<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>Windows Server for IT Pro topics</title>
    <link>https://techcommunity.microsoft.com/t5/windows-server-for-it-pro/bd-p/WindowsServer</link>
    <description>Windows Server for IT Pro topics</description>
    <pubDate>Thu, 23 Apr 2026 09:13:43 GMT</pubDate>
    <dc:creator>WindowsServer</dc:creator>
    <dc:date>2026-04-23T09:13:43Z</dc:date>
    <item>
      <title>Windows Server 2025 - Cannot Pin Tools and Apps on Start Menu</title>
      <link>https://techcommunity.microsoft.com/t5/windows-server-for-it-pro/windows-server-2025-cannot-pin-tools-and-apps-on-start-menu/m-p/4512682#M12989</link>
      <description>&lt;P&gt;I am evaluating Windows Server 2025,&amp;nbsp;Version 24H2 (OS Build 26100.32690)&lt;/P&gt;&lt;P&gt;I am unable to pin Admin Tools or any other app on Start Menu.&lt;/P&gt;&lt;P&gt;Taskbar pinning works well but not the Start Menu.&lt;/P&gt;&lt;P&gt;Anyone experiencing the same ?&lt;/P&gt;</description>
      <pubDate>Sun, 19 Apr 2026 10:41:32 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-server-for-it-pro/windows-server-2025-cannot-pin-tools-and-apps-on-start-menu/m-p/4512682#M12989</guid>
      <dc:creator>Kayyum M</dc:creator>
      <dc:date>2026-04-19T10:41:32Z</dc:date>
    </item>
    <item>
      <title>sign RDP file with timestamp</title>
      <link>https://techcommunity.microsoft.com/t5/windows-server-for-it-pro/sign-rdp-file-with-timestamp/m-p/4512399#M12976</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;after installing the April 2026 update, our customers experience warning messages when using RDP files to connect to their servers hosted by us.&lt;/P&gt;&lt;P&gt;We need to sign the RDP files. But we need to include a timestamp, so the signature stays valid after certificate expiration.&lt;/P&gt;&lt;P&gt;rdpsign.exe does not support timestamping. Set-AuthenticodeSignature is unable to access the private key of our code signing certificate which is stored on a HSM. signtool.exe does not support RDP files.&lt;/P&gt;&lt;P&gt;What is the recommended procedure in this case?&lt;/P&gt;&lt;P&gt;Thank you!&lt;/P&gt;</description>
      <pubDate>Fri, 17 Apr 2026 10:02:37 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-server-for-it-pro/sign-rdp-file-with-timestamp/m-p/4512399#M12976</guid>
      <dc:creator>mkrummenacher</dc:creator>
      <dc:date>2026-04-17T10:02:37Z</dc:date>
    </item>
    <item>
      <title>Domain users not able to logon with their password event though it has not been changed....</title>
      <link>https://techcommunity.microsoft.com/t5/windows-server-for-it-pro/domain-users-not-able-to-logon-with-their-password-event-though/m-p/4511948#M12971</link>
      <description>&lt;P&gt;Hi, we have this weird problem where some of the users suddenly can't login to their computer with the password they have used for almost 20 years (yes sorry, bad practise).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When the user reports it I check that I can logon to the computer with my own account (not 20 year old password) which works fine. I check the event log for problems both on the client and the DC and all I see is see which I can relate to the problem is event id 4625 with an error code which means bad password.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I check the AD account and see that pwdLastSet has a date in 2006 (not quite 20 years, but close) and I check that the account is not logged out or expired. Also make sure that the password never expires is enabled, so in my book these are all the checks needed and problem not solved.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I then change the password to the same password that the user has had for almost 20 years and problem solved, but problem source not found.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This has happend to 3-4 users within the last week or two, even a service user with domain admin permissions, only thing I pay note to that they have in common is the pwdLastSet in 2006, but I really can't seem to get my head around this being the issue.&amp;nbsp; Also only other thing I can think of that has changed is that the old DC has been removed a few months ago, and a new 2025 DC has been introduced. promote/demote went without issues and this problem didn't surface before now several weeks after the DC change.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So if anyone has experienced something similar or perhaps can point me in a direction for further troubleshooting please let me know.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thansk&lt;/P&gt;&lt;P&gt;Thomas&lt;/P&gt;</description>
      <pubDate>Thu, 16 Apr 2026 10:04:06 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-server-for-it-pro/domain-users-not-able-to-logon-with-their-password-event-though/m-p/4511948#M12971</guid>
      <dc:creator>StoreThomas</dc:creator>
      <dc:date>2026-04-16T10:04:06Z</dc:date>
    </item>
    <item>
      <title>Phase 2 of Kerberos RC4 hardening begins with the April 2026 Windows security update</title>
      <link>https://techcommunity.microsoft.com/t5/windows-server-for-it-pro/phase-2-of-kerberos-rc4-hardening-begins-with-the-april-2026/m-p/4511702#M12970</link>
      <description>&lt;P&gt;Windows updates released in April 2026 and later begin the&amp;nbsp;&lt;A href="https://support.microsoft.com/topic/1ebcda33-720a-4da8-93c1-b0496e1910dc#ID0EDDBN" data-linktype="external" target="_blank"&gt;second deployment phase&lt;/A&gt;&amp;nbsp;of protections designed to address a Kerberos information disclosure vulnerability (&lt;A href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20833" data-linktype="external" target="_blank"&gt;CVE‑2026‑20833&lt;/A&gt;). This second phase continues the shift away from legacy encryption types such as RC4 by moving toward stronger default ticket behavior. After installing the April 2026 update, domain controllers default to supporting Advanced Encryption Standard (AES‑SHA1) encrypted tickets for accounts that do not have an explicit Kerberos encryption type configuration.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If your organization relies on service accounts or applications that depend on RC4-based Kerberos service tickets, now is the time to address those dependencies to avoid authentication issues before the Enforcement phase begins in July 2026. Microsoft recommends continuing to monitor the System event log for Kerberos-related audit events and&amp;nbsp;&lt;A href="https://support.microsoft.com/topic/1ebcda33-720a-4da8-93c1-b0496e1910dc#ID0EDDBL" data-linktype="external" target="_blank"&gt;identify and address misconfigurations or remaining dependencies&lt;/A&gt;, then enabling enforcement when warning, blocking, or policy events are no longer logged.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;See&amp;nbsp;&lt;A href="https://support.microsoft.com/topic/1ebcda33-720a-4da8-93c1-b0496e1910dc" data-linktype="external" target="_blank"&gt;How to manage Kerberos KDC usage of RC4 for service account ticket issuance changes related to CVE-2026-20833&lt;/A&gt;&amp;nbsp;and&amp;nbsp;&lt;A href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20833" data-linktype="external" target="_blank"&gt;CVE‑2026‑20833&lt;/A&gt; to learn more about the vulnerability, timelines, recommended preparation steps, and configuration options to ensure compliance before Enforcement mode begins in July 2026.&lt;/P&gt;</description>
      <pubDate>Wed, 15 Apr 2026 18:42:48 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-server-for-it-pro/phase-2-of-kerberos-rc4-hardening-begins-with-the-april-2026/m-p/4511702#M12970</guid>
      <dc:creator>ChrisWright</dc:creator>
      <dc:date>2026-04-15T18:42:48Z</dc:date>
    </item>
    <item>
      <title>2026-04 Update Breaks Domain Logins</title>
      <link>https://techcommunity.microsoft.com/t5/windows-server-for-it-pro/2026-04-update-breaks-domain-logins/m-p/4511399#M12969</link>
      <description>&lt;P&gt;I have an Active Directory domain that is old (from 2000!) that has been upgraded and moved to newer versions of Windows Server and Active Directory.&amp;nbsp; &amp;nbsp;I have domain controller VMs running Windows Server 2025 Standard Edition.&amp;nbsp; Unfortunately they installed the latest 2026-04 patches which my have changed the Kerberos encryption from RC4 to AES.&amp;nbsp; This has resulted in my not being able to log into any Active Directory domain accounts and the domain controllers themselves.&amp;nbsp; I can only log into workstations using the local account.&lt;/P&gt;&lt;P&gt;Suffice to say this a nightmare.&amp;nbsp; Any ideas how to fix it since I can't access the usual tools like Active Directory Users and Computers, Hyper-V won't connect to the VMs, etc.&amp;nbsp; Thanks.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;S&lt;/P&gt;</description>
      <pubDate>Wed, 15 Apr 2026 04:37:18 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-server-for-it-pro/2026-04-update-breaks-domain-logins/m-p/4511399#M12969</guid>
      <dc:creator>EMR88</dc:creator>
      <dc:date>2026-04-15T04:37:18Z</dc:date>
    </item>
    <item>
      <title>Procedures to raise the functional level of AD 2008 r2 to 2019</title>
      <link>https://techcommunity.microsoft.com/t5/windows-server-for-it-pro/procedures-to-raise-the-functional-level-of-ad-2008-r2-to-2019/m-p/4511199#M12968</link>
      <description>&lt;P&gt;Hello everyone,&lt;/P&gt;&lt;P&gt;Our AD has the Windows Server 2008 functional level and the servers with Windows Server 2016 OS. I intend to raise the functional level to 2019 or 2025. I would like your help with tips and documentation to decide whether 2019 or 2025 would be best, what are the risks and procedures for successful migration. I have an isolated environment to carry out rehearsals and tests before actually going into production.&lt;/P&gt;</description>
      <pubDate>Tue, 14 Apr 2026 13:06:02 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-server-for-it-pro/procedures-to-raise-the-functional-level-of-ad-2008-r2-to-2019/m-p/4511199#M12968</guid>
      <dc:creator>Marcelo327</dc:creator>
      <dc:date>2026-04-14T13:06:02Z</dc:date>
    </item>
    <item>
      <title>Virtual printer in windows server 2019 standard is not shown after configuration</title>
      <link>https://techcommunity.microsoft.com/t5/windows-server-for-it-pro/virtual-printer-in-windows-server-2019-standard-is-not-shown/m-p/4511102#M12965</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I am, trying to configure a virtual printer in a Windows server 2019 standard edition that is deployed in OCI cloud. This instance has windows server license included in the pricing. The problem comes when after ending the process of configuration this virtual printer is not displayed in "Devices and printers" any idea why is this happening?&lt;/P&gt;&lt;img /&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;img /&gt;&lt;img /&gt;&lt;img /&gt;&lt;img /&gt;&lt;P class="lia-clear-both"&gt;&amp;nbsp;&lt;/P&gt;&lt;img /&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Ana&lt;/P&gt;</description>
      <pubDate>Tue, 14 Apr 2026 08:55:18 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-server-for-it-pro/virtual-printer-in-windows-server-2019-standard-is-not-shown/m-p/4511102#M12965</guid>
      <dc:creator>AnaRuiz1</dc:creator>
      <dc:date>2026-04-14T08:55:18Z</dc:date>
    </item>
    <item>
      <title>Error al agregar Windows Server 2025 a dominio existente, nivel funcional 2016</title>
      <link>https://techcommunity.microsoft.com/t5/windows-server-for-it-pro/error-al-agregar-windows-server-2025-a-dominio-existente-nivel/m-p/4510481#M12963</link>
      <description>&lt;P&gt;Buenas a todos,&lt;/P&gt;&lt;P&gt;Me dirijo a esta comunidad en busca de orientación para resolver un problema que se me está presentando al intentar integrar un nuevo servidor con &lt;STRONG&gt;Windows Server 2025 Standard&lt;/STRONG&gt; a mi infraestructura de Active Directory existente.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Descripción del entorno:&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Dominio de Active Directory activo con &lt;STRONG&gt;Windows Server 2019 Standard&lt;/STRONG&gt;.&lt;/LI&gt;&lt;LI&gt;Nivel funcional de dominio y bosque configurado en &lt;STRONG&gt;Windows Server 2016&lt;/STRONG&gt;.&lt;/LI&gt;&lt;LI&gt;Controladores de dominio actuales: server-dc01.impresoratec y server-ad2019.impresoratec.&lt;/LI&gt;&lt;LI&gt;El nombre de dominio interno utilizado es impresoratec (nombre NetBIOS/dominio de etiqueta única, sin sufijo DNS completo tipo .local o .com).&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;STRONG&gt;Problema:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Al intentar agregar el nuevo servidor con Windows Server 2025 al dominio, el proceso falla y se presenta el siguiente mensaje de error:&lt;/P&gt;&lt;P&gt;&lt;EM&gt;"Es posible que el nombre de dominio "impresoratec" sea un nombre de dominio NetBIOS. Si este es el caso, compruebe que el nombre de dominio está registrado correctamente con WINS. [...] La consulta se refería al registro SRV para _ldap._tcp.dc._msdcs.impresoratec. La consulta identificó los siguientes controladores de dominio: server-dc01.impresoratec y server-ad2019.impresoratec. Sin embargo, no se pudo contactar con ningún controlador de dominio."&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;El mensaje sugiere que los registros de host (A) o (AAAA) pueden contener direcciones IP incorrectas o que los controladores de dominio no son accesibles desde el nuevo servidor.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Lo que he verificado hasta ahora:&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Los controladores de dominio existentes están en línea y operativos.&lt;/LI&gt;&lt;LI&gt;La replicación entre los DCs actuales funciona con normalidad.&lt;/LI&gt;&lt;LI&gt;El nuevo servidor con 2025 tiene conectividad de red general, pero no logra localizar los DCs al momento de unirse al dominio.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;STRONG&gt;Mi consulta:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;¿Alguien ha experimentado este comportamiento al incorporar un servidor con Windows Server 2025 a un dominio con nivel funcional 2016 y un nombre de dominio de etiqueta única (single-label domain)? ¿Existe algún requisito previo adicional —como la actualización del esquema de AD, ajustes en DNS o en WINS— que deba cumplirse antes de agregar el nuevo DC?&lt;/P&gt;&lt;P&gt;Agradezco de antemano cualquier orientación o experiencia que puedan compartir.&lt;/P&gt;</description>
      <pubDate>Sat, 11 Apr 2026 19:23:48 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-server-for-it-pro/error-al-agregar-windows-server-2025-a-dominio-existente-nivel/m-p/4510481#M12963</guid>
      <dc:creator>HugoPerez</dc:creator>
      <dc:date>2026-04-11T19:23:48Z</dc:date>
    </item>
    <item>
      <title>Side-by-side Upgrade: Server 2012 R2 Foundation to Server 2025 Essentials</title>
      <link>https://techcommunity.microsoft.com/t5/windows-server-for-it-pro/side-by-side-upgrade-server-2012-r2-foundation-to-server-2025/m-p/4509963#M12961</link>
      <description>&lt;P&gt;Hello everyone!&lt;/P&gt;&lt;P&gt;Is a side-by-side upgrade from Server 2012 R2 Foundation (DC) to Server 2025 Essentials (DC) allowed?&lt;/P&gt;&lt;P&gt;Is there a guide to follow?&lt;/P&gt;&lt;P&gt;Thank you in advance.&lt;/P&gt;</description>
      <pubDate>Thu, 09 Apr 2026 11:29:07 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-server-for-it-pro/side-by-side-upgrade-server-2012-r2-foundation-to-server-2025/m-p/4509963#M12961</guid>
      <dc:creator>V3N7UR4</dc:creator>
      <dc:date>2026-04-09T11:29:07Z</dc:date>
    </item>
    <item>
      <title>RDP logs in locally</title>
      <link>https://techcommunity.microsoft.com/t5/windows-server-for-it-pro/rdp-logs-in-locally/m-p/4507511#M12957</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;Have a Windows 2022 21H2 server, VM on vSphere.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When attempting to RDP to it, I briefly see the desktop before getitng the error - &lt;STRONG&gt;you have been disconnected because another connection was made to the remote computer&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I note that when viewing the server in vCentre, the 'local' desktop logs in when an RDP connection is attempted.&amp;nbsp; This must then be kicking the RDP session.&amp;nbsp; At the moment the only way to manage it is via vCentre which isn't ideal.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there a setting somewhere to prevent this from happening?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;cheers&lt;/P&gt;&lt;P&gt;j&lt;/P&gt;</description>
      <pubDate>Wed, 01 Apr 2026 06:19:34 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-server-for-it-pro/rdp-logs-in-locally/m-p/4507511#M12957</guid>
      <dc:creator>justletmelogin50</dc:creator>
      <dc:date>2026-04-01T06:19:34Z</dc:date>
    </item>
    <item>
      <title>ntoskrnl.exe and build version not getting updated after applying KB5078740 on server 2025</title>
      <link>https://techcommunity.microsoft.com/t5/windows-server-for-it-pro/ntoskrnl-exe-and-build-version-not-getting-updated-after/m-p/4507401#M12956</link>
      <description>&lt;P&gt;I have installed the latest March patch kb5078740 on server 2025 which was upgraded from server 2022. the patch is showing installed but the ntoskrnl.exe and build version is still showing 10.0.26100.4652. Qualys is detecting it as patch not installed based on file version which should be 10.0.21600.32522. Please let me know how to fix this issue.&lt;/P&gt;</description>
      <pubDate>Tue, 31 Mar 2026 17:28:36 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-server-for-it-pro/ntoskrnl-exe-and-build-version-not-getting-updated-after/m-p/4507401#M12956</guid>
      <dc:creator>aahmed28</dc:creator>
      <dc:date>2026-03-31T17:28:36Z</dc:date>
    </item>
    <item>
      <title>RDS Licensing for administrators</title>
      <link>https://techcommunity.microsoft.com/t5/windows-server-for-it-pro/rds-licensing-for-administrators/m-p/4505617#M12952</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are planning to acquire 10 RDS User licenses, and I would like to clarify the following points:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Will access be limited to 10 simultaneous rdp session, or can administrators still access the server normally via RDP?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do administrators connecting using mstsc /admin require an RDS license, or is this access exempt?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In the past (Windows Server 2016), I recall that exceeding the number of licenses allowed temporary RDP sessions. Could you confirm if this behavior is still the same?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you in advance for your clarification.&lt;/P&gt;</description>
      <pubDate>Wed, 25 Mar 2026 16:22:49 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-server-for-it-pro/rds-licensing-for-administrators/m-p/4505617#M12952</guid>
      <dc:creator>MasPAN74</dc:creator>
      <dc:date>2026-03-25T16:22:49Z</dc:date>
    </item>
    <item>
      <title>VMWARE ESXi and Winddows VM Licenses</title>
      <link>https://techcommunity.microsoft.com/t5/windows-server-for-it-pro/vmware-esxi-and-winddows-vm-licenses/m-p/4505615#M12951</link>
      <description>&lt;P&gt;&amp;nbsp;We have one VMware environment with 3 servers each with 2 CPUs, to be properly legal he acquired 6 Windows Server Datacenter Edition licenses, what happens is that when he is trying to activate the VMs that are in Windows Server Standard he gets the error that you see in the image.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;img /&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Licensing was carried out correctly as described in the Windows Server 2025 License Guide, in summary: all CPUs and Cores) in the virtualization cluster were licensed.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;img /&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;can anyone advise the right way to use the Datacentre License in ESXi environment?&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks in&amp;nbsp; advanced&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 25 Mar 2026 16:18:13 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-server-for-it-pro/vmware-esxi-and-winddows-vm-licenses/m-p/4505615#M12951</guid>
      <dc:creator>nunoabsilva</dc:creator>
      <dc:date>2026-03-25T16:18:13Z</dc:date>
    </item>
    <item>
      <title>dcdiag crash with incorrect /s parameter</title>
      <link>https://techcommunity.microsoft.com/t5/windows-server-for-it-pro/dcdiag-crash-with-incorrect-s-parameter/m-p/4505609#M12950</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I find a mistake in my script which cause DCDiag to crash :&lt;/P&gt;&lt;P&gt;dcdiag /v /c /d /e /s:%computername% &amp;gt; C:\Temp\dcdiag.txt&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;%computername% is the mistake. I replaced it by the real server name.&lt;/P&gt;&lt;P&gt;Seems like input it not enough checked.&lt;/P&gt;&lt;P&gt;Vincent&lt;/P&gt;</description>
      <pubDate>Wed, 25 Mar 2026 15:59:37 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-server-for-it-pro/dcdiag-crash-with-incorrect-s-parameter/m-p/4505609#M12950</guid>
      <dc:creator>Nolme</dc:creator>
      <dc:date>2026-03-25T15:59:37Z</dc:date>
    </item>
    <item>
      <title>Problem in Windows Server 2022</title>
      <link>https://techcommunity.microsoft.com/t5/windows-server-for-it-pro/problem-in-windows-server-2022/m-p/4504927#M12949</link>
      <description>&lt;P&gt;Hello, I need help with the following: I had the video application installed and working on a VPS with Windows Server 2022, and suddenly it stopped working. It won't start, and it doesn't show any errors or events that I can analyze in the viewer. Does anyone have any idea what might be happening? I've already tried many AI recommendations, from uninstalling and reinstalling an older version of the application to uninstalling the latest server update, among other things. I also tried installing it on another VPS, and it shows the same problem.&lt;/P&gt;</description>
      <pubDate>Mon, 23 Mar 2026 22:35:27 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-server-for-it-pro/problem-in-windows-server-2022/m-p/4504927#M12949</guid>
      <dc:creator>anoriega74</dc:creator>
      <dc:date>2026-03-23T22:35:27Z</dc:date>
    </item>
    <item>
      <title>Bookmark the Secure Boot playbook for Windows Server</title>
      <link>https://techcommunity.microsoft.com/t5/windows-server-for-it-pro/bookmark-the-secure-boot-playbook-for-windows-server/m-p/4501060#M12945</link>
      <description>&lt;P&gt;Secure Boot is a long‑standing security capability that works in conjunction with the Unified Extensible Firmware Interface (UEFI) to confirm that firmware and boot components are trusted before they are allowed to run. Microsoft is updating the Secure Boot certificates originally issued in 2011 to ensure Windows devices continue to verify trusted boot software. These older certificates begin expiring in June 2026.&lt;BR /&gt;&lt;BR /&gt;While Windows Server 2025 certified server platforms already include the 2023 certificates in firmware. For servers that do not, you will need to manually update the certificates. Unlike Windows PCs, which may receive the 2023 Secure Boot certificates through Controlled Feature Rollout (CFR) as part of the monthly update process, Windows Server requires manual action.&lt;BR /&gt;&lt;BR /&gt;Luckily, there is a step=by-step guide to help! With the &lt;A href="https://techcommunity.microsoft.com/blog/windowsservernewsandbestpractices/windows-server-secure-boot-playbook-for-certificates-expiring-in-2026/4495789" data-lia-auto-title="Secure Boot Playbook for Windows Server" data-lia-auto-title-active="0" target="_blank"&gt;Secure Boot Playbook for Windows Server&lt;/A&gt;, you'll find information on&amp;nbsp;the tools and options available to help you update Secure Boot certificates on Windows Server. Check it out today!&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;img /&gt;</description>
      <pubDate>Wed, 11 Mar 2026 00:29:14 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-server-for-it-pro/bookmark-the-secure-boot-playbook-for-windows-server/m-p/4501060#M12945</guid>
      <dc:creator>Mabel_Gomes</dc:creator>
      <dc:date>2026-03-11T00:29:14Z</dc:date>
    </item>
    <item>
      <title>CrowdStrike Secure Boot Lifecycle Management Content Pack</title>
      <link>https://techcommunity.microsoft.com/t5/windows-server-for-it-pro/crowdstrike-secure-boot-lifecycle-management-content-pack/m-p/4500657#M12940</link>
      <description>&lt;P&gt;CrowdStrike has recently released the&lt;STRONG&gt; &lt;/STRONG&gt;&lt;A class="lia-external-url" href="https://falcon.crowdstrike.com/login?next=%2Fcontent-library%2Fdetails%2Fglobal%3Acontent_pack%3Ac496ad23-2dd0-4f38-9f95-0219a27843d2" target="_blank"&gt;&lt;STRONG&gt;Secure Boot Lifecycle Management Content Pack.&lt;/STRONG&gt;&lt;/A&gt; This new feature helps &lt;STRONG&gt;Falcon for IT module&lt;/STRONG&gt; users manage Windows &lt;STRONG&gt;Secure Boot certificate updates&lt;/STRONG&gt; ahead of these certificates’ expiration beginning in late June 2026.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;The dashboard provides an &lt;STRONG&gt;at‑a‑glance&lt;/STRONG&gt; view of Secure Boot–enabled devices, showing which systems are already compliant with the updated&lt;STRONG&gt; &lt;A class="lia-external-url" href="https://aka.ms/getsecureboot" target="_blank"&gt;2023 Secure Boot certificate&lt;/A&gt;&lt;/STRONG&gt;, which are in progress, and which are blocked or require opt‑in to a managed rollout. It also highlights certificate update failures that may require investigation.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;In addition, &lt;STRONG&gt;overall readiness&lt;/STRONG&gt; is summarized through a compliance gauge, while a 30‑day trend shows how pass and fail counts change as remediation progresses. Filters by operating system, server edition, hostname, and update status help administrators &lt;STRONG&gt;quickly identify devices that need action&lt;/STRONG&gt; to help ensure systems remain secure after the certificates expire.&lt;/P&gt;
&lt;P&gt;The feature also provides management options to &lt;STRONG&gt;opt devices into Microsoft's managed rollout&lt;/STRONG&gt; for gradual, tested deployment, and to &lt;STRONG&gt;block updates&lt;/STRONG&gt; on hardware with known compatibility issues to prevent boot failures.&lt;/P&gt;
&lt;P&gt;Note that this feature is available as part of &lt;STRONG&gt;CrowdStrike's Falcon for IT module&lt;/STRONG&gt;. CrowdStrike Endpoint Detection and Response (EDR) customers who are not licensed for this module can enable a free trial from the CrowdStrike Store. To learn more about this feature, please see the &lt;STRONG&gt;&lt;A class="lia-external-url" href="https://supportportal.crowdstrike.com/s/login/?ec=302&amp;amp;startURL=%2Fs%2Farticle%2FFeature-Focus-Falcon-for-IT---Windows-Secure-Boot-Certificate-Lifecycle-Management" target="_blank"&gt;content pack tutorial video.&lt;/A&gt;&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 09 Mar 2026 22:51:07 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-server-for-it-pro/crowdstrike-secure-boot-lifecycle-management-content-pack/m-p/4500657#M12940</guid>
      <dc:creator>Mabel_Gomes</dc:creator>
      <dc:date>2026-03-09T22:51:07Z</dc:date>
    </item>
    <item>
      <title>PS script for moving clustered VMs to another node</title>
      <link>https://techcommunity.microsoft.com/t5/windows-server-for-it-pro/ps-script-for-moving-clustered-vms-to-another-node/m-p/4500521#M12939</link>
      <description>&lt;P&gt;Windows Server 2022, Hyper-V, Failover cluster&lt;BR /&gt;We have a Hyper-V cluster where the hosts reboot once a month. If the host being rebooted has any number of VMs running on it the reboot can take hours. I've proven this by manually moving VM roles off of the host prior to reboot and the host reboots in less than an hour, usually around 15 minutes.&lt;/P&gt;&lt;P&gt;Does anyone know of a powershell script that will detect clustered VMs running on the host and move them to another host within the cluster? I'd rather not reinvent this if someone's already done it.&lt;/P&gt;</description>
      <pubDate>Mon, 09 Mar 2026 16:39:17 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-server-for-it-pro/ps-script-for-moving-clustered-vms-to-another-node/m-p/4500521#M12939</guid>
      <dc:creator>pabloh11</dc:creator>
      <dc:date>2026-03-09T16:39:17Z</dc:date>
    </item>
    <item>
      <title>CSV Auto-Pause on Windows Server 2025 Hyper-V Cluster</title>
      <link>https://techcommunity.microsoft.com/t5/windows-server-for-it-pro/csv-auto-pause-on-windows-server-2025-hyper-v-cluster/m-p/4497459#M12938</link>
      <description>&lt;P&gt;Hi everyone, i'm facing a very strange behavior with a newly created HyperV Clsuter running on Windows Server 2025. One of the two nodes keep calling for autopause on the CSV during the I/O peak. Does anyone have experienced this ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here are the details :&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Environment&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Cluster: 2-node Failover Cluster&lt;/P&gt;&lt;P&gt;Nodes: HV1 &amp;amp; HV2 (HPE ProLiant DL360 Gen11)&lt;/P&gt;&lt;P&gt;OS: Windows Server 2025 Datacenter, Build 26100.32370 (KB5075899 installed Feb 21, 2026)&lt;/P&gt;&lt;P&gt;Storage: HPE MSA 2070 full SSD, iSCSI point-to-point (4×25 Gbps per node, 4 MPIO paths)&lt;/P&gt;&lt;P&gt;CSV: Single volume "Clsuter Disk 2" (~14 TB, NTFS, CSVFS_NTFS)&lt;/P&gt;&lt;P&gt;Quorum: Disk Witness (Node and Disk Majority)&lt;/P&gt;&lt;P&gt;Networking: 4×10 Gbps NIC Teaming for management/cluster/VMs traffic, dedicated iSCSI NICs&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Problem Description&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;The cluster experiences CSV auto-pause events daily during a peak I/O period (~10:00-11:30), caused by database VMs generating ~600-800 MB/s (not that much). The auto-pause is triggered by HV2's CsvFs driver, even though HV2 hosts no VMs. All VMs run on HV1, which is the CSV coordinator/owner.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;H6&gt;Comparative Testing (Feb 23-26, 2026)&lt;/H6&gt;&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table&gt;&lt;thead&gt;&lt;tr&gt;&lt;th&gt;Date&lt;/th&gt;&lt;th&gt;HV2 Status&lt;/th&gt;&lt;th&gt;Event 5120&lt;/th&gt;&lt;th&gt;SMB Slowdowns (1054)&lt;/th&gt;&lt;th&gt;Auto-pause Cycles&lt;/th&gt;&lt;th&gt;VM Impact&lt;/th&gt;&lt;/tr&gt;&lt;/thead&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;Feb 23&lt;/td&gt;&lt;td&gt;Active&amp;nbsp;&lt;/td&gt;&lt;td&gt;1&lt;/td&gt;&lt;td&gt;44&lt;/td&gt;&lt;td&gt;1 cycle (237ms recovery)&lt;/td&gt;&lt;td&gt;None&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Feb 24&lt;/td&gt;&lt;td&gt;Active&lt;/td&gt;&lt;td&gt;0&lt;/td&gt;&lt;td&gt;8&lt;/td&gt;&lt;td&gt;0&lt;/td&gt;&lt;td&gt;None&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Feb 25&lt;/td&gt;&lt;td&gt;Drained (still in cluster)&lt;/td&gt;&lt;td&gt;4&lt;/td&gt;&lt;td&gt;~60 (86,400,000ms max!)&lt;/td&gt;&lt;td&gt;3 cascade cycles&lt;/td&gt;&lt;td&gt;Severe - all VMs affected&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;STRONG&gt;Feb 26&lt;/STRONG&gt;&lt;/td&gt;&lt;td&gt;&lt;STRONG&gt;Powered off&lt;/STRONG&gt;&lt;/td&gt;&lt;td&gt;&lt;STRONG&gt;0&lt;/STRONG&gt;&lt;/td&gt;&lt;td&gt;&lt;STRONG&gt;0&lt;/STRONG&gt;&lt;/td&gt;&lt;td&gt;&lt;STRONG&gt;0&lt;/STRONG&gt;&lt;/td&gt;&lt;td&gt;&lt;STRONG&gt;None&lt;/STRONG&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Key finding: Draining HV2 does NOT prevent the issue. Only fully powering off HV2 eliminates all auto-pause events and SMB slowdowns during the I/O peak.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Root Cause Analysis&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;1. CsvFs Driver on HV2 Maintains Persistent SMB Sessions to CSV&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;SMB Client Connectivity log (Event 30833) on HV2 shows ~130 new SMB connections per hour to the CSV share, continuously, constant since boot:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Share: \\xxxx::xxx:xxx:xxx:xxx\xxxxxxxx-...-xxxxxxx$ (HV1 cluster virtual adapter)&lt;/P&gt;&lt;P&gt;All connections from PID 4 (System/kernel) — CsvFs driver&lt;/P&gt;&lt;P&gt;5,649 connections in 43.6 hours = ~130/hour&lt;/P&gt;&lt;P&gt;Each connection has a different Session ID (not persistent)&lt;/P&gt;&lt;P&gt;This behavior continues even when HV2 is drained&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;2. HV2 Opens Handles on ALL VM Files&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;During the I/O peak on Feb 25, SMB Server Operational log (Event 1054) on HV1 showed HV2 blocking on files from every VM directory, including powered-off VMs and templates:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;.vmgs, .VMRS, .vmcx, .xml — VM configuration and state files&lt;/P&gt;&lt;P&gt;.rct, .mrt — RCT/CBT tracking files&lt;/P&gt;&lt;P&gt;Affected VMs: almost all&lt;/P&gt;&lt;P&gt;Also affected: powered-off VMs&lt;/P&gt;&lt;P&gt;And templates: winsrv2025-template&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;3. Catastrophic Block Durations&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On Feb 25 (HV2 drained but still in cluster):&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Operations blocked for 86,400,000 ms (exactly 24 hours) — handles accumulated since previous day&lt;/P&gt;&lt;P&gt;These all expired simultaneously at 10:13:52, triggering cascade auto-pause&lt;/P&gt;&lt;P&gt;Post-autopause: big VM freeze/lag for additional 2,324 seconds (39 minutes)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On Feb 24 (HV2 active):&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Operations blocked for 1,150,968 ms (19 minutes) on one of the VM files&lt;/P&gt;&lt;P&gt;Despite this extreme duration, no auto-pause was triggered that day&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;4. Auto-pause Trigger Mechanism&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;HV2 Diagnostic log at auto-pause time:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;CsvFs Listener: CsvFsVolumeStateChangeFromIO-&amp;gt;CsvFsVolumeStateDraining, status 0xc0000001 OnVolumeEventFromCsvFs: reported VolumeEventAutopause to node 1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Error status 0xc0000001 (STATUS_UNSUCCESSFUL) on I/O operation from HV2&lt;/P&gt;&lt;P&gt;CsvFsVolumeStateChangeFromIO = I/O failure triggered the auto-pause&lt;/P&gt;&lt;P&gt;HV2 has no VMs running — this is purely CsvFs metadata/redirected access&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;5. SMB Connection Loss During Auto-pause&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;SMB Client Connectivity on HV2 at auto-pause time:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Event 30807: Share connection lost - "Le nom réseau a été supprimé" Event 30808: Share connection re-established&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What Has Been Done&lt;/P&gt;&lt;P&gt;KB5075899 installed (Feb 21) — Maybe improved recovery from multi-cycle loop to single cycle a little, but did not prevent the auto-pause&lt;/P&gt;&lt;P&gt;Disabled ms_server binding on iSCSI NICs (both nodes)&lt;/P&gt;&lt;P&gt;Tuned MPIO: PathVerification Enabled, PDORemovePeriod 120, RetryCount 6, DiskTimeout 100&lt;/P&gt;&lt;P&gt;Drained HV2 — no effect&lt;/P&gt;&lt;P&gt;Powered off HV2 — Completely eliminated the problem&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm currently running mad with this problem, i've deployed a lot of HyperV clusters and it's the first time i'm experiencing such a strange behavior, the only workaround i found is to take the second nodes off to be sure he is not putting locks on CSV files. The cluster is only running well with one node turned on.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Why does the CsvFs driver on a non-coordinator node (HV2) maintain ~130 new SMB connections per hour to the CSV, even when it hosts no VMs and is drained?Why do these connections block for up to 24 hours during I/O peaks on the coordinator node?&lt;/P&gt;&lt;P&gt;Why does draining the node not prevent CsvFs from accessing the CSV?&lt;/P&gt;&lt;P&gt;Is this a known issue with the CsvFs driver in Windows Server 2025 Build 26100.32370?&lt;/P&gt;&lt;P&gt;Are there any registry parameters to limit or disable CsvFs metadata scanning on non-coordinator nodes ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If someone sees somthing that i am missing i would be so grateful !&amp;nbsp;&lt;/P&gt;&lt;P&gt;Have a great day.&lt;/P&gt;</description>
      <pubDate>Thu, 26 Feb 2026 11:32:17 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-server-for-it-pro/csv-auto-pause-on-windows-server-2025-hyper-v-cluster/m-p/4497459#M12938</guid>
      <dc:creator>BadgerMD974</dc:creator>
      <dc:date>2026-02-26T11:32:17Z</dc:date>
    </item>
    <item>
      <title>WMI Filter for non-Hyper-V Host</title>
      <link>https://techcommunity.microsoft.com/t5/windows-server-for-it-pro/wmi-filter-for-non-hyper-v-host/m-p/4496268#M12929</link>
      <description>&lt;P&gt;I have been struggling for several days trying to set a GPO WMI Filter that would apply settings to any server, virtual or physical, as long as it is not the Hyper-V Host. It should apply to any VM on VMWare or on Hyper-V hypervisors.&lt;/P&gt;&lt;P&gt;I found many suggestions online but none of them really work, like looking for Hypervisorpresent, that is also set to TRUE on VMs so no help. I have many ways to find and apply to an Hyper-V but EXCLUDING Hyper-Vs seems to be a tough one, the WMI filters are designed to find something and apply if it finds it, not the opposite. I have tried queries on the OptionalFeatures class, again it helps me find the Hyper-V but not EXCLUDE it.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Anyone have an idea about doing this.&lt;/P&gt;&lt;P&gt;BTW, this is to apply a setting only to non-Hyper-V and ignore if it is an Hyper-V. I am also trying to avoid blocking GPOs at a specific OU and re-linking all but 1 GPO from that level, I have to assume that there is a way to target all servers except Hyper-V.&lt;/P&gt;&lt;P&gt;Hopefully someone has succeeded in doing the same.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Sat, 21 Feb 2026 19:24:03 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-server-for-it-pro/wmi-filter-for-non-hyper-v-host/m-p/4496268#M12929</guid>
      <dc:creator>PepeLePew</dc:creator>
      <dc:date>2026-02-21T19:24:03Z</dc:date>
    </item>
  </channel>
</rss>

