You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: WindowsServerDocs/remote/remote-access/directaccess/single-server-wizard/da-basic-configure-s1-infrastructure.md
+4-1
Original file line number
Diff line number
Diff line change
@@ -202,7 +202,10 @@ To create a Group policy object, see [Create and Edit a Group Policy Object](htt
202
202
> 4. If the linking to OU has not been done before running the DirectAccess wizard, after the configuration is complete, the administrator can link the DirectAccess Group Policy Objects to the required Organizational Units. The link to the domain can be removed. Steps for linking a Group policy object to an Organization Unit can be found [here](https://technet.microsoft.com/library/cc732979.aspx)
203
203
204
204
> [!NOTE]
205
-
> If a Group policy object was created manually, it is possible during the DirectAccess configuration that the Group policy object will not be available. The Group policy object may not have been replicated to the closest Domain Controller to the management computer. In this event, the administrator can wait for replication to complete, or force the replication.
205
+
> If a Group policy object was created manually, it is possible during the DirectAccess configuration that the Group policy object will not be available. The Group policy object may not have been replicated to the closest Domain Controller to the management computer. In this event, the administrator can wait for replication to complete, or force the replication.
206
+
207
+
> [!Warning]
208
+
> Using any means other than the DirectAccess Setup Wizard to configure DirectAccess, such as modifying DirectAccess Group Policy Objects directly or manually modifying the default policy settings on the server or client, is not supported.
206
209
207
210
## <aname="ConfigSGs"></a>Configure security groups
208
211
The DirectAccess settings contained in the client computer Group policy objects are applied only to computers that are members of the security groups that you specify when configuring Remote Access.
Copy file name to clipboardexpand all lines: WindowsServerDocs/security/group-managed-service-accounts/getting-started-with-group-managed-service-accounts.md
+16-12
Original file line number
Diff line number
Diff line change
@@ -141,27 +141,31 @@ You can create a gMSA only if the forest schema has been updated to Windows Ser
141
141
142
142
Membership in **Domain Admins**, **Account Operators** or ability to create msDS-GroupManagedServiceAccount objects, is the minimum required to complete the following procedures.
143
143
144
+
> [!NOTE]
145
+
> A value for the -Name parameter is always required (whether you specify -Name or not), with -DNSHostName, -RestrictToSingleComputer, and -RestrictToOutboundAuthentication being secondary requirements for the three deployment scenarios.
146
+
147
+
144
148
#### <aname="BKMK_CreateGMSA"></a>To create a gMSA using the New-ADServiceAccount cmdlet
145
149
146
150
1. On the Windows Server 2012 domain controller, run Windows PowerShell from the Taskbar.
147
151
148
152
2. At the command prompt for the Windows PowerShell, type the following commands, and then press ENTER. (The Active Directory module will load automatically.)
|DNSHostName|DNS host name of service|ITFarm1.contoso.com|
156
-
|KerberosEncryptionType|Any encryption types supported by the host servers|RC4, AES128, AES256|
160
+
|KerberosEncryptionType|Any encryption types supported by the host servers|None, RC4, AES128, AES256|
157
161
|ManagedPasswordIntervalInDays|Password change interval in days (default is 30 days if not provided)|90|
158
162
|PrincipalsAllowedToRetrieveManagedPassword|The computer accounts of the member hosts or the security group that the member hosts are a member of|ITFarmHosts|
159
163
|SamAccountName|NetBIOS name for the service if not same as Name|ITFarm1|
160
-
|ServicePrincipalNames|Service Principal Names (SPNs) for the service|http/ITFarm1.contoso.com/contoso.com, http/ITFarm1.contoso.com/contoso, http/ITFarm1/contoso.com, http/ITFarm1/contoso|
164
+
|ServicePrincipalNames|Service Principal Names (SPNs) for the service|http/ITFarm1.contoso.com/contoso.com, http/ITFarm1.contoso.com/contoso, http/ITFarm1/contoso.com, http/ITFarm1/contoso, MSSQLSvc/ITFarm1.contoso.com:1433, MSSQLSvc/ITFarm1.contoso.com:INST01|
161
165
162
166
> [!IMPORTANT]
163
167
> The password change interval can only be set during creation. If you need to change the interval, you must create a new gMSA and set it at creation time.
164
-
168
+
165
169
**Example**
166
170
167
171
Enter the command on a single line, even though they might appear word-wrapped across several lines here because of formatting constraints.
@@ -178,7 +182,7 @@ Membership in **Domain Admins**, **Account Operators**, or ability to create msD
178
182
179
183
2. At the command prompt for the Windows PowerShell Active Directory module, type the following commands, and then press ENTER:
@@ -188,8 +192,8 @@ Membership in **Domain Admins**, **Account Operators**, or ability to create msD
188
192
189
193
> [!IMPORTANT]
190
194
> The password change interval can only be set during creation. If you need to change the interval, you must create a new gMSA and set it at creation time.
Copy file name to clipboardexpand all lines: WindowsServerDocs/storage/storage-spaces/configure-azure-monitor.md
+46-12
Original file line number
Diff line number
Diff line change
@@ -3,14 +3,12 @@ title: Understand and Configure Azure Monitor
3
3
description: Detailed setup information on what Azure Monitor is and how to configure email and sms alerts for your storage spaces direct cluster in Windows Server 2016 and 2019.
# Use Azure Monitor to send emails for Health Service Faults
16
14
@@ -43,7 +41,15 @@ All data collected by Azure Monitor fits into one of two fundamental types: metr
43
41
44
42
We will have more details below on how to configure these alerts.
45
43
46
-
## Configuring Health Service
44
+
## Onboarding your cluster using Windows Admin Center
45
+
46
+
Using Windows Admin Center, you can onboard your cluster to Azure Monitor.
47
+
48
+

49
+
50
+
During this onboarding flow, the steps below are happening under the hood. We detail how to configure them in detail in case you want to manually setup your cluster.
51
+
52
+
### Configuring Health Service
47
53
48
54
The first thing that you need to do is configure your cluster. As you may know, the [Health Service](../../failover-clustering/health-service-overview.md) improves the day-to-day monitoring and operational experience for clusters running Storage Spaces Direct.
When you run the cmdlet above to set the Health Settings, you cause the events we want to begin being written to the *Microsoft-Windows-Health/Operational* event channel.
64
70
65
-
## Configuring Log Analytics
71
+
###Configuring Log Analytics
66
72
67
73
Now that you have setup the proper logging on your cluster, the next step is to properly configure log analytics.
68
74
@@ -72,11 +78,11 @@ To understand the supported configuration, review [supported Windows operating s
72
78
73
79
If you don't have an Azure subscription, create a [free account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F) before you begin.
74
80
75
-
### Login in to Azure Portal
81
+
####Login in to Azure Portal
76
82
77
83
Log in to the Azure portal at [https://portal.azure.com](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
78
84
79
-
### Create a workspace
85
+
####Create a workspace
80
86
81
87
For more details on the steps listed below, see the [Azure Monitor documentation](https://docs.microsoft.com/azure/azure-monitor/learn/quick-collect-windows-computer).
82
88
@@ -96,7 +102,7 @@ For more details on the steps listed below, see the [Azure Monitor documentation
96
102
97
103
While the information is verified and the workspace is created, you can track its progress under **Notifications** from the menu.
98
104
99
-
### Obtain workspace ID and key
105
+
####Obtain workspace ID and key
100
106
Before installing the Microsoft Monitoring Agent for Windows, you need the workspace ID and key for your Log Analytics workspace. This information is required by the setup wizard to properly configure the agent and ensure it can successfully communicate with Log Analytics.
101
107
102
108
1. In the Azure portal, click **All services** found in the upper left-hand corner. In the list of resources, type **Log Analytics**. As you begin typing, the list filters based on your input. Select **Log Analytics**.
@@ -105,7 +111,7 @@ Before installing the Microsoft Monitoring Agent for Windows, you need the works
105
111
4. Select **Connected Sources**, and then select **Windows Servers**.
106
112
5. The value to the right of **Workspace ID** and **Primary Key**. Save both temporarily - copy and paste both into your favorite editor for the time being.
107
113
108
-
## Installing the agent on Windows
114
+
###Installing the agent on Windows
109
115
The following steps install and configure the Microsoft Monitoring Agent. **Be sure to install this agent on each server in your cluster and indicate that you want the agent to run at Windows Startup.**
110
116
111
117
1. On the **Windows Servers** page, select the appropriate **Download Windows Agent** version to download depending on the processor architecture of the Windows operating system.
@@ -127,7 +133,30 @@ When complete, the **Microsoft Monitoring Agent** appears in **Control Panel**.
127
133
128
134
To understand the supported configuration, review [supported Windows operating systems](https://docs.microsoft.com/azure/azure-monitor/platform/log-analytics-agent#supported-windows-operating-systems) and [network firewall configuration](https://docs.microsoft.com/azure/azure-monitor/platform/log-analytics-agent#network-firewall-requirements).
129
135
130
-
## Collecting event and performance data
136
+
## Setting up alerts using Windows Admin Center
137
+
138
+
In Windows Admin Center, you can configure default alerts that will apply to all servers in your Log Analytics workspace.
139
+
140
+

141
+
142
+
These are the alerts and their default conditions that you can opt into:
| Disk capacity utilization | Over 85% for 10 minutes |
148
+
| Memory utilization | Available memory less than 100 MB for 10 minutes |
149
+
| Heartbeat | Fewer than 2 beats for 5 minutes |
150
+
| System critical error | Any critical alert in the cluster system event log |
151
+
| Health service alert | Any health service fault on the cluster |
152
+
153
+
Once you configure the alerts in Windows Admin Center, you can see the alerts in your log analytics workspace in Azure.
154
+
155
+

156
+
157
+
During this onboarding flow, the steps below are happening under the hood. We detail how to configure them in detail in case you want to manually setup your cluster.
158
+
159
+
### Collecting event and performance data
131
160
132
161
Log Analytics can collect events from the Windows event log and performance counters that you specify for longer term analysis and reporting, and take action when a particular condition is detected. Follow these steps to configure collection of events from the Windows event log, and several common performance counters to start with.
133
162
@@ -207,11 +236,16 @@ Now, let's walk through an example for creating an alert.
207
236
208
237
### Example alert
209
238
210
-
For reference, this is what an example alert looks like:
239
+
For reference, this is what an example alert looks like in Azure.
240
+
241
+

242
+
243
+
Below is an example of the email that you will be send by Azure Monitor:
Copy file name to clipboardexpand all lines: WindowsServerDocs/virtualization/hyper-v/Supported-CentOS-and-Red-Hat-Enterprise-Linux-virtual-machines-on-Hyper-V.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -93,7 +93,7 @@ In this section:
93
93
This series only has 64-bit kernels.
94
94
95
95
96
-
|**Feature**|**Windows Server version**|**7.5-7.6**|**7.3-7.4**|**7.0-7.2**|**7.5-7.6**|**7.4**|**7.3**|**7.2**|**7.1**|**7.0**|
96
+
|**Feature**|**Windows Server version**|**7.5-7.7**|**7.3-7.4**|**7.0-7.2**|**7.5-7.7**|**7.4**|**7.3**|**7.2**|**7.1**|**7.0**|
|**Availability**||[LIS 4.3](https://www.microsoft.com/download/details.aspx?id=55106)|[LIS 4.3](https://www.microsoft.com/download/details.aspx?id=55106)|[LIS 4.3](https://www.microsoft.com/download/details.aspx?id=55106)| Built in | Built in | Built in | Built in | Built in | Built in |
0 commit comments