You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Install and Configure - Windows Server 2019 Core AD DC on ProxMox VM
Initial configuration
# run 'sconfig':
Computer name
Remote desktop
Network settings
# disable firewall
NETSH ADVFIREWALL set allprofiles state off
# install windows features
dism /online /Enable-Feature /FeatureName:TelnetClient
# Disable IP auto configuration in Windows Server Core
netsh interface ipv4 show inter
netsh interface ipv4 set interface numIdx dadtransmits=0 store=persistent
(where numIdx is the Idx number of your Nic noted in the previous step).
net stop dhcp
sc config “dhcp” start= disabled
# allow remote access
netsh advfirewall firewall add rule name= "Open Port 3389 (RDP)" dir=in action=allow protocol=TCP localport=3389
install windows features and stage drivers locally
# run "PowerShell" command
powershell
# Allow remote managementInstall-WindowsFeature RemoteAccess
Install-WindowsFeature RSAT-RemoteAccess-PowerShell
Install-WindowsFeature Routing
# display available drivesGet-PSDrive# create local driver directory
mkdir -p c:\sys\drivers
# copy drivers from media to local directoryCopy-Item D:\vioscsi\2k19\ -Destination C:\sys\drivers\vioscsi\2k19 -Recurse
Copy-Item D:\NetKVM\2k19\ -Destination C:\sys\drivers\NetKVM\2k19 -Recurse
Copy-Item D:\Balloon\2k19\ -Destination C:\sys\drivers\Balloon\2k19 -Recurse
Copy-Item D:\vioserial\2k19\ -Destination C:\sys\drivers\vioserial\2k19 -Recurse
Copy-Item D:\guest-agent\ -Destination C:\sys\drivers\guest-agent -Recurse
implement drivers
# go to local directory with driversSet-Location C:\sys\drivers
# install drivers
pnputil -i -a C:\sys\Drivers\NetKVM\2k19\amd64\*.inf
pnputil -i -a C:\sys\Drivers\Balloon\2k19\amd64\*.inf
pnputil -i -a C:\sys\Drivers\vioserial\2k19\amd64\*.inf
# set up guest agentSet-Location C:\sys\drivers\guest-agent
.\qemu-ga-x64.msi
Copy-Item C:\sys\drivers\Balloon\2k19\amd64 -Destination 'C:\Program Files\Balloon'-Recurse
Set-Location'C:\Program Files\Balloon'
.\blnsvr.exe-i
Enable remote powershell sessions
on the win2k16 core server
# view current list of trusted hostsGet-Item wsman:\localhost\client\trustedhosts
# add remote computer that will be connecting to core serverSet-Item wsman:\localhost\client\trustedhosts -Value <hostname or ip>
on the computer wanting to connect to the win2k16 core server
# enable psremoting if not in a domainEnable-PSRemoting# view current list of trusted hostsGet-Item wsman:\localhost\client\trustedhosts
# add remote core server that you want to connect toSet-Item wsman:\localhost\client\trustedhosts -Value <hostname or ip>
launch pssession from computer to server core
Enter-PSSession-ComputerName <server core ip or hostname>-Credential <server core username>