Windows Server Get Started
Windows Server Get Started
This collection of articles contains detailed information to help you understand and get
the most from Windows Server, and help determine if you're ready to move to the latest
version. Once you've checked the system requirements, upgrade options, and other
information about Windows Server, you're ready to start down the path of installing the
best edition and installation option for your needs.
Tip
7 Note
If you're looking for information about earlier versions that are no longer
supported, see the Windows previous versions documentation.
Learn
Browse learning paths for Windows Server to help learn new skills and accelerate your
deployment with step-by-step guidance. You can learn how to deploy, configure and
administer Windows Server, as well as network infrastructure, file servers and storage
management, Hyper-V and virtualization, plus much more.
Windows Insider Program
The Windows Insider Program for Windows Server provides preview builds of Windows
Server allowing you early access to learn, test, and help shape the future of Windows
Server. To learn more, you can get started with the Windows Insider Program for
Windows Server and participate in the Windows Server Insiders Community .
Next steps
To get started, find out more from these resources.
What's new in Windows Server 2022 provides an overview of the latest features in
Windows Server.
Learn about the different servicing channels, which each is used for, and what it
means for your workloads and support.
Compare the differences in the editions in Windows Server 2022.
Choose the right installation option based on whether you want the Desktop
Experience or a minimal Core interface.
Understand the hardware requirements to run Windows Server.
Follow the learning path for Windows Server deployment, configuration, and
administration.
If you still need to use Windows Server 2008, Windows Server 2008 R2 (and in
future Windows Server 2012, or Windows Server 2012 R2) Extended Security
Updates are available to help keep you safe with security updates and bulletins
rated critical and important.
What's new in Windows Server 2022
Article • 04/18/2023
This article describes some of the new features in Windows Server 2022. Windows Server
2022 is built
on the strong foundation of Windows Server 2019 and brings many
innovations on three key themes:
security, Azure hybrid integration and management,
and application platform.
Azure Edition
Windows Server 2022 Datacenter: Azure Edition helps you use the benefits of cloud to
keep your VMs
up to date while minimizing downtime. This section describes some of
the new features in Windows
Server 2022 Datacenter: Azure Edition. Learn more about
how Azure Automanage for Windows Server
brings these new capabilities to Windows
Server Azure Edition in the Azure Automanage for
Windows Server services article.
Windows Server 2022 Datacenter: Azure Edition builds on Datacenter Edition to deliver a
VM-only
operating system that helps to use the benefits of cloud, with advanced
features like SMB over QUIC,
Hotpatch, and Azure Extended Networking. This section
describes some of these new features.
Compare the
differences in the editions in Windows Server 2022.
You can also learn
more about how Azure Automanage for Windows Server brings these new capabilities
to Windows Server Azure Edition in the
Azure Automanage for Windows Server services
article.
April 2023
Hotpatching
Windows Server 2022 Datacenter: Azure Edition Hotpatching is now public preview for
the Desktop
Experience both in Azure and as a supported guest VM on Azure Stack HCI
version 22H2.
September 2022
This section lists the features and improvements that are now available in Windows
Server
Datacenter: Azure Edition beginning with the 2022-09 Cumulative Update for
Microsoft
server operating system version 21H2 for x64-based Systems
(KB5017381 ).
After you've install the Cumulative
Update, the OS build number will be 20348.1070 or
higher.
New Storage Replica PowerShell parameters are available for existing commands, review
the Windows
PowerShell StorageReplica reference to learn more. For more
information
about Storage Replica, see the
Storage Replica overview.
With this release you can run Windows Server 2022 Datacenter: Azure Edition as a
supported guest VM
on Azure Stack HCI version 22H2. With Azure Edition running on
Azure Stack HCI, you'll be able to use
all the existing features including Hotpatch for
Server Core and
SMB over QUIC at your datacenter and edge locations.
Begin deploying Windows Server 2022 Datacenter: Azure Edition using the
Azure
Marketplace on Arc-enabled Azure Stack HCI
or using an ISO. You can download the ISO
from here:
Your Azure subscription permits you to use Windows Server Datacenter: Azure Edition
on any virtual
machine instances running on Azure Stack HCI. For more information, see
your product terms
Product Terms .
Learn more about the latest Azure Stack HCI features in our
What's new in Azure Stack
HCI, version 22H2 article.
Deploy from Azure Marketplace on Arc-enabled Azure Stack HCI
(preview)
Windows Server 2022 Datacenter: Azure Edition images will be available in the Azure
Marketplace for
Arc-enabled Azure Stack HCI, making it easy to try, buy, and deploy
using Azure certified images.
Learn more about the Azure Marketplace integration for Azure Arc-enabled Azure Stack
HCI features in
our
What's new in Azure Stack HCI, version 22H2
article.
SMB over QUIC updates the SMB 3.1.1 protocol to use the QUIC protocol instead of TCP
in Windows
Server 2022 Datacenter: Azure Edition, Windows 11 and later, and third
party clients if they support
it. By using SMB over QUIC along with TLS 1.3, users and
applications can securely and reliably
access data from edge file servers running in
Azure. Mobile and telecommuter users no longer need a
VPN to access their file servers
over SMB when on Windows. More information can be found at the
SMB over QUIC
documentation and
SMB over QUIC management with Automanage machine best
practices.
All editions
This section describes some of the new features in Windows Server 2022 across all
editions. To learn
more about the different editions, review the
Comparison of Standard,
Datacenter, and Datacenter: Azure Edition editions of Windows Server 2022
article.
Security
The new security capabilities in Windows Server 2022 combine other security
capabilities in Windows Server across multiple areas to provide defense-in-depth
protection against advanced threats. Advanced multi-layer security in Windows Server
2022 provides the comprehensive protection that servers need today.
Secured-core server
Certified Secured-core server hardware from an OEM partner provides more security
protections that are useful against sophisticated attacks. Certified Secured-core server
hardware can provide increased assurance when handling mission critical data in some
of the most data sensitive industries. A Secured-core server uses hardware, firmware,
and driver capabilities to enable advanced Windows Server security features. Many of
these features are available in Windows Secured-core PCs and are now also available
with Secured-core server hardware and Windows Server 2022. For more information
about Secured-core server, see Secured-core server.
Hardware root-of-trust
Used by features such as BitLocker drive encryption, Trusted Platform Module 2.0 (TPM
2.0) secure crypto-processor chips provide a secure, hardware-based store for sensitive
cryptographic keys and data, including systems integrity measurements. TPM 2.0 can
verify that the server has been started with legitimate code and can be trusted by
subsequent code execution, known as a hardware root-of-trust.
Firmware protection
Firmware executes with high privileges and is often invisible to traditional anti-virus
solutions, which has led to a rise in the number of firmware-based attacks. Secured-core
servers measure and verify boot processes with Dynamic Root of Trust for Measurement
(DRTM) technology. Secured-core servers can also isolate of driver access to memory
with Direct Memory Access (DMA) protection.
HVCI uses VBS to significantly strengthen code integrity policy enforcement. Kernel
mode integrity prevents unsigned kernel mode drivers or system files from being loaded
into system memory.
Kernel Data Protection (KDP) provides read-only memory protection of kernel memory
containing non-executable data where memory pages are protected by Hypervisor. KDP
protects key structures in the Windows Defender System Guard runtime from being
tampered.
Secure connectivity
Secure connections are at the heart of today's interconnected systems. Transport Layer
Security (TLS) 1.3 is the latest version of the internet's most deployed security protocol,
which encrypts data to provide a secure communication channel between two
endpoints. HTTPS and TLS 1.3 is now enabled by default on Windows Server 2022,
protecting the data of clients connecting to the server. It eliminates obsolete
cryptographic algorithms, enhances security over older versions, and aims to encrypt as
much of the handshake as possible. Learn more about supported TLS versions and
about supported cipher suites.
Although TLS 1.3 in the protocol layer is now enabled by default, applications and
services also need to actively support it. The Microsoft Security blog has more detail in
the post Taking Transport Layer Security (TLS) to the next level with TLS 1.3 .
Secure DNS: Encrypted DNS name resolution requests with DNS-
over-HTTPS
DNS Client in Windows Server 2022 now supports DNS-over-HTTPS (DoH) which
encrypts DNS queries using the HTTPS protocol. DoH helps keep your traffic as private
as possible by preventing eavesdropping and your DNS data being manipulated. Learn
more about configuring the DNS client to use DoH.
Windows Server failover clusters now support granular control of encrypting and
signing intra-node storage communications for Cluster Shared Volumes (CSV) and the
storage bus layer (SBL). When using Storage Spaces Direct, you can now decide to
encrypt or sign east-west communications within the cluster itself for higher security.
SMB Direct and RDMA supply high bandwidth, low latency networking fabric for
workloads like Storage Spaces Direct, Storage Replica, Hyper-V, Scale-out File Server,
and SQL Server. SMB Direct in Windows Server 2022 now supports encryption.
Previously, enabling SMB encryption disabled direct data placement; this was
intentional, but seriously impacted performance. Now data is encrypted before data
placement, leading to far less performance degradation while adding AES-128 and AES-
256 protected packet privacy.
More information on SMB encryption, signing acceleration, secure RDMA, and cluster
support can be found at SMB security enhancements.
Application platform
There are several platform improvements for Windows Containers, including application
compatibility and the Windows Container experience with Kubernetes.
Reduced Windows Container image size by up to 40%, which leads to a 30% faster
startup time and better performance.
Applications can now use Azure Active Directory with group Managed Services
Accounts (gMSA) without domain joining the container host. Windows Containers
now also support Microsoft Distributed Transaction Control (MSDTC) and Microsoft
Message Queuing (MSMQ).
There are several other enhancements that simplify the Windows Container
experience with Kubernetes. These enhancements include support for host-process
containers for node configuration, IPv6, and consistent network policy
implementation with Calico.
Windows Admin Center has been updated to make it easy to containerize .NET
applications. Once the application is in a container, you can host it on Azure
Container Registry to then deploy it to other Azure services, including Azure
Kubernetes Service.
With support for Intel Ice Lake processors, Windows Server 2022 supports
business-critical and large-scale applications that require up to 48 TB of memory
and 2,048 logical cores running on 64 physical sockets. Confidential computing
with Intel Secured Guard Extension (SGX) on Intel Ice Lake improves application
security by isolating applications from each other with protected memory.
To learn more about the new features, see What's new for Windows containers in
Windows Server 2022.
Networking performance
UDP is becoming a popular protocol carrying more network traffic due to the increasing
popularity of RTP and custom (UDP) streaming and gaming protocols. The QUIC
protocol, built on top of UDP, brings the performance of UDP to a level on par with TCP.
Significantly, Windows Server 2022 includes UDP Segmentation Offload (USO). USO
moves most of the work required to send UDP packets from the CPU to the network
adapter's specialized hardware. Complimenting USO is UDP Receive Side Coalescing
(UDP RSC), which coalesces packets and reduces CPU usage for UDP processing. In
addition, we have also made hundreds of improvements to the UDP data path both
transmit and receive. Windows Server 2022 and Windows 11 both have this new
capability.
Windows Server 2022 uses TCP HyStart++ to reduce packet loss during connection
start-up (especially in high-speed networks) and RACK to reduce Retransmit TimeOuts
(RTO). These features are enabled in the transport stack by default and provide a
smoother network data flow with better performance at high speeds. Windows Server
2022 and Windows 11 both have this new capability.
Virtual switches in Hyper-V have been enhanced with updated Receive Segment
Coalescing (RSC). RSC allows the hypervisor network to coalesce packets and process as
one larger segment. CPU cycles are reduced and segments will remain coalesced across
the entire data path until processed by the intended application. RSC results in
improved performance for both network traffic from an external host, received by a
virtual NIC, and from a virtual NIC to another virtual NIC on the same host.
Disk anomaly detection is a new capability that highlights when disks are behaving
differently than usual. While different isn't necessarily a bad thing, seeing these
anomalous moments can be helpful when troubleshooting issues on your systems. This
capability is also available for servers running Windows Server 2019.
This functionality requires the server to be using the Server Core installation option
option with a Windows Recovery Environment partition.
Storage
Storage bus cache is now available for standalone servers. It can significantly improve
read and write performance, while maintaining storage efficiency and keeping the
operational costs low. Similar to its implementation for Storage Spaces Direct, this
feature binds together faster media (for example, NVMe or SSD) with slower media (for
example, HDD) to create tiers. A portion of the faster media tier is reserved for the
cache. To learn more, see Enable storage bus cache with Storage Spaces on standalone
servers.
SMB compression
Enhancement to SMB in Windows Server 2022 and Windows 11 allows a user or
application to compress files as they transfer over the network. Users no longer have to
manually zip files in order to transfer much faster on slower or more congested
networks. For details, see SMB Compression.
What's new in Windows Server 2019
Article • 12/14/2022
This article describes some of the new features in Windows Server 2019. Windows Server
2019 is built on the strong foundation of Windows Server 2016 and brings numerous
innovations on four key themes: Hybrid Cloud, Security, Application Platform, and
Hyper-Converged Infrastructure (HCI).
General
You can install Windows Admin Center on Windows Server 2019 and Windows 10 and
earlier versions of Windows and Windows Server, and use it to manage servers and
clusters running Windows Server 2008 R2 and later.
Desktop experience
Because Windows Server 2019 is a Long-Term Servicing Channel (LTSC) release, it
includes the Desktop Experience. (Semi-Annual Channel (SAC) releases don't include
the Desktop Experience by design; they're strictly Server Core and Nano Server
container image releases.) As with Windows Server 2016, during setup of the operating
system you can choose between Server Core installations or Server with Desktop
Experience installations.
System Insights
System Insights is a new feature available in Windows Server 2019 that brings local
predictive analytics capabilities natively to Windows Server. These predictive capabilities,
each backed by a machine-learning model, locally analyze Windows Server system data,
such as performance counters and events. System Insights allows you to understand
how your servers are functioning and helps you reduce the operational expenses
associated with reactively managing issues in your Windows Server deployments.
Hybrid Cloud
This optional feature on demand is available on a separate ISO and can be added to
Windows Server Core installations and images only, using DISM.
Networking
We made several improvements to the core network stack, such as TCP Fast Open (TFO),
Receive Window Autotuning, IPv6, and more. For more information, see the Core
Network Stack feature improvement post.
Security
For more information about Windows Defender ATP, see Overview of Windows
Defender ATP capabilities.
Network protection
protects the endpoint against web-based threats by blocking
any outbound
process on the device to untrusted hosts/IP addresses through
Windows
Defender SmartScreen.
Windows Defender Application Control (also known as Code Integrity (CI) policy)
was released in Windows Server 2016. We've made deployment easier by including
default CI policies. The default policy allows all Windows in-box files and Microsoft
applications, such as SQL Server, and blocks known executables that can bypass CI.
These security enhancements are integrated into the comprehensive SDN platform
introduced in Windows Server 2016.
For a complete list of what's new in SDN see, What's New in SDN for Windows Server
2019.
You can now run shielded virtual machines on machines with intermittent
connectivity to the Host Guardian Service by using the new fallback HGS and
offline mode features. Fallback HGS allows you to configure a second set of URLs
for Hyper-V to try if it can't reach your primary HGS server.
Even if the HGS can't be reached, offline mode will allow you to continue to start
up your shielded VMs. Offline mode will allow you to start your VMs as long as the
VM has started successfully once, and the host's security configuration hasn't
changed.
Troubleshooting improvements
Linux support
If you run mixed-OS environments, Windows Server 2019 now supports running
Ubuntu, Red Hat Enterprise Linux, and SUSE Linux Enterprise Server inside shielded
virtual machines.
Changed our default TCP congestion provider to Cubic to give you more
throughput!
Storage
Here are some of the changes we've made to storage in Windows Server 2019. For
details, see What's new in Storage.
Data Deduplication
Data Deduplication now supports ReFS
You can now enable Data Deduplication
wherever you can enable ReFS, increasing storage efficiency by up to 95% with
ReFS.
SMB
SMB1 and guest authentication removal
Windows Server no longer installs the
SMB1 client and server by default. Additionally, the ability to authenticate as a
guest in SMB2 and later is off by default. For more information, review SMBv1 isn't
installed by default in Windows 10, version 1709 and Windows Server, version
1709 .
Storage Replica
Here's what's new in Storage Replica. For details, see What's new in Storage Replica.
Failover Clustering
Here's a list of what's new in Failover Clustering. For details, see What's new in Failover
Clustering.
Cluster sets
Azure-aware clusters
Cross-domain cluster migration
USB witness
Cluster infrastructure improvements
Cluster Aware Updating supports Storage Spaces Direct
File share witness enhancements
Cluster hardening
Failover Cluster no longer uses NTLM authentication
Application Platform
Container improvements
Improved integrated identity
We've made it easier than ever to see which containers are running on your
computer and manage individual containers with a new extension for Windows
Admin Center. Look for the "Containers" extension in the Windows Admin Center
public feed.
Compute improvements
VM Start Ordering
VM Start Ordering is also improved with OS and Application
awareness, bringing enhanced triggers for when a VM is considered started before
starting the next.
Encrypted Networks
Encrypted Networks - Virtual network encryption allows encryption of virtual network
traffic between virtual machines that communicate with each other within subnets
marked as Encryption Enabled.
It also utilizes Datagram Transport Layer Security (DTLS)
on the virtual subnet to encrypt packets. DTLS protects against eavesdropping,
tampering, and forgery by anyone with access to the physical network.
This article describes some of the new features in Windows Server 2016 that are the
ones most likely to have the greatest impact as you work with this release.
Compute
The Virtualization area includes virtualization products and features for the IT
professional to design, deploy, and maintain Windows Server.
General
Physical and virtual machines benefit from greater time accuracy due to improvements
in the Win32 Time and Hyper-V Time Synchronization Services. Windows Server can now
host services that are compliant with upcoming regulations that require a 1ms accuracy
with regard to UTC.
Hyper-V
What's new in Hyper-V on Windows Server 2016. This topic explains the new and
changed functionality of the Hyper-V role in Windows Server 2016, Client Hyper-V
running on Windows 10, and Microsoft Hyper-V Server 2016.
Nano Server
What's New in Nano Server. Nano Server now has an updated module for building Nano
Server images, including more separation of physical host and guest virtual machine
functionality as well as support for different Windows Server editions.
There are also improvements to the Recovery Console, including separation of inbound
and outbound firewall rules as well as the ability to repair the configuration of WinRM.
A new Encryption Supported mode that offers more protections than for an
ordinary virtual machine, but less than Shielded mode, while still supporting vTPM,
disk encryption, Live Migration traffic encryption, and other features, including
direct fabric administration conveniences such as virtual machine console
connections and PowerShell Direct.
Hyper-V Virtual Machine Manager can now view the fabrics upon which a shielded
virtual is authorized to run, providing a way for the fabric administrator to open a
shielded virtual machine's key protector (KP) and view the fabrics it is permitted to
run on.
You can switch Attestation modes on a running Host Guardian Service. Now you
can switch on the fly between the less secure but simpler Active Directory-based
attestation and TPM-based attestation.
Host Guardian Service support for existing safe Active Directory – you can direct
the Host Guardian Service to use an existing Active Directory forest as its Active
Directory instead of creating its own Active Directory instance
For more details and instructions for working with shielded virtual machines, see
Guarded Fabric and Shielded VMs.
Administration
The Management and Automation area focuses on tool and reference information for IT
pros who want to run and manage Windows Server 2016, including Windows
PowerShell.
Windows PowerShell 5.1 includes significant new features, including support for
developing with classes and new security features that extend its use, improve its
usability, and allow you to control and manage Windows-based environments more
easily and comprehensively. See New Scenarios and Features in WMF 5.1 for details.
New additions for Windows Server 2016 include: the ability to run PowerShell.exe locally
on Nano Server (no longer remote only), new Local Users & Groups cmdlets to replace
the GUI, added PowerShell debugging support, and added support in Nano Server for
security logging & transcription and JEA.
For more info about testing the DSC features of Windows Management Framework 5,
see the series of blog posts discussed in Validate features of PowerShell DSC . To
download, see Windows Management Framework 5.1.
For more info, see the PowerShell ♥ the Blue Team blog post.
Networking
The Networking area addresses networking products and features for the IT professional
to design, deploy, and maintain Windows Server 2016.
Software-Defined Networking
You can now both mirror and route traffic to new or existing virtual appliances. Together
with a distributed firewall and Network security groups, this enables you to dynamically
segment and secure workloads in a manner similar to Azure. Second, you can deploy
and manage the entire Software-defined networking (SDN) stack using System Center
Virtual Machine Manager. Finally, you can use Docker to manage Windows Server
container networking, and associate SDN policies not only with virtual machines but
containers as well. For more information, see Plan a Software Defined Network
Infrastructure.
In order to improve TCP behavior when recovering from packet loss we have
implemented TCP Tail Loss Probe (TLP) and Recent Acknowledgment (RACK). TLP helps
convert Retransmit TimeOuts (RTOs) to Fast Recoveries and RACK reduces the time
required for Fast Recovery to retransmit a lost packet.
Credential Guard
Credential Guard uses virtualization-based security to isolate secrets so that only
privileged system software can access them. See Protect derived domain credentials
with Credential Guard.
Windows Defender
Windows Defender Overview for Windows Server 2016. Windows Server Antimalware is
installed and enabled by default in Windows Server 2016, but the user interface for
Windows Server Antimalware is not installed. However, Windows Server Antimalware will
update antimalware definitions and protect the computer without the user interface. If
you need the user interface for Windows Server Antimalware, you can install it after the
operating system installation by using the Add Roles and Features Wizard.
Storage
Storage in Windows Server 2016 includes new features and enhancements for software-
defined storage, as well as for traditional file servers. Below are a few of the new
features, for more enhancements and further details, see What's New in Storage in
Windows Server 2016.
Storage Replica
Storage Replica enables storage-agnostic, block-level, synchronous replication between
servers or clusters for disaster recovery, as well as stretching of a failover cluster
between sites. Synchronous replication enables mirroring of data in physical sites with
crash-consistent volumes to ensure zero data loss at the file-system level. Asynchronous
replication allows site extension beyond metropolitan ranges with the possibility of data
loss.
Failover Clustering
Windows Server 2016 includes a number of new features and enhancements for
multiple servers that are grouped together into a single fault-tolerant cluster using the
Failover Clustering feature. Some of the additions are listed below; for a more complete
listing, see What's New in Failover Clustering in Windows Server 2016.
Cluster Operating System Rolling Upgrade
Cluster Operating System Rolling Upgrade enables an administrator to upgrade the
operating system of the cluster nodes from Windows Server 2012 R2 to Windows Server
2016 without stopping the Hyper-V or the Scale-Out File Server workloads. Using this
feature, the downtime penalties against Service Level Agreements (SLA) can be avoided.
Cloud Witness
Cloud Witness is a new type of Failover Cluster quorum witness in Windows Server 2016
that leverages Microsoft Azure as the arbitration point. The Cloud Witness, like any
other quorum witness, gets a vote and can participate in the quorum calculations. You
can configure cloud witness as a quorum witness using the Configure a Cluster Quorum
Wizard.
Health Service
The Health Service improves the day-to-day monitoring, operations, and maintenance
experience of cluster resources on a Storage Spaces Direct cluster.
Application development
Support for the HTTP/2 protocol in the Networking stack and integrated with IIS
10.0, allowing IIS 10.0 websites to automatically serve HTTP/2 requests for
supported configurations. This allows numerous enhancements over HTTP/1.1 such
as more efficient reuse of connections and decreased latency, improving load
times for web pages.
Ability to run and manage IIS 10.0 in Nano Server. See IIS on Nano Server.
Support for Wildcard Host Headers, enabling administrators to set up a web server
for a domain and then have the web server serve requests for any subdomain.
A new PowerShell module (IISAdministration) for managing IIS.
For more details see IIS .
A new interface for Resource Manager Rejoin can be used by a resource manager
to determine the outcome of an in-doubt transaction after a database restarts due
to an error. See IResourceManagerRejoinable::Rejoin for details.
The DSN name limit is enlarged from 256 bytes to 3072 bytes. See
IDtcToXaHelperFactory::Create, IDtcToXaHelperSinglePipe::XARMCreate, or
IDtcToXaMapper::RequestNewResourceManager for details.
Improved tracing allowing you to set a registry key to include an image file path in
the trace log file name so you can tell which trace log file to check. See How to
enable diagnostic tracing for MS DTC on a Windows-based computer for details
on configuring tracing for MSDTC.
Windows Server servicing channels
Article • 07/05/2022
Previously with Windows Server 2016 and Windows Server 2019 there have been two
primary release channels available, the Long-Term Servicing Channel and the Semi-
Annual Channel. The Long-Term Servicing Channel (LTSC) provides a longer term option
focusing on stability, whereas the Semi-Annual Channel (SAC) provided more frequent
releases enabling customers to take advantage of innovation more quickly.
Starting with Windows Server 2022, there is one primary release channel available, the
Long-Term Servicing Channel. The Semi-Annual Channel in previous versions of
Windows Server focused on containers and microservices, and that innovation will
continue with Azure Stack HCI.
Semi-Annual Channel
The Semi-Annual Channel enabled customers who are innovating quickly to take
advantage of new operating system capabilities at a faster pace, focused in on
containers and microservices. Each release in this channel is supported for 18 months
from the initial release.
7 Note
7 Note
The current Semi-Annual Channel release is Windows Server, version 20H2. If you
want to put servers in this channel, you should install Windows Server, version
20H2, which can be installed in Server Core mode or as Nano Server run in a
container. In-place upgrades from a Long-Term Servicing Channel release aren't
supported because they are in different release channels. This applies vice versa.
You cannot upgrade or change from Semi-Annual Channel to Long-Term Servicing
Channel without a clean installation.
A Semi-Annual Channel release isn't an update – it's the next Windows Server
release in the Semi-Annual Channel.
In-place upgrades from one Semi-Annual
Channel release to a later Semi-Annual Channel release are possible. This makes it
easier to keep up with the relatively short release cadence.
In this model, Windows Server releases were identified by the year and month of
release: for example, in 2017, a release in the 9th month (September) would be
identified as version 1709. Fresh releases of Windows Server in the Semi-Annual Channel
occurred twice each year. The support lifecycle for each release is 18 months. Starting
with fall 2020 (20H2) releases, we changed the identification. Instead of a month, the
release is named based on the release cycle. For example: version 20H2, for a release in
the second half of the year 2020.
Key differences
The following table summarizes the key differences between the channels:
Recommended General purpose file servers, Microsoft and non- Containerized applications,
scenarios Microsoft workloads, traditional apps, container hosts, and
infrastructure roles, software-defined application scenarios
Datacenter, and hyper-converged infrastructure benefiting from faster
innovation
Description Long-Term Servicing Channel (Windows Semi-Annual Channel
Server 2019) (Windows Server)
Who can use All customers through all channels Software Assurance and
it? cloud customers only
Installation Server Core and Server with Desktop Experience Server Core for container
options host and image and Nano
Server container image
) Important
Please understand that the set of roles and features in Windows Server SAC, only
available as Server Core installation option, differs from Windows Server LTSC
installed with the Server Core installation option.
For example, you cannot use
Windows Server SAC as a foundation for services like Storage Spaces Direct.
Device compatibility
Unless otherwise communicated, the minimum hardware requirements to run the Semi-
Annual Channel releases are the same as the most recent Long-Term Servicing Channel
release of Windows Server. Most hardware drivers will continue to function in these
releases.
Servicing
Both the Long-Term Servicing Channel and the Semi-Annual Channel releases will be
supported with security updates and non-security updates up to the dates listed in the
Microsoft Lifecycle pages. The difference is the length of time that the release is
supported, as described above.
Servicing tools
There are many tools with which IT pros can service Windows Server. Each option has its
pros and cons, ranging from capabilities and control to simplicity and low administrative
requirements. The following are examples of the servicing tools available to manage
servicing updates:
Windows Update (stand-alone): This option is only available for servers that are
connected to the Internet and have Windows Update enabled.
Windows Server Update Services (WSUS) provides extensive control over
Windows Server and Windows client updates and is natively available in the
Windows Server operating system. In addition to the ability to defer updates,
organizations can add an approval layer for updates and choose to deploy them to
specific computers or groups of computers whenever ready.
Microsoft Endpoint Configuration Manager provides the greatest control over
servicing. IT pros can defer updates, approve them, and have multiple options for
targeting deployments and managing bandwidth usage and deployment times.
You've likely already chosen to use at least one of these options based on your
resources, staff, and expertise. You can continue using the same process for Semi-
Annual Channel Releases: for example, if you already use Configuration Manager to
manage updates, you can continue to use it. Similarly, if you are using WSUS, you can
continue to use that.
7 Note
For easier maintenance and management of activation, you can use ADBA (Active
Directory-based activation) for Windows Server 2012 or later, including Windows
Server SAC.
In addition, you can manage your licenses using VAMT 3.x (Volume
Activation Management Tool), which is part of the latest ADK.
Semi-Annual Channel releases that were released with or after Windows Server 2019 use
the Windows Server 2019 CSVLK. Semi-Annual Channel releases that were released
before Windows Server 2019 use the Windows Server 2016 CSVLK.
By focusing on the Server Core installation option, we're able to dedicate more
resources toward those new innovations, while also maintaining traditional Windows
Server platform functionality and application compatibility.
Starting with Windows Server, version 1809 and Windows Server 2019, Server Core App
Compatibility Feature on Demand (FOD) is an optional feature package that significantly
improves the app compatibility of the Windows Server Core installation option by
including a subset of binaries and packages from Windows Server with Desktop
Experience, without adding the Windows Server Desktop Experience graphical
environment.
7 Note
The below guidance is intended to help identify and differentiate between LTSC
and SAC for lifecycle and general inventory purposes only. It is not intended for
application compatibility or to represent a specific API surface. App developers
should use guidance elsewhere to properly ensure compatibility as components,
APIs, and functionality can be added over the life of a system, or not yet be added.
Operating System Version is a better starting point for App Developers.
Windows Server 2019 Datacenter Edition (LTSC) with Desktop Experience example:
PowerShell
ReleaseId : 1809
InstallationType : Server
CurrentMajorVersionNumber : 10
CurrentMinorVersionNumber : 0
CurrentBuild : 17763
Windows Server, version 1809 (SAC) Standard Edition Server Core example:
PowerShell
ReleaseId : 1809
CurrentMajorVersionNumber : 10
CurrentMinorVersionNumber : 0
CurrentBuild : 17763
PowerShell
WindowsVersion : 1809
OsServerLevel : ServerCore
OsVersion : 10.0.17763
OsHardwareAbstractionLayer : 10.0.17763.107
To query if the new Server Core App Compatibility Feature on Demand (FOD) is present
on a server, use the Get-WindowsCapability cmdlet and look for:
Name : ServerCore.AppCompatibility~~~~0.0.1.0
State : Installed
The annual Azure Edition updates are delivered using Windows Update, rather than a
full OS upgrade. As part of this annual update cadence, the Azure Edition Insider
preview program gives the opportunity to access early builds - leading to general
availability. To get started with Azure Edition Insider preview, visit the Azure Edition
preview Azure Marketplace offer. Details regarding each preview is shared in release
announcements posted to the Windows Server Insiders space on Microsoft Tech
Community.
Key differences
The following table summarizes the key differences:
Product updates With new release Yearly, with two major updates in the
first 3 years
Who can use it? All customers through all Software Assurance, Windows Server
channels subscription and cloud customers only
Installation options Server Core, Server with Server Core and Server with Desktop
Desktop Experience, Nano Experience only. Windows Server
Server container image containers aren't supported.
Description Windows Server Standard, Windows Server Datacenter: Azure
Datacenter Edition
Capabilities vary by image, see Getting started with Windows Server Datacenter: Azure
Edition for more detail.
Tip
For more information, see the Microsoft Software Licensing Terms . The licensing
terms may vary based on the distribution channel, for example, a Commercial
Licensing program, Retail, Original Equipment Manufacturer (OEM), and so on.
Key capabilities
Hotpatch
Beginning with Windows Server 2022 Datacenter: Azure Edition, Hotpatch gives you the
ability to apply security updates on your VM without rebooting. When used with Azure,
Azure Guest Patching Service, along with Automanage for Window Server, automate the
onboarding, configuration, and orchestration of hotpatching. To learn more, see
Hotpatch for new virtual machines.
Supported platforms
Hotpatch is supported on the following operating systems for VMs running on Azure
and Azure Stack HCI:
7 Note
SMB over QUIC is also integrated with Azure Automanage machine best practices for
Windows Server to help make SMB over QUIC management easier. QUIC uses
certificates to provide its encryption and organizations often struggle to maintain
complex public key infrastructures. Azure Automanage machine best practices ensure
that certificates don't expire without warning and that SMB over QUIC stays enabled for
maximum continuity of service.
To learn more, see SMB over QUIC and SMB over QUIC management with Automanage
machine best practices.
To learn more about Storage Replica features, see Storage Replica features
) Important
To learn more about creating virtual machine using Azure or Azure Stack HCI, see Create
a Windows virtual machine in the Azure portal and Deploy Windows Server Azure
Edition VMs in Azure Stack HCI.
Next steps
Comparison of Standard, Datacenter, and Datacenter: Azure Edition editions of
Windows Server 2022
Hotpatch for new virtual machines
Enable Hotpatch for Azure Edition virtual machines built from ISO (preview)
SMB over QUIC
Extend your on-premises subnets into Azure using extended network for Azure
Comparison of Standard, Datacenter,
and Datacenter: Azure Edition editions
of Windows Server 2022
Article • 10/18/2022
Use this article to compare Standard, Datacenter, and Datacenter: Azure Edition editions
of Windows Server 2022 to see which will be most appropriate.
Hotpatching No No Yes
Locks and Limits Windows Server 2022 Windows Server 2022 Datacenter
Standard
Maximum number 64 64
of 64-bit sockets
Maximum RAM 48 TB 48 TB
Can be used as Yes; 2 virtual machines, plus Yes; unlimited virtual machines,
virtualization guest one Hyper-V host per license plus one Hyper-V host per license
Edge network No No
protection/firewall
DLNA codecs and Yes, if installed as Server with Yes, if installed as Server with
web media Desktop Experience Desktop Experience
streaming
Server roles
Full Comparison
Windows Server Role services Windows Server 2022 Windows Server 2022
roles available Standard Datacenter
Features
Full Comparison
BitLocker Network Unlock Yes, when installed as Server Yes, when installed as Server
with Desktop Experience with Desktop Experience
Direct Play Yes, when installed as Server Yes, when installed as Server
with Desktop Experience with Desktop Experience
Internet Printing Client Yes, when installed as Server Yes, when installed as Server
with Desktop Experience with Desktop Experience
LPR Port Monitor Yes, when installed as Server Yes, when installed as Server
with Desktop Experience with Desktop Experience
RAS Connection Manager Yes, when installed as Server Yes, when installed as Server
Administration Kit (CMAK) with Desktop Experience with Desktop Experience
Remote Assistance Yes, when installed as Server Yes, when installed as Server
with Desktop Experience with Desktop Experience
Simple TCP/IP Services Yes, when installed as Server Yes, when installed as Server
with Desktop Experience with Desktop Experience
TFTP Client Yes, when installed as Server Yes, when installed as Server
with Desktop Experience with Desktop Experience
Windows Biometric Yes, when installed as Server Yes, when installed as Server
Framework with Desktop Experience with Desktop Experience
Windows Identity Yes, when installed as Server Yes, when installed as Server
Foundation 3.5 with Desktop Experience with Desktop Experience
Windows Search Service Yes, when installed as Server Yes, when installed as Server
with Desktop Experience with Desktop Experience
Windows TIFF IFilter Yes, when installed as Server Yes, when installed as Server
with Desktop Experience with Desktop Experience
XPS Viewer Yes, installed with Server with Yes, installed with Server with
Desktop Experience Desktop Experience
Comparison of Standard and Datacenter
editions of Windows Server 2019
Article • 09/19/2022
Use this article to compare Standard and Datacenter editions of Windows Server 2019 to
see which will be most appropriate.
Software-defined No Yes
Networking
Locks and Limits Windows Server 2019 Windows Server 2019 Datacenter
Standard
Maximum number 64 64
of 64-bit sockets
Maximum RAM 24 TB 24 TB
Can be used as Yes; 2 virtual machines, plus Yes; unlimited virtual machines,
virtualization guest one Hyper-V host per license plus one Hyper-V host per license
Edge network no no
protection/firewall
DLNA codecs and Yes, if installed as Server with Yes, if installed as Server with
web media Desktop Experience Desktop Experience
streaming
Server roles
Full Comparison
Windows Server Role services Windows Server 2019 Windows Server 2019
roles available Standard Datacenter
7 Note
Features
Full Comparison
Windows Server Windows Server 2019 Standard Windows Server 2019
Features available Datacenter
BitLocker Network Unlock Yes, when installed as Server with Yes, when installed as
Desktop Experience Server with Desktop
Experience
Direct Play Yes, when installed as Server with Yes, when installed as
Desktop Experience Server with Desktop
Experience
Internet Printing Client Yes, when installed as Server with Yes, when installed as
Desktop Experience Server with Desktop
Experience
LPR Port Monitor Yes, when installed as Server with Yes, when installed as
Desktop Experience Server with Desktop
Experience
RAS Connection Manager Yes, when installed as Server with Yes, when installed as
Administration Kit (CMAK) Desktop Experience Server with Desktop
Experience
Remote Assistance Yes, when installed as Server with Yes, when installed as
Desktop Experience Server with Desktop
Experience
Simple TCP/IP Services Yes, when installed as Server with Yes, when installed as
Desktop Experience Server with Desktop
Experience
Windows Server Windows Server 2019 Standard Windows Server 2019
Features available Datacenter
TFTP Client Yes, when installed as Server with Yes, when installed as
Desktop Experience Server with Desktop
Experience
Windows Biometric Yes, when installed as Server with Yes, when installed as
Framework Desktop Experience Server with Desktop
Experience
Windows Identity Yes, when installed as Server with Yes, when installed as
Foundation 3.5 Desktop Experience Server with Desktop
Experience
Windows Search Service Yes, when installed as Server with Yes, when installed as
Desktop Experience Server with Desktop
Experience
Windows TIFF IFilter Yes, when installed as Server with Yes, when installed as
Desktop Experience Server with Desktop
Experience
XPS Viewer Yes, when installed as Server with Yes, when installed as
Desktop Experience Server with Desktop
Experience
Comparison of Standard and Datacenter
editions of Windows Server 2016
Article • 09/19/2022
Use this article to compare Standard and Datacenter editions of Windows Server 2016 to
see which will be most appropriate.
Locks and Limits Windows Server 2016 Windows Server 2016 Datacenter
Standard
Maximum number 64 64
of 64-bit sockets
Maximum RAM 24 TB 24 TB
Locks and Limits Windows Server 2016 Windows Server 2016 Datacenter
Standard
Can be used as Yes; 2 virtual machines, plus Yes; unlimited virtual machines,
virtualization guest one Hyper-V host per license plus one Hyper-V host per license
Edge network no no
protection/firewall
DLNA codecs and Yes, if installed as Server with Yes, if installed as Server with
web media Desktop Experience Desktop Experience
streaming
Server roles
Full Comparison
Windows Server Role services Windows Server 2016 Windows Server 2016
roles available Standard Datacenter
Features
Full Comparison
BitLocker Network Yes, when installed as Server with Yes, when installed as Server
Unlock Desktop Experience with Desktop Experience
Direct Play Yes, when installed as Server with Yes, when installed as Server
Desktop Experience with Desktop Experience
Internet Printing Client Yes, when installed as Server with Yes, when installed as Server
Desktop Experience with Desktop Experience
LPR Port Monitor Yes, when installed as Server with Yes, when installed as Server
Desktop Experience with Desktop Experience
RAS Connection Yes, when installed as Server with Yes, when installed as Server
Manager Administration Desktop Experience with Desktop Experience
Kit
Remote Assistance Yes, when installed as Server with Yes, when installed as Server
Desktop Experience with Desktop Experience
Simple TCP/IP Services Yes, when installed as Server with Yes, when installed as Server
Desktop Experience with Desktop Experience
TFTP Client Yes, when installed as Server with Yes, when installed as Server
Desktop Experience with Desktop Experience
Windows Server Windows Server 2016 Standard Windows Server 2016
Features available Datacenter
Windows Biometric Yes, when installed as Server with Yes, when installed as Server
Framework Desktop Experience with Desktop Experience
Windows Identity Yes, when installed as Server with Yes, when installed as Server
Foundation 3.5 Desktop Experience with Desktop Experience
Windows Search Service Yes, when installed as Server with Yes, when installed as Server
Desktop Experience with Desktop Experience
Windows TIFF IFilter Yes, when installed as Server with Yes, when installed as Server
Desktop Experience with Desktop Experience
XPS Viewer Yes, when installed as Server with Yes, when installed as Server
Desktop Experience with Desktop Experience
Hardware requirements for Windows
Server
Article • 12/23/2021
This article outlines the minimum hardware requirements to run Windows Server. If your
computer has less than the minimum requirements, you will not be able to install this
product correctly. Actual requirements will vary based on your system configuration and
the applications and features you install.
) Important
Processor
Processor performance depends not only on the clock frequency of the processor, but
also on the number of processor cores and the size of the processor cache. The
following are the processor requirements for this product:
Minimum:
Coreinfo, part of Windows Sysinternals, is a tool you can use to confirm which of these
capabilities your CPU has.
RAM
The following are the estimated RAM requirements for this product:
Minimum:
) Important
If you create a virtual machine with the minimum supported hardware parameters
(1 processor core and 512 MB RAM) and then attempt to install this release on the
virtual machine, Setup will fail.
Allocate more than 800 MB RAM to the virtual machine on which you intend
to install this release. Once Setup has completed, you can change the
allocation to as little as 512 MB RAM, depending on the actual server
configuration. If you've modified the boot image for Setup with addition
languages and updates, you may need to allocate more than 800 MB RAM in
order to complete the installation
Interrupt the boot process of this release on the virtual machine with the
keyboard combination SHIFT+F10 . In the command prompt that opens, use
diskpart.exe to create and format an installation partition. Run wpeutil
created was C:\). Then close the command prompt and proceed with Setup.
The following are the estimated minimum disk space requirements for the system
partition.
Minimum: 32 GB
7 Note
The system partition will need extra space for any of the following circumstances:
Minimum:
A network adapter that supports network debugging (KDNet) is useful, but not a
minimum requirement.
A network adapter that supports the Pre-boot Execution Environment (PXE) is useful, but
not a minimum requirement.
Other requirements
Computers running this release also must have the following:
DVD drive (if you intend to install the operating system from DVD media)
7 Note
A Trusted Platform Module (TPM) chip is required in order to use certain features
such as BitLocker Drive Encryption. If your computer uses TPM, it must meet these
requirements:
Each release of Windows Server adds new features and functionality; we also
occasionally remove features and functionality, usually because we've added a better
option. Here are the details about the features and functionalities that we removed in
Windows Server 2022.
Tip
You can get early access to Windows Server builds by joining the Windows
Insider Program for Business - this is a great way to test feature changes.
The list is subject to change and might not include every affected feature or
functionality.
Semi-Annual Channel
As part of our customer-centric approach, we’ll move to the Long-Term Servicing
Channel (LTSC) as our primary release channel. Current Semi-Annual Channel (SAC)
releases will continue through their mainstream support end dates, which are May 10,
2022 for Windows Server version 20H2 and December 14, 2021 for Windows Server
version 2004
The focus on container and microservice innovation previously released in the Semi-
Annual Channel will now continue with Azure Kubernetes Service (AKS), AKS on Azure
Stack HCI, and other platform improvements made in collaboration with the Kubernetes
community. And with the Long-Term Servicing Channel, a major new version of
Windows Server will be released every 2-3 years, so customers can expect both
container host and container images to align with that cadence.
Feature Explanation
Internet Storage The iSNS Server service has now been removed from Windows Server
Name Service (iSNS) 2022 after it was considered for removal in Windows Server, version 1709.
Server service You can still connect to iSNS servers or add iSCSI targets individually.
Feature Explanation
TLS 1.0 and 1.1 Over the past several years, internet standards and regulatory bodies have
deprecated or disallowed TLS versions 1.0 and 1.1 due to various security
issues. In a future release of Windows Server, TLS 1.0 and 1.1 will be disabled
by default. For more information, see TLS versions 1.0 and 1.1 disablement
resources.
Windows Internet WINS is a legacy computer name registration and resolution service. You
Name Service should replace WINS with Domain Name System (DNS). For more
(WINS) information, see Windows Internet Name Service (WINS).
Guarded Fabric Windows Server and Azure Stack HCI are aligning with Azure to take
and Shielded advantage of continuing enhancements to Azure Confidential Computing
Virtual Machines and Azure Security Center. Having this alignment translates to more cloud
(VMs) security offerings being extended to customer data centers (on-premises).
Microsoft will continue to provide support for these features, but there will
be no further development. On client versions of Windows, the Remote
Server Administration Tools (RSAT): Shielded VM Tools feature will be
removed.
Launching Starting with Windows Server 2022, SConfig is launched by default when you
SConfig from a sign in to a server running Server Core installation option. Moreover,
command prompt PowerShell is now the default shell on Server Core. If you exit SConfig, you
(CMD) window by get to a regular interactive PowerShell window. Similarly, you can opt out
running from SConfig autolaunch. In this case, you'll get a PowerShell window at
sconfig.cmd sign-in. In either scenario, you can launch SConfig from PowerShell by
running SConfig . If needed, you can launch the legacy command prompt
(CMD) from PowerShell as well. But to simplify different transition options,
we're going to remove sconfig.cmd from the next version of the operating
system. If you need to start SConfig from a CMD window, you'll have to
launch PowerShell first.
Feature Explanation
WDS PXE boot isn't affected. You can still use WDS to PXE boot devices to
custom boot images. You can also still run setup from a network share.
Workflows that use custom boot.wim images, such as with Configuration
Manager or MDT, will also not be impacted by this change.
LSARPC interface The named pipe \PIPE\lsarpc for accessing EFS encrypted files over the
network will be disabled and eventually removed from future versions of
Windows. You can still use the named pipe \PIPE\efsrpc to access encrypted
files.
Hyper-V vSwitch In a future release, the Hyper-V vSwitch will no longer have the capability to
on LBFO be bound to an LBFO team. Instead, it must be bound via Switch Embedded
Teaming (SET).
XDDM-based Starting with this release the Remote Desktop Services uses a Windows
remote display Display Driver Model (WDDM) based Indirect Display Driver (IDD) for a single
driver session remote desktop. The support for Windows 2000 Display Driver
Model (XDDM) based remote display drivers will be removed in a future
release. Independent Software Vendors that use XDDM-based remote
display driver should plan a migration to the WDDM driver model. For more
information on implementing remote display indirect display driver see
Updates for IddCx versions 1.4 and later.
UCS log collection The UCS log collection tool, while not explicitly intended for use with
tool Windows Server, is nonetheless being replaced by the Feedback hub on
Windows 10.
Features removed or no longer
developed starting with Windows
Server 2019
Article • 11/28/2022
Each release of Windows Server adds new features and functionality; we also
occasionally remove features and functionality, usually because we've added a better
option. Here are the details about the features and functionalities that we removed in
Windows Server 2019.
Tip
You can get early access to Windows Server builds by joining the Windows
Insider program - this is a great way to test feature changes.
The list is subject to change and might not include every affected feature or
functionality.
Feature Explanation
Business We're removing this secure scanning and scanner management capability -
Scanning, also there are no devices that support this feature.
called
Distributed
Scan
Management
(DSM)
Print In previous releases of Windows Server, the print components were disabled by
components - default in the Server Core installation option. We changed that in Windows
now optional Server 2016, enabling them by default. In Windows Server 2019, those print
component for components are once again disabled by default for Server Core. If you need to
Server Core enable the print components, you can do so by running the Install-
installations WindowsFeature Print-Server cmdlet.
Feature Explanation
Remote Most Remote Desktop Services deployments have these roles co-located with
Desktop the Remote Desktop Session Host (RDSH), which requires Server with Desktop
Connection Experience. To be consistent with RDSH, we're changing these roles to also
Broker and require Server with Desktop Experience. These RDS roles are no longer available
Remote for use in a Server Core installation. If you need to deploy these roles as part of
Desktop your Remote Desktop infrastructure, you can install them on Windows Server
Virtualization with Desktop Experience.
Host in a
Server Core These roles are also included in the Desktop Experience installation option of
installation Windows Server 2019.
Nano Server Nano Server isn't available as an installable host operating system. Instead,
installation Nano Server is available as a container operating system. To learn more about
option Nano Server as a container, see Windows Container Base Images.
Server Starting with this release, Server Message Block (SMB) version 1 is no longer
Message Block installed by default. For details, see SMBv1 isn't installed by default in Windows
(SMB) version 10 version 1709, Windows Server version 1709 and later versions
1
File Replication File Replication Services, introduced in Windows Server 2003 R2, has been
Service replaced by DFS Replication. You need to migrate any domain controllers that
use FRS for the sysvol folder to DFS Replication .
Feature Explanation
Key Storage We're no longer working on the Key Storage Drive feature in Hyper-V. If you're
Drive in using generation 1 virtual machines (VMs), check out Generation 1 VM
Hyper-V Virtualization Security for information about options going forward. If you're
creating new VMs, use Generation 2 virtual machines with TPM devices for a
more secure solution.
Feature Explanation
Trusted The information previously available in the TPM management console is now
Platform available on the Device security page in the Windows Defender Security Center.
Module (TPM)
management
console
Host Guardian We're no longer developing Host Guardian Service Active Directory attestation
Service Active mode, instead we've added a new attestation mode, host key attestation. Host
Directory key attestation is simpler and equally as compatible as Active Directory based
attestation attestation. This new mode provides equivalent functionality with a setup
mode experience, simpler management and fewer infrastructure dependencies than
the Active Directory attestation. Host key attestation has no extra hardware
requirements beyond what Active Directory attestation required, so all existing
systems will remain compatible with the new mode. For more information, see
Deploy guarded hosts for more information about your attestation options.
OneSync The OneSync service synchronizes data for the Mail, Calendar, and People apps.
service We've added a sync engine to the Outlook app that provides the same
synchronization.
Remote Remote Differential Compression API support enabled synchronizing data with a
Differential remote source using compression technologies, which minimized the amount of
Compression data sent across the network.
API support
WFP The WFP lightweight filter switch extension enables developers to build simple
lightweight network packet filtering extensions for the Hyper-V virtual switch. You can
filter switch achieve the same functionality by creating a full filtering extension. As such, we'll
extension be removing this extension in the future.
You should also start migration from IIS 6.0 or earlier versions, and move to the
latest version of IIS, which is always available in the most recent release of
Windows Server.
Feature Explanation
IIS Digest This authentication method is planned for replacement. Instead, you should start
Authentication using other authentication methods such as Client Certificate Mapping (see
Configuring One-to-One Client Certificate Mappings) or Windows
Authentication (see Application Settings).
Internet The Server Message Block (SMB) feature offers essentially the same functionality
Storage Name with more features. See Server Message Block Overview for background
Service (iSNS) information on this feature.
RSA/AES This encryption method is being considered for replacement because the
Encryption for superior Cryptography API: Next Generation (CNG) method is already available.
IIS To learn more about CNG encryption, see About CNG.
Windows This early version of Windows PowerShell has been superseded by several more
PowerShell 2.0 recent versions. For the best features and performance, migrate to Windows
PowerShell 5.0 or later. See PowerShell Documentation for plenty of information.
IPv4/6 6to4 has been disabled by default since Windows 10, version 1607 (the
Transition Anniversary Update), ISATAP has been disabled by default since Windows 10,
Technologies version 1703 (the Creators Update), and Direct Tunnels has always been disabled
(6to4, ISATAP, by default. Use native IPv6 support instead.
and Direct
Tunnels)
MultiPoint We're no longer developing the MultiPoint Services role as part of Windows
Services Server. MultiPoint Connector services are available through Feature on Demand
for both Windows Server and Windows 10. You can use Remote Desktop
Services, in particular the Remote Desktop Services Session Host, to provide RDP
connectivity.
Offline symbol We're no longer making the symbol packages available as a downloadable MSI.
packages Instead, the Microsoft Symbol Server is moving to be an Azure-based symbol
(Debug store. If you need the Windows symbols, connect to the Microsoft Symbol Server
symbol MSIs) to cache your symbols locally or use a manifest file with SymChk.exe on a
computer with internet access.
Software Instead of using the Software Restriction Policies through Group Policy, you can
Restriction use AppLocker or Windows Defender Application Control. You can use
Policies in AppLocker and Windows Defender Application Control to manage which apps
Group Policy users can access and what code can run in the kernel.
Storage Deploy Storage Spaces Direct instead. Storage Spaces Direct supports the use of
Spaces in a HLK-certified SAS enclosures, but in a non-shared configuration, as described in
Shared the Storage Spaces Direct hardware requirements.
configuration
using a SAS
fabric
Feature Explanation
Windows We're no longer developing the Essentials Experience role for the Windows
Server Server Standard or Windows Server Datacenter SKUs. If you need an easy-to-use
Essentials server solution for small-to-medium businesses, check out our new Microsoft
Experience 365 for business solution, or use Windows Server 2016 Essentials.
Features Removed or Deprecated in
Windows Server 2016
Article • 12/23/2021
Each release of Windows Server adds new features and functionality; we also
occasionally remove features and functionality, usually because we've added a better
option. Here are the details about the features and functionalities that we removed in
Windows Server 2016.
Tip
You can get early access to Windows Server builds by joining the Windows
Insider Program for Business - this is a great way to test feature changes.
The list is subject to change and might not include every affected feature or
functionality.
7 Note
If you are moving to Windows Server 2016 from a server release prior to Windows
Server 2012 R2 or Windows Server 2012, you should also review Features Removed
or Deprecated in Windows Server 2012 R2 and Features Removed or Deprecated
in Windows Server 2012.
Feature Explanation
Share and If the computer you want to manage is running an operating system older than
Storage Windows Server 2016, connect to it with Remote Desktop and use the local
Management version of the Share and Storage Management snap-in. On a computer running
snap-in for Windows 8.1 or earlier, use the Share and Storage Management snap-in from
Microsoft RSAT to view the computer you want to manage. Use Hyper-V on a client
Management computer to run a virtual machine running Windows 7, Windows 8, or Windows
Console 8.1 that has the Share and Storage Management snap-in in RSAT.
Feature Explanation
Journal.dll The file Journal.dll is removed from Windows Server 2016. There is no
replacement.
Security The Security Configuration Wizard is removed. Instead, features are secured by
Configuration default. If you need to control specific security settings, you can use either Group
Wizard Policy or Microsoft Security Compliance Manager.
SQM The opt-in components that manage participation in the Customer Experience
Improvement Program have been removed.
Windows The wuauclt.exe /detectnow command has been removed and is no longer
Update supported. To trigger a scan for updates, run these PowerShell commands:
$AutoUpdates.DetectNow()
Feature Explanation
NetCfg Installation of PrintProvider, NetClient, and ISDN using NetCfg custom APIs is
custom APIs deprecated.
SMB 2+ over SMB 2+ over NetBT is deprecated. Instead, implement SMB over TCP or RDMA.
NetBT
Windows Server release information
Article • 12/23/2021
Windows Server is moving to the Long-Term Servicing Channel (LTSC) as our primary
release channel. The Windows Server Semi-Annual Channel (SAC) was retired on August
9, 2022. There will be no future SAC releases of Windows Server.
The focus on container and microservice innovation previously released in the Semi-
Annual Channel will now continue with Azure Kubernetes Service (AKS), AKS on Azure
Stack HCI, and other platform improvements made in collaboration with the Kubernetes
community. A major new version of Windows Server will continue to be released every
2-3 years, so you can expect both container host and container images to align with that
cadence.
7 Note
Windows Server is governed by either the Modern Lifecycle Policy or the Fixed
Lifecycle Policy, depending on the version or edition. See the Windows Lifecycle
FAQ and Comparison of servicing channels for details regarding servicing
requirements and other important information. To learn more about which
Windows Server versions apply to the Modern Lifecycle Policy, see Windows Server
Releases.
Extended Security Updates for Windows
Server overview
Article • 08/04/2023
The Extended Security Update (ESU) program is a last resort option for customers who
need to run certain legacy Microsoft products past the end of support. Windows Server
Long Term Servicing Channel (LTSC) has a minimum of 10 years of support: five years for
mainstream support and five years for extended support, which includes regular security
updates.
However, once products reach the end of support, it also means the end of security
updates and bulletins. This scenario can cause security or compliance issues and put
business applications at risk. Microsoft recommends that you upgrade to the current
version of Windows Server for the most advanced security, performance, and
innovation.
Tip
The following versions of Windows Server have reached or are in the process of
reaching the end of extended support:
Extended support for Windows Server 2008 and Windows Server 2008 R2 ended
on January 14, 2020.
Extended support for Windows Server 2012 and Windows Server 2012 R2 will be
ending on October 10, 2023.
If you haven't already upgraded your servers, you can do the following things to protect
your applications and data during the transition:
Migrate the affected existing Windows Server workloads as-is to Azure Virtual
Machines (VM). Migrating to Azure automatically provides Extended Security
Updates for the defined period. There's no extra charge for Extended Security
Updates on top of an Azure VM's cost, and you don't need to do any other
configuration.
Purchase an Extended Security Update subscription for your servers and remain
protected until you're ready to upgrade to a newer Windows Server version. When
you have an Extended Security Update subscription, Microsoft provides updates
for the defined period. Once you purchase a subscription, you must get a product
key and install it on each applicable server. For more information, see How to get
Extended Security Updates.
When you get the Extended Security Updates depends on which version of Windows
Server you're using and where it's hosted. The following table lists the Extended Security
Update duration for each version of Windows Server.
Windows Server 2008 Not in Azure Three years January 10, 2023
Windows Server 2008 R2
Windows Server 2012 Not in Azure Three years October 13, 2026
Windows Server 2012 R2
* Includes the Azure Stack portfolio of products that extend Azure services and
capabilities to your environment of choice.
2 Warning
After the period of Extended Security Updates ends, we'll stop providing updates.
We recommend you update your version of Windows Server to a more recent
version as soon as possible.
Migrate to Azure
You can migrate your on-premises servers that run a version of Windows Server that has
reached or is almost reaching the end of extended support to Azure, where you can
continue to run them as virtual machines. When you migrate to Azure, you not only stay
compliant with security updates, but also add cloud innovation to your work. The
benefits of migrating to Azure include:
To get started migrating, learn how to upload a generalized VHD and use it to create
new VMs in Azure, or use Shared Image Galleries in Azure.
You can also read the Migration Guide for Windows Server for help with the following
things:
Upgrade on-premises
If you need to keep your servers on-premises instead of migrating to Azure and the
cloud, you have two choices for how to proceed:
Build new servers with a supported version of Windows Server and migrate your
applications and data.
Upgrade in-place to a supported version of Windows Server.
In-place upgrades can typically upgrade Windows Server through at least one version,
sometimes even two versions. For example, Windows Server 2012 R2 can upgrade in-
place to Windows Server 2019. However, if you're running Windows Server 2008 or
Windows Server 2008 R2, there's no direct upgrade path to Windows Server 2016 or
later. Instead, you must first upgrade to Windows Server 2012 R2, then upgrade to
Windows Server 2016 or Windows Server 2019.
As you upgrade, you can also migrate to Azure at any time. For more information about
your on-premises upgrade options, see supported upgrade paths for Windows Server.
Next steps
Learn how to get Extended Security Updates (ESU) for Windows Server.
Overview of Windows Server upgrades
Article • 07/11/2022
The process of upgrading to a newer version of Windows Server can vary greatly,
depending on which
operating system you are starting with and the pathway you take.
We use the following terms to
distinguish between different actions, any of which could
be involved in a new Windows Server
deployment.
Upgrade. Also known as an "in-place upgrade". You move from an older version of
the operating
system to a newer version, while staying on the same physical
hardware. This is the method we
will be covering in this section.
) Important
Installation. Also known as a "clean installation". You move from an older version
of the
operating system to a newer version, deleting the older operating system.
Migration. You move from an older version of the operating system to a newer
version of the
operating system, by transferring to a different set of hardware or
virtual machine.
Cluster OS Rolling Upgrade. You upgrade the operating system of your cluster
nodes without
stopping the Hyper-V or the Scale-Out File Server workloads. This
feature allows you to avoid
downtime which could impact Service Level
Agreements. For more information, see
Cluster OS Rolling Upgrade
Tip
In this table you can see the supported upgrade paths, based on the version you're
currently on.
Windows - - - - - Yes
Server 2019
You can also upgrade from an evaluation version of the operating system to a retail
version, from an
older retail version to a newer version, or, in some cases, from a
volume-licensed edition of the
operating system to an ordinary retail edition. For more
information about upgrade options other
than in-place upgrade, see
Upgrade and
conversion options for Windows Server.
7 Note
Support for Windows Server 2008 and
Windows Server 2008 R2 has ended. We
recommend you
update your version of Windows Server to a more recent version
as soon as possible. Learn more
about Extended Security Updates (ESU) as a last
resort.
Next steps
Now that you've ready to upgrade Windows Server, here are some articles that might
help you get
started:
) Important
Extended support for Windows Server 2008 R2 and Windows Server 2008 ended in
January 2020. Extended Security Updates (ESU) are available, with one option to
migrate your on-premises servers to Azure, where you can continue to run them on
virtual machines. To find out more, see Extended Security Updates overview.
Tip
Clean install
Clean install is simplest way to install Windows Server, where you install on a blank
server or overwrite an existing operating system, but you will need to back up your data
first and plan to reinstall your applications. There are a few things to be aware of, such
as hardware requirements, so be sure to check the details for Windows Server.
In-place upgrade
In-place upgrade enables you to keep the same hardware and all the server roles you
have set up without wiping and reinstalling the operating system, by which you go from
an older operating system to a newer one, keeping your settings, server roles and
features, and data intact. For example, if your server is running Windows Server 2019,
you can upgrade it to Windows Server 2022. However, not every older operating system
has a pathway to every newer one and some roles or features don't support this or need
you to take extra steps. In-place upgrade works best in virtual machines where specific
OEM hardware drivers are not needed for a successful upgrade.
For step-by-step guidance and more information on upgrading, review the Windows
Server upgrade content and Upgrade and migrate roles and features in Windows Server.
Migration
Migration of Windows Server is when you move one role or feature at a time from a
source computer that is running Windows Server to another destination computer that
is running Windows Server, either the same or a newer version. For these purposes,
migration is defined as moving one role or feature and its data to a different computer,
not upgrading the feature on the same computer.
License conversion
License conversion enables you to convert a particular edition of the release to another
edition of the same release in a single step with a simple command and the appropriate
license key for some Windows Server releases. For example, if your server is running
Windows Server 2022 Standard, you can convert it to Windows Server 2022 Datacenter.
Keep in mind that while you can move up from Windows Server 2022 Standard to
Windows Server 2022 Datacenter, you are unable to reverse the process and go from
Datacenter edition to Standard edition. In some releases of Windows Server, you can
also freely convert between OEM, volume-licensed, and retail versions with the same
command and the appropriate key.
Server Core vs Server with Desktop
Experience install options
Article • 11/26/2021
When you install Windows Server using the setup wizard, you can choose between
Server Core or Server with Desktop Experience install options. With Server Core, the
standard graphical user interface (the Desktop Experience) is not installed; you manage
the server from the command line using PowerShell, the Server Configuration tool
(SConfig), or by remote methods. Server with Desktop Experience installs the standard
graphical user interface and all tools, including client experience features.
We recommend that you choose the Server Core install option unless you have a
particular need for the extra user interface elements and graphical management tools
that are included in the Server with Desktop Experience install option.
The setup wizard lists the install options below. In this list, editions without Desktop
Experience are the Server Core install options:
7 Note
Unlike some previous releases of Windows Server, you cannot convert between
Server Core and Server with Desktop Experience after installation. You will need to
do a clean installation if you install later decide to use a different option.
Differences
There are some key differences between Server Core and Server with Desktop
Experience:
Roles and Some roles and features are not All roles and features are available,
Features available. For more information, see including those for application
Roles, Role Services, and Features not compatibility.
in Windows Server - Server Core.
Remote Yes, can be managed remotely using Yes, can be managed remotely using
management GUI tools, such as Windows Admin GUI tools, such as Windows Admin
Center, Remote Server Administration Center, Remote Server Administration
Tools (RSAT), or Server Manager, or by Tools (RSAT), or Server Manager, or by
PowerShell. PowerShell.
7 Note
For RSAT, you must use the version included with Windows 10 or later.
Upgrade and migrate roles and features
in Windows Server
Article • 12/23/2021
You can update roles and features to later versions of Windows Server by migrating to a
new server, or many also support in-place upgrade where you install the new version of
Windows Server over the top of the current one. This article contains links to migration
guides as well a table with migration and in-place upgrade information to help you
decide which method to use.
You can migrate many roles and features by using Windows Server Migration Tools, a
feature built in to Windows Server for migrating roles and features, whereas file servers
and storage can be migrated using Storage Migration Service.
The migration guides support migrations of specified roles and features from one server
to another (not in-place upgrades). Unless otherwise noted in the guides, migrations are
supported between physical and virtual computers, and between installation options of
Windows Server with either Server with Desktop Experience or Server Core.
) Important
Before you begin migrating roles and features, verify that both source and
destination servers are running the most current updates that are available for their
operating systems.
Whenever you migrate or upgrade to any version of Windows Server, you should
review and understand the support lifecycle policy and time frame for that
version and plan accordingly. You can search for the lifecycle information for the
particular Windows Server release that you are interested in.
7 Note
Cross-subnet migrations using Windows Server Migration Tools is available with
Windows Server 2012 and later releases. Previous versions of Windows Server
Migration Tools only support migrations in the same subnet.
Migration guides
Below you can find links to migration guides for specific Windows Roles and Features.
Active Directory
Active Directory Certificate Services Migration Guide for Windows Server 2012 R2
Active Directory Certificate Services Migration Guide for Windows Server 2008 R2
Migrate Active Directory Federation Services Role Service to Windows Server 2012
R2
Migrate Active Directory Federation Services Role Services to Windows Server 2012
Active Directory Rights Management Services Migration and Upgrade Guide
Upgrade Domain Controllers to Windows Server 2012 R2 and Windows Server
2012
Active Directory Domain Services and Domain Name System (DNS) Server
Migration Guide for Windows Server 2008 R2
BranchCache
BranchCache Migration Guide
DHCP
Migrate DHCP Server to Windows Server 2012 R2
Dynamic Host Configuration Protocol (DHCP) Server Migration Guide for Windows
Server 2008 R2
Failover Clustering
Migrate Cluster Roles to Windows Server 2012 R2
Migrate Clustered Services and Applications to Windows Server 2012
Hyper-V
Migrate Hyper-V to Windows Server 2012 R2 from Windows Server 2012
Migrate Hyper-V to Windows Server 2012 from Windows Server 2008 R2
Remote Access
Migrate Remote Access to Windows Server 2012
Failover Yes with Cluster OS Rolling Upgrade Yes Yes for Failover Clusters
Clustering process (Windows Server 2012 R2 with Hyper-V VMs or
and later) or when the server is Failover Clusters running
removed by the cluster for upgrade the Scale-out File Server
and then added to a different cluster. role. See Cluster OS
Rolling Upgrade
(Windows Server 2012 R2
and later).
Server Role Upgradeable in-place? Migration Can migration be
Supported? completed without
downtime?
Hyper-V Yes with Cluster OS Rolling Upgrade Yes Yes for Failover Clusters
process (Windows Server 2012 R2 with Hyper-V VMs or
and later) Failover Clusters running
the Scale-out File Server
role. See Cluster OS
Rolling Upgrade
(Windows Server 2012 R2
and later).
You can upgrade or convert installations of Windows Server to newer versions, different
editions, or switch between licensing options, such as evaluation, retail, and volume
licensed. This article helps explain what the options are to help with your planning.
Upgrades from 32-bit to 64-bit architectures are not supported. All releases of
Windows Server since Windows Server 2008 R2 are 64-bit only.
Upgrades from one language to another are not supported.
If the server is an Active Directory domain controller, you cannot convert it to a
retail version. See Upgrade Domain Controllers to Windows Server 2012 R2 and
Windows Server 2012 for important information.
Upgrades from pre-release versions (previews) of Windows Server are not
supported. Perform a clean installation of Windows Server.
Upgrades that switch from a Server Core installation to a Server with Desktop
Experience installation (or vice versa) are not supported.
Upgrades from a previous Windows Server installation to an evaluation copy of
Windows Server are not supported. Evaluation versions should be installed as a
clean installation.
You can only change from Standard edition to Datacenter edition when upgrading.
Changing from Datacenter edition to Standard edition is not supported.
) Important
If your server uses NIC Teaming, disable NIC Teaming prior to upgrade, and then
re-enable it after upgrade is complete. See NIC Teaming Overview for details.
If you haven't already activated Windows, the bottom right-hand corner of the desktop
shows the time remaining in the evaluation period.
) Important
7 Note
Before you attempt to convert from evaluation to retail, verify that your server is
actually running an evaluation version. To do this, launch an elevated command
prompt and run the command slmgr.vbs /dlv ; evaluation versions will include
EVAL in the output.
2. Determine the current edition name by running the command below. The output is
an abbreviated form of the edition name, for example Windows Server Datacenter
edition is ServerDatacenter:
3. Verify which editions the current installation can be converted to by running the
command below. The evaluation version of Windows Server Standard can be
converted to the retail version of either the Standard or Datacenter editions of
Windows Server, whereas the evaluation version of Windows Server Datacenter can
only be converted to the retail version Windows Server Datacenter:
4. Make note of the target edition name you want to convert to, and enter this and
your retail product key in the command below. This process requires you to accept
the Microsoft Software License Terms for Windows Server you saved previously.
Tip
You can convert from the evaluation version of Windows Server Standard to
the retail version of Windows Server Datacenter in one step by using the
appropriate product key and edition ID.
For example:
DISM /online /Set-Edition:ServerDatacenter /ProductKey:ABCDE-12345-
ABCDE-12345-ABCDE /AcceptEula
Tip
) Important
You can convert the Standard edition of Windows Server to the Datacenter edition as
follows:
1. Determine that Windows Server Standard is the current edition name by running
the command below. The output is an abbreviated form of the edition name, for
example Windows Server Standard edition is ServerStandard:
3. Enter ServerDatacenter and your retail product key in the command below:
To do this, run the following command from an elevated command prompt, including
providing your volume-license, retail, or OEM product key:
AVMA lets you activate Windows Server virtual machines (VMs) on Windows Server
Hyper-V host that is properly activated, even in disconnected environments. AVMA
binds the virtual machine activation to the licensed virtualization host and activates the
virtual machine when it starts up. You can get real-time reporting on usage and
historical data on the license state of the virtual machine when using AVMA. Reporting
and tracking data is available on the virtualization host.
Practical applications
On virtualization hosts, AVMA offers several benefits.
Service Provider License Agreement (SPLA) partners and other hosting providers do not
have to share product keys with tenants or access a tenant's virtual machine to activate
it. Virtual machine activation is transparent to the tenant when AVMA is used. Hosting
providers can use the server logs to verify license compliance and to track client usage
history.
System requirements
The virtualization host that will run virtual machines needs to be activated. Keys can be
obtained through the Volume Licensing Service Center or your OEM provider.
7 Note
In a failover cluster, each virtualization host in the cluster must be activated for VMs
to stay activated regardless of which server they run on.
AVMA requires Windows Server Datacenter edition with the Hyper-V host role installed.
The operating system version of the Hyper-V host determines which versions of
operating system can be activated in a virtual machine. Here are the guests that the
different version hosts can activate:
Server host Windows Server Windows Server Windows Server Windows Server
version 2022 guest VM 2019 guest VM 2016 guest VM 2012 R2 guest VM
Windows X X X X
Server 2022
Windows X X X
Server 2019
Windows X X
Server 2016
Windows X
Server 2012
R2
7 Note
1. On the server that will host virtual machines, install and configure the Microsoft
Hyper-V Server role. For more information, see Install Hyper-V Server. Ensure that
the server is successfully activated.
2. Create a virtual machine and install a supported Windows Server operating system
on it.
) Important
3. Once Windows Server is installed on the VM, you install the AVMA key in the VM.
From PowerShell or an elevated Command Prompt, run the following command:
The virtual machine will automatically activate, providing the virtualization host itself is
activated.
Tip
You can also add the AVMA keys in any Unattend setup file.
AVMA keys
The following AVMA keys can be used for Windows Server 2022:
Datacenter W3GNR-8DDXR-2TFRP-H8P33-DV9BG
Datacenter
F7TB6-YKN8Y-FCC6R-KQ484-VMK3J
Azure Edition
Standard YDFWN-MJ9JR-3DYRK-FXXRW-78VHK
The following AVMA keys can be used for Windows Server 2019:
Datacenter H3RNG-8C32Q-Q8FRX-6TDXV-WMBMW
Standard TNK62-RXVTB-4P47B-2D623-4GF74
Essentials 2CTP7-NHT64-BP62M-FV6GG-HFV28
The following AVMA keys can be used for Windows Server, versions 1909, 1903, and
1809:
Datacenter H3RNG-8C32Q-Q8FRX-6TDXV-WMBMW
Standard TNK62-RXVTB-4P47B-2D623-4GF74
The following AVMA keys can be used for Windows Server, version 1803 and 1709:
Datacenter TMJ3Y-NTRTM-FJYXT-T22BY-CWG3J
Standard C3RCX-M6NRP-6CXC9-TW2F2-4RHYD
The following AVMA keys can be used for Windows Server 2016:
Datacenter TMJ3Y-NTRTM-FJYXT-T22BY-CWG3J
Standard C3RCX-M6NRP-6CXC9-TW2F2-4RHYD
Essentials B4YNW-62DX9-W8V6M-82649-MHBKQ
The following AVMA keys can be used for Windows Server 2012 R2:
Datacenter Y4TGP-NPTV9-HTC2H-7MGQ3-DV4TW
Standard DBGBW-NPF86-BJVTX-K3WKJ-MTB6V
Essentials K2XGM-NMBT3-2R6Q8-WF2FK-P36R2
7 Note
KVP data is not secured. It can be modified and is not monitored for changes.
) Important
KVP data should be removed if the AVMA key is replaced with another product key
(retail, OEM, or volume licensing key).
Since the AVMA activation process is transparent, error messages are not displayed.
However, AVMA requests are also logged on the virtualization host in Event Viewer in
the Application log with Event ID 12310, and on the virtual machine with Event ID 12309.
The following events are captured on the virtual machines:
Notification Description
Invalid Host The virtualization host is unresponsive. This can happen when the server is not
running a supported version of Windows.
Invalid Data This usually results from a failure in communication between the virtualization
host and the virtual machine, often caused by corruption, encryption, or data
mismatch.
Activation The virtualization host could not activate the guest operating system because the
Denied AVMA ID did not match.
Key Management Services (KMS)
activation planning
Article • 12/23/2021
The following information outlines initial planning considerations that you need to
review for Key Management Services (KMS) activation.
KMS uses a client-server model to active clients and is used for volume activation. KMS
clients connect to a KMS server, called the KMS host, for activation. The KMS host must
reside on your local network.
KMS hosts do not need to be dedicated servers, and KMS can be cohosted with other
services. You can run a KMS host on any physical or virtual system that is running a
supported Windows Server or Windows client operating system. A KMS host running on
a Windows Server operating system can activate computers running both server and
client operating systems, however a KMS host running on a Windows client operating
system can only activate computers also running client operating systems.
To use KMS, a KMS host needs a key that activates, or authenticates, the KMS host with
Microsoft. This key is sometimes referred to as the KMS host key, but it is formally
known as a Microsoft Customer Specific Volume License Key (CSVLK). You can get this
key from the Product Keys section of the Volume Licensing Service Center for the
following agreements: Open, Open Value, Select, Enterprise, and Services Provider
License. You can also get assistance by contacting your local Microsoft Activation
Center .
Operational requirements
KMS can activate physical and virtual computers, but to qualify for KMS activation, a
network must have a minimum number of computers (called the activation threshold).
KMS clients activate only after this threshold is met. To ensure that the activation
threshold is met, a KMS host counts the number of computers that are requesting
activation on the network.
KMS hosts count the most recent connections. When a client or server contacts the KMS
host, the host adds the machine ID to its count and then returns the current count value
in its response. The client or server will activate if the count is high enough. Clients will
activate if the count is 25 or higher. Servers and volume editions of Microsoft Office
products will activate if the count is five or greater. The KMS only counts unique
connections from the past 30 days, and only stores the 50 most recent contacts.
KMS activations are valid for 180 days, a period known as the activation validity interval.
KMS clients must renew their activation by connecting to the KMS host at least once
every 180 days to stay activated. By default, KMS client computers attempt to renew
their activation every seven days. After a client's activation is renewed, the activation
validity interval begins again.
A single KMS host can support an unlimited number of KMS clients. If you have more
than 50 clients, we recommend that you have at least two KMS hosts in case one of your
KMS hosts becomes unavailable. Most organizations can operate with as few as two
KMS hosts for their entire infrastructure.
After the first KMS host is activated, the CSVLK that is used on the first host can be used
to activate up to five more KMS hosts on your network for a total of six. After a KMS
host is activated, administrators can reactivate the same host up to nine times with the
same key.
If your organization needs more than six KMS hosts, you can request additional
activations for your organization's CSVLK - for example, if you have 10 physical locations
under one volume licensing agreement and you want each location to have a local KMS
host. To request this exception, please contact your local Microsoft Activation Center .
Computers that are running volume licensing editions of Windows Server and Windows
client are, by default, KMS clients with no extra configuration needed.
If you are converting a computer from a KMS host, MAK, or retail edition of Windows to
a KMS client, you will need to install the applicable KMS client setup key. For more
information, see KMS client setup keys.
Network requirements
KMS activation requires TCP/IP connectivity. KMS hosts and clients are configured by
default to use Domain Name System (DNS). KMS hosts use DNS dynamic updates to
automatically publish the information that KMS clients need to find and connect to
them. You can accept these default settings, or if you have special network and security
configuration requirements, you can manually configure KMS hosts and clients.
Activation versions
The following table summarizes KMS host and client versions for networks that include
Windows Server and Windows client devices.
) Important
CSVLK group CSVLK can be Windows editions activated by this KMS host
hosted on
7 Note
The updates listed below are the minimum required. Where later cumulative
updates or monthly rollups are listed as an option, please install the latest available
version for your operating system to benefit from additional security and other
fixes.
Windows Windows July 2016 update rollup for Windows 8.1 and Windows
Server 2012 Server 2016 Server 2012 R2 or later monthly rollup
R2 Windows 10
Windows Windows July 2016 update rollup for Windows Server 2012 or
Server 2012 Server 2016 later monthly rollup
Windows
Server 2012 R2
Windows 10
Windows 8.1 Windows 10 July 2016 update rollup for Windows 8.1 and Windows
Server 2012 R2 or later monthly rollup
The Server Core App Compatibility Feature on Demand (FOD) is an optional feature
package that can be added to Server Core installations of Windows Server installations
at any time, beginning with Windows Server 2019.
The two primary values the App Compatibility FOD provides are:
Increases the compatibility of Server Core for server applications already in market
or deployed.
Assists with providing OS components and increased app compatibility of software
tools used in acute troubleshooting and debugging scenarios.
Operating system components that are available as part of the Server Core App
Compatibility FOD include:
7 Note
PowerShell
Beginning with Windows Server 2022, the following components are also available
(when using the same version of the App Compatibility FOD):
) Important
The App Compatibility FOD can only be installed on Server Core. Don't
attempt to add the Server Core App Compatibility FOD to the Server with
Desktop Experience installation option.
For servers running Windows Server 2022, ensure you have installed the
2022-01 Cumulative Update Preview for Microsoft server operating system
version 21H2 for x64-based Systems (KB5009608) or later cumulative
update before you install the App Compatibility FOD. You can verify this by
checking that the operating system build number is 20348.502 or greater.
Prior to this, if you tried to connect to the server using Remote Desktop
Protocol (RDP), you could be presented with a black screen and disconnected.
PowerShell
If you have a volume license, you can download the Windows Server
Languages and Optional Features ISO image file from the same portal where
the operating system ISO image file is obtained: Volume Licensing Service
Center .
The Windows Server Languages and Optional Features ISO image file is also
available on the Microsoft Evaluation Center or on the Visual Studio
portal for subscribers.
7 Note
The Languages and Optional Features ISO image file is new for Windows
Server 2022. Previous versions of Windows Server use the Features on
Demand (FOD) ISO.
PowerShell
$credential = Get-Credential
2. Copy the FOD ISO to a local folder of your choosing (the copy operation may take
some time). Edit the following variables with your folder location and ISO filename,
and run the following commands, for example:
PowerShell
$isoFolder = "C:\SetupFiles\WindowsServer\ISOs"
$fodIsoFilename = "FOD_ISO_filename.iso"
PowerShell
4. Run the following command to get the drive letter that the FOD ISO has been
mounted to:
PowerShell
PowerShell
PowerShell
Add-WindowsCapability -Online -Name
ServerCore.AppCompatibility~~~~0.0.1.0 -Source ${fodDriveLetter}:\ -
LimitAccess
7 Note
The Server Core App Compatibility FOD is required for the addition of Internet
Explorer 11, but Internet Explorer 11 is not required to add the Server Core App
Compatibility FOD.
7 Note
Starting with Windows Server 2022, although Internet Explorer 11 can be added to
Server Core installations of Windows Server, Microsoft Edge should be used
instead. Microsoft Edge has Internet Explorer mode ("IE mode") built in, so you can
access legacy Internet Explorer-based websites and applications straight from
Microsoft Edge. Please see here for information on the lifecycle policy for Internet
Explorer.
1. Sign in as Administrator on the Server Core computer that already has the App
Compatibility FOD added and the FOD optional package ISO copied locally.
2. Mount the FOD ISO by using the following command. This step assumes that
you've already copied the FOD ISO locally. If not, complete steps 1 and 2 from
Mount the FOD ISO. The commands follow on from these two steps. Edit the
variables with your folder location and ISO filename, and run the following
commands, for example:
PowerShell
$isoFolder = "C:\SetupFiles\WindowsServer\ISOs"
$fodIsoFilename = "FOD_ISO_filename.iso"
3. Run the following command to get the drive letter that the FOD ISO has been
mounted to:
PowerShell
4. Run the following commands (depending on your operating system version), using
the $packagePath variable as the path to the Internet Explorer .cab file:
PowerShell
$packagePath =
"${fodDriveLetter}:\LanguagesAndOptionalFeatures\Microsoft-Windows-
InternetExplorer-Optional-Package~31bf3856ad364e35~amd64~~.cab"
PowerShell
$packagePath = "${fodDriveLetter}:\Microsoft-Windows-InternetExplorer-
Optional-Package~31bf3856ad364e35~amd64~~.cab"
) Important
Packages installed using FoD won't remain in place after an in-place upgrade
to a newer Windows Server version. You will have to install them again after
the upgrade.
Alternatively, you can add FoD packages to your upgrade media. Adding
packages to your upgrade media ensures that the new version of any FoD
package are present after the upgrade completes. For more info, see the
Adding capabilities and optional packages to an offline WIM Server Core
image section.
After installation of the App Compatibility FOD and reboot of the server, the
command console window frame color will change to a different shade of blue.
If you choose to also install the Internet Explorer 11 optional package, double-
clicking to open locally saved .htm files isn't supported. However, you can right-
click and choose Open with Internet Explorer, or you can open it directly from
Internet Explorer File -> Open.
To further enhance the app compatibility of Server Core with the App Compatibility
FOD, the IIS Management Console has been added to Server Core as an optional
component. However, it's necessary to first add the App Compatibility FOD to use
the IIS Management Console. IIS Management Console relies on the Microsoft
Management Console (mmc.exe), which is only available on Server Core with the
addition of the App Compatibility FOD. Use the PowerShell cmdlet Install-
WindowsFeature to add IIS Management Console:
PowerShell
If you have a volume license, you can download the Windows Server
Languages and Optional Features ISO image file from the same portal where
the operating system ISO image file is obtained: Volume Licensing Service
Center .
The Windows Server Languages and Optional Features ISO image file is also
available on the Microsoft Evaluation Center or on the Visual Studio
portal for subscribers.
7 Note
The Languages and Optional Features ISO image file is new for Windows
Server 2022. Previous versions of Windows Server use the Features on
Demand (FOD) ISO.
2. Mount both the Languages and Optional Features ISO and the Windows Server
ISO by running the following commands in an elevated PowerShell session. Edit
the variables with your folder location and ISO filename, and run the following
commands, for example::
PowerShell
$isoFolder = "C:\SetupFiles\WindowsServer\ISOs"
$fodIsoFilename = "FOD_ISO_filename.iso"
$wsIsoFilename = "Windows_Server_ISO_filename.iso"
3. Run the following command to get the drive letters that the FOD ISO and
Windows Server ISO have been mounted to:
PowerShell
4. Copy the contents of the Windows Server ISO file to a local folder, for example,
C:\SetupFiles\WindowsServer\Files. The copy operation may take some time:
PowerShell
$wsFiles = "C:\SetupFiles\WindowsServer\Files"
5. Get the image name you want to modify within the install.wim file by using the
following command. Add your path to the install.wim file to the $installWimPath
variable, located inside the sources folder of the Windows Server ISO file. Note the
names of the images available in this install.wim file from the output.
PowerShell
$installWimPath =
"C:\SetupFiles\WindowsServer\Files\sources\install.wim"
6. Mount the install.wim file in a new folder by using the following command
replacing the sample variable values with your own, and reusing the
$installWimPath variable from the previous command.
$wimImageName - Enter the name of the image you want to mount from the
output of the previous command. The example here uses Windows Server
2022 Datacenter.
$wimMountFolder - Specify an empty folder to use when accessing the
contents of the install.wim file.
PowerShell
$wimMountFolder = "C:\SetupFiles\WindowsServer\WIM"
7. Add the capabilities and packages you want to the mounted install.wim image by
using the following commands (depending on the version), replacing the sample
variable values with your own.
$capabilityName - Specify the name of the capability to install (in this case,
the AppCompatibility capability).
$packagePath - Specify the path to the package to install (in this case, to the
Internet Explorer cab file).
PowerShell
$capabilityName = "ServerCore.AppCompatibility~~~~0.0.1.0"
$packagePath =
"${fodDriveLetter}:\LanguagesAndOptionalFeatures\Microsoft-Windows-
InternetExplorer-Optional-Package~31bf3856ad364e35~amd64~~.cab"
PowerShell
$capabilityName = "ServerCore.AppCompatibility~~~~0.0.1.0"
$packagePath = "${fodDriveLetter}:\Microsoft-Windows-InternetExplorer-
Optional-Package~31bf3856ad364e35~amd64~~.cab"
8. Dismount and commit changes to the install.wim file by using the following
command, which uses the $wimMountFolder variable from previous commands:
PowerShell
You can now upgrade your server by running setup.exe from the folder you created for
the Windows Server installation files, in this example:
C:\SetupFiles\WindowsServer\Files. This folder now contains the Windows Server
installation files with the extra capabilities and optional packages included.
Windows Server 2022 and Microsoft
server applications compatibility
Article • 02/08/2023
This table lists Microsoft server applications that support installation and functionality
on Window Server 2022. This information is for quick reference and isn't intended to
replace the individual product specifications, requirements, announcements, or general
communications of each individual server application. Refer to official documentation
for each product to fully understand compatibility and options.
Tip
If you are a software vendor partner looking for more information on Windows
Server compatibility with non-Microsoft applications, visit the Commercial App
Certification portal .
* May have limitations or may require the Server Core App Compatibility Feature on
Demand (FOD).
For more information, see specific product or Feature on Demand
documentation.
This table lists Microsoft server applications that support installation and functionality
on Window Server 2019. This information is for quick reference and is not intended to
replace the individual product specifications, requirements, announcements, or general
communications of each individual server application. Refer to official documentation
for each product to fully understand compatibility and options.
Tip
If you are a software vendor partner looking for more information on Windows
Server compatibility with non-Microsoft applications, visit the Commercial App
Certification portal .
*May have limitations or may require the Server Core App Compatibility Feature on
Demand (FOD).
Please refer to specific product or FOD documentation.
Windows Server 2016 and Microsoft
server applications compatibility
Article • 12/23/2021
This table lists Microsoft server applications that support installation and functionality
on Window Server 2016. This information is for quick reference and is not intended to
replace the individual product specifications, requirements, announcements, or general
communications of each individual server application. Refer to official documentation
for each product to fully understand compatibility and options.
Tip
If you are a software vendor partner looking for more information on Windows
Server compatibility with non-Microsoft applications, visit the Commercial App
Certification portal .
Project Server 2016 Yes Software requirements for Project Server 2016
Project Server 2019 Yes Software requirements for Project Server 2019
Skype for Business Server 2015 Yes How to install Skype for Business Server 2015 on
Windows Server 2016
Azure Hybrid Benefit is a cost-saving benefit that enables you to use your on-premises
licenses with Software Assurance (SA) or subscription licenses to get Windows virtual
machines on Azure at a reduced cost. This article focuses on benefits for Windows
Server licenses with SA or subscription: cost savings for Windows Server virtual machines
(VMs) in Azure, Azure Stack HCI, and Azure Kubernetes Service (AKS) hybrid deployment
options.
For other Azure hybrid benefits (for example, SQL Server), see Azure Hybrid Benefit .
) Important
Workloads using Azure Hybrid Benefit can run only during the Software Assurance
or subscription license term. When the Software Assurance or subscription license
term approaches expiration, you must either renew your agreement with either
Software Assurance or a subscription license, disable the hybrid benefit
functionality, or de-provision those workloads that are using Azure Hybrid Benefit.
Azure Stack HCI: The Azure Stack HCI host fee and Windows Server subscription
fee are waived with Azure Hybrid Benefit. That is, unlimited virtualization rights are
provided at no extra cost. You still pay other costs associated with Azure Stack HCI
(for example, customer-managed hardware, Azure services, and workloads).
AKS: Run AKS on Windows Server and Azure Stack HCI at no extra cost. You'll still
pay for the underlying host infrastructure and any licenses for Windows containers
unless you're also eligible for Azure Hybrid Benefit for Azure Stack HCI. With Azure
Hybrid Benefit for Azure Stack HCI, you can waive fees for the Azure Stack HCI host
and Windows Server subscription.
Windows VMs on Azure: Windows Virtual Machine Pricing . Use the Azure
Hybrid Benefit Savings Calculator to estimate cost savings, or compare Windows
VM pricing with and without Azure Hybrid Benefit.
Azure Stack HCI: Azure Stack HCI pricing .
Licensing prerequisites
To qualify for Azure Hybrid Benefit for Windows VMs in Azure, you must meet the
following licensing prerequisites.
Types of license
Number of licenses
You'll need a minimum of 8 core licenses (Datacenter or Standard edition) per virtual
machine. You may also run instances larger than 8 cores by allocating licenses equal to
the core-size of the instance. For example, 12 core licenses are required for a 12-core
instance, however 8 core licenses are still required if you run a 4-core instance. For
customers with processor licenses, each two core processor license is equivalent to 16
core licenses.
Use rights
Unlimited virtualization
Unlimited Virtualization Rights refers to the right to use any number of Windows Server
VMs on a host.
Windows Server Datacenter edition: You can use any number of Windows Server
VMs on an Azure dedicated host if you allocate Windows Server Datacenter
licenses with active SA or subscription for all the available physical cores on that
Azure server.
If you already have Windows Server VMs running with Azure Hybrid Benefit, perform an
inventory to see how many units you're running, and check this number against your
Software Assurance or subscription licenses. You can contact your Microsoft licensing
specialist to validate your Software Assurance licensing position.
To see and count all VMs that are deployed with Azure Hybrid Benefit in an Azure
subscription, list all VMs and virtual machine scale sets using the steps in Explore Azure
Hybrid Benefit for Windows VMs.
You can also look at your Microsoft Azure bill to determine how many VMs with Azure
Hybrid Benefit for Windows Server you are running. You'll find information about the
number of instances with the benefit under Additional Info:
JSON
"
{"ImageType":"WindowsServerBYOL","ServiceType":"Standard_A1","VMName":"","Us
ageType":"ComputeHR"}"
Billing isn't applied in real time. Expect a delay of several hours after you activate a
Windows Server VM with Azure Hybrid Benefit before the VM shows on your bill.
Perform an inventory regularly to make sure you're using any license benefits that you're
entitled to. Regular inventories can help you reduce costs and make sure that you
always have enough licenses to cover the Windows Server VMs you've deployed with
Azure Hybrid Benefit.
If you don't have enough eligible Windows Server licenses for your deployed VMs, you
have three choices:
7 Note
Microsoft reserves the right to audit customers at any time to verify eligibility for
Azure Hybrid Benefit utilization.
Getting Azure Hybrid Benefit for Azure Stack
HCI
Use the guidance in this section to get Azure Hybrid Benefit for your Azure Stack HCI
infrastructure.
Licensing prerequisites
To qualify for Azure Hybrid Benefit for Azure Stack HCI, you must meet the following
licensing prerequisites.
Types of license
Number of licenses
Each Windows Server core license entitles use on 1 physical core of Azure Stack
HCI. You'll need to allocate enough core licenses for all physical cores on servers in
the Azure Stack HCI cluster.
Unlimited virtualization
You can use any number of Windows Server VMs on the Azure Stack HCI cluster if
you allocate enough core licenses for all physical cores on servers in the Azure
Stack HCI cluster.
Use rights
Licenses must be used either on-premises or on Azure Stack HCI, but not on both.
You'll have 180 days of concurrent licensing to migrate your servers.
Licensing prerequisites
To qualify for Azure Hybrid Benefit for AKS, you must meet the following licensing
prerequisites.
Eligible hosts
Windows Server 2019 or later (Datacenter only), or
Azure Stack HCI
Types of license
Windows Server Standard with active Software Assurance or subscription.
Windows Server Datacenter with active Software Assurance or subscription.
Number of licenses
Each Windows Server core license entitles use on 1 virtual core of AKS.
Use rights
Azure Hybrid Benefit for AKS is additive. Core licenses used for Azure Hybrid
Benefit for AKS can be used at the same time with on-premises Windows Server
licensing, as well as Azure Hybrid Benefit for other workloads in this article.
How to apply Azure Hybrid Benefit for AKS
To get started with Azure Hybrid Benefit for AKS, see Azure Hybrid Benefit for AKS.
To use these benefits, your Software Assurance or subscriptions must be active. If you
choose not to renew your Software Assurance or subscription when it expires, you'll
need to remove your benefits from your resources in the Azure portal.
For information about volume licensing, see Microsoft Licensing . To learn more about
Software Assurance benefits, and how each benefit can help meet your business needs,
see Software Assurance benefits .
Fewer binaries mean update install faster and consume less disk and CPU
resources.
Lower workload impact with fewer reboots.
Better protection, as the hotpatch update packages are scoped to Windows
security updates that install faster without rebooting.
Reduces the time exposed to security risks and change windows, and easier patch
orchestration with Azure Update Manager.
Supported platforms
Hotpatch is supported on the following operating systems for VMs running on Azure
and Azure Stack HCI:
7 Note
To get started using Hotpatch, use your preferred method to create an Azure or Azure
Stack HCI VM, and select one of the following images that you would like to use.
Hotpatch is selected by default when creating an Azure VM in the Azure portal.
For more information about the available images, see the Windows Server 2022
Datacenter Azure Marketplace product.
How Hotpatch works
Hotpatch works by first establishing a baseline with the current Cumulative Update for
Windows Server. Periodically (starting every three months), the baseline is refreshed with
the latest Cumulative Update, then hotpatches are released for two months following.
For example, if January is a Cumulative Update, February and March would be a
hotpatch release. For the hotpatch release schedule, see Release notes for Hotpatch in
Azure Automanage for Windows Server 2022 .
Hotpatches contains updates that don't require a reboot. Because Hotpatch patches the
in-memory code of running processes without the need to restart the process, your
applications are unaffected by the patching process. This action is separate from any
potential performance and functionality implications of the patch itself.
There are two types of baselines: Planned baselines and Unplanned baselines.
Supported updates
Hotpatch covers Windows Security updates and maintains parity with the content of
security updates issued to in the regular (nonhotpatch) Windows update channel.
There are some important considerations to running a supported Windows Server Azure
Edition VM with hotpatch enabled. Reboots are still required to install updates that
aren't included in the hotpatch program. Reboots are also required periodically after a
new baseline has been installed. Reboots keep the VM in sync with nonsecurity patches
included in the latest cumulative update.
Patches that are currently not included in the hotpatch program include non
security updates released for Windows, .NET updates and non-Windows updates
(such as drivers, firmware update etc.). These types of patches may need a reboot
during Hotpatch months.
Azure: Virtual machines created in Azure are enabled for Automatic VM Guest
Patching by default with a supported Windows Server Datacenter: Azure Edition
image. Automatic VM guest patching in Azure:
Patches are applied during off-peak hours in the VM's time zone.
7 Note
You can't create VM scale sets (VMSS) with Uniform orchestration on Azure
Edition images with Hotpatch. To learn more about which features are
supported by Uniform orchestration for scale sets, see A comparison of
Flexible, Uniform, and availability sets.
Azure Stack HCI: Hotpatch updates for virtual machines created on Azure Stack
HCI are orchestrated using:
Group Policy to configure the Windows Update client settings.
On this screen, you see the hotpatch status for your VM. You can also review if there any
available patches for your VM that haven't been installed. As described in the ‘Patch
installation’ previous section, all security and critical updates are automatically installed
on your VM using Automatic VM Guest Patching and no extra actions are required.
Patches with other update classifications aren't automatically installed. Instead, they're
viewable in the list of available patches under the Update compliance tab. You can also
view the history of update deployments on your VM through the Update history.
Update history from the past 30 days is displayed, along with patch installation details.
Similar to on-demand assessment, you can also install patches on-demand for your VM
using the ‘Install updates now’ option. Here you can choose to install all updates under
specific patch classifications. You can also specify updates to include or exclude by
providing a list of individual knowledge base articles. Patches installed on-demand
aren't installed using availability-first principles and may require more reboots and VM
downtime for update installation.
You can also view the installed patches using the Get-HotFix PowerShell command or
using the Settings app when using the Desktop Experience.
Next steps
Automatic VM Guest Patching
Enable Hotpatch for Azure Edition virtual machines built from ISO
Azure Update Management
What is Secured-core server?
Article • 04/06/2023
Applies to: Windows Server 2022, Azure Stack HCI version 21H2 and later
Windows Server integrates closely with hardware to provide increasing levels of security:
The following table shows how each security concept and feature are used to create a
Secured-core server.
Concept Feature Requirement Recommended Secured-
baseline Core
server
Create a
hardware
backed root
of trust
Defend
against
firmware
level attacks
Protect the
OS from
execution of
unverified
code
To learn more about the boot process, see Secure the Windows boot process.
TPM 2.0 provides a secure, hardware-backed storage for sensitive keys and data. Every
component
loaded during the boot process is measured and the measurements stored
in the TPM. By verifying the
hardware root-of-trust it elevates the protection provided
by capabilities like BitLocker, which
uses TPM 2.0 and facilitates the creation of
attestation-based workflows. These attestation-based
workflows can be incorporated
into zero-trust security strategies.
Learn more about Trusted Platform Modules and how Windows uses the TPM.
Along with Secure Boot and TPM 2.0, Windows Server Secured-core uses
Boot DMA
protection on
compatible processors that have the Input/Output Memory Management
Unit (IOMMU). For example, Intel
VT-D or AMD-Vi. With boot DMA protection, systems
are protected from Direct Memory Access (DMA)
attacks during boot and during the
operating system runtime.
Beginning with Windows Server 2022, System Guard Secure Launch protects the boot
process from
firmware attacks by using hardware capabilities from AMD and Intel. With
processor support for
Dynamic Root of Trust for Measurement (DRTM) technology,
Secured-core servers put firmware in a hardware-backed sandbox helping to limit the
effects of
vulnerabilities in highly privileged firmware code. System Guard uses the
DRTM capabilities that are
built into compatible processors to launch the operating
system, ensuring the system launches into a
trusted stated using verified code.
Simplified management
You can view and configure the OS security features of Secured-core systems using
Windows PowerShell
or the security extension in Windows Admin Center. With Azure
Stack HCI Integrated Systems,
manufacturing partners have further simplified the
configuration experience for customers so that
Microsoft’s best server security is
available right out of the box.
Preventative defense
You can proactively defend against and disrupt many of the paths attackers use to
exploit systems by
enabling Secured-core functionality. Secured-core server enables
advanced security features at the
bottom layers of the technology stack, protecting the
most privileged areas of the system before
many security tools are aware of exploits. It
also occurs without the need for extra tasks or
monitoring by IT and SecOps teams.
Next steps
Now you understand what Secured-core server is, here are some resources to get you
started. Learn about how:
Microsoft brings advanced hardware security to Server and Edge with Secured-
core in the Microsoft Security Blog.
New Secured-core servers are now available from the Microsoft ecosystem to help
secure your infrastructure in the Microsoft Security Blog.
Building Windows-compatible devices, systems, and filter drivers across all
Windows Platforms in
Windows Hardware Compatibility Program Specifications
and Policies.
How to create a Key Management
Services (KMS) activation host
Article • 12/23/2021
KMS uses a client-server model to active Windows clients and is used for volume
activation on your local network. KMS clients connect to a KMS server, called the KMS
host, for activation. The KMS clients that a KMS host can activate are dependent on the
host key used to activate the KMS host. This article walks you through the steps you
need to create a KMS host. To learn more about KMS and the initial planning
considerations, see Key Management Services (KMS) activation planning.
Prerequisites
A single KMS host can support an unlimited number of KMS clients. If you have more
than 50 clients, we recommend that you have at least two KMS hosts in case one of your
KMS hosts becomes unavailable. Most organizations can operate with as few as two
KMS hosts for their entire infrastructure.
KMS hosts do not need to be dedicated servers, and KMS can be co-hosted with other
services. You can run a KMS host on any physical or virtual system that is running a
supported Windows Server or Windows client operating system.
The version of Windows you use for your KMS host determines the version of Windows
you can activate for your KMS clients. Please see the table of activation versions to help
you decide which is right for your environment.
By default, KMS hosts automatically publish SRV resource records in DNS. This enables
KMS clients to automatically discover the KMS host and activate without the need for
any configuration on the KMS client. Automatic publishing can be disabled and the
records can be created manually, which is also necessary for automatic activation if the
DNS service does not support dynamic updates.
A KMS host key for your organization. You can get this key from the Product Keys
section of the Volume Licensing Service Center .
PowerShell
2. Configure the Windows Firewall to allow the Key Management Service to receive
network traffic. You can allow this for any network profiles (default), or for any
combination of Domain, Private, and Public network profiles. By default, a KMS
host is configured to use TCP on port 1688. In the example below, the firewall rule
is configured to allow network traffic for the Domain and Private network profiles
only:
PowerShell
PowerShell
vmw.exe
4. Select Next on the introduction screen. Select Key Management Service (KMS) as
the activation type and enter localhost to configure the local server or the
hostname of the server you want to configure.
5. Select Install your KMS host key and enter the product key for your organization,
then select Commit.
6. Once the product key has been installed, you need to activate the product. Click
Next.
7. Select the product you want to activate from the dropdown menu, then select
whether you want to activate online or by phone. In this example, select Activate
online and then Commit.
8. Once activation is successful, the KMS host configuration will be shown. If this is
the configuration you want, you can select Close to exit the wizard. DNS records
will be created and you can start activating KMS clients. See the section below if
you need to manually create DNS records. If you want to change the configuration
settings, select Next.
9. Optional: Change the configuration values based on your requirements and select
Commit.
7 Note
You can now start activating KMS clients, however a network must have a
minimum number of computers (called the activation threshold). KMS hosts count
the number of recent connections and so when a client or server contacts the KMS
host, the host adds the machine ID to its count and then returns the current count
value in its response. The client or server will activate if the count is high enough.
Windows clients will activate if the count is 25 or higher. Windows Server and
volume editions of Microsoft Office products will activate if the count is five or
greater. The KMS only counts unique connections from the past 30 days, and only
stores the 50 most recent contacts.
Property Value
Type SRV
Service/Name _vlmcs
Protocol _tcp
Priority 0
Weight 0
Property Value
You should also disable publishing on all KMS hosts if your DNS service does not
support dynamic update to prevent event logs from collecting failed DNS publishing
events.
Tip
Manually created resource records can also coexist with resource records that KMS
hosts automatically publish in other domains as long as all records are maintained
to prevent conflicts.
PowerShell
vmw.exe
2. Select Next on the introduction screen. Select Key Management Service (KMS) as
the activation type and enter localhost to configure the local server or the
hostname of the server you want to configure.
4. Uncheck the box for publish DNS records, then select Commit.
Key Management Services (KMS) client
activation and product keys
Article • 04/26/2023
To use KMS, you need to have a KMS host available on your local network. Computers
that activate with a KMS host need to have a specific product key. This key is sometimes
referred to as the KMS client key, but it's formally known as a Microsoft Generic Volume
License Key (GVLK). Computers that are running volume licensing editions of Windows
Server and Windows client are, by default, KMS clients with no extra configuration
needed as the relevant GVLK is already there.
There are some scenarios, however, where you'll need to add the GVLK to the computer
you wish to activate against a KMS host, such as:
) Important
To use the keys listed here (which are GVLKs), you must first have a KMS host
available on your local network. If you don't already have a KMS host, please see
how to create a KMS host to learn more.
If you want to activate Windows without a KMS host available and outside of a
volume-activation scenario (for example, you're trying to activate a retail version of
Windows client), these keys will not work. You will need to use another method of
activating Windows, such as using a MAK, or purchasing a retail license. Get help to
find your Windows product key and learn about genuine versions of
Windows .
For example, to install the product key for Windows Server 2022 Datacenter edition, run
the following command and then press Enter :
) Important
Windows Server, version 20H2 reached end of service on August 9, 2022. This
includes the retirement of Windows Server Semi-Annual Channel (SAC) with no
future releases and will no longer receive security updates after August 9, 2022.
Customers using Windows Server SAC should move to Azure Stack HCI.
Alternatively, customers may use the Long-Term Servicing Channel of Windows
Server.
Windows 11 Pro
W269N-WFGWX-YVC9B-4J6C9-T83GX
Windows 10 Pro
Windows 11 Pro N
MH37W-N47XK-V7XM9-C7227-GCQG9
Windows 10 Pro N
Windows 11 Education
NW6C2-QMPVW-D7KKK-3GKT6-VCFB2
Windows 10 Education
Windows 11 Education N
2WH4N-8QGBV-H22JP-CT43Q-MDWWJ
Windows 10 Education N
Windows 11 Enterprise
NPPR9-FWDCX-D2C8J-H872K-2YT43
Windows 10 Enterprise
Windows 11 Enterprise N
DPH2V-TTNVB-4X9Q3-TJR4H-KHJW4
Windows 10 Enterprise N
Windows 11 Enterprise G
YYVX9-NTFWV-6MDM3-9PT4T-4M68B
Windows 10 Enterprise G
Windows 11 Enterprise G N
44RPN-FTY23-9VTTB-MP9BX-T84FV
Windows 10 Enterprise G N
Windows 8.1
Windows 8
Windows 7
Windows Vista
Extended Security Updates (ESU) for Windows Server include security updates and
bulletins rated critical and important. Before using ESU, you should read Extended
Security Updates for Windows Server Overview to understand what ESUs are, how long
they're available for, and what your options are.
How you get ESUs depends on where your server is hosted. You can get access to ESUs
through the following options.
Azure virtual machines - Applicable virtual machines (VMs) hosted in Azure are
automatically enabled for ESUs and these updates are provided free of charge,
there's no need to deploy a MAK key or take any other action. See Extended
Security Updates on Azure to learn more.
Non-Azure physical and virtual machines - If you can't connect using Azure Arc,
use Extended Security Updates on non-Azure VMs, by using a Multiple Activation
Key (MAK) and applying it to the relevant servers. This MAK key lets the Windows
Update servers know that you can continue to receive security updates. See Access
your Multiple Activation Key from the Microsoft 365 Admin Center to learn more. 1
1 When using Azure Arc-enabled servers and non-Azure machines you must purchase
ESUs. In order to purchase ESUs, you must have Software Assurance through Volume
Licensing Programs such as an Enterprise Agreement (EA), Enterprise Agreement
Subscription (EAS), Enrollment for Education Solutions (EES), or Server and Cloud
Enrollment (SCE).
7 Note
It may take 3-5 business days for your Multiple Activation Key to become available
after purchasing ESUs for on-premises VMs or physical servers. Your organization
may also require time to plan and deploy the new keys. Before purchasing ESUs,
you should keep these timelines in mind.
7 Note
Extended Security Updates are also free of charge in other Azure products such as
Azure Dedicated Host, Azure VMware Solution, Azure Nutanix Solution, and Azure
Stack (Hub, Edge, and HCI), and might require additional configuration. Contact
Microsoft Support for more help.
You can enroll in ESUs at scale by using Azure Policy or Azure portal, there's no upfront
charge and you'll be billed monthly via your Azure subscription. You also don't need to
activate product keys.
Azure Arc-enabled servers also enable to you to use other Azure services, such as:
To prepare for activating Windows Server 2012 and 2012R2 ESUs on your Arc-enabled
servers, follow these steps:
2. In the search bar, enter Servers - Azure Arc and select the matching service entry.
3. Add your existing Windows Server 2012 or 2012 R2 machine to Azure Arc. To learn
about getting started with Azure Arc-enabled servers, see Connect hybrid
machines with Azure Arc-enabled servers.
To learn more about ESUs with Azure Arc, see Prepare to deliver Extended Security
Updates for Windows Server 2012.
3. Select your agreement number used to purchase ESUs, the three dots beside it
(More Actions icon), then select View product keys. All the product keys available
to the agreement shown on this page.
4. Once you have your MAK, install the new key on your eligible servers. To learn
more about installing and activating your MAK, see our Tech Community blog post
Obtaining Extended Security Updates for eligible Windows devices .
For VMs hosted in Azure, the process of enabling the server for ESUs is automatically
completed for you. Updates should download and install without extra configuration.
Enable Hotpatch for Azure Edition
virtual machines built from ISO
Article • 07/18/2023
Hotpatch for Windows Server 2022 Datacenter: Azure Edition allows you to install
security updates on without requiring a reboot after installation. You can use Hotpatch
with both Desktop Experience and Server Core. This article will teach you how to
configure Hotpatch after installing or upgrading the operating system using an ISO.
7 Note
When deploying your Windows Server 2022 Datacenter: Azure Edition through the
Azure Marketplace to your Azure Stack HCI hosts, there is no need to perform
these steps. The images are already enabled for hotpatching.
When using Hotpatch for your ISO deployed machine on Azure Stack HCI, there are a
few important differences with the Hotpatch experience compared with using Hotpatch
as part of Azure Automanage for Azure VMs.
Prerequisites
To enable Hotpatch, you must have the following prerequisites ready before you start:
1. Sign-in to your machine. If you're on Server core, from the SConfig menu, enter
option 15, then press Enter to open a PowerShell session. If you're on the desktop
experience, remote desktop into your VM and launch PowerShell.
PowerShell
$registryPath = "HKLM:\SYSTEM\CurrentControlSet\Control\DeviceGuard"
$parameters = $parameters = @{
Path = $registryPath
Name = "EnableVirtualizationBasedSecurity"
Value = "0x1"
Force = $True
PropertyType = "DWORD"
}
New-ItemProperty @parameters
4. Configure the Hotpatch table size in the registry by running the following
PowerShell command:
PowerShell
$registryPath = "HKLM:\SYSTEM\CurrentControlSet\Control\Session
Manager\Memory Management"
$parameters = $parameters = @{
Path = $registryPath
Name = "HotPatchTableSize"
Value = "0x1000"
Force = $True
PropertyType = "DWORD"
}
New-ItemProperty @parameters
5. Configure the Windows Update endpoint for Hotpatch in the registry by running
the following PowerShell command:
PowerShell
$registryPath = "HKLM:\SOFTWARE\Microsoft\Windows
NT\CurrentVersion\Update\TargetingInfo\DynamicInstalled\Hotpatch.amd64"
$nameParameters = $parameters = @{
Path = $registryPath
Name = "Name"
Value = "Hotpatch Enrollment Package"
Force = $True
}
$versionParameters = $parameters = @{
Path = $registryPath
Name = "Version"
Value = "10.0.20348.1129"
Force = $True
}
New-Item $registryPath -Force
New-ItemProperty @nameParameters
New-ItemProperty @versionParameters
Now you've prepared your computer, you can install the Hotpatch servicing package.
7 Note
To be able to receive Hotpatch updates, you'll need to download and install the
Hotpatch servicing package. In your PowerShell session, complete the following steps:
PowerShell
$parameters = @{
Uri = "https://go.microsoft.com/fwlink/?linkid=2211714"
OutFile = ".\KB5003508.msu"
}
Invoke-WebRequest @parameters
wusa.exe .\KB5003508.msu
PowerShell
7 Note
When using Server Core, updates are set to be manually installed by default. You
can change this setting using the SConfig utility.
Next steps
Now you've set up your computer for Hotpatch, here are some articles that might help
you with updating your computer:
An in-place upgrade allows you to go from an older operating system to a newer one
while keeping
your settings, server roles, and data intact. This article will teach you how
to move to a later
version of Windows Server using an in-place upgrade.
) Important
Prerequisites
Before you start upgrading, your computer must meet the following requirements:
Determine
which version of Windows Server to upgrade to.
The hardware meets or exceeds the hardware requirements for Windows Server.
Must not be running in Azure.
The install media is ready to use.
A valid product key and activation method are available. Keys and methods may
depend based on the
distribution channel that you received Windows Server
media from, for example, a Commercial
Licensing program, Retail, Original
Equipment Manufacturer (OEM), and so on.
PowerShell 5.1 or later.
A location to store files away from your computer. For example, a USB flash drive
or network
location.
Review the
upgrade and migrate roles and features in Windows Server
article.
Review the
Microsoft server applications compatibility
article.
Review any third party application vendors support requirements.
PowerShell
2. Using File Explorer, navigate to the directory you noted down, and copy the files
to a
USB flash drive or network location off of your computer.
Tip
1. Using File Explorer, navigate to the Windows Server Setup media. Then open
setup.exe.
For example, if you're using removal media the file path might be
D:\setup.exe.
) Important
Depending on your security settings, User Account Control may prompt you
to allow setup to
make changes to your device. If you're happy to continue
select Yes.
2. By default, setup will automatically download updates for the installation. If you're
okay with
the default settings, to continue select Next.
4. Select the edition of Windows Server you want to install, then select Next.
5. Review the applicable notices and license terms, if you agree to the terms, select
Accept.
6. Select Keep personal files and apps to choose to do an in-place upgrade, then
select
Next.
7. After Setup finishes analyzing your device, setup will display the Ready to install
screen, to
continue the upgrade select Install.
The in-place upgrade will start, and you should see a progress bar. After the upgrade
finishes, your
server will restart.
1. Open an elevated PowerShell prompt, run the following command to verify the
version and edition
matches the media and values you selected during setup.
PowerShell
2. Make sure all of your applications are running and that your client connections to
the
applications are successful.
If your computer isn't working as expected after the upgrade, you can
contact Microsoft
Support for technical assistance.
Next steps
Now that you've upgraded Windows Server, here are some articles that might help you
as you use the
new version:
Product activation is the process of validating software after it's installed on a specific
computer. Activation confirms that the product is genuine (not a fraudulent copy) and
that the product key or serial number is valid and has not been compromised or
revoked. Activation also establishes a link or relationship between the product key and
the installation.
The Windows Server 2016 Activation Guide focuses on the Key Management Service
(KMS) activation technology. This section addresses common issues and provides
troubleshooting guidelines for KMS and several other volume activation technologies.
Subscription activation
Windows 10 Subscription Activation
Deploy Windows 10 Enterprise licenses
Windows 10 Enterprise E3 in CSP
The following articles provide guidance for addressing more specific activation issues:
As part of their deployment process, many enterprise customers set up the Key
Management Service (KMS) to enable activation of Windows in their environment. It is a
simple process to set up the KMS host, after which the KMS clients discover the host
and try to activate on their own. But what happens if that process doesn’t work? What
do you do next? This article walks you through the resources that you require in order to
troubleshoot the issue. For more information about event log entries and the Slmgr.vbs
script, see Volume Activation Technical Reference.
KMS overview
Let’s start with a quick refresher on KMS activation. KMS is a client-server model.
Conceptually, it resembles DHCP. Instead of handing out IP addresses to clients on their
request, KMS enables product activation. KMS is also a renewal model, in which the
clients try to reactivate on a regular interval. There are two roles: the KMS host and the
KMS client.
The KMS host runs the activation service and enables activation in the
environment. To configure a KMS host, you have to install a KMS key from the
Volume License Service Center (VLSC) and then activate the service.
The KMS client is the Windows operating system that is deployed in the
environment and has to activate. KMS clients can be running any edition of
Windows that uses volume activation. The KMS clients are supplied with a pre-
installed key, called the Generic Volume License Key (GVLK) or KMS Client Setup
Key. The presence of the GVLK is what makes a system a KMS client. The KMS
clients use DNS SRV records (_vlmcs._tcp) to identify the KMS host. Then the clients
automatically try to discover and use this service to activate themselves. During the
30-day out-of-the-box grace period, they will try to activate every two hours. After
activating, the KMS clients try to renew their activation every seven days.
From a troubleshooting perspective, you may have to look at both sides (host and
client) to determine what is going on.
KMS host
There are two areas to examine on the KMS host. First, check the status of the host
software license service. Second, check the Event Viewer for events that are related to
licensing or activation.
The most important fields for troubleshooting are the following. What you are looking
for may differ, depending on the issue to be solved.
Version Information. At the top of the slmgr.vbs /dlv output is the Software
Licensing Service Version. This may be useful to determine whether the current
version of the service is installed. For example, updates to the KMS service on
Windows Server 2003 support different KMS host keys. This data can be used to
evaluate whether or not the version is current and supports the KMS host key that
you are trying to install. For more information about these updates, see An update
is available for Windows Vista and for Windows Server 2008 to extend KMS
activation support for Windows 7 and for Windows Server 2008 R2 .
Name. This indicates the edition of Windows that is installed on the KMS host
system. This can be important for troubleshooting if you are having trouble adding
or changing the KMS host key (for example, to verify that the key is supported on
that OS edition).
Description. This is where you see the key that is installed. Use this field to verify
which key was used to activate the service and whether or not it is the correct one
for the KMS clients that you have deployed.
License Status. This is the status of the KMS host system. The value should be
Licensed. Any other value means that something is wrong and you may have to
reactivate the host.
Current Count. The count displayed will be between 0 and 50. The count is
cumulative (between operating systems) and indicates the number of valid systems
that have tried to activate within a 30-day period.
If the count is 0, either the service was recently activated or no valid clients have
connected to the KMS host.
The count will not increase above 50, no matter how many valid systems exist in
the environment. This is because they count is set to cache only twice the
maximum license policy that is returned by a KMS client. The maximum policy
today is set by the Windows client OS, which requires a count of 25 or higher from
the KMS host to activate itself. Therefore, the highest count on the KMS host is 2 x
25, or 50. Note that in environments that contain only Windows Server KMS clients,
the maximum count on the KMS host will be 10. This is because the threshold for
Windows Server editions is 5 (2 x 5, or 10).
A common issue that is related to the count is if the environment has an activated
KMS host and enough clients, but the count does not increase beyond one. The
core problem is that the deployed client image was not configured correctly
(sysprep /generalize) and the systems do not have unique Client Machine IDs
(CMIDs). For more information, see KMS client and The KMS current count does
not increase when you add new Windows Vista or Windows 7-based client
computers to the network . One of our Support Escalation Engineers has also
blogged about this issue, in KMS Host Client Count not Increasing Due to
Duplicate CMID’S.
Another reason why the count may not be increasing is that there are too many
KMS hosts in the environment and the count is distributed over all of them.
Listening on Port. Communication with KMS uses anonymous RPC. By default, the
clients use the 1688 TCP port to connect to the KMS host. Make sure that this port
is open between your KMS clients and the KMS host. You can change or configure
the port on the KMS host. During their communication, the KMS host sends the
port designation to the KMS clients. If you change the port on a KMS client, the
port designation is overwritten when that client contacts the host.
We often get asked about the “cumulative requests” section of the slmgr.vbs /dlv
output. Generally this data is not helpful for troubleshooting. The KMS host keeps an
ongoing record of the state of each KMS client that tries to activate or reactivate. Failed
requests indicate KMS clients that the KMS host does not support. For example, if a
Windows 7 KMS client tries to activate against a KMS host that was activated by using a
Windows Vista KMS key, the activation fails. The “Requests with License Status” lines
describe all the possible license states, past and present. From a troubleshooting
perspective, this data is relevant only if the count is not increasing as expected. In that
case, you should see the number of failed requests increasing. This indicates that you
should check the product key that was used to activate the KMS host system. Also,
notice that the cumulative request values reset only if you reinstall the KMS host system.
Event ID 12290
The KMS host logs Event ID 12290 when a KMS client contacts the host in order to
activate. Event ID 12290 provides a significant amount of information that you can use
to figure out what kind of client contacted the host and why a failure occurred. The
following segment of an event ID 12290 entry comes from the Key Management Service
event log of our KMS host.
Minimum count needed to activate. The KMS client is reporting that the count
from the KMS host must be 5 in order to activate. That means that this is a
Windows Server OS, although it does not indicate a specific edition. If your clients
are not activating, make sure that the count is sufficient on the host.
Client Machine ID (CMID). This is a unique value on each system. If this value is
not unique, it is because an image was not prepared correctly for distribution
(sysprep /generalize). This issue manifests on the KMS host as a count that will not
increase, even though there are enough clients in the environment. For more
information, see The KMS current count does not increase when you add new
Windows Vista or Windows 7-based client computers to the network .
License State and Time to State Expiration. This is the current license state of the
client. It can help you differentiate a client that is trying to activate for the first time
from one that is trying to reactivate. The time entry tells you how much longer the
client will remain in that state, if nothing changes.
If you are troubleshooting a client and cannot find a corresponding event ID 12290 on
the KMS host, that client is not connecting to the KMS host. Some reasons why an event
ID 12290 entry may not exist are as follows:
KMS clients log two corresponding events, event ID 12288 and event ID 12289. For
information about these events, see the KMS client section.
Event ID 12293
Another relevant event to look for on your KMS host is event ID 12293. This event
indicates that the host did not publish the required records in DNS. This situation is
known to cause failures, and it is something that you should verify after you set up your
host and before you deploy clients. For more information about DNS issues, see
Common troubleshooting procedures for KMS and DNS issues.
KMS client
On the clients you use the same tools (Slmgr and Event Viewer) to troubleshoot
activation.
Slmgr.vbs and the Software Licensing service
To see verbose output from the Software Licensing service, open an elevated Command
Prompt window and enter slmgr.vbs /dlv at the command prompt. The following
screenshot shows the results of this command on one of our KMS hosts within
Microsoft.
The following list includes the most important fields for troubleshooting. What you are
looking for may differ, depending on the issue to be solved.
Name. This value is the edition of Windows that is installed on the KMS client
system. Use this to verify that the version of Windows you are trying to activate
can use KMS. For example, our Help desk has seen incidents in which customers try
to install the KMS Client Setup Key on an edition of Windows that does not use
volume activation, such as Windows Vista Ultimate.
Description. This value shows the key that is installed. VOLUME_KMSCLIENT
indicates that the KMS Client Setup Key (or GVLK) is installed (the default
configuration for volume license media) and that this system automatically tries to
activate by using a KMS host. If you see something else here, such as MAK, you’ll
have to reinstall the GVLK to configure this system as a KMS client. You can
manually install the key by using slmgr.vbs /ipk <GVLK> (as described in KMS
client setup keys) or use the Volume Activation Management Tool (VAMT). For
information about obtaining and using VAMT, see Volume Activation Management
Tool (VAMT) Technical Reference.
Partial Product Key. As the Name field, you can use this information to determine
whether the correct KMS Client Setup Key is installed on this computer (in other
words, the key matches the operating system that is installed on the KMS client).
By default, the correct key is present on systems that are built by using media from
the Volume License Service Center (VLSC) portal. In some cases, customers may
use Multiple Activation Key (MAK) activation until there are enough systems in the
environment to support KMS activation. The KMS Client Setup key has to be
installed on these systems to transition them from MAK to KMS. Use VAMT to
install this key and make sure that the correct key is applied.
License Status. This value shows the status of the KMS client system. For a system
that was activated by using KMS, this value should be Licensed. Any other value
may indicate that there is a problem. For example, if the KMS host is functioning
correctly and the KMS client does not activate (for example, it remains in a Grace
state), something may be preventing the client from reaching the host system
(such as a firewall issue, network outage, or something similar).
Client Machine ID (CMID). Each KMS client should have a unique CMID. As
mentioned in the KMS host section, a common issue related to count is if the
environment has an activated KMS host and enough clients, but the count does
not increase beyond 1. For more information, see The KMS current count does not
increase when you add new Windows Vista or Windows 7-based client computers
to the network .
KMS Machine Name from DNS. This value shows the FQDN of the KMS host that
the client successfully used for activation, and the TCP port used for the
communication.
KMS Host Caching. The final value shows whether or not caching is enabled. By
default, it is enabled. What this means is that the KMS client caches the name KMS
host that it used for activation, and it communicates directly with this host (instead
of querying DNS) when it is time to reactivate. If the client cannot contact the
cached KMS host, it queries DNS to discover a new KMS host.
The most relevant information in event ID 12288 is the data in the Info section. For
example, this section shows the current state of the client plus the FQDN and TCP port
that the client used when it tried to activate. You can use the FQDN to troubleshoot
cases in which the count on a KMS host is not increasing. For example, if there are too
many KMS hosts available to the clients (either legitimate or rogue systems) then the
count may be distributed over all of them.
An unsuccessful activation does not always mean that the client has 12288 and not
12289. A failed activation or reactivation may also have both events. In this case, you
have to examine the second event to verify the reason for the failure.
The Info section of event ID 12289 provides the following information:
Activation Flag. This value indicates whether the activation succeeded(1) or failed
(0).
Current Count on the KMS Host. This value reflects the count value on the KMS
host when the client tries to activate. If activation fails, it may be because the count
is insufficient for this client OS or that there are not enough systems in the
environment to build the count.
Slmgr.vbs /dlv output from the KMS host and KMS client systems. Whether you
use wscript or cscript to run the command, you can use Ctrl+C to copy the output,
and then paste it into Notepad to send it to the support contact.
Event logs from both the KMS host (Key Management Service log) and KMS client
systems (Application log)
Additional References
Ask the Core Team: #Activation
Slmgr.vbs options for obtaining volume
activation information
Article • 05/19/2022 • Applies to: Windows Server 2012 R2, Windows 10, Windows 8.1
The following describes the syntax of the Slmgr.vbs script, and the tables in this article
describe each command-line option.
7 Note
In this article, square brackets [] enclose optional arguments, and angle brackets
<> enclose placeholders. When you type these statements, omit the brackets and
replace the placeholders by using corresponding values.
7 Note
For information about other software products that use volume activation, see the
documents specifically written for those applications.
) Important
[<User>] Account that has the required privilege on the remote computer
[<Password>] Password for the account that has the required privileges on the remote
computer
Global options
Option Description
/ipk <ProductKey> Tries to install a 5×5 product key. The product key provided by the
parameter is confirmed valid and applicable to the installed
operating system.
/ato [<Activation ID>] For retail editions and volume systems that have a KMS host key or a
Multiple Activation Key (MAK) installed, /ato prompts Windows to try
online activation.
For systems that have a Generic Volume License Key (GVLK) installed,
this prompts a KMS activation attempt. Systems that have been set
to suspend automatic KMS activation attempts (/stao) still try KMS
activation when /ato is run.
/xpr [<Activation ID>] Display the activation expiration date for the product. By default, this
refers to the current Windows edition and is primarily useful for KMS
clients, because MAK and retail activation is perpetual.
Advanced options
Option Description
/ilc <license_file> This option installs the license file specified by the required parameter.
These licenses may be installed as a troubleshooting measure, to
support token-based activation, or as part of a manual installation of
an on-boarded application.
Licenses are not validated during this process: License validation is out
of scope for Slmgr.vbs. Instead, validation is handled by the Software
Protection Service at runtime.
Any matching licenses in the Trusted Store are replaced. Any additional
licenses—for example, Trusted Authority (TA) Issuance Licenses (ILs),
licenses for applications—are not affected.
/rearm This option resets the activation timers. The /rearm process is also
called by sysprep /generalize.
/upk [<Application ID>] This option uninstalls the product key of the current Windows edition.
After a restart, the system will be in an Unlicensed state unless a new
product key is installed.
/skms This option specifies the name and, optionally, the port of the KMS
<Name[:Port] | : port> host computer to contact. Setting this value disables auto-detection of
[<Activation ID>] the KMS host.
If the KMS host uses Internet Protocol version 6 (IPv6) only, the address
must be specified in the format <hostname>:<port>. IPv6 addresses
contain colons (:), which the Slmgr.vbs script does not parse correctly.
/skms- Sets the specific DNS domain in which all KMS SRV records can be
domain <FQDN> found. This setting has no effect if the specific single KMS host is set by
[<Activation ID>] using the /skms option. Use this option, especially in disjoint
namespace environments, to force KMS to ignore the DNS suffix search
list and look for KMS host records in the specified DNS domain instead.
/ckms [<Activation ID>] This option removes the specified KMS host name, address, and port
information from the registry and restores KMS auto-discovery
behavior.
/skhc This option enables KMS host caching (default). After the client
discovers a working KMS host, this setting prevents the Domain Name
System (DNS) priority and weight from affecting further communication
with the host. If the system can no longer contact the working KMS
host, the client tries to discover a new host.
/ckhc This option disables KMS host caching. This setting instructs the client
to use DNS auto-discovery each time it tries KMS activation
(recommended when using priority and weight).
/sai <Interval> This option sets the interval in minutes for unactivated clients to try to
connect to KMS. The activation interval must be between 15 minutes and
30 days, although the default value (two hours) is recommended.
The KMS client initially picks up this interval from registry but switches to the
KMS setting after it receives the first KMS response.
/sri <Interval> This option sets the renewal interval in minutes for activated clients to try to
connect to KMS. The renewal interval must be between 15 minutes and
30 days. This option is set initially on both the KMS server and client sides.
The default value is 10,080 minutes (7 days).
The KMS client initially picks up this interval from the registry but switches to
the KMS setting after it receives the first KMS response.
/sprt <Port> This option sets the port on which the KMS host listens for client activation
requests. The default TCP port is 1688.
/act-type This option sets a value in the registry that limits volume activation to a single
[<Activation- type. Activation Type 1 limits activation to Active Directory only; 2 limits it to
Type>] KMS activation; 3 to token-based activation. The 0 option allows any
[<Activation ID>] activation type and is the default value.
/stao Set the Token-based Activation Only flag, disabling automatic KMS
activation.
/ltc List valid token-based activation certificates that can activate installed
software.
/ad-activation-online Collects Active Directory data and starts Active Directory forest
<Product Key> activation using the credentials that the command prompt is
[<Activation Object name>] running. Local administrator access is not required. However,
Read/Write access to the activation object container in the root
domain of the forest is required.
/ad-activation-get-IID This option starts Active Directory forest activation in phone mode.
<Product Key> The output is the installation ID (IID) that can be used to activate
the forest over the telephone if internet connectivity is not
available. Upon providing the IID in the activation phone call, a CID
is returned that is used to complete activation.
/ad-activation-apply-cid When you use this option, enter the CID that was provided in the
<Product Key> activation telephone call to complete activation
<Confirmation ID>
[<Activation Object name>]
[/name: <AO_Name>] Optionally, you can append the /name option to any of these
commands to specify a name for the activation object stored in
Active Directory. The name must not exceed 40 Unicode characters.
Use double quotation marks to explicitly define the name string.
In Windows Server 2012 R2 and Windows 8.1, you can append the
name directly after /ad-activation-online <Product Key> and /ad-
activation-apply-cid without having to use the /name option.
/ao-list Displays all of the activation objects that are available to the local
computer.
/del-ao <AO_DN>
Deletes the specified activation object from the forest.
/del-ao <AO_RDN>
Additional References
Volume Activation Technical Reference
Volume Activation Overview
Resolve Windows activation error codes
Article • 07/18/2022
Try our Virtual Agent - It can help you quickly identify and fix common issues
7 Note
This article is intended for technical support agents and IT professionals. If you're
looking for more information about Windows activation error messages, see Get
help with Windows activation errors .
This article provides troubleshooting information to help you respond to error messages
that you may receive when you try to use a Multiple Activation Key (MAK) or the Key
Management Service (KMS) to perform Volume Activation on one or more Windows-
based computers. Look for the error code in the following table, and then select the link
to see more information about that error code and how to resolve it.
For more information about volume activation, see Plan for volume activation.
For more information about volume activation for current and recent versions of
Windows, see Volume Activation [client].
For more information about volume activation for older versions of Windows, see KB
929712, Volume Activation information for Windows Vista, Windows Server 2008,
Windows Server 2008 R2 and Windows 7 .
Diagnostic tool
7 Note
This tool is intended to help fix Windows activation problems on computers that
run Enterprise, Professional, or Server edition of Windows.
Microsoft Support and Recovery Assistant (SaRA) simplifies Windows KMS Activation
troubleshooting.
KMS client
KMS host
0x80070490 The product key you entered didn't work. Check the product MAK
key and try again, or enter a different one.
0xC004B100 The activation server determined that the computer could not MAK
be activated.
0xC004C001 The activation server determined the specified product key is MAK
invalid
0xC004C003 The activation server determined the specified product key is MAK
blocked
0xC004C008 The activation server determined that the specified product key KMS
could not be used.
0xC004C020 The activation server reported that the Multiple Activation Key MAK
has exceeded its limit.
0xC004C021 The activation server reported that the Multiple Activation Key MAK
extension limit has been exceeded.
Error code Error message Activation type
0xC004F009 The Software Protection Service reported that the grace period MAK
expired.
0xC004F00F The Software Licensing Server reported that the hardware ID MAK
KMS host
0xC004F014 The Software Protection Service reported that the product key is MAK
0xC004F02C The Software Protection Service reported that the format for the MAK
0xC004F035 The Software Protection Service reported that the computer KMS client
could not be activated with a Volume license product key. KMS host
0xC004F038 The Software Protection Service reported that the computer KMS client
could not be activated. The count reported by your Key
Management Service (KMS) is insufficient. Please contact your
system administrator.
0xC004F039 The Software Protection Service reported that the computer KMS client
could not be activated. The Key Management Service (KMS) is
not enabled.
0xC004F041 The Software Protection Service determined that the Key KMS client
Management Server (KMS) is not activated. KMS needs to be
activated.
0xC004F042 The Software Protection Service determined that the specified KMS client
Key Management Service (KMS) cannot be used.
0xC004F050 The Software Protection Service reported that the product key is MAK
invalid. KMS
KMS client
0xC004F051 The Software Protection Service reported that the product key is MAK
blocked. KMS
0xC004F064 The Software Protection Service reported that the non-genuine MAK
grace period expired.
0xC004F065 The Software Protection Service reported that the application is MAK
0xC004F06C The Software Protection Service reported that the computer KMS client
could not be activated. The Key Management Service (KMS)
determined that the request timestamp is invalid.
Error code Error message Activation type
0xC004F074 The Software Protection Service reported that the computer KMS client
could not be activated. No Key Management Service (KMS)
could be contacted. Please see the Application Event Log for
additional information.
Possible cause
This issue can occur for several reasons. The most likely reason is that language packs
(MUI) have been installed on computers that are running Windows editions that are not
licensed for additional language packs.
7 Note
This issue may also occur if Windows has been modified by malware to allow additional
features to be installed. This issue may also occur if certain system files are corrupted.
Resolution
To resolve this issue, you must reinstall the operating system.
Possible cause
User Account Control (UAC) prohibits activation processes from running in a non-
elevated Command Prompt window.
Resolution
Run slmgr.vbs from an elevated command prompt. To do this, on the Start menu, right-
click cmd.exe, and then select Run as administrator.
Possible cause
This issue may occur if the KMS client cannot find the KMS SRV resource records in DNS.
Resolution
For more information about troubleshooting such DNS-related issues, see Common
troubleshooting procedures for KMS and DNS issues.
The product key that you entered didn't work. Check the product key and try again,
or enter a different one.
Possible cause
This issue occurs because the MAK that was entered was not valid, or because of a
known issue in Windows Server 2019.
Resolution
To work around this issue and activate the computer, run slmgr -ipk <5x5 key> at an
elevated command prompt.
Possible cause
Firewall settings are not configured on the KMS host, or DNS SRV records are stale.
Resolution
On the KMS host, make sure that a firewall exception is enabled for the Key
Management Service (TCP port 1688).
Make sure that the DNS SRV records point to a valid KMS host.
For more information about troubleshooting such DNS-related issues, see Common
troubleshooting procedures for KMS and DNS issues.
Possible cause
Resolution
Troubleshoot network and DNS.
Possible cause
The KMS client cannot find KMS server resource records (SRV RRs) in DNS.
Resolution
Verify that a KMS host has been installed and DNS publishing is enabled (default). If
DNS is unavailable, point the KMS client to the KMS host by using slmgr.vbs /skms
<kms_host_name>.
If you do not have a KMS host, obtain and install an MAK. Then, activate the system.
For more information about troubleshooting such DNS-related issues, see Common
troubleshooting procedures for KMS and DNS issues.
0x8007251D No records found for DNS query
Possible cause
The KMS client cannot find KMS SRV records in DNS.
Resolution
Troubleshoot network connections and DNS. For more information about how to
troubleshoot such DNS-related issues, see Common troubleshooting procedures for
KMS and DNS issues.
Possible cause
This issue may occur if the KMS client cannot find the KMS SRV resource records in DNS.
Resolution
For more information about troubleshooting such DNS-related issues, see Common
troubleshooting procedures for KMS and DNS issues.
Possible cause
Resolution
To troubleshoot this issue, verify that the MAK that you are using is the MAK that was
provided by Microsoft. To verify that the MAK is valid, contact the Microsoft Licensing
Activation Centers .
Resolution
Verify that the key is the MAK that was provided by Microsoft. For additional assistance,
contact the Microsoft Licensing Activation Centers .
Possible cause
Resolution
To obtain a new MAK, contact the Microsoft Licensing Activation Centers . After you
obtain the new MAK, try installing and activating Windows again.
Possible cause
The KMS key has exceeded its activation limit. A KMS host key can be activated up to 10
times on up to six different computers.
Resolution
If you require additional activations, contact the Microsoft Licensing Activation
Centers .
Possible cause
The MAK has exceeded its activation limit. By design, MAKs can be activated a limited
number of times.
Resolution
Possible cause
The MAK has exceeded its activation limit. By design, MAKs activate a limited number of
times.
Resolution
If you need additional activations, contact the Microsoft Licensing Activation Centers .
Possible cause
The grace period expired before the system was activated. Now, the system is in the
Notifications state.
Resolution
For assistance, contact the Microsoft Licensing Activation Centers .
Possible cause
The hardware has changed or the drivers were updated on the system.
Resolution
If you are using MAK activation, use either online or phone activation to reactivate the
system during the OOT grace period.
If you are using KMS activation, restart Windows or run slmgr.vbs /ato.
Possible cause
No product keys are installed on the system.
Resolution
If you are using MAK activation, install a MAK product key.
If you are using KMS activation, check the Pid.txt file (located on the installation media
in the \sources folder) for a KMS Setup key. Install the key.
Possible cause
The system has detected that the data entered during phone activation is not valid.
Resolution
Verify that the CID is entered correctly.
Error: Invalid Volume License Key. In order to activate, you need to change your
product key to a valid Multiple Activation Key (MAK) or Retail key. You must have a
qualifying operating system license AND a Volume license Windows 7 upgrade
license, or a full license for Windows 7 from a retail source. ANY OTHER
INSTALLATION OF THIS SOFTWARE IS IN VIOLATION OF YOUR AGREEMENT AND
APPLICABLE COPYRIGHT LAW.
The error text is correct, but is ambiguous. This error indicates that the computer is
missing a Windows marker in its BIOS that identifies it as an OEM system that is running
a qualifying edition of Windows. This information is required for KMS client activation.
The more specific meaning of this code is "Error: Invalid Volume License Key"
Possible cause
Windows 7 Volume editions are licensed only for upgrade. Microsoft does not support
installing a Volume operating system on a computer that does not have a qualifying
operating system installed.
Resolution
In order to activate, you need to do one of the following:
Change your product key to a valid Multiple Activation Key (MAK) or Retail key.
You must have a qualifying operating system license AND a Volume license
Windows 7 upgrade license, or a full license for Windows 7 from a retail source.
7 Note
If you receive error 0x80072ee2 when you attempt to activate, use the phone
activation method that follows instead.
1. Run slmgr /dti and then record the value of the Installation ID.
2. Contact the Microsoft Licensing Activation Centers and provide the
Installation ID in order to receive a Confirmation ID.
3. To activate by using the Confirmation ID, run slmgr /atp <Confirmation ID>.
Possible cause
The count on the KMS host is not high enough. For Windows Server, the KMS count
must be greater than or equal to 5. For Windows (client), the KMS count must be greater
than or equal to 25.
Resolution
Before you can use KMS to activate Windows, you must have more computers in the
KMS pool. To obtain the current count on the KMS host, run Slmgr.vbs /dli.
The Software Protection Service reported that the computer could not be activated.
The Key Management Service (KMS) is not enabled.
Possible cause
Resolution
Troubleshoot the network connection between the KMS host and the client. Make sure
that TCP port 1688 (default) is not blocked by a firewall or is otherwise filtered.
The Software Protection Service determined that the Key Management Server (KMS)
is not activated. KMS needs to be activated.
Possible cause
The KMS host is not activated.
Resolution
Possible cause
This error occurs if the KMS client contacted a KMS host that could not activate the
client software. This can be common in mixed environments that contain application-
specific and operating system-specific KMS hosts, for example.
Resolution
Make sure that if you use specific KMS hosts to activate specific applications or
operating systems, the KMS clients connect to the correct hosts.
Possible cause
This can be caused by a typo in the KMS key or by typing in a Beta key on a Released
version of the operating system.
Resolution
Install the appropriate KMS key on the corresponding version of Windows. Check the
spelling. If the key is being copied and pasted, make sure that em-dashes were not
substituted for the hyphens in the key.
Resolution
Obtain a new MAK or KMS key, install it on the system, and activate.
Possible cause
Windows Activation Tools (WAT) has determined that the system is not genuine.
Resolution
For assistance, contact the Microsoft Licensing Activation Centers .
Possible cause
Windows Activation Tools has determined that the system is not genuine. The system
will continue to run during the Non-Genuine grace period.
Resolution
Obtain and install a genuine product key, and activate the system during the grace
period. Otherwise, the system will go into the Notifications state at the end of the grace
period.
Possible cause
The system time on the client computer is too different from the time on the KMS host.
Time sync is important to system and network security for a variety of reasons.
Resolution
Fix this issue by changing the system time on the client to sync with the KMS host. We
recommend that you use a Network Time Protocol (NTP) time source or Active Directory
Domain Services for time synchronization. This issue uses UTP time and does not
depend on Time Zone selection.
The Software Protection Service reported that the computer could not be activated.
No Key Management Service (KMS) could be contacted. Please see the Application
Event Log for additional information.
Possible cause
All of the KMS host systems returned an error.
Resolution
In the Application Event Log, identify each event that has Event ID 12288 and is
associated with the activation attempt. Troubleshoot the errors from these events.
Try our Virtual Agent - It can help you quickly identify and fix common issues
This article describes common questions and issues that can arisse during Key
Management Service (KMS) activations, and provides guidance for addressing the
issues.
7 Note
If you suspect that your issue is related to DNS, see Common troubleshooting
procedures for KMS and DNS issues.
If you use System Center Operations Manager, the System Center Data Warehouse
database stores event log data for reporting, therefore you do not have to back up the
event logs separately.
On the KMS client computer, look in the Application event log for event ID 12289. Check
this event for the following information:
On the KMS host computer, look in the KMS event log for event ID 12290. Check this
event for the following information:
Did the KMS host log a request from the client computer? Verify that the name of
the KMS client computer is listed. Verify that the client and KMS host can
communicate. Did the client receive the response?
If no event is logged from the KMS client, the request did not reach the KMS host
or the KMS host was unable to process it. Make sure that routers do not block
traffic using TCP port 1688 (if the default port is used) and that stateful traffic to
the KMS client is allowed.
For example, if event ID 12293 contains error code 0x8007267C, you can display a
description of that error by running the following command:
For more information about specific error codes and how to address them, see
Resolving common activation error codes.
If your KMS clients use auto-discovery, they automatically select another KMS host if the
original KMS host does not respond to renewal requests. If the clients do not use auto-
discovery, you must manually update the KMS client computers that were assigned to
the failed KMS host by running slmgr.vbs /skms. To avoid this scenario, configure the
KMS clients to use auto-discovery. For more information, see the Volume Activation
Deployment Guide.
MAK activation: known issues
Article • 08/22/2022
Try our Virtual Agent - It can help you quickly identify and fix common issues
This article describes common issues that can occur during Multiple Activation Key
(MAK) activations, and provides guidance for addressing those issues.
For more information about specific error codes and how to address them, see
Resolving common activation error codes.
Guidelines for troubleshooting DNS-
related activation issues
Article • 05/19/2022
You may have to use some of these methods if one or more of the following conditions
are true:
You use volume-licensed media and a Volume License generic product key to
install one of the following operating systems:
Windows Server 2019
Windows Server 2016
Windows Server 2012 R2
Windows Server 2012
Windows Server 2008 R2
Windows Server 2008
Windows 10
Windows 8.1
Windows 8
The activation wizard cannot connect to a KMS host computer.
When you try to activate a client system, the activation wizard uses DNS to locate a
corresponding computer that's running the KMS software. If the wizard queries DNS and
does not find the DNS entry for the KMS host computer, the wizard reports an error.
Review the following list to find an approach that fits your circumstances:
If you cannot install a KMS host or if you cannot use KMS activation, try the
Change the product key to an MAK procedure.
If you have to install and configure a KMS host, use the Configure a KMS host for
the clients to activate against procedure.
If the client cannot locate your existing KMS host, use the following procedures to
troubleshoot your routing configurations. These procedures are arranged from the
simplest to the most complex.
Verify basic IP connectivity to the DNS server
Verify the KMS host configuration
Determine the type of routing issue
Verify the DNS configuration
Manually create a KMS SRV record
Manually assign a KMS host to a KMS client
Configure the KMS host to publish in multiple DNS domains
Change the product key to an MAK
If you cannot install a KMS host or, for some other reason, you cannot use KMS
activation, change the product key to an MAK. If you downloaded Windows images
from the Microsoft Developer Network (MSDN), or from TechNet, the stock-keeping
units (SKUs) that are listed below the media are generally volume licensed-media, and
the product key that's provided is an MAK key.
1. Open an elevated Command Prompt window. To do this, press the Windows logo
key+X, right-click Command Prompt, and then select Run as administrator. If you
are prompted for an administrator password or for confirmation, type the
password or provide confirmation.
2. At the command prompt, run the following command:
7 Note
For information about the KMS host configuration process, see Activate using Key
Management Service and Install and Configure VAMT.
ping <DNS_Server_IP_address>
7 Note
If the output from this command does not include the phrase "Reply from,"
there is a network problem or DNS issue that you must resolve before you can
use the other procedures in this article. For more information about how to
troubleshoot TCP/IP issues if you cannot ping the DNS server, see Advanced
troubleshooting for TCP/IP issues.
) Important
Follow the steps in this section carefully. Serious problems might occur if you
modify the registry incorrectly. Before you modify it, back up the registry for
restoration in case problems occur.
1. Start Registry Editor. To do this, right-click Start, select Run, type regedit, and then
press Enter.
2. Locate the HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
NT\CurrentVersion\SoftwareProtectionPlatform subkey (previously SL instead of
SoftwareProtectionPlatform in Windows Server 2008 and Windows Vista), and
check the value of the DisableDnsPublishing entry. This entry has the following
possible values:
0 or undefined (default): The KMS host server registers a SRV record once
every 24 hours.
1: The KMS host server does not automatically register SRV records. If your
implementation does not support dynamic updates, see Manually create a
KMS SRV record.
7 Note
If these commands resolve the problem, this is an SRV record issue. You can you
can troubleshoot it by using one of the commands that are documented in the
Manually assign a KMS host to a KMS client procedure.
7 Note
In this command, <IP Address> represents the IP address of the KMS host
computer and <port> represents the TCP port that KMS uses.
If these commands resolve the problem, this is most likely a name resolution issue.
For additional troubleshooting information, see the Verify the DNS configuration
procedure.
4. If none of these commands resolves the problem, check the computer's firewall
configuration. Any activation communications that occur between KMS clients and
the KMS host use the 1688 TCP port. The firewalls on both the KMS client and the
KMS host must allow communication over port 1688.
7 Note
Unless otherwise stated, follow these steps on a KMS client that has experienced
the applicable error.
IPCONFIG /all
c. Open the KMS.txt file that the command generates. This file should contain one
or more entries that resemble the following entry:
7 Note
i. Verify the IP address, host name, port, and domain of the KMS host.
ii. If these _vlmcs entries exist, and if they contain the expected KMS host
names, go to Manually assign a KMS host to a KMS client.
7 Note
If the nslookup command finds the KMS host, it does not mean that the
DNS client can find the KMS host. If the nslookup command finds the KMS
host, but you still cannot activate by using the KMS host, check the other
DNS settings, such as the primary DNS suffix and the search list of the DNS
suffix.
5. Verify that the search list of the primary DNS suffix contains the DNS domain suffix
that is associated with the KMS host. If the search list does not include this
information, go to the Configure the KMS host to publish in multiple DNS domains
procedure.
1. On the DNS server, open DNS Manager. To open DNS Manager, select Start, select
Administrative Tools, and then select DNS.
2. Select the DNS server on which you have to create the SRV resource record.
3. In the console tree, expand Forward Lookup Zones, right-click the domain, and
then select Other New Records.
4. Scroll down the list, select Service Location (SRV), and then select Create Record.
5. Type the following information:
Service: _VLMCS
Protocol: _TCP
Port number: 1688
Host offering the service: <FQDN of the KMS host>
6. When you are finished, select OK, and then select Done.
To manually create an SRV record for a KMS host that uses a BIND 9.x-compliant DNS
server, follow the instructions for that DNS server, and provide the following information
for the SRV record:
Name: _vlmcs._TCP
Type: SRV
Priority: 0
Weight: 0
Port: 1688
Hostname: <FQDN or A-Name of the KMS host>
allow-update { any; };
However, you can manually assign a KMS host to a particular KMS client. To do this,
follow these steps.
To assign a KMS host by using the FQDN of the host, run the following
command:
To assign a KMS host by using the version 4 IP address of the host, run the
following command:
To assign a KMS host by using the version 6 IP address of the host, run the
following command:
To assign a KMS host by using the NETBIOS name of the host, run the
following command:
) Important
Follow the steps in this section carefully. Serious problems might occur if you
modify the registry incorrectly. Before you modify it, back up the registry for
restoration in case problems occur.
As described in Manually assign a KMS host to a KMS client, KMS clients typically use
the automatic discovery process to identify KMS hosts. This process requires that the
_vlmcs SRV records must be available in the DNS zone of the KMS client computer. The
DNS zone corresponds to either the primary DNS suffix of the computer or to one of the
following:
By default, a KMS host registers its SRV records in the DNS zone that corresponds to the
domain of the KMS host computer. For example, assume that a KMS host joins the
contoso.com domain. In this scenario, the KMS host registers its _vlmcs SRV record
under the contoso.com DNS zone. Therefore, the record identifies the service as
_VLMCS._TCP.CONTOSO.COM .
If the KMS host and KMS clients use different DNS zones, you must configure the KMS
host to automatically publish its SRV records in multiple DNS domains. To do this, follow
these steps:
7 Note
For Windows Server 2008 R2, the format for DnsDomainPublishList differs.
For more information, see the Volume Activation Technical Reference Guide.
7. Use the Services administrative tool to restart the Software Protection service
(previously the Software Licensing service in Windows Server 2008 and Windows
Vista). This operation creates the SRV records.
8. Verify that by using a typical method, the KMS client can contact the KMS host that
you configured. Verify that the KMS client correctly identifies the KMS host both by
name and by IP address. If either of these verifications fails, investigate this DNS
client resolver issue.
9. To clear any previously cached KMS host names on the KMS client, open an
elevated Command Prompt window on the KMS client, and then run the following
command:
When you troubleshoot Windows activation issues, you may have to rebuild the
Tokens.dat file. This article describes in detail how to do this.
Resolution
To rebuild the Tokens.dat file, follow these steps:
For Windows 7
a. Open the Start menu, and enter cmd.
b. In the search results, right-click cmd.exe, and the select Run as administrator.
2. Enter the list of commands that is appropriate for your operating system.
For Windows 10, Windows Server 2016 and later versions of Windows, enter the
following commands in sequence:
cd %Systemdrive%\Windows\System32\spp\store\2.0\
For Windows 8.1, Windows Server 2012 and Windows Server 2012 R2, enter the
following commands in sequence:
Windows Command Prompt
cd %Systemdrive%\Windows\System32\spp\store\
For Windows 7, Windows Server 2008 and Windows Server 2008 R2, enter the
following commands in sequence:
cd
%Systemdrive%\Windows\ServiceProfiles\NetworkService\AppData\Roaming\Mi
crosoft\SoftwareProtectionPlatform
More information
After you rebuild the Tokens.dat file, you must reinstall your product key by using one of
the following methods:
At the same elevated prompt command, type the following command, and then
press Enter:
) Important
Do not use the /upk switch to uninstall a product key. To install a product key
over an existing product key, use the /ipk switch.
Right-click My Computer, select Properties, and then select Change product key.
For more information about KMS client setup keys, see KMS client setup keys.
Example: Troubleshooting Active
Directory Based Activation (ADBA)
clients that do not activate
Article • 05/19/2022
7 Note
This article was originally published as a TechNet blog on March 26, 2018.
Hello everyone! My name is Mike Kammer, and I have been a Platforms PFE with
Microsoft for just over two years now. I recently helped a customer with deploying
Windows Server 2016 in their environment. We took this opportunity to also migrate
their activation methodology from a KMS Server to Active Directory Based Activation.
As proper procedure for making all changes, we started our migration in the customer’s
test environment. We began our deployment by following the instructions in this
excellent blog post by Charity Shelbourne, Active Directory-Based Activation vs. Key
Management Services . The domain controllers in our test environment were all
running Windows Server 2012 R2, so we did not need to prep our forest. We installed
the role on a Windows Server 2012 R2 Domain Controller and chose Active Directory
Based Activation as our volume activation method. We installed our KMS key and gave it
a name of "KMS AD Activation ( ** LAB)". We pretty much followed the blog post step
by step.
We started by building four virtual machines, two Windows 2016 Standard and two
Windows 2016 Datacenter. At this point everything was great, and everyone was happy.
We built a physical server running Windows 2016 Standard, and the machine activated
properly. And that’s where our story ends.
Haha! Just kidding! Nothing is ever that easy. Truthfully, the set up and configuration
were super easy, so that part was simple and straight forward. I came back into the
office on Monday, and all the virtual machines I had built the week prior showed that
they weren’t activated. Hey! That’s not right! I went back to the physical machine and it
was fine. I went to the customer to discuss what had happened. Of course, the first
question was “What changed over the weekend?” And as usual the answer was
“nothing.” This time, nothing really had been changed, and we had to figure out what
was going on.
I went to one of my problem servers, opened a command prompt, and checked my
output from the slmgr /ao-list command. The /ao-list switch displays all activation
objects in Active Directory.
The results show that we have two Activation Objects: one for Server 2012 R2, and our
newly created KMS AD Activation (** LAB) which is our Windows Server 2016 license.
This confirms our Active Directory is correctly configured to activate Windows KMS
Clients
Knowing that the slmgr command is my friend for license activation, I continued with
different options. I tried the /dlv switch, which will display detailed license information.
This looked fine to me, I was running the Standard version of Windows Server 2016,
there’s an Activation ID, an Installation ID, a validation URL, even a partial Product Key.
Does anyone see what I missed at this point? We’ll come back to it after my other
troubleshooting steps but suffice it to say the answer is in this screenshot.
My thinking now is that for some reason the key is broken, so I use the /upk switch,
which uninstalls the current key. While this was effective in removing the key, it is
generally not the best way to do it. Should the server get rebooted before getting a new
key it may leave the server in a bad state. I found that using the /ipk switch (which I do
later in my troubleshooting) overwrites the existing key and is a much safer route to
take. Learn from my missteps!
I ran the /dlv switch again, to see the detailed license information. Unfortunately for me
that didn’t give me any helpful information, just a product key not found error. Because,
of course, there’s no key since I just uninstalled it!
I figured it was a long shot, but I tried the /ato switch, which should activate Windows
against the known KMS servers (or Active Directory as the case may be). Again, just a
product not found error.
My next thought was that sometimes stopping and starting a service does the trick, so I
tried that next. I need to stop and start the Microsoft Software Protection Platform
Service (SPPSvc service). From an administrative command prompt, I use the trusty net
stop and net start commands. I notice at first that the service isn’t running, so I think
this must be it!
But no. After starting the service and attempting to activate Windows again, I still get
the product not found error.
I then looked at the Application Event Log on one of the trouble servers. I find an error
related to License Activation, Event ID 8198, that has a code of 0x8007007B.
While looking up this code, I found an article that says my error code means that the file
name, directory name, or volume label syntax is incorrect. Reading through the methods
described in the article, it didn’t seem that any of them fit my situation. When I ran the
nslookup -type=all _vlmcs._tcp command, I found the existing KMS server (still lots of
Windows 7 and Server 2008 machines in the environment, so it was necessary to keep it
around), but also the five domain controllers as well. This indicated that it was not a DNS
problem and my issues were elsewhere.
Well, I headed back to my slmgr command to figure out how to get these monsters
activated. This time I’m going to use the /ipk switch, which will allow me to install a
product key. I went to this site to get the appropriate keys for my Standard version of
Windows Server 2016. Some of my servers are Datacenter, but I need to fix this one first.
I used the /ipk switch to install a product key, choosing the Windows Server 2016
Standard key.
From here on out I only captured results from my Datacenter experiences, but they were
the same. I used the /ato switch to force the activation. We get the awesome message
that the product has been activated successfully!
Using the /dlv switch again, we can see that now we have been activated by Active
Directory.
Now, what had gone wrong? Why did I have to remove the installed key and add those
generic keys to get these machines to activate properly? Why did the other dozen or so
machines activate with no issues? As I said earlier, I missed something key in the initial
stages of looking at the issue. I was thoroughly confused, so reached out to Charity from
the initial blog post to see if she could help me. She saw the problem right away and
helped me understand what I had missed early on.
When I ran the first /dlv switch, in the description was the key. The description was
Windows® Operating System, RETAIL Channel. I had looked at that and thought that
RETAIL Channel meant that it had been purchased and was a valid key.
When we look at the output of the /dlv switch from a properly activated server, notice
the description now states VOLUME_KMSCLIENT channel. This lets us know that it is
indeed a volume license.
So what does that RETAIL channel mean then? Well, it means the media that was used to
install the operating system was an MSDN ISO. I went back to my customer and asked if,
by some chance, there was a second Windows Server 2016 ISO floating around the
network. Turns out that yes, there was another ISO on the network, and it had been
used to create the other dozen machines. They compared the two ISOs and sure enough
the one that was given to me to build the virtual servers was, in fact, an MSDN ISO. They
removed that MSDN ISO from their network and now we have all our existing servers
activated and no more worries about the activation failing on future builds.
I hope this has been helpful and may save you some time going forward!
Mike
Windows release health
Official information on Windows releases and servicing milestones, plus resources, tools, and news
about known issues and safeguards to help you plan your next update. Want the latest Windows
release health updates? Follow @WindowsUpdate on Twitter.