Monday 5 November 2012

Installing Active Directory on Windows Server 2012 Core

Microsoft has indeed made installing roles and features a great ease. To install Active Directory on Serve Core 2012 we must first configure the server to promote it to a domain by using the sconfig command.


The next step is to prepare our unattended file for Active Directory.


Our next step is run the unattended file to install Active Directory and DNS.



The Active Directory installation will run and install DNS.



As the installation runs normal Active Directory install and securing will take place.


Once completed depending on your unattended file the system will reboot if yes was selected in your answer file.


Once restarted the next step is to enable remote management to manage the Server Core from your Windows 8 Client. Using the sconfig command enter the remote management option by pressing 4 and then 1 to enable remote management.



To manage Active Directory from your Windows 8 client the next step is first join the Windows 8 client to the domain then install the Remote Server and Administration Tool (RSAT) for Windows 8. RSAT for Windows can be downloaded here.



Once RSAT is installed. Depending on your network needs you can turn on and off features to manage from your Windows 8 Client. By default all RSAT features are turned on for server roles and features.



From the Metro UI you can now access Server Manager and Administrative Tools to manage your network.



In Server Manager select manage then add the server you would like to manage.





Once the server is added that you would like to manage. Select tools to choose the role or feature you would like to manage.



Now you can manage and configure Active Directory on Server Core 2012 from your Windows 8 Client.

Branch Cache in win 8

BranchCache is a Windows feature origially introduced in Windows 7 and Windows 2008.

BranchCache feature enables files and content from file servers and Web servers on a wide area network (WAN) to be cached on the computers at a branch offices. BranchCache is helpful to improve application response time and reduce WAN traffic by allowing access to files from local cache instead of accessing it from the head office for each request. Cached content can either be distributed across peer client computers (distributed cache mode) or centrally hosted on a server (hosted cache mode).

Windows 8 BranchCache feature

Work in a branch office with BranchCache feature in Windows 8

Windows 8 further enhances the features and capabilities of BranchCache.


BrachCache feature allow Windows applications that use network protocols to cache files and content locally from the remote servers. Since files are stored locally, it will reduce application response time and also reduce the network traffic by avoiding using WAN to get the files. This helps users in remote locations to be more productive and experience faster response time for their network applications.

The enhancements to BranchCache feature in Windows 8 consumer preview streamline the deployment process. Also, it optimizes bandwidth over WAN connections between content servers and remote client computers. With the new enhanced BranchCache feature in Windows 8, remote computers can now access data and files and run applications in a more secure, efficient, and scalable way.

Performance is improved in BranchCache by reducing data transfer size requirements through cache encryption, using data de-duplication, and minimizing cache block sizes. BranchCache can now scale to the requirements of any large or small enterprises and allow deploying hosted cache servers as many as they want. The new database and storage technologies used with Windows 8 BranchCache make it more scalable, secure and faster.

Read Windows 8 Consumer Preview Guide for additional information on Windows 8 BranchCache enhancements.

Five Group Policy Preferences that replace Windows logon scripts


Are you still using Windows logon scripts? They’re no longer the Windows administrator’s necessary evil for desktop configuration control. These days, Group Policy Preferences can accomplish virtually anything a logon script can do.

Here are five Group Policy Preferences (GPPs) that’ll get you off the scripts and onto complete configuration control.

Drive Maps

Many IT shops still use logon scripts solely because of their ability to map drives to shares. Until GPPs came around, logon scripts were the easiest way to associate those drives with specific users and groups. Logon scripts execute as the user logs on, so adding a net use into that script makes it so H: drives map to home folders and S: drives to shared ones. Add in a little conditional script logic, and you can map drives based on each user’s identity.
Drive Maps are a GPP found under a Group Policy Object’s User Configuration half. Creating yours there enables the same mapping of drives to users, but without all the nasty scripting.

Environment variables

Not every user needs environment variables set, nor does every application. Therefore, many logon scripts required some fairly complex logic to confirm variables were set based on user, machine, and even application.
GPPs greatly simplify this process. Found in a GPO’s Computer Configuration half, environment variables can be configured on a per-machine basis. Even better, by tagging each GPP with the File Match item-level targeting, you can ensure an environment variable is only applied to computers containing the application that needs them.

Files

Ever have to work with an application whose settings are stored not in the registry, but in one or more files? There are still plenty of applications around that use files for storing their entire-machine and specific-user information. Files are great because they’re easy to work with, but they can be hard when multiple users need configurations on multiple machines.
The “preferences” in Group Policy Preferences highlights the fact that GPPs don't have to be enforced. It is entirely possible (and encouraged!) to use GPPs for defining a user’s or an application’s initial configuration. Once that initial configuration is set, users can then make whatever changes suit their needs.
Files are a GPP found in either half of a GPO. This GPP enables you to copy files from a source to destination location. They’re absolutely useful for copying files for those applications that need them. Just create your initial configuration, add that file to a GPP, and see it automatically distribute out to any relevant computer. Check the box for Apply once and do not reapply under the GPP’s Common tab if you want to give users the preference and not the policy.

Registry

While there remain some apps that store configurations in files, the vast majority of them today use the Windows registry. Back before GPPs, making registry changes was notoriously difficult, especially if they were to the HKEY_CURRENT_USER hive.
GPPs once again come to the rescue for locking down (or suggesting) application configurations, across both HKEY_LOCAL_MACHINE and HKEY_CURRENT_USER. In a GPO you’ll find Registry GPP support in both the Computer and User Configuration halves. You can guess which hive each half corresponds to.

More on Group Policy Preferences

Five Group Policy Preferences you must implement right now
Five Group Policy improvements in Windows Server 2012
Configuring applications in Windows with Group Policy preferences
Often, however, the hardest part of controlling registry values is merely finding them. The software packager tool can help. Many software packagers do their work by analyzing two snapshots of a system, one before the application and another after it completes. By looking for what’s different between these two snapshots, the packager can identify what files and registry keys were changed by an installation.
You can use that same process to figure out which registry value an application setting corresponds to. The trick: Do the initial snapshot with the application already installed. Change the application setting, and then do the second snapshot. Whatever changed is what you’ll enter into the Registry GPP.

Printers

You think you’re smart because you’ve published your printers into your Active Directory, but even the most well-documented (and well-named) printer structure can still confuse users. Why not map whatever printer is closest to them, automatically?
You can with Printers in a GPP, linked with either the Computer or User half of a GPO. You’ll also need the aid of some setting on each computer that identifies where that computer lives. A common one is its subnet.
If your network engineers have laid out subnets by location, you can use that network in a GPP’s Item-Level Targeting. Just add it as an IP Address Range, and the next time users log in they’ll automatically attach to their closest printer.
GPPs aren’t even new technology. They’ve been around since the release of Windows Server 2008. They’re stable, they’re easy to use, and they’re a technology you already have on-hand. No extra software (or budget) needed.
If you haven’t spent much time with this incredibly useful administrative solution, give them another look. Coupled with their Item-Level Targeting, they’re a great way to finally eliminate those nasty logon scripts forever.












Source:-http://searchwindowsserver.techtarget.com/tip/Five-Group-Policy-Preferences-that-replace-Windows-logon-scripts?utm_medium=EM&asrc=EM_ERU_19400615&