Windows Server 2012 Overview Omer Palo, Readiness Specialist October, 2012
Deployment and Management Changes Active Directory Domain Services Hyper-V Remote Desktop Services Failover Clusters Networking Features IIS Features Agenda
Deployment and Management Citrix Confidential - Do Not Distribute
Server Editions Windows Server 2012Windows 2008 R2 Foundation Essentials Standard Enterprise Foundation Standard Web HPC Enterprise Datacenter Itanium
Windows 8 Windows 8 Pro Windows 8 Enterprise Windows RT Citrix Confidential - Do Not Distribute Windows 8 Editions
Deployment Options Windows 2008 R2Windows 2012 Citrix Confidential - Do Not Distribute Windows Server Core Windows Server Full Server Core Minimal GUI Server Full Server UI Desktop Experience
Remote PowerShell is not new in Windows 2012 WinRM 2.0 and PowerShell 2.0 could be used for remote PS execution WinRM was not enabled by default Windows Server 2012 enables WinRM by default It is the preferred management tools. Citrix Confidential - Do Not Distribute Remote PowerShell
Citrix Confidential - Do Not Distribute New Server Manager
Citrix Confidential - Do Not Distribute Adding additional servers Multi-Server Management
Citrix Confidential - Do Not Distribute Management tools can be launched on any server. Multi-Server Management: GUI
Citrix Confidential - Do Not Distribute Multi-Server Management: PowerShell
Server Core is the preferred deployment option PowerShell and RSAT should be the management tools Reducing the attack surface and footprint Reliability and less patching Citrix Confidential - Do Not Distribute New Server Management
New Features in ADDS Citrix Confidential - Do Not Distribute
ADDS Server role installation is built on PowerShell Prerequisite validation is part of configuration wizard Adprep.exe is now part of ADDS Installation Configuration options can be exported ADDS: Simplified Deployment
Forest Functional Level Windows Server 2012 Domain Functional Level Windows Server 2012 Citrix Confidential - Do Not Distribute ADDS: Functional Levels
No more DCPROMO ADDS: No more DCPROMO
Citrix Confidential - Do Not Distribute ADDS: Promoting a DC
Citrix Confidential - Do Not Distribute ADDS: Forest /Domain Functional Levels
Citrix Confidential - Do Not Distribute Exporting Configuration ADDS: Exporting Configuration
Off-Premises Domain Join now supports DirectAccess Citrix Confidential - Do Not Distribute ADDS: Simplified Management
Controlling access with standard ACL is difficult New claim-based authorization platform Claims can be both user and device based Requirements Windows Server 2012 domain controller(s) Windows Server 2012 file server(s) A domain policy enabling clams-policy Windows Server 2012 AD Administrative Center Citrix Confidential - Do Not Distribute ADDS: Dynamic Access Control Lists
PowerShell History Citrix Confidential - Do Not Distribute ADDS: Simplified Management
Citrix Confidential - Do Not Distribute Recycle bin UI ADDS: Simplified Management
Citrix Confidential - Do Not Distribute Password Settings UI ADDS: Simplified Management
Citrix Confidential - Do Not Distribute AD-based Activation ADDS: Simplified Management
Citrix Confidential - Do Not Distribute Service Accounts Group Managed Service Accounts ADDS: Simplified Management
Citrix Confidential - Do Not Distribute Rolling snapshots back could cause replication issues ADDS: Virtualizing Domain Controllers
Citrix Confidential - Do Not Distribute VM-Generated IDs provide safe restore of snapshots ADDS: Virtualizing Domain Controllers
Citrix Confidential - Do Not Distribute ADDS: Cloning Virtualizing Domain Controllers Win2012 PDC/GC vDC1 Add source to AD group Execute Get-ADDClonningApplication Execute new-ADDCCloneConfigFile vDC2 Clone
Citrix Confidential - Do Not Distribute Remote Group Policy Update –Invoke-gpupdate –computer pc1 - force ADDS: Group Policy
Citrix Confidential - Do Not Distribute Improved GPresult ADDS: Group Policy
Citrix Confidential - Do Not Distribute Group Policy Infrastructure Status No more GPOtool.exe ADDS: Group Policy
Citrix Confidential - Do Not Distribute What Else? –Local Group Policy Option for WinRT Devices (BYOD) –Group Policy Client Service Idle State –Group Policy Settings / Preferences Support for IE10 –Increased Size of Registry.pol ADDS: Group Policy
Global RID space per domain is now 2 billion Deferred Index Creation Forest administrators can now decide when to build db indexes following schema updates Kerberos Enhancements Constrained Delegations across domains Flexible Authentication Secure Tunneling (Kerberos Armoring) AD DS Claims in AD FS AD FS v2.1 can populate SAML tokens from Kerberos Ticket directly Citrix Confidential - Do Not Distribute ADDS: Other Notable Changes
Hyper-V Citrix Confidential - Do Not Distribute
SystemResourceHyper-v (2008 R2)Hyper-v 2012Imp. Factor HostLogical Processors643205x Physical Memory1TB4TB4x vCPU per Host x Active VMs per Host x VMvCPU per VM46416x Memory per VM64GB1TB16x Guest NUMANoYes- ClusterMaximum Nodes16644x Maximum VMs per Cluster x Hyper-V: Scalability Comparison
ResourceHyper-vXenServer 6.1vSphere /ESXivSphere Ent. HostLogical Processors Physical Memory4TB1TB32GB2TB vCPU per Host Active VMs per Host / VMvCPU per VM Memory per VM1TB128GB32GB1TB Guest NUMAYesHost OnlyYes ClusterMaximum Nodes6416N/A32 Maximum VMs per Cluster N/A3000 Citrix Confidential - Do Not Distribute Hyper-V: Scalability Comparison
Windows 8 Pro supports Hyper-V Minimum 4 GB RAM required Storage Live Migration is supported No guest VM license is provided Unsupported features: RemoteFX Live Migration Hyper-V Replica SR-IOV Syntetic Fiber Channel Citrix Confidential - Do Not Distribute Hyper-V: Client Hyper-V
Can utilize higher network bandwidth up 10 gigabits Multiple simultaneous migrations Clustered or standalone Hyper-v Servers (Shared Nothing Live migration) VMs can be stored on shared, local or SMB storage Citrix Confidential - Do Not Distribute Hyper-V: Live Migrations
Processor on Hyper-V servers must be from same vendor Physical disks are not supported Cluster Live Migrations require cluster service and CSV configured SMB live migrations require permissions on SMB shares Shared Nothing Live Migrations require Kerberos or CredSSP Citrix Confidential - Do Not Distribute Hyper-V: Live Migration Requirements
1.If Kerberos will be used, configure constrained delegation in AD CIFS and Microsoft Virtual System Migration Service 2. if CredSSP will be used login to source server Migration will fail if initiated from destination server 3.Configure Live Migration option Hyper-V Servers 4.Perform the live migration Citrix Confidential - Do Not Distribute Hyper-V: Live Migration Process (shared nothing LM)
Allows mission critical workloads to be replicated across clusters, storage systems and sites Citrix Confidential - Do Not Distribute Hyper-V Replica Production SiteDR Site Hyper1 Hyper2 VM1
Citrix Confidential - Do Not Distribute Hyper-V replica configuration options on replica server Hyper-V Replica
Citrix Confidential - Do Not Distribute Don’t forget the Windows Firewall rules! Hyper-V Replica
Citrix Confidential - Do Not Distribute Enabling VM replication Hyper-V Replica
Citrix Confidential - Do Not Distribute Replica enabled VM Hyper-V Replica
Citrix Confidential - Do Not Distribute IP settings on replica enabled VM Hyper-V Replica
Citrix Confidential - Do Not Distribute Startup memory and memory weight are the visible features Hyper-V: Dynamic Memory
Smart Paging utilizes disk space as memory for VMs in case of: VM is being restarted There is not enough physical memory on server No memory can be reclaimed from running VMs The use of paging file is temporary for about 10 minutes Memory over subscription relies on Windows Memory Manager, not Hyper-V Citrix Confidential - Do Not Distribute Hyper-V: Dynamic Memory
What is SR-IOV? It’s a technology that allows multiple operating systems to share PCI Express devices VMs can be directly attached to fiber or Ethernet based HBA Bypassing hypervisor, VMs leverage the hardware directly Citrix Confidential - Do Not Distribute Hyper-V: SR-IOV Support
Hyper-V can utilize SMB 3.0 based shares for storage Advantage of SMB based shared storage Flexible Easier management Cheaper!! Citrix Confidential - Do Not Distribute Hyper-V: SMB 3.0 File Share
Citrix Confidential - Do Not Distribute Hyper-V: SMB 3.0 File Shares Share SMB Server/Cluster Server1 Hyper-V Cluster \\Server1\share V M
Windows Server 2012 computer(s) with File and Storage Services Windows Server 2012 Hyper-V Server Role A common Active Directory structure. Citrix Confidential - Do Not Distribute Hyper-V: SMB 3.0 File Shares Requirements
A solution to help provide charge back and billing options Network Metering Provides fine grained metering capable of differentiating internet and intranet traffic VM Metrics Average CPU and memory usage over a period of time Minimum and maximum memory usage Disk space Total incoming / outgoing per virtual NIC Citrix Confidential - Do Not Distribute Hyper-V: Resource Metering
Enables direct fiber channel storage access from VMs Citrix Confidential - Do Not Distribute Hyper-V: Virtual Fiber Channel
New VHDX formats allows 64 TB virtual disks Citrix Confidential - Do Not Distribute Hyper-V: VHDX Disk Format
Protection against data corruption due to power failures Logging updates to VHDX metadata structures Ability to store custom metadata Support for Trim functions Requires physical disk access and Trim capable hardware Citrix Confidential - Do Not Distribute Hyper-V: VHDX Disk Format
What is NUMA? Non-Unified Memory Access allows applications to utilize memory in an efficient way on multi-processor systems The topology of memory configuration is passed on to VMs Virtual workloads that can be optimized with NUMA can take advantage (i.e. SQL Server) Citrix Confidential - Do Not Distribute Hyper-V: Virtual NUMA
Is an extensible, managed L2 switch providing network access to VMs Can provide tenant isolation, traffic shaping, policing and IDS/IDP solutions Provides built-in support for NDIS filter drivers Citrix Confidential - Do Not Distribute Hyper-V: Virtual Switch
Built-in features ARP /ND poisoning protection DHCP guard protection Port ACLs Trunk mode to VM Network traffic monitoring VLANs Bandwidth and burst limits ENC (Explicit Congestion Notification) Citrix Confidential - Do Not Distribute Hyper-V: Virtual Switch
Remote Desktop Services Citrix Confidential - Do Not Distribute
Overhauled Management RDS: Unified Management
RDS: Session Virtualization Deployment
Citrix Confidential - Do Not Distribute RemoteApp Properties RDS: RemoteApp
Citrix Confidential - Do Not Distribute Web based access to RemoteApps and Desktops RDS: Resource Access
Citrix Confidential - Do Not Distribute or URL-based discovery RDS: Resource Access
Citrix Confidential - Do Not Distribute Users can access remote resources from start screen RDS: Resource Access
Citrix Confidential - Do Not Distribute Remote resource management RDS: Resource Access
Citrix Confidential - Do Not Distribute RDS: Desktop Virtualization Deployment
Citrix Confidential - Do Not Distribute RDS: Creating VDI Collection
Citrix Confidential - Do Not Distribute RDS: Accessing Virtual Desktops Virtual Desktops are available in Start Screen
Citrix Confidential - Do Not Distribute Automatic Network Detection UDP Transport Forward Error Correction Fallback to TCP Native UDP Support for RemoteFX RDS: RDP Improvements
Citrix Confidential - Do Not Distribute WAN Optimization Multi-Touch Support Media Streaming Adaptive Graphics DirectX 11 Support RDP: RemoteFX Improvements
Failover Clustering Citrix Confidential - Do Not Distribute
Failover Clusters: Scalability Windows 2008 R2Windows Server 2012 Up to 16 nodes 1000 VMs per cluster Up to 64 nodes 8000 VMs per cluster 1024 VMs per host
Citrix Confidential - Do Not Distribute Support for BitLocker VSS based file backup SMB Multichannel and SMB Direct Integration with Storage Spaces Ability to scan and repair online volumes Failover Clusters: CSV Shared Storage Metadata
Citrix Confidential - Do Not Distribute Failover Clusters: Scale-Out File Servers
Scalability Availability Compatibility Proactive Error identification Citrix Confidential - Do Not Distribute Failover Clusters: Resilient File System
Citrix Confidential - Do Not Distribute Updates the cluster with little or no down time Failover Clusters: Cluster Aware Updates
Virtual Machine Monitoring Active Directory Integration Cluster Upgrade and Migration Task Scheduler Integration Windows PowerShell Support Citrix Confidential - Do Not Distribute Failover Clusters: Other New Features
Networking Citrix Confidential - Do Not Distribute
Up to 32 NICs can be bundled Networking: NIC Teaming
NIC Teaming ModesLoad Balancing Modes Citrix Confidential - Do Not Distribute LACP Static Teaming Switch Independent Address Hash Hyper-V Port
Citrix Confidential - Do Not Distribute DHCP Replication and Failover Networking: DHCP Server
Citrix Confidential - Do Not Distribute DHCP Policies –Vendor Class –MAC Address –Client Identifier –Relay Agent Information Networking: DHCP Server
DNS Server DNSSEC related updates PowerShell management support DNS Client LLMNR are not sent via mobile or VPN connections NETBIOS queries are not send to mobile broadband interfaces LLMNR and NETBIOS queries are sent in parallels Asynchronous DNS cache Citrix Confidential - Do Not Distribute Networking: DNS
Citrix Confidential - Do Not Distribute What is BranchCache Automatic Hosted Cache Discovery File Server integration Multiple Hosted Cache Server Networking: BranchCache
Citrix Confidential - Do Not Distribute What is DirectAccess? DirectAccess and RRAS Coexistence No PKI Prerequisite DirectAccess Server Behind NAT Manage-out to Clients Multisite Support Server Core and Windows Server Essentials Support Networking: DirectAccess
IP Address Management for Address Space Management IPAM Discovery IPAM Address Space Management IPAM Multi Server Management and Monitoring IPAM Auditing IPAM Architecture Distributed Centralized Citrix Confidential - Do Not Distribute Networking: IPAM Server
IPAM Requirements Windows 2008 DNS, DHCP DCs only Servers must be domain members Supports only Windows Internal Database Single IPAM Server can support: 150 DHCP Servers and 500 DNS Servers 6000 DHCP Scopes and 150 DNS zones Citrix Confidential - Do Not Distribute Networking: IPAM Server
Citrix Confidential - Do Not Distribute IPAM Manager Networking: IPAM Server
Citrix Confidential - Do Not Distribute Step 2: Provisioning Networking: IPAM server
Citrix Confidential - Do Not Distribute Step 3: Discovery Networking: IPAM Server
Citrix Confidential - Do Not Distribute Default IP tasks Networking: IPAM Server
Citrix Confidential - Do Not Distribute Management Interface Networking: IPAM Server
Internet Information Services Citrix Confidential - Do Not Distribute
\\Server\share Citrix Confidential - Do Not Distribute Web Servers can access SSL certificates from a common shared folder IIS8: Centralized SSL Certificates Load Balanced Web Servers
Citrix Confidential - Do Not Distribute We need to install the required component first IIS: Centralized SSL Certificates
Citrix Confidential - Do Not Distribute Enabling centralized Store IIS: Centralized SSL Certificates
Citrix Confidential - Do Not Distribute Creating a web site with central certificate store IIS: Centralized SSL Certificates
Citrix Confidential - Do Not Distribute Dynamically limiting CPU usage of application Pools –NoAction –KillW3wp –Throttle –ThrottleUnderLoad IIS: CPU Throttling on Application Pools
Citrix Confidential - Do Not Distribute IP/Domain based restrictions can be dynamically applied IIS: Dynamic IP Address Restriction
Citrix Confidential - Do Not Distribute IP Restrictions Proxy Mode IIS: Dynamic IP Address Restriction
Citrix Confidential - Do Not Distribute Host Header Support for SSL binding IIS: Server Name Indication
FTP Logon Attempt Restrictions Application Initialization Multicore scaling on NUMA Hardware Citrix Confidential - Do Not Distribute IIS: Other New Features
Citrix Receiver Already in Windows Store VDI-in-a-Box Virtual Desktop OS Hypervisor Everything else Project Excalibur Q1 / Q2 time frame Citrix Confidential - Do Not Distribute What About Our Products
Citrix Confidential - Do Not Distribute Questions?