Two Ways to Configure Windows 10 Automatic Login

July 28th, 2022 | Tags:

使用高级用户账户控制面板

1在运行中执行 netplwiz 命令

2此时将自动打开「高级用户账户控制面板」，在此你可以选中需要自动登录的账户名称 — 取消勾选「要使用本计算机，用户必需输入用户名和密码」选项 — 点击「应用」

3在点击「应用」后会自动弹出「自动登录」窗口，在这里输入账户的密码以便在 Windows 10 自动登录时使用。

How to add multiple NTP servers in Windows

July 5th, 2022 | Tags: ,

Neither the Windows Settings app nor the Control Panel will let you configure multiple time-servers in Windows. You’ll need to execute some commands in the Command Prompt to get this set up. I’ll walk you through the whole process:

1. Open an administrative Command Prompt by searching for “cmd” in the Start menu, right-clicking on the program, and choosing “Run as administrator”.
2. Ensure that the time service is currently running by stopping and starting it by entering following command and pressing Enter:
3. Configure your list of preferred time-servers by listing their IP or DNS addresses within the quotation marks in the following command; separating multiple servers with spaces:

The above example configures Windows to use time-servers operated by the NTP Pool Project, Microsoft, Apple, and Cloudflare. Note that there shouldn’t be any line breaks in the command; it’s all on one line.

1. Lastly, we’ll tell Windows to resynchronize its time against the newly configured time-servers and finally show the new configuration to confirm that everything is working:

Note that these changes won’t show up if you go to inspect your internet time configuration in the Time and Date section of the Control Panel. You shouldn’t make any changes there to avoid overwriting your manual configuration.

Using Powershell to Set DNS on remote machines

June 17th, 2022 | Tags: ,
$computer = Get-Content "c:\users\path\to\my.csv" Foreach($computer in $computer){$NICs = Get-WMIObject Win32_NetworkAdapterConfiguration -computername $computer |where{$_.IPEnabled -eq “TRUE”}
}
Foreach($NIC in$NICs) {
$DNSServers = “8.8.8.8",”192.168.40.119" # set dns servers here$NIC.SetDNSServerSearchOrder($DNSServers)$NIC.SetDynamicDNSRegistration(“TRUE”)
}

$computer = Get-Content "c:\users\path\to\my.csv"$NICs = Get-WMIObject Win32_NetworkAdapterConfiguration -computername $computer |where{$_.IPEnabled -eq “TRUE”}
Foreach($NIC in$NICs) {
$DNSServers = “8.8.8.8",”192.168.40.119"$NIC.SetDNSServerSearchOrder($DNSServers)$NIC.SetDynamicDNSRegistration(“TRUE”)
}


Configure the Server Certificate Template

June 14th, 2022 | Tags:

To configure the certificate template

1. On CA1, in Server Manager, click Tools, and then click Certification Authority. The Certification Authority Microsoft Management Console (MMC) opens.
2. In the MMC, double-click the CA name, right-click Certificate Templates, and then click Manage.
3. The Certificate Templates console opens. All of the certificate templates are displayed in the details pane.
4. In the details pane, click the RAS and IAS Server template.
5. Click the Action menu, and then click Duplicate Template. The template Properties dialog box opens.
6. Click the Security tab.
7. On the Security tab, in Group or user names, click RAS and IAS servers.
8. In Permissions for RAS and IAS servers, under Allow, ensure that Enroll is selected, and then select the Autoenroll check box. Click OK, and close the Certificate Templates MMC.
9. In the Certification Authority MMC, click Certificate Templates. On the Action menu, point to New, and then click Certificate Template to Issue. The Enable Certificate Templates dialog box opens.
10. In Enable Certificate Templates, click the name of the certificate template that you just configured, and then click OK. For example, if you did not change the default certificate template name, click Copy of RAS and IAS Server, and then click OK.

Configure certificate auto-enrollment

June 14th, 2022 | Tags:

Before you perform this procedure, you must configure a server certificate template by using the Certificate Templates Microsoft Management Console snap-in on a CA that is running AD CS. Membership in both the Enterprise Admins and the root domain’s Domain Admins group is the minimum required to complete this procedure.

June 3rd, 2022 | Tags:

We need to confirm the following before we go ahead with the Microsoft LAPS configuration.

1. Client operating systems – Windows Server 2019, Windows Server 2016, Windows 10, Windows Server 2012 R2, Windows Server 2012, Windows Server 2008 R2, Windows Server 2008, Windows Server 2003, Windows 7, Windows 8, Windows Vista, Windows 8.1
2. Active Directory – Windows Server 2003 SP1 or later
3. Management Tools – PowerShell 2.0 or later, .Net Framework 4.0 or later

Installing Microsoft LAPS

The next step of the configuration is to install Microsoft LAPS. To do that,

Windows Server 2019 Remote Desktop Services Configuration and Licensing Activation

June 3rd, 2022 | Tags:

Server 2019默认远程桌面连接数是2个用户，如果多余两个用户进行远程桌面连接时，系统就会提示超过连接数，可以通过添加远程桌面授权解决：

1.添加远程桌面授权服务

• 第一步：服务器管理 – 添加角色和功能打开添加角色和功能向导窗口，选择基于角色或给予功能安装：
• 第二步：添加远程桌面会话主机和远程桌面授权功能：

How to seize the Operations Master Role

June 3rd, 2022 | Tags:

Migrating The Active Directory Certificate Service From Windows Server 2008 R2 to 2019 with different FQDN name

June 3rd, 2022 | Tags:

Step 1: Backup Windows Server 2008 R2 certificate authority database and its configuration

2. Go to Start > Administrative Tools > Certificate Authority
3. Right Click on Server Node > All Tasks > Backup CA

Certification Authority Backup CA
4. Click Next on the Certification Authority Backup Wizard screen
5. Click both check boxes to select both items to backup and provide the backup path for the file to be stored
Certification Authority Backup Wizard Item Selection
6. Click Next
7. Provide a password to protect private key and CA certificate file and click on next to continue
8. Click Finish to complete the process

Step-By-Step: Migrating The Active Directory Certificate Service From Windows Server 2008 R2 to 2019

June 3rd, 2022 | Tags: