<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>rss.livelink.threads-in-node</title>
    <link>https://techcommunity.microsoft.com/t5/windows-server/ct-p/Windows-Server</link>
    <description>rss.livelink.threads-in-node</description>
    <pubDate>Fri, 17 Apr 2026 23:37:21 GMT</pubDate>
    <dc:creator>Windows-Server</dc:creator>
    <dc:date>2026-04-17T23:37:21Z</dc:date>
    <item>
      <title>Domain users not able to logon with their password event though it has not been changed....</title>
      <link>https://techcommunity.microsoft.com/t5/windows-server-for-it-pro/domain-users-not-able-to-logon-with-their-password-event-though/m-p/4511948#M12971</link>
      <description>&lt;P&gt;Hi, we have this weird problem where some of the users suddenly can't login to their computer with the password they have used for almost 20 years (yes sorry, bad practise).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When the user reports it I check that I can logon to the computer with my own account (not 20 year old password) which works fine. I check the event log for problems both on the client and the DC and all I see is see which I can relate to the problem is event id 4625 with an error code which means bad password.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I check the AD account and see that pwdLastSet has a date in 2006 (not quite 20 years, but close) and I check that the account is not logged out or expired. Also make sure that the password never expires is enabled, so in my book these are all the checks needed and problem not solved.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I then change the password to the same password that the user has had for almost 20 years and problem solved, but problem source not found.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This has happend to 3-4 users within the last week or two, even a service user with domain admin permissions, only thing I pay note to that they have in common is the pwdLastSet in 2006, but I really can't seem to get my head around this being the issue.&amp;nbsp; Also only other thing I can think of that has changed is that the old DC has been removed a few months ago, and a new 2025 DC has been introduced. promote/demote went without issues and this problem didn't surface before now several weeks after the DC change.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So if anyone has experienced something similar or perhaps can point me in a direction for further troubleshooting please let me know.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thansk&lt;/P&gt;&lt;P&gt;Thomas&lt;/P&gt;</description>
      <pubDate>Thu, 16 Apr 2026 10:04:06 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-server-for-it-pro/domain-users-not-able-to-logon-with-their-password-event-though/m-p/4511948#M12971</guid>
      <dc:creator>StoreThomas</dc:creator>
      <dc:date>2026-04-16T10:04:06Z</dc:date>
    </item>
    <item>
      <title>Announcing Log Monitor v2.2.0 Release Candidate</title>
      <link>https://techcommunity.microsoft.com/t5/containers/announcing-log-monitor-v2-2-0-release-candidate/ba-p/4511286</link>
      <description>&lt;P&gt;We are excited to announce the release candidate for&amp;nbsp;&lt;STRONG&gt;Log Monitor v2.2.0&lt;/STRONG&gt;, now available on GitHub: &lt;A href="https://github.com/microsoft/windows-container-tools/releases/tag/v2.2.0" target="_blank" rel="noopener"&gt;LogMonitor v2.2.0&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Log Monitor is an open-source tool that enables Windows containers to surface logs from multiple sources, Event Log, ETW providers, and log files,&amp;nbsp; directly to the container's stdout, making them visible to container orchestrators like Kubernetes and Azure Container Apps.&lt;/P&gt;
&lt;HR /&gt;
&lt;H2&gt;What's New in v2.2.0&lt;/H2&gt;
&lt;H3&gt;Replaced Boost.JSON with nlohmann/json&lt;/H3&gt;
&lt;P&gt;The most significant change in this release is the replacement of the &lt;STRONG&gt;Boost.JSON&lt;/STRONG&gt; library with &lt;A href="https://github.com/nlohmann/json" target="_blank" rel="noopener"&gt;nlohmann/json&lt;/A&gt;, a lightweight, header-only C++ JSON library. This change:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Removes the heavy Boost dependency, reducing build complexity&lt;/LI&gt;
&lt;LI&gt;Simplifies the vcpkg dependency management&lt;/LI&gt;
&lt;LI&gt;Maintains full backward compatibility with existing configuration files&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;New AKS + IIS Example&lt;/H3&gt;
&lt;P&gt;We've added a complete end-to-end example for running Log Monitor with &lt;STRONG&gt;IIS on Azure Kubernetes Service (AKS)&lt;/STRONG&gt;, including deployment manifests and step-by-step documentation. This makes it easier to get started with log monitoring in production Kubernetes environments.&lt;/P&gt;
&lt;HR /&gt;
&lt;H2&gt;Bug Fixes&lt;/H2&gt;
&lt;P&gt;This release also includes a number of important bug fixes to the configuration file parser:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;eventFormatMultiLine&lt;/STRONG&gt;&amp;nbsp;now correctly defaults to&amp;nbsp;true&amp;nbsp;when not specified in the config&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;waitInSeconds&lt;/STRONG&gt;&amp;nbsp;for&amp;nbsp;File&amp;nbsp;log sources is now correctly parsed (previously always used the 300s default)&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Optional channel&amp;nbsp;level&lt;/STRONG&gt;&amp;nbsp;now correctly defaults to&amp;nbsp;Error&amp;nbsp;when omitted, instead of causing a parse failure&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Invalid log sources&lt;/STRONG&gt;&amp;nbsp;in a config file are now skipped gracefully — valid sources in the same file continue to be processed&lt;/LI&gt;
&lt;LI&gt;Fixed a&amp;nbsp;&lt;STRONG&gt;path traversal vulnerability&lt;/STRONG&gt;&amp;nbsp;in the&amp;nbsp;/Config&amp;nbsp;command-line argument&lt;/LI&gt;
&lt;LI&gt;Reduced unnecessary error log noise for&amp;nbsp;ERROR_NOT_SUPPORTED&amp;nbsp;cases&lt;/LI&gt;
&lt;/UL&gt;
&lt;HR /&gt;
&lt;H2&gt;Upgrading from v2.1.x&lt;/H2&gt;
&lt;P&gt;Upgrading to v2.2.0 is a &lt;STRONG&gt;drop-in replacement&lt;/STRONG&gt; — no changes to your configuration files are required. The config file format is identical to v2.1.x.&lt;/P&gt;
&lt;P&gt;To upgrade:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Replace&amp;nbsp;LogMonitor.exe&amp;nbsp;with the v2.2.0 binary in your container image&lt;/LI&gt;
&lt;LI&gt;Run your existing&amp;nbsp;LogMonitorConfig.json&amp;nbsp;as-is — no edits needed&lt;/LI&gt;
&lt;LI&gt;Test your container to confirm logs are still flowing as expected&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;If you were building from source, see the updated build instructions below — the build system has changed and the output path is different from v2.1.x.&lt;/P&gt;
&lt;HR /&gt;
&lt;H2&gt;Building from Source&lt;/H2&gt;
&lt;P&gt;The build system has been updated from a standalone Visual Studio solution to a &lt;STRONG&gt;CMake + vcpkg&lt;/STRONG&gt; workflow. A single script handles everything:&lt;/P&gt;
&lt;P&gt;.\build.cmd&lt;/P&gt;
&lt;P&gt;This will automatically:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Clone vcpkg into the repo root&lt;/LI&gt;
&lt;LI&gt;Bootstrap vcpkg and install&amp;nbsp;nlohmann-json&amp;nbsp;(downloaded on first run)&lt;/LI&gt;
&lt;LI&gt;Configure the project with CMake using Visual Studio 2022&lt;/LI&gt;
&lt;LI&gt;Build&amp;nbsp;LogMonitor.exe&amp;nbsp;and&amp;nbsp;LogMonitorTests.dll&amp;nbsp;in Release configuration&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;STRONG&gt;Prerequisites:&lt;/STRONG&gt; Visual Studio 2022 with the C++ workload and Git must be on your PATH. No other dependencies need to be installed manually.&lt;/P&gt;
&lt;H3&gt;Output locations&lt;/H3&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table border="1" style="border-width: 1px;"&gt;&lt;thead&gt;&lt;tr&gt;&lt;th&gt;Artifact&lt;/th&gt;&lt;th&gt;Path&lt;/th&gt;&lt;/tr&gt;&lt;/thead&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;LogMonitor.exe&lt;/td&gt;&lt;td&gt;LogMonitor\build\Release\LogMonitor.exe&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;LogMonitorTests.dll&lt;/td&gt;&lt;td&gt;LogMonitor\build\Release\LogMonitorTests.dll&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;colgroup&gt;&lt;col style="width: 50.00%" /&gt;&lt;col style="width: 50.00%" /&gt;&lt;/colgroup&gt;&lt;/table&gt;&lt;/DIV&gt;
&lt;P&gt;&lt;STRONG&gt;Note for upgraders:&lt;/STRONG&gt; In v2.1.x the binary was placed at LogMonitor\x64\Release\LogMonitor.exe. If you have a Dockerfile or CI script that copies the binary by path, update it to the new location above.&lt;/P&gt;
&lt;HR /&gt;
&lt;H2&gt;Example Configuration&lt;/H2&gt;
&lt;P&gt;Here is a basic &lt;CODE&gt;LogMonitorConfig.json&lt;/CODE&gt; that monitors Windows Event Log, an ETW provider, and a log file — covering the three source types Log Monitor supports:&lt;/P&gt;
&lt;PRE&gt;&lt;CODE&gt;{
  "LogConfig": {
    "sources": [
      {
        "type": "EventLog",
        "startAtOldestRecord": false,
        "eventFormatMultiLine": false,
        "channels": [
          { "name": "System", "level": "Error" },
          { "name": "Application", "level": "Warning" }
        ]
      },
      {
        "type": "File",
        "directory": "C:\\inetpub\\logs\\LogFiles",
        "filter": "*.log",
        "includeSubdirectories": true,
        "waitInSeconds": 5
      },
      {
        "type": "ETW",
        "eventFormatMultiLine": false,
        "providers": [
          {
            "providerName": "IIS: WWW Server",
            "providerGuid": "{3A2A4E84-4C21-4981-AE10-3FDA0D9B0F83}",
            "level": "5"
          }
        ]
      }
    ]
  }
}&lt;/CODE&gt;&lt;/PRE&gt;
&lt;P&gt;This config is a great starting point. Drop it alongside &lt;CODE&gt;LogMonitor.exe&lt;/CODE&gt; in your container image and adjust the channels, file paths, and ETW providers to match your application.&lt;/P&gt;
&lt;HR /&gt;
&lt;H2&gt;Improvements to CI/CD Pipelines&lt;/H2&gt;
&lt;P&gt;We've updated both the &lt;STRONG&gt;Azure DevOps&lt;/STRONG&gt; and &lt;STRONG&gt;GitHub Actions SDL compliance&lt;/STRONG&gt; pipelines to correctly install nlohmann/json via vcpkg before building, ensuring reliable builds across all CI environments.&lt;/P&gt;
&lt;HR /&gt;
&lt;H2&gt;Getting Started&lt;/H2&gt;
&lt;P&gt;You can download the release binaries in the&amp;nbsp;&lt;A href="https://github.com/microsoft/windows-container-tools" target="_blank" rel="noopener"&gt;repository&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;To get started with Log Monitor, check out the &lt;A href="https://github.com/microsoft/windows-container-tools/tree/main/LogMonitor" target="_blank" rel="noopener"&gt;documentation&lt;/A&gt; and the new &lt;A class="lia-external-url" href="https://github.com/microsoft/windows-container-tools/tree/main/examples/aks/iis-logmonitor" target="_blank" rel="noopener"&gt;IIS + AKS example&lt;/A&gt;.&lt;/P&gt;
&lt;HR /&gt;
&lt;H2&gt;Feedback&lt;/H2&gt;
&lt;P&gt;We'd love to hear from you! If you run into any issues or have suggestions, please open an issue on &lt;A href="https://github.com/microsoft/windows-container-tools/issues" target="_blank" rel="noopener"&gt;GitHub&lt;/A&gt;.&lt;/P&gt;</description>
      <pubDate>Wed, 15 Apr 2026 23:50:34 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/containers/announcing-log-monitor-v2-2-0-release-candidate/ba-p/4511286</guid>
      <dc:creator>Bob_Sira</dc:creator>
      <dc:date>2026-04-15T23:50:34Z</dc:date>
    </item>
    <item>
      <title>Phase 2 of Kerberos RC4 hardening begins with the April 2026 Windows security update</title>
      <link>https://techcommunity.microsoft.com/t5/windows-server-for-it-pro/phase-2-of-kerberos-rc4-hardening-begins-with-the-april-2026/m-p/4511702#M12970</link>
      <description>&lt;P&gt;Windows updates released in April 2026 and later begin the&amp;nbsp;&lt;A href="https://support.microsoft.com/topic/1ebcda33-720a-4da8-93c1-b0496e1910dc#ID0EDDBN" data-linktype="external" target="_blank"&gt;second deployment phase&lt;/A&gt;&amp;nbsp;of protections designed to address a Kerberos information disclosure vulnerability (&lt;A href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20833" data-linktype="external" target="_blank"&gt;CVE‑2026‑20833&lt;/A&gt;). This second phase continues the shift away from legacy encryption types such as RC4 by moving toward stronger default ticket behavior. After installing the April 2026 update, domain controllers default to supporting Advanced Encryption Standard (AES‑SHA1) encrypted tickets for accounts that do not have an explicit Kerberos encryption type configuration.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If your organization relies on service accounts or applications that depend on RC4-based Kerberos service tickets, now is the time to address those dependencies to avoid authentication issues before the Enforcement phase begins in July 2026. Microsoft recommends continuing to monitor the System event log for Kerberos-related audit events and&amp;nbsp;&lt;A href="https://support.microsoft.com/topic/1ebcda33-720a-4da8-93c1-b0496e1910dc#ID0EDDBL" data-linktype="external" target="_blank"&gt;identify and address misconfigurations or remaining dependencies&lt;/A&gt;, then enabling enforcement when warning, blocking, or policy events are no longer logged.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;See&amp;nbsp;&lt;A href="https://support.microsoft.com/topic/1ebcda33-720a-4da8-93c1-b0496e1910dc" data-linktype="external" target="_blank"&gt;How to manage Kerberos KDC usage of RC4 for service account ticket issuance changes related to CVE-2026-20833&lt;/A&gt;&amp;nbsp;and&amp;nbsp;&lt;A href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20833" data-linktype="external" target="_blank"&gt;CVE‑2026‑20833&lt;/A&gt; to learn more about the vulnerability, timelines, recommended preparation steps, and configuration options to ensure compliance before Enforcement mode begins in July 2026.&lt;/P&gt;</description>
      <pubDate>Wed, 15 Apr 2026 18:42:48 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-server-for-it-pro/phase-2-of-kerberos-rc4-hardening-begins-with-the-april-2026/m-p/4511702#M12970</guid>
      <dc:creator>ChrisWright</dc:creator>
      <dc:date>2026-04-15T18:42:48Z</dc:date>
    </item>
    <item>
      <title>2026-04 Update Breaks Domain Logins</title>
      <link>https://techcommunity.microsoft.com/t5/windows-server-for-it-pro/2026-04-update-breaks-domain-logins/m-p/4511399#M12969</link>
      <description>&lt;P&gt;I have an Active Directory domain that is old (from 2000!) that has been upgraded and moved to newer versions of Windows Server and Active Directory.&amp;nbsp; &amp;nbsp;I have domain controller VMs running Windows Server 2025 Standard Edition.&amp;nbsp; Unfortunately they installed the latest 2026-04 patches which my have changed the Kerberos encryption from RC4 to AES.&amp;nbsp; This has resulted in my not being able to log into any Active Directory domain accounts and the domain controllers themselves.&amp;nbsp; I can only log into workstations using the local account.&lt;/P&gt;&lt;P&gt;Suffice to say this a nightmare.&amp;nbsp; Any ideas how to fix it since I can't access the usual tools like Active Directory Users and Computers, Hyper-V won't connect to the VMs, etc.&amp;nbsp; Thanks.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;S&lt;/P&gt;</description>
      <pubDate>Wed, 15 Apr 2026 04:37:18 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-server-for-it-pro/2026-04-update-breaks-domain-logins/m-p/4511399#M12969</guid>
      <dc:creator>EMR88</dc:creator>
      <dc:date>2026-04-15T04:37:18Z</dc:date>
    </item>
    <item>
      <title>Procedures to raise the functional level of AD 2008 r2 to 2019</title>
      <link>https://techcommunity.microsoft.com/t5/windows-server-for-it-pro/procedures-to-raise-the-functional-level-of-ad-2008-r2-to-2019/m-p/4511199#M12968</link>
      <description>&lt;P&gt;Hello everyone,&lt;/P&gt;&lt;P&gt;Our AD has the Windows Server 2008 functional level and the servers with Windows Server 2016 OS. I intend to raise the functional level to 2019 or 2025. I would like your help with tips and documentation to decide whether 2019 or 2025 would be best, what are the risks and procedures for successful migration. I have an isolated environment to carry out rehearsals and tests before actually going into production.&lt;/P&gt;</description>
      <pubDate>Tue, 14 Apr 2026 13:06:02 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-server-for-it-pro/procedures-to-raise-the-functional-level-of-ad-2008-r2-to-2019/m-p/4511199#M12968</guid>
      <dc:creator>Marcelo327</dc:creator>
      <dc:date>2026-04-14T13:06:02Z</dc:date>
    </item>
    <item>
      <title>Virtual printer in windows server 2019 standard is not shown after configuration</title>
      <link>https://techcommunity.microsoft.com/t5/windows-server-for-it-pro/virtual-printer-in-windows-server-2019-standard-is-not-shown/m-p/4511102#M12965</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I am, trying to configure a virtual printer in a Windows server 2019 standard edition that is deployed in OCI cloud. This instance has windows server license included in the pricing. The problem comes when after ending the process of configuration this virtual printer is not displayed in "Devices and printers" any idea why is this happening?&lt;/P&gt;&lt;img /&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;img /&gt;&lt;img /&gt;&lt;img /&gt;&lt;img /&gt;&lt;P class="lia-clear-both"&gt;&amp;nbsp;&lt;/P&gt;&lt;img /&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Ana&lt;/P&gt;</description>
      <pubDate>Tue, 14 Apr 2026 08:55:18 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-server-for-it-pro/virtual-printer-in-windows-server-2019-standard-is-not-shown/m-p/4511102#M12965</guid>
      <dc:creator>AnaRuiz1</dc:creator>
      <dc:date>2026-04-14T08:55:18Z</dc:date>
    </item>
    <item>
      <title>Networking in Windows Server 2025</title>
      <link>https://techcommunity.microsoft.com/t5/windows-server-events/networking-in-windows-server-2025/ec-p/4510937#M1209</link>
      <description>&lt;P&gt;Explore the latest networking capabilities in Windows Server 2025, including new announcements and enhancements across host management, physical network visibility, and virtual machine (VM) network management. This session will also provide an in-depth look at encrypted DNS, Windows Firewall improvements, along with what’s coming next!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;This session is part of &lt;STRONG&gt;&lt;A href="https://aka.ms/WindowsServerSummit" target="_blank" rel="noopener"&gt;Windows Server Summit 2026&lt;/A&gt;&lt;/STRONG&gt;. Questions can be posted in advance and throughout event week. Drop yours in the comments below.&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;H2 style="margin-top: 36px; margin-bottom: 20px; font-family: 'Segoe UI', Segoe, Tahoma, Geneva, sans-serif; font-weight: 600; font-size: 22px; color: #333333;"&gt;How do I participate?&amp;nbsp;&lt;/H2&gt;
&lt;P&gt;Select &lt;STRONG&gt;Add to calendar&lt;/STRONG&gt; to save the date, then click the &lt;STRONG&gt;Attend&lt;/STRONG&gt; button to save your spot, receive event reminders, and participate in the Q&amp;amp;A. (Don’t see the Attend button? Sign in to join the conversation!)&lt;BR /&gt;&lt;BR /&gt;If you can’t make the live event, don’t worry. This session will be recorded and available on demand shortly after airing. Q&amp;amp;A with the product team will also remain open in the comments for the full week.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 13 Apr 2026 18:58:53 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-server-events/networking-in-windows-server-2025/ec-p/4510937#M1209</guid>
      <dc:creator>Pearl-Angeles</dc:creator>
      <dc:date>2026-04-13T18:58:53Z</dc:date>
    </item>
    <item>
      <title>Error al agregar Windows Server 2025 a dominio existente, nivel funcional 2016</title>
      <link>https://techcommunity.microsoft.com/t5/windows-server-for-it-pro/error-al-agregar-windows-server-2025-a-dominio-existente-nivel/m-p/4510481#M12963</link>
      <description>&lt;P&gt;Buenas a todos,&lt;/P&gt;&lt;P&gt;Me dirijo a esta comunidad en busca de orientación para resolver un problema que se me está presentando al intentar integrar un nuevo servidor con &lt;STRONG&gt;Windows Server 2025 Standard&lt;/STRONG&gt; a mi infraestructura de Active Directory existente.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Descripción del entorno:&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Dominio de Active Directory activo con &lt;STRONG&gt;Windows Server 2019 Standard&lt;/STRONG&gt;.&lt;/LI&gt;&lt;LI&gt;Nivel funcional de dominio y bosque configurado en &lt;STRONG&gt;Windows Server 2016&lt;/STRONG&gt;.&lt;/LI&gt;&lt;LI&gt;Controladores de dominio actuales: server-dc01.impresoratec y server-ad2019.impresoratec.&lt;/LI&gt;&lt;LI&gt;El nombre de dominio interno utilizado es impresoratec (nombre NetBIOS/dominio de etiqueta única, sin sufijo DNS completo tipo .local o .com).&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;STRONG&gt;Problema:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Al intentar agregar el nuevo servidor con Windows Server 2025 al dominio, el proceso falla y se presenta el siguiente mensaje de error:&lt;/P&gt;&lt;P&gt;&lt;EM&gt;"Es posible que el nombre de dominio "impresoratec" sea un nombre de dominio NetBIOS. Si este es el caso, compruebe que el nombre de dominio está registrado correctamente con WINS. [...] La consulta se refería al registro SRV para _ldap._tcp.dc._msdcs.impresoratec. La consulta identificó los siguientes controladores de dominio: server-dc01.impresoratec y server-ad2019.impresoratec. Sin embargo, no se pudo contactar con ningún controlador de dominio."&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;El mensaje sugiere que los registros de host (A) o (AAAA) pueden contener direcciones IP incorrectas o que los controladores de dominio no son accesibles desde el nuevo servidor.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Lo que he verificado hasta ahora:&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Los controladores de dominio existentes están en línea y operativos.&lt;/LI&gt;&lt;LI&gt;La replicación entre los DCs actuales funciona con normalidad.&lt;/LI&gt;&lt;LI&gt;El nuevo servidor con 2025 tiene conectividad de red general, pero no logra localizar los DCs al momento de unirse al dominio.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;STRONG&gt;Mi consulta:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;¿Alguien ha experimentado este comportamiento al incorporar un servidor con Windows Server 2025 a un dominio con nivel funcional 2016 y un nombre de dominio de etiqueta única (single-label domain)? ¿Existe algún requisito previo adicional —como la actualización del esquema de AD, ajustes en DNS o en WINS— que deba cumplirse antes de agregar el nuevo DC?&lt;/P&gt;&lt;P&gt;Agradezco de antemano cualquier orientación o experiencia que puedan compartir.&lt;/P&gt;</description>
      <pubDate>Sat, 11 Apr 2026 19:23:48 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-server-for-it-pro/error-al-agregar-windows-server-2025-a-dominio-existente-nivel/m-p/4510481#M12963</guid>
      <dc:creator>HugoPerez</dc:creator>
      <dc:date>2026-04-11T19:23:48Z</dc:date>
    </item>
    <item>
      <title>Windows Admin Center - Couldn't configure PowerShell authentication error</title>
      <link>https://techcommunity.microsoft.com/t5/windows-admin-center/windows-admin-center-couldn-t-configure-powershell/m-p/4510345#M2776</link>
      <description>&lt;P&gt;We have a lab setup to test migrating VMWare VMs to Hyper-V.&amp;nbsp; Everything was working fine, however today whenever we try and access the settings of a VM we get an error.&amp;nbsp; We're going through Cluster Resources -&amp;gt; Virtual Machines -&amp;gt; VMName -&amp;gt; Settings.&amp;nbsp; The error is:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;H2&gt;Notification details&lt;/H2&gt;&lt;P&gt;Error&lt;/P&gt;&lt;P&gt;Error&lt;/P&gt;&lt;P&gt;Couldn't configure PowerShell authentication&lt;/P&gt;&lt;P&gt;1:25:15 PM&lt;/P&gt;&lt;P&gt;Source&lt;A href="https://edutech-hv-2.edutech-rd.local/clustermanager/connections/cluster/edutechrd.edutech-rd.local/tools/virtualmachines/settings/parent/virtualmachineview/server/edutech-hv-2.edutech-rd.local/vmid/981389c7-3880-4794-8897-dc1fe48170fd/vmname/Edutech-RD-DC2/general" target="_blank"&gt;Go to Virtual machines.&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Type&lt;/P&gt;&lt;P&gt;Error&lt;/P&gt;&lt;P&gt;Message&lt;/P&gt;&lt;P&gt;Unable to configure either CredSSP or local PowerShell options. Error: RemoteException: You cannot call a method on a null-valued expression.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now, the two Hyper-V hosts had been disconnected from the network for quite a while during some network upgrades and were only reconnected to the network this morning, having been disconnected for 56 days.&amp;nbsp; domain health is fine.&amp;nbsp; we're using an admin account.&amp;nbsp; not really sure what the issue is.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 10 Apr 2026 17:27:41 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-admin-center/windows-admin-center-couldn-t-configure-powershell/m-p/4510345#M2776</guid>
      <dc:creator>shipwreck78</dc:creator>
      <dc:date>2026-04-10T17:27:41Z</dc:date>
    </item>
    <item>
      <title>Side-by-side Upgrade: Server 2012 R2 Foundation to Server 2025 Essentials</title>
      <link>https://techcommunity.microsoft.com/t5/windows-server-for-it-pro/side-by-side-upgrade-server-2012-r2-foundation-to-server-2025/m-p/4509963#M12961</link>
      <description>&lt;P&gt;Hello everyone!&lt;/P&gt;&lt;P&gt;Is a side-by-side upgrade from Server 2012 R2 Foundation (DC) to Server 2025 Essentials (DC) allowed?&lt;/P&gt;&lt;P&gt;Is there a guide to follow?&lt;/P&gt;&lt;P&gt;Thank you in advance.&lt;/P&gt;</description>
      <pubDate>Thu, 09 Apr 2026 11:29:07 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-server-for-it-pro/side-by-side-upgrade-server-2012-r2-foundation-to-server-2025/m-p/4509963#M12961</guid>
      <dc:creator>V3N7UR4</dc:creator>
      <dc:date>2026-04-09T11:29:07Z</dc:date>
    </item>
    <item>
      <title>Configuring Compute in Windows Admin Center: Virtualization Mode</title>
      <link>https://techcommunity.microsoft.com/t5/windows-admin-center-blog/configuring-compute-in-windows-admin-center-virtualization-mode/ba-p/4508891</link>
      <description>&lt;P&gt;We’ve been walking you through Virtualization Mode’s “Add resource” wizard step-by-step, first with a &lt;A href="https://techcommunity.microsoft.com/blog/windows-admin-center-blog/resource-onboarding-using-windows-admin-center-virtualization-mode/4500281" target="_blank" rel="noopener"&gt;adventurous overview&lt;/A&gt;, then a &lt;A href="https://techcommunity.microsoft.com/blog/windows-admin-center-blog/intent-matters-configuring-network-atc-in-windows-admin-center-virtualization-mo/4502389" target="_blank" rel="noopener"&gt;no-nonsense networking walkthrough&lt;/A&gt;, followed by a &lt;A href="https://techcommunity.microsoft.com/blog/windows-admin-center-blog/configuring-storage-for-hyper-v-hosts-in-vmode/4504263" target="_blank" rel="noopener"&gt;shagadelic storage summary&lt;/A&gt;. We’re almost finished!&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;But our wizard would not be complete without the final member of our trio—Compute. Configuring Compute when onboarding Hyper-V (compute) systems to Windows Admin Center: Virtualization Mode (vMode) through the Add resource wizard is as simple as counting to four.&lt;/P&gt;
&lt;H2&gt;Compute configuration&lt;/H2&gt;
&lt;P&gt;On the Compute page, you’re configuring Hyper-V settings for your system. Doing this through vMode’s Add Resource wizard is especially beneficial when you’re adding multiple machines. Manually configuring all these settings yourself, on every machine you want to manage, is a recipe for inconsistency. Instead of worrying about whether a script ran correctly or triple-checking that you set the proper values on all machines, vMode takes care of that for you.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;1: Removing non-essential features&lt;/H3&gt;
&lt;P&gt;If you’ve ever set up a Windows Server, you’re probably familiar with the &lt;A href="https://learn.microsoft.com/en-us/powershell/module/servermanager/get-windowsfeature" target="_blank" rel="noopener"&gt;Get-WindowsFeature&lt;/A&gt; PowerShell command. Microsoft provides a plethora of roles, role services, and features for configuring a server exactly the way you need it to run for your business needs.&lt;/P&gt;
&lt;P&gt;And that’s awesome! But often, many of these features will go unused on your systems. Even without use, these features will still need to be patched and serviced, creating increased operational overhead. When you select this checkbox, vMode will go ahead and remove all features not required for running compute workloads and those not already installed on the system already.&lt;/P&gt;
&lt;P&gt;Removing Windows Features that aren’t essential keeps the host OS leaner and reduces the system’s attack surface. It also lowers patching and servicing overhead over time, helping improve uptime and reduce operational cost. &amp;nbsp;&lt;/P&gt;
&lt;H3&gt;2: Enable Enhanced Session Mode&lt;/H3&gt;
&lt;P&gt;Hyper-V Enhanced Session Mode lets you connect to a Windows VM through Virtual Machine Connection (VMConnect) using Remote Desktop Protocol (RDP), which enables a richer console experience than basic mode. Enabling it makes the VM window resizable and high-DPI aware and allows convenient host-to-VM integration—like shared clipboard, file copy/paste, and device redirection—so day-to-day admin tasks are faster and less error-prone.&lt;/P&gt;
&lt;P&gt;This is another setting where manual configuration can cost you precious time. You have to configure this setting for both the system and the user. Forget to do one and you’ll spend hours trying to figure out where you went wrong (and might feel quite silly when you figure it out). Select this checkbox and we’ll just set these settings for you, possibly saving hours of frustrating debugging time.&lt;/P&gt;
&lt;H3&gt;3: Configure concurrent migrations&lt;/H3&gt;
&lt;P&gt;Enabling concurrent Live Migrations (often called “simultaneous live migrations”) lets Hyper-V move more than one running VM at a time, which is valuable when you need to drain a host quickly for patching, hardware maintenance, or cluster rebalancing. In well-provisioned environments, increasing concurrency can reduce the total time it takes to complete a batch of migrations and get hosts back into service—while still giving you a knob to tune so migration traffic doesn’t overwhelm CPU, storage, or network bandwidth.&lt;/P&gt;
&lt;P&gt;In vMode, you can select 1, 2, 4, or no concurrent migrations. This is another case where we’re ensuring consistency in your setup by configuring multiple settings for you at once, saving you the pain of manual configuration.&lt;/P&gt;
&lt;H3&gt;4: Setting your default virtual machine path&lt;/H3&gt;
&lt;P&gt;The last setting we ask you to configure is your default virtual machine path. Historically, Hyper-V has set two different paths for your virtual machines and virtual hard disks—you can see this If you navigate into the tool today.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Having a different path for every VHD can make it challenging to find what you’re looking for. In vMode, we ask you for one path that is accessible for all machines you added in the beginning of the wizard, and we’ll use this same path for all machines. Even if the path doesn’t exist yet, we’ll create it for you as long as the drive letter exists and the path is valid. Your VHDs will appear in nested folders under this directory.&lt;/P&gt;
&lt;P&gt;Your options for this are dependent on what you told us about on the “&lt;A href="https://techcommunity.microsoft.com/blog/windows-admin-center-blog/configuring-storage-for-hyper-v-hosts-in-vmode/4504263" target="_blank" rel="noopener"&gt;Storage&lt;/A&gt;” screen. If you added storage, it will appear in the dropdown menu. If you elected to use storage already provisioned for a cluster, the dropdown may be greyed out—this path should default to a location like %SystemDrive%\Virtual Machines or… Additionally, if you elected to use storage already provisioned for the system, and you added one or multiple standalone hosts on the “Getting started” screen, the dropdown menu will contain all local drives that appear on all the standalone systems. If one system doesn’t have a particular drive, it will not show up in the menu.&lt;/P&gt;
&lt;H2&gt;What happens next&lt;/H2&gt;
&lt;P&gt;After proving we can count and hit submit, vMode will configure Hyper-V settings on all systems based on your selections. We’ll install the following features on all Compute systems:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Hyper-V&lt;/LI&gt;
&lt;LI&gt;Network ATC&lt;/LI&gt;
&lt;LI&gt;Data Center Bridging (required for Network ATC)&lt;/LI&gt;
&lt;LI&gt;Failover Clustering (required for Network ATC and used for HA Hyper-V)&lt;/LI&gt;
&lt;LI&gt;AD RSAT PowerShell tools (required for storing VMs on file shares)&lt;/LI&gt;
&lt;LI&gt;Multipath-IO (only installed if SAN storage was configured)&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;And uninstall everything else (while leaving features already installed outside of this wizard alone).&lt;/P&gt;
&lt;P&gt;This song and dance will require a reboot, and we’ll do that for you. When dealing with existing clusters already running workloads, it can get a bit complicated. vMode will perform node drain and ensure seamless reboot of your cluster nodes.&lt;/P&gt;
&lt;H2&gt;Summary&lt;/H2&gt;
&lt;P&gt;On the Compute screen, vMode reduces the time you have to spend fiddling with Hyper-V settings by performing smart configurations for you, getting you up and running faster. The Add Resource wizard is designed to make your system onboarding experience as easy as possible, simplifying your networking, storage, and compute configuration. Public Preview 2 is dropping with the features we’ve discussed here and more very soon. Give vMode a try and leave us feedback at &lt;A href="https://aka.ms/wacfeedback" target="_blank" rel="noopener"&gt;aka.ms/wacfeedback&lt;/A&gt;!&lt;/P&gt;
&lt;P&gt;Thanks for reading,&lt;/P&gt;
&lt;P&gt;Davanna White&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 06 Apr 2026 15:35:02 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-admin-center-blog/configuring-compute-in-windows-admin-center-virtualization-mode/ba-p/4508891</guid>
      <dc:creator>Davanna-White</dc:creator>
      <dc:date>2026-04-06T15:35:02Z</dc:date>
    </item>
    <item>
      <title>package ssu and online windows update service</title>
      <link>https://techcommunity.microsoft.com/t5/windows-admin-center/package-ssu-and-online-windows-update-service/m-p/4508808#M2771</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;i've a new installation, i update online Windows server 2022. the windows update service install the last cumulative package.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I don't see previous ssu update installed package are mandatory because it's online update ?&lt;/P&gt;</description>
      <pubDate>Mon, 06 Apr 2026 00:33:35 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-admin-center/package-ssu-and-online-windows-update-service/m-p/4508808#M2771</guid>
      <dc:creator>zoomzoom</dc:creator>
      <dc:date>2026-04-06T00:33:35Z</dc:date>
    </item>
    <item>
      <title>Failover clustering: heart of the private cloud and datacenter</title>
      <link>https://techcommunity.microsoft.com/t5/windows-server-events/failover-clustering-heart-of-the-private-cloud-and-datacenter/ec-p/4507827#M1207</link>
      <description>&lt;P&gt;Failover clustering remains the foundation of resilient private cloud and datacenter infrastructure. Walk through the failover clustering roadmap and key investments coming in the next version of Windows Server. Learn about new and improved capabilities, such as enhanced update orchestration and admission control, which is designed to improve availability, predictability, and operational confidence at scale. We’ll also dive into how failover clustering continues to evolve to meet the real‑world needs of modern private cloud and private datacenter environments, informed directly by customer feedback and real-world experiences.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;This session is part of &lt;STRONG&gt;&lt;A href="https://aka.ms/WindowsServerSummit" target="_blank"&gt;Windows Server Summit 2026&lt;/A&gt;&lt;/STRONG&gt;. Questions can be posted in advance and throughout event week. Drop yours in the comments below.&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;H2 style="margin-top: 36px; margin-bottom: 20px; font-family: 'Segoe UI', Segoe, Tahoma, Geneva, sans-serif; font-weight: 600; font-size: 22px; color: #333333;"&gt;How do I participate?&amp;nbsp;&lt;/H2&gt;
&lt;P&gt;Select &lt;STRONG&gt;Add to calendar&lt;/STRONG&gt; to save the date, then click the &lt;STRONG&gt;Attend&lt;/STRONG&gt; button to save your spot, receive event reminders, and participate in the Q&amp;amp;A. (Don’t see the Attend button? Sign in to join the conversation!)&lt;BR /&gt;&lt;BR /&gt;If you can’t make the live event, don’t worry. This session will be recorded and available on demand shortly after airing. Q&amp;amp;A with the product team will also remain open in the comments for the full week.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 01 Apr 2026 19:46:13 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-server-events/failover-clustering-heart-of-the-private-cloud-and-datacenter/ec-p/4507827#M1207</guid>
      <dc:creator>Pearl-Angeles</dc:creator>
      <dc:date>2026-04-01T19:46:13Z</dc:date>
    </item>
    <item>
      <title>Let’s talk storage: NVMe, ReFS, and what’s coming next</title>
      <link>https://techcommunity.microsoft.com/t5/windows-server-events/let-s-talk-storage-nvme-refs-and-what-s-coming-next/ec-p/4507826#M1206</link>
      <description>&lt;P&gt;Take a closer look at how storage is evolving in Windows Server, from NVMe improvements to high‑level platform investments. Dive into the details of native NVMe support, NVMe‑OF direction, ReFS enhancements, and Storage Spaces and S2D improvements. We’ll walk through what’s available today in Windows Server 2025, highlight recent performance and resiliency enhancements, and share what’s coming next in future versions of Windows Server.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;This session is part of &lt;STRONG&gt;&lt;A href="https://aka.ms/WindowsServerSummit" target="_blank"&gt;Windows Server Summit 2026&lt;/A&gt;&lt;/STRONG&gt;. Questions can be posted in advance and throughout event week. Drop yours in the comments below.&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;H2 style="margin-top: 36px; margin-bottom: 20px; font-family: 'Segoe UI', Segoe, Tahoma, Geneva, sans-serif; font-weight: 600; font-size: 22px; color: #333333;"&gt;How do I participate?&amp;nbsp;&lt;/H2&gt;
&lt;P&gt;Select &lt;STRONG&gt;Add to calendar&lt;/STRONG&gt; to save the date, then click the &lt;STRONG&gt;Attend&lt;/STRONG&gt; button to save your spot, receive event reminders, and participate in the Q&amp;amp;A. (Don’t see the Attend button? Sign in to join the conversation!)&lt;BR /&gt;&lt;BR /&gt;If you can’t make the live event, don’t worry. This session will be recorded and available on demand shortly after airing. Q&amp;amp;A with the product team will also remain open in the comments for the full week.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 01 Apr 2026 19:43:56 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-server-events/let-s-talk-storage-nvme-refs-and-what-s-coming-next/ec-p/4507826#M1206</guid>
      <dc:creator>Pearl-Angeles</dc:creator>
      <dc:date>2026-04-01T19:43:56Z</dc:date>
    </item>
    <item>
      <title>Modernize AD for hybrid identity in Windows Server 2025</title>
      <link>https://techcommunity.microsoft.com/t5/windows-server-events/modernize-ad-for-hybrid-identity-in-windows-server-2025/ec-p/4507825#M1205</link>
      <description>&lt;P&gt;Active Directory is evolving to meet modern security and hybrid identity needs. Get a closer look at key updates in Windows Server 2025 including Microsoft Entra Source of Authority enhancements, new security features, and auditing mechanisms. Get tips on how to prepare your environment for an NTLM-less future. Learn how these changes help you modernize and operate Active Directory with greater control and visibility. Walk away with clear guidance on adopting Windows Server 2025 domain controllers in a hybrid world.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;This session is part of &lt;STRONG&gt;&lt;A href="https://aka.ms/WindowsServerSummit" target="_blank"&gt;Windows Server Summit 2026&lt;/A&gt;&lt;/STRONG&gt;. Questions can be posted in advance and throughout event week. Drop yours in the comments below.&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;H2 style="margin-top: 36px; margin-bottom: 20px; font-family: 'Segoe UI', Segoe, Tahoma, Geneva, sans-serif; font-weight: 600; font-size: 22px; color: #333333;"&gt;How do I participate?&amp;nbsp;&lt;/H2&gt;
&lt;P&gt;Select &lt;STRONG&gt;Add to calendar&lt;/STRONG&gt; to save the date, then click the &lt;STRONG&gt;Attend&lt;/STRONG&gt; button to save your spot, receive event reminders, and participate in the Q&amp;amp;A. (Don’t see the Attend button? Sign in to join the conversation!)&lt;BR /&gt;&lt;BR /&gt;If you can’t make the live event, don’t worry. This session will be recorded and available on demand shortly after airing. Q&amp;amp;A with the product team will also remain open in the comments for the full week.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 01 Apr 2026 19:41:42 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-server-events/modernize-ad-for-hybrid-identity-in-windows-server-2025/ec-p/4507825#M1205</guid>
      <dc:creator>Pearl-Angeles</dc:creator>
      <dc:date>2026-04-01T19:41:42Z</dc:date>
    </item>
    <item>
      <title>Future-proofing PKI with AD CS in Windows Server 2025</title>
      <link>https://techcommunity.microsoft.com/t5/windows-server-events/future-proofing-pki-with-ad-cs-in-windows-server-2025/ec-p/4507822#M1204</link>
      <description>&lt;P&gt;As security requirements evolve and cryptographic standards advance, organizations must rethink how they manage and scale their Public Key Infrastructure (PKI). Join the Active Directory Certificate Services (AD CS) product team as we explore the capabilities and investments in Windows Server 2025. Explore key investments across security, including post-quantum cryptography readiness, as well as scalability enhancements, along with guidance to support modern enterprise deployments. Learn how to prepare your PKI for emerging threats and confidently plan your next steps with AD CS on Windows Server 2025.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;This session is part of &lt;STRONG&gt;&lt;A href="https://aka.ms/WindowsServerSummit" target="_blank"&gt;Windows Server Summit 2026&lt;/A&gt;&lt;/STRONG&gt;. Questions can be posted in advance and throughout event week. Drop yours in the comments below.&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;H2 style="margin-top: 36px; margin-bottom: 20px; font-family: 'Segoe UI', Segoe, Tahoma, Geneva, sans-serif; font-weight: 600; font-size: 22px; color: #333333;"&gt;How do I participate?&amp;nbsp;&lt;/H2&gt;
&lt;P&gt;Select &lt;STRONG&gt;Add to calendar&lt;/STRONG&gt; to save the date, then click the &lt;STRONG&gt;Attend&lt;/STRONG&gt; button to save your spot, receive event reminders, and participate in the Q&amp;amp;A. (Don’t see the Attend button? Sign in to join the conversation!)&lt;BR /&gt;&lt;BR /&gt;If you can’t make the live event, don’t worry. This session will be recorded and available on demand shortly after airing. Q&amp;amp;A with the product team will also remain open in the comments for the full week.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 01 Apr 2026 19:39:45 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-server-events/future-proofing-pki-with-ad-cs-in-windows-server-2025/ec-p/4507822#M1204</guid>
      <dc:creator>Pearl-Angeles</dc:creator>
      <dc:date>2026-04-01T19:39:45Z</dc:date>
    </item>
    <item>
      <title>Azure Virtual Desktop deep dive for Windows Server admins</title>
      <link>https://techcommunity.microsoft.com/t5/windows-server-events/azure-virtual-desktop-deep-dive-for-windows-server-admins/ec-p/4507821#M1203</link>
      <description>&lt;P&gt;Azure Virtual Desktop continues to expand beyond the cloud to support hybrid deployment scenarios. Tour the latest Azure Virtual Desktop hybrid capabilities, including how Azure Virtual Desktop integrates with Azure Local to support on‑premises and hybrid desktop environments. Walk through recent enhancements, learn when hybrid Azure Virtual Desktop fits best, and gain an understanding of how these capabilities extend Azure Virtual Desktop to meet performance, locality, and operational requirements.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;This session is part of &lt;STRONG&gt;&lt;A href="https://aka.ms/WindowsServerSummit" target="_blank" rel="noopener"&gt;Windows Server Summit 2026&lt;/A&gt;&lt;/STRONG&gt;. Questions can be posted in advance and throughout event week. Drop yours in the comments below.&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;H2 style="margin-top: 36px; margin-bottom: 20px; font-family: 'Segoe UI', Segoe, Tahoma, Geneva, sans-serif; font-weight: 600; font-size: 22px; color: #333333;"&gt;How do I participate?&amp;nbsp;&lt;/H2&gt;
&lt;P&gt;Select &lt;STRONG&gt;Add to calendar&lt;/STRONG&gt; to save the date, then click the &lt;STRONG&gt;Attend&lt;/STRONG&gt; button to save your spot, receive event reminders, and participate in the Q&amp;amp;A. (Don’t see the Attend button? Sign in to join the conversation!)&lt;BR /&gt;&lt;BR /&gt;If you can’t make the live event, don’t worry. This session will be recorded and available on demand shortly after airing. Q&amp;amp;A with the product team will also remain open in the comments for the full week.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;This session has been changed from 60 minutes to 30 minutes so that we can add a session on &lt;/EM&gt;&lt;A href="https://techcommunity.microsoft.com/event/windowsserver-events/networking-in-windows-server-2025/4510937" data-lia-auto-title="Networking in Windows Server 2025" data-lia-auto-title-active="0" target="_blank"&gt;Networking in Windows Server 2025&lt;/A&gt;.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 13 Apr 2026 19:00:16 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-server-events/azure-virtual-desktop-deep-dive-for-windows-server-admins/ec-p/4507821#M1203</guid>
      <dc:creator>Pearl-Angeles</dc:creator>
      <dc:date>2026-04-13T19:00:16Z</dc:date>
    </item>
    <item>
      <title>Feedback time! Windows Server 2025 and vNext</title>
      <link>https://techcommunity.microsoft.com/t5/windows-server-events/feedback-time-windows-server-2025-and-vnext/ec-p/4507820#M1202</link>
      <description>&lt;P&gt;This is your chance to be heard. Join us for an open feedback session focused on the current state of Windows Server 2025 and the roadmap for the next version of Windows Server (vNext). We’ll share a brief status update and look ahead at what’s coming, then open the floor for honest, constructive feedback. What’s working well today? Which features are frustrating? Where are the usability gaps? And what do you need most from a future version of Windows Server? This session is all about listening to you. Your insights help shape priorities, influence design decisions, and guide where we invest next. Don’t be shy—we’re eager to hear your perspectives and learn from your real‑world experience.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;This session is part of &lt;STRONG&gt;&lt;A href="https://aka.ms/WindowsServerSummit" target="_blank"&gt;Windows Server Summit 2026&lt;/A&gt;&lt;/STRONG&gt;. Questions can be posted in advance and throughout event week. Drop yours in the comments below.&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;H2 style="margin-top: 36px; margin-bottom: 20px; font-family: 'Segoe UI', Segoe, Tahoma, Geneva, sans-serif; font-weight: 600; font-size: 22px; color: #333333;"&gt;How do I participate?&amp;nbsp;&lt;/H2&gt;
&lt;P&gt;Select &lt;STRONG&gt;Add to calendar&lt;/STRONG&gt; to save the date, then click the &lt;STRONG&gt;Attend&lt;/STRONG&gt; button to save your spot, receive event reminders, and participate in the Q&amp;amp;A. (Don’t see the Attend button? Sign in to join the conversation!)&lt;BR /&gt;&lt;BR /&gt;If you can’t make the live event, don’t worry. This session will be recorded and available on demand shortly after airing. Q&amp;amp;A with the product team will also remain open in the comments for the full week.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 01 Apr 2026 19:35:27 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-server-events/feedback-time-windows-server-2025-and-vnext/ec-p/4507820#M1202</guid>
      <dc:creator>Pearl-Angeles</dc:creator>
      <dc:date>2026-04-01T19:35:27Z</dc:date>
    </item>
    <item>
      <title>Upgrade your Windows Server troubleshooting skills</title>
      <link>https://techcommunity.microsoft.com/t5/windows-server-events/upgrade-your-windows-server-troubleshooting-skills/ec-p/4507819#M1201</link>
      <description>&lt;P&gt;Explore some of the most common Windows Server issues—and solutions—based on real‑world support cases. We’ll break down why these issues occur, what typically triggers them, how they surface in customer environments. More importantly, we'll share practical guidance and remediation tips to help you troubleshoot, resolve, and avoid these problems in your own environment.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;This session is part of &lt;STRONG&gt;&lt;A href="https://aka.ms/WindowsServerSummit" target="_blank"&gt;Windows Server Summit 2026&lt;/A&gt;&lt;/STRONG&gt;. Questions can be posted in advance and throughout event week. Drop yours in the comments below.&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;H2 style="margin-top: 36px; margin-bottom: 20px; font-family: 'Segoe UI', Segoe, Tahoma, Geneva, sans-serif; font-weight: 600; font-size: 22px; color: #333333;"&gt;How do I participate?&amp;nbsp;&lt;/H2&gt;
&lt;P&gt;Select &lt;STRONG&gt;Add to calendar&lt;/STRONG&gt; to save the date, then click the &lt;STRONG&gt;Attend&lt;/STRONG&gt; button to save your spot, receive event reminders, and participate in the Q&amp;amp;A. (Don’t see the Attend button? Sign in to join the conversation!)&lt;BR /&gt;&lt;BR /&gt;If you can’t make the live event, don’t worry. This session will be recorded and available on demand shortly after airing. Q&amp;amp;A with the product team will also remain open in the comments for the full week.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 01 Apr 2026 19:32:52 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-server-events/upgrade-your-windows-server-troubleshooting-skills/ec-p/4507819#M1201</guid>
      <dc:creator>Pearl-Angeles</dc:creator>
      <dc:date>2026-04-01T19:32:52Z</dc:date>
    </item>
    <item>
      <title>AI workloads on Windows Server</title>
      <link>https://techcommunity.microsoft.com/t5/windows-server-events/ai-workloads-on-windows-server/ec-p/4507818#M1200</link>
      <description>&lt;P&gt;Azure delivers a robust foundation for AI workloads, complemented by modern Windows Server deployments that enable AI scenarios on‑premises. Find out what to look for when planning AI‑ready server hardware, and how to think about performance, security, and operational consistency as AI becomes part of your server strategy. Explore real‑world considerations for running AI workloads on‑premises. You’ll come away with a clearer understanding of how to plan, deploy, and operate Windows Server for today’s AI scenarios and how to prepare for what's next.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;This session is part of &lt;STRONG&gt;&lt;A href="https://aka.ms/WindowsServerSummit" target="_blank"&gt;Windows Server Summit 2026&lt;/A&gt;&lt;/STRONG&gt;. Questions can be posted in advance and throughout event week. Drop yours in the comments below.&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;H2 style="margin-top: 36px; margin-bottom: 20px; font-family: 'Segoe UI', Segoe, Tahoma, Geneva, sans-serif; font-weight: 600; font-size: 22px; color: #333333;"&gt;How do I participate?&amp;nbsp;&lt;/H2&gt;
&lt;P&gt;Select &lt;STRONG&gt;Add to calendar&lt;/STRONG&gt; to save the date, then click the &lt;STRONG&gt;Attend&lt;/STRONG&gt; button to save your spot, receive event reminders, and participate in the Q&amp;amp;A. (Don’t see the Attend button? Sign in to join the conversation!)&lt;BR /&gt;&lt;BR /&gt;If you can’t make the live event, don’t worry. This session will be recorded and available on demand shortly after airing. Q&amp;amp;A with the product team will also remain open in the comments for the full week.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 01 Apr 2026 19:31:11 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-server-events/ai-workloads-on-windows-server/ec-p/4507818#M1200</guid>
      <dc:creator>Pearl-Angeles</dc:creator>
      <dc:date>2026-04-01T19:31:11Z</dc:date>
    </item>
  </channel>
</rss>

