26 gen 2018

Migrate DHCP from different Windows Server versions

How to migrate DHCP server configuration from different versions

#Product Affected
Windows Server - All versions


1. On the source DCHP server run the following cmdlet (wh administrative privilege)

Export-DhcpServer -File C:\yourpath\DHCPdata.xml -Leases -Force -ComputerName sourcedhcp.domain.ext –Verbose

2. On the source DCHP server run the following cmdlet (wh administrative privilege)

Import-DhcpServer -File C:\yourpath\DHCPdata.xml -BackupPath C:\yourpath\ -Leases -ScopeOverwrite -Force -ComputerName destinationdhcp.domain.ext –Verbose

Windows Server 2016: Recently added DC do not work, inexistent SYSVOL

Recently added DC do not work, do not replicate and it's affected by inexistent SYSVOL and NETLOGON .
The SYSVOL share and NETLOGON share are not showing shared on the new DC Windows Server 2016 and it cause GPO issue.

In the DCDIAG you'll find this:

#Product Affected
Windows Server 2016, 2012 R2, 2012, 2008 R2, 2008

On the new DC:

1.Click Start, click Run, type regedit, and then click OK.
2.Locate the following subkey in Registry Editor:
3.In the details pane, right-click the SysvolReady flag, and then click Modify.
4.In the Value data box, type 0, and then click OK.
5.Again in the details pane, right-click the SysvolReady flag, and then click Modify.
5.In the Value data box, type 1, and then click OK.
6. Restart the Netlogon service and use “net share” to check if the both folders are shared and if the GPO information start replicating.
7. Copy all files in the SYSVOL from the primary DC
8. Manually share C:\Windows\SYSVOL\sysvol\iqd.local\SCRIPTS. We can set the share the same as primary DC.
9. Restart DFSR e NETLOGON services 

5 gen 2018

Mitigations for speculative execution side-channel vulnerabilities in CPU Microcode from Microsoft side

Mitigations for speculative execution side-channel vulnerabilities in CPU Microcode  “speculative execution side-channel attacks”
•CVE-2017-5715 - Bounds check bypass
•CVE-2017-5753 - Branch target injection
•CVE-2017-5754 - Rogue data cache load

This class of vulnerabilities will affect many modern processors and operating systems, including hardware (Intel, AMD, and ARM), software(Windows, Linux, Android, Chrome, iOS, Mac OS). Both physical and virtual machine will be affected. At the time of publication, Microsoft has not received any information to indicate that these vulnerabilities have been used to attack customers at this time.

#Product Affected
All versions, client and server

To be fully protected, updates are required at many layers of the computing stack and include software and hardware/firmware updates. Microsoft has released several updates to help mitigate these vulnerabilities. We have also taken action to secure our cloud services. Meanwhile, since the issue affect hardware, we may also need to install firmware updates from device manufacturer for increased protection. Please check with device manufacturer for relevant updates.

Microsoft Azure has taken steps to address the security vulnerabilities at the hypervisor level to protect Windows Server VMs running in Azure, for more detailed information please check the following link:

For customers using Windows client operating systems including Windows 7 Service Pack 1, Windows 8.1, and Windows 10, we suggest:

-Verify that you are running a supported antivirus application before you install OS or firmware updates. Contact the antivirus software vendor for compatibility information.

-Apply all available Windows operating system updates, including the January 2018 Windows security updates.

- Apply the applicable firmware update that is provided by the device manufacturer

For customers using Windows server operating systems including Windows Server 2008 R2 Service Pack 1, Windows Server 2012 R2, and Windows Server 2016, we suggest:

- Apply the Windows operating system update.
- Make necessary configuration changes to enable protection.
- Apply an applicable firmware update from the OEM device manufacturer.

For Windows Server 2008, Windows Server 2012, please make the system up-to-date and pay close attention to the official article for latest updates.

Microsoft will continue to work closely with industry partners to improve mitigations against this class of vulnerabilities. If any further information, we will update as soon as possible, your patience is much appreciated.

Please check the link below for more detailed information: