2022
9 Topicswinpty error accessing powershell tab
WAC Ver: 2.4.1 running on Windows Server 2022 I can access and perform all other WAC functions on the remote connected server (Win 2022) but when I try to access the powershell tab and click 'connect' I am met with a "Session End: click 'Connect' to reconnect." error. Clicking 'Connect' just cycles the same error. The windows event log error is as follows: Category: Microsoft.WindowsAdminCenter.Common.ServiceLog EventId: 414 SpanId: d138bcb891359bec TraceId: f373ad4711a131524c5c01e8b6a2e591 ParentId: bb6d22e32ab6da73 ConnectionId: 0HND3HPV5LDCV RequestId: 0HND3HPV5LDCV:00000001 RequestPath: /api/PseudoConsole/nodes/fakeservername.com/powershellconsole ActionId: b3f1dbd0-b87e-49e5-a13d-ba66e8d18af1 ActionName: Microsoft.WindowsAdminCenter.Controllers.PseudoConsole.PseudoConsoleController.PowerShellConsole (Microsoft.WindowsAdminCenter.Controllers.PseudoConsole) Failed to open winpty (8), Columns=194, Rows=44 The internal windows firewall is turned off completely, and outside of WAC, initiating a "Enter-PSSession -ComputerName" command in powershell verison 7.5.1 works fine, I can run commands on the remote server from there. Any ideas?57Views0likes0CommentsSSAS 2022 Connections fail following restart
I'm using an application which has SSAS 2022 OLAP cubes at the back end. We are having an issue that whenever we restart the server or the service, the connections to the SQL Server that is the data source break. I suspect this is a consequence of SSAS CU1 behaviour where the connection string is encrypted, but - because they get encrypted - there's no way to identify what the change is. SSAS is on the same instance as the SQL Server. Before a restart, i've tried adjusting a few connection properties, notably Impersonation set to Service Account Trust Server Certifcate to True Encryption for data to Optional The connection works fine with these settings. However, post reboot I get a connection error whenver I try toprocess any objects: Errors in the back-end database access module. No provider was specified for the data source. We are using MSOLEDB19 so should be fine, but it seems that post reboot the encrypted connection is somehow misconfiguring. Appreciate any guidance on what could be happening here? I can't avoid restarting the server as org policy demands servers are rebooted every fortnight.108Views0likes0CommentsHLK for Windows server 2022 issues
Hi All We are runnig HLK certification for windows server 2022 with our storage array, all the cases passed except two: DF - Sleep and PNP(disable and enable)with IO Before and After with Driver Verifier Isolation rules enabled(Reliability) DF - Sleep and PNP(disable and enable)with IO Before and After with Driver Verifier Isolation rules enabled(Development and Integration) We notice they‘re new cases in HLK 2022, when execute this 2 cases, the test client will goto bule screen and the Stop code is: DRIVER VERIFIER DETECTED VIOLATION , therefore the case will failed. Does anyone meet this problem too and have some ideas on how to solve this? Any suggestion will be appreciated. DanZhao3.4KViews1like6CommentsLicense Server Configuration Details | Windows Server 2022
Dear Guys, I installed Windows Server 2022 and added the RDSH role. I changed the RDSH license server to be "localhost" and then I noticed as per enclosed screenshot that the License Server Configuration Details in the licensing diagnoser shows that the windows version is 2019! So, Is it a typo problem or there is something else wrong ?! Please advise!1.8KViews0likes3CommentsCOM+ and MSDTC errors
Hey all, I have a fresh install of Windows Server 2022 with Exchange 2019 CU13 installed (not being used as yet). Been having problems connecting it to a DAG and also Server Manager has been producing lots of errors. I think it might be related to this: I can see lots of solutions online, mainly related to dodgy drivers from 3rd parties. The only 3rd party software installed is VMWare tools. The COM+ and Distributed Transaction Coordinator services are started. The DTC service is set to run as the Network Service account. I ran SFC. I have another Server 2022 built using the same iso also with Exchange 2019 that is working fine! Anyone have any other ideas? thanks jc517Views0likes0CommentsSharePoint File Path Issue %Username% or %Userprofile%
Hello Everyone, I am new here. We developed a tool for a client that uses Autodesk Revit. This tool needs to access some files from the server. It works well. Now these files are moved to SharePoint and as you know the Desktop app file path will have a username in it too. We have to distribute it to 100s of users and I am not able to understand what should I replace the user name with so that the system can automatically access the folder. I already tried %Username% and %Userprofile% but I get errors. Could someone help me out here?2KViews0likes1CommentWindows Server 2022 Product Key showing Volume_KMS_WS19 Channel
My firm recently updated SPLA with Microsoft Reseller and got the Windows Server 2022 KMS product keys. However, it doesn't work as expected. The symptom is quite buggy to me. I installed the WinSRV 2022 product key (KMS) with a Windows Server 2022 running KMS volume activation service. It always returns as 'Volume_KMS_WS19 Channel' from the drop-down-list. Nothing can be activated by the KMS server. All activations ended up with error: 0xC004F074. Needless to mention, the Windows Server 2022 KMS server was fully updated and time is synced with clients. If I install the same KMS key with Windows Server 2016 or 2019, the product key returns as the expected 'Volume_KMS_WS22 Channel'. And activation works properly. Why the same key got different results on WinSRV 2022 comparing to 2016/2019? Is this a known issue? Regards, Charles WS7KViews0likes1CommentServer 2022 Preview missing Let's Encrypt Root certificate
First posted to LetsEncrypt.org and was advised to post this issue here. https://community.letsencrypt.org/t/fyi-windows-server-2022-does-not-have-root-certificate/157208 At the time I'm writing this, Microsoft Windows Server 2022 has not been released and is only available in "Preview". Having said that I've installed the "Preview", installed all patches, and experienced the following errors when connecting to resources that use LE certificate. This happened when using Edge and Chrome. Your connection isn't private Attackers might be trying to steal your information from website.domain.com (for example, passwords, messages, or credit cards). NET::ERR_CERT_AUTHORITY_INVALID Firefox worked fine since it uses its own certificate store. After adding the root certificate to the root store, all was fine. The following output shows the certs currently in the root store by default as well as the PowerShell & OS version: PS C:\> gci Cert:\LocalMachine\Root PSParentPath: Microsoft.PowerShell.Security\Certificate::LocalMachine\Root Thumbprint Subject ---------- ------- CDD4EEAE6000AC7F40C3802C171E30148030C072 CN=Microsoft Root Certificate Authority, DC=microsoft, DC=com BE36A4562FB2EE05DBB3D32323ADF445084ED656 CN=Thawte Timestamping CA, OU=Thawte Certification, O=Thawte, L=Durbanville, S=Western Cape, C=ZA A43489159A520F0D93D032CCAF37E7FE20A8B419 CN=Microsoft Root Authority, OU=Microsoft Corporation, OU=Copyright (c) 1997 Microsoft Corp. 92B46C76E13054E104F230517E6E504D43AB10B5 CN=Symantec Enterprise Mobile Root for Microsoft, O=Symantec Corporation, C=US 8F43288AD272F3103B6FB1428485EA3014C0BCFE CN=Microsoft Root Certificate Authority 2011, O=Microsoft Corporation, L=Redmond, S=Washington, C=US 7F88CD7223F3C813818C994614A89C99FA3B5247 CN=Microsoft Authenticode(tm) Root Authority, O=MSFT, C=US 3B1EFD3A66EA28B16697394703A72CA340A05BD5 CN=Microsoft Root Certificate Authority 2010, O=Microsoft Corporation, L=Redmond, S=Washington, C=US 31F9FC8BA3805986B721EA7295C65B3A44534274 CN=Microsoft ECC TS Root Certificate Authority 2018, O=Microsoft Corporation, L=Redmond, S=Washington, C=US 245C97DF7514E7CF2DF8BE72AE957B9E04741E85 OU=Copyright (c) 1997 Microsoft Corp., OU=Microsoft Time Stamping Service Root, OU=Microsoft Corporation, O=Microsoft Trust Network 18F7C1FCC3090203FD5BAA2F861A754976C8DD25 OU="NO LIABILITY ACCEPTED, (c)97 VeriSign, Inc.", OU=VeriSign Time Stamping Service Root, OU="VeriSign, Inc.", O=VeriSign Trust Network 06F1AA330B927B753A40E68CDF22E34BCBEF3352 CN=Microsoft ECC Product Root Certificate Authority 2018, O=Microsoft Corporation, L=Redmond, S=Washington, C=US 0119E81BE9A14CD8E22F40AC118C687ECBA3F4D8 CN=Microsoft Time Stamp Root Certificate Authority 2014, O=Microsoft Corporation, L=Redmond, S=Washington, C=US DF3C24F9BFD666761B268073FE06D1CC8D4F82A4 CN=DigiCert Global Root G2, OU=www.digicert.com, O=DigiCert Inc, C=US D4DE20D05E66FC53FE1A50882C78DB2852CAE474 CN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IE B1BC968BD4F49D622AA89A81F2150152A41D829C CN=GlobalSign Root CA, OU=Root CA, O=GlobalSign nv-sa, C=BE A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 CN=DigiCert Global Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US 75E0ABB6138512271C04F85FDDDE38E4B7242EFE CN=GlobalSign, O=GlobalSign, OU=GlobalSign Root CA - R2 742C3192E607E424EB4549542BE1BBC53E6174E2 OU=Class 3 Public Primary Certification Authority, O="VeriSign, Inc.", C=US 0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 CN=DigiCert Assured ID Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US PS C:\> $PSVersionTable Name Value ---- ----- PSVersion 5.1.20348.1 PSEdition Desktop PSCompatibleVersions {1.0, 2.0, 3.0, 4.0...} BuildVersion 10.0.20348.1 CLRVersion 4.0.30319.42000 WSManStackVersion 3.0 PSRemotingProtocolVersion 2.3 SerializationVersion 1.1.0.1 PS C:\> gwmi win32_operatingsystem | fl Caption, Version, BuildNumber Caption : Microsoft Windows Server 2022 Datacenter Evaluation Version : 10.0.20348 BuildNumber : 20348 EDIT @petercooperjr in the previously mentioned Let's Encrypt thread offered this feedback. Thanks. I don't know if it'd help whomever looks at it, but if you look at the Microsoft Trusted Root Program's page of their current trusted roots, you can see that ISRG Root X1 is there. (And it looks like ISRG Root X2 is there too!) https://docs.microsoft.com/en-us/security/trusted-root/participants-list https://docs.microsoft.com/en-us/security/trusted-root/participants-list This document provides details about the participating Certificate Authorities in the Microsoft Trusted Root Program.7.8KViews2likes2Comments