Windows Server 2022 Installation Configuration
Windows Server 2022 Installation Configuration
Prepared By
DIS APSCN/LAN Support
Table of Contents
Component Requirement
Drives DVD-ROM drive / Mountable USB Drive (ISO) * See pages 96 -100
Note: make sure the power to your server is correctly distributed and
Power
shielded against surges
TERMS DEFINITION
Active Directory Active Directory (AD) is a directory service that Microsoft developed for
the Windows domain networks. It is included in most Windows Server
operating systems as a set of processes and services. Initially, Active
Directory was only in charge of centralized domain management.
Starting with Windows Server 2008, however, Active Directory became
an umbrella title for a broad range of directory-based identity-related
services.
Active Directory A server running Active Directory Domain Services (AD DS) is called a
Domain Services domain controller (DC). It authenticates and authorizes all users and
computers in a Windows domain type network assigning and enforcing
Domain security policies for all computers & installing or updating software. For
Controller ex., when a user logs into a computer that is part of a Windows domain,
Active Directory checks the submitted password and determines
whether the user is a system administrator or normal user. Also, it
allows management and storage of information, provides
authentication and authorization mechanisms, and establishes a
framework to deploy other related services: Certificate Services, Active
Directory Federation Services, Lightweight Directory Services and Rights
Management Services.
Groups Groups are used to collect user accounts, computer accounts, and
other groups into manageable units. Working with groups instead of
with individual users helps simplify network maintenance and
administration. There are two types of groups in Active Directory:
Distribution Group used to create email distribution lists. A Security
Group provides a logical grouping of objects and the group itself can
be used as a security principal in an Access Control List (ACL)
Group Policy A Group Policy Object (GPO) is a collection of settings that define
Object what a system will look like and how it will behave for a defined
group of users. Microsoft provides a program snap-in that allows you
to use the Group Policy Microsoft Management Console (MMC)
Sysvol The System Volume (Sysvol) is a shared directory that stores the
server copy of the domain's public files that must be shared for
common access and replication throughout a domain. The Sysvol
folder on a domain controller contains the following items:
Net Logon shares. These typically host logon scripts and policy
objects for network client computers.
User logon scripts for domains where the administrator uses Active
Directory Users and Computers.
File replication service (FRS) staging folder and files that must be
available and synchronized between domain controllers.
• Datacenter Edition – When all physical cores on the server are licensed,
Windows Server Datacenter edition provides rights to use unlimited operating
system environments (OSEs) or Hyper-V containers and unlimited Windows
Server containers on the licensed server. Recommended for businesses that
have highly virtualized environments.
• Standard Edition – When all physical cores on the server are licensed, Windows
Server Standard edition provides rights to use two Operating System
Environments (OSEs) or Hyper-V containers and unlimited Windows Server
containers on the licensed server. Recommended for businesses that require
minimal virtualization & scalability.
**For example, a 2-processor server with 8 cores per processor requires 16 core
licenses (in other words, one 16-pack of core licenses or eight 2-packs of core
licenses) and gives rights to two OSEs or two Hyper-V containers. In the case of
this example, for each additional two OSEs or two Hyper-V containers the
customer wishes to use, an additional 16 core licenses must be assigned to the
server.
INSTALLATION
2. Insert the appropriate Windows Server 2022 installation media into your
server and reboot (DVD-ROM / Bootable USB)
3. After restarting the server, boot to the DVD-ROM / USB. Wait for Setup to
display a dialog box.
**All physical cores on the server must be licensed, subject to a minimum of 8 core licenses per
physical processor and a minimum of 16 core licenses per server.
**CALs are required for every user or device accessing a server. See the Product Terms for
details.
Windows Server 2022 Datacenter and Standard utilize a core-based licensing model, meaning
the number of core licenses needed depends on whether licensing is based on on-premises or
cloud/hybrid environments.
Licensing is based on physical cores for on-premises environments. The number of core licenses
required is equivalent to the number of physical cores on the server, with a minimum of 8 core
licenses per physical processor and 16 core licenses per server.
6. Select the proper edition of Windows Server 2022 that is to be installed and
press Next.
• Note - Choose Desktop Experience for Operating System with GUI
(Graphical User Interface)
7. Read and accept the license terms by clicking to select the checkbox and
pressing Next.
9. Select the disk that you will be installing Windows Server 2022 onto and then
click New to create a partition that Windows Server 2022 will be installed on.
Arkansas Department of Information Systems – APSCN LAN Support
Printed on 5/14/2024
13 | P a g e
10. In the “Size:” entry box, enter the size of the partition and press Next.
11. You will see the following screen while the installation files are copied to the
server. The server will reboot to complete the installation (leave media inserted)
.
**See notes on partition types:
** When creating new partitions, if it's over 2 TB or if it UEFI Boot it
recommended to be GPT.
You don't usually have to worry about partition style - Windows automatically
uses the appropriate disk type. Most PCs use the GUID Partition Table (GPT)
disk type for hard drives and SSDs. GPT is more robust and allows for volumes
bigger than 2 TB. The older Master Boot Record (MBR) disk type is used by 32-
Arkansas Department of Information Systems – APSCN LAN Support
Printed on 5/14/2024
14 | P a g e
bit PCs, older PCs, and removable drives such as memory cards. To convert a
disk from MBR to GPT or vice versa, you first must delete all volumes from
the disk, erasing everything on the disk.
11. Once the server has completed the setup, it will notify you that the password
needs to be set. This password MUST meet Microsoft password complexity
requirements. It will require a minimum password length of 8 characters and
three out of the four following:
Powershell Command:
slmgr.vbs /ipk XXXXX-XXXXX-XXXXX-XXXXX-XXXXX - Install a new key.
3. Change Computer Name – Use a good naming convention for asset management
**Example – Building Name + Device = Admin-DC1, HS-DC1, MS-AS1 etc.
6. Configure Networking and change to Static IP and disable IPv6 by unchecking the
option for TCP/IPv6.
**Recommended To Be Done
1. Open the Registry Editor by moving your mouse over the bottom-left Windows
Key or click Keyboard Key and type REGEDIT and press Enter
HKEY_LOCAL_MACHINE
|---System
|---CurrentControlSet
|---Services
|---Tcpip6
|---Parameters
3. Right-Click on the Parameters Key and click New > DWORD (32-Bit) Value.
5. Double-click on the newly created key and enter ffffffff (8 f’s) for the value data
in Hexadecimal mode.
2. In the middle of the screen you will find an “Overview” section, at the bottom of
this section click Windows Firewall Properties.
3. Turn off the Firewall state for Doman Profile and Private Profile
**It is highly recommended that the Firewall be enabled on DIS Router if you are not
using a third-party firewall. If you do not have any firewall appliance, you may wish to
leave the windows firewall enabled. Adjust the scopes of the Inbound/Outbound rules
to meet application requirements.
** Recommended to create inbound / outbound rules, allow specific ports & programs
thru firewall instead of just turning off firewalls
**Before starting this section, make sure that your server has a statically assigned IP
address and that the DNS IP Address in the TCP/IP settings are pointing to itself.
We do not have to pre-install the DNS Server Role or pre-create our DNS Zone. When
the Active Directory Domain Services Role is installed the DNS Server Role will be
automatically installed and configured with the DNS zone specified during the Active
Directory installation.
8. Click Next for rest of the screens, and then click Install.
10. Promote the Server to be a Domain Controller by clicking the Notifications icon
(Flag Icon) and then selecting Promote this Server to a Domain Controller
11. On the Deployment Configuration screen, select Add a new forest. Type the
DNS name for the new domain in Root Domain Name and click Next.
**DIS recommends you type your abbreviated school district name followed
by .local e.g. school.local. DO NOT end your domain name with .com, .net,
.org, .edu, or any other domain name that are resolvable on the internet.
**This step and those following assume this is the first Domain Controller in
a new domain, tree, and forest.
12. For the Forest Functional Level and the Domain Functional Level, select
Windows Server 2022 and click Next.
14. Under Directory Services Restore Mode (DSRM) Password, enter in a complex
password that is UNIQUE to this server and is NOT your normal administrator
password and click Next.
**Ignore the Parent zone delegation warning on top of the screen. It will be
created during initial AD installation.
17. On the Location for Database, Log Files and SYSVOL screen click Next.
20. When the Active Directory installation finishes, the server will automatically
restart.
21. Log into the server when the server has completely booted back up.
22. Launch Server Manager, click on Tools and select DNS from the drop down list.
24. On the Zone Type screen, take the defaults and click Next.
25. For the Active Directory Zone Replication Scope, select To all DNS Servers
running on domain controllers in this domain and click Next.
27. For the reverse zone name, enter the first two/three octets of your IP range
and click Next.
28. On the Dynamic Update screen, take the default and click Next.
**Steps 23 through 26 must be completed for Public and Private IP subnets being used
in the Active Directory environment.
30. Within the DNS Manager, right-click on your DNS server and click Set
Aging/Scavenging for All Zones.
31. Check the box Scavenge stale resource records and then click OK.
32. When prompted with the Server Aging/Scavenging Confirmation box, check
the Apply these settings to the existing Active Directory-integrated zones
option and then click OK.
Example
DC1 – IP Address 10.10.10.6
DC2 – IP Address 10.10.10.7
**When promoting a new server into an existing Forrest or domain, the new server
will have to point to another DC first and can then be changed after the server has
been successfully promoted
DNS FORWARDERS
By setting the DNS Forwarders to DIS DNS servers, your server will not have to perform
a full DNS resolution of a requested domain name. Rather, it will query the DNS servers
at DIS for the specified DNS entry and, if cached, the DIS DNS servers will return the
results from its local cache. If the DIS DNS Server does not have the result in its cache, it
will perform the full lookup of the DNS Name and return the results to your DNS server
to be delivered to your client.
With Windows Server 2022, should the DIS DNS Servers become unavailable, your DNS
server will default to use the DNS Root Hint servers on the Internet for DNS resolution.
**Exception Cisco Umbrella (OpenDNS Server) – Do Not Use DNS Root Hint
Arkansas Department of Information Systems – APSCN LAN Support
Printed on 5/14/2024
28 | P a g e
1. Within the DNS Manager, right-click your server and click Properties.
2. Click the Forwarders tab and then click the Edit button. Add the appropriate
Forwarders for your windows environment.
3. Enter your DIS DNS Servers / OpenDNS Server as specified below and click OK.
**OpenDNS Servers are used for Cisco Umbrella Content Filtering
**Please remove all old state DIS DNS Servers (165.29.X.X and 170.211.X.X)
6. On the Select server roles screen, select the DHCP Server role, click on Add
Features and click Next.
7. Click Next for rest of the screens, and then click Install.
9. Configure the DHCP Server installation by clicking the Notifications icon (Flag
Icon) and then selecting Complete DHCP configuration.
12. Now that DHCP Server role has been installed, we will configure it in DHCP
Manager by clicking on Tools and selecting DHCP from the drop-down list.
13. Expand the server node and IPv4 node until you see Server Options, Policies.
15. On the Scope Name screen enter the Scope name and description you want
to use for this scope e.g. IP NAT POOL
16. On the IP Address Range screen type in the starting and ending IP address
for this scope along with the subnet mask. This is the range of IP addresses
this DHCP server will be issuing. Click Next.
Arkansas Department of Information Systems – APSCN LAN Support
Printed on 5/14/2024
31 | P a g e
**It is recommended to leave a few numbers at the start of the scope for
static assignment e.g. if the IP range is 10.10.10.0 - 10.10.11.255 enter
10.10.10.101 for the Starting IP Address and 10.10.11.254 for the Ending IP
Address to leave 100 IP’s at the beginning of your IP range for static
assignment.
17. On the Exclusion screen enter the IP addresses you want to be excluded from
the DHCP range defined in the previous step and then click Next.
18. On the Lease time screen take the default values unless required otherwise
and Click Next.
19. On the Configure DHCP options screen select No, I will configure these
options later and click Next and then Finish to close the wizard.
20. Right click Server Options and select Configure Options. From the list
opened select the following options:
21. Right-click IPv4 and select Properties. Under the Advanced tab, for Conflict
Detection Attempts, change this value to 3.
22. Also, under Advanced tab click on the Bindings button and verify that the
only network adapter checked is the adapter that is on the same subnet the
DHCP server will be serving IP addresses for.
23. Once all the settings are done, right click on the newly created scope and
select Activate for the DHCP server to start giving out IP numbers.
7. On the Select features screen, select WINS Server, click on Add Features, and
then click Next and then click Install.
8. Add the WINS IP addresses to each respective network cards in all servers.
10. Open up WINS Manager by selecting Tools in the Server Manager and then
selecting WINS from the drop-down list.
11. Expand the respective WINS Server and click on Replication Partners.
13. Enter the respective server name that will be replicating with this WINS
server and close WINS manager.
**Steps 12 and 13 needs to be repeated for all WINS servers in the domain.
**You will want to have a WSUS server at each physical site that is behind a router.
The reason is that you do not want to have computers go across the WAN connection
to get their updates.
6. On the Select Server roles page, select Windows Server Update Services.
7. In the Add Roles and Features dialog box that pops up, click Add Features,
and then click Next.
8. On the Select features page, leave the default selections, and then
click Next.
**WSUS only requires the default Web Server role configuration. If you are
prompted for additional Web Server role configuration while setting up
10. On the Select Role Services page, leave the default selections unless an
external SQL Server database is being used, and then click Next.
11. On the Content location selection page, type a valid location to store the
updates e.g. D:\WSUS and then click Next.
**You must have at least 200GB of free disk space, on the volume selected
to store updates locally.
13. On the Select role services page, leave the default selections, and then
click Next.
14. On the Confirm installation selections page, review the selected options,
and then click Install.
15. On the Installation progress page, make sure that the installation succeeded,
and then click Close.
16. Now that WSUS role is installed, it will be configured by clicking on Tools and
selecting Windows Server Update Services from the drop-down list.
18. In the Complete WSUS Installation dialog box, click Close when the
installation successfully finishes.
19. The Windows Server Update Services Wizard appears and on the Before you
Begin page, click Next.
20. Read the instructions on the Join the Microsoft Update Improvement
Program page and evaluate if you want to participate or not. If you do not
want to participate, Uncheck the box and click Next.
21. On the Choose Upstream Server page, select Synchronize from Microsoft
Update and click Next.
**If you are synchronizing from another WSUS server from within the
district, be sure to enter the proper port number that WSUS is running on
remotely.
22. On Specify Proxy Server settings, leave the default values, unless these
settings are required for your environment and then click Next.
23. On the Connect to Upstream Server, click Start Connecting to retrieve the
current updated list of products available.
24. When the initial product file download is completed, click Next.
25. On the Choose Languages page, verify that English is the ONLY selected
language and then click Next.
26. On the Choose Products page, choose the Microsoft products running in
your environment that will require updates and click Next.
Arkansas Department of Information Systems – APSCN LAN Support
Printed on 5/14/2024
36 | P a g e
27. On the Choose Classifications page, it is recommended to select everything
EXCEPT Drivers and click Next.
28. On the Set Sync Schedule page, select Synchronize automatically and set
this to off-peak usage hours e.g. 11:00pm and then click Next.
29. Click Finish on the next screen to complete the configuration wizard.
30. On the Update Services management console screen, expand your WSUS
Server and click Options.
31. In the Options pane, select Update Files and Languages. Uncheck the
Download update files to this server only when the updates are approved
and click OK.
**If you choose to manually approve updates, your workstations will not
have to wait until after the next WSUS Sync with Microsoft to get the
updates.
33. Select the Default Automatic Approval Rule and click Edit.
**Some districts choose not to select Feature Packs. These include items
such as Silver Light and Desktop Search.
36. Verify that Default Automatic Approval Rule is checked. Click Apply and OK
2. Click on Tools and select Group Policy Management from the drop-down list.
6. Name the new group policy WSUS Policy and click OK.
7. Expand Group Policy Objects. Right-click the newly created WSUS Policy and
click Edit to open the Group Policy Editor.
12. Change Not Configured to Enabled and in both entry, boxes enter
http://YourWsusServername:8530 and then click OK.
13. Click the Next Setting button to change to Automatic Updates detection
frequency window.
14. Change Not Configured to Enabled, leave the default value for Interval
(hours) and then click OK.
18. Change Not Configured to Enabled, change the startup (minutes) to any
value between 1 – 5 (recommended) and then click OK.
20. Drag and Drop WSUS Policy on the Workstations OU to link the policy to
everything residing under Workstations.
**It is recommended to have a separate Group Policy for Domain Servers and Domain
workstations to avoid automatic restart on servers.
2. Click on Tools and select Active Directory Users and Computers from the
drop-down list.
4. Enter Faculty as the name of the new Organizational Unit then click Next.
**Repeat Steps 4 and 5 for all Custom Security Groups required in your Active
Directory environment e.g. Students, Journalism, YearBook, and Technology etc.
**If you are running Active Directory over multiple sites (behind more than one
router), you would want to create an OU for each site, place Workstations, Faculty,
and Students OU’s under that Site OU. You can delegate campus level technicians to
be able to have the authority to maintain user accounts, computer accounts, etc. that
reside only in their campus’ OU.
The first thing we need to do before we can create our user template is to create a
network share for the home directories.
1. Open Computer and browse to the volume that will hold the faculty
home-directories.
4. Select on the Sharing tab and click the Advanced Sharing button.
**If a name or group is misspelled or not found in the Directory, you will
be prompted to correct the spelling or to distinguish the proper group,
should the same text exist within multiple groups.
11. Give the Faculty group Change rights, they will receive Read
automatically.
12. Click on the Caching button. Select No files or programs from this
shared folder will be available offline.
13. Click OK, Apply, and then OK until all property windows are closed.
Arkansas Department of Information Systems – APSCN LAN Support
Printed on 5/14/2024
44 | P a g e
14. Select the Security tab and click the Advanced button.
19. Your permissions to Faculty-Homes should now look like the following
screen.
22. Click on Domain Admins, then under Permissions for Domain Admins
check Full Control under Allow section. Click Apply and OK.
Now that the network share to store home directories is set up, User template will be
created using the following steps:
23. Launch Server Manager, click on Tools and select Active Directory Users
and Computers from the drop-down list.
24. Right click on the Faculty OU, select New, and then User.
25. In the information screen fill it out as shown in this screen and then click
Next.
**An underscore before the first name places the template at top of the
list within the Organizational Unit.
Arkansas Department of Information Systems – APSCN LAN Support
Printed on 5/14/2024
48 | P a g e
26. Enter a password for the template account that meets the minimum
password requirements. Make sure User much change password at next
logon and Account is disabled are checked and click Next.
Now that the template account is set up, it needs to be configured for login script, home
directory path, and make sure that this template is a member of the required security
group(s) by following these steps:
29. In the Select Groups box, type Faculty and click Check Names. Add any
additional security group this template needs to be a member of and
then click OK.
30. Click on the Profile tab and in the Logon Script text box, enter logon.bat
31. Under the Home folder section, click the radio button next to Connect.
32. Select the drive letter to be used for user’s home directory when it is
mapped.
33. In the To: text box enter \\servername\Faculty-Homes$\%username%
35. This will create a new subfolder called FTemplate under Faculty-Homes
folder with the proper rights.
To create a new account based off the template, use the following steps:
2. In the Information screen fill it out the information for the New User and
then click Next.
4. Open Excel Spreadsheet with Student / Faculty Data & Copy Data into
Correct Columns (A, B, C, D, E & F)
**Data must be texted to columns and all special characters removed
6. Rename texted document to batch file (.bat) and Change Save as type: All
Files
8. Once Batch file successfully runs open Active Directory Users and Computers
& new user accounts should be in their perspective OU’s
**Use Refresh if accounts don’t appear in Active Directory OU’s
Arkansas Department of Information Systems – APSCN LAN Support
Printed on 5/14/2024
54 | P a g e
LOGON SCRIPTS – BATCH FILE METHOD
By default, Windows does not know what shares users need access to or what drive
letters they need to be mapped to. By creating a simple batch file logon script, this can
be accomplished easily. All logon scripts should be saved in the
\\DOMAINNAME\NETLOGON folder.
A batch file is nothing more than a series of DOS commands. The main command in a
basic batch file logon script would be the NET USE command. For instance, if you have a
server named DC1 and it has a share name of APPS, the following command will map
this drive as N: for the user, when the logon script runs.
You can use the REM to remark out anything that you type after the REM. This is helpful
for documenting what each command is doing in your logon script. REM Statements
MUST be on their own line. They are shown on the same line in this example.
LOGON.BAT
@ECHO OFF
NET USE N: /D REM Disconnects mapped N drive
NET USE O: /D REM Disconnects mapped O drive
NET USE P: /D REM Disconnects mapped N drive
NET USE N: \\DC1\Apps /Persistent:NO REM Map Apps share on server DC1 to N
NET USE O: \\DC1\Faculty-Apps /Persistent:NO REM Map Faculty-Apps share on server DC1 to O
NET USE P: \\DC1\Student-Apps /Persistent:NO REM Map Student-Apps share on server DC1 to P
REM Copy All Icon Files in Shared Folder to Users’ Desktop – Overwrite any items that are duplicates.
Xcopy “\\server\sharename\desktopicons\*.*” “%USERPROFILE%\DESKTOP” /C /E /S /Y
:END
EXIT
Before After
Rename-Mapped-Drives.VBS
‘------Script Start
On Error Resume Next
Dim UserName
Username = objNetwork.UserName
UserName = UCase(Left(UserName,1)) & LCase(Right(UserName,Len(UserName)-1))
mDrive = "M:"
oShell.NameSpace(mDrive).Self.Name = Username & " - Home Directory"
mDrive = "N:"
oShell.NameSpace(mDrive).Self.Name = "Apps"
mDrive = "O:"
oShell.NameSpace(mDrive).Self.Name = "Faculty Apps"
mDrive = "P:"
oShell.NameSpace(mDrive).Self.Name = "Student Apps"
mDrive = "W:"
oShell.NameSpace(mDrive).Self.Name = Username & " - Web Space"
mDrive = "Y:"
oShell.NameSpace(mDrive).Self.Name = "Student Home Directories"
mDrive = "Z:"
oShell.NameSpace(mDrive).Self.Name = "Faculty Home Directories"
We placed the following command at the beginning to check and see if what type of OS
is on the workstation that the user is logging in with by using the OS variable built into
NT based clients.
Shadow copy usage scenarios for both client and IT administrators are relatively
straightforward. Three common scenarios of data loss due to human error are:
▪ Accidental file deletions.
▪ Accidental overwrites of a file (for example, forgot to perform ‘Save as’).
▪ File corruption.
Shadow Copies of Shared Folders provides an end user-accessible tool that restores
documents by accessing point-in-time shadow copies of documents and folders stored
on network shares. Local volume recovery support of an end user’s computer, for
example, is not supported. The network file share must have the Volume Shadow Copy
service enabled on a Windows Server 2003-based computer.
Shadow Copies of Shared Folders is transparent to end users when they store files on
the network file server. Only when an end user needs to replace a lost or damaged file
with a prior version will they activate the client user interface (UI) through Windows
Explorer. Shadow Copies of Shared Folders also enables users to see network folder
contents at specific points in time.
IT USAGE SCENARIOS
The most common scenario for recovering lost or corrupted files is a request by the end
user to the IT help desk to find an archived version. If the organization has an archiving
system in place, this request usually means a costly and time-intensive search of
archived media, which in many instances is a tape back-up.
This situation creates several problems:
▪ Potential loss of business agility or revenue if the lost document is time- or
context-sensitive.
▪ Increased unproductive time for end user.
▪ Increased cost to help desk and IT support services.
Shadow Copies of Shared Folders enables end users to view the contents of shared
folders as they existed at specific points in time and recover those files by themselves.
This eliminates administrators having to restore accidentally deleted or overwritten
files. Implementing Shadow Copies of Shared Folders for routine file recovery scenarios
can help to:
▪ Reduce demand on busy administrators; for example, by reducing restore-from-
tape requests.
Reduce the cost of recovering single or multiple files. Table 1 below presents a summary
of how end users, IT departments, and organizations can benefit by implementing
Shadow Copies of Shared Folders.
Arkansas Department of Information Systems – APSCN LAN Support
Printed on 5/14/2024
58 | P a g e
Table 1: Benefits of Using Shadow Copies of Shared Folders
The shadow copy feature in Windows Server works by making a block-level copy of any
changes that have occurred to files since the last shadow copy. Only the changes are
copied, not the entire file.
As a result, previous versions of files do not usually take up as much disk space as the
current file, although the amount of disk space used for changes can vary, depending on
the application that changed the file.
For example, some applications rewrite the entire file when a change is made, but other
applications add changes to the existing file. If the entire file is rewritten to disk, then
the shadow copy contains the entire file. Therefore, consider the type of applications in
your organization, as well as the frequency and number of updates, when you
determine how much disk space to allocate for shadow copies.
**Shadow copies DO NOT eliminate the need to perform regular backups, nor do
shadow copies provide protection from media failure. In addition, shadow copies are
not permanent. As new shadow copies are taken, old shadow copies are purged when
the size of all shadow copies reaches a configurable maximum, or when the number of
shadow copies reaches 64, whichever is sooner. Therefore, shadow copies might not
be present for as long as end users expect them to be. End user needs and
expectations should be considered when shadow copies are configured.
**Windows Vista and later have the Shadow copy client installed by default
2. Right-click on the volume that you would like to enable Shadow Copies and
then click Properties.
4. Select the volume(s) from the list shadow copies needs to be enabled on and
then click Enable.
5. On the Enable Shadow Copies dialog box that pops up check Do not show
this message again and click Yes.
6. Click on the volume that you enabled Shadow Copies for then click the
Settings button.
8. By default, the only two options for a snapshot are every day at 7AM and
12PM, Mon - Friday. Adjust this schedule to meet the district’s needs or
create a new schedule per requirement.
**Quota limits are based off volumes. Quota limits are, when applied, are for all users
that save data on the volume. It is recommended that volumes containing Faculty and
Student home folders be on separate volumes. This will allow different quota limits on
volumes.
2. Right click on the volume that Quota limits need to be enabled and then
select Properties and click on the Quota tab.
**It is recommended to enable Deny Disk Space to Users Exceeding Quota Limit.
4. Select the radio button next to Limit disk space to. Set the limit and warning
level to meet district’s needs. You can set the log options to meet your
needs.
To view user’s current disk utilization, click on the Quota Entries button from within the
window.
6. On the Select Server roles page expand File and Storage Services to view the
options below.
7. Expand File and iSCSI Services, select File Server Resource Manager.
8. In the Add Roles and Features dialog box hat pops up, click Add Features and
then click Next.
9. Click Next for rest of the screens, and then click Install.
11. Now that File Server Resource Manager role is installed, it will be configured by
clicking on Tools and selecting File Server Resource Manager from the drop
down list.
12. Expand Quota Management in the left-hand pane and click on Quota
Templates.
13. Under the Actions pane (far right) click Create Quota Template.
14. Enter a template name, such as Faculty Home Directory Limits or Student Home
Directory Limits.
15. Enter the limit size and select either Hard quota or Soft quota.
16. Email notifications to either the user or network administrative staff can be
enabled by clicking on the Add button in the Notification threshold section.
18. Under the Quota Management section of the left pane, click on Quotas.
20. Click the Browse button to select the directory that you wish to apply the quota
limit to.
Create quota on path – This will apply the space limitation to ALL files and
folders within the parent directory.
**This option should be used for folders such as Yearbook Staff or Multimedia
class where multiple users save to the same folder.
Auto apply template and create quotas on existing and new subfolders – This
will apply the template to the subfolders within the parent folder.
**This option should be used for applying limits on home directory folders and
is automatically applied to any new folders created. This method would allow
you to have your Faculty-Homes and Student-Homes parent folders both on
their own volume or you can also place them on the Data volume with the rest
of your network shares.
22. Select the Quota Template to be used from the drop-down menu under Derive
properties from this quota template and click Create.
One of the nice features introduced in Windows Server 2022 AD DS is the ability to
configure fine grained password policies through GUI.
To configure fine-grained password policies as per the table above (ACT723 - K12 State
Security Policies), use the following steps:
2. Click on Tools and select Active Directory Administrative Center (ADAC) from
the drop-down list.
4. Expand the Domain name and navigate to System and then Password Settings
Container.
6. Specify the password policy settings for each of the required policies referenced
in table.
7. After the attributes for the password policy has been filled in, click Add to link
created policy to the required security group and click on OK twice.
2. Click on Tools and select Group Policy Management from the drop-down list.
7. Set the policy setting Retain Security Log to 90 days. You will automatically
prompted to change the Retention method to days. Click OK.
2. Click on Tools and select Group Policy Management from the drop-down list.
6. Expand Computer Configuration > Policies > Windows Settings > Security
Settings > Local Policies and select Audit Policy.
2. Click on Tools and select Group Policy Management from the drop-down list.
6. Expand Computer Configuration > Policies > Windows Settings > Security
Settings > Local Policies and select Security Options.
2. Click on Tools and select Group Policy Management from the drop-down list.
6. Expand User Configuration > Policies > Administrative Templates > Control
Panel and select Personalization.
9. Set the Screen Saver timeout to Enabled and to a recommended time of 900
seconds (15 minutes).
2. Click on Tools and select Group Policy Management from the drop-down list.
6. Name the new group policy Folder Redirection Policy and click OK.
8. Expand User Configuration > Policies > Windows Settings and select Folder
Redirection.
10. Change the setting to Basic – Redirect everyone’s folder to the same
location and set the Target folder location to Redirect to the user’s home
directory.
12. Click Apply and if prompted to also redirect Pictures, Music, etc. to the Home
Directory, click Yes. Click OK.
This policy can be used to restrict access for students to log on to faculty machines. This
policy will be based off the Faculty User group and can be adjusted to meet the group of
users that meets your needs.
2. Click on Tools and select Active Directory Users and Computers from the
drop down list.
3. Create a security group called Faculty Use Only Computers under Custom
Security Groups Organization Unit (OU).
4. Under Server Manager, click on Tools and select Group Policy Management
from the drop down list.
8. Name the new group policy Faculty Use Only Computers and click OK.
9. Expand Group Policy Objects and select the newly created Faculty Use Only
Computers policy.
10. In the right-hand pane, click on the Scope tab. Under Security Filtering list,
select Authenticated Users and then click the Remove button.
11. Click the Add button, enter the group name Faculty Use Only Computers and
then click the OK.
12. Right-click on the newly created Faculty Use Only Computers policy and
select Edit.
13. Expand Computer Configuration > Policies > Windows Settings > Security
Settings > Local Policies and select User Rights Assignment.
16. Click the Add User or Group button and add Domain Admins,
Administrators, and Faculty to the list. Click Apply and OK.
17. Close the Group Policy Management Editor and link the policy to Faculty
Workstations OU.
**Once this policy is created and applied, add computers to the Faculty Use
Only Computers security group to apply the policy. A reboot is required
after the computer is added to and removed from the group to
enforce/remove the policy.
Syntax
Gpupdate [/target:{computer|user}] [/force] [/wait:value] [/logoff] [/boot]
Parameters
/target:{computer|user}
Processes only the computer settings or the current user settings. By default,
both the computer settings and the user settings are processed.
/force
Ignores all processing optimizations and reapplies all settings. The Group Policy
engine on the client tracks versions of the GPOs that are applied to the user and
Examples
The following examples show how you can use the gpupdate command:
• gpupdate
• gpupdate /target:computer
• gpupdate /force /wait:100
• gpupdate /boot
A new feature introduced with Windows Server 2022 is that from within the Group
Policy Management Console. The update process also notifies how many computer
objects will be affected by the update operation.
2. To check & verify applied group policy’s, expand Computer & User
Configurations
To turn off the Shutdown Event Tracker, navigate to the following key in your registry:
HKLM\SOFTWARE\Policies\Microsoft\Windows NT\Reliability
• First, locate your PDC Server. Open command prompt on any server and type:
• Make your PDC a reliable time source for the clients. Type:
• The windows time service should begin synchronizing the time. You can check
the external NTP servers in the time configuration by typing:
Check Active Directory objects replication between these two Domain Controller.
2. Click on Tools and select Active Directory Sites and Services from the drop-
down list.
Active Directory sites and services is a primary console used to replicate the AD
objects between the Domain Controllers. We can also manage the objects
represent the sites and servers which reside in those sites. Site links are
automatically created as and when we add any new Domain Controller in our
environment.
5. It opens the confirmation dialogue box which tells that Active Directory
Domain Services are replicated the connections. Click on OK. If you see any error
or if Additional Domain Controller is recently promoted, then you need to wait
for some time (about 30 minutes if intra-site and about two to four hours if
inter-site) before you try to do forceful AD replication.
2. The first command that we are run is “Repadmin /replsummary” to check the
current replication health between the domain controllers. The “/replsummary”
operation quickly and concisely summarizes replication state and relative health
of a forest.
**After running the command, it shows some information which was in two
parts – Source DSA and Destination DSA.
**By running the command, we are forcing DCs to check if new Domain
Controller is found in the environment and if yes then add connection to
the same.
**The replication tools listed above are used to check AD replication and to
Replicate AD using GUI mode and from command prompt.
2. Run Command
dcdiag
1. From another Domain Controller within the domain, open a command prompt
and type ADSIEDIT.MSC
4. Navigate to
Configuration\CN=Configuration\CN=Sites\CN=<SiteName>\CN=Servers\CN=<Se
rverName>, where <SiteName> and <ServerName> corresponds to the location
of the dead domain controller.
5. Right-Click on CN=NTDS Settings and click Delete, when prompted to delete the
container and everything in it, click Yes.
6. Right-Click CN=Server Name that you are removing and click Delete. Click Yes to
confirm the delete.
Arkansas Department of Information Systems – APSCN LAN Support
Printed on 5/14/2024
90 | P a g e
REMOVING THE SERVER FROM THE FILE REPLICATION SERVICE
7. In the ADSI Edit window, click on ADSI Edit in the left-hand pane.
9. In the Select a Well Known Naming Context drop-down menu, select Default
naming context, and click OK.
15. Expand the AD Site that the dead Domain Controller was a member of.
22. Browse to the Domain Controller Computer object, right-click and select Delete.
25. Check the box next to “This Domain Controller is permanent...” and click Delete.
**DNS may need to be verified to make sure that there are not any records tied to the
server that was removed from the domain.
To seize the FSMO roles by using the Ntdsutil utility, follow these steps:
**It is recommend that you log on to the domain controller that you are assigning
FSMO roles to.
• Open the Command Prompt utility by moving your mouse over the bottom-left
Windows Key or click Keyboard Key and type cmd, run as a administrator
and press Enter
• On the Command Prompt type ntdsutil, and then click ENTER.
**Servername is the name of the domain controller FSMO role is being transferred to.
• Type seize role, where role is the role that you want to seize.
**For a list of roles that you can seize, type ? at the fsmo maintenance prompt, and
then press ENTER, or see the list of roles at the end of this section. For example, to
seize the RID master role, type seize rid master. The one exception is for the PDC
emulator role, whose syntax is seize pdc, not seize pdc emulator.
24. Click, Start, click Run, type ntdsutil, and then click OK.
26. At the DSRM command prompt, type one of the following lines:
a. To reset the password on the server on which you are working, type:
**The null variable assumes that the DSRM password is being reset on the local
computer. Type the new password when you are prompted.
**where servername is the DNS name for the server on which you are resetting the
DSRM password.
3. Install at least 8Gb USB Drive / Blank Dual Layer DVD-R into computer.
4. Open Software & Configure Options and Click Start to copy ISO to USB / DVD
• Configure Boot Selection – Choose the downloaded Windows Server
2022 iso file
• Configure Partition select Scheme GPT
• Configure Target System select UEFI (non CSM)
• File System – select NTFS
5. After Completion, Install USB Drive / DVD Disc into Server, and boot to drive.
**Must Disable Secure Boot in Server Bios to Install Software
4. Create a variable for the file location on computer (windows server 2022 iso)
$isopath = 'C:\Users\Public\Downloads\WindowsServer2022.iso'
5. Open the Powershell utility by moving your mouse over the bottom-left
Windows Key or click Keyboard Key and type powershell, run as a
administrator and press Enter
** Before we can format the USB drive, we need to establish the disk number
Windows has assigned it. Run the command below to list all the USB drives
attached to your computer:
6. Run Command
Get-Disk | Where-Object BusType -eq USB | Format-Table -AutoSize
** I know that my USB drive is called ‘Patriot Memory’, so it is disk number ‘2’.
Let’s create an object ($usb) for disk ‘2’. You should replace -eq 2 with the
number of your USB drive.
7. Run Command
$usb = Get-Disk | Where-Object Number -eq 2
**Now, we’re going to delete all the data on the USB drive using Clear-Disk. Type
Y and press ENTER to confirm you want to delete all data on the drive. This is a
good time to double-check that you have the correct disk number!
8. Run Command
$usb | Clear-Disk -RemoveData
12. Copy the Windows Server 2022 media files to the USB drive
**Now that we have configured the USB drive so that it can be used to boot our
server hardware, all that’s left to do is copy the Windows Server media files to
the USB drive. Let’s start by mounting the downloaded Windows Server .iso file
to a drive in Windows
18. Now, let’s copy the two new files, install.swm and install2.swm, to our USB drive:
22. After Completion, Install USB Drive into Server, and boot to drive.
**Must Disable Secure Boot in Server Bios to Install Software
2. Under Select installation type, click Next. Under Select destination server,
select the server, and then click Next.
3. Under Select server roles, click Next. Under Select features, select Windows
Server Backup, and then click Next
Start a manual backup whenever you feel that a copy of your system is required, for
instance, when you are planning major changes.
2. Click Tools in the top right corner of the window, and then select Windows
Server Backup.
4. Under Backup Options, select Different options, and click Next. Choose this
option if you have not created a scheduled backup or want to specify a location
or items for this backup that are different from the scheduled backup.
2. Click Tools in the top right corner of the window and select Windows Server
Backup.
6. Under How often and when you want to run backups, click Once a day, pick a
time, and then click Next. You can also choose whether you want to run a
backup more than once a day.
*Note that you use a remote shared folder as the storage destination for
scheduled backups. Each backup will erase the previous backup, and only the
latest backup will be available.
8. Under Specify Remote Share Folder, add a remote location, and click Next.
*Note: To schedule backups, you will need to provide usernames and
passwords.
*Note: Do not use the administrator account & password, create a backup
service user account in active directory and set the password not to expire.
Example (sabackup)
10. Click Close to close the window. You will see that a new scheduled backup is
configured on the server.
In case of any issues with your Windows Server, you will need to restore your data. I'll
show you how to restore the system image backup (full backup). You can apply the
same procedure to other backups as well.
2. Click Tools in the top right corner of the window, and then select Window Server
Backup
4. Under Getting Started, select the location where the backup is stored, and click
Next. As I did a backup to a remote location, I'll choose A backup stored on
another location.
Arkansas Department of Information Systems – APSCN LAN Support
Printed on 5/14/2024
107 | P a g e
5. Under Specify Location Type, select the location type, and click Next. In my case
it is a Remote shared folder.
6. Under Specify Remote Folder, type the backup path, and click Next
8. Under Select Recovery Type, select what you want to recover, and click Next.
You can choose files and folders, volumes, applications, and system states.
10. Under Choose Recovery Options, select the recovery destination, and click
Next.
Arkansas Department of Information Systems – APSCN LAN Support
Printed on 5/14/2024
110 | P a g e
11. Confirm by clicking Recover
12. You're done. Go to the location where you restored the data and access it.
Windows Server Backup is a native backup feature integrated into Windows Server
2022 and lower. It includes basic backup functionalities and helps you manually
Backup DHCP Scopes – Exporting & Importing DHCP Scopes (CMD) Netsh
This will tell you how to export or import a copy of a DHCP database. This is handy
for backups or moving to a new server.
*Note – If you have multiple DHCP Scopes and VLAN’s this is a recommended
practice to backup DHCP databases
4. Then press enter. You can change the path and filename to suit your needs.
1. Login to the new DHCP server, statically assign ip address, open server manager
console, click on Add Roles and install the DHCP role.
2. To add DHCP using Server Manager, select Add Roles and Features, and then
select DHCP in the Roles list.
3. To add the DHCP role using the command line, open Windows PowerShell (PS)
(Admin), and type the following cmdlet:
*Note: Since we are importing a database, don’t configure any settings after
installing DHCP role
*Note: Do not import the database onto the new server until you have gone to
your old DHCP server and either disabled the DHCP Server service, deactivated
the scopes or Unauthorized it.
Arkansas Department of Information Systems – APSCN LAN Support
Printed on 5/14/2024
113 | P a g e
5. Login to the DHCP server with appropriate credentials
7. Type Command netsh dhcp server import c:\dhcp.txt all, then press enter
You can change the path and filename to whatever you are using. Make sure to
copy the file you exported to the root of C: on the new server.
9. Open DHCP Console and verify that the scopes have been imported successfully.
You may have to refresh console and verify all network adapter bindings, that
the server has been authorized and scope options are correct.
https://learn.microsoft.com/en-gb/lifecycle/
http://support.microsoft.com/default.aspx?scid=kb;en-us;322672
This product contains graphics filter software; this software is based, in part, on the
work of the Independent JPEG Group.