<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>Windows Server News and Best Practices articles</title>
    <link>https://techcommunity.microsoft.com/t5/windows-server-news-and-best/bg-p/WindowsServerNewsandBestPractices</link>
    <description>Windows Server News and Best Practices articles</description>
    <pubDate>Thu, 30 Apr 2026 04:37:50 GMT</pubDate>
    <dc:creator>WindowsServerNewsandBestPractices</dc:creator>
    <dc:date>2026-04-30T04:37:50Z</dc:date>
    <item>
      <title>Opt-In Windows Server 2025 Feature Update from the WS 2022 and WS 2019 Settings Dialog</title>
      <link>https://techcommunity.microsoft.com/t5/windows-server-news-and-best/opt-in-windows-server-2025-feature-update-from-the-ws-2022-and/ba-p/4515961</link>
      <description>&lt;P&gt;This capability allows customers who want to in-place upgrade their servers to Windows Server 2025 to upgrade using the Windows Update service, and without the need for Windows Server 2025 physical media. On the Windows Server team, we aim for 100% application compatibility, and we are confident that most applications and services will continue to work well after the in-place upgrade to Windows Server 2025.&lt;/P&gt;
&lt;P&gt;We recognize that in-place upgrade will not be used by all organizations for all of their servers – some organizations will prefer to perform a clean install, I.E., reformatting the system drive, installing Windows Server 2025, and then re-installing applications and services. Other organizations embrace in-place upgrade because it’s quick and they can avoid re-installing applications and services. Some organizations will use a combination of clean install and in-place upgrade approaches, depending on the role of each server.&lt;/P&gt;
&lt;H2&gt;Planning For the Upgrade&lt;/H2&gt;
&lt;P&gt;Plan on a gradual roll-out of Windows Server 2025 across your server estate, starting with the least critical servers. We encourage customers to verify upgrade to Windows Server 2025 in a test environment to gain experience with the upgrade process, before upgrading production servers. The time needed to upgrade each server will depend on the performance of the server, the number of applications running on the server, and the number of users on the server. Backup / snapshot and upgrading to Windows Server 2025 usually takes two hours per server.&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Check with your system administrator – server upgrades should be carefully coordinated to avoid downtime and workload outages – a maintenance window may need to be scheduled.&lt;/LI&gt;
&lt;LI&gt;Check that Group Policy configuration is correct – in some cases Windows Updates can be installed by non-administrative users. To learn more about blocking users from scanning and applying Windows Updates, see &lt;A href="https://learn.microsoft.com/en-us/windows-server/administration/windows-server-update-services/deploy/4-configure-group-policy-settings-for-automatic-updates#allow-non-administrators-to-receive-update-notifications" target="_blank"&gt;Step 4 - Configure Group Policy Settings for Automatic Updates | Microsoft Learn&lt;/A&gt;. Note that some organizations will create a special upgrade OU for their server upgrade process. Customized GPOs can also be used to schedule and manage server updates, to implement a rolling upgrade of servers and managing maintenance windows.&lt;/LI&gt;
&lt;LI&gt;Check if you need to purchase a product key for Windows Server 2025. Windows Server 2019 and Windows Server 2022 volume license customers with active Software Assurance do not need to purchase a product key for Windows Server 2025. However, customers who are using the Retail or OEM licensed versions of Windows Server 2019 and Windows Server 2022 will have to purchase a Windows Server 2025 product key.&lt;/LI&gt;
&lt;LI&gt;Check and validate successful activation with your organization’s KMS for Windows Server activation, to validate that it has been loaded with a valid Windows Server 2025 key. After upgrading to Windows Server 2025, each server will need to be activated using a valid activation method: KMS, Active Directory‑based Activation, or MAK using slgmr or VAMT tools.&lt;/LI&gt;
&lt;LI&gt;Check that you are not using in-place upgrade on a domain controller. We recommend a clean install of Windows Server 2025 for domain controllers, first joining at the Windows Server 2016 domain and forest functional levels, and then upgrading the domain and forest functional levels after all the domain controllers are running Windows Server 2025. See this guidance for the steps to upgrade domain controllers: &lt;A href="https://learn.microsoft.com/en-us/windows-server/identity/ad-ds/deploy/upgrade-domain-controllers" target="_blank"&gt;Upgrade domain controllers to a newer version of Windows Server | Microsoft Learn&lt;/A&gt;.&lt;/LI&gt;
&lt;LI&gt;Check that you are not using in-place upgrade on a failover cluster node in isolation – we recommend following the failover clustering upgrade guidance for upgrading failover cluster nodes: &lt;A href="https://learn.microsoft.com/en-us/windows-server/failover-clustering/Cluster-Operating-System-Rolling-Upgrade" target="_blank"&gt;Upgrade the OS of a Windows Server failover cluster by performing a cluster OS rolling upgrade | Microsoft Learn&lt;/A&gt;.&lt;/LI&gt;
&lt;LI&gt;Check that each server has at least 30-40 GB of free space on the System Disk – low amounts of free space can cause the upgrade process to fail, and is the leading cause of In-place Upgrade failures.&lt;/LI&gt;
&lt;LI&gt;Check pricing, best practices, license terms, and privacy policy: Windows Server pricing guide: &lt;A href="https://www.microsoft.com/en-us/windows-server/pricing" target="_blank"&gt;Windows Server 2025 Licensing &amp;amp; Pricing | Microsoft&lt;/A&gt;. Server Upgrade planning guidance: &lt;A href="https://learn.microsoft.com/en-us/windows-server/get-started/install-upgrade-migrate" target="_blank"&gt;Plan Your Windows Server Upgrade Path | Microsoft Learn&lt;/A&gt;. Windows Server licensing terms are here: &lt;A href="https://www.microsoft.com/en-us/useterms" target="_blank"&gt;Useterms&lt;/A&gt;. Microsoft’s privacy policy: &lt;A href="https://www.microsoft.com/en-US/privacy/privacystatement" target="_blank"&gt;Microsoft Privacy Statement – Microsoft privacy&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Check online documentation for in-place upgrade for further details: &lt;A href="https://learn.microsoft.com/en-us/windows-server/get-started/upgrade-in-place?tabs=windows-update" target="_blank"&gt;Upgrade Windows Server in Place | Microsoft Learn&lt;/A&gt;.&lt;/LI&gt;
&lt;LI&gt;Opt-In Windows Server 2025 Feature Update from the Windows Server 2022 and Windows Server 2019 Settings Dialog should work for any system, physical or virtual – if it can connect to Windows Update, and if the system meets the prerequisites.&lt;/LI&gt;
&lt;/OL&gt;
&lt;H2&gt;Steps for Installing the Windows Server 2025 Feature Update on Windows Server 2019 or Windows Server 2022 Desktop Experience&lt;/H2&gt;
&lt;OL&gt;
&lt;LI&gt;Install the &lt;A href="https://support.microsoft.com/help/5078766" target="_blank"&gt;2026-03 Cumulative Update for Microsoft server operating system version 21H2 for x64-based Systems (KB5078766)&lt;/A&gt;&amp;nbsp;or later for Windows Server 2022.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;Install &lt;A href="https://support.microsoft.com/help/5078752" target="_blank"&gt;2026-03 Cumulative Update for Microsoft server operating system for x64-based Systems (KB5078752)&lt;/A&gt;&amp;nbsp;or later for Windows Server 2019.&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;Note that it may be necessary to reboot the server after installing Quality and Security Updates.&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;2. Backup / snapshot the server, and if time permits, perform a restore test on a separate server.&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;3. Stop applications and services running on the server.&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;4. Add the opt-in registry key to the server using PowerShell or using the Registry Editor:&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;&lt;STRONG&gt;New-Item -Path "HKLM:\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AllowWindowsServerFeatureUpdate"&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;&lt;STRONG&gt;New-ItemProperty -Path "HKLM:\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AllowWindowsServerFeatureUpdate" -Name "AllowWindowsServerFeatureUpdate" -PropertyType DWord -Value 1&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;Note that adding these values can also be automated using Group Policy Objects (GPO), see:&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/windows/deployment/update/waas-wufb-group-policy" target="_blank"&gt;Configure Windows Update client policies via Group Policy | Microsoft Learn&lt;/A&gt;.&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;5. The Windows Server 2025 Feature Update will be offered in the Settings Dialog, in the Windows Update section, select&amp;nbsp;&lt;STRONG&gt;Download and Install&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;6. Read the&amp;nbsp;&lt;STRONG&gt;Important Information&lt;/STRONG&gt; pop-up dialog, press &lt;STRONG&gt;Accept and install:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;7. The Windows Server 2025 Feature Update will download and install (in-place upgrade on the server) and will prompt for Reboot.&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;STRONG&gt;See &lt;U&gt;Post-Feature Update (Post In-place Upgrade)&lt;/U&gt; section below&lt;/STRONG&gt;&lt;/P&gt;
&lt;H2&gt;Steps for Installing the Windows Server 2025 Feature Update on Windows Server 2022 Server Core using SCONFIG&lt;/H2&gt;
&lt;OL&gt;
&lt;LI&gt;Organizations using Windows Server 2022 Server Core can also get the Windows Server 2025 Feature Update using SCONFIG.&lt;/LI&gt;
&lt;LI&gt;Install the &lt;A href="https://support.microsoft.com/help/5078766" target="_blank"&gt;2026-03 Cumulative Update for Microsoft server operating system version 21H2 for x64-based Systems (KB5078766)&lt;/A&gt;&amp;nbsp;or later for Windows Server 2022.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;SCONFIG Option 6, 1 will scan for applicable Quality Updates and Security Updates.&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;Note that it may be necessary to reboot the server after installing Quality and Security Updates.&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;3. Backup / snapshot the server, and if time permits, perform a restore test on a separate server.&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;4. Stop applications and services running on the server.&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;5. Add the opt-in registry key to the server using PowerShell or using the Registry Editor:&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;&lt;STRONG&gt;New-Item -Path "HKLM:\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AllowWindowsServerFeatureUpdate"&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;&lt;STRONG&gt;New-ItemProperty -Path "HKLM:\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AllowWindowsServerFeatureUpdate" -Name "AllowWindowsServerFeatureUpdate" -PropertyType DWord -Value 1&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;Note that adding these values can also be automated using Group Policy Objects (GPO), see:&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/windows/deployment/update/waas-wufb-group-policy" target="_blank"&gt;Configure Windows Update client policies via Group Policy | Microsoft Learn&lt;/A&gt;.&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;6. The Windows Server 2025 Feature Update will be offered in SCONFIG, select option 6 (Install updates):&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;7. Select option 3 (Feature updates):&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;8. The Windows Server 2025 feature update will be offered if prerequisite requirements are met. Select Y to download and install the Windows Server 2025 Feature Update:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;9. The Windows Server 2025 Feature Update will download and install (in-place upgrade on the server) and will Reboot.&lt;/P&gt;
&lt;H2&gt;Post-Feature Update (Post In-place Upgrade)&lt;/H2&gt;
&lt;OL&gt;
&lt;LI&gt;After installation and reboot, check that the applications and services are running correctly. If there are any issues, restore the server from backup / snapshot.&lt;/LI&gt;
&lt;LI&gt;Activate the server using one of the following activation methods: KMS, Active Directory‑based Activation, or MAK using slgmr or VAMT tools.&lt;/LI&gt;
&lt;LI&gt;Check Telemetry settings and any Loopback Adapter settings.&lt;/LI&gt;
&lt;LI&gt;After the server is confirmed to be working, the Windows.old directory can be deleted to free up space on the system drive.&lt;/LI&gt;
&lt;LI&gt;Check Windows Update for additional updates.&lt;/LI&gt;
&lt;LI&gt;Evaluate if Secured-core settings and UEFI Secure boot certificates should be updated. See &lt;A href="https://learn.microsoft.com/en-us/windows-server/security/secured-core-server" target="_blank"&gt;What is Secured-core server for Windows Server | Microsoft Learn&lt;/A&gt; and &lt;A href="https://learn.microsoft.com/en-us/windows-hardware/design/device-experiences/oem-secure-boot" target="_blank"&gt;Secure boot | Microsoft Learn&lt;/A&gt;.&lt;/LI&gt;
&lt;/OL&gt;
&lt;H2&gt;Troubleshooting&lt;/H2&gt;
&lt;P&gt;If there are any issues during the upgrade to Windows Server 2025, use these steps to identify the issue:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Examine the setup log file: C:\Windows\Panther\setupact.log and error log file: C:\Windows\Panther\setuperr.log&lt;/LI&gt;
&lt;LI&gt;The SetupDiag tool can be downloaded for analysis of these files: &lt;A href="https://learn.microsoft.com/en-us/windows/deployment/upgrade/setupdiag" target="_blank"&gt;SetupDiag | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Contact customer support who may request that you compress and send them the contents of the C:\Windows\Panther directory.&lt;/LI&gt;
&lt;/OL&gt;
&lt;H2&gt;Send Us Your Feedback&lt;/H2&gt;
&lt;P&gt;We value your feedback and would love to hear your opinions about this capability (WS 2025 Feature Update from the WS 2019 and WS 2022 Settings Dialog with Opt-In) and any other thoughts you have on Windows Server upgrades. Did it work well for you? What improvements would you like to see in future releases?? Please write to us at this email address: &lt;A href="mailto:WindowsServerUpdateFeedback@microsoft.com" target="_blank"&gt;WindowsServerUpdateFeedback@microsoft.com&lt;/A&gt; &lt;/P&gt;
&lt;P&gt;-Windows Server Update Team.&lt;/P&gt;</description>
      <pubDate>Wed, 29 Apr 2026 18:24:14 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-server-news-and-best/opt-in-windows-server-2025-feature-update-from-the-ws-2022-and/ba-p/4515961</guid>
      <dc:creator>Rob-Hindman</dc:creator>
      <dc:date>2026-04-29T18:24:14Z</dc:date>
    </item>
    <item>
      <title>Introducing the Windows NVMe-oF Initiator Preview in Windows Server Insiders Builds</title>
      <link>https://techcommunity.microsoft.com/t5/windows-server-news-and-best/introducing-the-windows-nvme-of-initiator-preview-in-windows/ba-p/4501344</link>
      <description>&lt;H3&gt;What Is NVMe-over-Fabrics?&lt;/H3&gt;
&lt;P&gt;&lt;STRONG&gt;NVMe-over-Fabrics (NVMe-oF)&lt;/STRONG&gt; extends the NVMe protocol—originally designed for local PCIe-attached SSDs—across a network fabric. Instead of using legacy SCSI-based protocols such as iSCSI or Fibre Channel, NVMe-oF allows a host to communicate directly with &lt;STRONG&gt;remote NVMe controllers&lt;/STRONG&gt; using the same NVMe command set used for local devices. In this Insider build, Windows Server supports:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;NVMe-oF over TCP (NVMe/TCP)&lt;/STRONG&gt;, allowing NVMe-oF to run over standard Ethernet networks without specialized hardware.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;NVMe-oF over RDMA (NVMe/RDMA)&lt;/STRONG&gt;, enabling low-latency, high-throughput NVMe access over RDMA-capable networks (for example, RoCE or iWARP) using supported RDMA NICs.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;Why NVMe-oF on Windows Server?&lt;/H3&gt;
&lt;P&gt;For Windows Server deployments, NVMe-oF builds on the same principles as&amp;nbsp;&lt;STRONG&gt;Native NVMe support&lt;/STRONG&gt;: helping you reduce protocol overhead, improve scalability, and better align your storage stack with modern hardware. For Windows Server customers, NVMe-oF offers:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Lower overhead networked storage access&lt;/STRONG&gt; — NVMe-oF has less protocol overhead than iSCSI, helping extract the performance of modern NVMe devices while preserving the parallelism and efficiency of NVMe.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Flexible infrastructure choices&lt;/STRONG&gt; — NVMe-oF supports both &lt;STRONG&gt;TCP and RDMA transports&lt;/STRONG&gt;, allowing customers to choose between standard Ethernet-based deployments or low-latency RDMA-capable networks based on their infrastructure and performance goals.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;A forward-looking storage foundation&lt;/STRONG&gt; — NVMe-oF is designed to scale across multiple controllers, namespaces, and queues, making it a strong foundation for future disaggregated and software-defined storage architectures.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;This Insider release represents the&lt;STRONG&gt; &lt;/STRONG&gt;first step in bringing NVMe-oF capabilities natively to Windows Server.&lt;/P&gt;
&lt;H3&gt;What’s Included in This Insider Release&lt;/H3&gt;
&lt;P&gt;In this Windows Server Insider build,&lt;STRONG&gt; &lt;/STRONG&gt;you can evaluate the following NVMe-oF capabilities:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;An &lt;STRONG&gt;inbox NVMe-oF initiator&lt;/STRONG&gt; with &lt;STRONG&gt;NVMe/TCP and NVMe/RDMA&lt;/STRONG&gt; support&lt;/LI&gt;
&lt;LI&gt;A new command-line utility, &lt;STRONG&gt;nvmeofutil.exe&lt;/STRONG&gt;, for configuration and management&lt;/LI&gt;
&lt;LI&gt;Manual configuration of discovery and I/O connections&lt;/LI&gt;
&lt;LI&gt;Automatic exposure of NVMe namespaces as Windows disks once connected&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Note:&lt;/STRONG&gt; PowerShell cmdlets are &lt;STRONG&gt;not available yet&lt;/STRONG&gt;. All configuration is performed using &lt;STRONG&gt;nvmeofutil.exe&lt;/STRONG&gt;.&lt;/P&gt;
&lt;H3&gt;Getting Started with nvmeofutil.exe&lt;/H3&gt;
&lt;P&gt;To start evaluating NVMe-oF in this build,&amp;nbsp;you’ll use nvmeofutil.exe, the command-line utility included with supported Windows Server Insider builds.&lt;/P&gt;
&lt;H4&gt;1. Install the Latest Windows Server Insiders Build&lt;/H4&gt;
&lt;P&gt;Ensure you are running a &lt;A class="lia-external-url" href="https://www.microsoft.com/en-us/software-download/windowsinsiderpreviewserver" target="_blank"&gt;Windows Server Insiders&lt;/A&gt; build that includes:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;The inbox &lt;STRONG&gt;NVMe-oF initiator&lt;/STRONG&gt; with &lt;STRONG&gt;NVMe/TCP and NVMe/RDMA&lt;/STRONG&gt; support&lt;/LI&gt;
&lt;LI&gt;The &lt;STRONG&gt;nvmeofutil.exe&lt;/STRONG&gt; utility&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4&gt;2. Open an Elevated Command Prompt&lt;/H4&gt;
&lt;P&gt;All NVMe-oF commands must be run from an &lt;STRONG&gt;administrator command prompt&lt;/STRONG&gt;.&lt;/P&gt;
&lt;H4&gt;3. List Available NVMe-oF Initiator Adapters&lt;/H4&gt;
&lt;LI-CODE lang="powershell"&gt;nvmeofutil.exe list -t ia&lt;/LI-CODE&gt;
&lt;P&gt;This command displays the available NVMe-oF initiator adapters on the system.&lt;/P&gt;
&lt;H4&gt;4. Enumerate Host Gateways&lt;/H4&gt;
&lt;LI-CODE lang="powershell"&gt;nvmeofutil.exe list -t hg -ia &amp;lt;AdapterNumber&amp;gt;&lt;/LI-CODE&gt;
&lt;P&gt;Host gateways represent transport-specific endpoints, such as NVMe/TCP over IPv4.&lt;/P&gt;
&lt;H4&gt;5. Configure an I/O Subsystem Port&lt;/H4&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;U&gt;Tip&lt;/U&gt;:&lt;/STRONG&gt; You’ll need three values from your target configuration: the &lt;STRONG&gt;Subsystem NQN&lt;/STRONG&gt;, the &lt;STRONG&gt;target IP/DNS&lt;/STRONG&gt;, and the &lt;STRONG&gt;TCP port&lt;/STRONG&gt;. If you haven’t set up a target yet, see the &lt;STRONG&gt;Target Setup&lt;/STRONG&gt; section below for a quick Linux-based configuration and where to find these values.&lt;/P&gt;
&lt;LI-CODE lang="powershell"&gt;nvmeofutil.exe add -t sp -ia &amp;lt;Adapter&amp;gt; -hg &amp;lt;HostGateway&amp;gt; -dy true
-pi &amp;lt;PortNumber&amp;gt; -nq &amp;lt;SubsystemNQN&amp;gt; -ta &amp;lt;TargetAddress&amp;gt; -ts &amp;lt;ServiceId&amp;gt;&lt;/LI-CODE&gt;
&lt;P&gt;This defines the connection parameters to the remote NVMe-oF target.&lt;/P&gt;
&lt;H4&gt;6. Connect and Use the Namespace&lt;/H4&gt;
&lt;LI-CODE lang="powershell"&gt;nvmeofutil.exe connect -ia &amp;lt;Adapter&amp;gt; -sp &amp;lt;SubsystemPort&amp;gt;&lt;/LI-CODE&gt;
&lt;P&gt;Once connected, the NVMe namespace appears as a disk in Windows and can be partitioned and formatted using standard Windows tools.&lt;/P&gt;
&lt;H3&gt;Target Setup (Recommendations for Early Evaluation)&lt;/H3&gt;
&lt;P&gt;If you plan to evaluate NVMe-oF with an existing storage array,&amp;nbsp;&lt;STRONG&gt;check with your SAN vendor&lt;/STRONG&gt; to confirm support and get configuration guidance. Where possible, we also encourage you to validate interoperability using your production storage platform. For early evaluation and lab testing, the simplest and most interoperable option is to use a Linux-based NVMe-oF target, as described below.&lt;/P&gt;
&lt;P&gt;To evaluate the inbox Windows NVMe-oF initiator in this Insider release, you’ll need an NVMe-oF &lt;STRONG&gt;target&lt;/STRONG&gt; that can export a block device as an NVMe namespace over TCP.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Recommended: &lt;/STRONG&gt;Linux kernel NVMe-oF target (nvmet) over TCP&lt;/P&gt;
&lt;P&gt;For early testing, the simplest and most interoperable option is the &lt;STRONG&gt;Linux kernel NVMe target (“nvmet”)&lt;/STRONG&gt;. It’s straightforward to stand up in a lab and is widely used for basic NVMe-oF interoperability validation.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Lab note:&lt;/STRONG&gt; The example below uses “allow any host” to reduce friction during evaluation. In production environments, you should restrict access to specific host NQNs instead.&lt;/P&gt;
&lt;H5&gt;What You’ll Need&lt;/H5&gt;
&lt;UL&gt;
&lt;LI&gt;A Linux system (physical or VM)&lt;/LI&gt;
&lt;LI&gt;A block device to export (an NVMe SSD, SATA SSD, a virtual disk, etc.)&lt;/LI&gt;
&lt;LI&gt;IP connectivity to your Windows Server Insider machine&lt;/LI&gt;
&lt;LI&gt;A TCP port opened between initiator and target (you’ll choose a port below)&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;VMs are fine for functional evaluation.&lt;/STRONG&gt; For performance testing, you’ll want to move to physical hosts and realistic networking later.&lt;/P&gt;
&lt;H4&gt;Option A — Configure nvmet Directly via configfs (Minimal, Copy/Paste Friendly)&lt;/H4&gt;
&lt;P&gt;On the Linux target, run the following as root (or with sudo). This configures one NVMe-oF subsystem exporting one namespace over NVMe/TCP.&lt;/P&gt;
&lt;H5&gt;1) Load kernel modules and mount configfs&lt;/H5&gt;
&lt;LI-CODE lang="shell"&gt;sudo modprobe nvmet
sudo modprobe nvmet-tcp

# Required for nvmet configuration
sudo mount -t configfs none /sys/kernel/config&lt;/LI-CODE&gt;
&lt;H5&gt;2) Create a subsystem (choose an NQN) and allow host access&lt;/H5&gt;
&lt;P&gt;Pick a subsystem name/NQN. &lt;STRONG&gt;Use a proper NQN format&lt;/STRONG&gt; to avoid collisions on shared networks (example shown).&lt;/P&gt;
&lt;LI-CODE lang="shell"&gt;SUBSYS="nqn.2026-02.com.contoso:win-nvmeof-test"
sudo mkdir -p /sys/kernel/config/nvmet/subsystems/$SUBSYS

# Lab-only: allow any host to connect
echo 1 | sudo tee /sys/kernel/config/nvmet/subsystems/$SUBSYS/attr_allow_any_host &amp;gt; /dev/null&lt;/LI-CODE&gt;
&lt;H5&gt;3) Add a namespace (export a local block device)&lt;/H5&gt;
&lt;P&gt;Choose a block device on the target (example: /dev/nvme0n1). &lt;STRONG&gt;Be careful:&lt;/STRONG&gt; you are exporting the raw block device.&lt;/P&gt;
&lt;LI-CODE lang="shell"&gt;DEV="/dev/nvme0n1"   # &amp;lt;-- replace with your device (e.g., /dev/sdb)

sudo mkdir -p /sys/kernel/config/nvmet/subsystems/$SUBSYS/namespaces/1
echo -n $DEV | sudo tee /sys/kernel/config/nvmet/subsystems/$SUBSYS/namespaces/1/device_path &amp;gt; /dev/null
echo 1 | sudo tee /sys/kernel/config/nvmet/subsystems/$SUBSYS/namespaces/1/enable &amp;gt; /dev/null&lt;/LI-CODE&gt;
&lt;H5&gt;4) Create a TCP port (listener) and bind the subsystem&lt;/H5&gt;
&lt;P&gt;Choose:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;TRADDR&lt;/STRONG&gt; = the Linux target’s IP address on the test network&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;TRSVCID&lt;/STRONG&gt; = the TCP port (commonly &lt;STRONG&gt;4420&lt;/STRONG&gt;, but you can use any free TCP port)&lt;/LI&gt;
&lt;/UL&gt;
&lt;LI-CODE lang="shell"&gt;PORTID=1
TRADDR="192.168.1.92"   # &amp;lt;-- replace with target IP
TRSVCID="4420"          # &amp;lt;-- TCP port

sudo mkdir -p /sys/kernel/config/nvmet/ports/$PORTID
echo -n $TRADDR | sudo tee /sys/kernel/config/nvmet/ports/$PORTID/addr_traddr &amp;gt; /dev/null
echo -n tcp | sudo tee /sys/kernel/config/nvmet/ports/$PORTID/addr_trtype &amp;gt; /dev/null
echo -n $TRSVCID | sudo tee /sys/kernel/config/nvmet/ports/$PORTID/addr_trsvcid &amp;gt; /dev/null
echo -n ipv4 | sudo tee /sys/kernel/config/nvmet/ports/$PORTID/addr_adrfam &amp;gt; /dev/null

# Bind subsystem to port
sudo ln -s /sys/kernel/config/nvmet/subsystems/$SUBSYS \
/sys/kernel/config/nvmet/ports/$PORTID/subsystems/$SUBSYS&lt;/LI-CODE&gt;
&lt;H5&gt;5) Quick validation (optional, from any Linux host with nvme-cli)&lt;/H5&gt;
&lt;P&gt;If you have a Linux host handy, nvme discover will confirm the target is advertising the subsystem and will show the subnqn value you’ll use from Windows.&lt;/P&gt;
&lt;LI-CODE lang="shell"&gt;sudo nvme discover -t tcp -a 192.168.1.92 -s 4420&lt;/LI-CODE&gt;
&lt;H4&gt;Mapping the Target Values to Your Windows nvmeofutil.exe Steps&lt;/H4&gt;
&lt;P&gt;In your Windows steps, you already define the key connection parameters in the &lt;STRONG&gt;Subsystem Port&lt;/STRONG&gt; add/connect flow. Use these mappings:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;SubsystemNQN&lt;/STRONG&gt; (-nq) → the subsystem name/NQN you created (example: nqn.2026-02.com.contoso:win-nvmeof-test)&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;TargetAddress&lt;/STRONG&gt; (-ta) → the Linux target IP address (example: 192.168.1.92)&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;ServiceId&lt;/STRONG&gt; (-ts) → the TCP port you used (example: 4420)&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4&gt;Option B — If You Prefer a Tool-Based Setup: nvmetcli&lt;/H4&gt;
&lt;P&gt;If you’d rather not manipulate configfs directly, &lt;STRONG&gt;nvmetcli&lt;/STRONG&gt; provides an interactive shell and can save/restore configurations from JSON (useful for repeating the setup across reboots in a lab). At a high level, nvmetcli can:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Create subsystems and namespaces&lt;/LI&gt;
&lt;LI&gt;Configure ports (including TCP)&lt;/LI&gt;
&lt;LI&gt;Manage allowed hosts (or allow any host in controlled environments)&lt;/LI&gt;
&lt;LI&gt;Save/restore configs (for example, /etc/nvmet/config.json)&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4&gt;Optional (Advanced): SPDK NVMe-oF Target&lt;/H4&gt;
&lt;P&gt;If you already use SPDK or want to explore higher-performance user-space targets, SPDK’s NVMe-oF target supports TCP and RDMA and is configured via JSON-RPC. For early evaluation, the Linux kernel target above is usually the quickest path.&lt;/P&gt;
&lt;H3&gt;Known Limitations&lt;/H3&gt;
&lt;P&gt;As you evaluate this early Insider release, keep the following limitations in mind:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Configuration is &lt;STRONG&gt;CLI-only&lt;/STRONG&gt; (no GUI or PowerShell cmdlets yet)&lt;/LI&gt;
&lt;LI&gt;No multipathing&lt;/LI&gt;
&lt;LI&gt;Limited recovery behavior in some network failure scenarios&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;These areas are under active development.&lt;/P&gt;
&lt;H3&gt;Try It and Share Feedback&lt;/H3&gt;
&lt;P&gt;We encourage&amp;nbsp;you to try NVMe-oF in your lab or test environment and share your experience on &lt;STRONG&gt;&lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-forum" href="https://techcommunity.microsoft.com/category/windows-server/discussions/windowsserverinsiders" target="_blank" rel="noopener" data-lia-auto-title="Windows Server Insiders Discussions" data-lia-auto-title-active="0"&gt;Windows Server Insiders Discussions&lt;/A&gt; &lt;/STRONG&gt;so the engineering team can review public feedback in one place.&lt;/P&gt;
&lt;P&gt;For private feedback or questions that can’t be shared publicly, you can also reach us at nvmeofpreview@microsoft.com.&lt;/P&gt;
&lt;P&gt;We look forward to your feedback as we take the next steps in modernizing remote storage on Windows Server.&lt;/P&gt;
&lt;P&gt;—&lt;BR /&gt;&lt;EM&gt;Yash Shekar (and the Windows Server team)&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 13 Mar 2026 17:34:12 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-server-news-and-best/introducing-the-windows-nvme-of-initiator-preview-in-windows/ba-p/4501344</guid>
      <dc:creator>Yash_Shekar</dc:creator>
      <dc:date>2026-03-13T17:34:12Z</dc:date>
    </item>
    <item>
      <title>Save the date: Windows Server Summit – May 11-13, 2026</title>
      <link>https://techcommunity.microsoft.com/t5/windows-server-news-and-best/save-the-date-windows-server-summit-may-11-13-2026/ba-p/4501057</link>
      <description>&lt;P&gt;Windows Server Summit 2026 builds on the strong momentum of last year's event—where you told us you want less marketing and more practical, engineering‑led guidance. If you're responsible for keeping Windows Server environments secure, resilient, and up to date, this year's summit is designed with you in mind.&lt;/P&gt;
&lt;H2 style="margin-top: 36px; margin-bottom: 20px; font-family: 'Segoe UI', Segoe, Tahoma, Geneva, sans-serif; font-weight: 600; font-size: 24px; color: #333333;"&gt;What you'll learn&lt;/H2&gt;
&lt;P style="margin-top: 16px;"&gt;Windows Server Summit 2026 returns with a deeper, more forward‑looking agenda focused on real-world operations, security, and hybrid scenarios. Across three days of expert‑led sessions, Microsoft engineers and product leaders will share scenario‑based deep dives, architecture guidance, and actionable takeaways you can apply immediately.&lt;/P&gt;
&lt;P style="margin-top: 16px;"&gt;The content is organized around three core pillars:&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="line-height: 1.7; margin-top: 12px; margin-bottom: 2px;"&gt;&lt;STRONG&gt;What's new in Windows Server&lt;/STRONG&gt; – Get a practical walkthrough of recent innovations and updates in Windows Server 2025, including hotpatch updates, management improvements, security enhancements, and what's coming next. Find out what's changed, why it matters, and how to operationalize it in production environments.&lt;/LI&gt;
&lt;LI style="line-height: 1.7; margin-bottom: 2px;"&gt;&lt;STRONG&gt;Windows Server + Azure: Better together&lt;/STRONG&gt; – Explore real hybrid and multicloud scenarios enabled by Azure Arc, with guidance that goes beyond theory. Learn how to extend management, security, and governance across on‑premises and cloud infrastructure—and get clear, experience‑based advice for planning migrations and modernization paths that fit your organization's technical and business needs.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Hands‑on technical depth and operational excellence&lt;/STRONG&gt; - Expect best practices, operational insights, and hard‑earned lessons from the field—covering topics like security hardening, resiliency, lifecycle management, and keeping environments compliant and current.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P style="margin-top: 16px;"&gt;The 2026 Summit will also serve as an early engagement moment for Windows Server v.Next, giving you visibility into Microsoft's direction and upcoming investments. Just as importantly, it provides a dedicated forum to share feedback directly with the product team, continuing the Summit's role as a trusted, two‑way conversation between Microsoft engineering and the Windows Server community.&lt;/P&gt;
&lt;H2 style="margin-top: 36px; margin-bottom: 20px; font-family: 'Segoe UI', Segoe, Tahoma, Geneva, sans-serif; font-weight: 600; font-size: 24px; color: #333333;"&gt;Add it to your calendar&lt;/H2&gt;
&lt;P style="margin-top: 16px;"&gt;&lt;A href="https://aka.ms/WindowsServerSummit2026" target="_blank"&gt;&lt;STRONG&gt;Visit the Windows Server Summit 2026 event page today&lt;/STRONG&gt;&lt;/A&gt; to save the dates. Follow the event and you'll be notified when roll out the full, day‑by‑day agenda later this month.&lt;/P&gt;
&lt;P style="margin-top: 16px;"&gt;Designed for enterprise IT professionals, architects, and technical decision‑makers, Windows Server Summit 2026 delivers actionable, scenario‑driven content to help you secure, modernize, and extend your Windows Server environments—on‑premises, in Azure, and across hybrid infrastructure. We hope to see you there!&lt;/P&gt;</description>
      <pubDate>Wed, 11 Mar 2026 16:00:00 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-server-news-and-best/save-the-date-windows-server-summit-may-11-13-2026/ba-p/4501057</guid>
      <dc:creator>JenniferYuan</dc:creator>
      <dc:date>2026-03-11T16:00:00Z</dc:date>
    </item>
    <item>
      <title>Announcing ReFS Boot for Windows Server Insiders</title>
      <link>https://techcommunity.microsoft.com/t5/windows-server-news-and-best/announcing-refs-boot-for-windows-server-insiders/ba-p/4496592</link>
      <description>&lt;H5&gt;We’re excited to announce that Resilient File System (ReFS) boot support is now available for Windows Server Insiders in Insider Preview builds. For the first time, you can install and boot Windows Server on an ReFS-formatted boot volume directly through the setup UI. With ReFS boot, you can finally bring modern resilience, scalability, and performance to your server’s most critical volume — the OS boot volume.&lt;/H5&gt;
&lt;P&gt;&lt;STRONG&gt;Why ReFS Boot?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Modern workloads demand more from the boot volume than NTFS can provide. ReFS was designed from the ground up to protect data integrity at scale. By enabling ReFS for the OS boot volume we ensure that even the most critical system data benefits from advanced resilience, future-proof scalability, and improved performance.&lt;/P&gt;
&lt;P&gt;In short, ReFS boot means a more robust server right from startup with several benefits:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;U&gt;Resilient OS disk&lt;/U&gt;: ReFS improves boot‑volume reliability by detecting corruption early and handling many file‑system issues online without requiring chkdsk. Its integrity‑first, copy‑on‑write design reduces the risk of crash‑induced corruption to help keep your system running smoothly.&lt;/LI&gt;
&lt;LI&gt;&lt;U&gt;Massive scalability&lt;/U&gt;:&lt;STRONG&gt; &lt;/STRONG&gt;ReFS supports volumes up to 35 petabytes (35,000 TB) — vastly beyond NTFS’s typical limit of 256 TB. That means your boot volume can grow with future hardware, eliminating capacity ceilings.&lt;/LI&gt;
&lt;LI&gt;&lt;U&gt;Performance optimizations&lt;/U&gt;:&lt;STRONG&gt; &lt;/STRONG&gt;ReFS uses block cloning and sparse provisioning to accelerate I/O‑heavy scenarios — enabling dramatically faster creation or expansion of large fixed‑size VHD(X) files and speeding up large file copy operations by copying data via metadata references rather than full data movement.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Maximum Boot Volume Size: NTFS vs. ReFS&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Resiliency Enhancements with ReFS Boot&lt;/STRONG&gt;&lt;/P&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table border="1" style="width: 57.8704%; height: 357px; border-width: 1px;"&gt;&lt;tbody&gt;&lt;tr style="height: 39px;"&gt;&lt;td style="height: 39px;"&gt;
&lt;P&gt;&lt;STRONG&gt;Feature&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 39px;"&gt;
&lt;P&gt;&lt;STRONG&gt;ReFS Boot Volume &amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 39px;"&gt;
&lt;P&gt;&lt;STRONG&gt;NTFS Boot Volume&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 39px;"&gt;&lt;td style="height: 39px;"&gt;
&lt;P&gt;Metadata checksums&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 39px;"&gt;
&lt;P&gt;✅ Yes&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 39px;"&gt;
&lt;P&gt;❌ No&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 67px;"&gt;&lt;td style="height: 67px;"&gt;
&lt;P&gt;Integrity streams (optional)&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 67px;"&gt;
&lt;P&gt;✅ Yes&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 67px;"&gt;
&lt;P&gt;❌ No&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 67px;"&gt;&lt;td style="height: 67px;"&gt;
&lt;P&gt;Proactive error detection (scrubber)&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 67px;"&gt;
&lt;P&gt;✅ Yes&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 67px;"&gt;
&lt;P&gt;❌ No&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 39px;"&gt;&lt;td style="height: 39px;"&gt;
&lt;P&gt;Online integrity (no chkdsk)&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 39px;"&gt;
&lt;P&gt;✅ Yes&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 39px;"&gt;
&lt;P&gt;❌ No&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;colgroup&gt;&lt;col style="width: 33.33%" /&gt;&lt;col style="width: 33.33%" /&gt;&lt;col style="width: 33.33%" /&gt;&lt;/colgroup&gt;&lt;/table&gt;&lt;/DIV&gt;
&lt;P&gt;Check out &lt;A href="https://learn.microsoft.com/en-us/windows-server/storage/refs/refs-overview#resiliency" target="_blank" rel="noopener"&gt;Microsoft Learn&lt;/A&gt; for more information on ReFS resiliency enhancements.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Performance Enhancements with ReFS Boot&lt;/STRONG&gt;&lt;/P&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table border="1" style="width: 58.3333%; border-width: 1px;"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Operation&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;ReFS Boot Volume&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;NTFS Boot Volume&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Fixed-size VHD creation&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Seconds&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Minutes&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Large file copy operations&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Milliseconds-seconds (independent of file size)&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Seconds-minutes &lt;BR /&gt;(linear with file size)&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Sparse provisioning&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;✅&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;❌&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;colgroup&gt;&lt;col style="width: 33.2173%" /&gt;&lt;col style="width: 33.0592%" /&gt;&lt;col style="width: 33.6919%" /&gt;&lt;/colgroup&gt;&lt;/table&gt;&lt;/DIV&gt;
&lt;P&gt;Check out &lt;A href="https://learn.microsoft.com/en-us/windows-server/storage/refs/refs-overview#performance" target="_blank" rel="noopener"&gt;Microsoft Learn&lt;/A&gt; for more information on ReFS performance enhancements.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Getting Started with ReFS Boot&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Ready to try it out? Here’s how to get started with ReFS boot on Windows Server Insider Preview:&lt;/P&gt;
&lt;P&gt;1. &lt;U&gt;Update to the latest Insider build&lt;/U&gt;: Ensure you’re running the most recent Windows Server vNext Insider Preview (Join&amp;nbsp;&lt;A href="https://insider.windows.com/en-us/for-business-getting-started-server" target="_blank" rel="noopener"&gt;Windows Server Insiders&lt;/A&gt; if you haven’t already). Builds from 2/11/26 or later (minimum build number 29531.1000.260206-1841) include ReFS boot in setup.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;2. &lt;U&gt;Choose ReFS during setup&lt;/U&gt;: When installing Windows Server, format the system (C:) partition as ReFS in the installation UI.&amp;nbsp;&lt;BR /&gt;&lt;STRONG&gt;Note:&lt;/STRONG&gt; ReFS boot requires UEFI firmware and does not support legacy BIOS boot; as a result, ReFS boot is not supported on Generation 1 VMs.&lt;/P&gt;
&lt;img&gt;Screenshot of the Windows Server Setup UI showing ReFS as a File System format option.&lt;/img&gt;
&lt;P&gt;3. &lt;U&gt;Complete installation &amp;amp; verify&lt;/U&gt;: Finish the Windows Server installation as usual. Once it boots, confirm that your C: drive is using ReFS (for example, by running &lt;CODE&gt;fsutil fsinfo volumeInfo C:&lt;/CODE&gt; or checking the drive properties). That’s it – your server is now running with an ReFS boot volume.&lt;/P&gt;
&lt;img&gt;Screenshot of PowerShell output showing the C: drive formatted as ReFS.&lt;/img&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;FIGURE style="margin: 0; padding: 0;"&gt;
&lt;DIV style="position: relative; width: 100%; max-width: 960px; height: 0; padding-bottom: 56.25%; overflow: hidden; border: 0; margin: 0 auto;"&gt;&lt;IFRAME src="https://medius.microsoft.com/Embed/video-nc/4bcf4516-bd2e-4233-9a09-0bbff8994c29?r=951286837193&amp;amp;vq=hd1080" title="ReFS Boot Setup Demo" allowfullscreen="allowfullscreen" allow="fullscreen; picture-in-picture; autoplay; encrypted-media" style="position: absolute; top: 0; left: 0; width: 100%; height: 100%; border: 0;" sandbox="allow-scripts allow-same-origin allow-forms"&gt;
    &lt;/IFRAME&gt;&lt;/DIV&gt;
&lt;/FIGURE&gt;
&lt;P style="max-width: 960px; margin: 6px auto 0; text-align: left; font-size: 12px; line-height: 1.4; color: #6b6b6b;"&gt;A step-by-step demo video showing how to install Windows Server on an ReFS-formatted boot volume, including UEFI setup, disk formatting, and post-install verification. If the player doesn’t load, open the video in a new window: &lt;A style="color: #0a5bd9; text-decoration: underline;" title="Open the video in a new window" href="https://medius.microsoft.com/Embed/video-nc/4bcf4516-bd2e-4233-9a09-0bbff8994c29?r=951286837193" target="_blank" rel="noopener noreferrer"&gt; Open video&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Call to Action&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;In summary, ReFS boot brings future-proof resiliency, scalability, and performance improvements to the Windows Server boot volume — reducing downtime, removing scalability limits, and accelerating large storage operations from day one.&lt;/P&gt;
&lt;P&gt;We encourage you to try ReFS boot on your servers and experience the difference for yourself. As always, we value your feedback. Please share your feedback and questions on the &lt;A href="https://techcommunity.microsoft.com/category/windows-server/discussions/windowsserverinsiders" target="_blank" rel="noopener"&gt; Windows Server Insiders Forum&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;—&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Christina Curlette (and the Windows Server team)&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 27 Feb 2026 01:07:26 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-server-news-and-best/announcing-refs-boot-for-windows-server-insiders/ba-p/4496592</guid>
      <dc:creator>Christina_Curlette</dc:creator>
      <dc:date>2026-02-27T01:07:26Z</dc:date>
    </item>
    <item>
      <title>Windows Server 2025 Remote Desktop Session Host Capacity Planning Whitepaper</title>
      <link>https://techcommunity.microsoft.com/t5/windows-server-news-and-best/windows-server-2025-remote-desktop-session-host-capacity/ba-p/4497543</link>
      <description>&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;The&amp;nbsp;Remote Desktop Session Host (RDSH) is a role service&amp;nbsp;available&amp;nbsp;on Windows Server 2025, which&amp;nbsp;allows&amp;nbsp;multiple users&amp;nbsp;to&amp;nbsp;access&amp;nbsp;desktops and applications&amp;nbsp;hosted&amp;nbsp;on a single machine simultaneously.&amp;nbsp;This document&amp;nbsp;serves&amp;nbsp;as a guide for capacity planning of Remote Desktop Session Host&amp;nbsp;servers&amp;nbsp;running Windows Server 2025.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;In a server-based computing environment, all&amp;nbsp;applications&amp;nbsp;execution and data processing occur on the server. Consequently, the server is one of the systems most likely to experience resource depletion during peak loads, which can lead to disruptions throughout the deployment. A multi-session computing environment experiences significantly higher peak loads compared to single-session environments. An RDSH server with a specific hardware capacity has a maximum workload limit that it can support before its resources are exhausted.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;RDSH server customers need to estimate the required hardware type and quantity for their user base. The process of doing this type of evaluation is referred to as capacity planning. Multi session capacity planning is dependent upon the specific&amp;nbsp;application usage pattern&amp;nbsp;of the user base. Based on the user scenario, an estimation can be made about the hardware&amp;nbsp;required&amp;nbsp;to support the targeted user capacity.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;This white paper presents guidelines and a general&amp;nbsp;methodology&amp;nbsp;for assessing a server’s capacity using a sample user scenario. It outlines the&amp;nbsp;methodology&amp;nbsp;employed for capacity planning using Microsoft's internal tools. It includes various test cases and provides an analysis of the results. The document also provides guidance on the hardware and other parameters that can have a significant impact on the number of users a server can support effectively.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;You can read the rest of the whitepaper by downloading &lt;A class="lia-external-url" href="https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdownload.microsoft.com%2Fdownload%2F41af4cc7-8c9d-4c12-b148-d4454c2edaea%2FWindows%2520Server%25202025%2520Capacity%2520Planning%2520Whitepaper.pdf&amp;amp;data=05%7C02%7Cv-allcordle%40microsoft.com%7C688fb99b6e484e87442d08de6fe22630%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C639071214347664358%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;amp;sdata=g2kQbbChDb6y%2B0TdjICkFIqrPrepb3fUJmMJwUlNxGM%3D&amp;amp;reserved=0" target="_blank" rel="noopener"&gt;here&lt;/A&gt;.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 26 Feb 2026 16:00:25 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-server-news-and-best/windows-server-2025-remote-desktop-session-host-capacity/ba-p/4497543</guid>
      <dc:creator>WSNewsAdmin</dc:creator>
      <dc:date>2026-02-26T16:00:25Z</dc:date>
    </item>
    <item>
      <title>Windows Server Secure Boot playbook for certificates expiring in 2026</title>
      <link>https://techcommunity.microsoft.com/t5/windows-server-news-and-best/windows-server-secure-boot-playbook-for-certificates-expiring-in/ba-p/4495789</link>
      <description>&lt;P&gt;This guidance describes the tools and options available to help organizations update Secure Boot certificates on Windows Server before the certificates begin expiring in June 2026.&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;&lt;STRONG&gt;Note:&lt;/STRONG&gt; This guidance does not apply to Azure Local hosts, Windows PCs or Generation 1 Hyper-V VMs. For Azure Local information, see &lt;A href="https://learn.microsoft.com/azure/azure-local/security-update/security-update?view=azloc-2601&amp;amp;tabs=os-build-25398-xxxx#windows-secure-boot-certificate-expiration" target="_blank" rel="noopener"&gt;Security updates for Azure Local&lt;/A&gt;. For IT-managed Windows PC information, see the &lt;A href="https://aka.ms/securebootplaybook" target="_blank" rel="noopener"&gt;Secure Boot Playbook for Windows client&lt;/A&gt;. Generation 1 Hyper-V VMs do not support Secure Boot.&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;On Windows Server, Secure Boot is a long‑standing security capability that works in conjunction with the Unified Extensible Firmware Interface (UEFI). It uses cryptographic trust anchors, referred to as certificate authorities (CAs), to confirm that firmware and boot components are trusted before they are allowed to run. This validation helps reduce the risk of malware executing early in the server startup process.&lt;/P&gt;
&lt;P&gt;Like other cryptographic assets, Secure Boot certificates are issued with defined lifetimes. Refreshing these certificates periodically helps maintain alignment with current security requirements. For this reason, organizations will need to ensure the 2023 Secure Boot CAs are present on applicable Windows Server systems before the older 2011 CAs begin expiring in June 2026. Systems on the 2011 CAs after June 2026 are at risk of running on degraded security posture.&lt;/P&gt;
&lt;P&gt;Windows Server 2025 certified server platforms already include the 2023 certificates in firmware. For servers that do not, IT administrators must manually update the certificates, because Windows Server does not receive them automatically. Unlike Windows PCs, which receive the 2023 Secure Boot certificates through Controlled Feature Rollout (CFR) as part of the monthly update process, Windows Server requires manual action.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;!-- Get started today --&gt;
&lt;DIV style="display: flex; align-items: center; height: 50px; background-color: rgb(42, 68, 111);"&gt;
&lt;H2 style="font-size: 22px; text-align: center; color: #ffffff; margin: 0px 20px 0px 20px;"&gt;&lt;a id="community--1-get-started" class="lia-anchor"&gt;&lt;/a&gt;Get started today&lt;/H2&gt;
&lt;/DIV&gt;
&lt;DIV style="padding: 20px 0; border: 2px dashed #2a446f;"&gt;
&lt;P style="margin: 0px 20px 0px 20px;"&gt;Below, you can find the checklist with the recommended approach for proactively updating Secure Boot certificates on Windows Server. It outlines key preparation, deployment, and monitoring considerations to help you manage certificate updates across your device fleet.&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="line-height: 1.7; margin-top: 12px; margin-left: 16px; margin-bottom: 2px;"&gt;&lt;A href="#community--1-_step1" target="_self"&gt;Step 1: Inventory and prepare your environment&lt;/A&gt;&lt;/LI&gt;
&lt;LI style="line-height: 1.7; margin-bottom: 2px; margin-left: 16px;"&gt;&lt;A href="#community--1-_step2" target="_self"&gt;Step 2: Monitor and check your devices for Secure Boot status&lt;/A&gt;&lt;/LI&gt;
&lt;LI style="line-height: 1.7; margin-bottom: 2px; margin-left: 16px;"&gt;&lt;A href="#community--1-_step3" target="_self"&gt;Step 3: Apply any needed OEM firmware updates before updating certificates&lt;/A&gt;&lt;/LI&gt;
&lt;LI style="line-height: 1.7; margin-bottom: 2px; margin-left: 16px;"&gt;&lt;A href="#community--1-_step4" target="_self"&gt;Step 4: Plan and pilot Secure Boot certificate deployments&lt;/A&gt;&lt;/LI&gt;
&lt;LI style="line-height: 1.7; margin-bottom: 2px; margin-left: 16px;"&gt;&lt;A href="#community--1-_step5" target="_self"&gt;Step 5: Troubleshoot if needed&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/DIV&gt;
&lt;P style="margin: 0px 20px 0px 20px;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;!-- Step 1: Inventory and prepare your environment --&gt;
&lt;DIV style="display: flex; align-items: center; height: 50px; background-color: rgb(0, 120, 212);"&gt;
&lt;H2 style="font-size: 22px; text-align: center; color: #ffffff; margin: 0px 20px 0px 20px;"&gt;&lt;a id="community--1-_step1" class="lia-anchor"&gt;&lt;/a&gt;Step 1: Inventory and prepare your environment&lt;/H2&gt;
&lt;/DIV&gt;
&lt;DIV style="padding: 20px 0; border: 1px dashed #0078d4;"&gt;
&lt;P style="margin: 0px 20px 0px 20px;"&gt;Servers in your organization require IT administrators to validate and manually roll out the secure boot certificate updates. As the first step, we recommend conducting an inventory.&lt;/P&gt;
&lt;H3 style="margin: 36px 20px 20px 20px; font-family: 'Segoe UI', Segoe, Tahoma, Geneva, sans-serif; font-weight: 600; font-size: 20px; color: #333333;"&gt;Inventory&lt;/H3&gt;
&lt;P style="margin: 0px 20px 0px 20px;"&gt;First, &lt;A href="https://support.microsoft.com/topic/secure-boot-certificate-updates-guidance-for-it-professionals-and-organizations-e2b43f9f-b424-42df-bc6a-8476db65ab2f#bkmk_is_secure_boot_enabled" target="_blank" rel="noopener"&gt;verify if the servers in your organization are Secure Boot enabled&lt;/A&gt;. You should also check the status of the Secure Boot certificates with &lt;A href="https://support.microsoft.com/topic/windows-devices-with-it-managed-updates-e2b43f9f-b424-42df-bc6a-8476db65ab2f" target="_blank" rel="noopener"&gt;sample inventory PowerShell commands&lt;/A&gt; or by checking the value of the &lt;STRONG&gt;UEFICA2023Status &lt;/STRONG&gt;registry key. Your ultimate goal for this value is to be "updated” for all applicable servers you manage.&lt;/P&gt;
&lt;P style="margin: 12px 20px 0px 20px;"&gt;Out of the devices that show up as not updated, build a small, representative sample to validate that the certificates update properly. We recommend that you start with servers hosting less impactful workloads. Then follow the rest of the steps outlined in this post to pilot the certificate updates and confirm that deployment is successful.&lt;/P&gt;
&lt;H3 style="margin: 36px 20px 20px 20px; font-family: 'Segoe UI', Segoe, Tahoma, Geneva, sans-serif; font-weight: 600; font-size: 20px; color: #333333;"&gt;Prepare target devices&lt;/H3&gt;
&lt;P style="margin: 0px 20px 0px 20px;"&gt;There are two options available today for managing Secure Boot certificate updates for servers. You can use registry keys or Group Policy. To plan and prepare devices for Secure Boot certificate deployment, the best practice is to start small and verify success. Then, deploy the certificates to the server instances of the same type that have been validated for the update. See Step 4 when you're ready to deploy these updates.&lt;/P&gt;
&lt;P style="margin: 0px 20px 0px 20px;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;BLOCKQUOTE style="margin: 0px 20px 0px 20px;"&gt;
&lt;P&gt;&lt;STRONG&gt;Important: &lt;/STRONG&gt;All Secure Boot registry keys are located under these two paths:&lt;BR /&gt;HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecureBoot &lt;BR /&gt;HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecureBoot\Servicing&lt;/P&gt;
&lt;P&gt;See &lt;A href="https://support.microsoft.com/topic/registry-key-updates-for-secure-boot-windows-devices-with-it-managed-updates-a7be69c9-4634-42e1-9ca1-df06f43f360d" target="_blank" rel="noopener"&gt;Registry key updates for Secure Boot: Windows devices with IT-managed updates &lt;/A&gt;for more details.&lt;/P&gt;
&lt;P&gt;Group Policy settings are available by navigating to: &lt;STRONG&gt;Computer Configuration &amp;gt; Administrative Templates &amp;gt; Windows Components &amp;gt; Secure Boot&lt;/STRONG&gt;. To get the updates that include the Group Policy for deploying Secure Boot certificate updates, download the &lt;A href="https://www.microsoft.com/download/details.aspx?id=108430" target="_blank" rel="noopener"&gt;latest Administrative Templates (.admx) for Windows Server&lt;/A&gt;.&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;/DIV&gt;
&lt;P style="margin: 0px 20px 0px 20px;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;!-- Step 2: Monitor and check your devices for Secure Boot status --&gt;
&lt;DIV style="display: flex; align-items: center; height: 50px; background-color: rgb(0, 120, 212);"&gt;
&lt;H2 style="font-size: 22px; text-align: center; color: #ffffff; margin: 0px 20px 0px 20px;"&gt;&lt;a id="community--1-_step2" class="lia-anchor"&gt;&lt;/a&gt;Step 2: Monitor and check your devices for Secure Boot status&lt;/H2&gt;
&lt;/DIV&gt;
&lt;DIV style="padding: 20px 0; border: 1px dashed #0078d4;"&gt;
&lt;P style="margin: 0px 20px 0px 20px;"&gt;If you have multiple servers to manage, here are the ways to keep track of the device status. If you have a mix of new and old servers in your organization, the newer servers such as those certified by Microsoft for Windows Server 2025 may not need an update. You can use registry keys or Windows Event Log events to identify which devices already have new certificates and which ones need attention.&lt;/P&gt;
&lt;H3 style="margin: 36px 20px 20px 20px; font-family: 'Segoe UI', Segoe, Tahoma, Geneva, sans-serif; font-weight: 600; font-size: 20px; color: #333333;"&gt;Deployment progress&lt;/H3&gt;
&lt;P style="margin: 0px 20px 0px 20px;"&gt;The text value of the &lt;STRONG&gt;UEFICA2023Status&lt;/STRONG&gt; registry key will indicate if your certificate deployment status is not started, in progress, or updated. The value will change progressively until all new certificates and the new boot manager have been deployed successfully.&lt;/P&gt;
&lt;H3 style="margin: 36px 20px 20px 20px; font-family: 'Segoe UI', Segoe, Tahoma, Geneva, sans-serif; font-weight: 600; font-size: 20px; color: #333333;"&gt;Successful deployment&lt;/H3&gt;
&lt;UL&gt;
&lt;LI style="line-height: 1.7; margin-top: 12px; margin-left: 16px; margin-bottom: 2px;"&gt;Check the Windows System Event Log events for&amp;nbsp;&lt;STRONG&gt;Event ID 1808&lt;/STRONG&gt;.&amp;nbsp;This informational event indicates that the device has the required new Secure Boot certificates applied to the device's firmware.&lt;/LI&gt;
&lt;LI style="line-height: 1.7; margin-bottom: 2px; margin-left: 16px;"&gt;Check the&amp;nbsp;&lt;STRONG&gt;UEFICA2023Error&lt;/STRONG&gt; registry key for issues. This key is created only when there’s an error.&lt;/LI&gt;
&lt;LI style="line-height: 1.7; margin-bottom: 2px; margin-left: 16px;"&gt;Check that the text value of the &lt;STRONG&gt;UEFICA2023Status&lt;/STRONG&gt; registry key reads as "Updated."&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3 style="margin: 36px 20px 20px 20px; font-family: 'Segoe UI', Segoe, Tahoma, Geneva, sans-serif; font-weight: 600; font-size: 20px; color: #333333;"&gt;Errors during deployment&lt;/H3&gt;
&lt;UL&gt;
&lt;LI style="line-height: 1.7; margin-top: 12px; margin-left: 16px; margin-bottom: 2px;"&gt;Check the Windows System Event Log for&amp;nbsp;&lt;STRONG&gt;Event ID 1801&lt;/STRONG&gt;. This event indicates that some or all of the updated certificates and 2023 signed boot manager have not been applied to the device&lt;/LI&gt;
&lt;LI style="line-height: 1.7; margin-bottom: 2px; margin-left: 16px;"&gt;Check if the &lt;STRONG&gt;UEFICA2023Error&lt;/STRONG&gt; registry key exists. If you find this key, it means there was an error in certificate deployment. Look for more details at&amp;nbsp;&lt;A href="https://support.microsoft.com/topic/37e47cf8-608b-4a87-8175-bdead630eb69" target="_blank" rel="noopener"&gt;Secure Boot DB and DBX variable update events&lt;/A&gt;.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/DIV&gt;
&lt;P style="margin: 0px 20px 0px 20px;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;!-- Step 3: Apply OEM firmware updates before Microsoft updates --&gt;
&lt;DIV style="display: flex; align-items: center; height: 50px; background-color: rgb(0, 120, 212);"&gt;
&lt;H2 style="font-size: 22px; text-align: center; color: #ffffff; margin: 0px 20px 0px 20px;"&gt;&lt;a id="community--1-_step3" class="lia-anchor"&gt;&lt;/a&gt;Step 3: Apply any needed OEM firmware updates before updating certificates&lt;/H2&gt;
&lt;/DIV&gt;
&lt;DIV style="padding: 20px 0; border: 1px dashed #0078d4;"&gt;
&lt;P style="margin: 0px 20px 0px 20px;"&gt;The best practice is to always check and apply needed firmware updates before updating certificates. Updated firmware can help prevent compatibility problems and help ensure new Secure Boot certificates are accepted.&lt;/P&gt;
&lt;P style="margin: 12px 20px 0px 20px;"&gt;&lt;A href="https://support.microsoft.com/topic/original-equipment-manufacturer-oem-pages-for-secure-boot-9ecc3ba4-fb50-4bd3-9e9b-f16b35b8fb68" target="_blank" rel="noopener"&gt;Microsoft is partnering with OEMs&lt;/A&gt; to provide platform specific information to prepare your environment before the update. Expect the list to grow as we have more partners ready to provide more information.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;BLOCKQUOTE style="margin: 0px 20px 0px 20px;"&gt;
&lt;P&gt;&lt;STRONG&gt;Note:&lt;/STRONG&gt; A firmware update may be necessary if there are known issues with the firmware handling Secure Boot certificate updates. Some firmware updates also set new Secure Boot defaults to include the updated certificates.&lt;/P&gt;
&lt;P&gt;If the firmware already handles the certificate updates correctly, a firmware update is not required. Support for firmware updates on older products is determined by the OEM.&lt;/P&gt;
&lt;P&gt;If an OEM has ended firmware support for a specific system, firmware updates may no longer be available. For questions regarding Secure boot update support, IT administrators should consult the system manufacturer (OEM) directly.&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;/DIV&gt;
&lt;P style="margin: 0px 20px 0px 20px;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;!-- Step 4: Plan and pilot Secure Boot certificate deployments --&gt;
&lt;DIV style="display: flex; align-items: center; height: 50px; background-color: rgb(0, 120, 212);"&gt;
&lt;H2 style="font-size: 22px; text-align: center; color: #ffffff; margin: 0px 20px 0px 20px;"&gt;&lt;a id="community--1-_step4" class="lia-anchor"&gt;&lt;/a&gt;Step 4: Plan and pilot Secure Boot certificate deployments&lt;/H2&gt;
&lt;/DIV&gt;
&lt;DIV style="padding: 20px 0; border: 1px dashed #0078d4;"&gt;
&lt;P style="margin: 0px 20px 0px 20px;"&gt;Once you identify the servers that need to be updated, choose to do this through registry keys or Group Policy. Pilot your desired method first on a small representative set of devices to gain confidence.&lt;/P&gt;
&lt;P style="margin: 12px 20px 20px 20px;"&gt;In a typical enterprise deployment, Secure Boot certificates are generally applied within approximately 12 hours after the setting is applied to a device. If Windows detects that one of the updates cannot be applied without a reboot, Event 1800 is logged. In most cases, the reboot requirement is due to the Boot Manager. When a reboot is required, you can wait for the next scheduled restart or perform an unplanned reboot to complete the process. See &lt;A class="lia-external-url" href="https://support.microsoft.com/topic/secure-boot-certificate-updates-guidance-for-it-professionals-and-organizations-e2b43f9f-b424-42df-bc6a-8476db65ab2f#bkmk_how_updates_are_deployed" target="_blank" rel="noopener"&gt;How updates are deployed&lt;/A&gt; for more details. For testing scenarios, you can accelerate the experience by following the steps outlined in &lt;A class="lia-external-url" href="https://support.microsoft.com/kb/5068202#bkmk_device_testing" target="_blank" rel="noopener"&gt;Device Testing Using Registry Keys&lt;/A&gt;.&lt;/P&gt;
&lt;BLOCKQUOTE style="margin: 0px 20px 0px 20px;"&gt;
&lt;P&gt;&lt;STRONG&gt;Important: &lt;/STRONG&gt;Avoid mixing deployment methods on the same device. For additional technical recommendations to help you plan and deploy your Secure Boot updates, see &lt;A href="https://support.microsoft.com/topic/secure-boot-certificate-updates-guidance-for-it-professionals-and-organizations-e2b43f9f-b424-42df-bc6a-8476db65ab2f#bkmk_deployment_strategies" target="_blank" rel="noopener"&gt;Deployment strategies&lt;/A&gt;.&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;H3 style="margin: 36px 20px 20px 20px; font-family: 'Segoe UI', Segoe, Tahoma, Geneva, sans-serif; font-weight: 600; font-size: 20px; color: #333333;"&gt;&lt;a id="community--1-_option1" class="lia-anchor"&gt;&lt;/a&gt;Option 1: Deploy certificates with registry keys&lt;/H3&gt;
&lt;P style="margin: 0px 20px 0px 20px;"&gt;Find the &lt;STRONG&gt;AvailableUpdates&lt;/STRONG&gt; registry key located under this registry path: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecureBoot.&lt;/P&gt;
&lt;P style="margin: 12px 20px 20px 20px;"&gt;Set its value to &lt;STRONG&gt;0x5944&lt;/STRONG&gt; to deploy all needed certificates and update to the &lt;STRONG&gt;Windows UEFI CA 2023&lt;/STRONG&gt; signed boot manager. This key corresponds to the Group Policy setting &lt;STRONG&gt;Enable Secure Boot certificate deployment&lt;/STRONG&gt;. For details, see &lt;A href="https://support.microsoft.com/topic/a7be69c9-4634-42e1-9ca1-df06f43f360d" target="_blank" rel="noopener"&gt;Registry key updates for Secure Boot: Windows devices with IT-managed updates&lt;/A&gt;.&lt;/P&gt;
&lt;H3 style="margin: 36px 20px 20px 20px; font-family: 'Segoe UI', Segoe, Tahoma, Geneva, sans-serif; font-weight: 600; font-size: 20px; color: #333333;"&gt;&lt;a id="community--1-_option2" class="lia-anchor"&gt;&lt;/a&gt;Option 2: Deploy certificates using Group Policy&lt;/H3&gt;
&lt;P style="margin: 0px 20px 0px 20px;"&gt;Group Policy settings are available by navigating to:&lt;BR /&gt;&lt;STRONG&gt;Computer Configuration &lt;/STRONG&gt;&amp;gt; &lt;STRONG&gt;Administrative Templates&lt;/STRONG&gt; &amp;gt; &lt;STRONG&gt;Windows Components&lt;/STRONG&gt; &amp;gt; &lt;STRONG&gt;Secure Boot&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P style="margin: 12px 20px 20px 20px;"&gt;To apply Secure Boot updates to devices using Group Policy, set the &lt;STRONG&gt;Enable Secure Boot certificate deployment&lt;/STRONG&gt; policy to &lt;STRONG&gt;Enabled&lt;/STRONG&gt;. This lets Windows automatically begin the certificate deployment process. This setting corresponds to the registry key &lt;STRONG&gt;AvailableUpdates&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P style="margin: 12px 20px 20px 20px;"&gt;Be sure to get the latest version of the .admx for&amp;nbsp;&lt;A href="https://www.microsoft.com/download/details.aspx?id=108430" target="_blank" rel="noopener"&gt;Windows Server&lt;/A&gt;. For more details, see &lt;A href="http://support.microsoft.com/kb/5068198" target="_blank" rel="noopener"&gt;Group Policy Objects (GPO) method of Secure Boot for Windows devices with IT-managed updates&lt;/A&gt;.&lt;/P&gt;
&lt;H3 style="margin: 36px 20px 20px 20px; font-family: 'Segoe UI', Segoe, Tahoma, Geneva, sans-serif; font-weight: 600; font-size: 20px; color: #333333;"&gt;&lt;a id="community--1-_option3" class="lia-anchor"&gt;&lt;/a&gt;Option 3: Deploy certificates via Windows Configuration System (WinCS)&lt;/H3&gt;
&lt;P style="margin: 0px 20px 0px 20px;"&gt;New command-line tools are now available for domain-joined Windows Server instances running on Windows Server 2022. These include both a traditional executable and a PowerShell module to query and apply Secure Boot configurations locally to a device. &amp;nbsp;For step-by-step guidance, see &lt;A style="font-style: normal; font-weight: 400; background-color: rgb(255, 255, 255);" href="https://support.microsoft.com/topic/d3e64aa0-6095-4f8a-b8e4-fbfda254a8fe" target="_blank" rel="noopener"&gt;Windows Configuration System (WinCS) APIs for Secure Boot&lt;/A&gt; .&lt;/P&gt;
&lt;P style="margin: 12px 20px 20px 20px;"&gt;Deploy the Secure Boot updates via WinCS:&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="line-height: 1.7; margin-top: 12px; margin-left: 16px; margin-bottom: 2px;"&gt;Feature name: &lt;STRONG&gt;Feature_AllKeysAndBootMgrByWinCS&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI style="line-height: 1.7; margin-bottom: 2px; margin-left: 16px;"&gt;WinCS key value: &lt;STRONG&gt;F33E0C8E002&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI style="line-height: 1.7; margin-bottom: 2px; margin-left: 16px;"&gt;Secure Boot configuration state: &lt;STRONG&gt;Enabled&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3 style="margin: 36px 20px 20px 20px; font-family: 'Segoe UI', Segoe, Tahoma, Geneva, sans-serif; font-weight: 600; font-size: 20px; color: #333333;"&gt;&lt;a id="community--1-_option4" class="lia-anchor"&gt;&lt;/a&gt;Option 4: Start a new VM using the latest version&lt;/H3&gt;
&lt;P style="margin: 0px 20px 0px 20px;"&gt;If your Windows Server instance is running on a virtualization platform and can be migrated to the latest versions of Virtual Machines, starting new in the latest VM versions can be your best option. Reach out to your virtualization platform provider for VM versions that natively support the Secure boot 2023 certificates.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;P style="margin: 0px 20px 0px 20px;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;!-- Step 5. Troubleshoot and remediate common issues --&gt;
&lt;DIV style="display: flex; align-items: center; height: 50px; background-color: rgb(0, 120, 212);"&gt;
&lt;H2 style="font-size: 22px; text-align: center; color: #ffffff; margin: 0px 20px 0px 20px;"&gt;&lt;a id="community--1-_step5" class="lia-anchor"&gt;&lt;/a&gt;Step 5. Troubleshoot and remediate common issues&lt;/H2&gt;
&lt;/DIV&gt;
&lt;DIV style="padding: 20px 0; border: 1px dashed #0078d4;"&gt;
&lt;P style="margin: 0px 20px 0px 20px;"&gt;You can also use registry keys and Windows Event Log events to identify and resolve common issues:&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="line-height: 1.7; margin-top: 12px; margin-left: 16px; margin-bottom: 2px;"&gt;The &lt;STRONG&gt;UEFICA2023Error&lt;/STRONG&gt; registry key doesn't exist if there are no errors. If it exists with a value other than 0, check your remediation recommendations in &lt;A href="https://support.microsoft.com/topic/37e47cf8-608b-4a87-8175-bdead630eb69" target="_blank" rel="noopener"&gt;Secure Boot DB and DBX variable update events&lt;/A&gt;.&lt;/LI&gt;
&lt;LI style="line-height: 1.7; margin-bottom: 2px; margin-left: 16px;"&gt;The &lt;STRONG&gt;AvailableUpdates&lt;/STRONG&gt; registry key on a device is set to &lt;STRONG&gt;0x4104&lt;/STRONG&gt;. If it doesn't clear the &lt;STRONG&gt;0x0004&lt;/STRONG&gt; bit even after multiple restarts, the device doesn't progress past deploying the new Key Exchange Key (KEK) certificate. You will likely see an Event ID 1803 which says “A PK-signed Key Exchange Key (KEK) cannot be found for this device. Check with the device manufacturer for proper key provisioning.” If you encounter this error, check with your device manufacturer or virtual platform provider to confirm their support policy.&lt;/LI&gt;
&lt;LI style="line-height: 1.7; margin-bottom: 2px; margin-left: 16px;"&gt;If Event Viewer Windows Logs for System registers an &lt;STRONG&gt;Event ID 1795&lt;/STRONG&gt;, it means that there was an error when Windows attempted to hand off the certificates to firmware. Check with your device manufacturer or platform provider to see if there is a firmware update available for the device to resolve this issue.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/DIV&gt;
&lt;P style="margin: 0px 20px 0px 20px;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;!-- Learn more --&gt;
&lt;DIV style="display: flex; align-items: center; height: 50px; background-color: rgb(0, 120, 212);"&gt;
&lt;H2 style="font-size: 22px; text-align: center; color: #ffffff; margin: 0px 20px 0px 20px;"&gt;&lt;a id="community--1-_learn" class="lia-anchor"&gt;&lt;/a&gt;Learn more&lt;/H2&gt;
&lt;/DIV&gt;
&lt;DIV style="padding: 20px 0; border: 1px dashed #0078d4;"&gt;
&lt;P style="margin: 0px 20px 0px 20px;"&gt;You can start preparing, monitoring, deploying, and troubleshooting Secure Boot certificates today, in advance of the June 2026 expiration date. To manage Secure Boot certificate updates on Windows client, see &lt;A class="lia-external-url" href="https://aka.ms/GetSecureBoot" target="_blank" rel="noopener"&gt;Secure Boot playbook for certificates expiring in 2026&lt;/A&gt;.&lt;/P&gt;
&lt;P style="margin: 12px 20px 0px 20px;"&gt;For the latest information, bookmark &lt;A href="https://aka.ms/GetSecureBoot" target="_blank" rel="noopener"&gt;https://aka.ms/GetSecureBoot&lt;/A&gt; as your landing page for resources to help you with Windows Secure Boot certificate updates.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 23 Feb 2026 17:45:00 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-server-news-and-best/windows-server-secure-boot-playbook-for-certificates-expiring-in/ba-p/4495789</guid>
      <dc:creator>RoySasabe</dc:creator>
      <dc:date>2026-02-23T17:45:00Z</dc:date>
    </item>
    <item>
      <title>Announcing Native NVMe in Windows Server 2025: Ushering in a New Era of Storage Performance</title>
      <link>https://techcommunity.microsoft.com/t5/windows-server-news-and-best/announcing-native-nvme-in-windows-server-2025-ushering-in-a-new/ba-p/4477353</link>
      <description>&lt;P&gt;We’re thrilled to announce the arrival of &lt;STRONG&gt;Native NVMe support in Windows Server 2025&lt;/STRONG&gt;—a leap forward in storage innovation that will redefine what’s possible for your most demanding workloads. Modern NVMe (Non-Volatile Memory Express) SSDs now operate more efficiently with Windows Server. This improvement comes from a redesigned Windows storage stack that no longer treats all storage devices as SCSI (Small Computer System Interface) devices—a method traditionally used for older, slower drives. By eliminating the need to convert NVMe commands into SCSI commands, Windows Server reduces processing overhead and latency. Additionally, the whole I/O processing workflow is redesigned for extreme performance. This release is the result of close collaboration between our engineering teams and hardware partners, and it serves as a cornerstone in modernizing our storage stack.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Native NVMe is now &lt;U&gt;generally available (GA)&lt;/U&gt;&amp;nbsp;with an &lt;STRONG&gt;opt-in&lt;/STRONG&gt; model (disabled by default as of October’s latest cumulative update for WS2025). Switch onto Native NVMe as soon as possible or you are leaving performance gains on the table! Stay tuned for more updates from our team as we transition to a dramatically faster, more efficient storage future.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Why Native NVMe and why now?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Modern NVMe devices—like PCIe Gen5 enterprise SSDs capable of 3.3 million IOPS, or HBAs delivering over 10 million IOPS on a single disk—are pushing the boundaries of what storage can do. SCSI-based I/O processing can’t keep up because it uses a single-queue model, originally designed for rotational disks, where protocols like SATA support just one queue with up to 32 commands. In contrast, NVMe was designed from the ground up for flash storage and supports up to 64,000 queues, with each queue capable of handling up to 64,000 commands simultaneously.&lt;/P&gt;
&lt;P&gt;With Native NVMe in Windows Server 2025, the storage stack is purpose-built for modern hardware—eliminating translation layers and legacy constraints. Here’s what that means for you:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;U&gt;Massive IOPS Gains&lt;/U&gt;: Direct, multi-queue access to NVMe devices means you can finally reach the true limits of your hardware.&lt;/LI&gt;
&lt;LI&gt;&lt;U&gt;Lower Latency&lt;/U&gt;: Traditional SCSI-based stacks rely on shared locks and synchronization mechanisms in the kernel I/O path to manage resources. Native NVMe enables streamlined, lock-free I/O paths that slash round-trip times for every operation.&lt;/LI&gt;
&lt;LI&gt;&lt;U&gt;CPU Efficiency&lt;/U&gt;: A leaner, optimized stack frees up compute for your workloads instead of storage overhead.&lt;/LI&gt;
&lt;LI&gt;&lt;U&gt;Future-Ready Features&lt;/U&gt;: Native support for advanced NVMe capabilities like multi-queue and direct submission ensures you’re ready for next-gen storage innovation.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Performance Data&lt;/STRONG&gt;&lt;/P&gt;
&lt;img&gt;Graph showing IOPS gains on WS2025 (with Native NVMe) compared to WS2022 on 1, 8, and 16-threaded 4K random read tests using an NTFS-formatted volume.&lt;/img&gt;&lt;img&gt;Graph showing reduction in CPU cycles per I/O on WS2025 (with Native NVMe) compared to WS2022 on 8 and 16-threaded 4K random read tests using an NTFS-formatted volume.&lt;/img&gt;
&lt;P&gt;Using DiskSpd.exe, basic performance testing shows that with Native NVMe enabled, WS2025 systems can deliver up to ~80% more IOPS and a ~45% savings in CPU cycles per I/O on 4K random read workloads on NTFS volumes when compared to WS2022. This test ran on a host with Intel Dual Socket CPU (208 logical processors, 128GB RAM) and a Solidigm SB5PH27X038T 3.5TB NVMe device. The test can be recreated by running "diskspd.exe -b4k -r -Su -t8 -L -o32 -W10 -d30 testfile1.dat &amp;gt; output.dat" and modifying the parameters as desired. Results may vary.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Top Use Cases: Where You’ll See the Difference&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Try Native NVMe on servers running your enterprise applications. These gains are not just for synthetic benchmarks—they translate directly to faster database transactions, quicker VM operations, and more responsive file and analytics workloads.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;U&gt;SQL Server and OLTP:&lt;/U&gt;&lt;STRONG&gt; &lt;/STRONG&gt;Shorter transaction times, higher IOPS, and lower tail latency under mixed read/write workloads.&lt;/LI&gt;
&lt;LI&gt;&lt;U&gt;Hyper&lt;/U&gt;&lt;U&gt;‑V and virtualization:&lt;/U&gt;&lt;STRONG&gt; &lt;/STRONG&gt;Faster VM boot, checkpoint operations, and live migration with reduced storage contention.&lt;/LI&gt;
&lt;LI&gt;&lt;U&gt;High&lt;/U&gt;&lt;U&gt;‑performance file servers:&lt;/U&gt;&lt;STRONG&gt; &lt;/STRONG&gt;Faster large‑file reads/writes and quicker metadata operations (copy, backup, restore).&lt;/LI&gt;
&lt;LI&gt;&lt;U style="color: rgb(30, 30, 30);"&gt;AI/ML and analytics:&lt;/U&gt;&lt;STRONG style="color: rgb(30, 30, 30);"&gt; &lt;/STRONG&gt;&lt;SPAN style="color: rgb(30, 30, 30);"&gt;Low‑latency access to large datasets and faster ETL, shuffle, and cache/scratch I/O.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;How to Get Started&lt;/STRONG&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;U&gt;Check your hardware:&lt;/U&gt; Ensure you have NVMe-capable devices that are currently using the Windows NVMe driver (StorNVMe.sys). Note that some NVMe device vendors provide their own drivers, so unless using the in-box Windows NVMe driver, you will not notice any differences.&lt;/LI&gt;
&lt;LI&gt;&lt;U&gt;Enable Native NVMe:&lt;/U&gt;&lt;STRONG&gt; &lt;/STRONG&gt;After applying the 2510-B Latest Cumulative Update (or most recent), add the registry key with the following PowerShell command:&amp;nbsp;&lt;LI-CODE lang="powershell"&gt;reg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Policies\Microsoft\FeatureManagement\Overrides /v 1176759950 /t REG_DWORD /d 1 /f&lt;/LI-CODE&gt;Alternatively, use this &lt;A href="https://download.microsoft.com/download/123547b0-bff7-419d-96ba-d1cfee92f442/Windows%2011%2024H2,%20Windows%2011%2025H2%20and%20Windows%20Server%202025%20KB5066835%20251014_21251%20Feature%20Preview.msi" target="_blank" rel="noopener"&gt;Group Policy MSI&lt;/A&gt; to add the policy that controls the feature then run the local Group Policy Editor to enable the policy (found under Local Computer Policy &amp;gt; Computer Configuration &amp;gt; Administrative Templates &amp;gt; KB5066835 251014_21251 Feature Preview &amp;gt; Windows 11, version 24H2, 25H2). Once Native NVMe is enabled, open Device Manager and ensure that all attached NVMe devices are displayed under the “Storage disks” section.&amp;nbsp;&lt;img&gt;Screenshot of Device Manager where NVMe devices show up under the Storage disks section.&lt;/img&gt;&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;U&gt;Monitor and Validate:&lt;/U&gt; Use Performance Monitor and Windows Admin Center to see the gains for yourself. Or try &lt;A class="lia-external-url" href="https://github.com/microsoft/diskspd" target="_blank" rel="noopener"&gt;DiskSpd.exe&lt;/A&gt; yourself to measure microbenchmarks in your own environment! A quick way to measure IOPS in Performance Monitor is to set up a histogram chart and add a counter for Physical Disk&amp;gt;Disk Transfers/sec (where the selected instance is a drive that corresponds to one of your attached NVMe devices) then run a synthetic workload with DiskSpd. Compare the numbers before and after enabling Native NVMe to see the realized difference in your real environment!&lt;/P&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;img&gt;Screenshot of Performance Monitor, showing how to add a counter for Disk Transfers/sec to measure IOPS of an NVMe drive.&lt;/img&gt;&lt;img&gt;Screenshot of higher IOPS when running Native NVMe stack on Windows Server 2025.&lt;/img&gt;
&lt;P&gt;&lt;STRONG&gt;Join the Storage Revolution&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;This is more than just a feature—it’s a new foundation for Windows Server storage, built for the future. We can’t wait for you to experience the difference.&lt;/P&gt;
&lt;P&gt;&lt;U&gt;Share your feedback, ask questions, and join the conversation&lt;/U&gt;. Let’s build the future of high-performance Windows Server storage together. Send us your feedback or questions at &lt;U&gt;nativenvme@microsoft.com&lt;/U&gt;!&lt;/P&gt;
&lt;P&gt;—&lt;BR /&gt;&lt;EM&gt;Yash Shekar (and the Windows Server team)&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 05 Jan 2026 19:49:43 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-server-news-and-best/announcing-native-nvme-in-windows-server-2025-ushering-in-a-new/ba-p/4477353</guid>
      <dc:creator>Yash_Shekar</dc:creator>
      <dc:date>2026-01-05T19:49:43Z</dc:date>
    </item>
    <item>
      <title>Microsoft Foundry on Windows Server</title>
      <link>https://techcommunity.microsoft.com/t5/windows-server-news-and-best/microsoft-foundry-on-windows-server/ba-p/4471093</link>
      <description>&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;As organizations embrace AI,&amp;nbsp;new&amp;nbsp;opportunities&amp;nbsp;exist for&amp;nbsp;Windows Server&amp;nbsp;customers who&amp;nbsp;want to&amp;nbsp;leverage&amp;nbsp;on-premises AI.&amp;nbsp;While&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://azure.microsoft.com/en-us/products/ai-foundry" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;A&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;zure&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;remains&amp;nbsp;the&amp;nbsp;best place for&amp;nbsp;cutting&amp;nbsp;edge&amp;nbsp;models and&amp;nbsp;AI&amp;nbsp;inference&amp;nbsp;hardware accelerators,&amp;nbsp;certain&amp;nbsp;industries -&amp;nbsp;such as&amp;nbsp;healthcare, finance, manufacturing, and retail&amp;nbsp;-&amp;nbsp;require&amp;nbsp;on-premises&amp;nbsp;AI to&amp;nbsp;improve and&amp;nbsp;accelerate existing business&amp;nbsp;workflows.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Microsoft&amp;nbsp;Foundry&amp;nbsp;on&amp;nbsp;Windows&amp;nbsp;helps harness the power of AI&amp;nbsp;on existing server deployments.&amp;nbsp;Microsoft Foundry on Windows&amp;nbsp;includes&amp;nbsp;Foundry Local and Windows ML&amp;nbsp;that&amp;nbsp;enable&amp;nbsp;server&amp;nbsp;customers to build&amp;nbsp;local&amp;nbsp;AI experiences&amp;nbsp;and&amp;nbsp;real-time inferencing.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Leveraging &amp;nbsp;AI on your own infrastructure gives control over data residency, compliance, and latency.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;This blog details how&amp;nbsp;Microsoft Foundry on Windows&amp;nbsp;brings local AI capabilities to Windows&amp;nbsp;Server&amp;nbsp;deployments. It explores why Foundry Local and Windows ML are a strong fit for on-premises AI,&amp;nbsp;highlighting&amp;nbsp;technical considerations, and showing how customers can easily&amp;nbsp;build generative AI applications with&amp;nbsp;Foundry Local catalog,&amp;nbsp;or proprietary&amp;nbsp;models&amp;nbsp;of any type&amp;nbsp;via Windows ML&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H3&gt;&lt;SPAN data-contrast="none"&gt;Windows Server&amp;nbsp;as local AI platform&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Windows Server 2025 reached GA last year and introduced significant enhancements—including advanced storage capabilities, GPU partitioning (GPU-P), and Discrete Device Assignment (DDA) for assigning GPU resources to virtual machines, and massive Hyper V scalability with support for up to 2,048 vCPUs per Gen&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;2 VM. These capabilities combine to make Windows Server 2025 ideal for AI-intensive workloads. Built to power mission critical environments where compliance and continuity are non-negotiable, Windows Server offers a robust, enterprise grade infrastructure that enables AI inferencing on premises without leaving your datacenter.&lt;/SPAN&gt; &lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H3 aria-level="3"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;Scenarios for On-Prem&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;ises&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;&amp;nbsp;AI&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:80}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;Although many organizations are investing in AI on Azure to&amp;nbsp;leverage&amp;nbsp;the latest innovations, we understand there are several situations where on-premises AI capabilities are&amp;nbsp;required. Below are a few examples of such scenarios.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H5 aria-level="4"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 4"&gt;Healthcare&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:80,&amp;quot;335559739&amp;quot;:40}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H5&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Meet&amp;nbsp;regulatory&amp;nbsp;requirements.&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;Maintain&amp;nbsp;Protected&amp;nbsp;Health Information&amp;nbsp;(PHI)&amp;nbsp;and clinical records within your&amp;nbsp;on-premises perimeter to meet compliance requirements—while enabling AI-powered insights locally.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H5 aria-level="4"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 4"&gt;Finance&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:80,&amp;quot;335559739&amp;quot;:40}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H5&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Act on insights instantly.&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;Process financial reports and transaction logs near the source to reduce latency and avoid round trips to external endpoints, ensuring speed and confidentiality.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H5 aria-level="4"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 4"&gt;Manufacturing&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:80,&amp;quot;335559739&amp;quot;:40}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H5&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Operate in disconnected environments.&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;Run AI workflows in&amp;nbsp;air-gapped or intermittently connected plants to support predictive maintenance and quality control without relying on cloud connectivity.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H5 aria-level="4"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 4"&gt;Retail offices&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:80,&amp;quot;335559739&amp;quot;:40}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H5&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Operate in latency-sensitive environments. &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Run&amp;nbsp;AI models&amp;nbsp;for basic inferencing&amp;nbsp;to improve&amp;nbsp;point-of-sale&amp;nbsp;efficiency&amp;nbsp;and&amp;nbsp;deliver&amp;nbsp;personalized&amp;nbsp;experiences.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H3 aria-level="3"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;Technical Snapshot&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:80}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P&gt;&lt;A href="https://learn.microsoft.com/en-us/windows/ai/overview" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Microsoft&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Foundry on Windows&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;supports a two-pronged approach to&amp;nbsp;make Windows Server platform AI-ready:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Windows ML&amp;nbsp;enables&amp;nbsp;application service owners to&amp;nbsp;introduce&amp;nbsp;AI workflows or&amp;nbsp;inferencing&amp;nbsp;within existing&amp;nbsp;server applications. It&amp;nbsp;automatically&amp;nbsp;identifies&amp;nbsp;available processors (CPU or GPU)&amp;nbsp;based on server&amp;nbsp;hardware,&amp;nbsp;downloads&amp;nbsp;optimal&amp;nbsp;execution&amp;nbsp;providers (EPs)&amp;nbsp;and allows the application to use AI models locally.&amp;nbsp;Windows ML&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;supports&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;ONNX Runtime under the hood, ensuring compatibility with popular frameworks and optimized execution providers.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Foundry Local&amp;nbsp;enables seamless discovery, download, and orchestration of AI models directly on Windows Servers,&amp;nbsp;including&amp;nbsp;support for&amp;nbsp;hardware acceleration&amp;nbsp;on&amp;nbsp;servers&amp;nbsp;with&amp;nbsp;GPUs.&amp;nbsp;It also streamlines deployment of foundational models on virtual machines with&amp;nbsp;GPU-P&amp;nbsp;partitioning, ensuring hardware isolation and optimized resource sharing for&amp;nbsp;compliance&amp;nbsp;sensitive environments.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;The&amp;nbsp;foundry model&amp;nbsp;catalog will continue to evolve with&amp;nbsp;more&amp;nbsp;models&amp;nbsp;and&amp;nbsp;APIs, like&amp;nbsp;embedding&amp;nbsp;models&amp;nbsp;support.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H4 aria-level="3"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;Simple steps&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;&amp;nbsp;to get started&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;!&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:80}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H4&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/ai-foundry/foundry-local/get-started" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Onboard Foundry Local on your existing server&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;infrastructure:&amp;nbsp;Install Foundry Local on Windows Server 2025&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;Identify&amp;nbsp;a&amp;nbsp;practical&amp;nbsp;use case&amp;nbsp;for&amp;nbsp;AI inferencing:&amp;nbsp;Start with a&amp;nbsp;simple&amp;nbsp;scenario—such as&amp;nbsp;summarizing reports or&amp;nbsp;translating content&amp;nbsp;to native language.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;Pilot with existing prebuilt models in the catalog for rapid results. Validate performance and compatibility with your hardware.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;Integrate with existing workflow:&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/ai-foundry/foundry-local/how-to/how-to-integrate-with-inference-sdks?pivots=programming-language-csharp#use-openai-sdk-with-foundry-local" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Connect inference endpoints&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt; to your current applications or automation pipelines.&amp;nbsp;Keep data local while enhancing processes with AI insights.&amp;nbsp;Foundry Local provides an&amp;nbsp;SDK,&amp;nbsp;Command Line Interface (CLI), and a REST API for ease of use and integration into existing workflows and applications.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;Measure performance: Track latency, throughput, and resource utilization to optimize deployment. Use these insights to fine-tune and iterate. &lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;H4 aria-level="3"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;Deep dive&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;:&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;&amp;nbsp;Unlock the power of BYOM +&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;Windows ML&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;&amp;nbsp;on Windows Server&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:80}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H4&gt;
&lt;P&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/ai-foundry/foundry-local/how-to/how-to-compile-hugging-face-models?tabs=Bash" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Bring Your Own Model (BYOM)&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;:&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;This gives&amp;nbsp;organizations the freedom to&amp;nbsp;choose&amp;nbsp;custom AI models tailored to their domain and business needs.&amp;nbsp;For instance, a manufacturing company might bring a predictive maintenance model trained on its own sensor data to&amp;nbsp;anticipate&amp;nbsp;equipment failures and reduce downtime.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Windows ML&amp;nbsp;allows use of&amp;nbsp;proprietary&amp;nbsp;models&amp;nbsp;to&amp;nbsp;run seamlessly on Windows Server.&amp;nbsp;Windows ML automatically discovers,&amp;nbsp;downloads&amp;nbsp;and&amp;nbsp;registers the latest version of all compatible execution&amp;nbsp;providers (EP).&amp;nbsp;Tools like&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://code.visualstudio.com/docs/intelligentapps/overview" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;AI Toolkit Extension for VS Code&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp; can be used for model optimization and quantization to prepare models for efficient local execution.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;In summary,&amp;nbsp;with&amp;nbsp;BYOM and&amp;nbsp;Windows ML&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;on server&amp;nbsp;customers&amp;nbsp;can&amp;nbsp;deploy&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;custom&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;AI&amp;nbsp;models&amp;nbsp;to&amp;nbsp;provide&amp;nbsp;inferencing&amp;nbsp;solutions&amp;nbsp;locally&amp;nbsp;to existing business workloads.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H5 aria-level="3"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;R&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;esources&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;:&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:80}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H5&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="5" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;A href="https://github.com/microsoft/foundry-local-on-windowsserver-samples" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Code samples to get started with Foundry Local on Server&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559685&amp;quot;:360,&amp;quot;335559739&amp;quot;:0,&amp;quot;469777462&amp;quot;:[720,360],&amp;quot;469777927&amp;quot;:[0,0],&amp;quot;469777928&amp;quot;:[0,8]}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="5" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/ai-foundry/foundry-local/get-started?view=foundry-classic" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Foundry Local&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;&amp;nbsp;Guide&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559685&amp;quot;:360,&amp;quot;335559739&amp;quot;:0,&amp;quot;469777462&amp;quot;:[720,360],&amp;quot;469777927&amp;quot;:[0,0],&amp;quot;469777928&amp;quot;:[0,8]}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="5" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="2" data-aria-level="1"&gt;&lt;A href="https://learn.microsoft.com/windows/ai/windows-ml/what-is-windows-ml" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Windows ML Overview&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559685&amp;quot;:360,&amp;quot;335559739&amp;quot;:0,&amp;quot;469777462&amp;quot;:[720,360],&amp;quot;469777927&amp;quot;:[0,0],&amp;quot;469777928&amp;quot;:[0,8]}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="5" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="3" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;For questions or feedback, reach out to&amp;nbsp;&lt;/SPAN&gt;&lt;A href="mailto:foundrylocal-server@microsoft.com" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;foundrylocal-server@microsoft.com&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 19 Nov 2025 00:40:15 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-server-news-and-best/microsoft-foundry-on-windows-server/ba-p/4471093</guid>
      <dc:creator>Priya_Satheesh</dc:creator>
      <dc:date>2025-11-19T00:40:15Z</dc:date>
    </item>
    <item>
      <title>Introducing Windows Admin Center: Virtualization Mode (vMode)</title>
      <link>https://techcommunity.microsoft.com/t5/windows-server-news-and-best/introducing-windows-admin-center-virtualization-mode-vmode/ba-p/4471024</link>
      <description>&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="Subtitle"&gt;Now in Public Preview&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Windows Admin Center&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;has long been a favorite tool for IT pros, trusted to manage&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://techcommunity.microsoft.com/blog/windows-admin-center-blog/windows-admin-center-version-2009-is-now-generally-available/1696665" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;millions of Windows Servers around the world&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;. Over the years,&amp;nbsp;Windows Admin&amp;nbsp;Center’s&amp;nbsp;browser-based console has made&amp;nbsp;every&amp;nbsp;day&amp;nbsp;server administration easier and more accessible. Now, responding directly to&amp;nbsp;your&amp;nbsp;feedback and evolving needs,&amp;nbsp;we are&amp;nbsp;introducing a new&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;Virtualization Mode (vMode)&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;in the latest&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Windows Admin Center Public Preview&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;vMode&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;is&amp;nbsp;a&amp;nbsp;purpose-built&amp;nbsp;experience&amp;nbsp;to help you easily manage on-premises&amp;nbsp;Windows Server&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/windows-server/virtualization/hyper-v/overview" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Hyper-V virtualization&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;at scale – across multiple hosts and clusters – while effortlessly bridging your environment with Azure Arc for a true hybrid cloud experience.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;In this blog post,&amp;nbsp;we’ll&amp;nbsp;explore what Virtualization Mode is all about, why it was created, and how it empowers IT administrators to oversee their entire virtualization estate with greater simplicity.&amp;nbsp;We’ll&amp;nbsp;highlight the capabilities of&amp;nbsp;vMode, discuss how it connects your Hyper-V infrastructure to Azure for hybrid adaptability, share why this update is&amp;nbsp;such a big deal&amp;nbsp;for Windows Server customers,&amp;nbsp;and provide&amp;nbsp;our&amp;nbsp;roadmap&amp;nbsp;for what comes next.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H4 aria-level="2"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;Why&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;a&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;n&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;ew&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;v&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;irtualization&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;m&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;ode? Listening to&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;y&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;ou&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;&amp;nbsp;and&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;a&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;dapting to&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;c&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;hange&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:80}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Windows Admin Center has been&amp;nbsp;immensely&amp;nbsp;popular since its launch, with an extensible&amp;nbsp;server-oriented&amp;nbsp;design that provides IT professionals with the right tools and insights to manage all their Windows Servers from&amp;nbsp;Active&amp;nbsp;Directory controllers to virtualization hosts and everything&amp;nbsp;in between. This&amp;nbsp;server-oriented&amp;nbsp;design (now called Administration Mode) understands each server’s individual configuration providing&amp;nbsp;optimal&amp;nbsp;insights and tools - perfect for general administration.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;After carefully considering&amp;nbsp;your&amp;nbsp;feedback, we found that those managing more complex Hyper-V environments needed a&amp;nbsp;specialized&amp;nbsp;console to oversee and manage their on-premises&amp;nbsp;virtualization&amp;nbsp;setups—one capable of handling multiple hosts, clusters, and sophisticated storage and network configurations.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;We heard your feedback&amp;nbsp;loud&amp;nbsp;and&amp;nbsp;clear. The result is&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Windows Admin Center: Virtualization Mode&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;,&amp;nbsp;or&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;vMode&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;.&amp;nbsp;It’s&amp;nbsp;a new&amp;nbsp;approach&amp;nbsp;dedicated to virtualization management, designed as a direct response to&amp;nbsp;your&amp;nbsp;needs. With&amp;nbsp;vMode&amp;nbsp;enabled, Windows&amp;nbsp;Admin&amp;nbsp;Center&amp;nbsp;transforms into a&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;central console for your Hyper-V hosts, clusters, VMs, storage, and virtual networks&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;– all in one place. And it does so while&amp;nbsp;maintaining&amp;nbsp;Windows&amp;nbsp;Admin&amp;nbsp;Center’s hallmark simplicity,&amp;nbsp;leveraging&amp;nbsp;Azure Arc to enable an&amp;nbsp;adaptive cloud approach.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H4 aria-level="2"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;Meet&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;vMode&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;p&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;ublic&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;p&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;review&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;:&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;p&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;urpose&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;b&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;uilt&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;m&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;anagement&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;for Hyper-V&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:80}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;When you setup Windows Admin&amp;nbsp;Center&amp;nbsp;Public Preview,&amp;nbsp;you’ll&amp;nbsp;have two&amp;nbsp;separate&amp;nbsp;installation&amp;nbsp;options: the traditional Administrator mode (aMode) or the new Virtualization mode (vMode).&amp;nbsp;At its core,&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Virtualization Mode (vMode)&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;is about&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;centralizing and streamlining Hyper-V management&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;. Instead of&amp;nbsp;connecting to&amp;nbsp;each server or cluster individually, you can now deploy Windows&amp;nbsp;Admin&amp;nbsp;Center&amp;nbsp;as&amp;nbsp;a&amp;nbsp;stateful appliance&amp;nbsp;and&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;manage your&amp;nbsp;Hyper-V&amp;nbsp;virtualization&amp;nbsp;fabric&amp;nbsp;from a single dashboard&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;. Here are&amp;nbsp;some of the key capabilities and design features that&amp;nbsp;make&amp;nbsp;vMode&amp;nbsp;a game-changer:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="none"&gt;Scalable,&amp;nbsp;multi-host&amp;nbsp;management:&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;&amp;nbsp;vMode&amp;nbsp;has been designed&amp;nbsp;for&amp;nbsp;large environments, allowing a single Windows&amp;nbsp;Admin&amp;nbsp;Center&amp;nbsp;system&amp;nbsp;to manage up to&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;hundreds of&amp;nbsp;Hyper-V hosts or&amp;nbsp;tens&amp;nbsp;of thousands&amp;nbsp;of&amp;nbsp;virtual machines&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;. You can onboard both standalone servers and multiple clusters, viewing all VMs and hosts in one unified console without switching between tabs or sessions.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="2" data-aria-level="1"&gt;&lt;SPAN data-contrast="none"&gt;Unified&amp;nbsp;inventory and&amp;nbsp;dashboard:&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;&amp;nbsp;The&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;Virtual Machines tool&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;&amp;nbsp;in&amp;nbsp;vMode&amp;nbsp;offers a single view of all VMs, displaying their status, host, OS, and resource use. Use&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;global search&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;&amp;nbsp;to quickly&amp;nbsp;locate&amp;nbsp;any VM, host, cluster, or storage object by name. The dashboard highlights key stats like active VMs, cluster health, and CPU/memory usage for an instant overview.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="3" data-aria-level="1"&gt;&lt;SPAN data-contrast="none"&gt;Appliance-style&amp;nbsp;deployment:&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;&amp;nbsp;vMode&amp;nbsp;is designed for&amp;nbsp;easy, “appliance-like” setup. Simply install Windows Admin Center on your management server (such as Windows Server 2022/2025), enable Virtualization Mode, and finish deployment in under 10 minutes. The system automatically sets up a lightweight PostgreSQL database to track VM/host inventory and status, so admins&amp;nbsp;don’t&amp;nbsp;need to manage it manually—it’s&amp;nbsp;included with the WAC gateway service. This creates a central Windows&amp;nbsp;Admin&amp;nbsp;Center&amp;nbsp;instance accessible by your entire team.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="4" data-aria-level="1"&gt;&lt;SPAN data-contrast="none"&gt;Bulk&amp;nbsp;actions and&amp;nbsp;simplified&amp;nbsp;workflows:&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;&amp;nbsp;vMode&amp;nbsp;lets you manage multiple resources efficiently with bulk operations and streamlined workflows. The Windows&amp;nbsp;Admin&amp;nbsp;Center&amp;nbsp;UI supports live migrations between cluster nodes, and new wizards help with tasks like&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://techcommunity.microsoft.com/blog/windows-admin-center-blog/public-preview-of-windows-admin-center-v2410-has-been-updated/4309246" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;importing VMs&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="none"&gt;&amp;nbsp;or&amp;nbsp;replicating&amp;nbsp;VMs&amp;nbsp;between hosts&amp;nbsp;or clusters&amp;nbsp;easily&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="5" data-aria-level="1"&gt;&lt;SPAN data-contrast="none"&gt;Virtualization-focused UI &amp;amp;&amp;nbsp;tools:&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;&amp;nbsp;In&amp;nbsp;vMode, Windows&amp;nbsp;Admin&amp;nbsp;Center&amp;nbsp;displays only virtualization-related tools, such as VM management, virtual networks, Hyper-V settings, and Storage Spaces Direct. This streamlined interface helps admins focus efficiently. Hosts can be organized into logical groups, simplifying navigation as your environment expands.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="6" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Performance and&amp;nbsp;responsiveness:&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;Managing thousands of VMs could be overwhelming, but&amp;nbsp;vMode&amp;nbsp;brings significant&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;performance optimizations&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;to make it snappy. The Windows&amp;nbsp;Admin&amp;nbsp;Center&amp;nbsp;team reworked how data is loaded: the VM list and host statuses populate quickly&amp;nbsp;and are quickly retrieved from the database&amp;nbsp;maintaining&amp;nbsp;persistent state.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;335551550&amp;quot;:2,&amp;quot;335551620&amp;quot;:2}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;To sum up, with&amp;nbsp;vMode,&amp;nbsp;you get a unified view, bulk management powers, and a UI tuned to virtualization needs – all without losing the simplicity that made Windows&amp;nbsp;Admin&amp;nbsp;Center&amp;nbsp;popular.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H4 aria-level="2"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;Hybrid-Ready: Azure Arc&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;i&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;ntegration for&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;a&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;daptive&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;c&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;loud&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;m&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;anagement&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:80}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;A huge advantage of Windows Admin Center has always been its ability to integrate on-premises environments with Azure&amp;nbsp;services (the “hybrid” aspect). The new Virtualization Mode&amp;nbsp;will&amp;nbsp;double down on this by making&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/azure-arc/overview" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Azure Arc&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;integration easier and more powerful than ever for your&amp;nbsp;virtualized apps.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;What is Azure Arc?&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;In brief, Azure Arc is a Microsoft solution that&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;links your on-premises or other-cloud resources to Azure&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;, treating them as “first-class” Azure resources for management purposes. For servers, Arc enables&amp;nbsp;high-value cloud-native tools like&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/azure-monitor/fundamentals/overview" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Azure Monitor&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;,&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/update-manager/overview" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Azure Update Management&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;,&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/security/" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Azure Security Center&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;(&lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/defender-for-cloud/defender-for-cloud-introduction" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Defender for Cloud&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;), and more, even for machines running outside Azure.&amp;nbsp;It’s&amp;nbsp;a key to building a&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;hybrid cloud&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;where you can centrally manage resources across on-prem and Azure in a unified way.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;In the context of&amp;nbsp;vMode, Azure Arc integration means you can&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;“Arc-enable” your Hyper-V VMs running on them with a few clicks&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;– and then&amp;nbsp;leverage&amp;nbsp;Azure to extend your management capabilities:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="none"&gt;Unified&amp;nbsp;cloud&amp;nbsp;management (adaptive&amp;nbsp;cloud):&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;&amp;nbsp;After connecting on-prem assets via Arc,&amp;nbsp;they're&amp;nbsp;visible in the Azure Portal, allowing you to manage Arc-connected servers with Azure services while&amp;nbsp;retaining&amp;nbsp;local management through WAC. You can use Azure Monitor for centralized VM alerts or&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/governance/policy/overview" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Azure Policy&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="none"&gt;&amp;nbsp;to enforce security configurations. Windows Admin Center&amp;nbsp;vMode&amp;nbsp;gives you control over VM settings and migrations. This hybrid approach lets you&amp;nbsp;maintain&amp;nbsp;critical workloads on-premises and use Azure for backup, monitoring, and governance, with&amp;nbsp;vMode&amp;nbsp;streamlining the process.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;Real&amp;nbsp;world&amp;nbsp;example:&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;&amp;nbsp;Suppose&amp;nbsp;you're&amp;nbsp;running a Hyper-V cluster with various business apps. With WAC&amp;nbsp;vMode, you can easily organize and&amp;nbsp;monitor&amp;nbsp;your VMs. By enabling Arc through Windows&amp;nbsp;Admin&amp;nbsp;Center, you get Azure Backup for cloud-based VM protection and use&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/update-manager/overview" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Azure Update Manager&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="none"&gt;&amp;nbsp;to automate Windows Updates from the Azure Portal. Your VMs still run locally on Hyper-V, but management becomes streamlined across both on-prem and Azure environments.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;In summary,&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Azure Arc integration in&amp;nbsp;vMode&amp;nbsp;turns your on-prem Hyper-V deployment into a hybrid cloud solution&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H4 aria-level="2"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;No&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;a&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;dditional&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;c&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;ost,&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;n&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;o&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;a&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;dditional&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;c&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;omplexity&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:80}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;Windows Admin Center (including&amp;nbsp;vMode) is&amp;nbsp;included at no&amp;nbsp;additional&amp;nbsp;charge&amp;nbsp;with Windows Server Datacenter or&amp;nbsp;standard licenses.&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;&amp;nbsp;There’s&amp;nbsp;no&amp;nbsp;additional&amp;nbsp;license or SKU needed for Windows&amp;nbsp;Admin&amp;nbsp;Center&amp;nbsp;or&amp;nbsp;vMode. Unlike many other virtualization management tools that charge extra fees, Microsoft offers these features at no added cost,&amp;nbsp;making&amp;nbsp;Hyper-V with Windows Admin Center a highly cost-effective solution. The inclusion of advanced features like&amp;nbsp;vMode&amp;nbsp;in a free tool helps lower total cost of ownership.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;Windows Admin Center&amp;nbsp;vMode&amp;nbsp;public&amp;nbsp;preview&amp;nbsp;was developed with community input, incorporating user and partner feedback as well as Insider previews. We&amp;nbsp;will continue to&amp;nbsp;update&amp;nbsp;Virtualization Mode, available through Windows&amp;nbsp;Admin&amp;nbsp;Center’s extension feed or versioned&amp;nbsp;releases. A new&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://techcommunity.microsoft.com/blog/windowsservernewsandbestpractices/introducing-the-vm-conversion-tool-in-windows-admin-center-%E2%80%93-public-preview/4446604" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;VM conversion extension is already in Public Preview&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="none"&gt;, enabling VMware-to-Hyper-V migration directly from Windows&amp;nbsp;Admin&amp;nbsp;Center. The modular design of Windows&amp;nbsp;Admin&amp;nbsp;Center&amp;nbsp;allows&amp;nbsp;additional&amp;nbsp;extensions to integrate with&amp;nbsp;vMode&amp;nbsp;over time.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H4 aria-level="2"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;Empowering&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;y&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;our&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;h&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;ybrid&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;v&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;irtualization&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;j&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;ourney&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:80}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;The introduction of&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;Virtualization Mode in Windows Admin Center&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;&amp;nbsp;streamlines Windows Server management by enabling small IT teams to centrally manage Hyper-V resources&amp;nbsp;(such as hosts, VMs, SDN, and S2D)&amp;nbsp;with ease. This feature also supports Azure integration, allowing&amp;nbsp;organizations&amp;nbsp;to adopt a hybrid approach efficiently.&amp;nbsp;With this public&amp;nbsp;preview,&amp;nbsp;we&amp;nbsp;recommend&amp;nbsp;you&amp;nbsp;take&amp;nbsp;vMode&amp;nbsp;for a test&amp;nbsp;drive and&amp;nbsp;let us&amp;nbsp;know what you think.&amp;nbsp;We have&amp;nbsp;more features in the pipeline&amp;nbsp;for&amp;nbsp;Public Preview&amp;nbsp;2&amp;nbsp;including:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="5" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="none"&gt;Virtual Machine Templates&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="5" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="2" data-aria-level="1"&gt;&lt;SPAN data-contrast="none"&gt;Hyper-V&amp;nbsp;Replica&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="5" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="3" data-aria-level="1"&gt;&lt;SPAN data-contrast="none"&gt;Azure Arc&amp;nbsp;Integration&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;Public Preview&amp;nbsp;2&amp;nbsp;is&amp;nbsp;scheduled&amp;nbsp;for&amp;nbsp;Q1&amp;nbsp;of&amp;nbsp;2026&amp;nbsp;with more&amp;nbsp;to&amp;nbsp;come&amp;nbsp;so&amp;nbsp;stay&amp;nbsp;tuned for upcoming&amp;nbsp;information and updates!&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Ultimately,&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Windows Admin&amp;nbsp;Center’s Virtualization Mode&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;is about making&amp;nbsp;day-to-day virtualization ops more efficient, helping&amp;nbsp;you&amp;nbsp;consolidate&amp;nbsp;management tasks, and position your environment for the future by connecting it with Azure.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;Learn&amp;nbsp;more &amp;amp;&amp;nbsp;get&amp;nbsp;started:&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;&amp;nbsp;Windows Admin Center with&amp;nbsp;vMode&amp;nbsp;is now in Public Preview. Download it&amp;nbsp;here:&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://aka.ms/WACDownloadvMode" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;https://aka.ms/WACDownloadvMode&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="none"&gt;. To share feedback or suggestions, click the question mark in the top right corner of Windows Admin Center and select “Give us feedback.” The WAC dev team actively&amp;nbsp;monitors&amp;nbsp;feedback&amp;nbsp;channels.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;Please note&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;: This&amp;nbsp;preview is for evaluation only and&amp;nbsp;isn’t&amp;nbsp;supported in production environments.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Windows Admin Center’s new Virtualization Mode is more than just a feature update;&amp;nbsp;it’s&amp;nbsp;an evolution driven by&amp;nbsp;the community of IT professionals.&amp;nbsp;Windows Admin Center&amp;nbsp;vMode&amp;nbsp;simplifies on-premises virtualization management and integrates it with the cloud, on your terms.&amp;nbsp;Give it a try&amp;nbsp;and experience how managing Hyper-V can become as modern and streamlined as the rest of your IT environment.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Happy virtualizing with Windows&amp;nbsp;Admin&amp;nbsp;Center&amp;nbsp;vMode!&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;-Jeff Woolsey and the Windows Server Team&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Nov 2025 18:52:09 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-server-news-and-best/introducing-windows-admin-center-virtualization-mode-vmode/ba-p/4471024</guid>
      <dc:creator>WSNewsAdmin</dc:creator>
      <dc:date>2025-11-18T18:52:09Z</dc:date>
    </item>
    <item>
      <title>Upgrading to Windows Server 2025 from Windows Server 2012 R2, 2016, 2019, or 2022 using Media (ISO)</title>
      <link>https://techcommunity.microsoft.com/t5/windows-server-news-and-best/upgrading-to-windows-server-2025-from-windows-server-2012-r2/ba-p/4456406</link>
      <description>&lt;H1&gt;About media-based upgrade to Windows Server 2025&lt;/H1&gt;
&lt;P&gt;With N-4 media based upgrades, you can upgrade your organization’s physical devices and virtual machines directly from Windows Server 2012R2, Windows Server 2016, Windows Server 2019, or Windows Server 2022 to Windows Server 2025 in one hop using the Windows Server 2025 media. Running Windows Server 2025 &lt;STRONG&gt;setup&lt;/STRONG&gt; enables customers to either upgrade or clean install Windows Server 2025. This process takes under an hour per server, depending on the capabilities of the server and the applications installed on it.&lt;/P&gt;
&lt;P&gt;(BTW, “Upgrade” has several synonyms: In-place Upgrade and Feature Update – they all refer to the same process which is described here.)&lt;/P&gt;
&lt;H2&gt;Upgrading Physical or Virtual&lt;/H2&gt;
&lt;P&gt;Before diving into the details of upgrading to Windows Server 2025, it's helpful to consider several key factors such as whether you're upgrading a physical server or a virtual machine. Let's begin with virtual machines: If your server is running Hyper-V, in-place upgrades are straightforward since the process will automatically update Hyper-V drivers with the new operating system. For those using non-Microsoft virtualization platforms, it is crucial to update guest drivers from that platform &lt;STRONG&gt;&lt;EM&gt;before&lt;/EM&gt;&lt;/STRONG&gt; starting the upgrade to Windows Server 2025. Outdated virtualization drivers are a common reason for support requests, so updating them in advance can help you avoid potential issues.&lt;/P&gt;
&lt;P&gt;The second scenario involves upgrading physical servers, which can be a bit more complicated. If your server runs Windows Server 2012 R2, it was probably purchased around 2010 or 2011—meaning it's now about 15 years old. While the CPU and motherboard might still work, it's essential to check every component, including network adapters, host bus adapters, storage controllers, and any devices installed in the PCIe slots. Make sure all add-in cards are compatible with Windows Server 2025 and that drivers are available. If you find some components aren't compatible, this could be a good opportunity to move workloads to the cloud, invest in new hardware, or consider virtualizing these workloads to simplify future upgrades.&lt;/P&gt;
&lt;H2&gt;Planning for the upgrade&lt;/H2&gt;
&lt;P&gt;Carefully planning the upgrade process will minimize downtime:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Check that your hardware and application vendors support Windows Server 2025 – we’ve worked with a very broad range of hardware and application vendors to ensure support and compatibility.&lt;/LI&gt;
&lt;LI&gt;Checkpoints and Backups - Whenever you're performing an operating system upgrade, it's a good idea to make sure you've got a physical backup or a VM checkpoint just in case of unforeseen issues. If you're using a VM it's easy, take a snapshot of your existing virtual machine so that you can revert in the case that you need to if you're doing a physical server of course make sure you have a backup as well. the upgrade is not 100% perfect and can fail, so a backup is strongly recommended – as is a backup restore test.&lt;/LI&gt;
&lt;LI&gt;Backup storage – backups should be stored on a different device or a remote location – not on the device that is being upgraded to Windows Server 2025.&lt;/LI&gt;
&lt;LI&gt;Test the upgrade process on a test device in your environment to gain experience with the process.&lt;/LI&gt;
&lt;LI&gt;Schedule a maintenance Window for your customers / users and inform them that their data and applications will be offline.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;o&amp;nbsp;&amp;nbsp; Although the average time to upgrade a server is typically an hour, the process may take several hours – so set expectations appropriately.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Plan to stop all applications on the server before backing up the server and applications.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H2&gt;Windows Server running Active Directory Domain Services&lt;/H2&gt;
&lt;P&gt;In place upgrades for Windows Server 2025 can be used for any Windows Server role except for Active Directory. Remember: domain controllers are special. Active Directory is a multi-master directory service which means that changes to the directory data can be made on any domain controller within the domain and those changes are then replicated to other domain controllers to ensure that there's no single point of failure while providing redundancy and high availability. Because Active Directory is a multi-master service, the process for upgrading domain controllers is the same as it has been for decades.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Step 1: Setup new domain controller running Windows Server 2025&lt;/LI&gt;
&lt;LI&gt;Step 2: Synchronize new domain controllers with existing domain controllers&lt;/LI&gt;
&lt;LI&gt;Step 3: Turn off old domain controllers&lt;/LI&gt;
&lt;LI&gt;Step 4: Raise the Forest Functional Level and Domain Functional Level&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;You can find detailed documentation for &lt;A href="https://learn.microsoft.com/en-us/windows-server/identity/ad-ds/deploy/upgrade-domain-controllers" target="_blank"&gt;upgrading domain controllers here&lt;/A&gt;.&lt;/P&gt;
&lt;H2&gt;Do I need to purchase a Windows Server 2025 product key?&lt;/H2&gt;
&lt;P&gt;Volume License customers with Software Assurance have upgrade rights and should be able to upgrade to Windows Server 2025 and activate when their KMS is configured. Either a Window Server 2025 product key or a correctly configured Key Management Server (KMS) is needed to Activate Windows Server 2025 devices. Customer Support Services require devices to be activated to receive product support.&lt;/P&gt;
&lt;H2&gt;Windows Server Upgrade Walk-through&lt;/H2&gt;
&lt;P&gt;When you have completed the preparation steps above, and you’re ready to upgrade a Windows Server device, the steps are relatively easy:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;First, check that you are running Windows Server 2012 R2, 2016, 2019, or 2022 by running &lt;STRONG&gt;winver&lt;/STRONG&gt;:&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL start="2"&gt;
&lt;LI&gt;Run Windows Server 2025 &lt;STRONG&gt;setup&lt;/STRONG&gt; from the ISO or extracted ISO media:&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL start="3"&gt;
&lt;LI&gt;By default, &lt;STRONG&gt;setup&lt;/STRONG&gt; will start by attempting to download updates to the setup process to ensure a smoother upgrade experience:&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL start="4"&gt;
&lt;LI&gt;You will be prompted for the version of Windows Server that you’d like to upgrade to – in this case, Windows Server 2025 Datacenter (Desktop Experience) has been selected:&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL start="5"&gt;
&lt;LI&gt;Next, you will be asked to agree to the license terms:&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL start="6"&gt;
&lt;LI&gt;To upgrade the server, select the “Keep files, settings, and apps” radio button and press &lt;STRONG&gt;Next&lt;/STRONG&gt;:&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL start="7"&gt;
&lt;LI&gt;&lt;STRONG&gt;Setup&lt;/STRONG&gt; will fetch any available updates for the upgrade process…&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL start="8"&gt;
&lt;LI&gt;After &lt;STRONG&gt;setup&lt;/STRONG&gt; have downloaded updates for the upgrade process, it will check that you want to upgrade your server to Windows Server 2025 – select &lt;STRONG&gt;Install&lt;/STRONG&gt;:&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL start="9"&gt;
&lt;LI&gt;Setup will attempt to upgrade your server to Windows Server 2025 and migrate your applications, settings, and user profiles. When completed, the server will restart:&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL start="10"&gt;
&lt;LI&gt;Note that the restart will take several minutes to complete the final phases of upgrade. When the server restarts, you will be asked if you want to &lt;STRONG&gt;Include Optional&lt;/STRONG&gt; or just &lt;STRONG&gt;Required only&lt;/STRONG&gt; telemetry data back to Microsoft. Microsoft uses this data to improve Windows Server. Select the option that you prefer and press &lt;STRONG&gt;Accept&lt;/STRONG&gt;:&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL start="11"&gt;
&lt;LI&gt;When Windows Server 2025 starts with the Desktop Experience or ServerCore, you can check the version using &lt;STRONG&gt;winver&lt;/STRONG&gt;:&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL start="12"&gt;
&lt;LI&gt;Check for updates using the &lt;STRONG&gt;Settings Dialog&lt;/STRONG&gt; | &lt;STRONG&gt;Windows Update&lt;/STRONG&gt; (or WSUS or Update Management Software) – to download and install the Latest Cumulative Updates (LCU) packages. Install the LCUs and Restart:&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL start="13"&gt;
&lt;LI&gt;After all LCUs have been installed and the server has been rebooted, verify that applications start correctly and all components and devices are working as expected.&lt;/LI&gt;
&lt;LI&gt;If the upgrade to Windows Server does not succeed:
&lt;UL&gt;
&lt;LI&gt;You can troubleshoot upgrade issues by examining the setup logs which are in the C:\Windows\Panther directory. There is a setup log parsing utility called &lt;STRONG&gt;SetupDiag&lt;/STRONG&gt; that can be downloaded here: &lt;A href="https://learn.microsoft.com/en-us/windows/deployment/upgrade/setupdiag" target="_blank"&gt;SetupDiag | Microsoft Learn&lt;/A&gt;.&lt;/LI&gt;
&lt;LI&gt;Restore the previous version of Windows Server from the backup media.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;We hope you enjoy using Windows Server 2025 and have found the Upgrade process to be easy!&lt;/P&gt;</description>
      <pubDate>Tue, 23 Sep 2025 23:22:03 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-server-news-and-best/upgrading-to-windows-server-2025-from-windows-server-2012-r2/ba-p/4456406</guid>
      <dc:creator>Rob-Hindman</dc:creator>
      <dc:date>2025-09-23T23:22:03Z</dc:date>
    </item>
    <item>
      <title>Introducing the VM Conversion tool in Windows Admin Center – Public Preview</title>
      <link>https://techcommunity.microsoft.com/t5/windows-server-news-and-best/introducing-the-vm-conversion-tool-in-windows-admin-center/ba-p/4446604</link>
      <description>&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;As organizations update their infrastructure, a growing number are&amp;nbsp;seeking&amp;nbsp;adaptable,&amp;nbsp;Microsoft-supported solutions that address current requirements&amp;nbsp;while laying the path for&amp;nbsp;future cloud&amp;nbsp;and AI&amp;nbsp;adoption.&amp;nbsp;Azure provides&amp;nbsp;an&amp;nbsp;agile, scalable, cost-effective&amp;nbsp;platform&amp;nbsp;for&amp;nbsp;infrastructure and&amp;nbsp;innovation.&amp;nbsp;Whether by modernizing to&amp;nbsp;cloud&amp;nbsp;technologies&amp;nbsp;like&amp;nbsp;Windows&amp;nbsp;or Linux VMs,&amp;nbsp;containers,&amp;nbsp;&lt;A class="lia-external-url" href="https://azure.microsoft.com/en-us/blog/check-out-whats-new-in-azure-vmware-solution/" target="_blank" rel="noopener"&gt;Azure VMware Solution&lt;/A&gt;&amp;nbsp;or&amp;nbsp;PaaS&amp;nbsp;services,&amp;nbsp;Azure offers a world-class cloud experience.&amp;nbsp;However,&amp;nbsp;we&amp;nbsp;recognize&amp;nbsp;that&amp;nbsp;some&amp;nbsp;organizations&amp;nbsp;must&amp;nbsp;retain&amp;nbsp;workloads&amp;nbsp;on-premises&amp;nbsp;due to data&amp;nbsp;compliance, governance,&amp;nbsp;or other regulatory&amp;nbsp;requirements.&amp;nbsp;For customers&amp;nbsp;wanting&amp;nbsp;to&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;adopt&amp;nbsp;Windows Server and Hyper-V for this&amp;nbsp;use case,&amp;nbsp;we are excited to&amp;nbsp;provide&amp;nbsp;a new option within Windows Admin Center,&amp;nbsp;the&amp;nbsp;VM&amp;nbsp;Conversion tool,&amp;nbsp;in&amp;nbsp;public preview&amp;nbsp;now.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;This agentless, cost-free tool streamlines the conversion of virtual machines from VMware to Windows Server with Hyper-V, providing customers flexibility with their on-premises virtualization environments while enabling a seamless transition path to Azure when desired. With minimal infrastructure requirements, the tool is particularly beneficial for small and medium-sized organizations. Additionally, with minimal setup time you can download the new VM Conversion tool extension in Windows Admin Center and begin converting virtual machines in under five minutes.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt; &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Figure 1- VM Conversion tool in Windows Admin Center &lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;🔑&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Key&amp;nbsp;Features &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Agentless,&amp;nbsp;appliance-free&amp;nbsp;discovery&lt;/SPAN&gt;&amp;nbsp;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;After&amp;nbsp;establishing&amp;nbsp;a connection&amp;nbsp;to&amp;nbsp;the&amp;nbsp;virtualization environment, the tool&amp;nbsp;conducts&amp;nbsp;discovery of all virtual machines&amp;nbsp;without requiring&amp;nbsp;agents or appliances&amp;nbsp;and does so in a non-intrusive manner.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Minimal&amp;nbsp;downtime&lt;/SPAN&gt;&amp;nbsp;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;The&amp;nbsp;VM&amp;nbsp;Conversion&amp;nbsp;tool&amp;nbsp;enables&amp;nbsp;initial data replication while&amp;nbsp;the source&amp;nbsp;virtual&amp;nbsp;machine&amp;nbsp;remains&amp;nbsp;operational, thereby preventing any interruptions&amp;nbsp;to&amp;nbsp;ongoing applications. After completing this&amp;nbsp;initial&amp;nbsp;replication,&amp;nbsp;on user&amp;nbsp;consent&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;,&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;the source VM is powered down so a&amp;nbsp;subsequent&amp;nbsp;replication pass can capture any data changes made during the first phase.&amp;nbsp;This two-step process ensures that the&amp;nbsp;cutover time from the source to the target VM&amp;nbsp;is minimized.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Group servers&lt;/SPAN&gt;&amp;nbsp;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;You can&amp;nbsp;select and migrate up to 10 virtual machines&amp;nbsp;at a time. This reduces manual effort and accelerates the transition to Windows Server.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Boot configuration&lt;/SPAN&gt;&amp;nbsp;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;The tool automatically maps BIOS-based virtual machines to Generation 1 and UEFI-based machines to Generation 2, preserving boot configurations and ensuring compatibility.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;OS agnostic&lt;/SPAN&gt;&amp;nbsp;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;The tool supports conversion of both Linux and Windows guest OS VMs to Windows Server host.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Multi-disk&amp;nbsp;VM&amp;nbsp;support&lt;/SPAN&gt;&amp;nbsp;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;Virtual machines&amp;nbsp;that use several&amp;nbsp;virtual hard disks—common in production&amp;nbsp;environments—are fully supported.&amp;nbsp;The operating system, data, and application disks&amp;nbsp;all&amp;nbsp;migrate&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;d&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;together, so&amp;nbsp;manual&amp;nbsp;setup is&amp;nbsp;not&amp;nbsp;needed.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;⚙️&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;How It Works &lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;To ensure a smooth and reliable transition, the tool performs a comprehensive set of built-in prechecks. These checks&amp;nbsp;validate&amp;nbsp;critical VM attributes such as disk types, boot configuration (BIOS or UEFI),&amp;nbsp;destination disk,&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;memory&amp;nbsp;requirements&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;,&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;and&amp;nbsp;several more.&amp;nbsp;By&amp;nbsp;identifying&amp;nbsp;potential issues early, administrators can proactively address them—minimizing the risk of migration failures and reducing downtime during the final cutover&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;The&amp;nbsp;VM&amp;nbsp;Conversion&amp;nbsp;tool&amp;nbsp;uses&amp;nbsp;change&amp;nbsp;block&amp;nbsp;tracking (CBT) to efficiently replicate data from one virtual disk format to another. During the&amp;nbsp;initial&amp;nbsp;seeding phase, a full copy of the virtual machine is created while it&amp;nbsp;remains&amp;nbsp;online.&amp;nbsp;This minimizes downtime and ensures data integrity.&amp;nbsp;Before the final cutover, a delta replication captures all changes made since the&amp;nbsp;initial&amp;nbsp;copy, ensuring the destination VM is fully up-to-date&amp;nbsp;post conversion to Hyper-V hosts.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;🚀&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Ready to Take the Next Step?&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;The VM&amp;nbsp;Conversion&amp;nbsp;tool is available now in the public feed of Windows Admin Center. You can install it directly from the&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Extensions&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; settings in Windows Admin Center&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;.&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;To get started, ensure&amp;nbsp;you're&amp;nbsp;running the&amp;nbsp;&lt;/SPAN&gt;&lt;A class="lia-external-url" href="https://aka.ms/downloadWAC" target="_blank" rel="noopener"&gt;Windows Admin Center v2 GA release&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;📘&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;For detailed&amp;nbsp;setup&amp;nbsp;instructions and prerequisites&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;,&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;refer to the&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/windows-server/manage/windows-admin-center/use/migrate-vmware-to-hyper-v" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Public Preview Documentation&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;📍&amp;nbsp;Summary&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt; The VM&amp;nbsp;Conversion&amp;nbsp;tool&amp;nbsp;offers a simple, supported path for organizations to streamline VM conversion to Hyper-V virtualization environments.&amp;nbsp;With no added cost&amp;nbsp;and&amp;nbsp;minimal setup,&amp;nbsp;it empowers customers to streamline VM migration and prepare for the cloud&amp;nbsp;at their own pace.&amp;nbsp;Support&amp;nbsp;for&amp;nbsp;Azure Arc-enabled&amp;nbsp;servers is also planned for future releases, further enhancing hybrid management capabilities.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;We’re&amp;nbsp;continuously evolving the VM&amp;nbsp;Conversion&amp;nbsp;tool&amp;nbsp;based on user feedback.&amp;nbsp;Please continue to share your&amp;nbsp;feedback&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://feedback.azure.com/d365community/forum/6847efad-f212-ed11-b83e-000d3a4d93f5?page=2&amp;amp;sort=newest" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;here&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt; and&amp;nbsp;help&amp;nbsp;us prioritize&amp;nbsp;our&amp;nbsp;efforts&amp;nbsp;for&amp;nbsp;future releases.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Happy converting!&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 25 Aug 2025 18:49:22 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-server-news-and-best/introducing-the-vm-conversion-tool-in-windows-admin-center/ba-p/4446604</guid>
      <dc:creator>Priya_Satheesh</dc:creator>
      <dc:date>2025-08-25T18:49:22Z</dc:date>
    </item>
    <item>
      <title>Hotpatching for Azure Arc–Connected Servers: General Availability and Subscription Details</title>
      <link>https://techcommunity.microsoft.com/t5/windows-server-news-and-best/hotpatching-for-azure-arc-connected-servers-general-availability/ba-p/4433915</link>
      <description>&lt;P&gt;&lt;STRONG&gt;Effective July 16, 2025, Hotpatching for Windows Server 2025 on Azure Arc–connected machines will be generally available (GA) and transition to a paid &lt;A class="lia-external-url" href="https://www.microsoft.com/en-us/windows-server/blog/2025/04/24/tired-of-all-the-restarts-get-hotpatching-for-windows-server/" target="_blank" rel="noopener"&gt;subscription model.&lt;/A&gt;&lt;/STRONG&gt;&amp;nbsp;This post provides technical details on the service, the value of hotpatching for on-premises servers, and important enrollment information for customers.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;What Is hotpatching?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Hotpatching enables you to install OS security updates on Windows Server without requiring a reboot. This technology, previously exclusive to Windows Server Datacenter: Azure Edition, is now available for on-premises and hybrid environments through Azure Arc. Hotpatching has been in &lt;A href="https://techcommunity.microsoft.com/blog/windowsservernewsandbestpractices/now-in-preview-hotpatch-for-windows-server-2025/4248296" target="_blank" rel="noopener"&gt;public preview&lt;/A&gt; at no cost, but as of July 16, 2025, a monthly subscription fee of&amp;nbsp;&lt;STRONG&gt;$1.50 USD per CPU core&lt;/STRONG&gt; will apply.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Why hotpatching for on-premises servers?&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Minimize downtime:&lt;/STRONG&gt;&amp;nbsp;Apply critical security updates without interrupting workloads or requiring planned maintenance windows.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Improve security posture:&lt;/STRONG&gt;&amp;nbsp;Reduce the window of vulnerability by deploying patches as soon as they are available.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Operational efficiency:&lt;/STRONG&gt;&amp;nbsp;Eliminate the need for frequent reboots, simplifying patch management for IT teams.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Consistent experience:&lt;/STRONG&gt;&amp;nbsp;Use the same hotpatching process across Azure, on-premises, and hybrid environments with Azure Arc.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Enrollment and billing&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;To receive hotpatches on Windows Servers outside of Azure, customers must enroll their servers. The servers must be on the latest cumulative update released during a baseline month (January, April, July and October) by Microsoft on the second Tuesday of the month. Only enrolled servers will continue to receive hotpatches and be billed accordingly.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Preview customers:&lt;/STRONG&gt;&amp;nbsp;If already enrolled during the preview period, then no action is needed to continue to receive hotpatches. If you enrolled in hotpatching during the Preview and do not wish to be billed after GA, you must disenroll your servers before July 16, 2025, to avoid charges.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;New customers:&lt;/STRONG&gt;&amp;nbsp;Enroll your eligible Windows Server 2025 machines via Azure Arc to activate hotpatching and start receiving updates.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;How to enroll in hotpatching&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;To begin receiving hotpatches for your Azure Arc–connected Windows Server 2025 machines, follow these steps:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Prerequisites&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Ensure your machine is connected to Azure Arc.&lt;/LI&gt;
&lt;LI&gt;Ensure&lt;A class="lia-external-url" href="https://aka.ms/WS-HotPatch-VSM" target="_blank" rel="noopener"&gt; Virtualization Based Security (VBS)&lt;/A&gt; is enabled and running.&lt;/LI&gt;
&lt;LI&gt;Confirm that the latest cumulative update from a baseline month (January, April, July, or October) is installed. Hotpatching is only offered if this requirement is met.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Enrollment via Azure Portal&lt;/STRONG&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt;Connect your server to Azure Arc.&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Navigate to the Windows Server resource&lt;/STRONG&gt;&amp;nbsp;in the Azure Arc portal.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Click on the Hotpatch blade&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Check the box &lt;/STRONG&gt;&lt;EM&gt;“I want to license this Windows Server to receive monthly hotpatches”&lt;/EM&gt;&amp;nbsp;and click on confirm under the hotpatch blade.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Note: &lt;/STRONG&gt;Enrollment operation takes a few minutes, so you may need to manually refresh the Azure portal to see the updated status.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;How to disenroll from hotpatching&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;If you no longer wish to receive hotpatches or want to avoid billing after the preview period ending on&amp;nbsp;&lt;STRONG&gt;July 16, 2025&lt;/STRONG&gt;, you must disenroll from hotpatching service on Azure Arc portal.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Disenrollment via Azure portal&lt;/STRONG&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt;Go to the Azure Arc–connected server&lt;/STRONG&gt;&amp;nbsp;in the Azure Arc portal.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Open the hotpatch blade.&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Uncheck the box &lt;/STRONG&gt;&lt;EM&gt;“I want to license this Windows Server to receive monthly hotpatches”&lt;/EM&gt;&amp;nbsp;and click on confirm.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Important:&lt;/STRONG&gt; Disenroll before disconnecting the machine from Azure Arc. If you disconnect first, billing may continue for up to 30 days after the last connection. See this &lt;A href="https://www.microsoft.com/en-us/windows-server/blog/2025/04/24/tired-of-all-the-restarts-get-hotpatching-for-windows-server/" target="_blank" rel="noopener"&gt;blog post&lt;/A&gt; for additional details.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Disenrollment via API&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Set&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/rest/api/hybridcompute/license-profiles/update?view=rest-hybridcompute-2025-01-13&amp;amp;tabs=HTTP#licenseprofilesubscriptionstatusupdate" target="_blank" rel="noopener"&gt;subscriptionStatus&lt;/A&gt;&amp;nbsp;&amp;nbsp;to&amp;nbsp;"Disable"&amp;nbsp;in the license profile payload.&lt;/LI&gt;
&lt;LI&gt;This action is synchronous and should reflect immediately, though portal refresh may still be required.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Learn more&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;If you’re interested in learning more, check out our April &lt;A href="https://www.microsoft.com/en-us/windows-server/blog/2025/04/24/tired-of-all-the-restarts-get-hotpatching-for-windows-server/" target="_blank" rel="noopener"&gt;blog post&lt;/A&gt; and the on-demand session on &lt;A href="https://techcommunity.microsoft.com/event/windowsserver-events/hotpatching-and-update-management-for-windows-server-with-azure-arc/4397270" target="_blank" rel="noopener"&gt;Hotpatching and Update Management&lt;/A&gt; from our recent Windows Server Summit virtual event.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 16 Jul 2025 22:24:47 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-server-news-and-best/hotpatching-for-azure-arc-connected-servers-general-availability/ba-p/4433915</guid>
      <dc:creator>Janine-Patrick</dc:creator>
      <dc:date>2025-07-16T22:24:47Z</dc:date>
    </item>
    <item>
      <title>Removal of DES in Kerberos for Windows Server and Client</title>
      <link>https://techcommunity.microsoft.com/t5/windows-server-news-and-best/removal-of-des-in-kerberos-for-windows-server-and-client/ba-p/4386903</link>
      <description>&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;To enhance security and protect against cyber threats, the&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/dotnet/api/system.security.cryptography.des?view=net-9.0" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Data Encryption Standard (DES)&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt; encryption algorithm will be intentionally removed from Kerberos after Windows Server 2025 and Windows 11, version 24H2 computers install Windows Updates released on or after September 9, 2025. While DES encryption in Kerberos is an optional component that isn’t installed by default, it’s important to detect and disable your DES use now to avoid potential disruption later this year. Currently, Kerberos supports stronger encryption ciphers such as AES that should be used instead of DES. Deprecating outdated, less-secure technologies is in-line with Microsoft's &lt;/SPAN&gt;&lt;A href="https://www.microsoft.com/en-us/trust-center/security/secure-future-initiative" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Secure Future Initiative&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt; (SFI) commitments.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2 aria-level="2"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;DES removal&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:240,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;As methods to bypass and break cryptographic ciphers continue to evolve, it is important for administrators to decommission older encryption ciphers. This transition to disable DES in Kerberos on Windows devices will occurs in phases.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt; Compatibility Mode: &lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;DES in Kerberos is disabled by default on all Client and Server versions of Windows released on and after Windows 7 and Windows Server 2008 R2. If DES is required in Kerberos, administrators can manually configure the DES cipher on supported operating systems with the exception of Windows 11 24H2 and Windows Server 2025 devices that have installed updates released on and after September 9, 2025.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;DES in Kerberos Disabled Mode:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt; Once DES in Kerberos is removed, it will no longer be supported as an encryption cipher in any function of Kerberos in Windows Server 2025 and later and Windows 11, version 24H2 and later. Legacy scenarios using DES on those two operating system versions will stop working until Kerberos-related application and network security configuration changes are made by IT administrators, so a safer cipher can be used. &lt;/SPAN&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;DES will not be removed from earlier Windows versions.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;By adopting stronger encryption methods, such as the &lt;/SPAN&gt;&lt;A href="https://techcommunity.microsoft.com/blog/coreinfrastructureandsecurityblog/active-directory-hardening-series---part-4-%E2%80%93-enforcing-aes-for-kerberos/4114965" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Advanced Encryption Standard (AES)&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt; algorithm, you can significantly improve your organization’s security posture and enable compliance with modern encryption standards such as the &lt;/SPAN&gt;&lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/azure/compliance/offerings/offering-fips-140-2" target="_blank" rel="noopener"&gt;Federal Information Processing Standards (FIPS).&lt;/A&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2 aria-level="2"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;A brief history of &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;DES&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:240,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;The DES symmetric-key encryption algorithm is a block cipher algorithm that encrypts and decrypts messages using a 56-bit key. It was established in 1977 as the first standard encryption algorithm for business use in the United States. DES was added to Kerberos in &lt;/SPAN&gt;&lt;A href="https://ietf.org/rfc/rfc1510.html" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;RFC1510&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt; (1993) and was present in the first Windows Kerberos implementation in Windows 2000, but it was only used for third-party compatibility. Windows machines defaulted to using RC4 in all Windows-to-Windows transactions. As of Windows 7 and Windows Server 2008 R2, DES was disabled by default but remained available as an optional component &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;when manually enabled by an administrator&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; It was deprecated in the Kerberos standard by &lt;/SPAN&gt;&lt;A href="https://www.ietf.org/rfc/rfc6649.html" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;RFC6649&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt; in calendar year 2012.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Over the years, an increase in computational power has led to DES becoming increasingly vulnerable to brute force attacks and known-plaintext attacks. In summary, DES encryption has known vulnerabilities when used within the Kerberos protocol.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Note&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;:&lt;/STRONG&gt; Windows has never natively used DES for Kerberos. The only major use of DES for Kerberos in Windows that Microsoft is aware of is for older versions of Java. While DES is never used by default for authentication between Windows machines, it might still be used by third-party clients and servers.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Heading 2 Char"&gt;R&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Heading 2 Char"&gt;ecommendations &lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Heading 2 Char"&gt;and&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Heading 2 Char"&gt; next steps&lt;/SPAN&gt;&lt;/SPAN&gt;&amp;nbsp;&lt;/H2&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&lt;EM&gt;Does your organization use versions of Windows Server and Windows client earlier than Windows Server 2025 and Windows 11, version 24H2?&lt;/EM&gt; If so,&lt;/SPAN&gt; &lt;SPAN data-contrast="auto"&gt;we advise you detect any DES in Kerberos use within your network, identify apps that are using DES, and reconfigure them to use a stronger cipher. Ultimately, you’ll need to disable DES before taking the September 2025 Windows security update. Microsoft also recommends identifying apps and callers negotiating DES and upgrading to a more secure encryption cipher.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H3 aria-level="3"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;How to detect &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;DES usage&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:240,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;Important&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="none"&gt;&lt;STRONG&gt;:&lt;/STRONG&gt; Before proceeding with detection, &lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;install the Windows Server 2025 updates released in or after January 2025 prior to September 9, 2025, to ensure that the script functions as expected&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-contrast="none"&gt;To detect DES usage, please use the tools and guide to detect DES usage found &lt;A class="lia-external-url" href="https://github.com/microsoft/Kerberos-Crypto" target="_blank" rel="noopener"&gt;here&lt;/A&gt;&lt;/SPAN&gt;. If DES usage is detected or if you are unsure if accounts use DES in Kerberos, then you should continue to detect the events described below. Identify DES usage via &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Kerberos Key Distribution Service (&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;KDCSVC) Event IDs 476&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;8&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt; and 4769 in the security event log on a DC. KSDSVC Event ID 4768 &lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;is logged every time a Key Distribution Center issues a Kerberos Ticket Granting Ticket (TGT). &lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;&amp;nbsp;KDCSVC&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt; Event ID 4769 is generated every time a Kerberos service ticket is requested. &lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;These events are shown below. &lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;KDCSVC Event ID 4768&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table border="1" style="border-width: 1px;"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;Event log&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;Security&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;Event type&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;Audit&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;Event source&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;KDCSVC&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;Event ID&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;4768&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;Event text&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;&amp;nbsp;More information about event text can be found &lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-10/security/threat-protection/auditing/event-4768" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;here&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/DIV&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;KDCSVC Event ID 4769&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table border="1" style="border-width: 1px;"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;Event log&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;Security&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;Event type&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;Audit&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;Event source&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;KDCSVC&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;Event ID&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;4769&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;Event text&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;&amp;nbsp;More information about the event text can be found &lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-10/security/threat-protection/auditing/event-4769" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;here&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/DIV&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;These Event IDs should be visible in the security event logs and do not require additional configuration.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;The PowerShell scripts &lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;linked above&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt; scan the security event log for KDCSVC Event IDs 4768 and 4769 for use of specified ticket, session, and account key types. Make sure that remote event logging is enabled to allow the PowerShell scripts to aggregate data across multiple Kerberos DCs. Review further guidance on how to &lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/troubleshoot/windows-server/active-directory/enable-kerberos-event-logging" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;enable Kerberos event logging&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="none"&gt;.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;You can further narrow down the query by specifying a time frame to search for the events. This may be necessary if the event logs are excessively large. Use the PowerShell scripts from GitHub to detect the use of specific ciphers by particular accounts, either on the local machine or across all Kerberos DCs.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:240,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H3 aria-level="3"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;How &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;to disable &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;DES&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt; in Kerberos&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:240,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;If your environment is currently using software with DES encryption, the next step is to disable DES. Use the following steps to verify that there are no DES-enabled accounts:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI data-leveltext="%1." data-font="" data-listid="9" data-list-defn-props="{&amp;quot;335552541&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769242&amp;quot;:[65533,0],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;%1.&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Use your event log audit trail to generate a comprehensive inventory of accounts advertising support for DES encryption types. Examine these computers and devices. It’s unlikely that they are running Windows.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;SPAN data-contrast="auto"&gt;2. Navigate to&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Active Directory&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; &amp;gt; &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Users and Computers policy&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;. Under account options, make sure the “Use only Kerberos DES encryption types for this account” &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;box is unchecked&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;. The following setting corresponds to USE_DES_KEY_ONLY 0x200000 bit in the &lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/troubleshoot/windows-server/active-directory/useraccountcontrol-manipulate-account-properties" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="auto"&gt;UserAccountControl&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt; field in Active Directory&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;img&gt;&lt;EM&gt;&lt;SPAN data-contrast="auto"&gt;Screenshot of account options in Active Directory Users and Computers policy.&lt;/SPAN&gt;&lt;/EM&gt;&lt;/img&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;SPAN data-contrast="auto"&gt;3. If the computers are running Windows, examine them for the presence of non-Microsoft software and applications. This third-party software may be the source of DES usage. Tools such as Network Monitor, Process Monitor, and process auditing can help identify which process is using DES.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;SPAN data-contrast="auto"&gt;4. Once identified, navigate to the Group Policy “Network security: Configure encryption types allowed for Kerberos” located at Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options.&lt;/SPAN&gt;&amp;nbsp;&lt;BR /&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;img /&gt;&lt;img&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN data-contrast="auto"&gt;Screenshot of the dialog box for “Network security: Configure encryption types allowed for Kerberos,” focused on the Local Security Settings tab.&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/img&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;Ensure the boxes next to DES_CBC_MD5 and DES_CBC_CRC are unchecked. Then update the encryption method for the service account to AES by &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;checking the boxes next to AES128_HMAC_SHA1, AES256_HMAC_SHA1 and Future Encryption Types.&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Important&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;: &lt;/STRONG&gt;If the account was created in a DC running Windows Server 2003 or older, change the account’s password to ensure that the account is AES-capable. Microsoft advises you to test any new settings that disable DES before applying them in your environments, use safe deployment practices, and prepare a rollback plan. Gradually replace DES with AES, ensuring all domain trusts are updated to support AES. Consider keeping AES and DES enabled during the transition phase if necessary.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;Note:&lt;/STRONG&gt; &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;For&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; computers running non-Windows operating systems or appliance devices, review the local Kerberos client configurations or contact the respective vendors for guidance.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2 aria-level="2"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;Stay secure&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:240,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Removing non&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;secure &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;cryptographic algorithms will help you improve your security posture and make your organization less susceptible to Kerberos attacks. &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;We recommend upgrading to Windows Server 2025 and to Windows 11, version 24H2 if you haven’t already. This will help your organization use more secure encryption methods such as AES and ensure that vulnerable ciphers such as DES are disabled. To prepare for removal of DES in Kerberos through the Windows security update in September 2025, please identify any DES usage within your network and disable it through Group Policy&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;. &amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;At Microsoft, we truly believe that security is a team sport. By partnering with original equipment manufacturers (OEMs), app developers, and other partners in the ecosystem, and by helping you better protect your organization, we are continuing to help make Windows more secure by design and more secure by default. The&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; &lt;/SPAN&gt;&lt;A href="https://aka.ms/ws2025securitybook" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Windows Security Book&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;is available to help you learn more about what makes it easy to stay secure &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;with&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Windows 11.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;To learn more about Microsoft Security solutions, visit our&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; &lt;/SPAN&gt;&lt;A href="https://www.microsoft.com/en-us/security/business" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;website&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;. Bookmark the&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; Microsoft &lt;/SPAN&gt;&lt;A href="https://www.microsoft.com/security/blog/" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Security blog&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt; &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;to keep up with our expert coverage on security matters, and follow us on LinkedIn (&lt;/SPAN&gt;&lt;A href="https://www.linkedin.com/showcase/microsoft-security/" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Microsoft Security&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;) and X (&lt;/SPAN&gt;&lt;A href="https://twitter.com/@MSFTSecurity" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;@MSFTSecurity&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;)&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;for the latest news and updates on cybersecurity.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 28 Feb 2025 01:02:17 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-server-news-and-best/removal-of-des-in-kerberos-for-windows-server-and-client/ba-p/4386903</guid>
      <dc:creator>Anushka_Khare</dc:creator>
      <dc:date>2025-02-28T01:02:17Z</dc:date>
    </item>
    <item>
      <title>PPTP and L2TP deprecation: A new era of secure connectivity</title>
      <link>https://techcommunity.microsoft.com/t5/windows-server-news-and-best/pptp-and-l2tp-deprecation-a-new-era-of-secure-connectivity/ba-p/4263956</link>
      <description>&lt;P&gt;As technology advances, so must our security protocols. As part of our ongoing commitment to provide the highest level of security and performance, we are deprecating the PPTP (Point-to-Point Tunneling Protocol) and L2TP (Layer 2 Tunneling Protocol) protocols from future Windows Server versions. While these protocols have served us well over the years and will still be available to users, it is time to transition to more secure and efficient alternatives: SSTP and IKEv2.&lt;/P&gt;
&lt;P&gt;In this post, let’s walk through deprecation considerations, reasons, and recommendations to ensure you benefit from the best security options.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;SPAN&gt;What deprecation means for PPTP and L2TP?&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P&gt;Deprecation is not removal. Deprecation refers to the stage in the product lifecycle when a feature or functionality is no longer in active development and may be removed in future releases. Features and functionalities are added or occasionally removed from new releases of a product. If they’re removed, that’s typically because we’ve added a better option. Deprecated features continue to work and are fully supported until they are officially removed. We’re certain that you already have product lifecycles incorporated into your management strategy. Even so, the deprecation notification can span a few months or years to help you make the necessary transition. After removal, the feature or capability will no longer work.&lt;/P&gt;
&lt;P&gt;PPTP and L2TP have been reliable workhorses in the world of VPN technology. However, with the increasing sophistication of cyber threats, these protocols have become less effective in providing the robust security necessary to protect our data. Their vulnerabilities have been well-documented, and they are no longer sufficient to meet the current security standards.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;SPAN&gt;Transitioning to SSTP and IKEv2&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P&gt;To ensure you continue to benefit from the best available security, we recommend transitioning to Secure Socket Tunneling Protocol (SSTP) and Internet Key Exchange version 2 (IKEv2). These protocols offer enhanced security features, faster connection speeds, and improved reliability.&lt;/P&gt;
&lt;H3&gt;&lt;SPAN&gt;Benefits of SSTP&lt;/SPAN&gt;&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Strong encryption:&lt;/STRONG&gt; SSTP uses SSL/TLS encryption, providing a secure communication channel.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Firewall traversal:&lt;/STRONG&gt; SSTP can easily pass through most firewalls and proxy servers, ensuring seamless connectivity.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Ease of use:&lt;/STRONG&gt; With native support in Windows, SSTP is simple to configure and deploy.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;&lt;SPAN&gt;Benefits of IKEv2&lt;/SPAN&gt;&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;High security:&lt;/STRONG&gt; IKEv2 supports strong encryption algorithms and robust authentication methods.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Mobility and multihoming:&lt;/STRONG&gt; IKEv2 is particularly effective for mobile users, maintaining VPN connections during network changes.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Improved performance:&lt;/STRONG&gt; With faster establishment of tunnels and lower latency, IKEv2 offers superior performance compared to legacy protocols.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;SPAN&gt;Steps to transition to SSTP and IKEv2&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P&gt;Note that PPTP and L2TP will still remain available if you want to make outgoing VPN connections based on these protocols. This is true for future Servers and Client SKU releases. However, what is being changed is that Windows RRAS Server (VPN Server) will not accept any incoming VPN connections based on these protocols.&lt;/P&gt;
&lt;P&gt;As a result, please refer to the detailed set of instructions here for a step-by-step guide on transitioning to SSTP/IKEv2: &lt;SPAN&gt;&lt;A href="https://learn.microsoft.com/windows-server/remote/remote-access/get-started-install-ras-as-vpn?tabs=powershell" target="_blank" rel="noopener"&gt;How to install and configure Remote Access (RAS) as a VPN server&lt;/A&gt;&lt;/SPAN&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;SPAN&gt;Conclusion&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P&gt;The deprecation of PPTP and L2TP is a necessary step in maintaining the highest security standards. By transitioning to SSTP and IKEv2, you are ensuring that your network communications remain secure, efficient, and reliable. We are here to support you through this transition. Reach out to our support team if you have any questions or need further assistance.&lt;/P&gt;</description>
      <pubDate>Tue, 08 Oct 2024 16:17:40 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-server-news-and-best/pptp-and-l2tp-deprecation-a-new-era-of-secure-connectivity/ba-p/4263956</guid>
      <dc:creator>Farhan_Ali</dc:creator>
      <dc:date>2024-10-08T16:17:40Z</dc:date>
    </item>
    <item>
      <title>Now in preview: Hotpatch for Windows Server 2025</title>
      <link>https://techcommunity.microsoft.com/t5/windows-server-news-and-best/now-in-preview-hotpatch-for-windows-server-2025/ba-p/4248296</link>
      <description>&lt;P&gt;You asked and we delivered: &lt;EM&gt;Standard and Datacenter edition&lt;/EM&gt; server hotpatching - security updates without reboots - is ready for your evaluation in &lt;A href="https://aka.ms/HotpatchViaArc" target="_blank" rel="noopener"&gt;Windows Server 2025 Azure Arc-enabled Hotpatch public preview&lt;/A&gt;. This feature will be a game changer; simpler change control, shorter patch windows, easier orchestration… and you may finally get to see your family on the weekends.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;H1&gt;Hotpatches&lt;/H1&gt;
&lt;P&gt;Hotpatches are OS security updates that don’t require a reboot. It works by patching the in-memory code of running processes without the need to restart the process. This gives you benefits like:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Lower workload impact with fewer reboots. Instead of 12 mandatory reboots a year on “Patch Tuesday”, you’ll now only have &lt;A href="https://aka.ms/HPCalendar" target="_blank" rel="noopener"&gt;quarterly scheduled reboots&lt;/A&gt; (with the rare possibility of reboots being required in a nominal Hotpatch month).&lt;/LI&gt;
&lt;LI&gt;Fewer binaries mean updates download and install faster while consuming fewer disk and CPU resources.&lt;/LI&gt;
&lt;LI&gt;Easier patch orchestration and change control.&lt;/LI&gt;
&lt;LI&gt;Integrated with the optional Azure Update Manager.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hotpatch has been available for a few years in &lt;A href="https://aka.ms/hotpatchdocs" target="_blank" rel="noopener"&gt;Windows Server 2022 Datacenter: Azure Edition&lt;/A&gt;, this is tried and true technology. The real change is how and where you get those security updates. Hotpatching will be available as an option through the power of Azure Arc. Azure Arc enables management and allows the Windows Server internal licensing service for Hotpatch to run so that Hotpatch updates are delivered to customers.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H1&gt;Trying it out&lt;/H1&gt;
&lt;P&gt;Thanks to Azure Arc, enabling hotpatches for your &lt;A href="https://aka.ms/WindowsServer2025Eval" target="_blank" rel="noopener"&gt;Windows Server 2025 Datacenter and Standard edition evaluation&lt;/A&gt; machines takes only a few clicks. Simply enroll through the built in Azure Arc agent setup included in &lt;A href="https://aka.ms/WindowsServer2025Eval" target="_blank" rel="noopener"&gt;Windows Server 2025 evaluation&lt;/A&gt;, &lt;A href="https://aka.ms/HotpatchViaArc" target="_blank" rel="noopener"&gt;enable the hotpatch preview&lt;/A&gt;, and you’re in business.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;H1&gt;Changing the game&lt;/H1&gt;
&lt;P&gt;Hotpatching has been around for years in Windows Server 2022 Azure Edition, but always required running a VM in Azure or on Azure Stack HCI. When Windows Server 2025 becomes generally available, you will be able to run the edition you want, where you want - whether on-prem, in Azure, or elsewhere. You'll have an option to hotpatch Windows Server 2025 physical servers or virtual machines, and those VMs can run on Hyper-V, VMware, or anywhere else that supports Microsoft’s protection-focused Virtualization Based Security standard.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We think Windows Server 2025 hotpatching will change the game for organizations. &lt;A href="https://aka.ms/HotpatchViaArc" target="_blank" rel="noopener"&gt;Start your evaluation today&lt;/A&gt;!&lt;/P&gt;</description>
      <pubDate>Fri, 20 Sep 2024 18:48:33 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-server-news-and-best/now-in-preview-hotpatch-for-windows-server-2025/ba-p/4248296</guid>
      <dc:creator>Hari_Pulapaka</dc:creator>
      <dc:date>2024-09-20T18:48:33Z</dc:date>
    </item>
    <item>
      <title>How to preview: Azure Arc-connected Hotpatching for Windows Server 2025</title>
      <link>https://techcommunity.microsoft.com/t5/windows-server-news-and-best/how-to-preview-azure-arc-connected-hotpatching-for-windows/ba-p/4246895</link>
      <description>&lt;P&gt;As you may recall we had recently announced a &lt;A href="https://techcommunity.microsoft.com/t5/windows-server-news-and-best/hotpatching-is-now-available-in-preview-on-windows-server-2025/ba-p/4203451" target="_blank" rel="noopener"&gt;public preview&lt;/A&gt; of Hotpatching on Windows Server 2025 VMs in Azure. &amp;nbsp;With this latest preview we are moving towards fulfilling a top request by customers who want this capability for their on-premise machines. You will be able to benefit from the reduced reboots of your Windows Server 2025 machines with this optional Hotpatching capability. This capability was earlier limited to Windows Server 2022 Azure Edition VMs in Azure. The preview provides an opportunity for you to try this new capability to see how it will work in the upcoming Windows Server 2025 and provide feedback.&lt;/P&gt;
&lt;H2 style="margin-top: 36px; margin-bottom: 20px; font-family: 'Segoe UI', Segoe, Tahoma, Geneva, sans-serif; font-weight: 600; font-size: 22px; color: #333333;"&gt;What is Hotpatching?&lt;/H2&gt;
&lt;P&gt;Hotpatching is a way to install OS security updates on machines without the need of a reboot after installation. It works by patching the in-memory code of running processes without the need to restart the process. We first shipped this feature in &lt;A href="https://learn.microsoft.com/windows-server/get-started/hotpatch" target="_blank" rel="noopener"&gt;Windows Server 2022 Azure Edition.&lt;/A&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="line-height: 1.7; margin-bottom: 2px;"&gt;Better protection, as the Hotpatch update packages are scoped to Windows security updates that install faster without rebooting.&lt;/LI&gt;
&lt;LI style="line-height: 1.7; margin-bottom: 2px;"&gt;Reduces the time exposed to security risks and change windows, and easier patch orchestration with Azure Update Manager.&lt;/LI&gt;
&lt;LI style="line-height: 1.7; margin-bottom: 2px;"&gt;Fewer binaries mean updates download and install faster, consume fewer disk and CPU resources.&lt;/LI&gt;
&lt;LI style="line-height: 1.7; margin-bottom: 2px;"&gt;Lower workload impact with fewer reboots.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H2 style="margin-top: 36px; margin-bottom: 20px; font-family: 'Segoe UI', Segoe, Tahoma, Geneva, sans-serif; font-weight: 600; font-size: 22px; color: #333333;"&gt;What is part of the preview?&lt;/H2&gt;
&lt;P&gt;With this preview you can connect your Windows Server 2025 Datacenter Evaluation edition machines to Azure Arc and subscribe to Hotpatching. See the steps below.&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="line-height: 1.7; margin-bottom: 2px;"&gt;Connect to Azure Arc your Windows Server 2025 Datacenter Evaluation machines&lt;/LI&gt;
&lt;LI style="line-height: 1.7; margin-bottom: 2px;"&gt;Subscribe/ unsubscribe Hotpatching service via the Azure Arc portal&lt;/LI&gt;
&lt;LI style="line-height: 1.7; margin-bottom: 2px;"&gt;Manage deployment of Hotpatch updates natively on Azure via &lt;A href="https://learn.microsoft.com/azure/update-manager/overview" target="_blank" rel="noopener"&gt;Azure Update Manager&lt;/A&gt;.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H2 style="margin-top: 36px; margin-bottom: 20px; font-family: 'Segoe UI', Segoe, Tahoma, Geneva, sans-serif; font-weight: 600; font-size: 22px; color: #333333;"&gt;Getting Started&lt;/H2&gt;
&lt;P&gt;To get started follow the steps below. For any feedback or questions contact us on &lt;A href="mailto:hotpatchfeedback@microsoft.com" target="_blank" rel="noopener"&gt;hotpatchfeedback@microsoft.com&lt;/A&gt;&lt;/P&gt;
&lt;H3 style="margin-top: 36px; margin-bottom: 20px; font-family: 'Segoe UI', Segoe, Tahoma, Geneva, sans-serif; font-weight: 600; font-size: 19px; color: #333333; font-style: normal!important;"&gt;Create a VM using Windows Server 2025 Datacenter from the Microsoft Evaluation Center&lt;/H3&gt;
&lt;OL&gt;
&lt;LI style="line-height: 1.7; margin-bottom: 2px;"&gt;Download the Windows Server 2025 ISO image from the &lt;A href="https://www.microsoft.com/evalcenter/download-windows-server-2025" target="_blank" rel="noopener"&gt;Microsoft Evaluation Center&lt;/A&gt;. Note: You may have to fill in a form and provide your email address.&lt;BR /&gt;&lt;BR /&gt;&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI style="line-height: 1.7; margin-bottom: 2px;"&gt;On Hyper-V, or other platform, create a Gen 2 VM and use the option to create the VM using the ISO.&lt;BR /&gt;&lt;BR /&gt;&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI style="line-height: 1.7; margin-bottom: 2px;"&gt;For installation media, point to the ISO downloaded from Evaluation Center.&lt;BR /&gt;&lt;BR /&gt;&lt;img /&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;For detailed steps, see &lt;A href="https://learn.microsoft.com/windows-server/virtualization/hyper-v/get-started/create-a-virtual-machine-in-hyper-v?tabs=hyper-v-manager" target="_blank" rel="noopener"&gt;Create a virtual machine in Hyper-V&lt;/A&gt; and &lt;A href="https://learn.microsoft.com/virtualization/hyper-v-on-windows/quick-start/create-virtual-machine" target="_blank" rel="noopener"&gt;Create a virtual machine with Hyper-V on Windows 11&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;If you are using Omnissa as your virtualization platform, on the &lt;STRONG&gt;Select a guest OS&lt;/STRONG&gt; page, select &lt;STRONG&gt;Enable Windows Virtualization-Based Security&lt;/STRONG&gt;. &amp;nbsp;For more details, &lt;A href="https://docs.omnissa.com/bundle/Desktops-and-Applications-in-HorizonV2309/page/CreateaWindowsVMwithVirtualBasedSecurity.html" target="_blank" rel="noopener"&gt;click here&lt;/A&gt;.&lt;/EM&gt;&lt;/P&gt;
&lt;H3 style="margin-top: 36px; margin-bottom: 20px; font-family: 'Segoe UI', Segoe, Tahoma, Geneva, sans-serif; font-weight: 600; font-size: 19px; color: #333333; font-style: normal!important;"&gt;Enable Virtualization-based security (VBS)&lt;/H3&gt;
&lt;P&gt;Run the command below in an elevated command prompt. You will need to restart after modifying the registry setting.&lt;/P&gt;
&lt;LI-CODE lang="powershell"&gt;Reg add "HKLM\SYSTEM\ControlSet001\Control\DeviceGuard" /v "EnableVirtualizationBasedSecurity" /t REG_DWORD /d 1 /f&lt;/LI-CODE&gt;
&lt;P&gt;To check if VBS is running post reboot, open &lt;STRONG&gt;System Information&lt;/STRONG&gt; on your machine.You should see this:&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&lt;EM&gt;If you are using Omnissa and VBS is still not running, follow the steps outlined in &lt;A href="https://docs.vmware.com/en/VMware-vSphere/7.0/com.vmware.vsphere.security.doc/GUID-CE292D3F-D4AC-4607-B262-DE19CE6E9F6B.html" target="_blank" rel="noopener"&gt;this documentation&lt;/A&gt;&lt;/EM&gt;&lt;EM&gt;.&lt;/EM&gt;&lt;/P&gt;
&lt;H3 style="margin-top: 36px; margin-bottom: 20px; font-family: 'Segoe UI', Segoe, Tahoma, Geneva, sans-serif; font-weight: 600; font-size: 19px; color: #333333; font-style: normal!important;"&gt;Install the July 2024 monthly security update(KB5040435)&lt;/H3&gt;
&lt;P&gt;Download and install the &lt;A href="https://www.catalog.update.microsoft.com/Search.aspx?q=5040435" target="_blank" rel="noopener"&gt;July 2024 security update&lt;/A&gt; or use Azure Update Manager. This is needed for you to observe that September 2024 security update will not require a restart.&lt;/P&gt;
&lt;H3 style="margin-top: 36px; margin-bottom: 20px; font-family: 'Segoe UI', Segoe, Tahoma, Geneva, sans-serif; font-weight: 600; font-size: 19px; color: #333333; font-style: normal!important;"&gt;Connect the VM to Azure Arc&lt;/H3&gt;
&lt;P&gt;For step-by-step instructions on how connect your virtual machine to Azure Arc, see &lt;A href="https://learn.microsoft.com/azure/azure-arc/servers/learn/quick-enable-hybrid-vm#generate-installation-script" target="_blank" rel="noopener"&gt;Quickstart - Connect hybrid machine with Azure Arc-enabled servers&lt;/A&gt;. You will need to run the PowerShell script from the Azure Arc portal on your machine.&lt;/P&gt;
&lt;H3 style="margin-top: 36px; margin-bottom: 20px; font-family: 'Segoe UI', Segoe, Tahoma, Geneva, sans-serif; font-weight: 600; font-size: 19px; color: #333333; font-style: normal!important;"&gt;Enabling hotpatching&lt;/H3&gt;
&lt;P&gt;To enable Hotpatching, in the Azure Portal, select &lt;STRONG&gt;Azure Arc&lt;/STRONG&gt; from the Azure services tiles, then select &lt;STRONG&gt;Machines&lt;/STRONG&gt;.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&lt;BR /&gt;You will see the Azure Arc connected machine you set up earlier displayed in the list:&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;Selecting that machine will take you to the server management page. You will see Hotpatch (preview) card towards the bottom.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;Select the tile to activate a pop-out that will allow you to select Hotpatching. Tick the box and select &lt;STRONG&gt;Confirm&lt;/STRONG&gt;. Behind the scenes the Azure Arc connected server will be configured to receive Hotpatches.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It takes about 10 minutes for the operation to complete. If you refresh the page while the operation is going,the Hotpatch tile will show a status of &lt;STRONG&gt;Pending&lt;/STRONG&gt;. After enrollment is complete, the Hotpatch tile will show that the service is &lt;STRONG&gt;Enabled&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Note: If the Status is stuck on Pending, the Azure Arc agent has likely not yet been updated. To update Arc Agent, run the below command in PowerShell on the machine:&lt;BR /&gt;&lt;BR /&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;LI-CODE lang="powershell"&gt;[Net.ServicePointManager]::SecurityProtocol = [Net.ServicePointManager]::SecurityProtocol -bor 3072;
Invoke-WebRequest -UseBasicParsing -Uri "https://aka.ms/azcmagent-windows" -TimeoutSec 30 -OutFile "$env:TEMP\install_windows_azcmagent.ps1";
&amp;amp; "$env:TEMP\install_windows_azcmagent.ps1";&lt;/LI-CODE&gt;
&lt;P&gt;&lt;BR /&gt;The Azure Arc attached machine is now ready to receive Hotpatches!&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;img /&gt;
&lt;H3 style="margin-top: 36px; margin-bottom: 20px; font-family: 'Segoe UI', Segoe, Tahoma, Geneva, sans-serif; font-weight: 600; font-size: 19px; color: #333333; font-style: normal!important;"&gt;Scan and install the September 2024 Hotpatch&lt;/H3&gt;
&lt;P&gt;After completing the steps above, when you perform a &lt;STRONG&gt;Windows Update Scan&lt;/STRONG&gt;, you will be offered a Hotpatch&amp;nbsp;[see image below]. If you notice that you are not offered a Hotpatch, please pause the update and send us the update logs. To get update logs, run this command in PowerShell:&lt;/P&gt;
&lt;LI-CODE lang="powershell"&gt;Get-WindowsUpdateLog &lt;/LI-CODE&gt;
&lt;P&gt;&lt;BR /&gt;When the Hotpatch update for September has successfully completed, without requiring the machine to restart, you will see this in the Windows Update history&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;You can also use the Server Configuration tool (SConfig) to download and install the Hotpatch update if you are offered other updates that you are not interested in installing.&lt;/P&gt;
&lt;H3 style="margin-top: 36px; margin-bottom: 20px; font-family: 'Segoe UI', Segoe, Tahoma, Geneva, sans-serif; font-weight: 600; font-size: 19px; color: #333333; font-style: normal!important;"&gt;Scan and install the September 2024 Hotpatch using Azure Update Manager&lt;/H3&gt;
&lt;P&gt;Using Azure Update Manager, you can identify all machines that are eligible for hotpatch updates, and plan installation of those updates on a schedule. For hotpatch updates being non-intrusive on availability, you can create faster schedules and update your services immediately after release, with less planning to maintain reliability of your machines at scale.&lt;/P&gt;
&lt;P&gt;Here’s how to manage hotpatch updates using Azure Update Manager:&lt;/P&gt;
&lt;OL&gt;
&lt;LI style="line-height: 1.7; margin-bottom: 2px;"&gt;Verify that the Hotpatch subscription is available or has already been enabled from the &lt;STRONG&gt;Updates&lt;/STRONG&gt; tab of your Arc Server:&lt;BR /&gt;&lt;BR /&gt;&lt;img /&gt;Select &lt;STRONG&gt;change&lt;/STRONG&gt; next to Hotpatch to cancel or enable the Hotpatch subscription on demand.
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI style="line-height: 1.7; margin-bottom: 2px;"&gt;Scan and view the September 2024 security update offered to the machine by performing an &lt;A href="https://learn.microsoft.com/azure/update-manager/assessment-options" target="_blank" rel="noopener"&gt;assessment:&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI style="line-height: 1.7; margin-bottom: 2px;"&gt;Choose to include the September 2024 security update and when to install it on your&lt;BR /&gt;Arc server by creating a &lt;A href="https://learn.microsoft.com/azure/update-manager/scheduled-patching?tabs=schedule-updates-single-machine%2Cschedule-updates-scale-overview%2Cwindows-maintenance#schedule-recurring-updates-on-a-single-vm" target="_blank" rel="noopener"&gt;user-defined schedule&lt;/A&gt; or a &lt;A href="https://learn.microsoft.com/azure/update-manager/quickstart-on-demand#install-updates" target="_blank" rel="noopener"&gt;one-time update&lt;/A&gt;. You can install it immediately after it is available, allowing your machine to get secure faster.&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI style="line-height: 1.7; margin-bottom: 2px;"&gt;Verify whether the 9B update has been installed and the reboot status of the &lt;BR /&gt;machine by viewing &lt;A href="https://learn.microsoft.com/azure/update-manager/deploy-updates?tabs=install-single-overview%2Cinstall-scale-overview#view-update-history-for-a-single-vm" target="_blank" rel="noopener"&gt;history&lt;/A&gt;&lt;BR /&gt;&lt;img /&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;BR /&gt;By following the steps in this post, you have a streamlined way to plan for the installation of Hotpatches on your Arc machines.&lt;/P&gt;
&lt;H2 style="margin-top: 36px; margin-bottom: 20px; font-family: 'Segoe UI', Segoe, Tahoma, Geneva, sans-serif; font-weight: 600; font-size: 22px; color: #333333;"&gt;Hotpatch preview: frequently asked questions&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;Are there any prerequisites for subscribing to Hotpatching?&lt;/STRONG&gt;&lt;BR /&gt;There are some prerequisites:&lt;/P&gt;
&lt;OL&gt;
&lt;LI style="line-height: 1.7; margin-bottom: 2px;"&gt;Windows Server 2025 Datacenter evaluation&lt;/LI&gt;
&lt;LI style="line-height: 1.7; margin-bottom: 2px;"&gt;Virtualization Based Security should be enabled and running on your machine&lt;/LI&gt;
&lt;LI style="line-height: 1.7; margin-bottom: 2px;"&gt;July &lt;A href="https://www.catalog.update.microsoft.com/Search.aspx?q=5040435" target="_blank" rel="noopener"&gt;Security update&lt;/A&gt; installed&lt;/LI&gt;
&lt;LI style="line-height: 1.7; margin-bottom: 2px;"&gt;Machines should be Azure Arc connected&lt;/LI&gt;
&lt;/OL&gt;</description>
      <pubDate>Tue, 19 Nov 2024 06:37:15 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-server-news-and-best/how-to-preview-azure-arc-connected-hotpatching-for-windows/ba-p/4246895</guid>
      <dc:creator>VishalBajaj</dc:creator>
      <dc:date>2024-11-19T06:37:15Z</dc:date>
    </item>
    <item>
      <title>Hotpatching is now available in preview on Windows Server 2025 Evaluation VMs in Azure</title>
      <link>https://techcommunity.microsoft.com/t5/windows-server-news-and-best/hotpatching-is-now-available-in-preview-on-windows-server-2025/ba-p/4203451</link>
      <description>&lt;P&gt;We’re excited to announce the preview of Hotpatch on Windows Server 2025 Evaluation VMs running in Azure. This preview provides the same great &lt;A href="https://techcommunity.microsoft.com/t5/windows-server-news-and-best/hotpatching-is-now-available-for-windows-server-vms-on-azure/ba-p/3875003" target="_blank" rel="noopener"&gt;experience&lt;/A&gt; of Hotpatching as on Windows Server 2022 Azure Edition. Hotpatching in Azure is only supported on Azure Edition SKUs. Evaluation version is made available for you to validate the capability and ensure readiness. &amp;nbsp;When this is made generally available Azure Edition will be the only supported SKU in Azure for Hotpatching.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Get started today by &lt;A href="https://ms.portal.azure.com/#create/microsoftwindowsserver.microsoftserveroperatingsystems-previewswindows-server-2025-azure-edition-hotpatch" target="_blank" rel="noopener"&gt;creating a VM&lt;/A&gt; in the preview offer.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hotpatches are monthly Windows OS security updates that update in-memory processes without requiring server reboots. For information on how Hotpatches work, read &lt;A href="https://learn.microsoft.com/en-us/windows-server/get-started/hotpatch" target="_blank" rel="noopener"&gt;this&lt;/A&gt;. If you’re already familiar with this feature that was first released three years ago, here are the steps to start previewing:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Steps to create a preview VM&lt;/H2&gt;
&lt;TABLE width="623px"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="151.858px"&gt;
&lt;P&gt;&lt;STRONG&gt;Step&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="470.017px"&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;Instructions&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="151.858px"&gt;
&lt;P&gt;Create VM using Windows Server 2025 Preview image published to Azure Marketplace&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="470.017px"&gt;
&lt;P&gt;Create VM using the “Windows Server 2025 Preview” image from &lt;A href="https://ms.portal.azure.com/#view/Microsoft_Azure_Marketplace/GalleryItemDetailsBladeNopdl/id/microsoftwindowsserver.microsoftserveroperatingsystems-previews/resourceGroupId//resourceGroupLocation//dontDiscardJourney~/false/_provisioningContext~/%7B%22initialValues%22%3A%7B%22subscriptionIds%22%3A%5B%222a9514a6-afa4-43bf-9bfa-189261a8ce80%22%2C%221af25ae0-544d-47e1-a06a-fa29a8a55cbd%22%2C%222ce42d82-a007-476a-89c3-11cab18be62d%22%2C%22b41677d3-296e-44a3-8d82-0536d36d4310%22%5D%2C%22resourceGroupNames%22%3A%5B%5D%2C%22locationNames%22%3A%5B%22westus2%22%2C%22eastus%22%2C%22westeurope%22%2C%22westcentralus%22%2C%22westus%22%5D%7D%2C%22telemetryId%22%3A%221349b54b-d41d-4fb0-813b-0d1aa4bd300f%22%2C%22marketplaceItem%22%3A%7B%22categoryIds%22%3A%5B%5D%2C%22id%22%3A%22Microsoft.Portal%22%2C%22itemDisplayName%22%3A%22NoMarketplace%22%2C%22products%22%3A%5B%5D%2C%22version%22%3A%22%22%2C%22productsWithNoPricing%22%3A%5B%5D%2C%22publisherDisplayName%22%3A%22Microsoft.Portal%22%2C%22deploymentName%22%3A%22NoMarketplace%22%2C%22launchingContext%22%3A%7B%22telemetryId%22%3A%221349b54b-d41d-4fb0-813b-0d1aa4bd300f%22%2C%22source%22%3A%5B%5D%2C%22galleryItemId%22%3A%22%22%7D%2C%22deploymentTemplateFileUris%22%3A%7B%7D%2C%22uiMetadata%22%3Anull%7D%7D" target="_blank" rel="noopener"&gt;Microsoft Server Operating Systems Preview - Microsoft Azure&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Image has Hotpatch enabled by default.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="151.858px"&gt;
&lt;P&gt;Verify Virtualization Based Security is running&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="470.017px"&gt;
&lt;P&gt;&lt;SPAN&gt;Ensure VBS is running by going to System Info&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="151.858px"&gt;
&lt;P&gt;Hotpatching enablement&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="470.017px"&gt;
&lt;P&gt;Image has Hotpatching enabled by default, unless it was disabled at provision time.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Hotpatch Preview FAQ&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;Do I have to sign up or fill in a form to participate?&lt;/H4&gt;
&lt;P&gt;No forms to fill. This is a public preview and open to all Azure IaaS users.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;What to expect from the preview?&lt;/H4&gt;
&lt;P&gt;After you create a VM using the preview image, the VM will be offered upon release August and September security updates. These OS updates will not require your machines to reboot.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;What is expected from users participating in this preview?&lt;/H4&gt;
&lt;P&gt;Report any errors you see and optionally provide feedback by sending us an &lt;A href="mailto:hotpatchfeedback@microsoft.com?subject=Feedback%20-%20Preview%20Hotpatching%20on%20Windows%20Server%202025%20in%20Azure" target="_blank" rel="noopener"&gt;email&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;Will we be able to run this in production?&lt;/H4&gt;
&lt;P&gt;The VMs created during preview can only be used for testing and validation purposes. Production workloads should not be run on them.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;What happens post public preview?&lt;/H4&gt;
&lt;P&gt;When the capability launches, Hotpatching will no longer be supported on these preview images. At GA Hotpatching will only be supported on Windows Server 2025 Azure Edition SKUs besides the current Windows Server 2022 Azure Edition.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;Why does my Hotpatch status show as “Pending Evaluation” or “Unknown”?&lt;/H4&gt;
&lt;P&gt;After VM creation, the Azure Portal may show “pending evaluation” or “unknown” status for few days. Once an assessment is completed on the VM, the status will update to reflect the Hotpatch update compatibility.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Useful links:&lt;/H2&gt;
&lt;P&gt;&lt;A href="https://learn.microsoft.com/en-us/windows-server/get-started/hotpatch" target="_blank" rel="noopener"&gt;Hotpatch for Windows Server Azure Edition | Microsoft Learn&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://ignite.microsoft.com/en-US/sessions/f3901190-1154-45e3-9726-d2498c26c2c9?source=sessions" target="_blank" rel="noopener"&gt;What’s New in Windows Server v.Next (microsoft.com)&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://techcommunity.microsoft.com/t5/windows-server-news-and-best/hotpatching-is-now-available-for-windows-server-vms-on-azure/ba-p/3875003" target="_blank" rel="noopener"&gt;Hotpatching is now available for Windows Server VMs on Azure with Desktop Experience! - Microsoft Community Hub&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 31 Jul 2024 16:00:00 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-server-news-and-best/hotpatching-is-now-available-in-preview-on-windows-server-2025/ba-p/4203451</guid>
      <dc:creator>VishalBajaj</dc:creator>
      <dc:date>2024-07-31T16:00:00Z</dc:date>
    </item>
    <item>
      <title>Windows Server 2025 Secured-core Server</title>
      <link>https://techcommunity.microsoft.com/t5/windows-server-news-and-best/windows-server-2025-secured-core-server/ba-p/4200583</link>
      <description>&lt;P&gt;The server threat landscape is constantly evolving with cybercriminals becoming more ambitious and sophisticated in their attacks, and the damage is becoming more costly to those targeted. In April 2022, the ransomware group Conti carried out &lt;A href="https://www.wired.com/story/costa-rica-ransomware-conti/" target="_blank" rel="noopener"&gt;two massive ransomware attacks&lt;/A&gt; that breached the Costa Rican government and affected nearly 30 different ministries and different essential services within the country. This attack was so disruptive that the President of Costa Rica had to declare a state of National Emergency, the first ever such instance in response to a cyberattack. In different incidents, &lt;A href="https://shields.com/notice-of-data-security-incident/" target="_blank" rel="noopener"&gt;Shields Health Care Group had a data breach&lt;/A&gt; where nearly 2 million patient records were stolen by attackers, and Medibank Private Ltd., one of the largest health insurance providers in Australia had &lt;A href="https://www.reuters.com/business/healthcare-pharmaceuticals/medibank-says-hacker-accessed-data-97-mln-customers-refuses-pay-ransom-2022-11-06/" target="_blank" rel="noopener"&gt;data pertaining to 9.7 million customers stolen&lt;/A&gt;. In the latter case, the attackers threatened to release the customer data on the dark web unless a ransom was paid.&lt;/P&gt;
&lt;P style="margin-top: 20px;"&gt;Servers are the backbone of modern businesses, and they store and process vast amounts of sensitive data. As a result, server security is critical to protect against cyberattacks that can cause financial losses, reputational damage, and legal liabilities. In 2021, Microsoft announced the launch of &lt;A href="https://www.microsoft.com/en-us/security/blog/2021/12/07/new-secured-core-servers-are-now-available-from-the-microsoft-ecosystem-to-help-secure-your-infrastructure/" target="_blank" rel="noopener"&gt;Secured-core servers&lt;/A&gt; in partnership with our silicon partners and original equipment manufacturers (OEMs). These servers offer some of the most advanced hardware-based security capabilities that make it harder for adversaries to carry out cyberattacks. In this post, we will provide an example of how the upcoming Windows Server 2025 Secured-core servers seamlessly integrate with the broader suite of Microsoft's security offerings to not just identify but also help block real world attacks.&lt;/P&gt;
&lt;H2 style="margin-top: 36px; margin-bottom: 20px; font-family: 'Segoe UI', Segoe, Tahoma, Geneva, sans-serif; font-weight: 600; font-size: 22px; color: #333333;"&gt;Bring Your Own Vulnerable Drivers (BYOVD) attack technique&lt;/H2&gt;
&lt;P style="margin-top: 20px;"&gt;There is an entire class of attacks that rely on an attack technique known as "&lt;A href="https://attack.mitre.org/techniques/T1068/" target="_self"&gt;Bring Your Own Vulnerable Driver&lt;/A&gt;" (BYOVD). In these attacks, a malicious adversary with administrative privileges installs a legitimately signed driver with a vulnerability in it on the target system. These drivers have direct access to the internals of the operating system. This vulnerability is then exploited to provide the attacker with the highest level of privileges on the system, which is then used to disable security processes running on the system. We'll now take a couple of vulnerable drivers that have been used in attacks in the past.&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;kprocesshacker.sys&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P style="margin-top: 20px;"&gt;Process Hacker is a free and open-source malware analysis tool that is used for debugging, malware detection and system monitoring. Process Hacker was used by a ransomware known as &lt;A href="https://www.microsoft.com/en-us/security/blog/2020/03/05/human-operated-ransomware-attacks-a-preventable-disaster/" target="_blank" rel="noopener"&gt;DoppelPaymer&lt;/A&gt;, which had several high-profile targets such as Foxconn, Kia and Boyce Technologies. DoppelPaymer hijacks ProcessHacker to terminate a list of processes such as those responsible for security, e-mail server, backup and database software to impair defenses. It drops the ProcessHacker executable, its driver and a malicious stager DLL into a subdirectory of %APPDATA%. The driver, known as &lt;EM&gt;kprocesshacker.sys&lt;/EM&gt;, allows it to communicate with the kernel and is used to load the stager DLL via DLL Search Order Hijacking and subsequently, upon receiving a trigger, terminate processes running in the kernel.&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;asWarPot.sys&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P style="margin-top: 20px;"&gt;&lt;A href="https://www.trendmicro.com/en_us/research/22/e/avoslocker-ransomware-variant-abuses-driver-file-to-disable-anti-Virus-scans-log4shell.html" target="_blank" rel="noopener"&gt;AvosLocker&lt;/A&gt; is a ransomware group that has targeted victims across multiple critical infrastructure sectors in the United States such as financial services and government facilities sectors. Certain samples of the AvosLocker Ransomware used a legitimate but vulnerable Avast Anti-Rootkit driver known as &lt;EM&gt;asWarPot.sys &lt;/EM&gt;to disable endpoint protection agents and security features on the targeted systems.&lt;/P&gt;
&lt;H2 style="margin-top: 36px; margin-bottom: 20px; font-family: 'Segoe UI', Segoe, Tahoma, Geneva, sans-serif; font-weight: 600; font-size: 22px; color: #333333;"&gt;Secured-core servers and Microsoft Defender for Cloud in action to help protect against modern threats&lt;/H2&gt;
&lt;P style="margin-top: 20px;"&gt;Configuring your on-premises servers for hybrid cloud security is made simple with Windows Server 2025. Using the Azure Arc installer wizard included in Windows Server 2025, then onboarding with &lt;A href="https://learn.microsoft.com/azure/defender-for-cloud/defender-for-cloud-introduction" target="_blank" rel="noopener"&gt;Microsoft Defender for Cloud&lt;/A&gt; will add cloud-based protections to Secured-core servers such as continuous assessment, built-in benchmarks, security recommendations, threat protection capabilities and remediation guidance in case threats have been detected. Here we will discuss how each layer of security works to help protect against threats.&lt;/P&gt;
&lt;H3 style="margin-top: 36px; margin-bottom: 20px; font-family: 'Segoe UI', Segoe, Tahoma, Geneva, sans-serif; font-weight: 600; font-size: 19px; color: #333333; font-style: normal!important;"&gt;Defense against kprocesshacker.sys using Secured-core servers&lt;/H3&gt;
&lt;P style="margin-top: 20px;"&gt;Secured-core servers offer a hardware-based security feature known as Hypervisor-protected code integrity (HVCI). HVCI uses Virtualization-based Security (VBS) to run kernel mode code integrity inside a secure, isolated environment instead of the main Windows kernel. HVCI contains a code integrity security policy that contains a list of vulnerable drivers that are not allowed to load on the system. As a result, when &lt;EM&gt;kprocesshacker.sys&lt;/EM&gt; tries to load on the system, it is blocked from loading by HVCI, and an analysis of the event logs in the Windows Admin Center shows that the code integrity policy prevented the driver from loading, as this driver was present in the blocklist. This demonstrates how properly configured Secured-core servers can proactively help detect and block threats present on the system.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P style="margin-top: 20px;"&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P style="margin-top: 20px;"&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P style="margin-top: 20px;"&gt;This can also be viewed in the "Advanced hunting" tab within the Microsoft Defender portal, which allows users to explore up to 30 days of events to locate potential threats.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P style="margin-top: 20px;"&gt;&lt;img /&gt;&lt;/P&gt;
&lt;H3 style="margin-top: 36px; margin-bottom: 20px; font-family: 'Segoe UI', Segoe, Tahoma, Geneva, sans-serif; font-weight: 600; font-size: 19px; color: #333333; font-style: normal!important;"&gt;Defense against asWarPot.sys using Microsoft Defender for Cloud&lt;/H3&gt;
&lt;P style="margin-top: 20px;"&gt;Microsoft Defender for Cloud constantly keeps monitoring your workloads and clusters for active threats on your servers. When the &lt;EM&gt;asWarPot.sys &lt;/EM&gt; on the system, Defender for Cloud blocks the action from taking place. At the same time, based on the communication preferences set forth by the IT admins, an alert is fired indicating that some suspicious activity was taking place in their environments, and that a threat was detected and blocked.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P style="margin-top: 20px;"&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P style="margin-top: 20px;"&gt;IT admins can log into the Azure Portal and view the security alerts that fired in their server environment, and drill deeper into the specifics of the malware that tried to execute on their systems.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P style="margin-top: 20px;"&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P style="margin-top: 20px;"&gt;Security response teams within enterprises might be interested in understanding the exact attack chain associated with the malware to set guardrails to prevent similar attacks in the future. When your servers have been onboarded with Defender for Cloud, a Microsoft Defender for Endpoint agent is also installed. The presence of the Defender for Endpoint agents on these machines allows security response teams to dig deeper into the sequence of events that took place leading up to when the malicious event occurred.&lt;BR /&gt;&lt;BR /&gt;Admins can go the Microsoft Defender portal to view the details associated with the attack, and drill down into exactly what events led to the malicious &lt;EM&gt;asWarPot.sys&lt;/EM&gt; driver attempting to load on the system.&lt;/P&gt;
&lt;P style="margin-top: 20px;"&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P style="margin-top: 20px;"&gt;&lt;img /&gt;&lt;/P&gt;
&lt;H2 style="margin-top: 36px; margin-bottom: 20px; font-family: 'Segoe UI', Segoe, Tahoma, Geneva, sans-serif; font-weight: 600; font-size: 22px; color: #333333;"&gt;Protect your on-premises workload with Secured-core servers&lt;/H2&gt;
&lt;P style="margin-top: 20px;"&gt;At the end of the day, your workload is only as secure as the foundation it is built on, and Secured-core servers provide a strong and secure foundation to help protect your on-prem infrastructure. It seamlessly integrates with the broader suite of security offerings such as Defender for Cloud to offer even more powerful capabilities such as threat detection, alerting and remediation capabilities.&lt;/P&gt;
&lt;P style="margin-top: 20px;"&gt;Since its launch in 2021, we have observed a consistent rise in the adoption of Secured-core servers. In 2022, we have established Secured-core as a prerequisite for all new Azure Stack HCI, version 22H2 solutions built on Gen 3 or newer server-grade silicon platforms. We are also excited to announce that leading manufacturers such as Dell Technologies, HPE, and Lenovo have committed to supporting Secured-core server across all their products based on Gen 3 or newer server-grade silicon platforms for Windows Server 2022 and Windows Server 2025.&lt;/P&gt;
&lt;P style="margin-top: 20px;"&gt;Visit the &lt;A href="https://www.windowsservercatalog.com/results.aspx?&amp;amp;bCatID=1333&amp;amp;cpID=0&amp;amp;avc=132&amp;amp;ava=0&amp;amp;avt=0&amp;amp;avq=140&amp;amp;OR=1&amp;amp;PGS=25" target="_blank" rel="noopener"&gt;Windows Server catalog&lt;/A&gt; or &lt;A href="https://hcicatalog.azurewebsites.net/#/catalog?ProductOptimizedFor=Secured+core+Server" target="_blank" rel="noopener"&gt;Azure Stack HCI catalog&lt;/A&gt; to find out the latest servers and solutions from the breadth of industry leading partners supporting Secured-core server.&lt;/P&gt;
&lt;H2 style="margin-top: 36px; margin-bottom: 20px; font-family: 'Segoe UI', Segoe, Tahoma, Geneva, sans-serif; font-weight: 600; font-size: 22px; color: #333333;"&gt;&lt;STRONG&gt;Additional resources&lt;BR /&gt;&lt;/STRONG&gt;&lt;/H2&gt;
&lt;UL&gt;
&lt;LI style="margin-bottom: 8px; margin-top: 20px;"&gt;&lt;A href="https://learn.microsoft.com/en-us/windows-server/security/secured-core-server" target="_blank" rel="noopener"&gt;What is Secured-core server for Windows Server&lt;/A&gt;&lt;/LI&gt;
&lt;LI style="margin-bottom: 8px;"&gt;&lt;A href="https://techcommunity.microsoft.com/t5/security-compliance-and-identity/protect-your-infrastructure-with-secured-core-server/ba-p/2176002" target="_blank" rel="noopener"&gt;Protect your infrastructure with Secured-core server&lt;/A&gt;&lt;/LI&gt;
&lt;LI style="margin-bottom: 8px;"&gt;&lt;A href="https://www.microsoft.com/en-us/security/blog/2021/03/02/microsoft-brings-advanced-hardware-security-to-server-and-edge-with-secured-core/" target="_blank" rel="noopener"&gt;Microsoft brings advanced hardware security to Server and Edge with Secured-core&lt;/A&gt;&lt;/LI&gt;
&lt;LI style="margin-bottom: 8px;"&gt;&lt;A href="https://www.microsoft.com/en-us/evalcenter/evaluate-windows-server-2025" target="_blank" rel="noopener"&gt;Try Windows Server 2025 now in preview&lt;/A&gt;&lt;/LI&gt;
&lt;LI style="margin-bottom: 8px;"&gt;&lt;A href="https://www.microsoft.com/en-us/windows-server/blog/2024/05/29/gain-enhanced-security-and-performance-with-windows-server-2025/" target="_blank" rel="noopener"&gt;Learn about the upcoming Windows Server 2025&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Tue, 30 Jul 2024 16:00:00 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-server-news-and-best/windows-server-2025-secured-core-server/ba-p/4200583</guid>
      <dc:creator>RoySasabe</dc:creator>
      <dc:date>2024-07-30T16:00:00Z</dc:date>
    </item>
    <item>
      <title>Happening now: Windows Server Summit!</title>
      <link>https://techcommunity.microsoft.com/t5/windows-server-news-and-best/happening-now-windows-server-summit/ba-p/4096989</link>
      <description>&lt;P&gt;Windows Server Summit sponsored by Intel is happening now -- starting at 8 am Pacific Time today and going through Thursday afternoon. You can check out the schedule directly and join the sessions&amp;nbsp;&lt;A href="https://techcommunity.microsoft.com/t5/tech-community-live/windows-server-summit-2024/ec-p/4068971?WT.mc_id=modinfra-117911-pierrer#M24" target="_self"&gt;here&lt;/A&gt;. However, if you want to get a post event email with links to some of the presentations and other resources, you'll also want to complete this &lt;A href="https://www.windowsserversummit2024.com/" target="_self"&gt;registration form&lt;/A&gt;.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Sign in to your Tech Community account to post questions during the sessions.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 26 Mar 2024 14:54:14 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-server-news-and-best/happening-now-windows-server-summit/ba-p/4096989</guid>
      <dc:creator>Janine-Patrick</dc:creator>
      <dc:date>2024-03-26T14:54:14Z</dc:date>
    </item>
    <item>
      <title>The Future of Windows Server Hyper-V is Bright!</title>
      <link>https://techcommunity.microsoft.com/t5/windows-server-news-and-best/the-future-of-windows-server-hyper-v-is-bright/ba-p/4074940</link>
      <description>&lt;P&gt;Greetings folks!&lt;BR /&gt;There have been several recent changes in the virtualization market, so this month, I wanted to take a moment to respond to the flood of questions we are receiving about Hyper-V futures, Windows Server 2025, and more. I surmise this blog will garner questions in the comments section, so I plan to answer those questions in the next blog. Let’s get started beginning with Hyper-V itself.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://learn.microsoft.com/en-us/windows-server/virtualization/hyper-v/hyper-v-technology-overview" target="_self"&gt;Hyper-V&lt;/A&gt; is Microsoft's hardware virtualization product. It lets you create and run a software version of a computer, called a virtual machine (VM). Each virtual machine acts like a complete computer, running an operating system and programs. When you need computing resources, virtual machines give you more flexibility, help save time and money, and are a more efficient way to use hardware than just running one operating system on physical hardware. This quick description is just the beginning of what Hyper-V delivers…&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Hyper-V is a strategic technology at Microsoft.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Please reread that last sentence. When I say strategic technology, I say this because Hyper-V is used &lt;EM&gt;&lt;STRONG&gt;throughout Microsoft&lt;/STRONG&gt;&lt;/EM&gt; in:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/security/fundamentals/hypervisor" target="_self"&gt;Azure&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/windows-server/virtualization/hyper-v/hyper-v-technology-overview" target="_self"&gt;Windows Server&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/azure-stack/hci/overview" target="_self"&gt;Azure Stack HCI&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/virtualization/hyper-v-on-windows/about/" target="_self"&gt;Windows client&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Xbox&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;If you are using Windows Server, you already have Hyper-V. There is no additional charge, it’s built-in, just like it has been for over 15 years. The difference between Hyper-V in Windows Server Standard and Datacenter is the number of Windows Server guest OS instances that are included:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;With Windows Server Standard, you are licensed to run two instances of Windows Server guests OS environments.&lt;/LI&gt;
&lt;LI&gt;With Windows Server Datacenter, you are licensed to run unlimited copies of Windows Server guest OS environments.&lt;/LI&gt;
&lt;LI&gt;If you are running Linux as a guest OS, just make sure you are licensed by your distributor, and you can run as many Linux guests as you’d like run on either Windows Server Standard or Datacenter.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;In terms of &lt;A href="https://learn.microsoft.com/en-us/windows-server/virtualization/hyper-v/supported-linux-and-freebsd-virtual-machines-for-hyper-v-on-windows" target="_self"&gt;Linux guest OS support&lt;/A&gt;, Hyper-V supports &lt;A href="https://learn.microsoft.com/en-us/windows-server/virtualization/hyper-v/supported-centos-and-red-hat-enterprise-linux-virtual-machines-on-hyper-v" target="_self"&gt;Red Hat Enterprise Linux, CentOS&lt;/A&gt;, &lt;A href="https://learn.microsoft.com/en-us/windows-server/virtualization/hyper-v/supported-debian-virtual-machines-on-hyper-v" target="_self"&gt;Debian&lt;/A&gt;, &lt;A href="https://learn.microsoft.com/en-us/windows-server/virtualization/hyper-v/supported-oracle-linux-virtual-machines-on-hyper-v" target="_self"&gt;Oracle Linux&lt;/A&gt;, &lt;A href="https://learn.microsoft.com/en-us/windows-server/virtualization/hyper-v/supported-suse-virtual-machines-on-hyper-v" target="_self"&gt;SUSE&lt;/A&gt;, and &lt;A href="https://learn.microsoft.com/en-us/windows-server/virtualization/hyper-v/supported-ubuntu-virtual-machines-on-hyper-v" target="_self"&gt;Ubuntu&lt;/A&gt;. Linux integration services are included in the Linux kernel and updated for new releases. Hyper-V also supports &lt;A href="https://learn.microsoft.com/en-us/windows-server/virtualization/hyper-v/supported-freebsd-virtual-machines-on-hyper-v" target="_self"&gt;FreeBSD&lt;/A&gt; with FreeBSD Integration Services built into FreeBSD 10.0 and later.&lt;/P&gt;
&lt;P&gt;The unlimited use rights of Windows Server Datacenter coupled with the complete package of Hyper-V, Software-defined storage (Storage Spaces Direct) and Software-defined networking (SDN) deliver the best bang for your buck, making it extremely popular. Considering the power and scale of modern compute and storage (Local, SAN, File, Hyperconverged), Windows Server Datacenter is great for virtualization hosts.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Hyper-V is used for more than just virtualization&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://learn.microsoft.com/en-us/windows-hardware/design/device-experiences/oem-vbs" target="_self"&gt;Hyper-V is used for platform security. Virtualization-based security, or VBS&lt;/A&gt;, uses hardware virtualization and the hypervisor to create an isolated virtual environment that becomes the root of trust of the OS that assumes the kernel can be compromised. Windows uses this isolated environment to host several security solutions, providing them with increased protection from vulnerabilities and preventing the use of malicious exploits which attempt to defeat protections. VBS enforces restrictions to protect vital system and operating system resources, or to protect security assets such as authenticated user credentials.&lt;/P&gt;
&lt;P&gt;Hyper-V is used for &lt;A href="https://learn.microsoft.com/en-us/virtualization/windowscontainers/manage-containers/hyperv-container" target="_self"&gt;containers&lt;/A&gt;. Hyper-V isolation for containers offers enhanced security and broader compatibility between host and container versions. With Hyper-V isolation, multiple container instances run concurrently on a host; however, each container runs inside of a highly optimized virtual machine and effectively gets its own kernel. The presence of the virtual machine provides hardware-level isolation between each container as well as the container host.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Hyper-V in Azure&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Below is a screen shot of a virtual machine in Azure. Take a close look. This single VM supports up to 1,792 Virtual Processors and 29.7 Terabytes of RAM. I apologize that this VM only has 29.7 Terabytes of RAM (we support up to 48 TB of RAM), but those machines are busy running some of the largest workloads on the planet.&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;Because Hyper-V is used throughout Microsoft and in Azure, you reap the benefits of innovation we deliver in Azure that percolates through the other products. For example, today in Azure we have a wide range of VM offerings from small to gargantuan with a wide range of CPU, memory, networking, storage options and GPUs. &lt;A href="https://learn.microsoft.com/en-us/azure/virtual-machines/sizes-gpu" target="_blank" rel="noopener"&gt;Azure VMs with GPUs&lt;/A&gt; are available with single or fractional GPUs and designed for compute intensive, graphics intensive and visualization workloads from &lt;A href="https://learn.microsoft.com/en-us/azure/virtual-desktop/enable-gpu-acceleration" target="_blank" rel="noopener"&gt;Virtual Desktops&lt;/A&gt; to &lt;A href="https://azure.microsoft.com/en-us/solutions/ai/?ef_id=_k_ac3a69c0145e149a08fb0c1f7949f6a4_k_&amp;amp;OCID=AIDcmm5edswduu_SEM__k_ac3a69c0145e149a08fb0c1f7949f6a4_k_&amp;amp;msclkid=ac3a69c0145e149a08fb0c1f7949f6a4#overview/" target="_blank" rel="noopener"&gt;AI&lt;/A&gt;. To enable these VM offerings in Azure with GPUs required changes to Hyper-V. Guess what is coming in Windows Server 2025?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Windows Server 2025 is introducing GPU partitioning (GPU-P)&lt;/STRONG&gt; to enable scenarios on-premises or at the edge. You will be able to partition GPUs and assign them to VMs while retaining high availability and live migration. GPU-P is so flexible that you can live migrate VMs with partitioned GPUs between two standalone servers. No cluster required and great for test/dev!&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Windows Server 2025 is introducing Workgroup Clusters&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Speaking of no cluster required, we are making significant changes to make Hyper-V deployments at the edge &lt;EM&gt;easier&lt;/EM&gt;. One thing we are hearing from you is that due to the power of modern servers, it is easier than ever to deploy small footprints at the edge. Today, you can purchase two and three node clusters that are small enough to fit in the overhead compartment of an airplane. Up to Windows Server 2022, deploying a cluster requires Active Directory. While this is not an issue in the datacenter, this adds complexity at the edge. With Windows Server 2025, we are introducing the ability to deploy “Workgroup Clusters.” Workgroup clusters do not require AD and are a certificate-based solution!&lt;/P&gt;
&lt;P&gt;Windows Server 2025 is chock full of innovation, and GPU-P and workgroup clusters are just the beginning. If you would like to learn more about Windows Server 2025 with demos, check out this Ignite Session, “&lt;A href="https://ignite.microsoft.com/en-US/sessions/f3901190-1154-45e3-9726-d2498c26c2c9?source=sessions" target="_blank" rel="noopener"&gt;What’s New In Windows Server vNext (2025)&lt;/A&gt;.”&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Windows Server 2025 Insider Preview: Now with Flighting!&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;If you want to start evaluating Windows Server 2025, there is no better time than right now and we’re making it easier than ever with &lt;A href="https://techcommunity.microsoft.com/t5/windows-server-news-and-best/welcome-to-windows-insider-flighting-on-windows-server/ba-p/4040284" target="_blank" rel="noopener"&gt;Windows Server flighting&lt;/A&gt;! If you have a recent &lt;A href="https://learn.microsoft.com/en-us/windows-server/get-started/get-started-with-windows-server-insiders-preview#where-to-get-windows-server-insiders-preview" target="_blank" rel="noopener"&gt;Windows Server insider&lt;/A&gt; build installed, you can now go to Windows Update in Settings, and check for updates. This will provide an update to a newer build, as a Feature update (also known as “in place OS upgrade”). That’s it! The process is easy and has proven well for hundreds of thousands of Windows 10 and Windows 11 insiders over the years.&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Windows Server 2025 Hyper-V&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;As I stated earlier, &lt;EM&gt;Hyper-V is a strategic technology at Microsoft&lt;/EM&gt; used throughout our products. Since the first release of Hyper-V in Windows Server 2008, we never stopped innovating Hyper-V and there are no plans to stop. &lt;img class="lia-deferred-image lia-image-emoji" src="https://techcommunity.microsoft.com/t5/s/html/@CA22154A147B1DAF74C322D7A94CB893/images/emoticons/smile_40x40.gif" alt=":smile:" title=":smile:" /&gt; In the next blog, I will be answering your questions, and we will see where that takes us!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;One more thing: Windows Server Engineering Summit 2024&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;I’m pleased to announce the Windows Server Engineering Summit 2024. This year, we bring you &lt;STRONG&gt;&lt;EM&gt;three days of demos, technical sessions, and Q&amp;amp;A, led by Microsoft engineers, guest experts from Intel, and our MVP community&lt;/EM&gt;&lt;/STRONG&gt;. &lt;A href="https://aka.ms/WindowsServerSummit2024" target="_blank" rel="noopener"&gt;RSVP now to learn:&lt;/A&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;What’s coming next in Windows Server 2025&lt;/LI&gt;
&lt;LI&gt;Get best practices for security and identity&lt;/LI&gt;
&lt;LI&gt;Tips for cloud migration and hybrid cloud management&lt;/LI&gt;
&lt;LI&gt;Cover new technologies and capabilities&lt;/LI&gt;
&lt;LI&gt;Hybrid cloud with Azure Arc&lt;/LI&gt;
&lt;LI&gt;Security and hardening, (everyone's favorite)&lt;/LI&gt;
&lt;LI&gt;Migration, and much more&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;We'll also offer live Q&amp;amp;A during all the sessions so watch, learn, and post your questions early and often!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Cheers,&lt;/P&gt;
&lt;P&gt;Jeff Woolsey&lt;/P&gt;
&lt;P&gt;Microsoft&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 04 Mar 2024 15:07:54 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-server-news-and-best/the-future-of-windows-server-hyper-v-is-bright/ba-p/4074940</guid>
      <dc:creator>Jeff-Woolsey</dc:creator>
      <dc:date>2024-03-04T15:07:54Z</dc:date>
    </item>
  </channel>
</rss>

