<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>Networking Blog articles</title>
    <link>https://techcommunity.microsoft.com/t5/networking-blog/bg-p/NetworkingBlog</link>
    <description>Networking Blog articles</description>
    <pubDate>Thu, 16 Apr 2026 20:49:54 GMT</pubDate>
    <dc:creator>NetworkingBlog</dc:creator>
    <dc:date>2026-04-16T20:49:54Z</dc:date>
    <item>
      <title>Secure DNS with DoH: Public Preview for Windows DNS Server</title>
      <link>https://techcommunity.microsoft.com/t5/networking-blog/secure-dns-with-doh-public-preview-for-windows-dns-server/ba-p/4493935</link>
      <description>&lt;PRE&gt;&lt;EM&gt;Credit and thanks to Arif Hussain, Jay Ladhad, Kranthi Hasnabad, Sruthy TV, Manish Chaudhari and Rahul Bhadana for implementation work.&lt;/EM&gt;&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Your DNS just got a Zero Trust upgrade.&lt;/P&gt;
&lt;P&gt;Today we’re opening the &lt;STRONG&gt;public preview of DNS over HTTPS (DoH) for Windows DNS Server&lt;/STRONG&gt;, bringing encrypted, authenticated DNS to the heart of your on‑premises network. Turn it on, and the signals your business runs-on stop traveling in the clear. This is how you harden the backbone without disrupting what already works.&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;The Importance of Securing DNS&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;In today’s digital world, information is king and securing it is non-negotiable. With most data stored digitally and accessed remotely, network security is critical. At the heart of every network lies DNS, because everything depends on it.&lt;/P&gt;
&lt;P&gt;However, the challenge is that DNS traditionally operates in the clear: queries and responses are exposed to anyone watching, giving attackers visibility into network details and user behavior, thereby creating opportunities for attacks.&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;How can we secure it?&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;IETF introduced two standards for encrypting DNS:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://www.rfc-editor.org/rfc/rfc8484" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;RFC 8484&lt;/STRONG&gt;&lt;/A&gt;, DNS over HTTPS (DoH)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://www.rfc-editor.org/rfc/rfc7858" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;RFC 7858&lt;/STRONG&gt;&lt;/A&gt;, DNS over TLS (DoT)&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Each of these standards has pros and cons, but today we are excited to announce that we’ve introduced support for DNS over HTTPS (DoH), for client-side traffic, in Windows DNS Server, starting with the February 10&lt;SUP&gt;th&lt;/SUP&gt; 2026 monthly update of Windows Server 2025.&lt;/P&gt;
&lt;P&gt;In a nutshell, DoH encapsulates DNS queries and responses inside HTTPS messages, which are encrypted via the TLS layer. This delivers two key benefits:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt;Authentication&lt;/STRONG&gt;: Clients can verify the DNS server, preventing impersonation attacks.&amp;nbsp; This is done through the server’s certificate validation process inherent to TLS clients.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Privacy&lt;/STRONG&gt;: Queries and responses are encrypted in transit, shielding them from prying eyes.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;DoH support in Windows DNS Server is complementary to the broader &lt;A href="https://learn.microsoft.com/en-us/windows/security/operating-system-security/network-security/zero-trust-dns/" target="_blank" rel="noopener"&gt;Zero Trust DNS&lt;/A&gt; efforts already introduced on Windows clients. Together, these capabilities enable organizations to adopt encrypted, authenticated DNS across both endpoints and on-premises infrastructure, creating a consistent security foundation aligned with modern Zero Trust principles. For U.S. Federal agencies, this end-to-end encryption model directly supports requirements in &lt;A href="https://www.whitehouse.gov/wp-content/uploads/2022/01/M-22-09.pdf" target="_blank" rel="noopener"&gt;OMB Memo M-22-09&lt;/A&gt;, which mandates the use of encrypted DNS protocols, such as DoH, across both resolvers and endpoints to strengthen cybersecurity posture.&lt;/P&gt;
&lt;P&gt;For more information on Zero Trust DNS, read the blog at: &lt;A href="https://techcommunity.microsoft.com/blog/networkingblog/zero-trust-dns-is-here-elevating-enterprise-security-on-windows-11/4468743" target="_blank" rel="noopener"&gt;Zero Trust DNS is Here: Elevating Enterprise Security on Windows 11 | Microsoft Community Hub&lt;/A&gt;.&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;What behavior can I expect with DoH?&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;Enabling DoH on Windows DNS Server will encrypt all queries received and all responses sent on the port used for DoH (by default: 443). &amp;nbsp;&amp;nbsp;However, any queries sent out by the Windows DNS Server towards an upstream DNS server (e.g. conditional forwarder, authoritative server) will not be encrypted and will remain on port 53.&amp;nbsp; Support for encrypting queries towards an upstream forwarder or resolver will be in preview at a later date, while encrypted queries towards an authoritative server is to be determined pending standardization by IETF.&lt;/P&gt;
&lt;P&gt;If you decide to retain UDP/TCP port 53 enabled on Windows DNS Server, for client-side traffic, simultaneously as you have DoH enabled, the traffic on port 53 will continue to be handled as-is by the Windows DNS server (ie. unencrypted).&lt;/P&gt;
&lt;P&gt;All the functions and capabilities administrators rely on for day-to-day management of the DNS server are retained. So, functions such as name resolution behavior, zone management, forwarding logic, etc. are intended to continue to operate exactly as they always have. The DoH feature does not change or disrupt existing Windows DNS Server functionality, but it does introduce new PowerShell commandlets, new events and new performance counters to enable management of the DoH feature.&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;Getting Started&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;&lt;EM&gt;Note: DNS over HTTPS (DoH) on Windows DNS Server is currently available in Public Preview and &lt;STRONG&gt;is intended for evaluation and feedback only&lt;/STRONG&gt;. It is not supported for production use as bugs may be present. Functionality may also change, including potential breaking changes, before General Availability (GA).&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The public preview of DNS over HTTPS (DoH) is included in the February 10&lt;SUP&gt;th&lt;/SUP&gt; 2026 update of Windows Server 2025 and is disabled by default.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;To enable the feature during this preview period request access &lt;/STRONG&gt;&lt;A href="https://aka.ms/doh-preview" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;here&lt;/STRONG&gt;&lt;/A&gt;&lt;STRONG&gt;. &amp;nbsp;&lt;/STRONG&gt;Then head over to &lt;A href="https://aka.ms/doh-overview" target="_blank" rel="noopener"&gt;DNS over HTTPS Overview&lt;/A&gt; and unlock the full story behind the feature.&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="lia-text-color-21"&gt;Your journey into encrypted DNS starts now!&lt;/SPAN&gt;&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;Reporting&amp;nbsp;feedback&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;We value your feedback! Your feedback is crucial for us as we get to work towards our General Availability release.&lt;/P&gt;
&lt;P&gt;If you have questions or general feedback on this preview we’d love to hear from you! &amp;nbsp;Feel free to comment in the section below this blog. Or see below for reporting bugs and feature suggestions.&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;Reporting bugs or Feature suggestions&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;From your Windows Server 2025 machine:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Search for &lt;STRONG&gt;Feedback Hub&lt;/STRONG&gt; in Start Menu and launch the app.&lt;/LI&gt;
&lt;LI&gt;From the ‘&lt;STRONG&gt;Home’&lt;/STRONG&gt; section of the app, click the “Report a problem” or “Suggest a feature” button.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;In the section ‘&lt;STRONG&gt;1. Enter your feedback’, &lt;/STRONG&gt;&amp;nbsp;find the &lt;STRONG&gt;‘Summarize your feedback’&lt;/STRONG&gt; textbox and start your feedback by prepending the text ‘&lt;STRONG&gt;[DoH]&lt;/STRONG&gt;’ to it to help our team triage feedback.&amp;nbsp; Enter any additional comments and details in the &lt;STRONG&gt;‘Explain in more detail’.&lt;/STRONG&gt;&amp;nbsp; Click &lt;STRONG&gt;Next&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;In the left drop box of section ‘&lt;STRONG&gt;2. Choose a category’, &lt;/STRONG&gt;choose &lt;STRONG&gt;Windows Server&lt;/STRONG&gt; and on the right dropdown box, choose &lt;STRONG&gt;DNS Server&lt;/STRONG&gt;.&amp;nbsp; Click &lt;STRONG&gt;Next&lt;/STRONG&gt;.&lt;BR /&gt;&lt;BR /&gt;Note: If you are advised that no similar feedback could be found, Click &lt;STRONG&gt;Next&lt;/STRONG&gt; again.&lt;/LI&gt;
&lt;/UL&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Fill out Section 4 and click &lt;STRONG&gt;Submit&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;/UL&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 10 Feb 2026 20:21:45 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/networking-blog/secure-dns-with-doh-public-preview-for-windows-dns-server/ba-p/4493935</guid>
      <dc:creator>JorgeCañas</dc:creator>
      <dc:date>2026-02-10T20:21:45Z</dc:date>
    </item>
    <item>
      <title>Resolve-DnsName vs. nslookup in Windows</title>
      <link>https://techcommunity.microsoft.com/t5/networking-blog/resolve-dnsname-vs-nslookup-in-windows/ba-p/4483858</link>
      <description>&lt;P&gt;Oh boy, here we go again. The last time I talked about a networking tool, the infamous &lt;A href="https://techcommunity.microsoft.com/blog/networkingblog/three-reasons-why-you-should-not-use-iperf3-on-windows/4117876" target="_blank" rel="noopener"&gt;iPerf3 article&lt;/A&gt;, I kicked up a hornet’s nest online. This one should not be controversial. I hope.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The choice of tool you pick to diagnose name resolution, such as DNS, inside Windows can impact the accuracy of your troubleshooting. This article is going to discuss the option every Windows admin knows, nslookup, versus the newer kid on the block, PowerShell’s Resolve-DnsName.&lt;/P&gt;
&lt;H2&gt;nslookup: The tool we know and love!&lt;/H2&gt;
&lt;P&gt;nslookup is typically the go-to option for Windows admins when doing name resolution. It works, it works everywhere, and it works (mostly) well. But, because these articles always have a but, it has some quirks that you may not be aware of.&lt;/P&gt;
&lt;P&gt;nslookup is a standalone executable which operates independently of the Windows DNS client resolver (DNS-CR). What does this mean?&lt;/P&gt;
&lt;P&gt;When an application inside Windows resolves a computer or a domain name, like mapping a drive in File Explorer, it makes one of a handful of API calls. Those API calls will almost always end up at&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/windows/win32/api/windns/nf-windns-dnsqueryex" target="_blank" rel="noopener"&gt;DnsQueryEx()&lt;/A&gt;. Nslookup does not use DnsQueryEx(). It does not make any name resolution Windows API calls. This is both good and bad.&lt;/P&gt;
&lt;P&gt;The good part? When no Windows-centric troubleshooting is involved, and you just need to resolve an IP address from a DNS server, then nslookup is great. Or, if you suspect that the Windows DNS client resolver (DNS-CR) is acting up, use nslookup! When nslookup works but a Windows process does not, then there is a good chance that there is a Windows, DNS policy, or endpoint protection related issue.&lt;/P&gt;
&lt;P&gt;The bad part means that nslookup does not match the name resolution behaviors used by Windows roles, features, services, apps, and most programs running on Windows. This can lead to false results, depending on the type of name resolution troubleshooting you are performing. The biggest gotcha here is that nslookup requires formal dot termination on multi-label names to signify the root domain.&lt;/P&gt;
&lt;H2&gt;I understand those are words… what do they mean in this order?&lt;/H2&gt;
&lt;P&gt;A label, in DNS terms, is a portion of a domain name. When there is only one label, it is called a single-label name. This is more commonly known as a short, NetBIOS, or host/computer name. Think of it as a device’s network name without an attached domain. A multi-label name is a DNS name with more than one label. We are imaginative with naming in the network space. This is also known as the Fully Qualified Domain Name (FQDN) or the "website" or domain part of a URL – for example, learn.microsoft.com in the URL: learn.microsoft.com/powershell/module/dnsclient/resolve-dnsname&lt;/P&gt;
&lt;P&gt;Each label is separated by a dot, or period. And, when being super technical, a multi-label name or FQDN should be terminated by a dot. While this is no longer standard practice, nslookup expects FQDNs to be dot terminated. nslookup will append every defined DNS search suffix to an unterminated query before it tries the FQDN by itself. This is great for single-label names, and not so great for multi-label names because too many DNS suffixes can cause a timeout.&lt;/P&gt;
&lt;PRE&gt;Fig. 1 – A screenshot of the Windows DNS suffixes used in this example.&lt;/PRE&gt;
&lt;img /&gt;
&lt;P&gt;Imagine you want the IP addresses used by bing.com. The system's DNS suffix search list contains contoso.com, fabrikam.com, adatum.com, and northwindtraders.com. You enter "nslookup bing.com" without dot termination and get a DNS timeout error. You start Wireshark, try again, and see the following DNS queries:&lt;/P&gt;
&lt;PRE&gt;&amp;nbsp;&lt;/PRE&gt;
&lt;PRE&gt;Fig. 2 - Trimmed Wireshark output of "nslookup bing.com" from this example.&lt;/PRE&gt;
&lt;LI-CODE lang="shell"&gt;Standard query 0x0002 A bing.com.contoso.com
Standard query 0x0004 A bing.com.fabrikam.com
Standard query 0x0006 A bing.com.adatum.com
Standard query 0x0008 A bing.com.northwindtraders.com
Standard query 0x000a A bing.com&lt;/LI-CODE&gt;
&lt;P&gt;Then you remember the lessons learned in this article and enter "nslookup bing.com." and you get the IP addresses you expect. The Wireshark trace now shows no unexpected queries.&lt;/P&gt;
&lt;H2&gt;Other nslookup Quirks&lt;/H2&gt;
&lt;P&gt;Here are other nslookup quirks you should know about. The first is that nslookup only uses DNS servers for name resolution. The Windows DNS-CR will use the hosts file, DNS client cache, WINS, NetBIOS Name Services, LLMNR, multicast DNS (mDNS), and DNS servers. That's quite a difference in name resolution options.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://techcommunity.microsoft.com/blog/networkingblog/aligning-on-mdns-ramping-down-netbios-name-resolution-and-llmnr/3290816" target="_blank" rel="noopener"&gt;LLMNR and NetBIOS are going away&lt;/A&gt; in the future, in case you have not heard. As is &lt;A href="https://support.microsoft.com/en-us/topic/wins-removal-moving-forward-with-modern-name-resolution-f00381f0-7237-4f7b-8e78-aa6f9c5b279f" target="_blank" rel="noopener"&gt;WINS&lt;/A&gt; (finally!). Even so, that leaves mDNS, hosts, local cache, and any future name resolutions options added to Windows.&lt;/P&gt;
&lt;P&gt;Second, nslookup does not support newer DNS encryption technologies like DNS over TLS (DoT), DNS over HTTPS (DoH), and so on. Therefore, using nslookup could be a security violation in certain environments as it would cause unencrypted traffic on the network. Granted, this functionality can be added in a future update, but there are currently no plans to do so. Resolve-DnsName will leverage DoT and DoH when the &lt;A href="https://learn.microsoft.com/windows-server/networking/dns/doh-client-support" target="_blank" rel="noopener"&gt;Window DNS client is configured&lt;/A&gt; to use secure DNS.&lt;/P&gt;
&lt;P&gt;Nslookup does not honor DNS policies like the NRPT (&lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/dn593632(v=ws.11)" target="_blank" rel="noopener"&gt;Name Resolution Policy Table&lt;/A&gt;). A Windows process using DNS-CR will use all system defined DNS policies. Nslookup ignores DNS policies, queries only the system defined DNS servers, and may fail or provide inaccurate results on systems using the NRPT and other DNS policies. This does make nslookup handy when troubleshooting whether DNS policies are working.&lt;/P&gt;
&lt;P&gt;The last quirk is DNSSEC, which has its own section later in the article.&lt;/P&gt;
&lt;H2&gt;Resolve-DnsName: The Windows-Centric Approach&lt;/H2&gt;
&lt;P&gt;&lt;A href="https://learn.microsoft.com/powershell/module/dnsclient/resolve-dnsname" target="_blank" rel="noopener"&gt;Resolve-DnsName&lt;/A&gt; is a PowerShell cmdlet which leverages the Windows DNS-CR by making direct DnsQueryEx() API calls. The use of DnsQueryEx() is what gives the cmdlet all the name resolution options available in Windows. This means that Resolve-DnsName results are Windows accurate name resolution behavior. In other words, if you want to test how a program in Windows does name resolution, then Microsoft recommends using Resolve-DnsName.&lt;/P&gt;
&lt;P&gt;Resolve-DnsName provides several versatile options, such as testing queries against only DNS servers (&lt;STRONG&gt;-DnsOnly&lt;/STRONG&gt;), bypassing the hosts file (&lt;STRONG&gt;-NoHostsFile&lt;/STRONG&gt;), using only the local cache (&lt;STRONG&gt;-CacheOnly&lt;/STRONG&gt;), and using only multicast resolvers like mDNS (&lt;STRONG&gt;-LlmnrNetbiosOnly&lt;/STRONG&gt;). These parameters make Resolve-DnsName the ideal choice for diagnosing complex name resolution issues in Windows environments.&lt;/P&gt;
&lt;P&gt;No dot termination is needed; in case you were wondering. And Resolve-DnsName is much easier to use with PowerShell automation and scripting.&lt;/P&gt;
&lt;H2&gt;Examples&lt;/H2&gt;
&lt;P&gt;Here are a few examples for you. Both Resolve-DnsName and nslookup examples are provided, where applicable.&lt;/P&gt;
&lt;H3&gt;Example 1: Query using DNS only to Cloudflare's public DNS server.&lt;/H3&gt;
&lt;LI-CODE lang="powershell"&gt;Resolve-DnsName bing.com -DnsOnly -Server 1.1.1.1&lt;/LI-CODE&gt;&lt;LI-CODE lang="powershell"&gt;nslookup.exe bing.com. 1.1.1.1&lt;/LI-CODE&gt;
&lt;P&gt;This will send a DNS query to 1.1.1.1 asking for the IP addresses of bing.com. By default, both host record types, A (IPv4) and AAAA (IPv6), are requested. Nslookup can do this by entering the DNS server's IP address after the query.&lt;/P&gt;
&lt;H3&gt;Example 2: Use Cloudflare public DNS to get bing.com AAAA (IPv6) records.&lt;/H3&gt;
&lt;LI-CODE lang="powershell"&gt;Resolve-DnsName bing.com -Server 1.1.1.1 -Type AAAA&lt;/LI-CODE&gt;&lt;LI-CODE lang="powershell"&gt;nslookup.exe -type=AAAA bing.com. 1.1.1.1&lt;/LI-CODE&gt;
&lt;P&gt;Same as example one, but without IPv4 addresses.&lt;/P&gt;
&lt;H3&gt;Example 3: Query a printer over mDNS.&lt;/H3&gt;
&lt;LI-CODE lang="powershell"&gt;Resolve-DnsName printer01.local -LlmnrNetbiosOnly&lt;/LI-CODE&gt;
&lt;P&gt;Ignore the fact that the parameter says LLMNR. Think of it as -LocalOnly. This parameter uses all broadcast and multicast name resolution methods enabled on Windows and ignores the DNS servers, cache, and the hosts file. Nslookup has no local name resolution capabilities.&lt;/P&gt;
&lt;H3&gt;Example 4: Perform a DNSSEC query&lt;/H3&gt;
&lt;LI-CODE lang="powershell"&gt;Resolve-DnsName example.com -DnssecOk&lt;/LI-CODE&gt;
&lt;P&gt;Speaking of DNSSEC…&lt;/P&gt;
&lt;H2&gt;DNSSEC&lt;/H2&gt;
&lt;P&gt;nslookup is not DNSSEC aware. For any DNSSEC-related diagnostics, Resolve-DnsName should be your tool of choice in Windows. There are two options to enable DNSSEC: &lt;A href="https://learn.microsoft.com/en-us/powershell/module/dnsclient/resolve-dnsname?view=windowsserver2025-ps#-dnsseccd" target="_blank" rel="noopener"&gt;-DnssecCd&lt;/A&gt; and &lt;A href="https://learn.microsoft.com/en-us/powershell/module/dnsclient/resolve-dnsname?view=windowsserver2025-ps#-dnssecok" target="_blank" rel="noopener"&gt;-DnssecOk&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;Explaining DNSSEC is a wheel I do not intend on reinventing. Here is a series of articles for those who are interested in how DNSSEC works and how to use Resolve-DnsName to test.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://learn.microsoft.com/en-us/windows-server/networking/dns/dnssec-overview" target="_blank" rel="noopener"&gt;https://learn.microsoft.com/en-us/windows-server/networking/dns/dnssec-overview&lt;/A&gt;&lt;/P&gt;
&lt;H2&gt;But It’s So Many Letters!&lt;/H2&gt;
&lt;P&gt;I know, right! These PowerShell cmdlets names can be long. Go look at some of the &lt;A href="https://learn.microsoft.com/en-us/powershell/module/microsoft.graph.identity.signins/remove-mgidentityauthenticationeventflowasongraphapretributecollectionexternaluserselfservicesignupattributeidentityuserflowattributebyref?view=graph-powershell-1.0" target="_blank" rel="noopener"&gt;Microsoft Graph cmdlet&lt;/A&gt; names. Phew!&lt;/P&gt;
&lt;P&gt;Let me introduce you to PowerShell &lt;A href="https://learn.microsoft.com/powershell/module/microsoft.powershell.core/about/about_profiles?view=powershell-7.5" target="_blank" rel="noopener"&gt;profiles&lt;/A&gt; and &lt;A href="https://learn.microsoft.com/powershell/module/microsoft.powershell.core/about/about_aliases?view=powershell-7.5" target="_blank" rel="noopener"&gt;aliases&lt;/A&gt;! An alias allows you to create a shortened command. The alias command can be stored in a PowerShell profile. The alias is then added to PowerShell automatically when the profile script runs during session start.&lt;/P&gt;
&lt;P&gt;The alias can be rdns (short for Resolve-DnsName), dig (my favorite), or even nslookup. PowerShell can use both an nslookup alias and the nslookup program at the same time. Type nslookup.exe to use the program, and nslookup to use it as an alias of Resolve-DnsName.&lt;/P&gt;
&lt;H2&gt;Best Practices for Windows DNS Client Troubleshooting&lt;/H2&gt;
&lt;P&gt;For Windows name resolution troubleshooting, testing, and automation, Resolve-DnsName offers a Windows accurate, easier to use experience with more features and controls. Nslookup is still great for basic DNS resolution, and to test certain situations where you suspect there is a Windows DNS-CR or DNS policy issue.&lt;/P&gt;
&lt;P&gt;Learning the fundamental differences between nslookup and Resolve-DnsName will help you avoid common pitfalls and ensure your name resolution troubleshooting efforts are efficient, accurate, and reliable.&lt;/P&gt;
&lt;H2&gt;A Note About Browsers&lt;/H2&gt;
&lt;P&gt;It turns out that nslookup is not the only independent DNS resolver on your computer. All major browsers now have a secure DNS option. Last I checked, secure DNS is enabled by default on non-managed systems. A browser with secure DNS enabled will first try to resolve a domain’s IP address by using DNS over HTTPS (DoH) or DNS over TLS (DoT). Browsers use public DNS servers when performing secure DNS.&lt;/P&gt;
&lt;P&gt;A plain packet capture will not be able to parse the secure DNS traffic because it will be encrypted. Which is the whole point of secure DNS. The Windows DNS client cache will likewise not contain the browser's secure DNS query results. There are Active Directory and Intune policies which force the big three browsers to use Windows system DNS to avoid unauthorized DNS access.&lt;/P&gt;
&lt;P&gt;The Windows 11 DNS client has had support for DoH and DoT for a while now. As for DNS over HTTPS support on Windows DNS Server…stay tuned to the Tech Community Networking blog. Specifically in the February 2026 timeframe.&lt;/P&gt;
&lt;H2&gt;An Ode to dig Before I Go!&lt;/H2&gt;
&lt;P&gt;Oh BIND, oh BIND, why have you forsaken Windows? I miss my dig. Yes, I do. I guess WSL2 will have to do.&lt;/P&gt;</description>
      <pubDate>Thu, 08 Jan 2026 15:25:12 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/networking-blog/resolve-dnsname-vs-nslookup-in-windows/ba-p/4483858</guid>
      <dc:creator>JamesKehr</dc:creator>
      <dc:date>2026-01-08T15:25:12Z</dc:date>
    </item>
    <item>
      <title>Announcing General Availability for AccelNet on Windows Server 2025</title>
      <link>https://techcommunity.microsoft.com/t5/networking-blog/announcing-general-availability-for-accelnet-on-windows-server/ba-p/4466770</link>
      <description>&lt;P&gt;Customers tell us two things about modernizing their datacenters: &lt;STRONG&gt;every CPU cycle counts,&lt;/STRONG&gt; and &lt;STRONG&gt;predictable latency beats peak throughput&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;That’s why we’re bringing&lt;STRONG&gt; &lt;/STRONG&gt;Accelerated Networking (AccelNet), the same technology used in Azure, to&amp;nbsp;Windows Server 2025 Datacenter. With AccelNet, you can run more VMs per host, deliver consistent performance, and free up CPU for what matters most: your workloads.&lt;/P&gt;
&lt;H3&gt;Why Accelerated Networking?&lt;/H3&gt;
&lt;P&gt;Traditional networking paths route packets through the virtual switch, consuming CPU cycles and introducing variability. This overhead can mean unpredictable performance. Accelerated Networking (SR‑IOV) for Windows Server 2025 Datacenter solves this by:&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Bypassing the virtual switch for data plane traffic&lt;/STRONG&gt; using SR‑IOV, reducing CPU overhead.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Lowering latency and jitter&lt;/STRONG&gt;, delivering predictable performance for critical workloads.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Freeing CPU cycles for compute&lt;/STRONG&gt;, so you can maximize VM density per host.&lt;/LI&gt;
&lt;/UL&gt;
&lt;img /&gt;
&lt;P class="lia-clear-both"&gt;AccelNet delivers near line‑rate throughput while dramatically reducing host CPU overhead for Hyper‑V workloads. Built to work seamlessly with Hyper‑V features and Failover Clustering, AccelNet lets you modernize without sacrificing resiliency or manageability. Additionally, because it’s based on the same principles that power Azure networking, you get a consistent operational model across hybrid environments, ensuring predictable performance wherever your workloads run.&lt;/P&gt;
&lt;P&gt;AccelNet shines in scenarios such as:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Transactional and OLTP workloads&lt;/LI&gt;
&lt;LI&gt;High-speed in-memory caching layers&lt;/LI&gt;
&lt;LI&gt;Traffic between VMs in scale-out architectures&lt;/LI&gt;
&lt;LI&gt;Dense virtualization environments with many VMs per host&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;AccelNet isn’t just about enabling SR‑IOV, it’s about making it&amp;nbsp;&lt;STRONG&gt;simple, scalable, and consistent&lt;/STRONG&gt; across your cluster. Traditionally, configuring SR‑IOV meant manual cumbersome setup for every NIC: driver checks, NIC SR-IOV support, consistency validation across the cluster, etc. which was a process prone to errors and drift. To solve this, Accelerated Networking comes with a guided Windows Admin Center experience and matching PowerShell cmdlets. You can enable AccelNet across a cluster in a few clicks, verify which hosts and VMs are enabled, and troubleshoot with clear, actionable checks.&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;How to Get Started&lt;/H3&gt;
&lt;P&gt;Enabling Accelerated Networking is straightforward:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Ensure a valid Azure Arc Pay-as-you-go subscription or Software Assurance license.&lt;/LI&gt;
&lt;LI&gt;Confirm your adapters support SR‑IOV, are part of a Network ATC compute intent and are certified for Windows Server 2025 Datacenter.&lt;/LI&gt;
&lt;LI&gt;Navigate to the "Accelerated Networking" tab on your Windows Admin Center cluster view, then select your configured intent and node reserve.&lt;/LI&gt;
&lt;LI&gt;Once the cluster is enabled, you can now enable/disable AccelNet on one or more VMs at a time!&lt;/LI&gt;
&lt;/OL&gt;
&lt;img /&gt;
&lt;P&gt;For a full guide, please refer to our Learn documentation: &lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/windows-server/networking/technologies/accelerated-networking/accelerated-networking?tabs=powershell" target="_blank" rel="noopener"&gt;Accelerated Networking for Windows Server | Microsoft Learn&lt;/A&gt;&lt;/P&gt;
&lt;H3&gt;Summary&lt;/H3&gt;
&lt;P&gt;Accelerated Networking brings improved performance to Windows Server, reducing CPU overhead and improving predictability for your most demanding workloads. With&lt;STRONG&gt; &lt;/STRONG&gt;intent driven enablement, you can deploy SR‑IOV at scale without complexity, thus unlocking higher VM density and consistent performance across your environment.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Ready to accelerate your network?&lt;/STRONG&gt; Check out the official docs and start optimizing your cluster today!&lt;/P&gt;
&lt;P&gt;For any questions, please reach out to us a &lt;EM&gt;edgenetfeedback@microsoft.com&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Nov 2025 16:40:29 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/networking-blog/announcing-general-availability-for-accelnet-on-windows-server/ba-p/4466770</guid>
      <dc:creator>Basel_Kablawi</dc:creator>
      <dc:date>2025-11-18T16:40:29Z</dc:date>
    </item>
    <item>
      <title>Announcing Network HUD: Operational Network Monitoring for Windows Server 2025</title>
      <link>https://techcommunity.microsoft.com/t5/networking-blog/announcing-network-hud-operational-network-monitoring-for/ba-p/4468723</link>
      <description>&lt;P&gt;Networking issues can disrupt workloads and lead to costly downtime. &lt;STRONG&gt;Network HUD&lt;/STRONG&gt; brings real-time health monitoring to Windows Server clusters, helping you catch misconfigurations and drift before they impact performance. Now you can operate with confidence and keep your networking aligned to best practices.&lt;/P&gt;
&lt;H3&gt;Why Network HUD?&lt;/H3&gt;
&lt;P&gt;Managing host networking isn’t easy. Small misconfigurations, outdated drivers, or bandwidth oversubscription can quickly lead to performance issues or outages. &lt;STRONG&gt;Network HUD&lt;/STRONG&gt; simplifies this by continuously monitoring your cluster’s networking health and surfacing actionable insights. It helps you:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Detect unstable adapters and PCIe oversubscription early&lt;/LI&gt;
&lt;LI&gt;Identify incompatible or outdated drivers before they cause failures&lt;/LI&gt;
&lt;LI&gt;Detect inconsistent storage issues with physical network (PFC/ETS)&lt;/LI&gt;
&lt;LI&gt;Detect misconfigured network configurations (VLANs)&lt;/LI&gt;
&lt;LI&gt;Ensures consistent checks across the cluster&lt;/LI&gt;
&lt;LI&gt;Reduce troubleshooting time and support cases&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Network HUD goes beyond the host level. It parses LLDP information from physical switches to validate configurations and detect mismatches. This integration ensures your fabric configuration aligns with your host configuration, reducing the risk of connectivity issues.&lt;/P&gt;
&lt;P&gt;To learn more about Network HUD please refer to our Learn documentation: &lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/windows-server/networking/network-hud-overview" target="_blank" rel="noopener"&gt;What is Network HUD for Windows Server? | Microsoft Learn&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Consider an example scenario:&lt;/STRONG&gt;&lt;SPAN class="lia-text-color-7"&gt;&amp;nbsp;&lt;SPAN data-teams="true"&gt; &lt;SPAN class="lia-text-color-21"&gt;A VM in your Windows Server cluster is unable to connect to the Internet, as its VLAN Configuration is incorrect.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt; Without visibility, this VM might silently fail to reach external resources, causing application downtime or degraded performance. &lt;SPAN data-teams="true"&gt;Network HUD detects this issue by parsing and matching VLAN settings configured on your switches and VLAN settings configured on your VMs.&lt;/SPAN&gt; When it finds a mismatch, Network HUD surfaces an alert and informs you so you can take corrective action or prevent further misconfigurations across the cluster.&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;How to Get Started&lt;/H3&gt;
&lt;P&gt;Network HUD is delivered as an Arc extension for Windows Server clusters, enabling hybrid management and scale-out deployment. For a full guide, please refer to our Learn documentation: &lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/windows-server/networking/install-network-hud?tabs=windowsadmincenter" target="_blank" rel="noopener"&gt;Install Network HUD for Windows Server (preview) | Microsoft Learn&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Getting Network HUD up and running is simple:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;SPAN data-teams="true"&gt;Ensure all the servers in your cluster are Arc enabled&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;Navigate to Azure Portal&lt;/LI&gt;
&lt;LI&gt;For each server in the cluster, click on the Network HUD tile, to enable the Network HUD Arc extension.&lt;/LI&gt;
&lt;LI&gt;Once Network HUD is installed and enabled, your portal UI should look like this:&lt;img /&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;H3&gt;How to See Alerts&lt;/H3&gt;
&lt;P&gt;Now that Network HUD is setup, Network HUD surfaces health faults in multiple places:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Windows Admin Center (WAC)&lt;/STRONG&gt;: Navigate to the top right corner of your WAC Cluster Manager view and click on the bell icon to view alerts and faults.&lt;/LI&gt;
&lt;/UL&gt;
&lt;img /&gt;&lt;img /&gt;
&lt;P class="lia-clear-both"&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;PowerShell&lt;/STRONG&gt;: Use Get-HealthFault on the Windows Server machine for operational and diagnostic logs.
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="powershell"&gt;Get-HealthFault -Cluster $cluster | Where Reason -like '*hud*'&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;Summary&lt;/H3&gt;
&lt;P&gt;Network HUD is your proactive networking assistant for Windows Server. By combining host-level diagnostics with physical switch insights, it helps you maintain a stable, high-performant environment. Whether you’re deploying new clusters or managing existing ones, Network HUD ensures you stay ahead of issues...before they impact workloads.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN style="color: rgb(30, 30, 30);"&gt;We can't wait for you to try out Network HUD!&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: rgb(30, 30, 30);"&gt;For any questions, reach out to us at: &lt;/SPAN&gt;&lt;EM&gt;&lt;SPAN style="color: rgb(30, 30, 30);"&gt;edgenetfeedback@microsoft.com&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Nov 2025 16:39:42 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/networking-blog/announcing-network-hud-operational-network-monitoring-for/ba-p/4468723</guid>
      <dc:creator>Basel_Kablawi</dc:creator>
      <dc:date>2025-11-18T16:39:42Z</dc:date>
    </item>
    <item>
      <title>Zero Trust DNS is Here: Elevating Enterprise Security on Windows 11</title>
      <link>https://techcommunity.microsoft.com/t5/networking-blog/zero-trust-dns-is-here-elevating-enterprise-security-on-windows/ba-p/4468743</link>
      <description>&lt;P&gt;When attackers target an enterprise today, they rarely begin with a blunt smash-through-the-front-door intrusion. They begin quietly by resolving a domain.&lt;/P&gt;
&lt;P&gt;In most cases, modern malware, phishing kits, and human-operated ransomware operators rely on DNS as the entry point to discover infrastructure, beacon command-and-control, and exfiltrate data. Thus, it is becoming even more important to secure DNS to help protect against increasingly frequent, complex, and expensive cyberattacks.&lt;/P&gt;
&lt;P&gt;Enterprises have invested heavily in Protective DNS services with cutting-edge threat intelligence to identify and block malicious domains in real time but if an endpoint device can simply bypass them, the entire Zero Trust posture is weakened.&lt;/P&gt;
&lt;P&gt;Today, Microsoft is closing that gap.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Introducing Zero Trust DNS (ZTDNS)&lt;/H2&gt;
&lt;P&gt;We are excited to announce that Zero Trust DNS (ZTDNS) is now generally available on Windows 11 Enterprise and Windows 11 Education editions. ZTDNS is a new enterprise security feature in Windows that helps ensure DNS policy configured on the enterprise DNS server is enforced on the device. This is an important advancement for organizations working to enable that outbound connectivity on managed Windows devices aligns with enterprise authorization and policy.&lt;/P&gt;
&lt;P&gt;ZTDNS provides device-level enforcement of an enterprise’s DNS policy, in-box on Windows 11 helping ensure devices only communicate with destinations the organization intends. It doesn’t require installing and managing additional agents or maintaining a “best effort” block list on each endpoint device. With ZTDNS, the enterprise DNS resolver becomes the policy source of truth and Windows becomes the enforcement point. For more information, check out our &lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/windows/security/operating-system-security/network-security/zero-trust-dns" target="_blank" rel="noopener"&gt;documentation&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;This can be particularly useful for organizations in highly regulated industries, or where compliance with NIST standards is of paramount importance.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Without ZTDNS, the system DNS client could be pointed to a network-provided malicious DNS server, which can resolve unapproved domains and return incorrect resolutions to redirect the system to attacker’s endpoint. If the malicious DNS server uses encrypted DNS, IT administrators won’t be able to analyze the DNS traffic to prevent or mitigate potential attacks. Applications can use their own DNS client to completely bypass system policies. Also, system remains vulnerable to in-network attackers.&lt;/P&gt;
&lt;P&gt;ZTDNS protects against these attack vectors by mandating the use of Windows DNS client and only sending encrypted DNS queries to the trusted DNS servers. Since ZTDNS blocks all outbound connections and local name resolution by default, the system is protected against in-network threats.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Why is ZTDNS needed?&lt;/H2&gt;
&lt;P&gt;In enterprise scenarios, DNS is no longer just a lookup mechanism but a policy decision point. However, without device-level enforcement, attackers can hijack device DNS to:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Redirect DNS queries from the device to a malicious or compromised DNS server&lt;/LI&gt;
&lt;LI&gt;Use their own encrypted DNS client and bypass system DNS client&lt;/LI&gt;
&lt;LI&gt;Bypass DNS completely with direct IP connections&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;In such cases, organizations lose the ability to control which network destinations the endpoint is allowed to reach even if a Protective DNS service is used.&lt;/P&gt;
&lt;P&gt;ZTDNS addresses this by only allowing outbound connections to IP addresses that were resolved by the trusted DNS server for a query issued by the Windows DNS client. More importantly, it achieves this without terminating end-to-end encryption.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;How does ZTDNS work?&lt;/H2&gt;
&lt;P&gt;ZTDNS integrates the Windows DNS client with the Windows Filtering Platform to help enforce domain-name-based network lockdown using encrypted DNS. ZTDNS is off by default and can be configured on a Windows 11 device with an enterprise-approved DNS over HTTPS (DoH) or DNS over TLS (DoT) server. When enabled, ZTDNS blocks all outbound IP-based connections by default and only allows outbound connections to IP addresses resolved by the trusted DNS server or those added to the manual exception list by the IT administrator. It mandates the use of encrypted DNS (DoH or DoT) and only trusts the DNS resolutions initiated by the Windows DNS client and answered by the trusted DNS server to create outbound allow exceptions.&lt;/P&gt;
&lt;P&gt;This helps provide a strong, enforceable control that aligns with Zero Trust principles: all destinations are untrusted by default unless specifically permitted.&lt;/P&gt;
&lt;P&gt;In a nutshell, when configured and enabled, ZTDNS will have the following effects on your Windows 11 device:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Encrypted DNS enforcement (DoH or DoT)&lt;/LI&gt;
&lt;LI&gt;Default deny for outbound IPv4 and IPv6 traffic&lt;/LI&gt;
&lt;LI&gt;Dynamic allow listing of IP addresses returned by trusted DNS servers&lt;/LI&gt;
&lt;LI&gt;Static allow listing of IP addresses approved by the IT administrator via manual exceptions&lt;/LI&gt;
&lt;LI&gt;Centralized logging of permitted and blocked connections&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Deploying ZTDNS&lt;/H2&gt;
&lt;P&gt;ZTDNS is available in the latest builds of Windows 11 Enterprise and Windows 11 Education. &amp;nbsp;&lt;/P&gt;
&lt;P&gt;To deploy ZTDNS, enterprises can configure and enable it via:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;netsh commands&lt;/LI&gt;
&lt;LI&gt;JSON configuration&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;We are also actively developing a Microsoft Intune experience for ZTDNS &amp;nbsp;and we will share more information when the details are available.&lt;/P&gt;
&lt;P&gt;For detailed deployment guidance, check out our &lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/windows/security/operating-system-security/network-security/zero-trust-dns/deploying-zero-trust-dns" target="_blank" rel="noopener"&gt;official documentation&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Connect with us&lt;/H2&gt;
&lt;P&gt;For customers attending Microsoft Ignite 2025, please join us at session &lt;A class="lia-external-url" href="https://ignite.microsoft.com/en-US/sessions/BRK258?source=sessions" target="_blank" rel="noopener"&gt;BRK258: Inside Windows Security, from client to cloud&lt;/A&gt; to learn more about ZTDNS. Alternatively, you can also visit the Windows Resiliency Initiative &amp;amp; Windows Security booth to discuss ZTDNS in depth.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For customers who are unable to attend Microsoft Ignite 2025, we would still welcome the opportunity to connect. If you have questions about Zero Trust DNS, deployment considerations, or would like to share feedback from your evaluation, please contact us at&amp;nbsp;ztdnsteam@microsoft.com.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Securing the Present, Innovating for the Future&lt;/H2&gt;
&lt;P&gt;Security is a shared responsibility. Through collaboration across hardware and software ecosystems, we can build more resilient systems secure by design and by default, from Windows to the cloud, enabling trust at every layer of the digital experience.&lt;/P&gt;
&lt;P&gt;The updated&amp;nbsp;&lt;A href="https://aka.ms/securitybook" target="_blank" rel="noopener"&gt;Windows Security book&lt;/A&gt;&amp;nbsp;is available to help you understand how to stay secure with Windows. Learn more about&amp;nbsp;&lt;A href="https://www.microsoft.com/en-us/windows/business" target="_blank" rel="noopener"&gt;Windows 11&lt;/A&gt;&amp;nbsp;and&amp;nbsp;&lt;A href="https://www.microsoft.com/en-us/windows/business/devices/copilot-plus-pcs" target="_blank" rel="noopener"&gt;Copilot+ PCs&lt;/A&gt;. To learn more about Microsoft Security solutions, visit our&amp;nbsp;&lt;A href="https://www.microsoft.com/en-us/security/business" target="_blank" rel="noopener"&gt;website.&lt;/A&gt;&amp;nbsp;Bookmark the&amp;nbsp;&lt;A href="https://www.microsoft.com/security/blog/" target="_blank" rel="noopener"&gt;Security blog&lt;/A&gt;&amp;nbsp;to keep up with our expert coverage on security matters.&lt;/P&gt;
&lt;P&gt;Also, follow us on LinkedIn (&lt;A href="https://www.linkedin.com/showcase/microsoft-security/" target="_blank" rel="noopener"&gt;Microsoft Security&lt;/A&gt;) and X (&lt;A href="https://twitter.com/@MSFTSecurity" target="_blank" rel="noopener"&gt;@MSFTSecurity&lt;/A&gt;) for the latest news and updates on cybersecurity.&lt;/P&gt;</description>
      <pubDate>Mon, 02 Feb 2026 21:57:32 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/networking-blog/zero-trust-dns-is-here-elevating-enterprise-security-on-windows/ba-p/4468743</guid>
      <dc:creator>AditiPatange</dc:creator>
      <dc:date>2026-02-02T21:57:32Z</dc:date>
    </item>
    <item>
      <title>Windows CLAT Enters Private Preview: A Milestone for IPv6 Adoption</title>
      <link>https://techcommunity.microsoft.com/t5/networking-blog/windows-clat-enters-private-preview-a-milestone-for-ipv6/ba-p/4459534</link>
      <description>&lt;H3&gt;IPv6 Adoption: A Global Shift&lt;/H3&gt;
&lt;P&gt;Since its standardization in the late 1990s, IPv6 has steadily gained traction. The last 15 years, especially since &lt;STRONG&gt;World IPv6 Launch Day in 2011&lt;/STRONG&gt;, have seen significant progress. &lt;SPAN class="lia-text-color-21"&gt;&lt;A class="lia-external-url" href="https://www.google.com/intl/en/ipv6/statistics.html" target="_blank" rel="noopener"&gt;Global IPv6 adoption&lt;/A&gt; n&lt;/SPAN&gt;ow hovers around &lt;STRONG&gt;43&lt;/STRONG&gt; to &lt;STRONG&gt;48%&lt;/STRONG&gt;, with countries like &lt;STRONG&gt;France (80%)&lt;/STRONG&gt;, &lt;STRONG&gt;Germany (75%)&lt;/STRONG&gt;, and &lt;STRONG&gt;India (74%)&lt;/STRONG&gt; leading the charge. The &lt;STRONG&gt;United States&lt;/STRONG&gt; sits just above &lt;STRONG&gt;50%&lt;/STRONG&gt;, while others like &lt;STRONG&gt;China&lt;/STRONG&gt; remain below &lt;STRONG&gt;5%&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;This shift is driven by the exhaustion of IPv4 addresses - only &lt;STRONG&gt;4.3 billion&lt;/STRONG&gt; were ever available. The rise of mobile devices, IoT, and cloud services has accelerated this depletion. Governments are responding: the &lt;STRONG&gt;U.S. Office of Management and Budget (OMB)&lt;/STRONG&gt; mandates that &lt;STRONG&gt;80% of federal assets operate in IPv6-only environments by the end 2025&lt;/STRONG&gt; (&lt;A href="https://www.whitehouse.gov/wp-content/uploads/2020/11/M-21-07.pdf" target="_blank" rel="noopener"&gt;OMB M-21-07&lt;/A&gt;), and &lt;STRONG&gt;Germany&lt;/STRONG&gt; has similarly prioritized IPv6 in its digital infrastructure plans (&lt;A href="https://www.bdbos.bund.de/EN/Ourtasks/IPv6programme/ipv6programme_node.html" target="_blank" rel="noopener"&gt;BDBOS IPv6 Programme&lt;/A&gt;).&lt;/P&gt;
&lt;H3&gt;Transition Mechanisms: From Tunnels to Translation&lt;/H3&gt;
&lt;P&gt;Over the years, various IPv4-to-IPv6 transition mechanisms have emerged:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Tunneling&lt;/STRONG&gt; (e.g., 6to4, Teredo): Often unreliable due to NAT and relay dependencies.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Dual Stack&lt;/STRONG&gt;: Effective but resource-intensive and not sustainable long-term.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Translation Technologies&lt;/STRONG&gt;: Including NAT64 and DNS64, which enable IPv6-only clients to reach IPv4 services.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Among these, &lt;STRONG&gt;CLAT (Customer-side Translator)&lt;/STRONG&gt; stands out as a key enabler of IPv6-only networks. It is part of the &lt;STRONG&gt;464XLAT architecture&lt;/STRONG&gt;, defined in &lt;A href="https://www.rfc-editor.org/rfc/rfc6877" target="_blank" rel="noopener"&gt;RFC 6877&lt;/A&gt;, and combines:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;CLAT&lt;/STRONG&gt;: Stateless translation (SIIT, RFC 7915) on the client.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;PLAT&lt;/STRONG&gt;: Stateful NAT64 (RFC 6146) on the provider side.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Together, they allow IPv6-only clients to communicate with IPv4-only servers without requiring IPv4 connectivity on the client.&lt;/P&gt;
&lt;H3&gt;Listening to Our Community&lt;/H3&gt;
&lt;P&gt;In early 2024, the &lt;STRONG&gt;Windows Core OS Networking team&lt;/STRONG&gt; ran an &lt;A href="https://techcommunity.microsoft.com/blog/networkingblog/ipv6-transition-technology-survey/4049502" target="_blank" rel="noopener"&gt;IPv6 migration survey&lt;/A&gt;. The results were clear: &lt;STRONG&gt;CLAT was the most requested IPv6 feature for Windows&lt;/STRONG&gt;. This feedback helped shape our roadmap and reinforce our &lt;A href="https://techcommunity.microsoft.com/blog/networkingblog/windows-11-plans-to-expand-clat-support/4078173" target="_blank" rel="noopener"&gt;commitment to delivering CLAT support&lt;/A&gt;.&lt;/P&gt;
&lt;H3&gt;It’s Here: Windows CLAT Private Preview&lt;/H3&gt;
&lt;P&gt;It’s been over a year since we last updated our community on CLAT and today, we’re thrilled to announce that &lt;STRONG&gt;Windows CLAT is now in private preview&lt;/STRONG&gt;. See below for details on &lt;STRONG&gt;how to participate&lt;/STRONG&gt; in the preview.&lt;/P&gt;
&lt;H3&gt;&lt;SPAN class="lia-text-color-21"&gt;How CLAT Works&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P&gt;&lt;STRONG&gt;CLAT eases transition to IPv6 by bridging IPv6 networks and IPv4 applications and servers.&lt;/STRONG&gt; It leverages &lt;STRONG&gt;464XLAT&lt;/STRONG&gt;, which combines:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt; CLAT (Customer-side Translator)&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;UL&gt;
&lt;LI&gt;Performs &lt;STRONG&gt;stateless IP/ICMP translation&lt;/STRONG&gt; (SIIT, RFC 7915).&lt;/LI&gt;
&lt;LI&gt;Converts &lt;STRONG&gt;private IPv4 addresses&lt;/STRONG&gt; to &lt;STRONG&gt;global IPv6 addresses&lt;/STRONG&gt; and vice versa.&lt;/LI&gt;
&lt;LI&gt;Embedded in the client, &lt;STRONG&gt;Windows&lt;/STRONG&gt; in this case.&lt;/LI&gt;
&lt;/UL&gt;
&lt;OL start="2"&gt;
&lt;LI&gt;&lt;STRONG&gt; PLAT (Provider-side Translator)&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;UL&gt;
&lt;LI&gt;Performs &lt;STRONG&gt;stateful translation&lt;/STRONG&gt; (NAT64, RFC 6146).&lt;/LI&gt;
&lt;LI&gt;Converts &lt;STRONG&gt;global IPv6 addresses&lt;/STRONG&gt; to &lt;STRONG&gt;global IPv4 addresses&lt;/STRONG&gt; and vice versa.&lt;/LI&gt;
&lt;LI&gt;Typically deployed on edge devices like routers.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H5&gt;CLAT Activation and Packet Flow&lt;/H5&gt;
&lt;P&gt;The activation of CLAT on a Windows client follows a logical sequence designed to ensure seamless IPv4 application support over IPv6-only networks:&lt;/P&gt;
&lt;H6&gt;&lt;SPAN class="lia-text-color-20"&gt;&lt;EM&gt;Figure 1: CLAT Enablement &amp;amp; Prefix Discovery Options&lt;/EM&gt;&lt;/SPAN&gt;&lt;/H6&gt;
&lt;img /&gt;
&lt;OL&gt;
&lt;LI style="list-style-type: none;"&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt;IPv6-only connectivity&lt;/STRONG&gt;: When the Windows client device initializes its network interface, it may find that no native IPv4 connectivity is available. Or, during DHCPv4 negotiation, the network may send Option 108, signaling that the host can operate in IPv6-only mode temporarily. While &lt;STRONG&gt;DHCPv4 Option 108 (RFC 8925) &lt;/STRONG&gt;does not provide a NAT64 prefix, it indicates IPv6-only preference. This triggers the system to consider IPv6-only operation.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Discovery of NAT64 (PLAT) availability&lt;/STRONG&gt;: The host then attempts to determine whether a NAT64 translator exists on the network and what its associated NAT64 prefix is. This discovery can occur through two mechanisms:
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Router Advertisement (RA) PREF64 option&lt;/STRONG&gt; (RFC 8781): The network router sends RA messages containing the PREF64 option, explicitly informing the host of the NAT64 prefix.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;DNS-based discovery&lt;/STRONG&gt; (RFC 7050): The host performs AAAA DNS queries for ipv4only.arpa using the networks recursive resolver. The response allows the host to infer the NAT64 prefix.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;CLAT activation&lt;/STRONG&gt;: Once the host confirms the presence of a valid PREF64, it enables CLAT. This ensures that IPv4-only applications can continue functioning even in an IPv6-only environment.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;IPv4 address synthesized&lt;/STRONG&gt;: CLAT plumbs a synthetic IPv4 address and IPv4 default route. This allows legacy IPv4 applications to connect as if native IPv4 were present.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Stateless IPv4-to-IPv6 translation&lt;/STRONG&gt;: Each IPv4 packet generated by an application is intercepted by CLAT. Using the learned &lt;STRONG&gt;NAT64 prefix&lt;/STRONG&gt; and the rules defined in RFC 6052, CLAT synthesizes an IPv6 destination address that embeds the original IPv4 address.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Routing to NAT64 (PLAT)&lt;/STRONG&gt;: The newly formed IPv6 packet is routed across the IPv6-only network to the NAT64 translator. The PLAT performs stateful translation, converting the IPv6 packet back to IPv4 and forwarding it to the intended IPv4 destination.&lt;/LI&gt;
&lt;/OL&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN class="lia-text-color-20"&gt;Figure 2: One example of CLAT Activation and Packet Flow&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;This flow ensures that even in environments where IPv4 is no longer natively available, legacy applications can continue to operate transparently over IPv6 infrastructure.&lt;/P&gt;
&lt;H3&gt;Looking Ahead: Building the Future of IPv6 with CLAT&lt;/H3&gt;
&lt;P&gt;The private preview of Windows CLAT marks a pivotal moment in our IPv6 journey. It’s not just a technical achievement, it’s a response to community demand, a step toward government compliance, and a foundation for future-ready networking.&lt;/P&gt;
&lt;P&gt;We’re excited to collaborate with our partners and customers as we refine CLAT for general availability. If you’re interested in testing Windows CLAT in your environment, please sign up for Private Preview at&amp;nbsp;&lt;A class="lia-external-url" href="https://aka.ms/winclatintake" target="_blank"&gt;aka.ms/winclatintake&lt;/A&gt;. Stay tuned for updates on Public Preview and thank you for being part of this milestone.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;- The Windows Core OS Networking Team&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Nov 2025 15:27:02 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/networking-blog/windows-clat-enters-private-preview-a-milestone-for-ipv6/ba-p/4459534</guid>
      <dc:creator>JimAlumbaugh</dc:creator>
      <dc:date>2025-11-18T15:27:02Z</dc:date>
    </item>
    <item>
      <title>Windows Server 2025 Software Defined Datacenter: Networking Deployment Series (4/6)</title>
      <link>https://techcommunity.microsoft.com/t5/networking-blog/windows-server-2025-software-defined-datacenter-networking/ba-p/4449265</link>
      <description>&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Welcome to part&amp;nbsp;four&amp;nbsp;of our Networking Deployment Series for Windows Server 2025!&amp;nbsp;In this series,&amp;nbsp;we’ve&amp;nbsp;been following Contoso Medical Center’s journey to deploy Windows Server 2025 Software Defined Datacenter (SDDC) for a modern, secure, and automated environment.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Thus far, Contoso has&amp;nbsp;accomplished&amp;nbsp;the following:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="13" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;A href="https://techcommunity.microsoft.com/blog/networkingblog/windows-server-2025-software-defined-datacenter-networking-deployment-series-16/4397158" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Part 1&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;:&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;Laid the foundation with consistent,&amp;nbsp;automated host networking using&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Network ATC&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="13" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;A href="https://techcommunity.microsoft.com/blog/networkingblog/windows-server-2025-software-defined-datacenter-networking-deployment-series-26/4402552" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Part 2&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;:&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;Introduced proactive diagnostics&amp;nbsp;and monitoring&amp;nbsp;with&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Network HUD&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="13" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;A style="font-style: normal; font-weight: 400; background-color: rgb(255, 255, 255);" href="https://techcommunity.microsoft.com/blog/networkingblog/windows-server-2025-software-defined-datacenter-networking-deployment-series-36/4437183" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Part 3&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-contrast="auto"&gt;:&lt;/SPAN&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-contrast="auto"&gt;&amp;nbsp;Deployed&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-contrast="auto"&gt;Network Controller on Failover Cluster&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-contrast="auto"&gt;&amp;nbsp;for a resilient SDN control plane&lt;/SPAN&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;With&amp;nbsp;the SDN “brains”&amp;nbsp;now&amp;nbsp;in place, Contoso is ready for the next step:&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;securing&amp;nbsp;every workload from day one&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;with&amp;nbsp;microsegmentation, automated security policies, and a Zero Trust approach.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;From Reactive to Proactive: Securing Every VM by Default&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;As Contoso rapidly expands and adopts cutting-edge technologies to enhance patient care and operational efficiency, securing virtual workloads has become their top priority. Historically, they relied on manual firewall rules and static ACLs to protect virtual workloads. However, this reactive approach left gaps—new VMs could be deployed without the proper security policies, and enforcement often varied from host to host, increasing risk of human error.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;With Windows Server 2025, Contoso can shift from reactive security to proactive, automated protection. SDN enables Contoso to secure every VM with microsegmentation, enforcing &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;granular, VM-level network policies&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;so that workloads only communicate when&amp;nbsp;necessary.&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;This approach is central to Zero Trust principles, treating every access request as potentially risky and requiring verification before granting permission. SDN microsegmentation leverages several key technologies:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;Network Security Groups (NSGs)&lt;/STRONG&gt;:&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Every VM is automatically assigned an NSG at creation, providing immediate, distributed&amp;nbsp;firewall&amp;nbsp;protection for both north-south and east-west traffic.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="2" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;Tag-Based Segmentation&lt;/STRONG&gt;:&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Security policies are assigned based on workload identity, allowing rules to follow VMs as they move or scale&amp;nbsp;rather than relying on static IPs.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="3" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;Default Network Policies&lt;/STRONG&gt;:&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; Every VM receives baseline protection from the moment it’s created, even before the operating system is deployed, ensuring no workload is ever left exposed. &lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;For a healthcare provider like Contoso where patient data and critical applications must be&amp;nbsp;protected at all times,&amp;nbsp;these&amp;nbsp;SDN security&amp;nbsp;capabilities&amp;nbsp;in Windows Server 2025 deliver the automation, consistency,&amp;nbsp;and compliance needed&amp;nbsp;to confidently support rapid growth, safeguard patient data, and protect critical applications from day one.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;What Are NSGs, Tag-Based Segmentation, and DNP?&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Network Security Groups (NSGs)&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;An NSG is a&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;5-tuple&amp;nbsp;firewall&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;(source IP, destination IP, source port, destination port, protocol) that protects both&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;north-south&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;and&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;east-west&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;flows. NSGs can be applied to individual VMs or subnets, and because&amp;nbsp;they’re&amp;nbsp;enforced at the&amp;nbsp;vSwitch, they scale without bottlenecks.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Key Advantages:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="11" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Granular control: block lateral traffic between workloads in the same VLAN or subnet&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="11" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="2" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Multitenancy: policies can be unique per VM even if IP addresses overlap&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="11" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="2" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Visibility: audit logging of all processed flows for compliance&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Tag-Based Segmentation&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Instead of managing policies based on network segments and IP ranges,&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;tags&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; let you label workloads with descriptive identifiers like “App = MedicalRecords” or “Env = Prod”. NSG rules can then reference these tags, allowing policy to&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;follow the workload&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;wherever it runs.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Key Advantages:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="8" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Simplifies&amp;nbsp;policy creation — no more chasing IP changes!&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="8" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;Enables reusable security templates&lt;SPAN style="color: rgb(30, 30, 30);" data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt; &lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="8" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;Supports dynamic, intent-based enforcement&lt;SPAN style="color: rgb(30, 30, 30);" data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Default Network Policies (DNP)&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;DNPs ensure&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;no VM is ever left without protection&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;. When a VM is created (or even after&amp;nbsp;it’s&amp;nbsp;running), a default NSG is automatically applied based on your chosen security level:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI aria-setsize="-1" data-leveltext="%1." data-font="Calibri" data-listid="10" data-list-defn-props="{&amp;quot;335552541&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769242&amp;quot;:[65533,0],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;%1.&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;No protection&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;– no restrictions (not recommended)&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI aria-setsize="-1" data-leveltext="%1." data-font="Calibri" data-listid="10" data-list-defn-props="{&amp;quot;335552541&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769242&amp;quot;:[65533,0],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;%1.&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;STRONG&gt;Open some ports&lt;/STRONG&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-contrast="auto"&gt; – block all inbound&amp;nbsp;traffic&amp;nbsp;except&amp;nbsp;specified management ports,&amp;nbsp;and&amp;nbsp;allow all outbound&amp;nbsp;traffic&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI aria-setsize="-1" data-leveltext="%1." data-font="Calibri" data-listid="10" data-list-defn-props="{&amp;quot;335552541&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769242&amp;quot;:[65533,0],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;%1.&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;STRONG&gt;Use existing NSG&lt;/STRONG&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-contrast="auto"&gt;&amp;nbsp;– apply a custom policy&amp;nbsp;you’ve&amp;nbsp;already created&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;img /&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Key Advantages:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="4" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Security starts before OS deployment&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="4" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;Prevents accidental exposure of new workloads&lt;SPAN style="color: rgb(30, 30, 30);" data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt; &lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="4" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;Works on both VLAN (logical) and SDN virtual networks&lt;SPAN style="color: rgb(30, 30, 30);" data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;How Contoso&amp;nbsp;Implemented These Capabilities&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Using the&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Native SDN experience in Windows Admin Center&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;, Contoso’s IT team:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI aria-setsize="-1" data-leveltext="%1." data-font="Calibri" data-listid="7" data-list-defn-props="{&amp;quot;335552541&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769242&amp;quot;:[65533,0],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;%1.&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Defined baseline DNP rules&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;for all new VMs.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI aria-setsize="-1" data-leveltext="%1." data-font="Calibri" data-listid="7" data-list-defn-props="{&amp;quot;335552541&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769242&amp;quot;:[65533,0],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;%1.&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;STRONG&gt;Created workload-specific NSGs&lt;/STRONG&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-contrast="auto"&gt;&amp;nbsp;for their medical and IoT apps.&lt;/SPAN&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt; &lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI aria-setsize="-1" data-leveltext="%1." data-font="Calibri" data-listid="7" data-list-defn-props="{&amp;quot;335552541&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769242&amp;quot;:[65533,0],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;%1.&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;STRONG&gt;Assigned security tags&lt;/STRONG&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-contrast="auto"&gt;&amp;nbsp;(i.e.&amp;nbsp;App&amp;nbsp;=&amp;nbsp;Web, App&amp;nbsp;=&amp;nbsp;IoT) to VMs.&lt;/SPAN&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt; &lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI aria-setsize="-1" data-leveltext="%1." data-font="Calibri" data-listid="7" data-list-defn-props="{&amp;quot;335552541&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769242&amp;quot;:[65533,0],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;%1.&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;STRONG&gt;Linked NSG rules to tags&lt;/STRONG&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-contrast="auto"&gt;&amp;nbsp;to block cross-app communication where not&amp;nbsp;required.&lt;/SPAN&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt; &lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI aria-setsize="-1" data-leveltext="%1." data-font="Calibri" data-listid="7" data-list-defn-props="{&amp;quot;335552541&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769242&amp;quot;:[65533,0],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;%1.&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;STRONG&gt;Monitored enforcement&lt;/STRONG&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-contrast="auto"&gt;&amp;nbsp;through Network HUD and audit logs for compliance evidence.&lt;/SPAN&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;As a&amp;nbsp;result,&amp;nbsp;Contoso&amp;nbsp;achieves&amp;nbsp;immediate, consistent protection for all virtual workloads!&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Why This Matters for You&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;With NSGs, tag-based segmentation, and DNP in Windows Server 2025 SDN, you can:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="font-weight: bold;" aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Apply Zero Trust inside your datacenter&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;STRONG&gt;Protect both new and existing workloads&lt;/STRONG&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-contrast="auto"&gt;&amp;nbsp;automatically&lt;/SPAN&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt; &lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;STRONG&gt;Simplify policy management&lt;/STRONG&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-contrast="auto"&gt;&amp;nbsp;for hybrid and dynamic environments&lt;/SPAN&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt; &lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;STRONG&gt;Meet compliance needs&lt;/STRONG&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-contrast="auto"&gt;&amp;nbsp;with built-in logging and monitoring&lt;/SPAN&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;For Contoso, this means patient data, imaging workloads, and administrative systems are all protected&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;from the moment&amp;nbsp;they’re&amp;nbsp;provisioned&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;without relying on manual&amp;nbsp;firewall&amp;nbsp;rules or&amp;nbsp;additional&amp;nbsp;third-party tools.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Compatibility &amp;amp; Tooling&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;These capabilities are supported in:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Windows Server 2025&amp;nbsp;(Datacenter)&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;Windows Admin Center (latest version)&lt;SPAN style="color: rgb(30, 30, 30);" data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt; &lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;SDNExpress v2&lt;SPAN style="color: rgb(30, 30, 30);" data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Check out&amp;nbsp;our&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://youtu.be/8iqWR1M-KLk?si=0QBkm-dOLIzIaVzo" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;video walkthrough&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;to see SDN security in action on Windows Server!&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;What’s Next?&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;With robust workload protection now in place, Contoso is&amp;nbsp;preparing to&amp;nbsp;move forward with&amp;nbsp;the next&amp;nbsp;steps&amp;nbsp;of&amp;nbsp;their&amp;nbsp;networking&amp;nbsp;journey:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="12" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Enhancing mission-critical VM performance with&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Accelerated Networking&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;to deliver&amp;nbsp;high-throughput, low-latency connectivity and optimized network efficiency&amp;nbsp;(coming in Part 5)&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="12" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;Ensuring seamless connectivity and resilience across multiple clusters with &lt;STRONG style="color: rgb(30, 30, 30);"&gt;&lt;SPAN data-contrast="auto"&gt;SDN Multisite&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-contrast="auto"&gt;, supporting disaster recovery and regional failover&amp;nbsp;(coming in Part 6)&lt;/SPAN&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Stay tuned for our next post, where&amp;nbsp;we explore&amp;nbsp;Accelerated Networking&amp;nbsp;and how it can&amp;nbsp;boost performance for your most important workloads.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Try It Today!&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Interested in trying&amp;nbsp;out these capabilities&amp;nbsp;on Windows&amp;nbsp;Server&amp;nbsp;2025?&amp;nbsp;Get started by&amp;nbsp;exploring our step-by-step guide&amp;nbsp;on&amp;nbsp;creating&amp;nbsp;and&amp;nbsp;configuring&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/azure-local/manage/use-datacenter-firewall-windows-admin-center?view=azloc-2507&amp;amp;context=%2Fwindows-server%2Fcontext%2Fwindows-server-failover-clustering" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Network Security Groups&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;,&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/azure-local/manage/configure-network-security-groups-with-tags?view=azloc-2507&amp;amp;context=%2Fwindows-server%2Fcontext%2Fwindows-server-edge-networking&amp;amp;pivots=windows-server#create-a-network-security-group-rule" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Tag-Based Segmentation&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;,&amp;nbsp;and&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/azure-local/manage/manage-default-network-access-policies-virtual-machines-23h2?context=%2Fwindows-server%2Fcontext%2Fwindows-server-edge-networking&amp;amp;pivots=windows-server&amp;amp;view=azloc-2507" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Default Network Policies&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Have feedback? Email us at&amp;nbsp;&lt;/SPAN&gt;&lt;A href="mailto:edgenetfeedback@microsoft.com" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;edgenetfeedback@microsoft.com&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Aug 2025 18:35:07 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/networking-blog/windows-server-2025-software-defined-datacenter-networking/ba-p/4449265</guid>
      <dc:creator>cindywan</dc:creator>
      <dc:date>2025-08-28T18:35:07Z</dc:date>
    </item>
    <item>
      <title>Windows Server 2025 Software Defined Datacenter: Networking Deployment Series (3/6)</title>
      <link>https://techcommunity.microsoft.com/t5/networking-blog/windows-server-2025-software-defined-datacenter-networking/ba-p/4437183</link>
      <description>&lt;P class="lia-align-left"&gt;Welcome to part three of our Networking Deployment Series for Windows Server 2025. In this deployment series, we look at Contoso Medical Center’s journey deploying and harnessing the power of Windows Server 2025 Software Defined Datacenter (SDDC) to build a next-generation environment for your VMs and applications.&lt;/P&gt;
&lt;P class="lia-align-left"&gt;So far, Contoso has:&lt;/P&gt;
&lt;UL class="lia-align-left"&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/blog/networkingblog/windows-server-2025-software-defined-datacenter-networking-deployment-series-16/4397158" target="_blank" rel="noopener"&gt;Part 1&lt;/A&gt;: Laid the foundation with consistent and automated host networking using &lt;STRONG&gt;Network ATC&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/blog/networkingblog/windows-server-2025-software-defined-datacenter-networking-deployment-series-26/4402552" target="_blank" rel="noopener"&gt;Part 2&lt;/A&gt;: Introduced proactive diagnostics and monitoring with &lt;STRONG&gt;Network HUD&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P class="lia-align-left"&gt;Now, it’s time for Contoso to bring &lt;STRONG&gt;Software Defined Networking (SDN)&lt;/STRONG&gt; into their production environment—and to do that, they need a control plane that is resilient, clustered, and enterprise-grade. That’s where Network Controller on Failover Cluster (NC on FC) comes in.&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&lt;STRONG&gt;From Lab to Life-Support: Contoso’s Leap to Production-Ready SDN&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;As a medical center with 24/7 uptime requirements, Contoso can’t afford downtime on critical services. In the past, they explored SDN capabilities, but the VM-based deployment model didn’t meet their standards.&amp;nbsp; It required patching of the VMs, installation of Security agents, and a 45-minute installation time!&lt;/P&gt;
&lt;P class="lia-align-left"&gt;Now, with &lt;EM&gt;Windows Server 2025&lt;/EM&gt;, Contoso can deploy Network Controller— the brains of SDN—on Windows Failover Cluster, unlocking the ability to run SDN production workloads in under 10 minutes, no VMs to patch, and so long as the hosts are patched, Network Controller is patched.&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&lt;STRONG&gt;What Is Network Controller on Failover Cluster?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;Network Controller is a key component in Windows Server SDN that:&lt;/P&gt;
&lt;UL class="lia-align-left"&gt;
&lt;LI&gt;Provides top-tier VM network security such as Network Security Groups (NSGs) and Default Network Policies (DNP), i.e., No VM is ever left behind without a Network Security Group.&lt;/LI&gt;
&lt;LI&gt;As you onboard optional critical SDN services such as Virtual Networks, Software Load Balancer (SLBMUX) and Gateways, it ensures the goal state remains consistent and provides policy push to your hosts.&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;Maintains the intent of your software-defined network across hosts&lt;/LI&gt;
&lt;/UL&gt;
&lt;img /&gt;
&lt;P class="lia-align-left"&gt;With Failover Cluster support, Network Controller becomes:&lt;/P&gt;
&lt;UL class="lia-align-left"&gt;
&lt;LI&gt;Highly available—if one node fails, another picks up instantly&lt;/LI&gt;
&lt;LI&gt;Stateful—configuration and operational state is replicated across nodes&lt;/LI&gt;
&lt;LI&gt;More secure and manageable—via new deployment flows in WAC and SDNExpress&lt;/LI&gt;
&lt;/UL&gt;
&lt;P class="lia-align-left"&gt;&lt;STRONG&gt;How Contoso Deployed It&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;Using Windows Admin Center (WAC), Contoso’s IT team followed the Native SDN deployment experience:&lt;/P&gt;
&lt;OL class="lia-align-left"&gt;
&lt;LI&gt;Created a Failover Cluster with a minimum of two nodes&lt;/LI&gt;
&lt;LI&gt;Selected SDN Infrastructure in Windows Admin Center &amp;gt; Native SDN&lt;/LI&gt;
&lt;LI&gt;Validated cluster health with built-in diagnostics and event tracing&lt;/LI&gt;
&lt;LI&gt;Integrated with Azure Arc for hybrid monitoring and policy enforcement as needed&lt;/LI&gt;
&lt;/OL&gt;
&lt;P class="lia-align-left"&gt;The result? A resilient SDN control plane, ready for production.&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&lt;STRONG&gt;Why This Matters for You&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;With NC on FC, you can:&lt;/P&gt;
&lt;UL class="lia-align-left"&gt;
&lt;LI&gt;Deploy SDN in environments with uptime SLAs&lt;/LI&gt;
&lt;LI&gt;Ensure control plane resiliency in case of node failures&lt;/LI&gt;
&lt;LI&gt;Lay the groundwork for future SDN scale-out and multi-cluster scenarios&lt;/LI&gt;
&lt;LI&gt;Meet compliance and enterprise IT standards for critical infrastructure&lt;/LI&gt;
&lt;/UL&gt;
&lt;P class="lia-align-left"&gt;Whether you’re managing workloads in healthcare, finance, retail, or government—high availability is non-negotiable. This enhancement in Windows Server 2025 SDN bridges that gap.&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&lt;STRONG&gt;Compatibility &amp;amp; Tooling&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;Network Controller on Failover Cluster is supported in:&lt;/P&gt;
&lt;UL class="lia-align-left"&gt;
&lt;LI&gt;Windows Server 2025 (Datacenter)&lt;/LI&gt;
&lt;LI&gt;Windows Admin Center (latest version)&lt;/LI&gt;
&lt;LI&gt;SDNExpress v2&lt;/LI&gt;
&lt;/UL&gt;
&lt;P class="lia-align-left"&gt;For an in-depth deployment walkthrough, check out our step-by-step guide and demo video &lt;A href="https://youtu.be/LAvdWzJZ0ag?si=IzND9Mt0tseK6Ato&amp;amp;t=45" target="_blank" rel="noopener"&gt;walk-through&lt;/A&gt;.&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&lt;STRONG&gt;What’s Next?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;With Network Controller now deployed in a VM-less model, Contoso Medical Center is ready to:&lt;/P&gt;
&lt;UL class="lia-align-left"&gt;
&lt;LI&gt;Protect every VM workload with Network Security Groups (NSGs) (coming in Part 3)&lt;/LI&gt;
&lt;LI&gt;Use Tag-based Segmentation for medical workloads so that a new Admin and your compliance team can ensure every workload gets the right NSG! (coming in Part 3)&lt;/LI&gt;
&lt;LI&gt;Onboard new VMs with Default Network Policies (No VM left behind) (coming in part 3)&lt;/LI&gt;
&lt;LI&gt;…and eventually connect multiple sites using SDN Multisite (coming in Part 6)&lt;/LI&gt;
&lt;/UL&gt;
&lt;P class="lia-align-left"&gt;Stay tuned for our next blog, where we show how SDN protects workloads with built-in VM policies and security enforcement—no agents, no extra products.&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&lt;STRONG&gt;Try It Today&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;Interested in trying NC on Failover Cluster?&lt;BR /&gt;Check out the documentation: &lt;A href="https://learn.microsoft.com/en-us/windows-server/networking/sdn/deploy/deploy-network-controller-failover-clustering?tabs=windows-admin-center&amp;amp;pivots=windows-server" target="_blank" rel="noopener"&gt;Windows Admin Center&lt;/A&gt; or &lt;A href="https://learn.microsoft.com/en-us/windows-server/networking/sdn/deploy/deploy-network-controller-failover-clustering?tabs=powershell&amp;amp;pivots=windows-server" target="_blank" rel="noopener"&gt;SDNExpress&lt;/A&gt;&lt;BR /&gt;Check out the installation &lt;A href="https://youtu.be/LAvdWzJZ0ag?si=IzND9Mt0tseK6Ato&amp;amp;t=45" target="_blank" rel="noopener"&gt;walk-through&lt;/A&gt;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;Have feedback? Email us at &lt;A href="mailto:edgenetfeedback@microsoft.com" target="_blank" rel="noopener"&gt;edgenetfeedback@microsoft.com&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 28 Jul 2025 13:54:02 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/networking-blog/windows-server-2025-software-defined-datacenter-networking/ba-p/4437183</guid>
      <dc:creator>Kyle_Bisnett</dc:creator>
      <dc:date>2025-07-28T13:54:02Z</dc:date>
    </item>
    <item>
      <title>Announcing the preview of Software Defined Networking (SDN) enabled by Azure Arc on Azure Local</title>
      <link>https://techcommunity.microsoft.com/t5/networking-blog/announcing-the-preview-of-software-defined-networking-sdn/ba-p/4432417</link>
      <description>&lt;P&gt;Starting in Azure Local version 2506, we’re excited to announce Public Preview of Software Defined Networking (SDN) enabled by Azure Arc. This release brings cloud-native networking capability of access control at the network layer using Network Security Groups (NSGs) on Azure Local.&lt;/P&gt;
&lt;P&gt;Some of the key highlights in this release are:&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;1- Centralized network management:&lt;/STRONG&gt; Manage Logical networks, network interfaces, and NSGs through the Azure control plane – whether your preference is the Azure Portal, Azure Command-Line Interface (CLI) or Azure Resource Manager templates.&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;2- Fine-grained traffic control:&lt;/STRONG&gt; Safeguard your edge workloads with policy-driven access controls by applying inbound and outbound allow/deny rules on NSGs – just as you would in Azure.&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;3- Seamless hybrid consistency:&lt;/STRONG&gt; Reduce operational friction and accelerate your IT staff’s ramp-up on advanced networking skills by using the same familiar tools and constructs across both Azure public cloud and Azure Local.&lt;BR /&gt;&lt;BR /&gt;Software Defined Networking (SDN) forms the backbone of delivering Azure-style networking on-premises. Whether you’re securing enterprise applications or extending cloud-scale agility to your on-premises infrastructure, Azure Local combined with SDN enabled by Azure Arc offers a unified and scalable solution. Try this feature today and let us know how it transforms your networking operations!&lt;/P&gt;
&lt;H2&gt;What’s New in this Preview?&lt;/H2&gt;
&lt;P&gt;Here’s what you can do today with SDN enabled by Azure Arc:&lt;/P&gt;
&lt;P&gt;✅ Deploy logical networks — use VLAN-backed networks in your datacenter that integrate with SDN enabled by Azure Arc.&lt;/P&gt;
&lt;P&gt;✅ Attach VM Network Interfaces — assign static or DHCP IPs to VMs from logical networks.&lt;/P&gt;
&lt;P&gt;✅ Apply NSGs - create, attach, and manage NSGs directly from Azure on your logical networks (VLANs in your datacenter) and/or on the VM network interface.&amp;nbsp; This enables a generic rule set for VLANs, with a crisper rule set for individual Azure Local VM network interface using a complete 5-tuple control: source and destination IP, port and protocol.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;✅ Use Default Network Policies — apply baseline security policies during VM creation for your primary NIC. Select well known inbound ports such as HTTP (while we block everything else for you), while still allowing outbound traffic.&amp;nbsp; Or select an existing NSG you already have!&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;✅ Run SDN Network Controller as a Failover Cluster service — no VMs required!&lt;/P&gt;
&lt;P&gt;All of this is powered by Network Controller running on your Azure Local infrastructure!&lt;/P&gt;
&lt;H2&gt;SDN enabled by Azure Arc (Preview) vs. SDN managed by on-premises tools?&lt;/H2&gt;
&lt;P&gt;Choosing Your Path:&lt;/P&gt;
&lt;P&gt;Some SDN features like virtual networks (vNETs), Load Balancers (SLBs), and Gateways are not yet supported in the SDN enabled by Azure Arc (Preview).&lt;/P&gt;
&lt;P&gt;But good news: you’ve still got options.&lt;/P&gt;
&lt;P&gt;If your workloads need those features today, you can leverage SDN managed by on-premises tools:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/azure-local/deploy/sdn-express-23h2?view=azloc-2505" target="_blank"&gt;- SDN Express (PowerShell)&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/azure-local/deploy/sdn-wizard-23h2?view=azloc-2505" target="_blank"&gt;- Windows Admin Center (WAC)&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;The SDN managed by on-premises tools continue to provide full-stack SDN capabilities, including SLBs, Gateways, and VNET peering while we actively work on bringing this additional value to complete SDN enabled by Azure Arc feature set.&lt;BR /&gt;&lt;BR /&gt;You must choose one of the modes of SDN management and cannot run in a hybrid management mode mixing the two. Please read &lt;A href="https://learn.microsoft.com/en-us/azure/azure-local/concepts/sdn-overview?view=azloc-2506#important-considerations" target="_blank"&gt;this important consideration section &lt;/A&gt;before getting started!&lt;/P&gt;
&lt;H2&gt;Thank You to Our Community&lt;/H2&gt;
&lt;P&gt;This milestone was only possible because of your input, your use cases, and your edge innovation. We're beyond excited to see what you build next with SDN enabled by Azure Arc.&lt;/P&gt;
&lt;P&gt;To try it out, head to the &lt;A href="https://learn.microsoft.com/en-us/azure/azure-local/concepts/sdn-overview?view=azloc-2506&amp;amp;branch=pr-en-us-18218" target="_blank"&gt;Azure Local documentation&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Let’s keep pushing the edge forward. Together.&lt;/P&gt;
&lt;P&gt;#AzureLocal #SDN #AzureArc #HybridCloud #EdgeComputing&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 11 Jul 2025 16:23:36 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/networking-blog/announcing-the-preview-of-software-defined-networking-sdn/ba-p/4432417</guid>
      <dc:creator>Kyle_Bisnett</dc:creator>
      <dc:date>2025-07-11T16:23:36Z</dc:date>
    </item>
    <item>
      <title>Troubleshooting Zero Trust DNS</title>
      <link>https://techcommunity.microsoft.com/t5/networking-blog/troubleshooting-zero-trust-dns/ba-p/4405808</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;By adopting Zero Trust DNS (ZTDNS), organizations can strengthen their Zero Trust deployments, ensuring that Windows 11 devices only communicate with trusted network destinations. This blog post will help ZTDNS Public Preview selfhosters retrieve and update ZTDNS configuration, find ZTDNS logs, debug ZTDNS, share feedback, and report bugs to the team. Some known issues are also listed.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Retrieving ZTDNS configuration&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;You can find information on the commands to retrieve trusted server information, manually allowed exceptions, state of ZTDNS, and more by running the following in command prompt:&lt;/P&gt;
&lt;LI-CODE lang=""&gt;netsh ztdns show help&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Updating ZTDNS configuration&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;You can add new exceptions or servers while ZTDNS is running on your device using the same commands from &lt;A href="https://aka.ms/ztdnspreview" target="_blank" rel="noopener"&gt;ZTDNS deployment process&lt;/A&gt;. You can run the following in command prompt to get more information:&lt;/P&gt;
&lt;LI-CODE lang=""&gt;netsh ztdns add help&lt;/LI-CODE&gt;
&lt;P&gt;You can find information on the commands to delete certain configurations like trusted servers, manually allowed exceptions, and more by running the following in command prompt:&lt;/P&gt;
&lt;LI-CODE lang=""&gt;netsh ztdns delete help&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Finding ZTDNS logs&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;When you have ZTDNS running your device, you can check Event Viewer to see logs for all attempted connections from the device.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Search for ‘Event Viewer’ in Start menu and open it.&lt;/LI&gt;
&lt;LI&gt;In the left panel, go under ‘Applications and Service Logs’ -&amp;gt; ‘Microsoft’ -&amp;gt; ‘Windows’ -&amp;gt; ‘ZTDNS’.&lt;/LI&gt;
&lt;LI&gt;You should see three logs under this folder:
&lt;UL&gt;
&lt;LI&gt;BlockedConnections – contains logs about connections blocked by ZTDNS. Each blocked connection log contains information about the time of the blocked connection, source IP address, source port, destination IP address, destination port, and name of initiating process.&lt;/LI&gt;
&lt;LI&gt;Operational – contains logs about ZTDNS configuration and service state changes.&lt;/LI&gt;
&lt;LI&gt;PermittedConnections – contains logs about connections allowed by ZTDNS. Each permitted connection log contains information about the time of the permitted connection, source IP address, source port, destination IP address, destination port, and name of initiating process. (Note: this log is disabled by default and can be enabled by right clicking on ‘PermittedConnections’ in the left panel and selecting ‘Enable Log’.)&lt;img /&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Debugging ZTDNS&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;If you experience connectivity issues after enabling ZTDNS, verify that ZTDNS has at least one trusted DNS server set. To see all trusted DNS servers set for ZTDNS, run the following in command prompt:&lt;/P&gt;
&lt;LI-CODE lang=""&gt;netsh ztdns show server&lt;/LI-CODE&gt;
&lt;P&gt;Check connectivity to the trusted DNS server using ping and try resolving an allowed domain name using the trusted DNS server with &lt;A href="https://learn.microsoft.com/en-us/powershell/module/dnsclient/resolve-dnsname?view=windowsserver2025-ps" target="_blank" rel="noopener"&gt;Resolve-DnsName&lt;/A&gt;. After this, ping to the resolved IP address should succeed.&lt;/P&gt;
&lt;P&gt;Alternatively, you can ping an allowed domain name directly which should use the Windows DNS client and trusted DNS server for name resolution. This will check connectivity to the trusted DNS server as well as the resolved endpoint.&lt;/P&gt;
&lt;P&gt;If your issue still persists, please file a bug. You can restore network connectivity by disabling ZTDNS. In an administrator command prompt, run:&lt;/P&gt;
&lt;LI-CODE lang=""&gt;netsh ztdns set state enable=no audit=no&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Reporting&lt;/STRONG&gt;&lt;STRONG&gt; feedback and bugs&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;We value your feedback! Your feedback from testing ZTDNS in preview is crucial for us as we get ready for GA. To share your feedback or report a bug:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Search for ‘Feedback Hub’ in Start Menu and open it.&lt;/LI&gt;
&lt;LI&gt;In the left panel, click ‘Feedback’.&lt;/LI&gt;
&lt;LI&gt;Click ‘+ Give new feedback’ button to enter new feedback or upvote an existing entry that matches your feedback.&lt;/LI&gt;
&lt;LI&gt;In section 1. ‘Summarize your feedback’ text box, enter ‘[ZTDNS]’ and then your feedback.&lt;/LI&gt;
&lt;LI&gt;In section 2. ‘Choose a category’, select ‘Problem’ if you want to report a bug and ‘Suggestion’ if you want to give feedback.&lt;/LI&gt;
&lt;LI&gt;For the left dropdown box, choose ‘Network and Internet’ and for the right dropdown box, choose ‘DNS’.&lt;img /&gt;&lt;/LI&gt;
&lt;LI&gt;Fill out Section 3. and 4.&lt;/LI&gt;
&lt;LI&gt;Click ‘Submit’.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Known issues&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Chromium-based WebView2 applications (including new Outlook and Teams) use their own encrypted DNS clients instead of using the Windows DNS client. On a Windows 11 device with ZTDNS enabled, based on the DNS server being contacted by the WebView2 DNS client, these applications will fail to send traffic to any resolved IP addresses. We are actively working to solve this for all applications using Chromium under the hood, including our own. You can track the linked &lt;A href="https://issues.chromium.org/issues/401522571" target="_blank" rel="noopener"&gt;Chromium issue&lt;/A&gt; for the latest updates.&lt;/P&gt;</description>
      <pubDate>Thu, 24 Apr 2025 13:28:31 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/networking-blog/troubleshooting-zero-trust-dns/ba-p/4405808</guid>
      <dc:creator>AditiPatange</dc:creator>
      <dc:date>2025-04-24T13:28:31Z</dc:date>
    </item>
    <item>
      <title>Announcing Public Preview of Zero Trust DNS</title>
      <link>https://techcommunity.microsoft.com/t5/networking-blog/announcing-public-preview-of-zero-trust-dns/ba-p/4405802</link>
      <description>&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class=""&gt;In today's evolving cybersecurity landscape,&amp;nbsp;&lt;A href="https://www.microsoft.com/en-us/security/blog/2019/10/23/perimeter-based-network-defense-transform-zero-trust-model/?msockid=0c1393f4472c6c7122f987c046966d63" target="_blank" rel="noopener"&gt;traditional perimeter defenses are no longer sufficient&lt;/A&gt;&amp;nbsp;. As organizations embrace the Zero Trust security model, ensuring that devices only communicate with trusted network destinations becomes paramount. We are excited to announce the public preview of Zero Trust DNS (ZTDNS), a new feature in Windows 11 Insider builds designed to enforce domain-name-based network access controls, enhancing your organization's security posture.&lt;/P&gt;
&lt;P&gt;ZTDNS empowers enterprise IT administrators to natively apply outbound domain-name-based network access controls on Windows 11 endpoints. This helps prevent access to untrusted destinations, reducing the risk of a slew of network attacks from malware communication to data exfiltration.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;What is Zero Trust DNS?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;ZTDNS integrates the Windows DNS client with trusted Protective DNS (PDNS) servers to control outbound IP traffic based on domain names. When ZTDNS is configured on a Windows 11 device to use PDNS servers that support DNS over HTTPS (DoH) or DNS over TLS (DoT), ZTDNS ensures that:​&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;The Windows DNS client forces the use of encrypted DNS and queries are only sent to the configured PDNS servers.&lt;/LI&gt;
&lt;LI&gt;Outbound traffic is permitted only to IP addresses resolved by these trusted PDNS servers or to IP ranges with a manual exception plumbed by the IT administrator.&lt;/LI&gt;
&lt;LI&gt;All other IPv4 and IPv6 outbound traffic is blocked by default, adhering to the "deny by default" principle of Zero Trust.&lt;/LI&gt;
&lt;LI&gt;A log of attempted outbound connections is maintained on the device.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;This approach reduces the need for deep packet inspection or reliance on insecure signals like plain-text DNS or Server Name Indication (SNI) when attempting to determine the domain name associated with outbound traffic. This makes ZTDNS an important tool in the Zero Trust toolbelt since DNS traffic and SNI are increasingly being encrypted. It also aligns with Zero Trust principles by assuming all destinations are untrusted by default, only allowing connections to destinations explicitly permitted through DNS resolutions provided by trusted PDNS servers.&lt;/P&gt;
&lt;P&gt;For more information, visit our &lt;A href="https://techcommunity.microsoft.com/blog/networkingblog/announcing-zero-trust-dns-private-preview/4110366" target="_blank" rel="noopener"&gt;previous blog post&lt;/A&gt; on design of ZTDNS.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Threats Zero Trust DNS Helps Mitigate&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Implementing ZTDNS can bolster your defenses against various network-based threats, including:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;DNS Hijacking: By ensuring that only DNS resolutions from trusted PDNS servers are used, ZTDNS helps prevent attackers from redirecting traffic to malicious sites.​&lt;/LI&gt;
&lt;LI&gt;Malicious Communications: Blocking outbound connections to IP addresses not resolved through trusted DNS queries helps disrupt phishing and even non-administrative malware stagers and beacons.&lt;/LI&gt;
&lt;LI&gt;Data Exfiltration: Restricting outbound traffic to approved domains reduces the risk of sensitive data being transmitted to unauthorized destinations without conducting analysis of domain name resolution patterns.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Getting Started with Zero Trust DNS&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;NOTE: Public Preview of ZTDNS has officially ended. The instructions below are no longer supported. We appreciate you taking the time to test out ZTDNS in Public Preview. Your valuable feedback has helped us improve ZTDNS. For further assistance, please reach out to ztdnspreview@microsoft.com.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;To enable ZTDNS in your environment:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Get a supported Windows 11 build&lt;/LI&gt;
&lt;/OL&gt;
&lt;UL&gt;
&lt;LI style="list-style-type: none;"&gt;
&lt;UL&gt;
&lt;LI&gt;Enroll your device in the&amp;nbsp;&lt;A href="https://support.microsoft.com/en-us/windows/join-the-windows-insider-program-and-manage-insider-settings-ef20bb3d-40f4-20cc-ba3c-a72c844b563c" target="_blank" rel="noopener"&gt;Windows Insider Program (Canary channel)&lt;/A&gt; and update to build 27766+.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;OL start="2"&gt;
&lt;LI&gt;Unlock ZTDNS&lt;/LI&gt;
&lt;/OL&gt;
&lt;UL&gt;
&lt;LI style="list-style-type: none;"&gt;
&lt;UL&gt;
&lt;LI&gt;In an administrator command prompt, run:&lt;LI-CODE lang=""&gt;reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Dnscache\Parameters" /v Experiment4712 /d 0xbe8261eb /t REG_DWORD&lt;/LI-CODE&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI style="list-style-type: none;"&gt;
&lt;UL&gt;
&lt;LI&gt;Reboot the device.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;OL start="3"&gt;
&lt;LI&gt;Ensure all applications and services are configured to use the Windows DNS client&lt;/LI&gt;
&lt;/OL&gt;
&lt;UL&gt;
&lt;LI style="list-style-type: none;"&gt;
&lt;UL&gt;
&lt;LI&gt;Configure applications like&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/deployedge/microsoft-edge-policies#use-built-in-dns-client" target="_blank" rel="noopener"&gt;Edge&lt;/A&gt; and &lt;A href="https://chromeenterprise.google/policies/#BuiltInDnsClientEnabled" target="_blank" rel="noopener"&gt;Chrome&lt;/A&gt; to use the Windows DNS client instead of their custom client (disable BuiltInDnsClientEnabled policy).&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;OL start="4"&gt;
&lt;LI&gt;Add manual allow exceptions&lt;/LI&gt;
&lt;/OL&gt;
&lt;UL&gt;
&lt;LI style="list-style-type: none;"&gt;
&lt;UL&gt;
&lt;LI&gt;Teleconferencing applications like Teams use WebRTC which negotiates IP addresses for peers within a TLS tunnel and has no DNS visibility. These IP subnets are also publicly documented and need manual allow exceptions for the application to work with ZTDNS.&lt;/LI&gt;
&lt;LI&gt;Add manual allow exceptions for IP addresses that are necessary for your productivity applications/services but are not discovered through DNS. Here is a sample command, for manual allow exception, which needs to run in administrator command prompt:&lt;LI-CODE lang=""&gt;netsh ztdns add exception name=AppName description="Description of AppName" subnets=192.0.2.128/25,198.51.100.0/24,3fff::/48, 3fff:123::/38&lt;/LI-CODE&gt;&lt;/LI&gt;
&lt;LI&gt;Here is a link &lt;A href="https://learn.microsoft.com/en-us/microsoft-365/enterprise/urls-and-ip-address-ranges?view=o365-worldwide" target="_blank" rel="noopener"&gt;Microsoft 365&lt;/A&gt; services that may need manual allow exceptions.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;OL start="5"&gt;
&lt;LI&gt;Set your trusted Protective DNS server (needs to be DoH/ DoT capable)&lt;/LI&gt;
&lt;/OL&gt;
&lt;UL&gt;
&lt;LI style="list-style-type: none;"&gt;
&lt;UL&gt;
&lt;LI&gt;In an administrator command prompt, replace example data in following sample commands with information about your desired DNS server before running:&lt;LI-CODE lang=""&gt;netsh ztdns add server type=doh address=203.0.113.0 template=https://doh.resolver.example/dns-query 

netsh ztdns add server type=dot address=2001:db8::1 hostname=dot.resolver.example&lt;/LI-CODE&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;OL start="6"&gt;
&lt;LI&gt;Enable ZTDNS&lt;/LI&gt;
&lt;/OL&gt;
&lt;UL&gt;
&lt;LI style="list-style-type: none;"&gt;
&lt;UL&gt;
&lt;LI&gt;ZTDNS can be enabled using Audit mode or Enforcement mode.&lt;/LI&gt;
&lt;LI&gt;Audit mode logs all expected ZTDNS behavior without the actual enforcement. Check out the &lt;A href="https://techcommunity.microsoft.com/blog/networkingblog/troubleshooting-zero-trust-dns/4405808" target="_blank" rel="noopener"&gt;next blog post&lt;/A&gt; for finding and comprehending ZTDNS logs. Enabling ZTDNS in audit mode is recommended before moving on to Enforcement mode. In an administrator command prompt, run:&lt;LI-CODE lang=""&gt;netsh ztdns set state enable=yes audit=yes&lt;/LI-CODE&gt;&lt;/LI&gt;
&lt;LI&gt;Enforcement mode blocks untrusted traffic. In an administrator command prompt, run:&lt;LI-CODE lang=""&gt;netsh ztdns set state enable=yes audit=no&lt;/LI-CODE&gt;&lt;/LI&gt;
&lt;LI&gt;Now you should have ZTDNS running! In a rare situation where you experience unexpected connectivity issues for some application, please restart the application. If the issue persists, please reboot the device.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;OL start="7"&gt;
&lt;LI&gt;Disable ZTDNS&lt;/LI&gt;
&lt;/OL&gt;
&lt;UL&gt;
&lt;LI style="list-style-type: none;"&gt;
&lt;UL&gt;
&lt;LI&gt;ZTDNS is a powerful lockdown feature. In case you lose network connectivity due to misconfiguration, you can disable ZTDNS to restore your network connectivity. In an administrator command prompt, run:&lt;LI-CODE lang=""&gt;netsh ztdns set state enable=no audit=no&lt;/LI-CODE&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Note: ZTDNS is currently in Public Preview and is intended for evaluation and feedback only. Do not deploy in production environments. Breaking changes may occur before General Availability (GA).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Check out the next blog post &lt;A href="https://techcommunity.microsoft.com/blog/networkingblog/troubleshooting-zero-trust-dns/4405808" target="_blank" rel="noopener"&gt;Troubleshooting Zero Trust DNS&lt;/A&gt; for information on ZTDNS logs, sharing feedback and bug reports with the team.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Join Me at RSAC 2025&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;I am excited to share that I will be attending the RSA Conference 2025! If you are planning to be there, stop by Microsoft booth N-5744 or &lt;A href="https://microsoftsecurityevents.eventbuilder.com/MicrosoftRSAC2025events" target="_blank" rel="noopener"&gt;Microsoft Security Hub&lt;/A&gt; and ask for Aditi Patange to discuss how ZTDNS can enhance your organization's security posture.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Securing the Present, Innovating for the Future&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Security is a shared responsibility. Through collaboration across hardware and software ecosystems, we can build more resilient systems secure by design and by default, from Windows to the cloud, enabling trust at every layer of the digital experience.&lt;/P&gt;
&lt;P&gt;The updated &lt;A href="https://aka.ms/securitybook" target="_blank" rel="noopener"&gt;Windows Security book&lt;/A&gt; is available to help you understand how to stay secure with Windows. Learn more about &lt;A href="https://www.microsoft.com/en-us/windows/business" target="_blank" rel="noopener"&gt;Windows 11&lt;/A&gt; and &lt;A href="https://www.microsoft.com/en-us/windows/business/devices/copilot-plus-pcs" target="_blank" rel="noopener"&gt;Copilot+ PCs&lt;/A&gt;. To learn more about Microsoft Security solutions, visit our &lt;A href="https://www.microsoft.com/en-us/security/business" target="_blank" rel="noopener"&gt;website.&lt;/A&gt; Bookmark the &lt;A href="https://www.microsoft.com/security/blog/" target="_blank" rel="noopener"&gt;Security blog&lt;/A&gt; to keep up with our expert coverage on security matters.&lt;/P&gt;
&lt;P&gt;Also, follow us on LinkedIn (&lt;A href="https://www.linkedin.com/showcase/microsoft-security/" target="_blank" rel="noopener"&gt;Microsoft Security&lt;/A&gt;) and X (&lt;A href="https://twitter.com/@MSFTSecurity" target="_blank" rel="noopener"&gt;@MSFTSecurity&lt;/A&gt;) for the latest news and updates on cybersecurity.&lt;/P&gt;</description>
      <pubDate>Tue, 11 Nov 2025 21:55:13 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/networking-blog/announcing-public-preview-of-zero-trust-dns/ba-p/4405802</guid>
      <dc:creator>AditiPatange</dc:creator>
      <dc:date>2025-11-11T21:55:13Z</dc:date>
    </item>
    <item>
      <title>Windows Server 2025 Software Defined Datacenter: Networking Deployment Series (2/6)</title>
      <link>https://techcommunity.microsoft.com/t5/networking-blog/windows-server-2025-software-defined-datacenter-networking/ba-p/4402552</link>
      <description>&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Deploying Windows Server 2025 Clusters with Edge Networking Solutions Part 2: How Network HUD ensures optimal, healthy and smooth Networking operations and health.&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Welcome to the&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;second&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;blog in our Networking Deployment Series for Windows Server 2025.&amp;nbsp;In this deployment series, we&amp;nbsp;take a look&amp;nbsp;at Contoso Medical Center’s journey deploying and harnessing the power of Windows Server 2025 Software Defined Datacenter (SDDC) to build a next-generation environment for your VMs and applications.&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://techcommunity.microsoft.com/blog/NetworkingBlog/windows-server-2025-software-defined-datacenter-networking-deployment-series-16/4397158" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;In the first blog&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;, we deployed Contoso Medical Center’s host-networking using the uniform, automated and scalable solution offered by Network ATC.&amp;nbsp;With host networking already deployed using Network ATC at Contoso Medical Center, the next challenge is ensuring everything runs as intended- day in and day out. This is&amp;nbsp;where&amp;nbsp;Network HUD comes in, providing real-time visibility and proactive diagnostics to keep the network healthy, aligned, and optimized.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;Note&lt;/STRONG&gt;: Network HUD is currently in private preview on Windows Server 2025.&amp;nbsp;When&amp;nbsp;it&amp;nbsp;goes to Public Preview and&amp;nbsp;General&amp;nbsp;Availability&amp;nbsp;(GA),&amp;nbsp;users will&amp;nbsp;need&amp;nbsp;their&amp;nbsp;WS machines&amp;nbsp;Arc enabled. Along with that, they will need to&amp;nbsp;either (1) attest to Software Assurance or (2)&amp;nbsp;have a Pay-as-you-go subscription&amp;nbsp;to successfully&amp;nbsp;enable&amp;nbsp;and&amp;nbsp;manage&amp;nbsp;Network HUD.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;With your host-networking now deployed, Network HUD steps in to intercept any Networking health, diagnostic and operational issues.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;Network HUD&amp;nbsp;proactively&amp;nbsp;identifies&amp;nbsp;and remediates operational networking issues on&amp;nbsp;your&amp;nbsp;Windows Server&amp;nbsp;2025&amp;nbsp;cluster. Running and&amp;nbsp;maintaining&amp;nbsp;a network for your business applications is a hard job. Ensuring a workload is stable and optimized requires coordination across the physical network (switch, cabling, NIC), host operating system (e.g., virtual switch, virtual NICs, etc.), and of course the application that runs inside the VMs or Containers. Each of those have their own configurations, have different capabilities, and may be managed by different teams. Even if&amp;nbsp;you’ve&amp;nbsp;perfectly implemented your “golden configuration”,&amp;nbsp;your environment may still experience the ripple effect of a bad configuration from another part of your network that degrades your application performance.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;&lt;STRONG&gt;Installing Network HUD through an Azure Arc extension&lt;/STRONG&gt; is fast, easy, and efficient. With just a few clicks in the Azure Portal, you can enable powerful network health monitoring across your cluster—no manual setup, complex scripts, or extra tools&amp;nbsp;required. It integrates seamlessly into your environment, letting you start&amp;nbsp;monitoring&amp;nbsp;in minutes.&lt;/SPAN&gt; &lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;(click on the image for a closer look)&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;&lt;STRONG&gt;Network HUD is cluster aware&lt;/STRONG&gt;.&amp;nbsp;Network HUD understands how you intend to use your adapters and as a result can manage&amp;nbsp;the stability&amp;nbsp;across the cluster. Imagine Node1 in your cluster has an unstable adapter. Without informing the other nodes of the issue, the healthy nodes could overwhelm Node1 and cause a larger issue (e.g., cluster crashes or Storage Spaces Direct rebuilds).&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;To address this, Network HUD works in tandem with Network ATC. When Network HUD&amp;nbsp;identifies&amp;nbsp;instability on one node, it informs Network ATC which can manage the cluster-wide configuration and ensure that the healthy nodes do not overload the degraded nodes.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;&lt;STRONG&gt;Network HUD integrates with the physical network&lt;/STRONG&gt;.&amp;nbsp;Network HUD takes advantage of capabilities in the physical switch to ensure that your configuration matches&amp;nbsp;what’s&amp;nbsp;on the physical network. For example, we can&amp;nbsp;determine&amp;nbsp;whether the locally connected switchports&amp;nbsp;have&amp;nbsp;the correct data center bridging configuration required for RDMA storage traffic to function (and as previously mentioned, we know which switchports to look at because the adapters are part of a Network ATC storage intent).&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;To ensure Network HUD can&amp;nbsp;validate&amp;nbsp;the physical network, make sure the switches connected to your cluster nodes&amp;nbsp;are&amp;nbsp;supported with&amp;nbsp;the necessary capabilities:&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/azure-stack/hci/concepts/physical-network-requirements?tabs=overview%2C23H2reqs" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;https://learn.microsoft.com/en-us/azure-stack/hci/concepts/physical-network-requirements?tabs=overview%2C23H2reqs&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="none"&gt;.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;Network HUD can handle multiple scenarios, like the ones mentioned in the examples above.&amp;nbsp;Here’s&amp;nbsp;a brief description of each Network HUD scenario in a few lines:&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;U&gt;&lt;SPAN style="color: rgb(30, 30, 30);"&gt;Failed Network ATC Intent&lt;/SPAN&gt;&lt;/U&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;Ensures that all Network ATC intents are successfully provisioned. Flags a health fault if an intent fails,&amp;nbsp;which can lead to incomplete&amp;nbsp;set-ups&amp;nbsp;or inaccurate&amp;nbsp;configurations&amp;nbsp;and&amp;nbsp;unwanted system&amp;nbsp;drift.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;OL start="2"&gt;
&lt;LI&gt;&lt;U&gt;&lt;SPAN data-contrast="none"&gt; Driver Consistency, Age and Stability&lt;/SPAN&gt;&lt;/U&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;Network HUD checks that all network cards (called NICs – short for Network Interface Cards) in your servers are using the same version of their software, known as drivers. These drivers help the NICs talk to Windows and send data over the network. If the drivers are too old or mismatched, it can cause slow performance or connection problems—so Network HUD warns you if a driver is over 2 years&amp;nbsp;old and&amp;nbsp;flags a problem if&amp;nbsp;it’s&amp;nbsp;older than 3.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;OL start="3"&gt;
&lt;LI&gt;&lt;U&gt;&lt;SPAN data-contrast="none"&gt; LLDP Operation Status&lt;/SPAN&gt;&lt;/U&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;Validates whether LLDP is running properly, which is critical for detecting fabric misconfigurations. A non-operational LLDP service prevents other HUD scenarios from functioning accurately.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;OL start="4"&gt;
&lt;LI&gt;&lt;U&gt;&lt;SPAN data-contrast="none"&gt;Misconfigured VLANs&lt;/SPAN&gt;&lt;/U&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;Detects inconsistencies in VLAN advertisements across NICs, switches, and hosts.&amp;nbsp;Ensures&amp;nbsp;that VLANs&amp;nbsp;required&amp;nbsp;for management,&amp;nbsp;compute, and storage traffic are consistently available and properly configured.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;Let’s&amp;nbsp;say you have VLAN 710 configured on your VMs —everything looks good on the host side.&amp;nbsp;But if the switch connected to one of your nodes isn’t&amp;nbsp;actually advertising&amp;nbsp;VLAN 710 on the right port, your&amp;nbsp;workloads&amp;nbsp;could suddenly lose connectivity.&amp;nbsp;This kind of mismatch is easy to miss manually, but Network HUD catches it instantly. It reads the switch information using LLDP packets, compares it with&amp;nbsp;what’s&amp;nbsp;expected from Network ATC on the host, and alerts you the moment something&amp;nbsp;doesn’t&amp;nbsp;line up—so you can fix it before your users ever notice.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;OL start="5"&gt;
&lt;LI&gt;&lt;U&gt;&lt;SPAN data-contrast="none"&gt; Inconsistent PFC Configuration&lt;/SPAN&gt;&lt;/U&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;Checks Priority Flow Control (PFC) settings between the host and top-of-rack switches. Flags mismatches or missing PFC priorities that could lead to traffic congestion, packet loss, or storage crashes.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;Here’s&amp;nbsp;a demonstration of how the&amp;nbsp;end-to-end&amp;nbsp;installation, enablement and health fault alerting for Network HUD looks like&amp;nbsp;on a standard Windows Server 2025 cluster:&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://youtu.be/hW47R5Knu2k" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;https://youtu.be/hW47R5Knu2k&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="none"&gt;.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;We are very keen to receive customer feedback on Network HUD and all its scenarios.&amp;nbsp;To try out Network HUD on your Windows Server&amp;nbsp;2025&amp;nbsp;Cluster, and&amp;nbsp;participate&amp;nbsp;in our private preview, please reach out to:&amp;nbsp;&lt;/SPAN&gt;&lt;A href="mailto:edgenetfeedback@microsoft.com" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;edgenetfeedback@microsoft.com&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="none"&gt;.&amp;nbsp;If you have any additional operational or diagnostic scenarios that you think Network HUD can alert you to, please reach out to us and let us know!&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 09 Apr 2025 17:40:40 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/networking-blog/windows-server-2025-software-defined-datacenter-networking/ba-p/4402552</guid>
      <dc:creator>Param_Mahajan</dc:creator>
      <dc:date>2025-04-09T17:40:40Z</dc:date>
    </item>
    <item>
      <title>Windows Server 2025 Software Defined Datacenter: Networking Deployment Series (1/6)</title>
      <link>https://techcommunity.microsoft.com/t5/networking-blog/windows-server-2025-software-defined-datacenter-networking/ba-p/4397158</link>
      <description>&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Deploying Windows Server 2025 Clusters with Edge Networking Solutions Part 1: How Network ATC Simplifies Host Networking at Contoso Medical Center&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;In today's digital era, a reliable and secure network is the foundation of any modern organization—including our fictitious customer, Contoso Medical Center. If you're on a similar journey, deploying and harnessing the power of &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Windows Server 2025 Software Defined Datacenter (SDDC)&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; to build a next-generation environment for your VMs and applications, you’re in the right place.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;No need to navigate this transformation alone! We’re here to guide you through &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;six essential steps to networking success&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;—demonstrating how Contoso Medical Center is:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;🔹&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; Part 1: Building a rock-solid Host Network platform with &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Network ATC&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;🔹&lt;/SPAN&gt; &lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-blog" href="https://techcommunity.microsoft.com/blog/networkingblog/windows-server-2025-software-defined-datacenter-networking-deployment-series-26/4402552" target="_blank" rel="noopener" data-lia-auto-title="Part 2" data-lia-auto-title-active="0"&gt;Part 2&lt;/A&gt;: Continuously monitoring operational network issues with Network HUD (In &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Private Preview)&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;🔹&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; &lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-blog" href="https://techcommunity.microsoft.com/blog/networkingblog/windows-server-2025-software-defined-datacenter-networking-deployment-series-36/4437183" target="_blank" rel="noopener" data-lia-auto-title="Part 3" data-lia-auto-title-active="0"&gt;Part 3&lt;/A&gt;: Deploying a modern Software Defined Networking (SDN) stack with &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Native SDN&lt;/SPAN&gt;&amp;nbsp;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;🔹&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; &lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-blog" href="https://techcommunity.microsoft.com/blog/networkingblog/windows-server-2025-software-defined-datacenter-networking-deployment-series-46/4449265" data-lia-auto-title="Part 4" data-lia-auto-title-active="0" target="_blank"&gt;Part 4&lt;/A&gt;: Fortifying &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;VM security &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;with built-in SDN network protection&lt;/SPAN&gt;&amp;nbsp;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;🔹&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; Part 5: Supercharging mission-critical VMs with &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Accelerated Networking&lt;/SPAN&gt;&amp;nbsp;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;🔹&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; Part 6: Ensuring seamless connectivity between multiple clusters with &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;SDN Multisite&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Follow along as we break down each step, helping you optimize your own deployment with &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Windows Server 2025!&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;We are&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; Contoso Medical Center&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;, a rapidly expanding healthcare provider that relies on cutting-edge technologies to enhance patient care, streamline administrative processes, and improve overall operational efficiency. We have heard about many new innovations in Windows Server 2025 and are eager to try it out. Our IT team is particularly concerned about the networking setup; In the past, we have had connectivity issues due to storage networks not being configured correctly. We have also had incidents where some members of the team unknowingly wiped out some configuration, causing outages. As we prepare to deploy our &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Windows Server 2025 clusters&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;, we are looking for the &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;best possible solution to setup our host network &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;—one that is &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;fast, reliable, automated, and aligned with Microsoft’s best practices&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;.&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Enter Network ATC!!!&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Why Network ATC?&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Deploying and managing host networking for clusters has traditionally been a &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;manual, complex, and error-prone&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; process. With Network ATC, we can &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;automate network configurations&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; across our servers while ensuring they adhere to &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Microsoft’s best practices&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;The key advantages for Contoso Medical Center’s IT team include:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Consistency&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; – Ensures uniform networking across all nodes in a cluster.&lt;/SPAN&gt;&amp;nbsp;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;Automation&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; – Reduces the need for manual configurations.&lt;/SPAN&gt;&amp;nbsp;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;Self-healing&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; – Detects and corrects misconfigurations automatically.&lt;/SPAN&gt;&amp;nbsp;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;Microsoft Best Practices&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; – Always aligned with the latest recommendations from Microsoft.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Managing Network ATC via Windows Admin Center&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;One of the biggest improvements in managing &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Network ATC&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; is its &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;integration with Windows Admin Center&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;. Previously, configuring cluster networking required &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;PowerShell scripts&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; and deep networking expertise. Now, through an intuitive &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;UI-based approach&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;, we can define and manage Network ATC intents directly from the &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Windows Admin Center&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; dashboard.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;By leveraging this feature, we can:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Deploy new clusters faster&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; with pre-defined networking intents.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Easily monitor and troubleshoot&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; network configurations.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Modify network settings dynamically&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; without disrupting workloads.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;A href="https://techcommunity.microsoft.com/blog/networkingblog/network-atc-management-in-windows-admin-center/3861305" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Learn more about Network ATC in Windows Admin Center&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{}"&gt;&lt;A class="lia-external-url" href="https://youtu.be/okIEywKk3jg" target="_blank" rel="noopener"&gt;Network ATC end to end demo&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Migrating Existing Clusters to Network ATC&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;At Contoso, we aren’t just deploying new Windows Server 2025 clusters, we also need to &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;bring existing clusters into the modern era&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;. Network ATC makes this possible through its migration capabilities.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;With the latest tools, we can:&lt;/SPAN&gt;&amp;nbsp;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;🔹&lt;/SPAN&gt; &lt;SPAN data-contrast="auto"&gt;Seamlessly transition existing clusters&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; to Network ATC-managed configurations.&lt;/SPAN&gt;&amp;nbsp;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;🔹&lt;/SPAN&gt; &lt;SPAN data-contrast="auto"&gt;Ensure minimal downtime&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; during migration.&lt;/SPAN&gt;&amp;nbsp;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;🔹&lt;/SPAN&gt; &lt;SPAN data-contrast="auto"&gt;Standardize networking policies across all deployments&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;The result? &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;A unified and efficient networking environment&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;, whether we’re working with new or legacy clusters.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://techcommunity.microsoft.com/blog/networkingblog/migrate-an-existing-cluster-to-network-atc/3843606" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Step-by-step migration guide&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Scaling Out: Deploying Hundreds of Clusters in Minutes&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;As Contoso expands its data center operations, we need a way to &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;quickly deploy and manage networking across multiple clusters&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;. Network ATC &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;shines&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; in large-scale deployments by reducing deployment time from &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;hours or days to mere minutes&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;By leveraging &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;intent-based networking&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;, we can:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Deploy hundreds of clusters at once&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; with consistent network configurations.&lt;/SPAN&gt;&amp;nbsp;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;Ensure all clusters follow the same networking policies&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; without manual effort.&lt;/SPAN&gt;&amp;nbsp;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;Reduce human errors and misconfigurations&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; with automation.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;This is a &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;game-changer&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; for our IT operations, allowing us to scale without worrying about network inconsistencies.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://techcommunity.microsoft.com/blog/networkingblog/deploying-100s-of-production-clusters-in-minutes/3724977" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;How to deploy at scale&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Final Thoughts: Why Network ATC is a Must-Have for Contoso&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;By integrating &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Network ATC&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; into our &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Windows Server 2025 cluster deployment strategy&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;, Contoso Medical Center’s IT team is:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Simplifying network management&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; across all clusters.&lt;/SPAN&gt;&amp;nbsp;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;Improving reliability and uptime&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; with self-healing network configurations.&lt;/SPAN&gt;&amp;nbsp;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;Reducing deployment time&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; with automation at scale.&lt;/SPAN&gt;&amp;nbsp;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;Ensuring compliance with Microsoft’s best practices&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; effortlessly.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;As we move forward with our &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Edge Networking Solutions&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;, Network ATC is proving to be a &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;key enabler&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; of operational efficiency, security, and scalability. If you’re planning to deploy &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Windows Server 2025&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; clusters, &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Network ATC is a must-have in your toolkit&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;!&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;🚀&lt;/SPAN&gt; &lt;SPAN data-contrast="auto"&gt;Stay ahead of the curve and future-proof your networking with Network ATC.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 03 Sep 2025 21:44:29 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/networking-blog/windows-server-2025-software-defined-datacenter-networking/ba-p/4397158</guid>
      <dc:creator>Param_Mahajan</dc:creator>
      <dc:date>2025-09-03T21:44:29Z</dc:date>
    </item>
    <item>
      <title>Revolutionizing Network Management and Performance with ATC, HUD and AccelNet on Windows Server 2025</title>
      <link>https://techcommunity.microsoft.com/t5/networking-blog/revolutionizing-network-management-and-performance-with-atc-hud/ba-p/4284889</link>
      <description>&lt;P&gt;In an era where seamless network management and enhanced performance are paramount, the release of Network ATC, Network HUD, and AccelNet for Windows Server 2025 marks a significant milestone. These groundbreaking innovations are designed to optimize the way we manage, monitor, and accelerate network operations, promising unprecedented efficiency and reliability.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Network ATC&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Historically, deployment and management of networking for Failover clusters has been complex and error prone. The configuration flexibility with the host networking stack means there are many moving parts that can be easily misconfigured or overlooked. Keeping up with the latest best practices is also a challenge as improvements are continuously made to the underlying technologies. Additionally, configuration consistency across failover cluster nodes is vital for reliability.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Network ATC simplifies the deployment and network configuration management for Windows Server 2025 clusters. It provides an intent-based approach to host network deployment. Customers specify one or more intents (management, compute, or storage) for a network adapter, and we automate the deployment of the intended configuration.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Network ATC helps to:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Reduce&lt;/STRONG&gt;&amp;nbsp;host networking deployment&amp;nbsp;&lt;STRONG&gt;time&lt;/STRONG&gt;,&amp;nbsp;&lt;STRONG&gt;complexity&lt;/STRONG&gt;, and&lt;STRONG&gt;&amp;nbsp;errors&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Deploy&lt;/STRONG&gt;&amp;nbsp;the latest Microsoft-validated and supported&amp;nbsp;&lt;STRONG&gt;best practices&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Ensure&lt;/STRONG&gt;&amp;nbsp;configuration&amp;nbsp;&lt;STRONG&gt;consistency across the cluster&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Eliminate&lt;/STRONG&gt;&amp;nbsp;configuration&amp;nbsp;&lt;STRONG&gt;drift&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;One of the greatest benefits of Network ATC is its ability to remediate configuration drift. Have you ever wondered “who changed that?” or said, “we must have missed this node.” You’ll never worry about this again with Network ATC at the helm. Expanding the cluster to add new nodes? Simply install the feature on the new node, join the cluster and within minutes, the expected configuration will be deployed.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For more details about deploying and managing Network ATC on Windows Server 2025, please check here: &lt;A href="https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Flearn.microsoft.com%2Fen-us%2Fazure-stack%2Fhci%2Fdeploy%2Fnetwork-atc%3Ftabs%3D22H2%26pivots%3Dwindows-server&amp;amp;data=05%7C02%7Canirban.paul%40microsoft.com%7Ce1a37f5d2a434585fe9308dcf37bb007%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638652959836334053%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&amp;amp;sdata=CHHUQnXz%2B0d%2BfdEIYuvY48BnCmkQ65pQTkAfVV6g758%3D&amp;amp;reserved=0" target="_blank" rel="noopener"&gt;Deploy host networking with Network ATC&lt;/A&gt;. You can manage Network ATC through Powershell cmdlets or Windows Admin Center.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Figure: Network ATC management in Windows Admin Center&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Network HUD (Coming Soon)&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Network HUD is an upcoming Windows Server 2025 feature that will proactively identifies and remediates operational network issues.&lt;/P&gt;
&lt;P&gt;Managing a network for business applications is challenging. Ensuring stability and optimization requires coordination across the physical network (switches, cabling, NICs), host operating system (virtual switches, virtual NICs), and the applications running in VMs or containers. Each component has its own configurations and capabilities, often managed by different teams. Even with a perfect setup, a bad configuration elsewhere in the network can degrade performance.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The complexity of managing these components has reached an all-time high, with numerous tools and technologies involved. Windows Server OS provides a wealth of information through event logs, performance counters, and tools, but analyzing this data when issues arise requires expertise and time, often after the problem has occurred.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Network HUD&lt;/STRONG&gt;&amp;nbsp;excels by analyzing real-time data from event logs, performance counters, tools like Pktmon, network traffic, and physical devices to identify issues before they happen. In many cases, it prevents issues by adjusting your system to avoid exacerbating problems. When prevention isn't possible, Network HUD alerts you with actionable messages to resolve the issue.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Network HUD leverages capabilities in the physical switch to ensure that your configuration matches the physical network. For example, it can determine whether the locally connected switchports have the correct VLAN settings and the correct data center bridging configuration required for RDMA storage traffic to function.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Network HUD is built as a true cloud service that runs on-premises. It will ship as an Arc extension and will be part of Windows Server Azure Arc Management (WSAAM) services. This allows us to bring in more capabilities and make these available to you as soon as they are ready.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;AccelNet&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Accelerated Networking simplifies the management of single root I/O virtualization (SR-IOV) for virtual machines hosted on Windows Server 2025 clusters. SR-IOV provides a high-performance data path that bypasses the host, which reduces latency, jitter, and CPU utilization for the most demanding network workloads. This is particularly useful in High Performance Computing (HPC) environments, Real-time applications such as financial trading platforms, and virtualized network functions. &amp;nbsp;&lt;/P&gt;
&lt;P&gt;The following figure illustrates how two VMs communicate with and without SR-IOV.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Without SR-IOV, all networking traffic in and out of the VM traverses the host and the virtual switch. With SR-IOV, network traffic that arrives at VM’s network interface (NIC) is forwarded directly to VM.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;SR-IOV has been available in Windows Server since 2012 R2 days. So, what benefit does AccelNet provide?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Prerequisite checking: Informs users if the Windows Server cluster hosts support SR-IOV, checking for OS version and hyperthreading status among other things.&lt;/LI&gt;
&lt;LI&gt;Host Configuration: Ensures SR-IOV is enabled on the correct vSwitch that hosts virtual machine workloads and allows configuration of reserve nodes in case of failover to prevent resource over-subscription.&lt;/LI&gt;
&lt;LI&gt;Simplified VM performance settings: It can be overwhelming to identify how many queue pairs may be needed for a VM that is being enabled through SR-IOV. AccelNet abstracts performance settings into “Low,” “Medium,” and “High” to simplify configuration.&lt;/LI&gt;
&lt;LI&gt;Health Monitoring and Diagnostics: Leverages Network HUD to identify and remediate configuration/performance related issues.&amp;nbsp;Examples include NIC SR-IOV support, Live migration management, etc. (Coming Soon)&lt;/LI&gt;
&lt;LI&gt;Simplified management with Windows Admin Center: All AccelNet management functionality is available through Powershell and with an easy-to-use UI through Windows Admin Center (Latter coming Soon).&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;AccelNet is part of Windows Server Azure Arc Management (WSAAM) services. To learn more about Accelnet, please check &lt;A href="https://learn.microsoft.com/en-us/windows-server/networking/technologies/accelerated-networking/accelerated-networking" target="_self"&gt;here&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As organizations continue to navigate the challenges of an ever-evolving digital landscape, the integration of these advanced features into Windows Server 2025 ensures they are equipped with the tools needed to achieve excellence in network management and performance. Embrace the future of networking with Windows Server 2025 and experience the transformative power of Network ATC, Network HUD, and AccelNet.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We are excited to share all these innovations with you. Upgrade to Windows Server 2025 to try out these features, we look forward to your feedback. For any suggestions, opinions or issues, please reach out to us at &lt;A href="mailto:edgenetfeedback@microsoft.com" target="_blank" rel="noopener"&gt;edgenetfeedback@microsoft.com&lt;/A&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 04 Nov 2024 16:34:01 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/networking-blog/revolutionizing-network-management-and-performance-with-atc-hud/ba-p/4284889</guid>
      <dc:creator>AnirbanPaul</dc:creator>
      <dc:date>2024-11-04T16:34:01Z</dc:date>
    </item>
    <item>
      <title>A New Dawn of Software Defined Networking (SDN) in Windows Server 2025</title>
      <link>https://techcommunity.microsoft.com/t5/networking-blog/a-new-dawn-of-software-defined-networking-sdn-in-windows-server/ba-p/4284811</link>
      <description>&lt;H1&gt;&lt;SPAN&gt;A New Dawn of&lt;/SPAN&gt; Software Defined Networking (SDN) &lt;SPAN&gt;in&lt;/SPAN&gt; Windows Server 2025&lt;/H1&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Today is an exciting day as we unveil extensive new features and improvements for Software Defined Networking (SDN) in Windows Server 2025&lt;SPAN&gt;.&lt;/SPAN&gt; We deeply appreciate your fantastic feedback and requests which have driven our team forward.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We hope you are as thrilled as we are, and we can't wait to hear how you leverage these new features&lt;SPAN&gt;.&lt;/SPAN&gt; We've categorized our updates into three major areas: Manageability, Security, and Scalability.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Manageability&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;“Native” SDN Infrastructure: &lt;/STRONG&gt;The long-awaited feature is finally here! Traditionally, the Network Controller, a crucial part of SDN infrastructure, has been hosted in virtual machines (VMs), requiring multiple VMs for high availability. This setup consumes &lt;SPAN&gt;computing&lt;/SPAN&gt; resources that could otherwise be used for applications, posing a significant issue for small&lt;SPAN&gt;-sc&lt;/SPAN&gt;&lt;SPAN&gt;ale&lt;/SPAN&gt;&lt;SPAN&gt; and single node&lt;/SPAN&gt; Failover Clusters. With Windows Server 2025, we have transitioned the Network Controller from VMs to being hosted directly as Failover Cluster services on Windows Server 2025 hosts. This change not only conserves resources but also simplifies deployment and management, eliminating the need to deploy, manage, and update VMs. &lt;SPAN&gt;Yes, no more patching or installing agents from&lt;/SPAN&gt;&lt;SPAN&gt; various teams on these VMs&lt;/SPAN&gt;&lt;SPAN&gt;.&lt;/SPAN&gt; You can use PowerShell cmdlets or Windows Admin Center to deploy and manage the “native” SDN infrastructure.&lt;SPAN&gt;&amp;nbsp; Native SDN empowers you to have &lt;/SPAN&gt;&lt;SPAN&gt;advanced VM network security features in less than ten minutes&lt;/SPAN&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV style="text-align: center;"&gt;&lt;img /&gt;&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Figure: Differences between Network Controller in VMs and “native” Network Controller&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Simplified SDN Load Balancers (Coming Soon): &lt;/STRONG&gt;Previously, setting up the SDN load balancer service involved setting up Border Gateway Protocol (BGP) peering between the load balancer virtual machines and the top-of-rack network switches to achieve external network connectivity. This process was cumbersome and incurred additional operational costs, consuming both resources and energy. &lt;SPAN&gt;This is &lt;/SPAN&gt;&lt;SPAN&gt;particularly&lt;/SPAN&gt; &lt;SPAN&gt;valuable&lt;/SPAN&gt;&lt;SPAN&gt; for SMBs and smaller edge deployments, where &lt;/SPAN&gt;&lt;SPAN&gt;advanced networking knowledge and know-how may be limited. &lt;/SPAN&gt;The upcoming updates will make &lt;SPAN&gt;BGP&lt;/SPAN&gt; optional, streamlining both the deployment and management process.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Security&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Network security is a paramount concern for organizations today, given the rise in breaches, threats, and cybersecurity risks. SDN Network Security Groups (NSGs) offer Azure-consistent network security for Windows Server customers, protecting against both external and lateral threats. With Windows Server 2025, we are introducing new NSG capabilities to further enhance the security of your workloads.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;T&lt;/STRONG&gt;&lt;STRONG&gt;ag-based Segmentation: &lt;/STRONG&gt;Instead of depending on cumbersome and unreliable methods for specifying IP ranges for NSG control, administrators can now use custom service tags to associate NSGs and VMs for access control. No more remembering and retyping IP ranges for your production and management machines; you can now use simple, self-explanatory labels. This allows you to tag your workload VMs with labels of your choice and apply security policies based on these tags. You can use PowerShell cmdlets or Windows Admin Center to deploy and manage network security tags. You can read more about tag-based segmentation &lt;A href="https://learn.microsoft.com/en-us/azure-stack/hci/manage/configure-network-security-groups-with-tags?pivots=windows-server" target="_blank" rel="noopener"&gt;here&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Figure: Network Security tags in Windows Admin Center&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Default Network Policies: &lt;/STRONG&gt;We are bringing Azure parity to our existing Network Security Groups (NSGs) on Windows Server 2025. Default Network Policies now enable you to reduce lateral attacks for workloads deployed through Windows Admin Center, offering options such as “Open some ports,” “Use existing NSG,” or “No protection.”&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;SPAN&gt;No protection&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;: All ports on your VM are exposed to networks, posing a security risk.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Open some ports&lt;/STRONG&gt;: The default policy denies all inbound access, allowing you to selectively open well-known inbound ports while permitting full outbound access from the VM.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Use existing NSG&lt;/STRONG&gt;: Utilize an NSG you have already created.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;With these options, you can ensure that your newly created VMs and applications are always protected with NSGs. You can read more about Default Network Policies &lt;A href="https://learn.microsoft.com/en-us/azure-stack/hci/manage/manage-default-network-access-policies-virtual-machines-23h2?pivots=windows-server" target="_blank" rel="noopener"&gt;here&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Figures: Default network policies in Windows Admin Center during VM creation&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Scalability&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;SDN Multisite: &lt;/STRONG&gt;Many of you deploy applications across multiple locations and need the flexibility to move parts of these applications freely without reconfiguring the application or networks. Traditionally, Windows Server only partially supported this scenario and required additional components for deployment and management. SDN Multisite addresses this by providing native Layer 2 and Layer 3 connectivity between applications across two locations without any extra components. It also offers unified network policy management for workloads, eliminating the need to update policies when a workload VM moves from one location to another. You can use PowerShell cmdlets or Windows Admin Center to deploy and manage SDN Multisite. You can read more about SDN Multisite &lt;A href="https://learn.microsoft.com/en-us/azure-stack/hci/concepts/sdn-multisite-overview?pivots=windows-server" target="_blank" rel="noopener"&gt;here&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN&gt;Figure: Native connectivity for workload VMs across Cali&lt;/SPAN&gt;&lt;SPAN&gt;fornia and Norway WS 2025 clusters with SDN multisite&lt;/SPAN&gt; &lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;High Performance SDN Gateways: &lt;/STRONG&gt;SDN Layer 3 gateways are essential for SDN infrastructure, providing connectivity between workloads on SDN networks and external networks by acting as routers. Many of you have requested performance improvements for these gateways. With Windows Server 2025, we have significantly enhanced the performance of SDN Layer 3 gateways, achieving higher throughputs (~15-30% improvement) and reduced CPU cycles (~25-40% improvement). These improvements are enabled by default, so you will automatically experience better performance when you configure a SDN gateway Layer 3 connection through PowerShell cmdlets or Windows Admin Center.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;SPAN&gt;Learning&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Exciting news! We've just rolled out fresh learning content tailored to empower our customers and support engineers with in-depth knowledge and practice on SDN. All self-guided content is comprised of a lecture and a hands-on lab aimed to provide actionable knowledge that drives success for our customers. You can access the learning content here: &lt;A href="https://learn.microsoft.com/en-us/azure-stack/hci/manage/sdn-technical-reference" target="_blank" rel="noopener"&gt;Technical reference for Software Defined Networking (SDN)| Microsoft Learn&lt;/A&gt;.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We are excited to share all these innovations with you&lt;SPAN&gt;. Upgrade to Windows Server 2025 to try out these features, we look forward to your feedback.&lt;/SPAN&gt; For any suggestions, opinions, or issues, please reach out to us at &lt;A href="mailto:sdn_feedback@microsoft.com" target="_blank" rel="noopener"&gt;sdn_feedback@microsoft.com&lt;/A&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 04 Nov 2024 16:32:43 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/networking-blog/a-new-dawn-of-software-defined-networking-sdn-in-windows-server/ba-p/4284811</guid>
      <dc:creator>AnirbanPaul</dc:creator>
      <dc:date>2024-11-04T16:32:43Z</dc:date>
    </item>
    <item>
      <title>Announcing Zero Trust DNS Private Preview</title>
      <link>https://techcommunity.microsoft.com/t5/networking-blog/announcing-zero-trust-dns-private-preview/ba-p/4110366</link>
      <description>&lt;P&gt;In the modern world, useful network destinations are far more likely to be defined by long-lived domain names than long-lived IP addresses. However, enforcement of domain name boundaries (such as blocking traffic associated with a forbidden domain name) has always been problematic since it requires breaking encryption or relying on unreliable plain-text signals such as DNS over port 53 inspection or SNI inspection.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To support Zero Trust deployments trying to lock down devices to only access approved network destinations, we are announcing the development of Zero Trust DNS (ZTDNS) in a future version of Windows. ZTDNS was designed to be interoperable by using network protocols from open standards to satisfy Zero Trust requirements such as those found in &lt;A href="https://www.whitehouse.gov/wp-content/uploads/2022/01/M-22-09.pdf" target="_blank" rel="noopener"&gt;OMB M-22-09&lt;/A&gt; and &lt;A href="https://csrc.nist.gov/pubs/sp/800/207/final" target="_blank" rel="noopener"&gt;NIST SP 800-207&lt;/A&gt;. ZTDNS will be helpful to any administrator trying to use domain names as a strong identifier of network traffic.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ZTDNS integrates the Windows DNS client and the Windows Filtering Platform (WFP) to enable this domain-name-based lockdown. First, Windows is provisioned with a set of DoH or DoT capable Protective DNS servers; these are expected to only resolve allowed domain names. This provisioning may also contain a list of IP address subnets that should always be allowed (for endpoints without domain names), expected Protective DNS server certificate identities to properly validate the connection is to the expected server, or certificates to be used for client authentication.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Next, Windows will block all outbound IPv4 and IPv6 traffic except for the connections to the Protective DNS servers as well as the DHCP, DHCPv6, and NDP traffic needed to discover network connectivity information. Note that many options from these protocols will be ignored, such as RDNSS, as only the configured Protective DNS servers will be used.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Going forward, DNS responses from one of the Protective DNS servers that contain IP address resolutions will trigger outbound allow exceptions for those IP addresses. This ensures that applications and services that use the system DNS configuration will be allowed to connect to the resolved IP addresses. This is because the destination IP address will be approved and unblocked &lt;EM&gt;before &lt;/EM&gt;the domain name resolutions are returned to the caller.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When applications and services try to send IPv4 or IPv6 traffic to an IP address that was not learned through ZTDNS (and is not on the manual exceptions list), the traffic will be blocked. This is not because ZTDNS tried to identify malicious or forbidden traffic to block, but because the traffic was not proven to be allowed. This makes ZTDNS a useful tool in the Zero Trust toolbelt: it assumes traffic is forbidden by default. This will allow administrators to define domain-name-based lockdown using policy-aware Protective DNS servers. Optionally, client certs can be used to provide policy-affecting client identities to the server rather than relying on client IP addresses, which are both not secure signals and not reliably stable for work-from-anywhere devices.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;By using ZTDNS to augment their Zero Trust deployments, administrators can achieve name labeling of all outbound IPv4 and IPv6 traffic without relying on intercepting plain-text DNS traffic, engaging in an arms race to identify and block encrypted DNS traffic from apps or malware, inspecting the &lt;A href="https://datatracker.ietf.org/doc/draft-ietf-tls-esni/" target="_blank" rel="noopener"&gt;soon-to-be encrypted&lt;/A&gt; SNI, or relying on vendor-specific networking protocols. Instead, administrators can block all traffic whose associated domain name or named exception cannot be identified. This renders the use of hard-coded IP addresses or unapproved encrypted DNS servers irrelevant without having to introduce TLS termination and miss out on the security benefits of end-to-end encryption.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For DNS servers to be used as Protective DNS servers for ZTDNS lockdown, the minimum requirement is to support either DNS over HTTPS (DoH) or DNS over TLS (DoT), as ZTDNS will prevent the use of plain-text DNS by Windows. Optionally, use of mTLS on the encrypted DNS connections will allow Protective DNS to apply per-client resolution policies. In all cases, ZTDNS does not introduce any novel network protocols, which makes it a promising interoperable approach to domain-name-based lockdown.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ZTDNS is entering private preview, meaning it is not yet publicly available for testing. There will be another announcement once the ZTDNS client is available to Insiders. For now, there is additional information about considerations for deploying ZTDNS in a real-world environment in &lt;A href="https://techcommunity.microsoft.com/t5/networking-blog/deployment-considerations-for-ztdns/ba-p/4113372" target="_blank" rel="noopener"&gt;this blog post&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Update, May 6th, 2024: come talk to Aditi Patange at the Microsoft RSAC booth about ZTDNS! (week of May 6th only)&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Update, November 19th, 2024: Private Preview of ZTDNS is opening up for Windows 11 enterprise customers! If you are an enterprise interesting in testing ZTDNS in your environment, please sign up for Private Preview at&amp;nbsp;&lt;A class="lia-external-url" href="https://aka.ms/ztdnsintake" target="_blank" rel="noopener"&gt;aka.ms/ztdnsintake&lt;/A&gt;.&lt;/P&gt;</description>
      <pubDate>Wed, 20 Nov 2024 00:27:40 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/networking-blog/announcing-zero-trust-dns-private-preview/ba-p/4110366</guid>
      <dc:creator>tojens</dc:creator>
      <dc:date>2024-11-20T00:27:40Z</dc:date>
    </item>
    <item>
      <title>Deployment Considerations for Windows ZTDNS Client</title>
      <link>https://techcommunity.microsoft.com/t5/networking-blog/deployment-considerations-for-windows-ztdns-client/ba-p/4113372</link>
      <description>&lt;P&gt;&lt;EM&gt;This document goes over what considerations administrators should keep in mind when evaluating how ZTDNS fits into their Zero Trust deployment model. For more information about what ZTDNS is, see &lt;/EM&gt;&lt;A href="https://techcommunity.microsoft.com/t5/networking-blog/announcing-zero-trust-dns/ba-p/4110366" target="_blank"&gt;&lt;EM&gt;this feature announcement&lt;/EM&gt;&lt;/A&gt;&lt;EM&gt;.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Zero Trust DNS (ZTDNS) is a powerful Windows feature that enables an administrator to lock down Windows outbound IP-based traffic to endpoints approved by a Protective DNS service. However, there is no such thing as a Zero Trust silver bullet or “Zero Trust on” button.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This post will help administrators understand what to consider when deploying ZTDNS:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;What things ZTDNS will complicate (including alternative solutions to solving those same scenarios without violating Zero Trust principles)&lt;/LI&gt;
&lt;LI&gt;What will bypass ZTDNS (defining what scenarios are out of scope for ZTDNS today)&lt;/LI&gt;
&lt;/UL&gt;
&lt;H1&gt;&amp;nbsp;&lt;/H1&gt;
&lt;H1&gt;What things ZTDNS will complicate&lt;/H1&gt;
&lt;P&gt;ZTDNS, as a Zero Trust architecture enabling feature, breaks insecure networking features in ways that may not be immediately obvious. By blocking all outbound network traffic that cannot be associated with a domain name, there are many networking protocols that simply cannot function, including (but certainly not limited to) mDNS, LLMNR, NetBIOS Name Resolution, UPnP, and WebRTC.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Some of the uses cases for these protocols can be unblocked by defining narrow IP subnet exceptions, such as allowing the well-defined IP ranges required for a vendor’s software. Others cannot know their destination IP addresses in advance and will never work unless ZTDNS is deactivated or greatly crippled with broad IP subnet exceptions.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Even when creating IP address exceptions for ZTDNS, there are two major considerations to keep in mind:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;IP address exceptions should be used only when strictly necessary to prevent unmanageably long lists of exceptions, and&lt;/LI&gt;
&lt;LI&gt;Only IP addresses from the globally-unique ranges should be permitted to prevent Windows from being vulnerable to attacks from other hosts using same addresses on different networks&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;EM&gt;Note: the latter can be addressed by deploying IPv6 and creating manual IP addresses exceptions for IPv6 ULA and GUA addresses, where each address type is appropriate (note that &lt;/EM&gt;&lt;A href="https://datatracker.ietf.org/doc/html/rfc4193#section-3.2" target="_blank"&gt;&lt;EM&gt;extra care must be taken with ULA address allocation&lt;/EM&gt;&lt;/A&gt;&lt;EM&gt; to not use predictable ranges).&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This page will go over several common real-world scenarios ZTDNS will impact and, if possible, how administrators can address the original need without IP address exceptions.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;H2&gt;Printing&lt;/H2&gt;
&lt;P&gt;Using a secure printer management service such as Microsoft’s &lt;A href="https://www.microsoft.com/en-us/microsoft-365/windows/universal-print" target="_blank"&gt;Universal Print&lt;/A&gt; enables enterprise administrators to configure printers securely through trusted device management. Printer endpoints are then resolved through ZTDNS instead of being discovered using mDNS, which ZTDNS would block. More information about the endpoints Universal Print uses can be found on &lt;A href="https://learn.microsoft.com/en-us/universal-print/fundamentals/universal-print-faqs#what-are-the-set-of-endpoints-that-universal-print-uses-" target="_blank"&gt;this page&lt;/A&gt;.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;H2&gt;File shares&lt;/H2&gt;
&lt;P&gt;Trying to discover file shares on the network, such as using the Network section of Windows Explorer, will be blocked by ZTDNS. However, if the Protective DNS servers ZTDNS uses are also local network DNS servers, then file shares on the local network can be discovered and used just like any other approved domain name.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Additionally, using file hosting that can be reached at DNS-discovered endpoints, such as &lt;A href="https://www.microsoft.com/en-us/microsoft-365/sharepoint/collaboration/" target="_blank"&gt;SharePoint&lt;/A&gt;, &lt;A href="https://www.microsoft.com/en-us/microsoft-365/onedrive/onedrive-for-business" target="_blank"&gt;OneDrive for Business&lt;/A&gt;, or &lt;A href="https://azure.microsoft.com/en-us/products/storage/files/" target="_blank"&gt;Azure Files&lt;/A&gt;, will ensure no ZTDNS workarounds are needed. This also ensures that the network connection Windows 11 uses to discover and connect to the file share is not a factor in the connection’s trust in line with Zero Trust principles.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;H2&gt;Windows Update&lt;/H2&gt;
&lt;P&gt;Windows Update will continue to function when ZTDNS is activated (so long as its required domain names are resolved by the ZTDNS-configured Protective DNS service). However, enterprises may notice a sudden increase in traffic to Windows Update services because ZTDNS will block the local network peer-to-peer traffic Windows uses to share already-downloaded updates between devices on the same network.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Enterprises should consider using &lt;A href="https://learn.microsoft.com/en-us/windows/deployment/do/mcc-ent-edu-overview" target="_blank"&gt;MCC&lt;/A&gt; (in preview for enterprises) or &lt;A href="https://learn.microsoft.com/en-us/windows-server/administration/windows-server-update-services/get-started/windows-server-update-services-wsus" target="_blank"&gt;WSUS&lt;/A&gt; to reduce Windows Update traffic volume when ZTDNS prevents the peer-to-peer sharing of Windows updates.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;H2&gt;Teleconferencing apps&lt;/H2&gt;
&lt;P&gt;Programs such as Teams, Webex, Zoom, Discord, Slack, and others use protocols such as WebRTC to stream their video calls. WebRTC in turn uses IP addresses discovered through STUN and TURN. This means that ZTDNS will end up blocking WebRTC because the IP addresses were not discovered through DNS queries.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Most vendors will disclose the IP address subnets they require for functionality to inform customers about needed firewall exceptions (such as &lt;A href="https://learn.microsoft.com/en-us/microsoft-365/enterprise/urls-and-ip-address-ranges?view=o365-worldwide" target="_blank"&gt;these&lt;/A&gt; for Microsoft Office products). Such vendor-required IP ranges should be configured as IP exceptions in ZTDNS when resolving the required domain names is not sufficient.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;H2&gt;Media streaming&lt;/H2&gt;
&lt;P&gt;Some forms of media streaming, such as streaming from online services through a browser, will usually work when ZTDNS is active because it will use domain names to look up the destination. Other media streaming scenarios that use non-DNS endpoint discovery will end up being blocked by ZTDNS, especially local network media discovery and streaming such as sharing music libraries or streaming video from a home media server. &lt;A href="https://en.wikipedia.org/wiki/Universal_Plug_and_Play" target="_blank"&gt;Universal Plug and Play&lt;/A&gt; (UPnP) is one of many standards used for this that will not work when ZTDNS is active.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;H2&gt;Casting to wireless displays&lt;/H2&gt;
&lt;P&gt;Browsers and other apps may wish to discover castable wireless displays, but this will not work when ZTDNS is active. Consider using physical connections to the intended display instead.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;H2&gt;Captive portals&lt;/H2&gt;
&lt;P&gt;Most captive portals today continue to rely on plain-text DNS query interception to redirect clients to a captive portal page. When ZTDNS is active, this will never work because Windows 11 will never emit plain-text DNS traffic. While there is a &lt;A href="https://www.rfc-editor.org/rfc/rfc8908.html" target="_blank"&gt;standard that allows networks to advertise their captive portal properties&lt;/A&gt; in a structured manner (not supported in Windows), this is not compatible with the ZTDNS approach today because the network would not allow the ZTDNS client to issue a query for the captive portal URI.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In the ZTDNS private preview, navigating captive portals is an unsupported scenario.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;H2&gt;Browsers using their own DNS clients&lt;/H2&gt;
&lt;P&gt;Most browsers can use their own encrypted DNS clients instead of using the operating system’s DNS APIs. When a browser attempts to do this on Windows 11 when ZTDNS is active, it will either fail to resolve any names, or fail to send traffic to any resolved IP addresses (depending on whether ZTDNS permits outbound traffic to the encrypted DNS server in the first place).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Customers should use the management policy provided by their browser vendor to disable the use of encrypted DNS within the browser itself, such as &lt;A href="https://learn.microsoft.com/en-us/deployedge/microsoft-edge-policies#builtindnsclientenabled" target="_blank"&gt;this Edge policy&lt;/A&gt;. This is generally good practice on managed devices anyway because other Windows mechanisms also expect apps to use the system DNS resolver, such as the &lt;A href="https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/dn593632(v=ws.11)" target="_blank"&gt;NRPT&lt;/A&gt;.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;H2&gt;Apps with hard-coded or non-DNS-discovered IP addresses&lt;/H2&gt;
&lt;P&gt;It is likely that administrators will find one or more applications in their production environment relying on hard-coded IP addresses or non-DNS name resolution mechanisms. Administrators should do a controlled roll out of ZTDNS by first enabling audit mode; this will allow discovery of apps that &lt;EM&gt;would &lt;/EM&gt;break if ZTDNS were enforcing outbound blocks in the logs without actually breaking employee productivity.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Note: even when enforcement is off, ZTDNS will still disrupt any experience that directly relies on use of non-DNS name protocols by the Windows DNS client, specifically mDNS, LLMNR, and NetBIOS name resolution. This is because when ZTDNS audit mode is on, all name queries need to be sent to the Protective DNS service to test if it would have permitted the name. Use of DNS or any other name resolution protocol by other apps, such as browsers using DNS over HTTPS, will not be blocked in audit mode.&lt;BR /&gt;&lt;BR /&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;H1&gt;What can bypass ZTDNS&lt;/H1&gt;
&lt;P&gt;While there are features and functionality that ZTDNS will break, there is also networking functionality which can bypass ZTDNS enforcement, either because ZTDNS is still in preview and being worked on, or because of the inherent nature of the other feature.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;H2&gt;VPN or SASE/SSE tunnels&lt;/H2&gt;
&lt;P&gt;Any form of tunneling technology, such as VPNs and SASE/SSE solutions, will work when ZTDNS is active so long as the gateway in question is looked up by allowed domain name or the IP address is manually permitted by ZTDNS. However, once that occurs, all traffic sent over the tunnel will appear to be associated with the domain name or the exception name for the gateway’s IP address, not the domain name the app sending traffic resolved for any given traffic flow through the tunnel.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Administrators should be aware of this when they deploy ZTDNS and network tunnels at the same time and ensure they conduct ZTDNS-like domain name auditing at the tunnel’s exit node in order to maintain similar lockdown-by-domain-name functionality.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;H2&gt;Hyper-V VMs, including WSL&lt;/H2&gt;
&lt;P&gt;Any virtualization that implements its own networking stack, and therefore bypassing the Windows Filtering Platform functionality of the host TCP/IP stack, will bypass ZTDNS enforcement. Windows Subsystem for Linux (WSL) is a high-profile example of an enterprise experience that will bypass ZTDNS enforcement in the Windows Insider ZTDNS preview.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;H2&gt;Stack bypass technologies&lt;/H2&gt;
&lt;P&gt;Any other technology that bypasses the Windows 11 host networking stack, such as XDP or DPDK, will bypass ZTDNS and any other Windows feature that enforces traffic through Windows Filtering Platform.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;H2&gt;Local administrators&lt;/H2&gt;
&lt;P&gt;Enterprise administrators should consider whether their employees need to have administrative privilege on their Windows devices. Any administrator can deactivate ZTDNS enforcement as easily as activate it, add ZTDNS exceptions for malicious IP addresses, or even install and run software with administrative privileges which may (unbeknownst to the human user) do these things. Therefore, deploying ZTDNS to Windows 11 machines in an enterprise environment which have regular human users with administrator privileges is unsupported. The intention is for the device to be fully managed through MDM, with local controls present for debugging purposes only, in line with Zero Trust principles (grant only the absolutely necessary access or permissions).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 02 May 2024 13:00:00 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/networking-blog/deployment-considerations-for-windows-ztdns-client/ba-p/4113372</guid>
      <dc:creator>tojens</dc:creator>
      <dc:date>2024-05-02T13:00:00Z</dc:date>
    </item>
    <item>
      <title>Windows DNS Client Survey</title>
      <link>https://techcommunity.microsoft.com/t5/networking-blog/windows-dns-client-survey/ba-p/4122947</link>
      <description>&lt;P&gt;In the past few years, new standards have emerged in the DNS space, but we understand migrating a core component like DNS to adopt new standards can be difficult and challenging. As we prioritize future Windows work, we would like to know more about what customers like you are using to support your own DNS deployments. We have published the survey below to ask you a few questions that will contribute to that exercise.&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://forms.office.com/Pages/ResponsePage.aspx?id=v4j5cvGGr0GRqy180BHbR4B7HE5FyodCs6vQbHYa_2ZURVZQNTJQR1dPR1hLTDhJUFE1UEhYWVdJUy4u" target="_self"&gt;Link to the survey&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;The survey is fairly short and anonymous (though we left a field for sharing your contact information if you would be okay with direct follow up). Thank you in advance for your responses; your experiences will help us focus on what you find most valuable in our future work.&lt;/P&gt;</description>
      <pubDate>Thu, 25 Apr 2024 13:00:00 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/networking-blog/windows-dns-client-survey/ba-p/4122947</guid>
      <dc:creator>AditiPatange</dc:creator>
      <dc:date>2024-04-25T13:00:00Z</dc:date>
    </item>
    <item>
      <title>Three Reasons Why You Should Not Use iPerf3 on Windows</title>
      <link>https://techcommunity.microsoft.com/t5/networking-blog/three-reasons-why-you-should-not-use-iperf3-on-windows/ba-p/4117876</link>
      <description>&lt;P&gt;James Kehr here with the Microsoft Commercial Support – Windows Networking team. This article will explain why you should not use iPerf3 on Windows for synthetic network benchmarking and testing.&amp;nbsp; Followed by a brief explanation of why you should use ntttcp and ctsTraffic instead.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;UPDATE (22 April 2024): Various update tags were made throughout the article based on feedback in the comments.&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;H1&gt;Reason 1 – ESnet Does Not Support Windows&lt;/H1&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://software.es.net/iperf/" target="_blank" rel="noopener"&gt;iPerf3&lt;/A&gt; is owned and maintained by an organization called ESnet (Energy Sciences Network). They do not officially support nor recommend that iPerf3 be used on Windows. Their recommendation is to use iPerf2. More on the Microsoft recommendation later.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here are some direct quotes from the official &lt;A href="https://software.es.net/iperf/faq.html" target="_blank" rel="noopener"&gt;ESnet iPerf3 FAQ&lt;/A&gt;, retrieved on 18 April 2024.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;EM&gt;&lt;STRONG&gt;I’m trying to use iperf3 on Windows, but having trouble. What should I do?&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;EM&gt;iperf3 is not officially supported on Windows, but iperf2 is. We recommend you use iperf2.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;UPDATE (22 April 2024): Please read the &lt;A href="https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fnetworking-blog%2Fthree-reasons-why-you-should-not-use-iperf3-on-windows%2Fbc-p%2F4119600%2Fhighlight%2Ftrue%23M633&amp;amp;data=05%7C02%7CJames.Kehr%40microsoft.com%7C27c73f372e86443d986208dc62ecea72%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638494016911846998%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&amp;amp;sdata=mXIpLUx6lxFC8R%2FMoMHfQM7aeNsscyXRkFLzIiQqWUw%3D&amp;amp;reserved=0" target="_self"&gt;comment&lt;/A&gt;(s) from&amp;nbsp;&lt;a href="javascript:void(0)" data-lia-user-mentions="" data-lia-user-uid="2431963" data-lia-user-login="rjmcmahon" class="lia-mention lia-mention-user"&gt;rjmcmahon&lt;/a&gt;&amp;nbsp;for details about iPerf2 vs iPerf3.&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;And from the ESnet “&lt;A href="https://software.es.net/iperf/obtaining.html" target="_blank" rel="noopener"&gt;Obtaining iPerf3&lt;/A&gt;” article, retrieved on 18 April 2024.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;EM&gt;Primary development for iperf3 takes place on CentOS 7 Linux, FreeBSD 11, and macOS 10.12. At this time, these are the only officially supported platforms…&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Microsoft does not recommend using iPerf3 for a different reason.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H1&gt;Reason 2 – iPerf3 is Emulated on Windows&lt;/H1&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;iPerf3 does not make Windows native API calls. It only knows how to make Linux/POSIX calls.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The iPerf3 community uses Cygwin as an emulation layer to get iPerf3 working on Windows. You can read more about Cygwin in their &lt;A href="https://www.cygwin.com/faq.html" target="_blank" rel="noopener"&gt;FAQ&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;The iPerf3 calls are sent to Cygwin, which translates them to Windows APIs calls. Only then does the Windows network stack come into play. The iPerf3 on Windows maintainers do an excellent job of making it all work together, but, ultimately, there are potential issues with this approach.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Not all the iPerf3 features will work on Windows. The basic options work well, but advanced capabilities needed for certain network testing may not be available on Windows or may behave in unexpected ways.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Emulation tends to have a performance penalty. The emulation overhead on a latency sensitive operation, such as network testing, can result in lower than expected throughput.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Finally, iPerf3 uses uncommon Windows Socket (winsock) options versus native Windows applications. For generic throughput testing this is fine. For application testing the uncommon socket options will not mimic real-world Windows-native application behavior.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H1&gt;Reason 3 – You Are Probably Using an Old Version of iPerf3.&lt;/H1&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;UPDATE (22 April 2024): iperf.fr no longer serves the old Windows iPerf3 binaries. The site now links to other sites which have actively maintained iPerf3 for Windows binaries. A big thank you to&amp;nbsp;&lt;a href="javascript:void(0)" data-lia-user-mentions="" data-lia-user-uid="598981" data-lia-user-login="Harvester" class="lia-mention lia-mention-user"&gt;Harvester&lt;/a&gt;&amp;nbsp;for pointing this out in comments and to the iperf.fr team for updating their site!&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Go search for “iPerf3 on Windows” on the web. Go ahead, open a tab, and use your search engine of choice. Which I am certain is Bing with Copilot.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What is the top result, and thus the most likely link you will click on? I bet the site was iperf.fr.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The newest version of iPerf3 for Windows on iperf.fr is 3.1.3 from 8 June 2016. That was nearly 8 years ago at the time of writing.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The current version of iPerf3, &lt;A href="https://github.com/esnet/iperf" target="_blank" rel="noopener"&gt;directly from ESnet&lt;/A&gt;, is 3.16. A full 15 versions of missing bug fixes, features, and changes from the version people are most likely to download.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This specific copy of iPerf3, from iperf.fr, includes a version of cygwin1.dll that contains a bug which limits the socket buffer to 1MB. This will cause poor performance on high speed-high latency and high bandwidth networks because iPerf3 will not be capable of putting enough data in-flight to saturate the link, resulting in inaccurate testing.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Where should you look for iPerf3 on Windows?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;From ESnet’s article, “Obtaining iPerf3” they say:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;EM&gt;Windows: iperf3 binaries for Windows (built with&amp;nbsp;&lt;A href="https://www.cygwin.com/" target="_blank" rel="noopener"&gt;Cygwin&lt;/A&gt;) can be found in a variety of locations, including&amp;nbsp;&lt;A href="https://files.budman.pw/" target="_blank" rel="noopener"&gt;https://files.budman.pw/&lt;/A&gt;&amp;nbsp;(&lt;A href="https://www.neowin.net/forum/topic/1234695-iperf/" target="_blank" rel="noopener"&gt;discussion thread&lt;/A&gt;).&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H1&gt;What Does Microsoft Recommend&lt;/H1&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Microsoft maintains two synthetic network benchmarking tools: ntttcp (Windows NT Test TCP) and ctsTraffic. The newest version of &lt;A href="https://github.com/microsoft/ntttcp" target="_blank" rel="noopener"&gt;ntttcp is maintained on GitHub&lt;/A&gt;. This is a Windows native tool which utilizes Windows networking in the same way a native Windows application does.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But what about Linux?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;There is a Linux version of ntttcp, too! Details can be found on the &lt;A href="https://github.com/microsoft/ntttcp-for-linux" target="_blank" rel="noopener"&gt;ntttcp for Linux GitHub&lt;/A&gt; repo. This is a separate codebase built for Linux that is compatible with ntttcp for Windows, but it is not identical to the Windows counterpart.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Ntttcp allows you to perform API native synthetic network tests between Windows and Windows, Linux and Linux, and between Windows and Linux.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://github.com/microsoft/ctsTraffic" target="_blank" rel="noopener"&gt;ctsTraffic&lt;/A&gt; is Windows-to-Windows only. Where ntttcp is more iPerf3-like, ctsTraffic has a different set of options and goals. ctsTraffic focuses on end-to-end goodput scenarios, where ntttcp and iPerf3 focus more on isolating network stack throughput.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;How do you use ntttcp?&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The Azure team has written a great article about basic ntttcp functionality for Windows and Linux. I do not believe in reinventing the wheel, so I will simply link you to the article.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/virtual-network/virtual-network-bandwidth-testing?tabs=windows" target="_blank" rel="noopener"&gt;https://learn.microsoft.com/en-us/azure/virtual-network/virtual-network-bandwidth-testing?tabs=windows&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;There is a known interoperability limitation when testing between Windows and Linux. Details can be found in this &lt;A href="https://github.com/microsoft/ntttcp-for-linux/wiki/How-to-interop-with-Windows-NTttcp%3F" target="_blank" rel="noopener"&gt;ntttcp for Linux wiki article on GitHub&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H1&gt;Testing&lt;/H1&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I built a lab while preparing this article using two Windows Server 2022 VMs. The tests used the newest versions of iPerf3 (3.16), ntttcp (5.39), and ctsTraffic (2.0.3.3).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The default iPerf3 parameters are the most common configuration I see among Microsoft support customers. So, I am tuning ntttcp and ctsTraffic to better match iPerf3’s default single connection, 128KB buffer length behavior. While this is not a perfect comparison, this does make it a better comparison.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Single stream tests are used for targeted analyses since many applications do not perform multi-threaded transfers. Bandwidth and maximum throughput testing should be multi-threaded with large buffers, but that is a topic for a different day.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Don’t forget to allow the network traffic on the Windows Defender Firewall if you wish to run your own tests.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;iPerf3&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;iPerf3 server command:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="bash"&gt;iperf3 -s&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;iPerf3 client command:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="bash"&gt;iperf3 -c &amp;lt;IP&amp;gt; -t 60&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The average across multiple tests was about 7.5 Gbps. The top result was 8.5 Gbps, with a low of 5.26 Gbps.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;ntttcp&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Ntttcp server command:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="bash"&gt;ntttcp -r -m 1,*,&amp;lt;IP&amp;gt; -t 60&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Ntttcp client command:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="bash"&gt;ntttcp -s -m 1,*,&amp;lt;IP&amp;gt; -l 128K -t 60&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Ntttcp averaged about 12.75 Gbps across multiple tests. The top test averaged 13.5 Gbps, with a low test of 12.5 Gbps.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Ntttcp does something called pre-posting receives, which is unique to this tool. This reduces application wait time as part of network stack isolation, allowing for quicker than normal application responses to socket messages.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;-r&lt;/EM&gt; is receiver, and &lt;EM&gt;-s&lt;/EM&gt; is sender.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;-m&lt;/EM&gt; is a mapping of values that are: &amp;lt;num threads&amp;gt;, &amp;lt;CPU affinity&amp;gt;, &amp;lt;Target IP&amp;gt;. In this test we use a single thread, no CPU affinity (*), and both -r and -s side uses the target IP address as the final value.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;-t&lt;/EM&gt; is test time, in seconds.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;-l&lt;/EM&gt; sets the buffer length. You can use K|M|G with ntttcp as shorthand for kilo-, mega-, and giga-bytes.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;ctsTraffic&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;These commands are run in PowerShell to make reading values easier.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ctsTraffic server command:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="powershell"&gt;.\ctstraffic.exe -listen:* -Buffer:"$(128KB)" -Transfer:"$(1TB)" -ServerExitLimit:1 -consoleverbosity:1 -TimeLimit:60000&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ctsTraffic client command:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="powershell"&gt;.\ctstraffic.exe -target:&amp;lt;IP&amp;gt; -Connections:1 -Buffer:"$(128KB)" -Transfer:"$(1TB)" -Iterations:1 -consoleverbosity:1 -TimeLimit:60000&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The result, about 9.2 Gbps average. It is a little faster and far more consistent than iPerf3, but not quite as fast as ntttcp.&amp;nbsp;The two primary reasons why ctsTraffic is slower are data integrity checks and the use of the recommended overlapped IO model. This means ctsTraffic uses a single pending receive versus pre-posting receives like ntttcp.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;-Buffer&lt;/EM&gt; is the buffer length (ntttp: -l).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;-Transfer&lt;/EM&gt; is the amount of data to send per iteration.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;-Iterations/-ServerExitLimit&lt;/EM&gt; is the number of times a data sets will be transferred.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;-Connections&lt;/EM&gt; is the number of concurrent TCP streams that will be used.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;-TimeLimit&lt;/EM&gt; is the number of milliseconds to run the test. The test stops even if the iteration transfer has not been completed when the time limit is reached.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you for reading and I hope this helps improve your understanding of synthetic network benchmarking on Windows!&lt;/P&gt;</description>
      <pubDate>Mon, 22 Apr 2024 17:44:10 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/networking-blog/three-reasons-why-you-should-not-use-iperf3-on-windows/ba-p/4117876</guid>
      <dc:creator>JamesKehr</dc:creator>
      <dc:date>2024-04-22T17:44:10Z</dc:date>
    </item>
    <item>
      <title>Windows 11 Plans to Expand CLAT Support</title>
      <link>https://techcommunity.microsoft.com/t5/networking-blog/windows-11-plans-to-expand-clat-support/ba-p/4078173</link>
      <description>&lt;DIV&gt;
&lt;P class="x_x_x_x_MsoNormal"&gt;Thank you everyone who responded to our recent IPv6 migration survey! We want you to know that we are committed to improving your IPv6 journey and these data are helpful in shaping our future plans.&lt;/P&gt;
&lt;/DIV&gt;
&lt;DIV&gt;
&lt;P class="x_x_x_x_MsoNormal" aria-hidden="true"&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;DIV&gt;
&lt;P class="x_x_x_x_MsoNormal"&gt;To that end, just a quick update: we are committing to expanding our&amp;nbsp;&lt;SPAN class="marks78ruy3be" data-markjs="true" data-ogac="" data-ogab="" data-ogsc="" data-ogsb=""&gt;CLAT&lt;/SPAN&gt;&amp;nbsp;support to include non-cellular network interfaces in a future version of Windows 11. This will include discovery using&amp;nbsp;the relevant parts of RFC 7050 (ipv4only.arpa DNS query), RFC 8781 (PREF64 option in RAs), and RFC 8925 (DHCP Option 108) standards.&amp;nbsp;Once we do have functionality available for you to test in Windows Insiders builds, we will let you know.&lt;/P&gt;
&lt;/DIV&gt;
&lt;DIV&gt;
&lt;P class="x_x_x_x_MsoNormal" aria-hidden="true"&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;DIV&gt;
&lt;P class="x_x_x_x_MsoNormal"&gt;We are looking forward to continuing to provide support for your platform networking needs!&lt;/P&gt;
&lt;/DIV&gt;</description>
      <pubDate>Thu, 07 Mar 2024 15:00:00 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/networking-blog/windows-11-plans-to-expand-clat-support/ba-p/4078173</guid>
      <dc:creator>tojens</dc:creator>
      <dc:date>2024-03-07T15:00:00Z</dc:date>
    </item>
  </channel>
</rss>

