• The Windows Consumer Preview and Windows Server 8 Beta Builds are Now Available for Download

    It's Windows reimagined and reinvented from a solid core of Windows 7 speed and reliability. It's an all-new touch interface. It's a new Windows for new devices. And it's your chance to be one of the first to try it out.

    image  image  image

    http://windows.microsoft.com/en-US/windows-8/consumer-preview

    • Swipe, slide, and zoom

    Touch a full-powered PC. It's fast and it's fluid. Take natural, direct, hands-on control.

    • Apps, front and center

    Apps in Windows 8 work together to get things done faster. Get them from the Windows Store.

    • Your Windows, everywhere

    Windows 8 can connect you to your files, photos, people, and settings, wherever you sign in.

    • Wall-to wall web

    Internet Explorer 10 Consumer Preview brings you immersive web browsing on screens big and small.

    • The familiar, made better

    Still devoted to your mouse and keyboard? Windows 8 makes the tried-and-true feel brand new.

    • The Windows Experience Blog

    Read this Windows Experience Blog entry for some tips on getting started with Windows 8 Consumer Preview.

  • Building Configuration Manager 2012 Hierarchy – Part 3 Deploying Tier 2 Primary Site

    In my last blog article Building Configuration Manager 2012 Hierarchy – Part 2 Deploying Tier 1 CAS, we went over the details on deploying a Central Administration Site which is an essential role if you are looking to deploy more than one primary site in your hierarchy.

    Throughout this blog article, we will walk through the details of deploying our first Primary Server in the hierarchy.

    From the primary server run the splash.hta from the Configuration Manager 2012 media

    Run Asses server readiness and make sure no errors or warnings are displayed

    Go back to the Configuration Manager 2012 Setup page and click on Install

    On the Getting Started page press select Install Configuration Manager primary site (make sure Use typical installation options for standalone primary option is deselected) and press Next

    2

    Specify the product key and accept the licensing terms on the Microsoft Software License Terms page and press Next

    Select Use previously downloaded updates from the following location., browse to the updates and press Next

    3

    On the server language selection and press Next

    4

    On the client language selection and press Next

    Specify the Site Code, Site Name and the Installation Folder as below and press Next

    6

    Specify join primary site to an existing hierarchy and then specify the FQDN of the central administration server (CAS) and press Next

    7

    Specify the database Server name, Instance name and leave the database name and SSB port on their defaults and press Next

    8

    Specify the SMS Provider and press Next

    9

    Select only Configure the communication method on each site system role (make sure Clients use HTTPS when they connect to HTTPS-enabled site roles are available is unchecked)

    10

    Specify management point site system and distribution point site systems and make sure that client communication is set to HTTP

    11

    Press Next on CEIP page

    Review Settings Summary page and press Next

    13

    After prerequisite checker finishes press Begin Install to start Configuration Manager 2012 primary site installation

    14

    Make sure the setup marks as completed successfully

    15

     

    This comes to the end of Part 3 Deploying Tier 2 Primary Site. In our next blog, we will deploy a secondary server in the hierarchy.

    Cheers!!

  • Service Manager 2012 - Orchestrator 2012 Integration Video Series - Part 2

    Part 1: http://blogs.technet.com/b/meamcs/archive/2012/02/24/service-manager-2012-orchestrator-2012-integration-video-series-part-1.aspx

    Part 3: http://blogs.technet.com/b/meamcs/archive/2012/03/06/service-manager-2012-orchestrator-2012-integration-video-series-part-3.aspx

    Second part of our System Center Orchestrator and Service Manager integration series.

    In this part we'll focus on triggering and designing Orchestrator Runbooks. Our Runbook will monitor Service Manager custom activities. Whenever custom activity is updated, Runbook will monitor status changes and trigger itself.

    Here is the Part 2:

    Ps: For those who are not able to watch on demand online here is the download link.

    Format: mp4
    Duration: 13:52

  • How to force WinRM to listen interfaces over HTTPS

    Windows Remote Management (WinRM) is a protocol for Windows operating systems which is implemented as a web service and is used for secure remote management of systems. Following actions depends on WinRM configuration;

    • Windows Remote Shell command line tool
    • Winrs
    • Event Forwarding
    • Windows PowerShell 2.0 Remoting

    WinRM service starts automatically on Windows Server 2008 but by default no listener for WinRM is configured. That means no WS-Management protocol message can be received or sent.

    Default ports for WinRM 2.0 are;

    HTTP: 5985

    HTTPS: 5986

    For those who are interested in PowerShell scripting, PowerShell remoting is a great and helpful feature which comes with 2.0 version. PsRemoting provides to execute powershell scripts on remote computers over WinRM protocol. Even you are in your local PowerShell console, you can run any scripts and these will be executed on remote computers. And each remote connection resides in a session that you can manage separately.

    But be aware of that if you want to get some actions on a operating system that uses WinRM, you must configure  required prerequirements. In this blog post we’ll cover how to configure WinRM to work over HTTPS. So that for example you can execute your powershell scripts on remote computers over HTTPS with certificate based authentication. This will also help you to configure mutual authentication between untrusted computers that uses WinRM for communication.

    For basic configuration, simply run WinRM qc(quickconfig) command.

    image

    This is a shortcut to configure winrm to work over http. Running this command takes following actions;

    • Creating a WinRM listener on HTTP://* for local networks.
    • Enabling firewall exceptions for WinRM

    After you configure with QuickConfig command you can enumerate listener status;

    image

    As you see above, it listens over HTTP and for all network interfaces. But what we want is to configure HTTPS communication.

    HTTPS communication requires certificate based authentication. For Windows Remote Management, each computer that will be managed with WinRM must have a Server Authentication certificate.

    Most important point is that certificate must have a subject name same with computer netbios name(workgroup) or FQDN(domain joined). You can use Web Server Template in your certificate templates store. My suggestion is just duplicate your web server certificate and configure it as its private key exportable.

    Now let’s request a certificate from local Certification Authority step by step.

     

    image

    Type your local CA URL in your browser and click Request a certificate.

    image

    Click  advanced certificate request.

    image

     

    image

    Choose your custom Server Authentication template and fill up the fields.

    Don’t forget to set Name field same as your computer name. If it’s a domain joined computer, type your fully qualified domain name. Otherwise netbios name will be enough.

     

    image

    When you click Install Certificate on your browser, certificate will be sent to Current User account store. We should export it with private key and then import to the computer account store again.

     

    image

     

    image

     

    image

     

    image

     

    image

     

    image

     

    image

     

    image

    Check your certificate Subject name if it matches with your computer name.

    image

     

    To configure WinRM over HTTPS we need Server Authentication certificate thumbprint.

    Just open your certificate that you import earlier and note thumbprint details.

    image

     

    Now we can run following winrm command to create winrm listener and configure it to work with previously created certificate.

    winrm create winrm/config/Listener?Address=*+Transport=HTTPS  @{Hostname="serverfqdn";CertificateThumbprint="1fd53031caf98df226428069ccfdf3152b6ddc2b"}

     

    image

    Check for the ResourceCreated output.

    Now lets enumerate listener again;

    image

    As you see above, listener sends and receives messages over HTTPS.

    From now on, WinRM connections will be active.

    If you try to start Remote PowerShell session between two computer that uses certificate based WinRM, you will notice that it opens and listens connections over port 5986.

    image

    image

    As I mentioned before this method also can be used between a domain joined computer and workgroup computer. And please note that, If you don’t configure required authentication method, WinrM first tries to communicate over Kerberos.

  • Service Manager 2012 - Orchestrator 2012 Integration Video Series - Part 1

    In these demonstration series, I will show you the power of integration of System Center Orchestrator 2012 and System Center Service Manager 2012. I’ll cover a sample basic scenario that requirement of automated bulk user creation process. For those who are interested in PowerShell scripting, I will show you how a custom PowerShell script is created and how PowerShell outputs are used within Orchestrator Runbooks.

    At the end of the series, you will be able to create Custom Management Packs, classes and forms in Service Manager, design orchestrator Runbooks and trigger them. Also you’ll have basic knowledge of how to create notification templates in Service Manager.

    Part 1: Creating custom management packs, classes and forms. (Service Manager)

    Part 2: Designing Runbooks, triggering them with custom Service Manager activities. (Orchestrator)

    Part 3: Continuing to design Runbooks. Testing success and failure scenarios.(Orchestrator)

    Part 4: Focusing on how to create notification template in Service Manager and passing activity properties in the portal URL. Creating email notifications tasks. (Service Manager&Orchestrator)

    This is the first part of our integration series. In this video, we’ll work on Service Manager and create a custom management pack. Also we’ll create a custom class and properties. Our main purpose is getting custom user inputs from Service Manager and using them in our Orchestrator Runbooks. This will let Service Manager users to fill up custom fields in our custom form and to trigger exact Runbook. Also we’ll add a review activity and set an approver.

    For the 2nd and 3rd videos, we’ll focus on Orchestrator side.

    Part 2: http://blogs.technet.com/b/meamcs/archive/2012/02/27/service-manager-2012-orchestrator-2012-integration-video-series-part-2.aspx

    Part 3: http://blogs.technet.com/b/meamcs/archive/2012/03/06/service-manager-2012-orchestrator-2012-integration-video-series-part-3.aspx

    Here we go;

    Ps: For those who are not able to watch on demand online here is the download link.

     

    Format: mp4
    Duration: