<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>Windows Server Essentials and Small Business Server articles</title>
    <link>https://techcommunity.microsoft.com/t5/windows-server-essentials-and/bg-p/SBS</link>
    <description>Windows Server Essentials and Small Business Server articles</description>
    <pubDate>Sat, 25 Apr 2026 10:57:04 GMT</pubDate>
    <dc:creator>SBS</dc:creator>
    <dc:date>2026-04-25T10:57:04Z</dc:date>
    <item>
      <title>30 years of Windows Server</title>
      <link>https://techcommunity.microsoft.com/t5/windows-server-essentials-and/30-years-of-windows-server/ba-p/3884810</link>
      <description>&lt;H1&gt;Happy 30&lt;SUP&gt;th&lt;/SUP&gt; Birthday Windows Server!&lt;/H1&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Thanks in advance for embarking with me on this journey down memory lane. In an effort to keep this blog (relatively) succinct, I have included a generous amount of links throughout in case you’re interested. -Jeff&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Greetings everyone! I am delighted to bring to your attention to a memorable event in computing. On July 27th, 1993, Microsoft introduced the inaugural member of the esteemed Windows NT family - Windows NT Server 3.1. This remarkable release, equipped with &lt;A href="https://en.wikipedia.org/wiki/32-bit_computing" target="_blank" rel="noopener"&gt;32-bit architecture&lt;/A&gt; and boasting processor independence, ushered in a new era of computing capabilities. Among its prominent features were &lt;A href="https://en.wikipedia.org/wiki/Preemption_(computing)#PREEMPTIVE" target="_blank" rel="noopener"&gt;preemptive multitasking&lt;/A&gt;, &lt;A href="https://en.wikipedia.org/wiki/Multiprocessing" target="_blank" rel="noopener"&gt;multiprocessing&lt;/A&gt;, and &lt;A href="https://en.wikipedia.org/wiki/Multi-user_software" target="_blank" rel="noopener"&gt;multiuser&lt;/A&gt; support, which collectively elevated the standard of operating systems. Windows NT Server 3.1 laid the cornerstone for a multitude of subsequent Windows and Windows Server iterations.&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Numerous volumes have been dedicated to exploring the intricacies of Windows NT 3.1 and its subsequent versions. However, I wish to focus on a select few areas that merit special recognition: Portability, Reliability, and Personality.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Portability&lt;/STRONG&gt; stands as a testament to the visionary design of Windows NT. Three decades ago, the processor landscape vastly differed from the present scenario. The ambitious objective was to develop Windows NT in a manner that facilitated seamless migration between diverse hardware architectures with minimal adjustments. This feat was achieved through the implementation of a unified code base, while processor-dependent code was segregated within a custom &lt;A href="https://en.wikipedia.org/wiki/Hardware_abstraction" target="_blank" rel="noopener"&gt;Hardware Abstraction Layer (HAL)&lt;/A&gt; tailored for each specific platform.&lt;/P&gt;
&lt;P&gt;Fun fact: Windows NT's initial focus was on the &lt;A href="https://en.wikipedia.org/wiki/Intel_i860" target="_blank" rel="noopener"&gt;Intel i860&lt;/A&gt; processor, but it subsequently evolved to encompass the &lt;A href="https://en.wikipedia.org/wiki/X86" target="_blank" rel="noopener"&gt;Intel x86&lt;/A&gt;, &lt;A href="https://en.wikipedia.org/wiki/MIPS_architecture" target="_blank" rel="noopener"&gt;MIPS (R4000/R4400)&lt;/A&gt;, and &lt;A href="https://en.wikipedia.org/wiki/DEC_Alpha" target="_blank" rel="noopener"&gt;Digital (DEC) Alpha&lt;/A&gt; architectures. Remarkably, this support extended further to include &lt;A href="https://en.wikipedia.org/wiki/PowerPC" target="_blank" rel="noopener"&gt;PowerPC&lt;/A&gt;, &lt;A href="https://en.wikipedia.org/wiki/Itanium" target="_blank" rel="noopener"&gt;Itanium&lt;/A&gt;, and &lt;A href="https://en.wikipedia.org/wiki/ARM_architecture_family" target="_blank" rel="noopener"&gt;ARM&lt;/A&gt; architectures. Despite fluctuations in the number of hardware architectures over the ensuing decades, the unwavering commitment to portability endures to this day with the incorporation of the Arm architecture. Here are a couple of informative links:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/windows/arm/overview" target="_blank" rel="noopener"&gt;Windows (Client) on Arm&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://azure.microsoft.com/en-us/blog/azure-virtual-machines-with-ampere-altra-arm-based-processors-generally-available/" target="_blank" rel="noopener"&gt;Azure VMs with Ampere Altra Arm&lt;/A&gt;.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Reliability and Robustness&lt;/STRONG&gt;: Today, it is often overlooked that a malfunctioning application may encounter errors or unexpected termination, while the unaffected operation of other apps and the operating system is taken for granted. However, this was not the norm three decades ago. It was a prevalent occurrence for misbehaving applications to not only crash themselves but also impact other running applications and even the entire operating system, regardless of whether it was &lt;A href="https://en.wikipedia.org/wiki/DOS" target="_blank" rel="noopener"&gt;DOS&lt;/A&gt;, &lt;A href="https://en.wikipedia.org/wiki/OS/2" target="_blank" rel="noopener"&gt;OS/2&lt;/A&gt;, or Macintosh.&lt;/P&gt;
&lt;P&gt;Windows NT, on the other hand, was underpinned by a fundamental architectural principle: the operating system must actively shield itself from both internal and external failures, be they inadvertent or deliberate. Additionally, it must demonstrate consistent and predictable responses to software and hardware faults. This goal was achieved through the adoption of a layered design, incorporating distinct &lt;A href="https://en.wikipedia.org/wiki/Protection_ring#Supervisor_mode" target="_blank" rel="noopener"&gt;user and kernel modes&lt;/A&gt;, along with the implementation of &lt;A href="https://en.wikipedia.org/wiki/Memory_protection" target="_blank" rel="noopener"&gt;protected memory&lt;/A&gt;, among other crucial elements. By implementing such robust design elements, Windows NT effectively mitigated the risks posed by misbehaving software, ensuring that failures were contained and isolated, safeguarding the stability and functionality of both the operating system and other concurrently running applications.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Personality&lt;/STRONG&gt;: During the development of Windows NT 3.1, graphical user interfaces were still in their formative stages. The visionary approach developed by David Cutler and team was to craft an environment that would demonstrate remarkable flexibility by accommodating multiple user interfaces and supporting applications designed for a diverse range of operating systems. This ambitious endeavor encompassed compatibility with prevailing systems such as DOS, Windows, and OS/2, while also anticipating seamless integration with future platforms.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The achievement of broad software compatibility was realized through the incorporation of several API "personalities," each catering to specific application environments. Notably, Windows NT extended support for the &lt;A href="https://learn.microsoft.com/en-us/windows/win32/apiindex/windows-api-list" target="_blank" rel="noopener"&gt;Windows API&lt;/A&gt;, &lt;A href="https://en.wikipedia.org/wiki/POSIX" target="_blank" rel="noopener"&gt;POSIX&lt;/A&gt;, and &lt;A href="https://en.wikipedia.org/wiki/OS/2" target="_blank" rel="noopener"&gt;OS/2&lt;/A&gt; APIs, the latter two being progressively phased out beginning with Windows XP. Moreover, the integration of a &lt;A href="https://en.wikipedia.org/wiki/Virtual_DOS_machine" target="_blank" rel="noopener"&gt;DOS Virtual Machine&lt;/A&gt; facilitated partial MS-DOS compatibility, although this feature saw its eventual discontinuation in 64-bit Windows implementations.&lt;/P&gt;
&lt;P&gt;Fast forward to the present day, this exceptional adaptability is most prominently showcased in two key features: the &lt;A href="https://learn.microsoft.com/en-us/windows/wsl/install-on-server" target="_blank" rel="noopener"&gt;Windows Subsystem for Linux (WSL)&lt;/A&gt; and the &lt;A href="https://learn.microsoft.com/en-us/windows/android/wsa/" target="_blank" rel="noopener"&gt;Windows Subsystem for Android&lt;/A&gt;. These contemporary components exemplify the continued commitment to versatility, enabling seamless coexistence between disparate environments, and fostering a seamless user experience.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Thirty Years of Innovation&lt;/H2&gt;
&lt;P&gt;Throughout the course of the past three decades, it is noteworthy to observe the transformation undergone by Windows Server, driven explicitly by the ever-evolving demands of its users and the industry. This journey reveals distinct eras of innovation that have indelibly shaped the product's trajectory.&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;Server for the Masses&lt;/H3&gt;
&lt;P&gt;Windows NT 3.x established a highly successful bedrock, and the fusion of its robust engine with the user-friendly Windows 9x graphical user interface (GUI) proved instrumental in propelling Windows NT 4 to new heights. This pivotal development empowered organizations to leverage cost-effective commodity hardware for essential functions like file and print management, as well as for deploying company-wide applications. The significance of this milestone cannot be overstated. In the words of esteemed Microsoft Technical Fellow, Jeffrey Snover:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;&lt;EM&gt;The thing that made Windows so successful was matching that kernel with a great desktop experience and then running it on PC class hardware. That combo now meant that what used to be -- servers that were run by the high priests and princes of the industry -- now anybody could buy their own server and deploy and run it. That really was the magic.&lt;/EM&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;Y2K and Enterprise&lt;/H3&gt;
&lt;P&gt;In the subsequent release, the decision was made to shed the NT moniker, bestowing upon the product a title befitting its significance: Windows 2000 Server. As the Y2K commotion unfurled, we embarked upon an era defined by Enterprise-grade capabilities, introducing a new standard of reliability, scalability, and accessibility, substantiated by an impressive five nines. Windows Server 2000 made its indelible mark with the introduction of pioneering features such as &lt;A href="https://learn.microsoft.com/en-us/windows-server/identity/ad-ds/get-started/virtual-dc/active-directory-domain-services-overview" target="_blank" rel="noopener"&gt;Active Directory&lt;/A&gt;, &lt;A href="https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/hh831791(v=ws.11)" target="_blank" rel="noopener"&gt;Group Policy&lt;/A&gt;, enterprise-wide security policies, and centralized groups and permissions. These innovations elevated administrative efficiency and bolstered security measures across organizations.&lt;/P&gt;
&lt;P&gt;Building upon this strong foundation, three years later, Windows Server 2003 made its debut, accompanied by the heralding of the &lt;A href="https://learn.microsoft.com/en-us/dotnet/framework/get-started/overview" target="_blank" rel="noopener"&gt;.NET framework&lt;/A&gt;. This OS release unleashed a prolific wave of applications, dynamically crafted by developers utilizing cutting-edge technologies like &lt;A href="https://learn.microsoft.com/en-us/aspnet/overview" target="_blank" rel="noopener"&gt;ASP.NET&lt;/A&gt;, &lt;A href="https://learn.microsoft.com/en-us/dotnet/visual-basic/" target="_blank" rel="noopener"&gt;VB.NET&lt;/A&gt;, and &lt;A href="https://learn.microsoft.com/en-us/dotnet/csharp/tour-of-csharp/tutorials/" target="_blank" rel="noopener"&gt;C#&lt;/A&gt;. The outcome was a flourishing ecosystem of applications designed to cater to diverse user needs and preferences.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;Datacenter&lt;/H3&gt;
&lt;P&gt;Windows Server 2008 marked a pivotal juncture, inaugurating the datacenter era with a host of groundbreaking advancements. This release heralded the integration of virtualization capabilities into the operating system through &lt;A href="https://learn.microsoft.com/en-us/virtualization/hyper-v-on-windows/reference/hyper-v-architecture" target="_blank" rel="noopener"&gt;Hyper-V&lt;/A&gt;, democratizing the technology and empowering enterprises with virtualized environments. Additionally, the introduction of the &lt;A href="https://learn.microsoft.com/en-us/windows-server/administration/server-core/what-is-server-core" target="_blank" rel="noopener"&gt;Server Core&lt;/A&gt; installation option facilitated streamlined and efficient deployments. Furthermore, Windows Server 2008 represented the culmination of the 32-bit versions of Windows Server, paving the way for subsequent releases, all of which are robust 64-bit operating systems, thoughtfully designed to maintain &lt;A href="https://learn.microsoft.com/en-us/windows/win32/winprog64/wow64-implementation-details" target="_blank" rel="noopener"&gt;compatibility with 32-bit applications&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The momentum of datacenter innovation surged forward with the subsequent releases, Windows Server 2012 and Windows Server 2012 R2. These iterations showcased substantial enhancements in performance, scalability, and automation, ushering in a new era of datacenter efficiency and productivity. The evolution of &lt;A href="https://learn.microsoft.com/en-us/powershell/" target="_blank" rel="noopener"&gt;PowerShell&lt;/A&gt;, rapidly maturing, witnessed the addition of thousands of commandlets, bolstering administrative capabilities and empowering users with unparalleled control over system management. Moreover, the introduction of &lt;A href="https://learn.microsoft.com/en-us/windows-server/storage/file-server/file-server-smb-overview" target="_blank" rel="noopener"&gt;SMB3&lt;/A&gt; brought forth a comprehensive suite of capabilities, encompassing &lt;A href="https://learn.microsoft.com/en-us/windows-server/storage/file-server/smb-direct" target="_blank" rel="noopener"&gt;SMB Direct, SMB Multichannel&lt;/A&gt;, Transparent Failover, and end-to-end encryption, redefining network file sharing and data access. Hyper-V, in particular, underwent an impressive transformation, incorporating a plethora of features, such as VM replication, &lt;A href="https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/dn282285(v=ws.11)" target="_blank" rel="noopener"&gt;Generation 2 VMs&lt;/A&gt;, massive scalability and performance improvements, and supporting an array of Live Migration methods. Notably, Hyper-V achieved a pioneering feat by being the first hypervisor to deliver Live Migration through a network connection alone, thereby eliminating the dependency on shared storage.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;Distributed, Hybrid Cloud&lt;/H3&gt;
&lt;P&gt;As we entered the era of cloud computing, a transformative inflection point emerged with the ascendance of cloud applications and containers, reflected in the swift adoption of the &lt;A href="https://learn.microsoft.com/en-us/azure/aks/intro-kubernetes" target="_blank" rel="noopener"&gt;Azure Kubernetes Service&lt;/A&gt;—the most rapidly growing Azure service at that time.&lt;/P&gt;
&lt;P&gt;Windows Server 2016, unveiled in October 2015, represented a landmark release, as it marked the introduction of &lt;A href="https://learn.microsoft.com/en-us/virtualization/windowscontainers/about/" target="_blank" rel="noopener"&gt;Windows Containers&lt;/A&gt; support, offering both &lt;A href="https://learn.microsoft.com/en-us/virtualization/windowscontainers/manage-containers/hyperv-container" target="_blank" rel="noopener"&gt;process and Hyper-V isolation&lt;/A&gt;. This significant milestone enabled containerization of applications, promoting portability and scalability. Alongside this groundbreaking feature, &lt;A href="https://learn.microsoft.com/en-us/windows-server/get-started/whats-new-in-windows-server-2016" target="_blank" rel="noopener"&gt;Windows Server 2016 boasted a myriad of additional enhancements, encompassing DNS Policies, Defender, SMB3.1, Storage QoS, Storage Replica, Storage Spaces Direct, Rolling Cluster upgrades, Hyper-V production checkpoints, Network Virtualization, Web Application Proxy, IIS 10.0, PowerShell 5, Windows Server Containers, and Nano Server&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;Windows Server 2019 followed suit in November 2018, witnessing a rapid acceleration in engineering investments to further enhance &lt;A href="https://learn.microsoft.com/en-us/windows-server/get-started/whats-new-in-windows-server-2019" target="_blank" rel="noopener"&gt;Windows Containers, WSL (Windows Subsystem for Linux), Kubernetes support, Storage Migration Services, System Insights, Shielded Virtual Machines, Windows Admin Center, OpenSSH, and a host of other features&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Now, with the latest release—Windows Server 2022—we are presented with an impressive array of new capabilities. Among its standout features are &lt;A href="https://learn.microsoft.com/en-us/windows-server/get-started/whats-new-in-windows-server-2022" target="_blank" rel="noopener"&gt;Secured-core server, new SMB encryption and compression mechanisms, and Storage Migration Service improvements. Additionally, the release delivers a series of enhancements to Windows containers, including an extended container support duration of five years, a highly requested feature from users&lt;/A&gt;. Windows Server 2022 also introduces a new edition, Windows Server 2022 Datacenter: Azure Edition. This edition builds upon the extensive features of the Datacenter edition, introducing additional enhancements such as &lt;A href="https://techcommunity.microsoft.com/t5/windows-server-news-and-best/hotpatching-is-now-available-for-windows-server-vms-on-azure/ba-p/3875003" target="_blank" rel="noopener"&gt;hotpatching&lt;/A&gt;, &lt;A href="https://learn.microsoft.com/en-us/windows-server/storage/file-server/smb-over-quic" target="_blank" rel="noopener"&gt;SMB over QUIC&lt;/A&gt;, &lt;A href="https://techcommunity.microsoft.com/t5/windows-server-news-and-best/ignite-2022-what-s-new-in-windows-server-azure-edition/ba-p/3636862" target="_blank" rel="noopener"&gt;Storage Replica Compression&lt;/A&gt;, and &lt;A href="https://learn.microsoft.com/en-us/windows-server/manage/windows-admin-center/azure/azure-extended-network" target="_blank" rel="noopener"&gt;Azure Extended Networking&lt;/A&gt;. The Azure Edition further reinforces Windows Server's seamless integration with the Azure ecosystem, fostering a cohesive and dynamic cloud computing experience.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;A Profound Thank You&lt;/H2&gt;
&lt;P&gt;As you can see, it’s been quite a journey and we’re hard at work on the next release. A huge thank you to all of you from the Windows/Windows Server team. We appreciate your support and input to help us deliver the next release.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Jeff Woolsey, Principal PM Manager&lt;/P&gt;
&lt;P&gt;P.S. Orin Thomas and I took this opportunity to have &lt;A href="https://youtu.be/cLpOZ-zoZuA" target="_self"&gt;a chat about this historic milestone.&lt;/A&gt; You can watch below.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://youtu.be/cLpOZ-zoZuA" target="_self"&gt;&lt;img /&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 27 Jul 2023 15:10:00 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-server-essentials-and/30-years-of-windows-server/ba-p/3884810</guid>
      <dc:creator>Jeff-Woolsey</dc:creator>
      <dc:date>2023-07-27T15:10:00Z</dc:date>
    </item>
    <item>
      <title>Updated information about Windows Small Business Server 2011 Product Support Lifecycle</title>
      <link>https://techcommunity.microsoft.com/t5/windows-server-essentials-and/updated-information-about-windows-small-business-server-2011/ba-p/847707</link>
      <description>&lt;P&gt;This blogs post underlines the Product Support Lifecycle of Windows Small Business Server 2011 and its individual components. The support lifecycle for Windows Small Business Server 2011 is determined by its individual component’s support lifecycles.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are publishing this information as Windows SBS 2011 integrated components will reach its end of support soon. Here are the individual products included with Windows Small Business Server 2011 (Standard/Premium Add-on) and their support lifecycle timelines.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The Extended Support End Date for the following products are as follows:&lt;/P&gt;&lt;DIV class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&lt;img /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For more details please browse to&amp;nbsp;&lt;A href="http://support.microsoft.com/lifecycle/search/" target="_blank" rel="noopener"&gt;http://support.microsoft.com/lifecycle/search/&lt;/A&gt;&amp;nbsp;and search for individual products.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;End of support refers to the date when Microsoft no longer provides automatic fixes, updates, or online technical assistance. This is the time to make sure you have the latest available update or service pack installed. Without Microsoft support, you will no longer receive security updates that can help protect your PC from harmful viruses, spyware, and other malicious software that can steal your personal information.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Microsoft is committed to provide support to customers facing issues when migrating to supported versions.&lt;/P&gt;</description>
      <pubDate>Mon, 14 Sep 2020 17:25:20 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-server-essentials-and/updated-information-about-windows-small-business-server-2011/ba-p/847707</guid>
      <dc:creator>sabiswas</dc:creator>
      <dc:date>2020-09-14T17:25:20Z</dc:date>
    </item>
    <item>
      <title>A fix for Virtual Private Network issue in Windows Server 2016 Essentials has been released</title>
      <link>https://techcommunity.microsoft.com/t5/windows-server-essentials-and/a-fix-for-virtual-private-network-issue-in-windows-server-2016/ba-p/847567</link>
      <description>&lt;P&gt;There is a known issue with Virtual Private Network failure every 24-48 hours in Windows Server 2016 Essentials due to domain certificate auto-renewal. We are pleased to share that the fix for this issue has been included with the following Cumulative Update for Windows Server 2016:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://support.microsoft.com/en-us/help/4512495" target="_blank" rel="noopener"&gt;https://support.microsoft.com/en-us/help/4512495&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The issue is described here in brief:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In Windows Server 2016 Essentials SKU or Essentials role, when the domain name setup is done using a Windows Live account and the Virtual Private Network is configured by running the Anywhere Access wizard, we may experience issues with SSTP based Virtual Private Network.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;VPN may work for a day or two and then fails with the following error:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;img /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The issue occurs due to a failure while enumerating the Subject Alternative Name (SAN) extension in the certificate, parsing the DNS entries and matching it with the domain name. This failure results in a certificate auto-renewal which causes a certificate hash mismatch in the registry. When a remote client attempts to establish an SSTP VPN connection, it fails to do it because of this certificate hash mismatch.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Resolution: The fix for this issue has been included with the Cumulative Update (August) for Windows Server 2016. You can install it via Windows Update or from the following link:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://support.microsoft.com/en-us/help/4512495" target="_blank" rel="noopener"&gt;https://support.microsoft.com/en-us/help/4512495&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 10 Sep 2019 20:52:45 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-server-essentials-and/a-fix-for-virtual-private-network-issue-in-windows-server-2016/ba-p/847567</guid>
      <dc:creator>sabiswas</dc:creator>
      <dc:date>2019-09-10T20:52:45Z</dc:date>
    </item>
    <item>
      <title>Windows 10 1903 feature update breaks the client connector</title>
      <link>https://techcommunity.microsoft.com/t5/windows-server-essentials-and/windows-10-1903-feature-update-breaks-the-client-connector/ba-p/726834</link>
      <description>&lt;P&gt;This article describes the issue – Windows 10 1903 feature upgrade removes the already installed client connector and breaks the Essentials features such as client backup, Remote Web Access, LaunchPad App etc. The issue only applies to Windows 10 client connected to Windows Server 2016 Essentials, Windows Server 2012 R2 Essentials, Windows Server 2012 Essentials and Windows Small Business Server 2011 Essentials. This article also covers related topic such as the current workaround.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you have a Windows 10 machine connected to a Windows Server 2016 Essentials, Windows Server 2012 R2 Essentials, Windows Server 2012 Essentials or Windows Small Business Server 2011 Essentials and you apply the Windows 10 1903 feature update, all the following features on the client computer stop to work:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Client Backup&lt;/LI&gt;&lt;LI&gt;LaunchPad App&lt;/LI&gt;&lt;LI&gt;Remote Web Access&lt;/LI&gt;&lt;LI&gt;Essentials related services will be removed&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;This issue was described in the past in&amp;nbsp;&lt;A href="https://techcommunity.microsoft.com/t5/Windows-Server-Essentials-and/Windows-10-Feature-Upgrade-breaks-client-connector-for-Window/ba-p/399036" target="_self"&gt;this&lt;/A&gt; blog.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Current Workaround&lt;/STRONG&gt;: The user needs to manually remove the "Client Connector for Windows Server Essentials" and reinstall it via the connect website on the affected Windows 10 client machine.&lt;/P&gt;</description>
      <pubDate>Thu, 27 Jun 2019 23:32:32 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-server-essentials-and/windows-10-1903-feature-update-breaks-the-client-connector/ba-p/726834</guid>
      <dc:creator>sabiswas</dc:creator>
      <dc:date>2019-06-27T23:32:32Z</dc:date>
    </item>
    <item>
      <title>Office 365 Integration fails with "Cannot connect to Microsoft online services" in Windows Server 2012 R2 Essentials</title>
      <link>https://techcommunity.microsoft.com/t5/windows-server-essentials-and/office-365-integration-fails-with-quot-cannot-connect-to/ba-p/399094</link>
      <description>&lt;HTML&gt;
 &lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;
  &lt;STRONG&gt;
   First published on TechNet on Mar 14, 2018
  &lt;/STRONG&gt;
  &lt;BR /&gt;
  We have found a new issue with Windows Server Essentials Dashboard integration wizard with Microsoft Office 365. The Integrate with Microsoft Office 365 wizard may fail to complete with the following error:
  &lt;BR /&gt;
  &lt;BR /&gt;
  &lt;IMG src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/104658iCDAC17E2B3E1FC04" /&gt;
  &lt;BR /&gt;
  &lt;BR /&gt;
  In the C:\ProgramData\Microsoft\Windows Server\Logs\
  &lt;STRONG&gt;
   SharedServiceHost-EmailProviderServiceConfig.log,
  &lt;/STRONG&gt;
  we may find the following exception:
  &lt;BR /&gt;
  &lt;BR /&gt;
  &lt;EM&gt;
   BecWebServiceAdapter: Connect to BECWS failed due to known exception : System.ServiceModel.EndpointNotFoundException: There was no endpoint listening at
   &lt;A href="https://bws902-relay.microsoftonline.com/ProvisioningWebservice.svc?Redir=1098557810&amp;amp;Time=636356539931802459" target="_blank"&gt;
    https://bws902-relay.microsoftonline.com/ProvisioningWebservice.svc?Redir=1098557810&amp;amp;Time=636356539931802459
   &lt;/A&gt;
   that could accept the message. This is often caused by an incorrect address or SOAP action. See InnerException, if present, for more details. ---&amp;gt; System.Net.WebException: Unable to connect to the remote server ---&amp;gt; System.Net.Sockets.SocketException: No connection could be made because the target machine actively refused it 157.56.55.77:443
  &lt;/EM&gt;
  &lt;BR /&gt;
  &lt;BR /&gt;
  We can see the provisioning&amp;nbsp;endpoint&amp;nbsp;that the wizard&amp;nbsp;is trying to reach,&amp;nbsp;by running&amp;nbsp;the command:
  &lt;STRONG&gt;
   ipconfig /displaydns
  &lt;/STRONG&gt;
  &lt;BR /&gt;
  &lt;BR /&gt;
  &lt;IMG src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/104659i1A5885592110EEE3" /&gt;
  &lt;BR /&gt;
  &lt;BR /&gt;
  However, when&amp;nbsp;we&amp;nbsp;attempt to browse that URL (provisioning web service) in a browser, it may fail with the following exception:
  &lt;BR /&gt;
  &lt;BR /&gt;
  &lt;IMG src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/104661i4AE1D938CD7558AE" /&gt;
  &lt;BR /&gt;
  &lt;BR /&gt;
  Additionally, when&amp;nbsp;we attempt to do a telnet test to this remote server&amp;nbsp;through the port 443, it fails:
  &lt;BR /&gt;
  &lt;BR /&gt;
  &lt;IMG src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/104663iD6D4379A69C45F8C" /&gt;
  &lt;BR /&gt;
  &lt;BR /&gt;
  The issue occurs&amp;nbsp;due to a web exception when the Bec Web Service API tries to reach out to the&amp;nbsp;remote endpoint for provisioning purpose. The&amp;nbsp;address is written to the following registry key on the server:
  &lt;BR /&gt;
  &lt;BR /&gt;
  HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Server\Productivity\O365Integration\Settings\
  &lt;BR /&gt;
  &lt;BR /&gt;
  Name:
  &lt;STRONG&gt;
   BecEndpointAddress
  &lt;/STRONG&gt;
  &lt;BR /&gt;
  &lt;BR /&gt;
  Type:
  &lt;STRONG&gt;
   String value
  &lt;/STRONG&gt;
  &lt;BR /&gt;
  &lt;BR /&gt;
  &lt;IMG src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/104665i0624D35E50D4055C" /&gt;
  &lt;BR /&gt;
  &lt;BR /&gt;
  &lt;STRONG&gt;
   Resolution
  &lt;/STRONG&gt;
  : To resolve the issue, follow these steps:
  &lt;BR /&gt;
  &lt;OL&gt;
   &lt;BR /&gt;
   &lt;LI&gt;
    Launch the registry editor console and take a backup of the following key:
   &lt;/LI&gt;
   &lt;BR /&gt;
  &lt;/OL&gt;
  &lt;BR /&gt;
  HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Server\Productivity\
  &lt;STRONG&gt;
   O365Integration
  &lt;/STRONG&gt;
  &lt;BR /&gt;
  &lt;OL&gt;
   &lt;BR /&gt;
   &lt;LI&gt;
    Click HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Server\Productivity\O365Integration\
    &lt;STRONG&gt;
     Settings
    &lt;/STRONG&gt;
    , on the right pane delete the
    &lt;STRONG&gt;
     BecEndPointAddress
    &lt;/STRONG&gt;
    key and click
    &lt;STRONG&gt;
     Yes
    &lt;/STRONG&gt;
   &lt;/LI&gt;
   &lt;BR /&gt;
  &lt;/OL&gt;
  &lt;BR /&gt;
  &lt;IMG src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/104667iC18F0698EFDB0061" /&gt;
  &lt;BR /&gt;
  &lt;OL&gt;
   &lt;BR /&gt;
   &lt;LI&gt;
    Exit the registry editor console and proceed to run the
    &lt;STRONG&gt;
     Integrate with Microsoft Office 365
    &lt;/STRONG&gt;
    wizard
   &lt;/LI&gt;
   &lt;BR /&gt;
  &lt;/OL&gt;
  &lt;BR /&gt;
 
&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Apr 2019 00:15:18 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-server-essentials-and/office-365-integration-fails-with-quot-cannot-connect-to/ba-p/399094</guid>
      <dc:creator>sbs-team</dc:creator>
      <dc:date>2019-04-05T00:15:18Z</dc:date>
    </item>
    <item>
      <title>How to configure ASR in Windows Server Essentials 2016</title>
      <link>https://techcommunity.microsoft.com/t5/windows-server-essentials-and/how-to-configure-asr-in-windows-server-essentials-2016/ba-p/399079</link>
      <description>&lt;HTML&gt;
 &lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;
  &lt;STRONG&gt;
   First published on TechNet on Sep 13, 2017
  &lt;/STRONG&gt;
  &lt;BR /&gt;
  Hello Windows Server Essentials friends,
  &lt;BR /&gt;
  &lt;BR /&gt;
  Windows Server Essentials (or the Essentials Experience role found in Windows Server Standard or Datacenter) can be leveraged to quickly provision and enable a full Disaster Recovery site in the cloud using built-in Microsoft Azure integration features. The solution is composed of two Azure products:
  &lt;BR /&gt;
  &lt;OL&gt;
   &lt;BR /&gt;
   &lt;LI&gt;
    Azure Virtual Network:
    &lt;A href="https://azure.microsoft.com/en-us/services/virtual-network/" target="_blank"&gt;
     https://azure.microsoft.com/en-us/services/virtual-network/
    &lt;/A&gt;
   &lt;/LI&gt;
   &lt;BR /&gt;
   &lt;LI&gt;
    Azure Site Recovery:
    &lt;A href="https://azure.microsoft.com/en-us/services/site-recovery/" target="_blank"&gt;
     https://azure.microsoft.com/en-us/services/site-recovery/
    &lt;/A&gt;
   &lt;/LI&gt;
   &lt;BR /&gt;
  &lt;/OL&gt;
  &lt;BR /&gt;
  Using Windows Server Essentials wizards and setting up the hardware in a working configuration can be challenging and there are a few steps and prerequisites to consider before deploying the server.
  &lt;BR /&gt;
  &lt;BR /&gt;
  Two of our bright stars in the Windows Server Essentials community are Daniel Santos and Alex Fields. Alex is from Minneapolis and he wrote a new series of blogs (leveraging Daniels's great analysis work) to help folks navigate through the configuration of the hardware and the Windows Server Essentials operating system to enable this disaster recovery solution.
  &lt;BR /&gt;
  &lt;BR /&gt;
  Check out Alex's blog series on itpromentor.com for a detailed rundown of the configuration steps:
  &lt;BR /&gt;
  &lt;BR /&gt;
  &lt;A href="https://www.itpromentor.com/asr-wse-part-1/" target="_blank"&gt;
   Part 1: Pre-requisites
  &lt;/A&gt;
  &lt;A href="https://www.itpromentor.com/asr-wse-part-1/" target="_blank"&gt;
   https://www.itpromentor.com/asr-wse-part-1/
  &lt;/A&gt;
  &lt;BR /&gt;
  &lt;BR /&gt;
  &lt;A href="https://www.itpromentor.com/asr-wse-part-2/" target="_blank"&gt;
   Part 2: Configuring
  &lt;/A&gt;
  &lt;A href="https://www.itpromentor.com/asr-wse-part-2/" target="_blank"&gt;
   https://www.itpromentor.com/asr-wse-part-2/
  &lt;/A&gt;
  &lt;BR /&gt;
  &lt;BR /&gt;
  &lt;A href="https://www.itpromentor.com/asr-wse-part-3/" target="_blank"&gt;
   Part 3: Failover and failback
  &lt;/A&gt;
  &lt;A href="https://www.itpromentor.com/asr-wse-part-3/" target="_blank"&gt;
   https://www.itpromentor.com/asr-wse-part-3/
  &lt;/A&gt;
  &lt;BR /&gt;
  &lt;BR /&gt;
  &lt;BR /&gt;
  &lt;BR /&gt;
  &lt;STRONG&gt;
  &lt;/STRONG&gt;
  &lt;STRONG&gt;
   Here is what the topology looks like:
  &lt;/STRONG&gt;
  &lt;BR /&gt;
  &lt;BR /&gt;
  &lt;IMG src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/104655i676020E62018ADE6" /&gt;
  &lt;BR /&gt;
  &lt;BR /&gt;
  &lt;BR /&gt;
  &lt;BR /&gt;
  Cheers and good luck!
  &lt;BR /&gt;
  &lt;BR /&gt;
  Scott M. Johnson
  &lt;BR /&gt;
  Senior Program Manager
  &lt;BR /&gt;
  Windows Server Essentials
  &lt;BR /&gt;
  &lt;A href="http://www.twitter.com/supersquatchy" target="_blank"&gt;
   @SuperSquatchy
  &lt;/A&gt;
  &lt;BR /&gt;
  &lt;BR /&gt;
  &lt;BR /&gt;
  &lt;BR /&gt;
  &lt;BR /&gt;
  &lt;BR /&gt;
  &lt;BR /&gt;
  &lt;BR /&gt;
  &lt;BR /&gt;
  &lt;BR /&gt;
 
&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Apr 2019 00:14:24 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-server-essentials-and/how-to-configure-asr-in-windows-server-essentials-2016/ba-p/399079</guid>
      <dc:creator>sbs-team</dc:creator>
      <dc:date>2019-04-05T00:14:24Z</dc:date>
    </item>
    <item>
      <title>Windows Home Server 2011 End of Mainstream Support</title>
      <link>https://techcommunity.microsoft.com/t5/windows-server-essentials-and/windows-home-server-2011-end-of-mainstream-support/ba-p/399076</link>
      <description>&lt;HTML&gt;
 &lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;
  &lt;STRONG&gt;
   First published on TechNet on Jul 03, 2017
  &lt;/STRONG&gt;
  &lt;BR /&gt;
  Windows Home Server 2011 mainstream support ended in the second quarter of 2016. You can see all of the support lifecycle dates on the Microsoft Lifecycle page
  &lt;A href="https://support.microsoft.com/en-us/lifecycle/search" target="_blank"&gt;
   here
  &lt;/A&gt;
  .
  &lt;BR /&gt;
  &lt;BR /&gt;
  &lt;STRONG&gt;
   What does this mean for you?
  &lt;/STRONG&gt;
  &lt;BR /&gt;
  &lt;BR /&gt;
  This means that Microsoft will no longer issue security updates for the Home Server-specific components that make up Windows Home Server 2011. If you are still running Windows Home Server 2008 or Windows Home Server 2011, Microsoft recommends bringing in a new device running Windows Server Standard or Windows Server Essentials and migrating your roles, features and data to the new appliance. Today’s new hardware is significantly faster and cheaper and can better handle the latest Windows security infrastructure, roles and features. Customers moving to a modern operating system will benefit from dramatically enhanced security, broad device support, higher user productivity, and a lower total cost of ownership through improved management capabilities.
  &lt;BR /&gt;
  &lt;BR /&gt;
  &lt;STRONG&gt;
   Why migrate from Windows Home Server to Windows Server Essentials?
  &lt;/STRONG&gt;
  &lt;BR /&gt;
  The latest versions of Windows Server Essentials support improvements in security, scalability, and manageability, and it contains device driver support for new hardware and silicon.
  &lt;BR /&gt;
  •
  &lt;STRONG&gt;
   Simplified setup.
  &lt;/STRONG&gt;
  There is no easier way to set up a server than using the Windows Server Essentials Out-of-Box experience. Windows Server Essentials configures AD, certificate services, and DNS. It helps get a public domain name set up, and it generates and installs SSL certificates and everything you need to get started with your own hybrid cloud setup.
  &lt;BR /&gt;
  •
  &lt;STRONG&gt;
   Data redundancy and single pool of storage
  &lt;/STRONG&gt;
  .  Windows Server Essentials includes a feature called Storage Spaces that provides data redundancy and storage pooling functionality like that provided by Drive Extender in WHS. Windows Server Essentials has a much more reliable and resilient storage subsystem.
  &lt;BR /&gt;
  •
  &lt;STRONG&gt;
   Centralized PC backup and restore.
  &lt;/STRONG&gt;
  Windows Server Essentials includes the next generation version of the centralized PC backup and restore functionality from Windows Home Server 2011 as well as centralized File History storage for all your PCs. Windows Server Essentials supports up to 75 PC backups vs. Windows Home Server’s 25 PC backup limitation. Windows Server Essentials 2016 also supports backing up volumes to Azure and backing up VMs to Azure Site Recovery (ASR).
  &lt;BR /&gt;
  •
  &lt;STRONG&gt;
   Centralized PC and server health monitoring.
  &lt;/STRONG&gt;
  Windows Server Essentials includes health monitoring, both for the server itself as well as for all the connected PCs.
  &lt;BR /&gt;
  •
  &lt;STRONG&gt;
   Document and media sharing.
  &lt;/STRONG&gt;
  Windows Server Essentials can share content using SMB, iSCSI or NFS. Windows Server Essentials 2016 no longer includes the media streaming codecs, however, we found that people were not actually using that feature and they prefer to decode in the respective media applications.
  &lt;BR /&gt;
  •
  &lt;STRONG&gt;
   Remote access.
  &lt;/STRONG&gt;
  Windows Server Essentials has the remote access gateway feature that automatically generates SSL certificates for your server from GoDaddy. Essentials includes a web-based client for accessing home documents and media, and you can also remote desktop into the server if needed for administration purposes.
  &lt;BR /&gt;
  &lt;BR /&gt;
  The Home Server line of products had a very enthusiastic fan following -- it introduced the concept of a server in the house to the world and books appeared to make sense of it all.
  &lt;BR /&gt;
  &lt;BR /&gt;
  &lt;IMG src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/104653i9C6F4B2D030D4EE6" /&gt;
  &lt;BR /&gt;
  &lt;BR /&gt;
  Microsoft learned quite a bit helping and supporting hundreds of thousands of home users and small businesses to deploy Windows Server. If you are looking to upgrade your old Windows Home Server, now is a great opportunity to look at the new devices available and move to a modern platform.
  &lt;BR /&gt;
  &lt;BR /&gt;
  For more information about Windows Server Essentials see the
  &lt;A href="https://docs.microsoft.com/en-us/windows-server-essentials/get-started/get-started" target="_blank"&gt;
   documentation site
  &lt;/A&gt;
  and it can be purchased at the
  &lt;A href="https://www.microsoft.com/en-us/store/d/Windows-Server-2016-Essentials/DG7GMGF0DS1G" target="_blank"&gt;
   Microsoft store
  &lt;/A&gt;
  .
  &lt;BR /&gt;
  &lt;BR /&gt;
  Cheers,
  &lt;BR /&gt;
  Scott M. Johnson
  &lt;BR /&gt;
  Senior Program Manager
  &lt;BR /&gt;
  Windows Server Essentials
  &lt;BR /&gt;
 
&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Apr 2019 00:14:12 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-server-essentials-and/windows-home-server-2011-end-of-mainstream-support/ba-p/399076</guid>
      <dc:creator>sbs-team</dc:creator>
      <dc:date>2019-04-05T00:14:12Z</dc:date>
    </item>
    <item>
      <title>Windows Server Essentials 2016 – Update two on Remote Web Access</title>
      <link>https://techcommunity.microsoft.com/t5/windows-server-essentials-and/windows-server-essentials-2016-8211-update-two-on-remote-web/ba-p/399073</link>
      <description>&lt;HTML&gt;
 &lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;
  &lt;STRONG&gt;
   First published on TechNet on Jun 26, 2017
  &lt;/STRONG&gt;
  &lt;BR /&gt;
  Hello,
  &lt;BR /&gt;
  &lt;BR /&gt;
  An
  &lt;A href="https://support.microsoft.com/en-us/help/4019472/windows-10-update-kb4019472" target="_blank"&gt;
   update
  &lt;/A&gt;
  for the remote web access feature went live in May and so the workaround suggested
  &lt;A href="https://blogs.technet.microsoft.com/sbs/2017/04/17/windows-server-essentials-2016-update-on-remote-web-access/" target="_blank"&gt;
   in this previous blog
  &lt;/A&gt;
  can be undone. Users will now be able to get to http://servername/remote or &lt;A href="https://servername.remotewebaccess.com/remote" target="_blank"&gt;https://servername.remotewebaccess.com/remote&lt;/A&gt; without errors, regardless of how long the server has been online.
  &lt;BR /&gt;
  &lt;BR /&gt;
  Thanks,
  &lt;BR /&gt;
  Scott Johnson
  &lt;BR /&gt;
  &lt;BR /&gt;
  &lt;BR /&gt;
  &lt;BR /&gt;
 
&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Apr 2019 00:14:00 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-server-essentials-and/windows-server-essentials-2016-8211-update-two-on-remote-web/ba-p/399073</guid>
      <dc:creator>sbs-team</dc:creator>
      <dc:date>2019-04-05T00:14:00Z</dc:date>
    </item>
    <item>
      <title>Information about SBS 2008 Product Support Lifecycle</title>
      <link>https://techcommunity.microsoft.com/t5/windows-server-essentials-and/information-about-sbs-2008-product-support-lifecycle/ba-p/399071</link>
      <description>&lt;HTML&gt;
 &lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;
  &lt;STRONG&gt;
   First published on TechNet on May 03, 2017
  &lt;/STRONG&gt;
  &lt;BR /&gt;
  This blogs post underlines the Product Support Lifecycle of the Windows Small Business Server 2008 and its individual components. The support lifecycle for Windows Small Business Server 2008 is determined by its individual component's support lifecycles.
  &lt;BR /&gt;
  &lt;BR /&gt;
  We are publishing this information as a few SBS 2008 integrated components have reached its end of support. Here are the individual products included with Windows Small Business Server 2008 (Standard/Premium) and their support lifecycle timelines.
  &lt;BR /&gt;
  &lt;BR /&gt;
  The Extended Support End Date for the following products are as follows:
  &lt;BR /&gt;
  &lt;BR /&gt;
  &lt;IMG src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/104650i30234C5848F80F0D" /&gt;
  &lt;BR /&gt;
  &lt;BR /&gt;
  For more details please browse to
  &lt;A href="http://support.microsoft.com/lifecycle/search/" target="_blank"&gt;
   http://support.microsoft.com/lifecycle/search/
  &lt;/A&gt;
  and search for individual products.
  &lt;BR /&gt;
  &lt;BR /&gt;
  End of support refers to the date when Microsoft no longer provides automatic fixes, updates, or online technical assistance. This is the time to make sure you have the latest available update or service pack installed. Without Microsoft support, you will no longer receive security updates that can help protect your PC from harmful viruses, spyware, and other malicious software that can steal your personal information.
  &lt;BR /&gt;
  &lt;BR /&gt;
  Microsoft is committed to provide support to customers facing issues when migrating to supported versions.
  &lt;BR /&gt;
 
&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Apr 2019 00:13:57 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-server-essentials-and/information-about-sbs-2008-product-support-lifecycle/ba-p/399071</guid>
      <dc:creator>sbs-team</dc:creator>
      <dc:date>2019-04-05T00:13:57Z</dc:date>
    </item>
    <item>
      <title>Windows Server Essentials 2016 - Update on Remote Web Access</title>
      <link>https://techcommunity.microsoft.com/t5/windows-server-essentials-and/windows-server-essentials-2016-update-on-remote-web-access/ba-p/399068</link>
      <description>&lt;HTML&gt;
 &lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;
  &lt;STRONG&gt;
   First published on TechNet on Apr 17, 2017
  &lt;/STRONG&gt;
  &lt;BR /&gt;
  Hello,
  &lt;BR /&gt;
  &lt;BR /&gt;
  Remote Web Access, a feature inside Windows Server Essentials 2016 (also used in the Windows Server Essentials role that is available in Windows Server Standard 2016 and Windows Server Datacenter 2016) may cause users to experience trouble connecting remotely. The issue occurs after Office 365 with AAD Integration is completed and a certain amount of time passes without a reboot, typically 36-48 hours.
  &lt;BR /&gt;
  &lt;BR /&gt;
  The server will be responsive, but the
  &lt;A href="https://servername/remote" target="_blank"&gt;
   https://servername/remote
  &lt;/A&gt;
  web site will indicate that it is not accessible and will redirect users to their Administrator with the following message:
  &lt;BR /&gt;
  &lt;BR /&gt;
  &lt;STRONG&gt;
   "Cannot connect to Remote Web Access. Please contact the person who manages the server. "
  &lt;/STRONG&gt;
  &lt;BR /&gt;
  &lt;BR /&gt;
  There is a temporary workaround discussed on the windows server forum
  &lt;A href="https://na01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsocial.technet.microsoft.com%2FForums%2Fwindowsserver%2Fen-US%2Ffc9140e3-9ae7-4ba3-898b-1ec196ab8538%2Fremote-web-access-works-for-about-a-week-at-a-time%3Fforum%3Dws16essentials&amp;amp;data=02%7C01%7CScott.M.Johnson%40microsoft.com%7Ccc1c06e3b90e4adb78b808d48105eba3%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C636275309802092757&amp;amp;sdata=AgjGsP%2FkwboO9f6eB4FUMOpUM2pp2UyV8mCHurEPY68%3D&amp;amp;reserved=0" target="_blank"&gt;
   here
  &lt;/A&gt;
  , and it is a safe workaround to use until the fix is available. The issue is caused by WCF connections not being cleaned up by the Essentials provider framework and they are no longer removed by the CLR in Windows Server 2016. To verify this, you can check the amount of WCF connections by running the following PowerShell command in an elevated console:
  &lt;BR /&gt;
  &lt;BR /&gt;
  netstat -a | select-string ':65532' | measure-object -line
  &lt;BR /&gt;
  &lt;BR /&gt;
  There should be 100-300 connections typically.
  &lt;BR /&gt;
  &lt;BR /&gt;
  The fix has been tested and checked in and it will be available in the May update package for Windows Server 2016. When the kb article is published and the fix is available, I will post about it here.
  &lt;BR /&gt;
  &lt;BR /&gt;
  Thanks,
  &lt;BR /&gt;
  Scott Johnson
  &lt;BR /&gt;
  Windows Server Essentials
 
&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Apr 2019 00:13:46 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-server-essentials-and/windows-server-essentials-2016-update-on-remote-web-access/ba-p/399068</guid>
      <dc:creator>sbs-team</dc:creator>
      <dc:date>2019-04-05T00:13:46Z</dc:date>
    </item>
    <item>
      <title>Windows Server 2016 Essentials is now GA</title>
      <link>https://techcommunity.microsoft.com/t5/windows-server-essentials-and/windows-server-2016-essentials-is-now-ga/ba-p/399067</link>
      <description>&lt;HTML&gt;
 &lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;
  &lt;STRONG&gt;
   First published on TechNet on Oct 25, 2016
  &lt;/STRONG&gt;
  &lt;BR /&gt;
  Windows Server 2016 Essentials has reached the GA (General Availability) milestone as a part of Windows Server 2016 launch. The product is now available in all channels.
  &lt;BR /&gt;
  &lt;BR /&gt;
  For more details,&amp;nbsp;visit the following links:
  &lt;BR /&gt;
  &lt;BR /&gt;
  &lt;A href="https://blogs.technet.microsoft.com/hybridcloud/2016/09/26/announcing-the-launch-of-windows-server-2016/" target="_blank"&gt;
   https://blogs.technet.microsoft.com/hybridcloud/2016/09/26/announcing-the-launch-of-windows-server-2016/
  &lt;/A&gt;
  &lt;BR /&gt;
  &lt;BR /&gt;
  &lt;A href="https://www.microsoft.com/en-us/evalcenter/evaluate-windows-server-2016-essentials" target="_blank"&gt;
   https://www.microsoft.com/en-us/evalcenter/evaluate-windows-server-2016-essentials
  &lt;/A&gt;
  &lt;BR /&gt;
  &lt;BR /&gt;
 
&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Apr 2019 00:13:43 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-server-essentials-and/windows-server-2016-essentials-is-now-ga/ba-p/399067</guid>
      <dc:creator>sbs-team</dc:creator>
      <dc:date>2019-04-05T00:13:43Z</dc:date>
    </item>
    <item>
      <title>Fix for Office 365 Integration issue with Windows Server 2012 R2 Essentials has been released</title>
      <link>https://techcommunity.microsoft.com/t5/windows-server-essentials-and/fix-for-office-365-integration-issue-with-windows-server-2012-r2/ba-p/399065</link>
      <description>&lt;HTML&gt;
 &lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;
  &lt;STRONG&gt;
   First published on TechNet on Oct 25, 2016
  &lt;/STRONG&gt;
  &lt;BR /&gt;
  There was a known issue about Microsoft Office 365 Integration failure on Windows Server 2012 R2 Essentials due to exceeding the maximum message size quota for incoming messages while retrieving the subscription information. We are pleased to inform that the fix for this issue has been included with latest monthly quality rollup for Windows Server 2012 R2:
  &lt;BR /&gt;
  &lt;BR /&gt;
  &lt;A href="https://support.microsoft.com/en-us/kb/3192404" target="_blank"&gt;
   https://support.microsoft.com/en-us/kb/3192404
  &lt;/A&gt;
  &lt;BR /&gt;
  &lt;BR /&gt;
  Detailed information about the issue is mentioned below:
  &lt;BR /&gt;
  &lt;BR /&gt;
  Microsoft Office 365 may fail to integrate with Windows Server 2012 R2 Essentials with the following exception:
  &lt;BR /&gt;
  &lt;BR /&gt;
  &lt;IMG src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/104645i4CD67EAB1AAF1EAE" /&gt;
  &lt;BR /&gt;
  &lt;BR /&gt;
  The file
  &lt;B&gt;
   SharedServiceHost-EmailProviderServiceConfig.log
  &lt;/B&gt;
  located at the C:\ProgramData\Microsoft\Windows Server\Logs folder may show the following exception:
  &lt;BR /&gt;
  &lt;BR /&gt;
  &lt;IMG src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/104647i9417383A172BCFD2" /&gt;
  &lt;BR /&gt;
  &lt;BR /&gt;
  The issue occurs due to a scalability issue conflicting with default output buffer size used for subscriptions. This causes a failure during the retrieval of any O365 subscription and breaks the O365 integration feature.
  &lt;BR /&gt;
  &lt;BR /&gt;
  Resolution: The fix for this issue has been included with the monthly quality rollup for Windows Server 2012 R2. Install the following rollup on the server:
  &lt;BR /&gt;
  &lt;BR /&gt;
  &lt;A href="https://support.microsoft.com/en-us/kb/3192404" target="_blank"&gt;
   https://support.microsoft.com/en-us/kb/3192404
  &lt;/A&gt;
  &lt;BR /&gt;
  &lt;BR /&gt;
  Note: This is an optional update and will be promoted to a mandatory one in the next update cycle.
 
&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Apr 2019 00:13:40 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-server-essentials-and/fix-for-office-365-integration-issue-with-windows-server-2012-r2/ba-p/399065</guid>
      <dc:creator>sbs-team</dc:creator>
      <dc:date>2019-04-05T00:13:40Z</dc:date>
    </item>
    <item>
      <title>Updated inbox component in Windows Server 2012 R2 Essentials for client connector</title>
      <link>https://techcommunity.microsoft.com/t5/windows-server-essentials-and/updated-inbox-component-in-windows-server-2012-r2-essentials-for/ba-p/399059</link>
      <description>&lt;HTML&gt;
 &lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;
  &lt;STRONG&gt;
   First published on TechNet on Jul 24, 2016
  &lt;/STRONG&gt;
  &lt;BR /&gt;
  &lt;EM&gt;
   [This post comes to us courtesy of Schumann GE from Product Group and Sandeep Biswas from Global Business Support]
  &lt;/EM&gt;
  &lt;BR /&gt;
  &lt;BR /&gt;
  We are happy to announce that the fix for client side issues due to Windows 10 feature upgrade that was discussed in the following SBS Blog has been released:
  &lt;BR /&gt;
  &lt;BR /&gt;
  &lt;A href="https://blogs.technet.microsoft.com/sbs/2016/01/22/windows-10-feature-upgrade-breaks-client-connector-for-window-server-2012-r2-essentials-windows-server-2012-essentials-and-windows-small-business-server-2011-essentials/" target="_blank"&gt;
   https://blogs.technet.microsoft.com/sbs/2016/01/22/windows-10-feature-upgrade-breaks-client-connector-for-window-server-2012-r2-essentials-windows-server-2012-essentials-and-windows-small-business-server-2011-essentials/
  &lt;/A&gt;
  &lt;BR /&gt;
  &lt;BR /&gt;
  The inbox fix for Windows Server 2012 R2 has been included with the following update rollup:
  &lt;BR /&gt;
  &lt;BR /&gt;
  &lt;A href="https://support.microsoft.com/en-in/kb/3172614" target="_blank"&gt;
   https://support.microsoft.com/en-in/kb/3172614
  &lt;/A&gt;
  &lt;BR /&gt;
  &lt;BR /&gt;
  Note: This is an optional update and will be promoted to a mandatory one in the next update cycle.
 
&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Apr 2019 00:13:20 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-server-essentials-and/updated-inbox-component-in-windows-server-2012-r2-essentials-for/ba-p/399059</guid>
      <dc:creator>sbs-team</dc:creator>
      <dc:date>2019-04-05T00:13:20Z</dc:date>
    </item>
    <item>
      <title>Windows SBS 2011, Windows SBS 2008 and impact of MS16-072</title>
      <link>https://techcommunity.microsoft.com/t5/windows-server-essentials-and/windows-sbs-2011-windows-sbs-2008-and-impact-of-ms16-072/ba-p/399057</link>
      <description>&lt;HTML&gt;
 &lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;
  &lt;STRONG&gt;
   First published on TechNet on Jul 20, 2016
  &lt;/STRONG&gt;
  &lt;BR /&gt;
  &lt;EM&gt;
   [This post comes to us courtesy of Susan Bradley, Wayne Small and Schumann GE (from Product Group)]
  &lt;/EM&gt;
  &lt;BR /&gt;
  &lt;BR /&gt;
  On June 14, 2016 Microsoft released
  &lt;A href="https://technet.microsoft.com/library/security/MS16-072" target="_blank"&gt;
   MS16-072
  &lt;/A&gt;
  &lt;A href="https://support.microsoft.com/en-us/kb/3159398" target="_blank"&gt;
   KB3159398
  &lt;/A&gt;
  to fix a vulnerability in Group Policy whereby an attacker can allow elevation of privilege if an attacker launches a man-in-the-middle (MiTM) attack against the traffic passing between a domain controller and the target machine on domain-joined Windows computers.&amp;nbsp; After MS16-072 is installed, user group policies are retrieved by using the computer’s security context. This by-design behavior change protects domain joined computers from a security vulnerability.&amp;nbsp; Any Group policy that performs Security filtering on a per user basis will need to be adjusted now work after MS16-072.
  &lt;BR /&gt;
  &lt;BR /&gt;
  For SBS 2008 and SBS 2011 in particular there are several group policies set up in the product for purposes of controlling the users’ desktop environment and Windows Software Update Services (WSUS) that are directly impacted by this change and will need adjustment in order to continue to work after the application of this patch.
  &lt;BR /&gt;
  &lt;BR /&gt;
  There will be no automated patch to fix this issue on the SBS 2011 platform, thus we recommend that you take the following action to ensure that the default group polices on the SBS 2008 and SBS 2011 server are adjusted as well as checking if any group policies you have placed on the systems are impacted.
  &lt;BR /&gt;
  &lt;BR /&gt;
  I would like to thank various blogs and resources that provided additional information that I am relying on in order to provide the information for the SBS community.
  &lt;BR /&gt;
  &lt;BR /&gt;
  If you’d like to review these additional resources, I’d recommend reviewing
  &lt;A href="http://www.gpanswers.com/never-a-dull-moment-with-group-policy-or-what-to-do-about-ms16-072/" target="_blank"&gt;
   Jeremy Moskowitz’s blog
  &lt;/A&gt;
  , and
  &lt;A href="https://sdmsoftware.com/group-policy-blog/bugs/new-group-policy-patch-ms16-072-breaks-gp-processing-behavior/" target="_blank"&gt;
   Darren Mar-Elia’s blog
  &lt;/A&gt;
  .&amp;nbsp; Additional resources include the
  &lt;A href="https://blogs.technet.microsoft.com/askds/2016/06/22/deploying-group-policy-security-update-ms16-072-kb3163622/" target="_blank"&gt;
   AskDS blog
  &lt;/A&gt;
  , and the
  &lt;A href="https://blogs.technet.microsoft.com/askds/2016/06/22/deploying-group-policy-security-update-ms16-072-kb3163622/" target="_blank"&gt;
   JH consulting blog
  &lt;/A&gt;
  .&amp;nbsp; I would recommend reviewing these additional resources if you manage different Server platforms as the commands and PowerShell scripts are slightly different for different versions of Windows Server.
  &lt;BR /&gt;
  &lt;BR /&gt;
  Prior to MS16-072, Group policy could be set up with security filtering uniquely for computer users.&amp;nbsp; Both the SBS 2008 and SBS 2011 systems as part of the SBSMonitoring service run a routine that every 20 minutes there is a service that synchronizes the SBS created (“stamped”) users with the Security Filtering on the “Windows SBS User Policy” so that the SBS can deploy specific settings to the users desktop environment.&amp;nbsp; If you merely add the Domain computers READ right to the security filtering section in group policy (or any other manual change to security filtering), 20 minutes later you will find this right removed.&amp;nbsp; So we must add this domain computer READ right in a specific way.
  &lt;BR /&gt;
  &lt;BR /&gt;
  I’d first recommend that you review your server(s) and workstations to confirm that the patch has been deployed. Secondly, you will need to review your group policies to asses if they are impacted.&amp;nbsp; An excellent PowerShell script you can use to check your systems is from the
  &lt;A href="https://blogs.technet.microsoft.com/poshchap/2016/06/16/ms16-072-known-issue-use-powershell-to-check-gpos/" target="_blank"&gt;
   PoSHChap blog
  &lt;/A&gt;
  .
  &lt;BR /&gt;
  &lt;BR /&gt;
  To begin, log into your SBS &amp;nbsp;2011 server.&amp;nbsp; Find Windows PowerShell under Accessories/Windows PowerShell.&amp;nbsp; Right mouse click and click on Run as Administrator.
  &lt;BR /&gt;
  &lt;BR /&gt;
  &lt;IMG src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/104629i9C7CE5C42281960C" /&gt;
  &lt;BR /&gt;
  &lt;BR /&gt;
  Now copy and paste the following script to review what group polices are impacted:
  &lt;BR /&gt;
  &lt;BR /&gt;
  &lt;STRONG&gt;
   Copy below this line
  &lt;/STRONG&gt;
  &lt;BR /&gt;
  &lt;BR /&gt;
  &lt;STRONG&gt;
   ===============================================================================
  &lt;/STRONG&gt;
  &lt;BR /&gt;
  &lt;BR /&gt;
  #Load GPO module
  &lt;BR /&gt;
  Import-Module GroupPolicy
  &lt;BR /&gt;
  &lt;BR /&gt;
  #Get all GPOs in current domain
  &lt;BR /&gt;
  $GPOs = Get-GPO -All
  &lt;BR /&gt;
  &lt;BR /&gt;
  #Check we have GPOs
  &lt;BR /&gt;
  if ($GPOs) {
  &lt;BR /&gt;
  &lt;BR /&gt;
  #Loop through GPOs
  &lt;BR /&gt;
  foreach ($GPO in $GPOs) {
  &lt;BR /&gt;
  &lt;BR /&gt;
  #Nullify $AuthUser &amp;amp; $DomComp
  &lt;BR /&gt;
  $AuthUser = $null
  &lt;BR /&gt;
  $DomComp = $null
  &lt;BR /&gt;
  &lt;BR /&gt;
  #See if we have an Auth Users perm
  &lt;BR /&gt;
  $AuthUser = Get-GPPermissions -Guid $GPO.Id -TargetName “Authenticated Users” -TargetType Group -ErrorAction SilentlyContinue
  &lt;BR /&gt;
  &lt;BR /&gt;
  #See if we have the ‘Domain Computers perm
  &lt;BR /&gt;
  $DomComp = Get-GPPermissions -Guid $GPO.Id -TargetName “Domain Computers” -TargetType Group -ErrorAction SilentlyContinue
  &lt;BR /&gt;
  &lt;BR /&gt;
  #Alert if we don’t have an ‘Authenticated Users’ permission
  &lt;BR /&gt;
  if (-not $AuthUser) {
  &lt;BR /&gt;
  &lt;BR /&gt;
  #Now check for ‘Domain Computers’ permission
  &lt;BR /&gt;
  if (-not $DomComp) {
  &lt;BR /&gt;
  &lt;BR /&gt;
  Write-Host “WARNING: $($GPO.DisplayName) ($($GPO.Id)) does not have an ‘Authenticated Users’ permission or ‘Domain Computers’ permission – please investigate” -ForegroundColor Red
  &lt;BR /&gt;
  &lt;BR /&gt;
  }&amp;nbsp;&amp;nbsp; #end of if (-not $DomComp)
  &lt;BR /&gt;
  else {
  &lt;BR /&gt;
  &lt;BR /&gt;
  #COMMENT OUT THE BELOW LINE TO REDUCE OUTPUT!
  &lt;BR /&gt;
  &lt;BR /&gt;
  Write-Host “INFORMATION: $($GPO.DisplayName) ($($GPO.Id)) does not have an ‘Authenticated Users’ permission but does have a ‘Domain Computers’ permission” -ForegroundColor Yellow
  &lt;BR /&gt;
  &lt;BR /&gt;
  }&amp;nbsp;&amp;nbsp; #end of else (-not $DomComp)
  &lt;BR /&gt;
  &lt;BR /&gt;
  }&amp;nbsp;&amp;nbsp; #end of if (-not $AuthUser)
  &lt;BR /&gt;
  elseif (($AuthUser.Permission -ne “GpoApply”) -and ($AuthUser.Permission -ne “GpoRead”)) {
  &lt;BR /&gt;
  &lt;BR /&gt;
  #COMMENT OUT THE BELOW LINE TO REDUCE OUTPUT!
  &lt;BR /&gt;
  Write-Host “INFORMATION: $($GPO.DisplayName) ($($GPO.Id)) has an ‘Authenticated Users’ permission that isn’t ‘GpoApply’ or ‘GpoRead'” -ForegroundColor Yellow
  &lt;BR /&gt;
  &lt;BR /&gt;
  }&amp;nbsp;&amp;nbsp; #end of elseif (($AuthUser.Permission -ne “GpoApply”) -or ($AuthUser.Permission -ne “GpoRead”))
  &lt;BR /&gt;
  else {
  &lt;BR /&gt;
  &lt;BR /&gt;
  #COMMENT OUT THE BELOW LINE TO REDUCE OUTPUT!
  &lt;BR /&gt;
  &lt;BR /&gt;
  Write-Output “INFORMATION: $($GPO.DisplayName) ($($GPO.Id)) has an ‘Authenticated Users’ permission”
  &lt;BR /&gt;
  &lt;BR /&gt;
  }&amp;nbsp;&amp;nbsp; #end of else (-not $AuthUser)
  &lt;BR /&gt;
  &lt;BR /&gt;
  }&amp;nbsp;&amp;nbsp; #end of foreach ($GPO in $GPOs)
  &lt;BR /&gt;
  &lt;BR /&gt;
  }&amp;nbsp;&amp;nbsp; #end of if ($GPOs)
  &lt;BR /&gt;
  &lt;BR /&gt;
  &lt;STRONG&gt;
   ===============================================================================
  &lt;/STRONG&gt;
  &lt;BR /&gt;
  &lt;BR /&gt;
  &lt;STRONG&gt;
   Copy above this line
  &lt;/STRONG&gt;
  &lt;BR /&gt;
  &lt;BR /&gt;
  &lt;EM&gt;
   Script courtesy of
  &lt;/EM&gt;
  &lt;A href="https://blogs.technet.microsoft.com/poshchap/2016/06/16/ms16-072-known-issue-use-powershell-to-check-gpos/" target="_blank"&gt;
   &lt;EM&gt;
    https://blogs.technet.microsoft.com/poshchap/2016/06/16/ms16-072-known-issue-use-powershell-to-check-gpos/
   &lt;/EM&gt;
  &lt;/A&gt;
  &lt;BR /&gt;
  &lt;BR /&gt;
  Either paste the script into your PowerShell window on the server or save it as a .ps1 script and run it.&amp;nbsp; You should see several red warnings that several of your group policies do not have the right permissions.
  &lt;BR /&gt;
  &lt;BR /&gt;
  &lt;IMG src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/104631i8C4FE8B5843E9EA6" /&gt;
  &lt;BR /&gt;
  &lt;BR /&gt;
  In reading various scripts online – It turns out there are different PowerShell commands for GP Permissions in 2008/2008R2 vs later versions of Windows.&amp;nbsp; So be aware the solution provided in this blog post specifically works on 2008 and 2008 R2 and does not work on 2012 and 2012 R2.&amp;nbsp; Specially the difference is simple – for 2008 and 2008 R2, replace the Get-GPPermission and Set-GPPermission commands with Get-GPPermissions and Set-GPPermissions in the script and it will work fine.
  &lt;BR /&gt;
  &lt;BR /&gt;
  Secondly – given we have a large number of SBS sites still, I did some specific testing with it.&amp;nbsp; The results of the script means that the following policies are affected by this issue and MAY NOT APPLY if you don’t add the Authenticated Users OR Domain Computers as READ on the Delegation tab for that GPO.
  &lt;BR /&gt;
  &lt;UL&gt;
   &lt;BR /&gt;
   &lt;LI&gt;
    Windows SBS User Policy
   &lt;/LI&gt;
   &lt;BR /&gt;
   &lt;LI&gt;
    SharePoint PSConfig Notification Policy
   &lt;/LI&gt;
   &lt;BR /&gt;
   &lt;LI&gt;
    Update Services Server Computers Policy
   &lt;/LI&gt;
   &lt;BR /&gt;
   &lt;LI&gt;
    Update Services Client Computers Policy
   &lt;/LI&gt;
   &lt;BR /&gt;
  &lt;/UL&gt;
  &lt;BR /&gt;
  Microsoft have indicated specific conditions for using either Authenticated Users OR Domain Computers with the READ permission.&amp;nbsp; I’ve done quite a bit of investigation and in conversation with Group Policy MVPs, have decided that I will implement this consistently using the Domain Computers group as this works for all scenarios.
  &lt;BR /&gt;
  &lt;BR /&gt;
  Now we need to adjust the permissions so that the group policies work after the installation of
  &lt;A href="https://technet.microsoft.com/library/security/MS16-072" target="_blank"&gt;
   MS16-072
  &lt;/A&gt;
  , the patch of
  &lt;A href="https://support.microsoft.com/en-us/kb/3159398" target="_blank"&gt;
   KB3159398
  &lt;/A&gt;
  .
  &lt;BR /&gt;
  &lt;BR /&gt;
  For SBS 2011 in the PowerShell window cut and paste the following script:
  &lt;BR /&gt;
  &lt;BR /&gt;
  &lt;STRONG&gt;
   Copy below this line
  &lt;/STRONG&gt;
  &lt;BR /&gt;
  &lt;BR /&gt;
  &lt;STRONG&gt;
   ===============================================================================
  &lt;/STRONG&gt;
  &lt;BR /&gt;
  &lt;BR /&gt;
  Import-Module GroupPolicy
  &lt;BR /&gt;
  &lt;BR /&gt;
  Get-GPO -All | Set-GPPermissions -TargetType Group -TargetName "Domain computers" -PermissionLevel GpoRead
  &lt;BR /&gt;
  &lt;BR /&gt;
  &lt;STRONG&gt;
   ===============================================================================
  &lt;/STRONG&gt;
  &lt;BR /&gt;
  &lt;BR /&gt;
  &lt;STRONG&gt;
   Copy above this line
  &lt;/STRONG&gt;
  &lt;BR /&gt;
  &lt;BR /&gt;
  The first line calls the Group policy module for PowerShell, the second line adds the Domain Computers READ right to the delegation tab so that the Security filtering set up by the server can continue to process.
  &lt;BR /&gt;
  &lt;BR /&gt;
  The script should scroll through the settings and adjust the group policies.
  &lt;BR /&gt;
  &lt;BR /&gt;
  &lt;IMG src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/104633i264D5854620ACED9" /&gt;
  &lt;BR /&gt;
  &lt;BR /&gt;
  The script has done what it needs to do.&amp;nbsp;&amp;nbsp; If you’d like to visually see the impact, if you go to any Group policy object you will now see Domain Computers on the delegation tab with READ rights.
  &lt;BR /&gt;
  &lt;BR /&gt;
  &lt;IMG src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/104635i58D9270FB99FC965" /&gt;
  &lt;BR /&gt;
  &lt;BR /&gt;
  On the Group policy object of Windows SBS User policy you should now see
  &lt;BR /&gt;
  &lt;BR /&gt;
  &lt;IMG src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/104637i16D2E54333398F03" /&gt;
  &lt;BR /&gt;
  &lt;BR /&gt;
  Domain Computers with a Read right to the Group policy object.
  &lt;BR /&gt;
  &lt;BR /&gt;
  Now run the testing script again to confirm that your group policy permissions have been adjusted.
  &lt;BR /&gt;
  &lt;BR /&gt;
  Once again copy and paste the following script in the PowerShell window or save it as a .ps1 script:
  &lt;BR /&gt;
  &lt;BR /&gt;
  &lt;STRONG&gt;
   Copy below this line
  &lt;/STRONG&gt;
  &lt;BR /&gt;
  &lt;BR /&gt;
  &lt;STRONG&gt;
   ===============================================================================
  &lt;/STRONG&gt;
  &lt;BR /&gt;
  &lt;BR /&gt;
  #Load GPO module
  &lt;BR /&gt;
  Import-Module GroupPolicy
  &lt;BR /&gt;
  &lt;BR /&gt;
  #Get all GPOs in current domain
  &lt;BR /&gt;
  $GPOs = Get-GPO -All
  &lt;BR /&gt;
  &lt;BR /&gt;
  #Check we have GPOs
  &lt;BR /&gt;
  if ($GPOs) {
  &lt;BR /&gt;
  &lt;BR /&gt;
  #Loop through GPOs
  &lt;BR /&gt;
  foreach ($GPO in $GPOs) {
  &lt;BR /&gt;
  &lt;BR /&gt;
  #Nullify $AuthUser &amp;amp; $DomComp
  &lt;BR /&gt;
  $AuthUser = $null
  &lt;BR /&gt;
  $DomComp = $null
  &lt;BR /&gt;
  &lt;BR /&gt;
  #See if we have an Auth Users perm
  &lt;BR /&gt;
  $AuthUser = Get-GPPermissions -Guid $GPO.Id -TargetName “Authenticated Users” -TargetType Group -ErrorAction SilentlyContinue
  &lt;BR /&gt;
  &lt;BR /&gt;
  #See if we have the ‘Domain Computers perm
  &lt;BR /&gt;
  $DomComp = Get-GPPermissions -Guid $GPO.Id -TargetName “Domain Computers” -TargetType Group -ErrorAction SilentlyContinue
  &lt;BR /&gt;
  &lt;BR /&gt;
  #Alert if we don’t have an ‘Authenticated Users’ permission
  &lt;BR /&gt;
  if (-not $AuthUser) {
  &lt;BR /&gt;
  &lt;BR /&gt;
  #Now check for ‘Domain Computers’ permission
  &lt;BR /&gt;
  if (-not $DomComp) {
  &lt;BR /&gt;
  &lt;BR /&gt;
  Write-Host “WARNING: $($GPO.DisplayName) ($($GPO.Id)) does not have an ‘Authenticated Users’ permission or ‘Domain Computers’ permission – please investigate” -ForegroundColor Red
  &lt;BR /&gt;
  &lt;BR /&gt;
  }&amp;nbsp;&amp;nbsp; #end of if (-not $DomComp)
  &lt;BR /&gt;
  else {
  &lt;BR /&gt;
  &lt;BR /&gt;
  #COMMENT OUT THE BELOW LINE TO REDUCE OUTPUT!
  &lt;BR /&gt;
  &lt;BR /&gt;
  Write-Host “INFORMATION: $($GPO.DisplayName) ($($GPO.Id)) does not have an ‘Authenticated Users’ permission but does have a ‘Domain Computers’ permission” -ForegroundColor Yellow
  &lt;BR /&gt;
  &lt;BR /&gt;
  }&amp;nbsp;&amp;nbsp; #end of else (-not $DomComp)
  &lt;BR /&gt;
  &lt;BR /&gt;
  }&amp;nbsp;&amp;nbsp; #end of if (-not $AuthUser)
  &lt;BR /&gt;
  elseif (($AuthUser.Permission -ne “GpoApply”) -and ($AuthUser.Permission -ne “GpoRead”)) {
  &lt;BR /&gt;
  &lt;BR /&gt;
  #COMMENT OUT THE BELOW LINE TO REDUCE OUTPUT!
  &lt;BR /&gt;
  Write-Host “INFORMATION: $($GPO.DisplayName) ($($GPO.Id)) has an ‘Authenticated Users’ permission that isn’t ‘GpoApply’ or ‘GpoRead'” -ForegroundColor Yellow
  &lt;BR /&gt;
  &lt;BR /&gt;
  }&amp;nbsp;&amp;nbsp; #end of elseif (($AuthUser.Permission -ne “GpoApply”) -or ($AuthUser.Permission -ne “GpoRead”))
  &lt;BR /&gt;
  else {
  &lt;BR /&gt;
  &lt;BR /&gt;
  #COMMENT OUT THE BELOW LINE TO REDUCE OUTPUT!
  &lt;BR /&gt;
  &lt;BR /&gt;
  Write-Output “INFORMATION: $($GPO.DisplayName) ($($GPO.Id)) has an ‘Authenticated Users’ permission”
  &lt;BR /&gt;
  &lt;BR /&gt;
  }&amp;nbsp;&amp;nbsp; #end of else (-not $AuthUser)
  &lt;BR /&gt;
  &lt;BR /&gt;
  }&amp;nbsp;&amp;nbsp; #end of foreach ($GPO in $GPOs)
  &lt;BR /&gt;
  &lt;BR /&gt;
  }&amp;nbsp;&amp;nbsp; #end of if ($GPOs)
  &lt;BR /&gt;
  &lt;BR /&gt;
  &lt;STRONG&gt;
   ===============================================================================
  &lt;/STRONG&gt;
  &lt;BR /&gt;
  &lt;BR /&gt;
  &lt;STRONG&gt;
   Copy above this line
  &lt;/STRONG&gt;
  &lt;BR /&gt;
  &lt;BR /&gt;
  &lt;EM&gt;
   Script courtesy of
  &lt;/EM&gt;
  &lt;A href="https://blogs.technet.microsoft.com/poshchap/2016/06/16/ms16-072-known-issue-use-powershell-to-check-gpos/" target="_blank"&gt;
   &lt;EM&gt;
    https://blogs.technet.microsoft.com/poshchap/2016/06/16/ms16-072-known-issue-use-powershell-to-check-gpos/
   &lt;/EM&gt;
  &lt;/A&gt;
  &lt;BR /&gt;
  &lt;BR /&gt;
  Your resulting testing screen should not show any red warnings and instead be filled with white and yellow comments:
  &lt;BR /&gt;
  &lt;BR /&gt;
  &lt;IMG src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/104639i8D1BDCA4EBAD43FF" /&gt;
  &lt;BR /&gt;
  &lt;BR /&gt;
  Your SBS 2011 default group polices will now function as usual.
  &lt;BR /&gt;
  &lt;BR /&gt;
  If you’d like to make all future group polices you set up work by default with the new behavior, you can follow the advice in&amp;nbsp; the section entitled “Making the change permanent in Active Directory for future / newly born GPOs” in the
  &lt;A href="http://www.gpanswers.com/never-a-dull-moment-with-group-policy-or-what-to-do-about-ms16-072/" target="_blank"&gt;
   Jeremy Moskowitz’s&amp;nbsp; blog
  &lt;/A&gt;
  .
  &lt;BR /&gt;
  &lt;BR /&gt;
  For SBS 2008, you’ll need to manually add the READ permission right to the delegation tab as shown:
  &lt;BR /&gt;
  &lt;BR /&gt;
  &lt;IMG src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/104641i778C4FCC04E6DB59" /&gt;
  &lt;BR /&gt;
  &lt;BR /&gt;
  On the Group policy object of Windows SBS User policy you should now see
  &lt;BR /&gt;
  &lt;BR /&gt;
  &lt;IMG src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/104643i09EB7E82E0BE3A39" /&gt;
 
&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Apr 2019 00:13:16 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-server-essentials-and/windows-sbs-2011-windows-sbs-2008-and-impact-of-ms16-072/ba-p/399057</guid>
      <dc:creator>sbs-team</dc:creator>
      <dc:date>2019-04-05T00:13:16Z</dc:date>
    </item>
    <item>
      <title>Survey - Windows Server Essentials Features</title>
      <link>https://techcommunity.microsoft.com/t5/windows-server-essentials-and/survey-windows-server-essentials-features/ba-p/399040</link>
      <description>&lt;HTML&gt;
 &lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;
  &lt;STRONG&gt;
   First published on TechNet on Feb 23, 2016
  &lt;/STRONG&gt;
  &lt;BR /&gt;
  The Windows Server Essentials team would like to hear from the User Community. You are invited to participate in this program to help us prioritize our feature planning for v.Next products. Your feedback is very important to us.
  &lt;BR /&gt;
  &lt;BR /&gt;
  To participate in this program, please visit the following web site:
  &lt;BR /&gt;
  &lt;BR /&gt;
  &lt;A href="http://wse2014.azurewebsites.net/take_survey.php?x=NTQ0MDI%3D" target="_blank"&gt;
   http://wse2014.azurewebsites.net/take_survey.php?x=NTQ0MDI%3D
  &lt;/A&gt;
 
&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Apr 2019 00:12:07 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-server-essentials-and/survey-windows-server-essentials-features/ba-p/399040</guid>
      <dc:creator>sbs-team</dc:creator>
      <dc:date>2019-04-05T00:12:07Z</dc:date>
    </item>
    <item>
      <title>Update-WSUS 3.0 SP2 on SBS 2011</title>
      <link>https://techcommunity.microsoft.com/t5/windows-server-essentials-and/update-wsus-3-0-sp2-on-sbs-2011/ba-p/399039</link>
      <description>&lt;HTML&gt;
 &lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;
  &lt;STRONG&gt;
   First published on TechNet on Jan 27, 2016
  &lt;/STRONG&gt;
  &lt;BR /&gt;
  &lt;DIV&gt;
   [ This blog is a Re-Post of the Blog Published on the
   &lt;A href="https://techcommunity.microsoft.com/b/sus/" target="_blank"&gt;
    SUS Blog
   &lt;/A&gt;
   ]
   &lt;DIV&gt;
   &lt;/DIV&gt;
   &lt;DIV&gt;
    As indicated in a previous post , we are making changes to WSUS 4.0 and later that will provide a smoother Windows 10 servicing experience. Because WSUS 3.0 SP2 is already in extended support (receiving no support at all after July 2017), and we are not
    &lt;A href="https://techcommunity.microsoft.com/b/wsus/archive/2016/01/22/what-to-do-if-you-re-on-wsus-3-0-sp2-or-sbs-2011.aspx" target="_blank"&gt;
     ...read more
    &lt;/A&gt;
    &lt;BR /&gt;
    &lt;DIV&gt;
    &lt;/DIV&gt;
    &lt;BR /&gt;
   &lt;/DIV&gt;
   &lt;DIV&gt;
   &lt;/DIV&gt;
   &lt;DIV&gt;
    &lt;BR /&gt;
    &lt;DIV&gt;
     Read the complete post at
     &lt;A href="https://techcommunity.microsoft.com/b/wsus/archive/2016/01/22/what-to-do-if-you-re-on-wsus-3-0-sp2-or-sbs-2011.aspx" target="_blank"&gt;
      blogs.technet.com/.../what-to-do-if-you-re-on-wsus-3-0-sp2-or-sbs-2011.aspx
     &lt;/A&gt;
    &lt;/DIV&gt;
    &lt;BR /&gt;
    &lt;DIV&gt;
    &lt;/DIV&gt;
    &lt;BR /&gt;
   &lt;/DIV&gt;
   &lt;DIV&gt;
    &lt;A href="https://techcommunity.microsoft.com/b/sus/archive/tags/WS+2008+R2/default.aspx" target="_blank"&gt;
     WS 2008 R2
    &lt;/A&gt;
    ,
    &lt;A href="https://techcommunity.microsoft.com/b/sus/archive/tags/WSUS+3-0+SP2/default.aspx" target="_blank"&gt;
     WSUS 3.0 SP2
    &lt;/A&gt;
    ,
    &lt;A href="https://techcommunity.microsoft.com/b/sus/archive/tags/WS+2008/default.aspx" target="_blank"&gt;
     WS 2008
    &lt;/A&gt;
    ,
    &lt;A href="https://techcommunity.microsoft.com/b/sus/archive/tags/Windows+10/default.aspx" target="_blank"&gt;
     Windows 10
    &lt;/A&gt;
   &lt;/DIV&gt;
  &lt;/DIV&gt;
  &lt;BR /&gt;
 
&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Apr 2019 00:12:04 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-server-essentials-and/update-wsus-3-0-sp2-on-sbs-2011/ba-p/399039</guid>
      <dc:creator>sbs-team</dc:creator>
      <dc:date>2019-04-05T00:12:04Z</dc:date>
    </item>
    <item>
      <title>WMI Group Policy Filter issue on Windows 10 breaks Folder Redirection Windows Server 2012 R2 Essentials, Windows Server 2012 Essentials and Windows Small Business Server 2011 Essentials</title>
      <link>https://techcommunity.microsoft.com/t5/windows-server-essentials-and/wmi-group-policy-filter-issue-on-windows-10-breaks-folder/ba-p/399038</link>
      <description>&lt;HTML&gt;
 &lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;
  &lt;STRONG&gt;
   First published on TechNet on Jan 22, 2016
  &lt;/STRONG&gt;
  &lt;BR /&gt;
  &lt;P&gt;
   Folder Redirection Group Policy setup by the Essentials Dashboard needs to be modified. The issue is caused by the WMI Group Policy filters which compare OS build number not working as expected on Windows 10.
  &lt;/P&gt;
  &lt;P&gt;
   &lt;A href="https://support.microsoft.com/en-us/kb/3119213" target="_blank"&gt;
    Learn more about the issue
   &lt;/A&gt;
  &lt;/P&gt;
  &lt;P&gt;
   &lt;B&gt;
    User needs to modify the group policy WMI Filter to fix the issue where folder redirection does not work:
   &lt;/B&gt;
  &lt;/P&gt;
  &lt;UL&gt;
   &lt;LI&gt;
    &lt;P&gt;
     &lt;B&gt;
      Launch the group policy management console:
     &lt;/B&gt;
    &lt;/P&gt;
    &lt;UL&gt;
     &lt;LI&gt;
      &lt;P&gt;
       Press Windows Key and “R”
      &lt;/P&gt;
     &lt;/LI&gt;
     &lt;LI&gt;
      &lt;P&gt;
       Popped-up Run windows –Type
       &lt;B&gt;
        gpmc.msc
       &lt;/B&gt;
       in the “Open” text box
      &lt;/P&gt;
     &lt;/LI&gt;
     &lt;LI&gt;
      &lt;P&gt;
       Click
       &lt;B&gt;
        OK
       &lt;/B&gt;
      &lt;/P&gt;
     &lt;/LI&gt;
    &lt;/UL&gt;
   &lt;/LI&gt;
   &lt;LI&gt;
    &lt;P&gt;
     &lt;B&gt;
      Modify the WMI Group Policy Filter as the following:
     &lt;/B&gt;
     &lt;B&gt;
     &lt;/B&gt;
    &lt;/P&gt;
    &lt;UL&gt;
     &lt;LI&gt;
      &lt;P&gt;
       Once you launch the group policy editor, scroll to the bottom where the wmi filters reside.
      &lt;/P&gt;
     &lt;/LI&gt;
     &lt;LI&gt;
      &lt;P&gt;
       Right click it and select “edit”, and bring up the filter.
      &lt;/P&gt;
     &lt;/LI&gt;
     &lt;LI&gt;
      &lt;P&gt;
       Change it from
       &lt;B&gt;
        select * from Win32_OperatingSystem where (Version &amp;gt;= “6.1%”) and ProductType= “1”
       &lt;/B&gt;
       to
       &lt;B&gt;
        select * from Win32_OperatingSystem where Version like “10.%” or Version &amp;gt;=”6.1″
       &lt;/B&gt;
      &lt;/P&gt;
     &lt;/LI&gt;
    &lt;/UL&gt;
   &lt;/LI&gt;
  &lt;/UL&gt;
  &lt;P&gt;
  &lt;/P&gt;
  &lt;P&gt;
   Thanks to
   &lt;I&gt;
    Robert Pearman,
   &lt;/I&gt;
   &lt;I&gt;
    Gary LeTourneau, Susan Bradley and Grey Lancaster.
   &lt;/I&gt;
  &lt;/P&gt;
  &lt;P&gt;
  &lt;/P&gt;
  &lt;BR /&gt;
 
&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Apr 2019 00:12:01 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-server-essentials-and/wmi-group-policy-filter-issue-on-windows-10-breaks-folder/ba-p/399038</guid>
      <dc:creator>sbs-team</dc:creator>
      <dc:date>2019-04-05T00:12:01Z</dc:date>
    </item>
    <item>
      <title>Windows 10 Feature Upgrade breaks client connector for Window Server 2012 R2 Essentials, Windows Server 2012 Essentials and Windows Small Business Server 2011 Essentials</title>
      <link>https://techcommunity.microsoft.com/t5/windows-server-essentials-and/windows-10-feature-upgrade-breaks-client-connector-for-window/ba-p/399036</link>
      <description>&lt;HTML&gt;
 &lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;
  &lt;STRONG&gt;
   First published on TechNet on Jan 22, 2016
  &lt;/STRONG&gt;
  &lt;BR /&gt;
  &lt;P&gt;
   &lt;EM&gt;
    [This post comes to us courtesy of Schumann GE from Product Group and Sandeep Biswas from Global Business Support]
   &lt;/EM&gt;
  &lt;/P&gt;
  &lt;P&gt;
   This article describes the issue – Windows 10 feature upgrade removes the already installed client connector and breaks the Essentials features such as client backup, Remote Web Access, LaunchPad APP etc. The issue only applies to
   &lt;B&gt;
    Windows 10 client
   &lt;/B&gt;
   connected to Windows Server 2012 R2 Essentials, Windows Server 2012 Essentials and Windows Small Business Server 2011 Essentials. This article also covers related topics such as the current workaround and the coming fix.
  &lt;/P&gt;
  &lt;P&gt;
  &lt;/P&gt;
  &lt;P&gt;
   If you have a Windows 10 machine connected to a Windows Server 2012 R2 Essentials, Windows Server 2012 Essentials or Windows Small Business Server 2011 Essentials server and you apply the
   &lt;B&gt;
    Windows 10 feature upgrades (such as 1511),
   &lt;/B&gt;
   all the client connections to Essentials server will be lost. The following features will stop working –
  &lt;/P&gt;
  &lt;UL&gt;
   &lt;LI&gt;
    Client Backups
   &lt;/LI&gt;
   &lt;LI&gt;
    LaunchPad APP
   &lt;/LI&gt;
   &lt;LI&gt;
    Remote Web Access
   &lt;/LI&gt;
   &lt;LI&gt;
    Client Domain-Joined (DNS pointing to Essentials Server will be stopped)
   &lt;/LI&gt;
   &lt;LI&gt;
    Essentials related services will be removed.
    &lt;B&gt;
    &lt;/B&gt;
   &lt;/LI&gt;
  &lt;/UL&gt;
  &lt;P&gt;
   &lt;B&gt;
    What is Windows 10 Feature Upgrade?
   &lt;/B&gt;
  &lt;/P&gt;
  &lt;P&gt;
   In Windows 10, Microsoft publishes two types of Windows 10 releases broadly to the public on an ongoing basis:
  &lt;/P&gt;
  &lt;UL&gt;
   &lt;LI&gt;
    &lt;STRONG&gt;
     Feature upgrades
    &lt;/STRONG&gt;
    that install the latest new features, experiences, and capabilities on devices that are already running Windows 10. Because feature upgrades contain an entire copy of Windows, they are also what customers use to install Windows 10 on existing devices running Windows 7 or Windows 8.1, and on new devices where no operating system is installed.
   &lt;/LI&gt;
   &lt;LI&gt;
    &lt;STRONG&gt;
     Servicing updates
    &lt;/STRONG&gt;
    that focus on the installation of security fixes and other important updates.
   &lt;/LI&gt;
  &lt;/UL&gt;
  &lt;P&gt;
   &lt;A href="https://technet.microsoft.com/en-us/library/mt598226(v=vs.85).aspx" target="_blank"&gt;
    Learn more about Windows 10 servicing options for updates and upgrades.
   &lt;/A&gt;
  &lt;/P&gt;
  &lt;P&gt;
  &lt;/P&gt;
  &lt;P&gt;
   &lt;B&gt;
    Upcoming Fix
   &lt;/B&gt;
  &lt;/P&gt;
  &lt;P&gt;
   Currently we are working with the Windows Core team to fix this issue.
  &lt;/P&gt;
  &lt;UL&gt;
   &lt;LI&gt;
    &lt;P&gt;
     &lt;B&gt;
      Windows Server 2012 R2 Essentials
     &lt;/B&gt;
    &lt;/P&gt;
    &lt;UL&gt;
     &lt;LI&gt;
      &lt;P&gt;
       There will be a new package available for Windows 10 Client Connector of Windows Server 2012 R2 Essentials. There will also be an inbox fix for Windows Server 2012 R2 Essentials for this issue. The inbox fix will be shipped via Windows Update to the server.
      &lt;/P&gt;
     &lt;/LI&gt;
     &lt;LI&gt;
      &lt;P&gt;
       We recommend to connect the Windows 10 client one more time to Windows Server 2012 R2 Essentials when the fix is out.
      &lt;/P&gt;
     &lt;/LI&gt;
    &lt;/UL&gt;
   &lt;/LI&gt;
   &lt;LI&gt;
    &lt;P&gt;
     &lt;B&gt;
      Windows Server 2012 Essentials and Windows Small Business Server 2011 Essentials
     &lt;/B&gt;
    &lt;/P&gt;
    &lt;UL&gt;
     &lt;LI&gt;
      &lt;P&gt;
       Due to different root cause of the issue, the fix on these two products doesn’t require any new package of client connector or server update.&amp;nbsp; Also user doesn’t need to reconnect the Windows 10 client to these servers. The issue will be fixed as the same timeline as Windows Server 2012 R2 fix is out.
      &lt;/P&gt;
     &lt;/LI&gt;
    &lt;/UL&gt;
    &lt;P&gt;
    &lt;/P&gt;
   &lt;/LI&gt;
  &lt;/UL&gt;
  &lt;P&gt;
   We will keep on updating the progress of the fix and announce the release of the fix when it is available. The fix is expected in the coming months; we are trying our best to get it published ASAP. Once there is a more detailed schedule, we will update this blog as well.
  &lt;/P&gt;
  &lt;P&gt;
   We will keep on updating the progress of the fix and announce the release of the fix when it is available. The fix is expected in the coming months; we are trying our best to get it published ASAP. Once there is a more detailed schedule, we will update this blog as well.
  &lt;/P&gt;
  &lt;P&gt;
   &lt;B&gt;
    Current Workaround before the coming fix
   &lt;/B&gt;
  &lt;/P&gt;
  &lt;P&gt;
   Before the fix is out, user has to reconnect the Windows 10 client to the SBS/Essentials server again after any
   &lt;B&gt;
    Windows 10 Feature Upgrade.
   &lt;/B&gt;
  &lt;/P&gt;
  &lt;P&gt;
   Via this blog, we will help to let you know if there is any upcoming Windows 10 Feature upgrade that could break your installed client connector and remind you to connect the client computer again. This is just a temporary solution before the fix is out.
  &lt;/P&gt;
  &lt;P&gt;
   Currently, after Windows 10 feature upgrade, when you connect your Windows 10 client to the SBS/Essentials server, you will find there is no client backup history on the LaunchPad on the client side. This is also a known issue. You can find the history and previous backups on the server Dashboard. This issue will be fixed in the coming fix as well.
  &lt;/P&gt;
  &lt;P&gt;
  &lt;/P&gt;
  &lt;P&gt;
   Thanks to the MVPs, user’s feedback and report on this issue – Susan Bradley, Mark Berry, Tim Groves. We’ll update this blog and also add another post once the fix of this issue is published. Thanks for your support.
  &lt;/P&gt;
  &lt;P&gt;
  &lt;/P&gt;
  &lt;BR /&gt;
 
&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Apr 2019 00:11:58 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-server-essentials-and/windows-10-feature-upgrade-breaks-client-connector-for-window/ba-p/399036</guid>
      <dc:creator>sbs-team</dc:creator>
      <dc:date>2019-04-05T00:11:58Z</dc:date>
    </item>
    <item>
      <title>Changes implemented by Essentials Role on Windows Server 2012 R2</title>
      <link>https://techcommunity.microsoft.com/t5/windows-server-essentials-and/changes-implemented-by-essentials-role-on-windows-server-2012-r2/ba-p/399035</link>
      <description>&lt;HTML&gt;
 &lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;
  &lt;STRONG&gt;
   First published on TechNet on Dec 23, 2015
  &lt;/STRONG&gt;
  &lt;BR /&gt;
  [This post comes to us courtesy of Sandeep Biswas and Rituraj Choudhary from Global Business Support]
  &lt;BR /&gt;
  &lt;BR /&gt;
  Today we will discuss about the changes made to the server when the Essentials Experience role is installed and configured on a Windows Server 2012 R2 machine in an existing Active Directory domain.
  &lt;BR /&gt;
  &lt;BR /&gt;
  The Essentials role requires the following server roles and their dependent features to be installed:
  &lt;BR /&gt;
  &lt;BLOCKQUOTE&gt;
   1.
   &lt;STRONG&gt;
    .Net Framework 4.5 Features
   &lt;/STRONG&gt;
  &lt;/BLOCKQUOTE&gt;
  &lt;BR /&gt;
  &lt;BLOCKQUOTE&gt;
   2.
   &lt;STRONG&gt;
    BranchCache
   &lt;/STRONG&gt;
  &lt;/BLOCKQUOTE&gt;
  &lt;BR /&gt;
  &lt;BLOCKQUOTE&gt;
   3.
   &lt;STRONG&gt;
    Remote Server Administration Tools
   &lt;/STRONG&gt;
  &lt;/BLOCKQUOTE&gt;
  &lt;BR /&gt;
  &lt;BLOCKQUOTE&gt;
   4.
   &lt;STRONG&gt;
    Web Server (IIS)
   &lt;/STRONG&gt;
  &lt;/BLOCKQUOTE&gt;
  &lt;BR /&gt;
  &lt;BLOCKQUOTE&gt;
   5.
   &lt;STRONG&gt;
    Windows Process Activation Service
   &lt;/STRONG&gt;
  &lt;/BLOCKQUOTE&gt;
  &lt;BR /&gt;
  &lt;BLOCKQUOTE&gt;
   6.
   &lt;STRONG&gt;
    Windows Server Backup
   &lt;/STRONG&gt;
  &lt;/BLOCKQUOTE&gt;
  &lt;BR /&gt;
  Additionally, while configuring the server using the
  &lt;B&gt;
   Configure Windows Server Essentials
  &lt;/B&gt;
  wizard, the following role is installed:
  &lt;BR /&gt;
  &lt;BLOCKQUOTE&gt;
   1.
   &lt;STRONG&gt;
    Active Directory Certificate Services
   &lt;/STRONG&gt;
  &lt;/BLOCKQUOTE&gt;
  &lt;BR /&gt;
  When the Essentials role is configured on a Server, it automates certain changes to the server. These are described below:
  &lt;BR /&gt;
  &lt;BR /&gt;
  &lt;STRONG&gt;
   Active Directory Modifications
  &lt;/STRONG&gt;
  &lt;BR /&gt;
  &lt;BR /&gt;
  1. The Server’s machine account is added as a member of the following groups:
  &lt;BR /&gt;
  &lt;BLOCKQUOTE&gt;
   a.
   &lt;B&gt;
    Pre-Windows 2000 Compatible Access
   &lt;/B&gt;
   : A backward compatibility group which allows read access to all users and groups in the domain
  &lt;/BLOCKQUOTE&gt;
  &lt;BR /&gt;
  &lt;BLOCKQUOTE&gt;
   b.
   &lt;B&gt;
    Cert Publishers
   &lt;/B&gt;
   : Members of this group are permitted to publish certificates to the directory
  &lt;/BLOCKQUOTE&gt;
  &lt;BR /&gt;
  2. The following Managed Service Accounts are created:
  &lt;BR /&gt;
  &lt;BLOCKQUOTE&gt;
   a.
   &lt;B&gt;
    MediaAdmin:
   &lt;/B&gt;
   Service account used by Windows Server Essentials Media Streaming Service during configuration
  &lt;/BLOCKQUOTE&gt;
  &lt;BR /&gt;
  &lt;BLOCKQUOTE&gt;
   b.
   &lt;B&gt;
    ServerAdmin
   &lt;/B&gt;
   : Service account used by Windows Server Essentials Management Service during configuration
  &lt;/BLOCKQUOTE&gt;
  &lt;BR /&gt;
  3. The
  &lt;B&gt;
   ServerAdmin
  &lt;/B&gt;
  account is added as a member of the Administrators, Domain Admins and the Enterprise Admins groups. The
  &lt;B&gt;
   MediaAdmin
  &lt;/B&gt;
  account is added as a member of the Administrators group
  &lt;BR /&gt;
  &lt;BR /&gt;
  4. The following Global Security Groups are created:
  &lt;BR /&gt;
  &lt;BLOCKQUOTE&gt;
   a.
   &lt;B&gt;
    WseAltertAdministrators
   &lt;/B&gt;
   : Users with permissions to view alerts in the network
  &lt;/BLOCKQUOTE&gt;
  &lt;BR /&gt;
  &lt;BLOCKQUOTE&gt;
   b.
   &lt;B&gt;
    WseAllowAddInAccess
   &lt;/B&gt;
   : Users with permissions to access Windows Server Essentials Add-ins
  &lt;/BLOCKQUOTE&gt;
  &lt;BR /&gt;
  &lt;BLOCKQUOTE&gt;
   c.
   &lt;B&gt;
    WseAllowComputerAccess
   &lt;/B&gt;
   : Users with permissions to access computer remotely in Remote Web Access
  &lt;/BLOCKQUOTE&gt;
  &lt;BR /&gt;
  &lt;BLOCKQUOTE&gt;
   d.
   &lt;B&gt;
    WseAllowDashboardAccess
   &lt;/B&gt;
   : Users with permissions to access Dashboard remotely in Remote Web Access
  &lt;/BLOCKQUOTE&gt;
  &lt;BR /&gt;
  &lt;BLOCKQUOTE&gt;
   e.
   &lt;B&gt;
    WseAllowHomePageLinks
   &lt;/B&gt;
   : Users with permissions to access links gadget in Remote Web Access
  &lt;/BLOCKQUOTE&gt;
  &lt;BR /&gt;
  &lt;BLOCKQUOTE&gt;
   f.
   &lt;B&gt;
    WseAllowMediaAccess
   &lt;/B&gt;
   : Users with permissions to access the media library in Remote Web Access
  &lt;/BLOCKQUOTE&gt;
  &lt;BR /&gt;
  &lt;BLOCKQUOTE&gt;
   g.
   &lt;B&gt;
    WseAllowShareAccess
   &lt;/B&gt;
   : Users with permissions to access shared folders in Remote Web Access
  &lt;/BLOCKQUOTE&gt;
  &lt;BR /&gt;
  &lt;BLOCKQUOTE&gt;
   h.
   &lt;B&gt;
    WseInvisibleToDashboard
   &lt;/B&gt;
   : Domain users that are hidden from Windows Server Essentials Dashboard
  &lt;/BLOCKQUOTE&gt;
  &lt;BR /&gt;
  &lt;BLOCKQUOTE&gt;
   i.
   &lt;B&gt;
    WseManagedGroups
   &lt;/B&gt;
   : Groups managed by Windows Server Essentials
  &lt;/BLOCKQUOTE&gt;
  &lt;BR /&gt;
  &lt;BLOCKQUOTE&gt;
   j.
   &lt;B&gt;
    WseRemoteAccessUsers
   &lt;/B&gt;
   : Users with permissions to use VPN to connect to the server network remotely
  &lt;/BLOCKQUOTE&gt;
  &lt;BR /&gt;
  &lt;BLOCKQUOTE&gt;
   k.
   &lt;B&gt;
    WseRemoteWebAccessUsers
   &lt;/B&gt;
   : Users with permissions to use Remote Web Access
  &lt;/BLOCKQUOTE&gt;
  &lt;BR /&gt;
  5. The
  &lt;B&gt;
   Domain Admins
  &lt;/B&gt;
  Security group is added as a member of all the Essentials’ specific Global Security groups except the following:
  &lt;BR /&gt;
  &lt;BLOCKQUOTE&gt;
   a. WseInvisibleToDashboard
  &lt;/BLOCKQUOTE&gt;
  &lt;BR /&gt;
  &lt;BLOCKQUOTE&gt;
   b. WseManagedGroups
   &lt;BR /&gt;
   &lt;BR /&gt;
  &lt;/BLOCKQUOTE&gt;
  &lt;BR /&gt;
  &lt;B&gt;
   Windows Server Essentials services that are installed and configured
  &lt;/B&gt;
  &lt;BR /&gt;
  &lt;BR /&gt;
  1.
  &lt;B&gt;
   Windows Server Essentials Computer Backup Service
  &lt;/B&gt;
  : This service helps you to backup data from and restore data to a client computer
  &lt;BR /&gt;
  &lt;BR /&gt;
  2.
  &lt;B&gt;
   Windows Server Essentials Health Service
  &lt;/B&gt;
  : This service evaluates key health criteria and generates alert notifications when an important condition is met
  &lt;BR /&gt;
  &lt;BR /&gt;
  3.
  &lt;B&gt;
   Windows Server Essentials Management Service
  &lt;/B&gt;
  : This is the centralized management pivot for Windows Server Essentials Experience role. It manages system settings and backgrounds of Windows Server Essentials
  &lt;BR /&gt;
  &lt;BR /&gt;
  4.
  &lt;B&gt;
   Windows Server Essentials Media Streaming Service
  &lt;/B&gt;
  : This service provides media streaming from the server to the client computers
  &lt;BR /&gt;
  &lt;BR /&gt;
  5.
  &lt;B&gt;
   Windows Server Essentials Notification Service
  &lt;/B&gt;
  : This service manages the Notifications Provider Service for the Windows Server Essentials Experience role
  &lt;BR /&gt;
  &lt;BR /&gt;
  6.
  &lt;B&gt;
   Windows Server Essentials Provider Registry Service
  &lt;/B&gt;
  : This service registers and enables discoverability of server role services and providers on computers running Windows Server Essentials
  &lt;BR /&gt;
  &lt;BR /&gt;
  7.
  &lt;B&gt;
   Windows Server Essentials Storage Service
  &lt;/B&gt;
  : This service manages the storage of the server
  &lt;BR /&gt;
  &lt;BR /&gt;
  &lt;BR /&gt;
  &lt;BR /&gt;
  &lt;B&gt;
   Web sites that are added and configured to the Internet Information Services (IIS) Manager console
  &lt;/B&gt;
  &lt;BR /&gt;
  &lt;BR /&gt;
  1.
  &lt;B&gt;
   Default Web Site
  &lt;/B&gt;
  &lt;BR /&gt;
  &lt;BR /&gt;
  &lt;STRONG&gt;
  &lt;/STRONG&gt;
  - Bin
  &lt;BR /&gt;
  - CertEnroll
  &lt;BR /&gt;
  - CertSrv
  &lt;BR /&gt;
  - Connect
  &lt;BR /&gt;
  - Customization
  &lt;BR /&gt;
  - home
  &lt;BR /&gt;
  - Remote
  &lt;BR /&gt;
  - Resources
  &lt;BR /&gt;
  - services
  &lt;BR /&gt;
  &lt;BR /&gt;
  2.
  &lt;B&gt;
   Mac Web Service
  &lt;/B&gt;
  &lt;BR /&gt;
  &lt;BR /&gt;
  - bin
  &lt;BR /&gt;
  &lt;BR /&gt;
  3.
  &lt;B&gt;
   WSS Certificate Web Service
  &lt;/B&gt;
  &lt;BR /&gt;
  &lt;BR /&gt;
  &lt;STRONG&gt;
  &lt;/STRONG&gt;
  - Bin
  &lt;BR /&gt;
  - download
  &lt;BR /&gt;
  &lt;BR /&gt;
  &lt;BR /&gt;
  &lt;BR /&gt;
  &lt;B&gt;
   Active Directory Certificate Services components that are configured
  &lt;/B&gt;
  &lt;BR /&gt;
  &lt;BR /&gt;
  1.
  &lt;B&gt;
   Certification Authority
  &lt;/B&gt;
  : Root CA is used to issue certificates to users, computers and services, and to manage their validity
  &lt;BR /&gt;
  &lt;BR /&gt;
  2.
  &lt;B&gt;
   CA Web Enrollment
  &lt;/B&gt;
  : Web enrollment allows users to connect to a CA by means of a Web browser in order to:
  &lt;BR /&gt;
  &lt;UL&gt;
   &lt;BR /&gt;
   &lt;LI&gt;
    Request and review certificate requests
   &lt;/LI&gt;
   &lt;BR /&gt;
   &lt;LI&gt;
    Retrieve certificate revocation lists (CRLs)
   &lt;/LI&gt;
   &lt;BR /&gt;
   &lt;LI&gt;
    Perform smart card certificate enrollment
   &lt;/LI&gt;
   &lt;BR /&gt;
  &lt;/UL&gt;
  &lt;BR /&gt;
  &lt;B&gt;
   Note
  &lt;/B&gt;
  : When you attempt to deploy Windows Server Essentials Experience role on a workgroup box, the configuration will first ask you to bring up a new Active Directory domain and configure other roles and features that the role depends on. Once it completes successfully, the Essentials role configuration will begin. For more information, please refer to
  &lt;A href="http://blogs.technet.com/b/sbs/archive/2013/09/16/installing-and-configuring-the-windows-server-essentials-experience-role.aspx" target="_blank"&gt;
   this
  &lt;/A&gt;
  blog.
 
&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Apr 2019 00:11:55 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-server-essentials-and/changes-implemented-by-essentials-role-on-windows-server-2012-r2/ba-p/399035</guid>
      <dc:creator>sbs-team</dc:creator>
      <dc:date>2019-04-05T00:11:55Z</dc:date>
    </item>
    <item>
      <title>Client Connector availability with Windows Home Server, Small Business Server and Windows Server Essentials for Supported Client OS</title>
      <link>https://techcommunity.microsoft.com/t5/windows-server-essentials-and/client-connector-availability-with-windows-home-server-small/ba-p/399033</link>
      <description>&lt;HTML&gt;
 &lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;
  &lt;STRONG&gt;
   First published on TechNet on Nov 17, 2015
  &lt;/STRONG&gt;
  &lt;BR /&gt;
  &lt;P&gt;
   &lt;EM&gt;
    [This post comes to us courtesy of Schumann GE from Product Group, Sabir Chandwale and Sandeep Biswas from Global Business Support]
   &lt;/EM&gt;
  &lt;/P&gt;
  &lt;P&gt;
   &lt;EM&gt;
    &lt;EM&gt;
     [This post is updated on October 21, 2015]
    &lt;/EM&gt;
   &lt;/EM&gt;
  &lt;/P&gt;
  &lt;P&gt;
  &lt;/P&gt;
  &lt;P&gt;
   In today’s post we will discuss about the client connector availability for supported client OS joined to the following Server OS:
  &lt;/P&gt;
  &lt;P&gt;
  &lt;/P&gt;
  &lt;UL&gt;
   &lt;BR /&gt;
   &lt;LI&gt;
    &lt;BR /&gt;
    &lt;P&gt;
     Windows Home Server 2011
    &lt;/P&gt;
    &lt;BR /&gt;
   &lt;/LI&gt;
   &lt;BR /&gt;
   &lt;LI&gt;
    &lt;BR /&gt;
    &lt;P&gt;
     Small Business Server 2011 Essentials
    &lt;/P&gt;
    &lt;BR /&gt;
   &lt;/LI&gt;
   &lt;BR /&gt;
   &lt;LI&gt;
    &lt;BR /&gt;
    &lt;P&gt;
     Small Business Server 2011 Standard / Premium
    &lt;/P&gt;
    &lt;BR /&gt;
   &lt;/LI&gt;
   &lt;BR /&gt;
   &lt;LI&gt;
    &lt;BR /&gt;
    &lt;P&gt;
     Windows Server Essentials 2012
    &lt;/P&gt;
    &lt;BR /&gt;
   &lt;/LI&gt;
   &lt;BR /&gt;
   &lt;LI&gt;
    &lt;BR /&gt;
    &lt;P&gt;
     Windows Server Essentials 2012 R2
    &lt;/P&gt;
    &lt;BR /&gt;
   &lt;/LI&gt;
   &lt;BR /&gt;
   &lt;LI&gt;
    Windows Server 2012 R2 Standard/Datacenter with Essentials Experience Role
   &lt;/LI&gt;
   &lt;BR /&gt;
  &lt;/UL&gt;
  &lt;P&gt;
   &lt;STRONG&gt;
    &lt;EM&gt;
    &lt;/EM&gt;
   &lt;/STRONG&gt;
  &lt;/P&gt;
  &lt;P&gt;
   &lt;STRONG&gt;
    &lt;EM&gt;
     Client OS: Windows 7
    &lt;/EM&gt;
   &lt;/STRONG&gt;
  &lt;/P&gt;
  &lt;TABLE&gt;
   &lt;TBODY&gt;&lt;TR&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;DIV&gt;
      &lt;B&gt;
       SERVER OS
      &lt;/B&gt;
     &lt;/DIV&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;DIV&gt;
      &lt;B&gt;
       Client OS
      &lt;/B&gt;
      &lt;B&gt;
      &lt;/B&gt;
     &lt;/DIV&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
   &lt;/TR&gt;
   &lt;TR&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;DIV&gt;
      &lt;B&gt;
       Windows 7
      &lt;/B&gt;
     &lt;/DIV&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
   &lt;/TR&gt;
   &lt;TR&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;DIV&gt;
      &lt;B&gt;
       Installation
      &lt;/B&gt;
     &lt;/DIV&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;DIV&gt;
      &lt;B&gt;
       Client Connect to Server
      &lt;/B&gt;
     &lt;/DIV&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;DIV&gt;
      &lt;B&gt;
       Client Backup
      &lt;/B&gt;
     &lt;/DIV&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;DIV&gt;
      &lt;B&gt;
       Client Backup restore
      &lt;/B&gt;
     &lt;/DIV&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;DIV&gt;
      &lt;B&gt;
       Package availability
      &lt;/B&gt;
     &lt;/DIV&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;DIV&gt;
      &lt;B&gt;
       Known Issue
      &lt;/B&gt;
     &lt;/DIV&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
   &lt;/TR&gt;
   &lt;TR&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;DIV&gt;
      &lt;B&gt;
       Windows Home Server 2011
      &lt;/B&gt;
     &lt;/DIV&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;P&gt;
      Working
     &lt;/P&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;P&gt;
      Working
     &lt;/P&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;P&gt;
      Working
     &lt;/P&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;P&gt;
      Working
     &lt;/P&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;P&gt;
      INBOX
     &lt;/P&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;P&gt;
      NONE
     &lt;/P&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
   &lt;/TR&gt;
   &lt;TR&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;DIV&gt;
      &lt;B&gt;
       Small Business Server 2011 Essentials
      &lt;/B&gt;
     &lt;/DIV&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;P&gt;
      Working
     &lt;/P&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;P&gt;
      Working
     &lt;/P&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;P&gt;
      Working
     &lt;/P&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;P&gt;
      Working
     &lt;/P&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;P&gt;
      INBOX
     &lt;/P&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;P&gt;
      NONE
     &lt;/P&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
   &lt;/TR&gt;
   &lt;TR&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;DIV&gt;
      &lt;B&gt;
       Small Business Server 2011 Standard
      &lt;/B&gt;
     &lt;/DIV&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;P&gt;
      Working
     &lt;/P&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;P&gt;
      Working
     &lt;/P&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;P&gt;
      NA
     &lt;/P&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;P&gt;
      NA
     &lt;/P&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;P&gt;
      INBOX
     &lt;/P&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;P&gt;
      NONE
     &lt;/P&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
   &lt;/TR&gt;
   &lt;TR&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;DIV&gt;
      &lt;B&gt;
       Windows Server Essentials 2012
      &lt;/B&gt;
     &lt;/DIV&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;P&gt;
      Working
     &lt;/P&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;P&gt;
      Working
     &lt;/P&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;P&gt;
      Working
     &lt;/P&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;P&gt;
      Working
     &lt;/P&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;P&gt;
      INBOX
     &lt;/P&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;P&gt;
      NONE
     &lt;/P&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
   &lt;/TR&gt;
   &lt;TR&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;DIV&gt;
      &lt;B&gt;
       Windows Server Essentials 2012 R2
      &lt;/B&gt;
     &lt;/DIV&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;P&gt;
      Working
     &lt;/P&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;P&gt;
      Working
     &lt;/P&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;P&gt;
      Working
     &lt;/P&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;P&gt;
      Working after client OS
      &lt;A href="https://support.microsoft.com/en-us/kb/3045682" title="You cannot restore files and folders from Server Essentials Backup on a Windows-based computer" target="_blank"&gt;
       hotfix
      &lt;/A&gt;
      installation
     &lt;/P&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;P&gt;
      Auto download from DLC
     &lt;/P&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;P&gt;
      NONE
     &lt;/P&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
   &lt;/TR&gt;
  &lt;/TBODY&gt;&lt;/TABLE&gt;
  &lt;P&gt;
  &lt;/P&gt;
  &lt;P&gt;
   &lt;STRONG&gt;
    &lt;EM&gt;
     Client OS: Windows 8/8.1
    &lt;/EM&gt;
   &lt;/STRONG&gt;
  &lt;/P&gt;
  &lt;TABLE&gt;
   &lt;TBODY&gt;&lt;TR&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;DIV&gt;
      &lt;B&gt;
       SERVER OS
      &lt;/B&gt;
      &lt;B&gt;
      &lt;/B&gt;
     &lt;/DIV&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;DIV&gt;
      &lt;B&gt;
       Client OS
      &lt;/B&gt;
      &lt;B&gt;
      &lt;/B&gt;
     &lt;/DIV&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
   &lt;/TR&gt;
   &lt;TR&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;DIV&gt;
      &lt;B&gt;
       Windows 8 / Windows 8.1
      &lt;/B&gt;
     &lt;/DIV&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
   &lt;/TR&gt;
   &lt;TR&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;DIV&gt;
      &lt;B&gt;
       Installation
      &lt;/B&gt;
     &lt;/DIV&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;DIV&gt;
      &lt;B&gt;
       Client Connect to Server
      &lt;/B&gt;
     &lt;/DIV&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;DIV&gt;
      &lt;B&gt;
       Client Backup
      &lt;/B&gt;
     &lt;/DIV&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;DIV&gt;
      &lt;B&gt;
       Client Backup restore
      &lt;/B&gt;
     &lt;/DIV&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;DIV&gt;
      &lt;B&gt;
       Package availability
      &lt;/B&gt;
     &lt;/DIV&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;DIV&gt;
      &lt;B&gt;
       Known Issue
      &lt;/B&gt;
     &lt;/DIV&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
   &lt;/TR&gt;
   &lt;TR&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;DIV&gt;
      &lt;B&gt;
       Windows Home Server 2011
      &lt;/B&gt;
     &lt;/DIV&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;P&gt;
      Working
     &lt;/P&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;P&gt;
      Working
     &lt;/P&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;P&gt;
      Working
     &lt;/P&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;P&gt;
      Working
     &lt;/P&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;P&gt;
      INBOX
     &lt;/P&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;P&gt;
      NONE
     &lt;/P&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
   &lt;/TR&gt;
   &lt;TR&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;DIV&gt;
      &lt;B&gt;
       Small Business Server 2011 Essentials
      &lt;/B&gt;
     &lt;/DIV&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;P&gt;
      Working
     &lt;/P&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;P&gt;
      Working
     &lt;/P&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;P&gt;
      Working
     &lt;/P&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;P&gt;
      Working
     &lt;/P&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;P&gt;
      INBOX
     &lt;/P&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;P&gt;
      NONE
     &lt;/P&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
   &lt;/TR&gt;
   &lt;TR&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;DIV&gt;
      &lt;B&gt;
       Small Business Server 2011 Standard
      &lt;/B&gt;
     &lt;/DIV&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;P&gt;
      Working
     &lt;/P&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;P&gt;
      Working
     &lt;/P&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;P&gt;
      NA
     &lt;/P&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;P&gt;
      NA
     &lt;/P&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;P&gt;
      INBOX
     &lt;/P&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;P&gt;
      NONE
     &lt;/P&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
   &lt;/TR&gt;
   &lt;TR&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;DIV&gt;
      &lt;B&gt;
       Windows Server Essentials 2012
      &lt;/B&gt;
     &lt;/DIV&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;P&gt;
      Working
     &lt;/P&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;P&gt;
      Working
     &lt;/P&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;P&gt;
      Working
     &lt;/P&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;P&gt;
      Working
     &lt;/P&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;P&gt;
      INBOX
     &lt;/P&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;P&gt;
      NONE
     &lt;/P&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
   &lt;/TR&gt;
   &lt;TR&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;DIV&gt;
      &lt;B&gt;
       Windows Server Essentials 2012 R2
      &lt;/B&gt;
     &lt;/DIV&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;P&gt;
      Working
     &lt;/P&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;P&gt;
      Working
     &lt;/P&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;P&gt;
      Working
     &lt;/P&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;P&gt;
      Working after client OS
      &lt;A href="https://support.microsoft.com/en-us/kb/3045682" title="You cannot restore files and folders from Server Essentials Backup on a Windows-based computer" target="_blank"&gt;
       hotfix
      &lt;/A&gt;
      installation
     &lt;/P&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;P&gt;
      Auto download from DLC
     &lt;/P&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;P&gt;
      NONE
     &lt;/P&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
   &lt;/TR&gt;
  &lt;/TBODY&gt;&lt;/TABLE&gt;
  &lt;P&gt;
   &lt;STRONG&gt;
    &lt;EM&gt;
     &lt;EM&gt;
      &lt;STRONG&gt;
       Client OS:
      &lt;/STRONG&gt;
     &lt;/EM&gt;
     &lt;I&gt;
      &lt;B&gt;
       Windows
      &lt;/B&gt;
     &lt;/I&gt;
     &lt;I&gt;
      &lt;B&gt;
      &lt;/B&gt;
     &lt;/I&gt;
     &lt;B&gt;
      &lt;I&gt;
       10 RTM
      &lt;/I&gt;
     &lt;/B&gt;
    &lt;/EM&gt;
   &lt;/STRONG&gt;
  &lt;/P&gt;
  &lt;TABLE&gt;
   &lt;TBODY&gt;&lt;TR&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;DIV&gt;
      &lt;STRONG&gt;
       SERVER OS
      &lt;/STRONG&gt;
     &lt;/DIV&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;DIV&gt;
      &lt;B&gt;
       Client OS
      &lt;/B&gt;
      &lt;B&gt;
      &lt;/B&gt;
     &lt;/DIV&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
   &lt;/TR&gt;
   &lt;TR&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;DIV&gt;
      &lt;B&gt;
       Windows 10 RTM
      &lt;/B&gt;
     &lt;/DIV&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
   &lt;/TR&gt;
   &lt;TR&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;DIV&gt;
      &lt;B&gt;
       Installation
      &lt;/B&gt;
     &lt;/DIV&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;DIV&gt;
      &lt;B&gt;
       Client Connect to Server
      &lt;/B&gt;
     &lt;/DIV&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;DIV&gt;
      &lt;B&gt;
       Client Backup
      &lt;/B&gt;
     &lt;/DIV&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;DIV&gt;
      &lt;B&gt;
       Client Backup restore
      &lt;/B&gt;
     &lt;/DIV&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;DIV&gt;
      &lt;B&gt;
       Package availability
      &lt;/B&gt;
     &lt;/DIV&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;DIV&gt;
      &lt;B&gt;
       Known Issue
      &lt;/B&gt;
     &lt;/DIV&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
   &lt;/TR&gt;
   &lt;TR&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;DIV&gt;
      &lt;B&gt;
       Windows Home Server 2011
      &lt;/B&gt;
     &lt;/DIV&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;DIV&gt;
      Working
     &lt;/DIV&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;DIV&gt;
      Working
     &lt;/DIV&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;DIV&gt;
      Working
     &lt;/DIV&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;DIV&gt;
      Working
     &lt;/DIV&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;DIV&gt;
      INBOX
     &lt;/DIV&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;DIV&gt;
      NONE
     &lt;/DIV&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
   &lt;/TR&gt;
   &lt;TR&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;DIV&gt;
      &lt;B&gt;
       Small Business Server 2011 Essentials
      &lt;/B&gt;
     &lt;/DIV&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;DIV&gt;
      Working
     &lt;/DIV&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;DIV&gt;
      Working
     &lt;/DIV&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;DIV&gt;
      Working
     &lt;/DIV&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;DIV&gt;
      Working
     &lt;/DIV&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;DIV&gt;
      INBOX
     &lt;/DIV&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;DIV&gt;
      NONE
     &lt;/DIV&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
   &lt;/TR&gt;
   &lt;TR&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;DIV&gt;
      &lt;B&gt;
       Small Business Server 2011 Standard
      &lt;/B&gt;
     &lt;/DIV&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;DIV&gt;
      Working
     &lt;/DIV&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;DIV&gt;
      Working with work-around
     &lt;/DIV&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;DIV&gt;
      NA
     &lt;/DIV&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;DIV&gt;
      NA
     &lt;/DIV&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;DIV&gt;
      INBOX
     &lt;/DIV&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;DIV&gt;
      &lt;B&gt;
       Follow instructions as mentioned under Appendix-A
      &lt;/B&gt;
     &lt;/DIV&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
   &lt;/TR&gt;
   &lt;TR&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;DIV&gt;
      &lt;B&gt;
       Windows Server Essentials 2012
      &lt;/B&gt;
     &lt;/DIV&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;DIV&gt;
      Working
     &lt;/DIV&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;DIV&gt;
      Working
     &lt;/DIV&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;DIV&gt;
      Working
     &lt;/DIV&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;DIV&gt;
      Working
     &lt;/DIV&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;DIV&gt;
      INBOX
     &lt;/DIV&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;DIV&gt;
      NONE
     &lt;/DIV&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
   &lt;/TR&gt;
   &lt;TR&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;DIV&gt;
      &lt;B&gt;
       Windows Server Essentials 2012 R2
      &lt;/B&gt;
     &lt;/DIV&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;DIV&gt;
      &lt;B&gt;
       Requires&amp;nbsp; manually&amp;nbsp; installation
      &lt;/B&gt;
     &lt;/DIV&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;DIV&gt;
      Working
     &lt;/DIV&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;DIV&gt;
      Working
     &lt;/DIV&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;DIV&gt;
      Working
     &lt;/DIV&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;DIV&gt;
     &lt;/DIV&gt;
     &lt;BR /&gt;
     &lt;DIV&gt;
      &lt;B&gt;
       &lt;A href="http://download.microsoft.com/download/3/2/8/3280252F-E15C-4D80-8707-B293EA488FAA/Windows10.0-KB2790621-x64.msu" title="X64 Client Connector" target="_blank"&gt;
        X64
       &lt;/A&gt;
      &lt;/B&gt;
     &lt;/DIV&gt;
     &lt;BR /&gt;
     &lt;DIV&gt;
      &lt;B&gt;
      &lt;/B&gt;
     &lt;/DIV&gt;
     &lt;BR /&gt;
     &lt;DIV&gt;
      &lt;B&gt;
       &lt;A href="http://download.microsoft.com/download/3/2/8/3280252F-E15C-4D80-8707-B293EA488FAA/Windows10.0-KB2790621-x86.msu" title="X86 Client Connector" target="_blank"&gt;
        X86
       &lt;/A&gt;
       &lt;BR /&gt;
      &lt;/B&gt;
     &lt;/DIV&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
    &lt;TD&gt;
     &lt;BR /&gt;
     &lt;DIV&gt;
      &lt;B&gt;
       User needs to manually download and install the client connector until the fix on the server is available which is being targeted to be released tentatively in October&amp;nbsp; November 17, 2015.
      &lt;/B&gt;
     &lt;/DIV&gt;
     &lt;BR /&gt;
    &lt;/TD&gt;
   &lt;/TR&gt;
  &lt;/TBODY&gt;&lt;/TABLE&gt;
  &lt;P&gt;
   &lt;STRONG&gt;
    Appendix-A
   &lt;/STRONG&gt;
  &lt;/P&gt;
  &lt;P&gt;
   &lt;B&gt;
    &lt;I&gt;
     User needs to add the following two lines to the XML file on the server located at -
     &lt;BR /&gt;
     C:\Program Files\Windows Small Business Server\Bin\WebApp\ClientDeployment\packageFiles\supportedOS.xml
    &lt;/I&gt;
   &lt;/B&gt;
  &lt;/P&gt;
  &lt;P&gt;
   &lt;B&gt;
    &lt;I&gt;
     &lt;BR /&gt;
    &lt;/I&gt;
   &lt;/B&gt;
   &amp;lt;OS Architecture="9" RequiredProductType="1" RequiredSuite="" ExcludedSuite="512" SPMinor="" SPMajor="" Build="10240" Minor="0" Major="10" Name="Windows 10, AMD64" id="9"/&amp;gt;
   &lt;BR /&gt;
   &amp;lt;OS Architecture="0" RequiredProductType="1" RequiredSuite="" ExcludedSuite="512" SPMinor="" SPMajor="" Build="10240" Minor="0" Major="10" Name="Windows 10, x86" id="10"/&amp;gt;
  &lt;/P&gt;
  &lt;P&gt;
  &lt;/P&gt;
  &lt;P&gt;
   &lt;STRONG&gt;
    &lt;EM&gt;
     So what do we mean by the te
     &lt;STRONG&gt;
      &lt;EM&gt;
       rms used above:
      &lt;/EM&gt;
     &lt;/STRONG&gt;
    &lt;/EM&gt;
   &lt;/STRONG&gt;
  &lt;/P&gt;
  &lt;P&gt;
   &lt;STRONG&gt;
    Working:
   &lt;/STRONG&gt;
   No user functional loss when the client OS is upgraded to Windows 10 RTM. There is no change on the Current User Experience
  &lt;/P&gt;
  &lt;UL&gt;
   &lt;BR /&gt;
   &lt;LI&gt;
    &lt;STRONG&gt;
     INBOX:
    &lt;/STRONG&gt;
    The client connector software is available on the respective server and it is not required by the user to download it manually and install. There is no change on the Current User Experience
   &lt;/LI&gt;
   &lt;BR /&gt;
   &lt;LI&gt;
    &lt;B&gt;
     Auto download from DLC
    &lt;/B&gt;
    &lt;B&gt;
     :
    &lt;/B&gt;
    The client connector software is automatically downloaded from the download center when user runs
    &lt;A href="http://servername/connect" target="_blank"&gt;
     http://servername/connect
    &lt;/A&gt;
    on the client. There is no change on the Current User Experience
   &lt;/LI&gt;
   &lt;BR /&gt;
   &lt;LI&gt;
    &lt;B&gt;
     Working after client OS hotfix installation:
    &lt;/B&gt;
    It requires the user to install the client OS
    &lt;A href="/controlpanel/blogs/posteditor.aspx/&amp;lt;a%20title=%22You%20cannot%20restore%20files%20and%20folders%20from%20Server%20Essentials%20Backup%20on%20a%20Windows-based%20computer%22%20href=%22/controlpanel/blogs/posteditor.aspx/&amp;amp;lt;a%20href=&amp;amp;quot;https:/support.microsoft.com/en-us/kb/3045682&amp;amp;quot;%20target=&amp;amp;quot;_blank&amp;amp;quot;&amp;amp;gt;Hotfix&amp;amp;lt;/a&amp;amp;gt;%22&amp;gt;Hotfix&amp;lt;/a&amp;gt;" title="You cannot restore files and folders from Server Essentials Backup on a Windows-based computer"&gt;
     Hotfix
    &lt;/A&gt;
    manually for the Client Restore to function properly
   &lt;/LI&gt;
   &lt;BR /&gt;
   &lt;LI&gt;
    &lt;B&gt;
     NA:
    &lt;/B&gt;
    The respective feature is not applicable
   &lt;/LI&gt;
   &lt;BR /&gt;
   &lt;LI&gt;
    &lt;STRONG&gt;
     &lt;B&gt;
      &lt;B&gt;
       NONE:
      &lt;/B&gt;
     &lt;/B&gt;
    &lt;/STRONG&gt;
    No issues experienced while in-house repro
    &lt;BR /&gt;
   &lt;/LI&gt;
   &lt;BR /&gt;
  &lt;/UL&gt;
  &lt;P&gt;
  &lt;/P&gt;
  &lt;P&gt;
   &lt;STRONG&gt;
    Resolution (Updated on 29/07/2015):
   &lt;/STRONG&gt;
  &lt;/P&gt;
  &lt;P&gt;
   &lt;STRONG&gt;
    The Client Connector for Windows 10 to connect to Windows Server 2012 R2 Essentials has been released.
   &lt;/STRONG&gt;
  &lt;/P&gt;
  &lt;P&gt;
   &lt;STRONG&gt;
    For x64 bit Windows 10 Client download it from
    &lt;A href="http://download.microsoft.com/download/3/2/8/3280252F-E15C-4D80-8707-B293EA488FAA/Windows10.0-KB2790621-x64.msu" title="Windows 10 Client Connector for Windows Server 2012 R2 Essentials x64 " target="_blank"&gt;
     here
    &lt;/A&gt;
    .
   &lt;/STRONG&gt;
  &lt;/P&gt;
  &lt;P&gt;
   &lt;STRONG&gt;
    For x86 bit Windows 10 Client download it form
    &lt;A href="http://download.microsoft.com/download/3/2/8/3280252F-E15C-4D80-8707-B293EA488FAA/Windows10.0-KB2790621-x86.msu" title="Windows 10 Client Connector for Windows Server 2012 R2 Essentials x86." target="_blank"&gt;
     here
    &lt;/A&gt;
    .
   &lt;/STRONG&gt;
  &lt;/P&gt;
  &lt;P&gt;
   &lt;STRONG&gt;
    Note
   &lt;/STRONG&gt;
   &lt;STRONG&gt;
    &lt;EM&gt;
     :
    &lt;/EM&gt;
   &lt;/STRONG&gt;
  &lt;/P&gt;
  &lt;P&gt;
   -
   &lt;STRONG&gt;
    The Client Connector needs to be manually downloaded and installed on the Windows 10 Client OS
   &lt;/STRONG&gt;
   . Once the installation is completed follow the steps listed below,
  &lt;/P&gt;
  &lt;DIV&gt;
   &lt;BR /&gt;
   &lt;P&gt;
    - Click on Start, All Apps
   &lt;/P&gt;
   &lt;BR /&gt;
   &lt;P&gt;
    - Scroll down till "Windows Server Essentials", expand and run "Windows Server Essentials Connector Configuration Wizard".
   &lt;/P&gt;
   &lt;BR /&gt;
   &lt;P&gt;
    This is a known issue and the fix on the server is being targeted to be released tentatively in October 2015.
   &lt;/P&gt;
   &lt;BR /&gt;
   &lt;P&gt;
    Once the fix is patched, then there will be no user intervention required, all the downloading, installation and configuration will be automatically carried out
   &lt;/P&gt;
   &lt;BR /&gt;
   &lt;P&gt;
    - With the release of Windows Server 2016 Essentials, all client connector software will be available and no user intervention will be needed.
   &lt;/P&gt;
   &lt;BR /&gt;
  &lt;/DIV&gt;
  &lt;P&gt;
   &lt;STRONG&gt;
   &lt;/STRONG&gt;
  &lt;/P&gt;
  &lt;P&gt;
   &lt;STRONG&gt;
    &lt;B&gt;
     Update&amp;nbsp;(21/10/2015):
    &lt;/B&gt;
   &lt;/STRONG&gt;
   &lt;STRONG&gt;
    &lt;B&gt;
     &lt;BR /&gt;
    &lt;/B&gt;
   &lt;/STRONG&gt;
  &lt;/P&gt;
  &lt;P&gt;
  &lt;/P&gt;
  &lt;DIV&gt;
   &lt;BR /&gt;
   &lt;P&gt;
    - There will be a Windows Update released on 17th,November 2015 for Windows Server 2012 R2 Essentials.
   &lt;/P&gt;
   &lt;BR /&gt;
   &lt;P&gt;
    - This Windows Update will enable the Windows 10 clients to be joined to the Windows Server 2012 R2 Essentials.&amp;nbsp;In current scenario,&amp;nbsp;the user has to download and install the client connector&amp;nbsp;&amp;nbsp; manually&amp;nbsp;on the Windows 10 client, this manual process would not be required after applying this Windows Update to the Server.
   &lt;/P&gt;
   &lt;BR /&gt;
   &lt;P&gt;
    - This Windows Update will not affect any of the existing Windows 10 clients connected to the Windows Server 2012 R2 Essentials.
   &lt;/P&gt;
   &lt;BR /&gt;
   &lt;P&gt;
   &lt;/P&gt;
   &lt;BR /&gt;
   &lt;P&gt;
    &lt;STRONG&gt;
     &lt;B&gt;
      Update&amp;nbsp;(17/11/2015):
     &lt;/B&gt;
    &lt;/STRONG&gt;
    &lt;STRONG&gt;
     &lt;B&gt;
      &lt;BR /&gt;
     &lt;/B&gt;
    &lt;/STRONG&gt;
   &lt;/P&gt;
   &lt;BR /&gt;
   &lt;P&gt;
    The update to support auto-redirection of Windows Server 2012 R2 Essentials for Windows 10 client connector is now available at:
    &lt;BR /&gt;
   &lt;/P&gt;
   &lt;BR /&gt;
   &lt;P&gt;
    &lt;A href="https://support.microsoft.com/en-us/kb/3105885" target="_blank"&gt;
     https://support.microsoft.com/en-us/kb/3105885
    &lt;/A&gt;
   &lt;/P&gt;
   &lt;BR /&gt;
  &lt;/DIV&gt;
  &lt;P&gt;
  &lt;/P&gt;
  &lt;BR /&gt;
 
&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Apr 2019 00:11:50 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-server-essentials-and/client-connector-availability-with-windows-home-server-small/ba-p/399033</guid>
      <dc:creator>sbs-team</dc:creator>
      <dc:date>2019-04-05T00:11:50Z</dc:date>
    </item>
  </channel>
</rss>

