Skip to content

Commit d3e001f

Browse files
authoredJan 10, 2020
Merge branch 'live' into master
2 parents 9effc7b + 3d5a835 commit d3e001f

File tree

13 files changed

+68
-27
lines changed

13 files changed

+68
-27
lines changed
 

‎WindowsServerDocs/administration/windows-commands/secedit-generaterollback.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ Allows you to generate a rollback template for a specified configuration templat
2424
## Syntax
2525

2626
```
27-
Secedit /generaterollback /db <database file name> /cfg <configuration file name> /rbk <rollback template file name> [log <log file name>] [/quiet]
27+
Secedit /generaterollback /db <database file name> /cfg <configuration file name> /rbk <rollback template file name> [/log <log file name>] [/quiet]
2828
```
2929

3030
### Parameters

‎WindowsServerDocs/remote/remote-access/directaccess/single-server-wizard/da-basic-configure-s1-infrastructure.md

+4-1
Original file line numberDiff line numberDiff line change
@@ -202,7 +202,10 @@ To create a Group policy object, see [Create and Edit a Group Policy Object](htt
202202
> 4. If the linking to OU has not been done before running the DirectAccess wizard, after the configuration is complete, the administrator can link the DirectAccess Group Policy Objects to the required Organizational Units. The link to the domain can be removed. Steps for linking a Group policy object to an Organization Unit can be found [here](https://technet.microsoft.com/library/cc732979.aspx)
203203
204204
> [!NOTE]
205-
> If a Group policy object was created manually, it is possible during the DirectAccess configuration that the Group policy object will not be available. The Group policy object may not have been replicated to the closest Domain Controller to the management computer. In this event, the administrator can wait for replication to complete, or force the replication.
205+
> If a Group policy object was created manually, it is possible during the DirectAccess configuration that the Group policy object will not be available. The Group policy object may not have been replicated to the closest Domain Controller to the management computer. In this event, the administrator can wait for replication to complete, or force the replication.
206+
207+
> [!Warning]
208+
> Using any means other than the DirectAccess Setup Wizard to configure DirectAccess, such as modifying DirectAccess Group Policy Objects directly or manually modifying the default policy settings on the server or client, is not supported.
206209
207210
## <a name="ConfigSGs"></a>Configure security groups
208211
The DirectAccess settings contained in the client computer Group policy objects are applied only to computers that are members of the security groups that you specify when configuring Remote Access.

‎WindowsServerDocs/security/group-managed-service-accounts/getting-started-with-group-managed-service-accounts.md

+16-12
Original file line numberDiff line numberDiff line change
@@ -141,27 +141,31 @@ You can create a gMSA only if the forest schema has been updated to Windows Ser
141141

142142
Membership in **Domain Admins**, **Account Operators** or ability to create msDS-GroupManagedServiceAccount objects, is the minimum required to complete the following procedures.
143143

144+
> [!NOTE]
145+
> A value for the -Name parameter is always required (whether you specify -Name or not), with -DNSHostName, -RestrictToSingleComputer, and -RestrictToOutboundAuthentication being secondary requirements for the three deployment scenarios.
146+
147+
144148
#### <a name="BKMK_CreateGMSA"></a>To create a gMSA using the New-ADServiceAccount cmdlet
145149

146150
1. On the Windows Server 2012 domain controller, run Windows PowerShell from the Taskbar.
147151

148152
2. At the command prompt for the Windows PowerShell, type the following commands, and then press ENTER. (The Active Directory module will load automatically.)
149153

150-
**New-ADServiceAccount [-Name] <string> -DNSHostName <string> [-KerberosEncryptionType <ADKerberosEncryptionType>] [-ManagedPasswordIntervalInDays <Nullable[Int32]>] [-PrincipalsAllowedToRetrieveManagedPassword <ADPrincipal[]>] -SamAccountName <string> -ServicePrincipalNames <string[]>**
154+
**New-ADServiceAccount [-Name] &lt;string&gt; -DNSHostName &lt;string&gt; [-KerberosEncryptionType &lt;ADKerberosEncryptionType&gt;] [-ManagedPasswordIntervalInDays <Nullable[Int32]>] [-PrincipalsAllowedToRetrieveManagedPassword <ADPrincipal[]>] [-SamAccountName &lt;string&gt;] [-ServicePrincipalNames <string[]>]**
151155

152156
|Parameter|String|Example|
153157
|-------|-----|------|
154158
|Name|Name of the account|ITFarm1|
155159
|DNSHostName|DNS host name of service|ITFarm1.contoso.com|
156-
|KerberosEncryptionType|Any encryption types supported by the host servers|RC4, AES128, AES256|
160+
|KerberosEncryptionType|Any encryption types supported by the host servers|None, RC4, AES128, AES256|
157161
|ManagedPasswordIntervalInDays|Password change interval in days (default is 30 days if not provided)|90|
158162
|PrincipalsAllowedToRetrieveManagedPassword|The computer accounts of the member hosts or the security group that the member hosts are a member of|ITFarmHosts|
159163
|SamAccountName|NetBIOS name for the service if not same as Name|ITFarm1|
160-
|ServicePrincipalNames|Service Principal Names (SPNs) for the service|http/ITFarm1.contoso.com/contoso.com, http/ITFarm1.contoso.com/contoso, http/ITFarm1/contoso.com, http/ITFarm1/contoso|
164+
|ServicePrincipalNames|Service Principal Names (SPNs) for the service|http/ITFarm1.contoso.com/contoso.com, http/ITFarm1.contoso.com/contoso, http/ITFarm1/contoso.com, http/ITFarm1/contoso, MSSQLSvc/ITFarm1.contoso.com:1433, MSSQLSvc/ITFarm1.contoso.com:INST01|
161165

162166
> [!IMPORTANT]
163167
> The password change interval can only be set during creation. If you need to change the interval, you must create a new gMSA and set it at creation time.
164-
168+
165169
**Example**
166170

167171
Enter the command on a single line, even though they might appear word-wrapped across several lines here because of formatting constraints.
@@ -178,7 +182,7 @@ Membership in **Domain Admins**, **Account Operators**, or ability to create msD
178182
179183
2. At the command prompt for the Windows PowerShell Active Directory module, type the following commands, and then press ENTER:
180184
181-
**New-ADServiceAccount [-Name] <string> -RestrictToOutboundAuthenticationOnly [-ManagedPasswordIntervalInDays <Nullable[Int32]>] [-PrincipalsAllowedToRetrieveManagedPassword <ADPrincipal[]>]**
185+
**New-ADServiceAccount [-Name] &lt;string&gt; -RestrictToOutboundAuthenticationOnly [-ManagedPasswordIntervalInDays <Nullable[Int32]>] [-PrincipalsAllowedToRetrieveManagedPassword <ADPrincipal[]>]**
182186
183187
|Parameter|String|Example|
184188
|-------|-----|------|
@@ -188,8 +192,8 @@ Membership in **Domain Admins**, **Account Operators**, or ability to create msD
188192
189193
> [!IMPORTANT]
190194
> The password change interval can only be set during creation. If you need to change the interval, you must create a new gMSA and set it at creation time.
191-
192-
**Example**
195+
196+
**Example**
193197
194198
```PowerShell
195199
New-ADServiceAccount ITFarm1 -RestrictToOutboundAuthenticationOnly - PrincipalsAllowedToRetrieveManagedPassword ITFarmHosts$
@@ -239,11 +243,11 @@ Membership in **Domain Admins**, **Account Operators**, or ability to manage msD
239243

240244
2. At the command prompt for the Windows PowerShell Active Directory module, type the following commands, and then press ENTER:
241245

242-
**Get-ADServiceAccount [-Name] <string> -PrincipalsAllowedToRetrieveManagedPassword**
246+
**Get-ADServiceAccount [-Name] &lt;string&gt; -PrincipalsAllowedToRetrieveManagedPassword**
243247

244248
3. At the command prompt for the Windows PowerShell Active Directory module, type the following commands, and then press ENTER:
245249

246-
**Set-ADServiceAccount [-Name] <string> -PrincipalsAllowedToRetrieveManagedPassword <ADPrincipal[]>**
250+
**Set-ADServiceAccount [-Name] &lt;string&gt; -PrincipalsAllowedToRetrieveManagedPassword <ADPrincipal[]>**
247251

248252
|Parameter|String|Example|
249253
|-------|-----|------|
@@ -297,11 +301,11 @@ Membership in **Domain Admins**, **Account Operators**, or ability to manage msD
297301

298302
2. At the command prompt for the Windows PowerShell Active Directory module, type the following commands, and then press ENTER:
299303

300-
**Get-ADServiceAccount [-Name] <string> -PrincipalsAllowedToRetrieveManagedPassword**
304+
**Get-ADServiceAccount [-Name] &lt;string&gt; -PrincipalsAllowedToRetrieveManagedPassword**
301305

302306
3. At the command prompt for the Windows PowerShell Active Directory module, type the following commands, and then press ENTER:
303307

304-
**Set-ADServiceAccount [-Name] <string> -PrincipalsAllowedToRetrieveManagedPassword <ADPrincipal[]>**
308+
**Set-ADServiceAccount [-Name] &lt;string&gt; -PrincipalsAllowedToRetrieveManagedPassword <ADPrincipal[]>**
305309

306310
|Parameter|String|Example|
307311
|-------|-----|------|
@@ -331,7 +335,7 @@ Membership in **Administrators**, or equivalent, is the minimum required to comp
331335

332336
2. At the command prompt for the Windows PowerShell Active Directory module, type the following commands, and then press ENTER:
333337

334-
**Uninstall-ADServiceAccount < ADServiceAccount>**
338+
**Uninstall-ADServiceAccount &lt;ADServiceAccount&gt;**
335339

336340
**Example**
337341

‎WindowsServerDocs/storage/storage-spaces/configure-azure-monitor.md

+46-12
Original file line numberDiff line numberDiff line change
@@ -3,14 +3,12 @@ title: Understand and Configure Azure Monitor
33
description: Detailed setup information on what Azure Monitor is and how to configure email and sms alerts for your storage spaces direct cluster in Windows Server 2016 and 2019.
44
keywords: Storage Spaces Direct,azure monitor, notifications, email, sms
55
ms.assetid:
6-
ms.prod:
6+
ms.prod: windows-server-threshold
77
ms.author: adagashe
88
ms.technology: storage-spaces
99
ms.topic: article
1010
author: adagashe
11-
ms.date: 3/26/2019
12-
ms.localizationpriority:
13-
---
11+
ms.date: 01/10/2020
1412
---
1513
# Use Azure Monitor to send emails for Health Service Faults
1614

@@ -43,7 +41,15 @@ All data collected by Azure Monitor fits into one of two fundamental types: metr
4341

4442
We will have more details below on how to configure these alerts.
4543

46-
## Configuring Health Service
44+
## Onboarding your cluster using Windows Admin Center
45+
46+
Using Windows Admin Center, you can onboard your cluster to Azure Monitor.
47+
48+
![Gif of onboarding cluster to Azure Monitor"](media/configure-azure-monitor/onboarding.gif)
49+
50+
During this onboarding flow, the steps below are happening under the hood. We detail how to configure them in detail in case you want to manually setup your cluster.
51+
52+
### Configuring Health Service
4753

4854
The first thing that you need to do is configure your cluster. As you may know, the [Health Service](../../failover-clustering/health-service-overview.md) improves the day-to-day monitoring and operational experience for clusters running Storage Spaces Direct.
4955

@@ -62,7 +68,7 @@ get-storagesubsystem clus* | Set-StorageHealthSetting -Name "Platform.ETW.MasTyp
6268

6369
When you run the cmdlet above to set the Health Settings, you cause the events we want to begin being written to the *Microsoft-Windows-Health/Operational* event channel.
6470

65-
## Configuring Log Analytics
71+
### Configuring Log Analytics
6672

6773
Now that you have setup the proper logging on your cluster, the next step is to properly configure log analytics.
6874

@@ -72,11 +78,11 @@ To understand the supported configuration, review [supported Windows operating s
7278

7379
If you don't have an Azure subscription, create a [free account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F) before you begin.
7480

75-
### Login in to Azure Portal
81+
#### Login in to Azure Portal
7682

7783
Log in to the Azure portal at [https://portal.azure.com](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
7884

79-
### Create a workspace
85+
#### Create a workspace
8086

8187
For more details on the steps listed below, see the [Azure Monitor documentation](https://docs.microsoft.com/azure/azure-monitor/learn/quick-collect-windows-computer).
8288

@@ -96,7 +102,7 @@ For more details on the steps listed below, see the [Azure Monitor documentation
96102

97103
While the information is verified and the workspace is created, you can track its progress under **Notifications** from the menu.
98104

99-
### Obtain workspace ID and key
105+
#### Obtain workspace ID and key
100106
Before installing the Microsoft Monitoring Agent for Windows, you need the workspace ID and key for your Log Analytics workspace. This information is required by the setup wizard to properly configure the agent and ensure it can successfully communicate with Log Analytics.
101107

102108
1. In the Azure portal, click **All services** found in the upper left-hand corner. In the list of resources, type **Log Analytics**. As you begin typing, the list filters based on your input. Select **Log Analytics**.
@@ -105,7 +111,7 @@ Before installing the Microsoft Monitoring Agent for Windows, you need the works
105111
4. Select **Connected Sources**, and then select **Windows Servers**.
106112
5. The value to the right of **Workspace ID** and **Primary Key**. Save both temporarily - copy and paste both into your favorite editor for the time being.
107113

108-
## Installing the agent on Windows
114+
### Installing the agent on Windows
109115
The following steps install and configure the Microsoft Monitoring Agent. **Be sure to install this agent on each server in your cluster and indicate that you want the agent to run at Windows Startup.**
110116

111117
1. On the **Windows Servers** page, select the appropriate **Download Windows Agent** version to download depending on the processor architecture of the Windows operating system.
@@ -127,7 +133,30 @@ When complete, the **Microsoft Monitoring Agent** appears in **Control Panel**.
127133

128134
To understand the supported configuration, review [supported Windows operating systems](https://docs.microsoft.com/azure/azure-monitor/platform/log-analytics-agent#supported-windows-operating-systems) and [network firewall configuration](https://docs.microsoft.com/azure/azure-monitor/platform/log-analytics-agent#network-firewall-requirements).
129135

130-
## Collecting event and performance data
136+
## Setting up alerts using Windows Admin Center
137+
138+
In Windows Admin Center, you can configure default alerts that will apply to all servers in your Log Analytics workspace.
139+
140+
![Gif of setting up alerts"](media/configure-azure-monitor/setup1.gif)
141+
142+
These are the alerts and their default conditions that you can opt into:
143+
144+
| Alert Name | Default Condition |
145+
|---------------------------|----------------------------------------------------|
146+
| CPU utilization | Over 85% for 10 minutes |
147+
| Disk capacity utilization | Over 85% for 10 minutes |
148+
| Memory utilization | Available memory less than 100 MB for 10 minutes |
149+
| Heartbeat | Fewer than 2 beats for 5 minutes |
150+
| System critical error | Any critical alert in the cluster system event log |
151+
| Health service alert | Any health service fault on the cluster |
152+
153+
Once you configure the alerts in Windows Admin Center, you can see the alerts in your log analytics workspace in Azure.
154+
155+
![Gif of setting up alerts"](media/configure-azure-monitor/setup2.gif)
156+
157+
During this onboarding flow, the steps below are happening under the hood. We detail how to configure them in detail in case you want to manually setup your cluster.
158+
159+
### Collecting event and performance data
131160

132161
Log Analytics can collect events from the Windows event log and performance counters that you specify for longer term analysis and reporting, and take action when a particular condition is detected. Follow these steps to configure collection of events from the Windows event log, and several common performance counters to start with.
133162

@@ -207,11 +236,16 @@ Now, let's walk through an example for creating an alert.
207236

208237
### Example alert
209238

210-
For reference, this is what an example alert looks like:
239+
For reference, this is what an example alert looks like in Azure.
240+
241+
![Gif of alert in Azure](media/configure-azure-monitor/alert.gif)
242+
243+
Below is an example of the email that you will be send by Azure Monitor:
211244

212245
![Alert email example](media/configure-azure-monitor/warning.png)
213246

214247
## See also
215248

216249
- [Storage Spaces Direct overview](storage-spaces-direct-overview.md)
217250
- For more detailed information, read the [Azure Monitor documentation](https://docs.microsoft.com/azure/azure-monitor/learn/tutorial-viewdata).
251+
- Read this for an overview on how to [connect to other Azure hybrid services](../../manage/windows-admin-center/azure/index.md).
Loading
Binary file not shown.
Loading
Loading
Loading

‎WindowsServerDocs/virtualization/hyper-v/Supported-CentOS-and-Red-Hat-Enterprise-Linux-virtual-machines-on-Hyper-V.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -93,7 +93,7 @@ In this section:
9393
This series only has 64-bit kernels.
9494

9595

96-
| **Feature** | **Windows Server version** | **7.5-7.6** | **7.3-7.4** | **7.0-7.2** | **7.5-7.6** | **7.4** | **7.3** | **7.2** | **7.1** | **7.0** |
96+
| **Feature** | **Windows Server version** | **7.5-7.7** | **7.3-7.4** | **7.0-7.2** | **7.5-7.7** | **7.4** | **7.3** | **7.2** | **7.1** | **7.0** |
9797
|----------------------------------------------------------------------------------------------------------------------------------------------|------------------------------------|---------------------------------------------------------------------|---------------------------------------------------------------------|---------------------------------------------------------------------|---------------------|---------------------|---------------------|---------------------|---------------------|------------------------|
9898
| **Availability** | | [LIS 4.3](https://www.microsoft.com/download/details.aspx?id=55106) | [LIS 4.3](https://www.microsoft.com/download/details.aspx?id=55106) | [LIS 4.3](https://www.microsoft.com/download/details.aspx?id=55106) | Built in | Built in | Built in | Built in | Built in | Built in |
9999
| **[Core](Feature-Descriptions-for-Linux-and-FreeBSD-virtual-machines-on-Hyper-V.md#core)** | 2019, 2016, 2012 R2, 2012, 2008 R2 | &#10004; | &#10004; | &#10004; | &#10004; | &#10004; | &#10004; | &#10004; | &#10004; | &#10004; |

0 commit comments

Comments
 (0)
Please sign in to comment.