols. Windows Server 2008 RTM is able to access storage at wire speed, but at a higher processor utilization than Windows Server 2008 R2. Improved storage input/output process performance. One of the primary contributors to storage performance improvements in Windows Server 2008 R2 is the improvement in the storage input/output process, known as NTIO. The NTIO process has been optimized to reduce the overhead in performing storage operations. Improved performance when multiple paths exist between servers and storage. When multiple paths exist to storage, you can load-balance storage operations by load-balancing the storage requests. Windows Server 2008 R2 supports up to 32 paths to storage devices, while Windows Server 2008 RTM only supported two paths. You can configure load-balancing policies to optimize the performance for your storage solution. Improved connection performance for iSCSI attached storage. The iSCSI client in Windows Server 2008 R2 has been optimized to improve performance for iSCSI attached storage. Improved support for optimization of the storage subsystem. The storage system has been designed to allow hardware vendors to optimize their storage mini-driver. For example, a vendor could optimize the disk cache for their storage mini-driver. Reduced length of time for operating system start. Chkdsk is run during the operating system start when an administrator has scheduled a scan of a disk volume or when volumes were not shut down properly. Chkdsk performance has been optimized to reduce the length of time required to start the operating system. This allows you to recover faster in the event of an abnormal shutdown of the operating system (such as a power loss).
failover to an alternate path if the primary path fails. You can select the failover priority by configuring the load-balancing policies for your storage solution. Improved recovery from configuration errors. An error in the configuration of the storage subsystem can negatively affect storage availability. Windows Server 2008 R2 allows you to take configuration snapshots of the storage subsystem (for example, the iSCSI configuration). In the event of a subsequent configuration failure, you can quickly restore the configuration to a previous version.
Page #73
NAP is a platform that includes both client and server components to enable fully extensible system health evaluation and authorization for a number of network access and communication technologies, including: Internet Protocol security (IPsec)-protected communication 802.1X-authenticated access for wireless and wired connections Remote access virtual private network (VPN) connections Dynamic Host Configuration Protocol (DHCP) address allocation Terminal Service (TS) Gateway access The improvements to NPS in Windows Server 2008 R2 include: Automated NPS SQL logging setup. This new feature automatically configures a SQL database, required tables, and store procedure for NPS accounting data, which significantly reduces the NPS deployment effort. NPS logging improvements. The logging improvements enable NPS to simultaneously log accounting data to both a file and a SQL database, support failover from SQL database logging to file logging, and support logging with an additional file format that is structured similar to SQL logging. NAP multiple configurations of a system health validator (SHV), When you configure a health policy, you can select an SHV in a specific configuration. This allows you to specify different sets of health requirements based on a specific configuration of the SHV. For example, you can create a network policy that specifies that intranet-connected computers must have their anti-virus software enabled and a different network policy that specifies that VPN-connected computers must have their anti-virus software enabled and anti-malware installed. NPS templates. NPS templates separate common RADIUS configuration elements such as RADIUS shared secrets, IP filters, RADIUS clients, and others from the configuration that is running on the server. When referenced, the NPS setting inherits the values configured in the specified template. A change in the template changes the corresponding value in all of the places in which the template is referenced. For example, a single RADIUS shared secret template can be referenced for multiple RADIUS clients and servers. When you change the RADIUS shared secret template, the change is inherited by all of the RADIUS clients and servers in which that RADIUS shared secret template is referenced. NPS template settings can easily synchronized across multiple NPS servers running Windows Server 2008 R2. Page #74
Migration of Windows Server 2003 Internet Authentication Service (IAS) servers. This feature allows you to migrate the configuration settings of an IAS server running on Windows Server 2003 to an NPS server running on Windows Server 2008 R2.
Depending on the type of VPN, users may install VPN client software on their mobile computer and then establish the VPN connection over public Internet connections. The DirectAccess feature in Windows Server 2008 R2 allows Windows 7 client computers to directly connect to intranet-based resources without the complexity of establishing a VPN connection. The remote connection to the intranet is transparently established for the user. From the users perspective, they are unaware that they are remotely connecting to intranet resources. The following figure contrasts the current VPN-based solutions with DirectAccess based solutions.
Page #76
Figure 29: Comparison between VPN-based and DirectAccessbased solutions DirectAccess was designed ground-up to manage a user-invisible always-on remote access solution that removes all user complexity, gives you easy and efficient management and configuration tools and doesnt compromise in any Page #77
way the security aspect of remote connectivity. To do this, Windows Server 2008 R2s DirectAcces incorporates the following important features: Authentication. DirectAccess authenticates the computer, enabling the computer to connect to the intranet before the user logs on. DirectAccess can also authenticate the user and supports multifactor authentication such as a smart card. Encryption. DirectAccess uses IPsec for encrypted communications across the Internet. Access control. IT can configure which intranet resources different users can access using DirectAccess. IT can grant DirectAccess users unlimited access to the intranet, or only allow them to access specific servers or networks. Integration with Network Access Protection (NAP) and Network Policy Server (NPS). NAP and NPS, features built into Windows Server 2008 and Windows 7 Server, can verify that client computers meet your security requirements and have recent updates installed before allowing them to connect. Split-tunnel routing. Only traffic destined for your intranet is sent through the DirectAccess server. With a traditional VPN, Internet traffic is also sent through your intranet, slowing Internet access for users.
Page #78
Figure 30: DirectAccess remote access solution Unlike a traditional VPN-based solution, the DirectAccess client forwards traffic destined for Internet-based resources directly to the Internet-based resource. In a traditional VPN-based solution, all traffic, both Internet and intranet traffic, is sent through the VPN connection. Separating the Internet-based traffic from the intranet-based traffic helps reduce remote access network utilization. Another difference between DirectAccess and VPNs is that DirectAccess connections are established before the user is logged in. This means that you can manage a remote computer connected by DirectAccess even if the user is not logged in; for example, to apply Group Policy settings. However, for the user to access any corporate resources, they must be logged in. In order to benefit from DirectAccess, you must be able to access the resources within your intranet by using IPv6. If your organization has an IPv6 routable infrastructure, no IPv6 translation is required. If you have resources that only have IPv4 addressing, you will need to provide IPv6-to-IPv4 transition services. Page #79
The DirectAccess server supports the Teredo Server, Teredo Relay, ISATAP Router, NAT-PT and 6to4 router transition technologies. Additionally, Microsofts Forefront Intelligent Access Gateway (IAG) solution will integrate with DirectAccess to provide additional management, security and deployment capabilities. This IAG solution will become available approximately 6 months after the launch of Windows Server 2008 R2 and the Windows 7 client.
have shown the despite of the reduction of costs associated with WAN links, and WAN costs are still a major component of enterprises operational expenses.
Figure 31: The branch office problem The BranchCache feature in Windows Server 2008 R2 and Windows 7 Client reduces the network utilization on WAN links that connect branch offices and improve end user experience at branch locations, by locally caching frequently used content on the branch office network. As remote branch clients attempt to retrieve data from servers located in the corporate data center, they store a copy of the retrieved content on the local branch office network. Subsequent requests for the same content are served from this local cache in the branch office, thereby improving access times locally and reducing WAN bandwidth utilization between the branch and corpnet. BranchCache caches both HTTP and SMB content and ensures access to only authorized users as the authorization process is carried out at the servers located in the data center. BranchCache works alongside SSL or IPSEC encrypted content and accelerates delivery of such content as well. BranchCache can be implemented in two ways: The first involves storing the cached content on a dedicated BranchCache server located in the branch office which improves cache availability. This scenario will likely be the most popular and is intended for larger branch offices where numerous users might Page #81
be looking to access the BranchCache feature simultaneously. A BranchCache server at the remote site ensures that content is always available as well as maintaining end-to-end security for all content requests.
Figure 32: The BranchCache server deployment scenario The second deployment scenario centers around peer content requests and is intended solely for very small remote offices, with roughly 5-10 users that dont warrant a dedicated local server resource. In this scenario, the BranchCache server at corpnet receives a client content request, and if the content has been previously requested at the remote site will return a set of hash directions to the contents location on the remote network, usually another workers PC. Content is then served from this location. If the content was never requested or if the user who previously requested the content is off-site, then the request is fulfilled normally across the WAN.
Page #82
Page #83
feature
Under Features Summary, click Add Features. In the Add Features Wizard, under Features, check Windows Branch Cache, click Next, and then click Install. Wait for the installation to complete. Click Close.
On the Start menu, in Start Search, type cmd, and then press Enter. At the command prompt, type the following command and then press Enter. netsh peerdist set service mode=HOSTEDSERVER
At the command prompt, type the following command and then press Enter. Netsh peerdist show status all At the command prompt, type the following command and then press Enter. Netsh http show sslcert The SSL certificate mapping is required for the hosted cache to function.
At the command prompt, type the following command s, pressing Enter after each command. PowerShell CD Cert: CD LocalMachine CD MY Get-ChildItem | Format-List * exit View the value of the Subject field. When configuring the hosted cache clients, you must use the computer name as listed in this field.
Enable BranchCache Feature on Client Computers using Group Policy Perform the steps in the following table while logged on as a member of the Enterprise Admins security group.
Page #84
Page #85
Action: Allow the connection Configure Windows Firewall Inbound Rules Group Policy settings for BrancheCache In the Group Policy Editor, go to Computer Configuration/Policies/Windows Settings/Security Settings/Windows Firewall with Advanced Security/Outbound Rules. On the Action menu, click New Rule. Create a new outbound rule using the values in the following information. Rule Type: Predefined: Peer Distribution HTTP Transport (Uses HTTP) Action: Allow the connection On the Action menu, click New Rule. Create a new outbound rule using the values in the following information. Rule Type: Predefined: Peer Distribution Hosted Cache (Uses HTTP) Action: Allow the connection Close the Group Policy Management Editor console Close the Group Policy Management console Close Group Policy Management. Close Group Policy Management Editor
Verify Performance of HTTP Content Caching Perform the steps in the following table while logged on as a member of the Enterprise Admins security group. Note: Perform these steps on two client computers that have the Group Policy configuration settings and is on the other side of a WAN connection from the server. Table 1413: Verify Performance of HTTP Content Caching
High-level task Start Internet Explorer on the first client computer Download the HTTP content on the first In Internet Explorer, go to http_site (where http_site is the URL to the web site where the content is located). Details On the first client computer, on the Quick Launch bar, click Internet Explorer.
Page #86
client computer
Save content from the site (such as a file or graphic) Record the download speed of the content while waiting for the content to download.
Start Internet Explorer on the second client computer Download the HTTP content on the second client computer
On the second client computer, on the Quick Launch bar, click Internet Explorer.
In Internet Explorer, go to http_site (where http_site is the URL to the web site where the content is located). Save content from the site (such as a file or graphic) Record the download speed of the content while waiting for the content to download. Note: The content should download almost immediately because the content is being downloaded from the hosted cache.
On the server with BranchCache feature enabled, at a command prompt, type the following command and then press Enter. Netsh peerdist show status all The value of Current Cache Size indicates how much data is stored in the hosted cache.
Page #87
Publish File Hashes and Generate File Hashes Perform the steps in the following table while logged on as a member of the Enterprise Admins security group. Table 1615: Publish File Hashes and Generate File Hashes
High-level task Start Server Manager Details On the Start menu, in Start Search, type gpedit.msc, and then press Enter. The Local Group Policy Editor starts. Configure the Hash Publication settings In the Local Group Policy Editor console, go to Computer Configuration/Administrative Templates/Network/LanManServer. Change the value of Hash Publication for Windows Branch Cache to Enabled, and verify that Allow has publication for all shares is selected. Close the Local Group Policy Editor console. Generate file hashes At a command prompt, type the following command and then press Enter (where server_name is the name of the server you
Page #88
Verify the Performance of SMB Content Caching Perform the steps in the following table while logged on as a member of the Enterprise Admins security group. Table 1716: Verify the Performance of SMB Content Caching
High-level task Access shared network folder on the first computer Details On the first client computer, on the Start menu, in Start Search, type \\server_name\corpfiles, and then press Enter (where server_name is the name of your server where BranchCache is enabled). Download the SMB content on the first client computer Access shared network folder on the second computer Download the SMB content on the second client computer Copy a file from the shared network folder. Record the download speed of the content while waiting for the content to download. On the second client computer, on the Start menu, in Start Search, type \\server_name\corpfiles, and then press Enter (where server_name is the name of your server where BranchCache is enabled). Copy the same file from the shared network folder. Record the download speed of the content while waiting for the content to download. Note: The content should download almost immediately because the content is being downloaded from the hosted cache.
Figure 34: Read-only DFS in a branch office scenario Read-only DFS replicas helps protect your digital assets by allowing branch offices read-only access to information that you replicate to the offices by using DFS. Because the information is read-only, users are unable to modify the content stored in read-only DFS replicated content and thereby protects data in DFS replicas from accidental deletion at branch office locations.
Terminal Services Becomes Remote Desktop Services for Improved Presentation Virtualization section earlier in this guide.
Page #91
Page #92