Search This Blog

Wednesday, June 30, 2010

WindowsNetworking.com - June 2010 Newsletter

-----------------------------------------
WindowsNetworking.com Monthly Newsletter of June 2010
Sponsored by: SolarWinds <http://www.solarwinds.com/register/index.aspx?Program=849&c=70150000000OnEB&CMP=BIZ-TAD-TG-NPM-MSFT_SYSTMCTR-DL-Q2-2010>
-----------------------------------------

Welcome to the WindowsNetworking.com newsletter by Debra Littlejohn Shinder <http://www.windowsnetworking.com/Deb_Shinder/>, MVP. Each month we will bring you interesting and helpful information on the world of Windows Networking. We want to know what all *you* are interested in hearing about. Please send your suggestions for future newsletter content to: dshinder@windowsnetworking.com


1. Remote Desktop Services: this is not your father's Terminal Services
---------------------------------------------------------

I spent last week at TechEd in New Orleans, working at the Remote Desktop Services booth in the Windows Server and Virtualization area. That meant diving deeply into the new features of RDS (formerly called Terminal Services) in Windows Server 2008 R2 and fielding some pretty complex questions about deployment in various situations. There were also lots of people whose question was "What is RDS"? Many thought it referred to Remote Desktop Administration, which uses the RDC client to connect to a server to do maintenance and administrative tasks and is restricted to two concurrent connections. Others wanted to know the difference between providing users with a desktop via RDS and doing the same thing via VDI. Many had questions about setting up a Remote Desktop Gateway to allow users to connect over the Internet with an SSL connection or setting up Remote Desktop Web Access so users could access published applications via a web browser.

I started playing around with Terminal Services back when it only came in a special edition of Windows NT. In the "old days" (Windows Server 2003 and prior), it was a pretty simple and straightforward thing. You enabled terminal services application mode on a Windows server and configured the users who would have access. You used the Terminal Services Manager to view and manage users, sessions and processes. Oh, you could create a load balanced farm with Server 2003 machines, but Microsoft's Network Load Balancing (NLB) had a lot of limitations and you often needed to resort to third party solutions.

Server 2008 and 2008 R2 bring major changes and improvements to the TS/RDS role, including:

- RemoteApp - Allows you to publish individual applications to users instead of a full desktop. The applications appear on the user's local desktop and look like local applications, making the process seamless to users.

- Web Access - Allows users to access RemoteApp and Desktop Connection through a web browser instead of the RDC client. In Server 2008 R2, forms based authentication, per-user RemoteApp program filtering, single sign-on and a public and private computer option have been added.

- Gateway - Allows authorized users to connect to LAN resources - Remote Desktop session host servers, RemoteApp programs, or computers with Remote Desktop enabled - over the Internet from any device running the RDC client, using RDP over HTTPS to create an encrypted connection between the user and the gateway.

- RD Virtualization - Part of Microsoft's Virtual Desktop Infrastructure (VDI) solution that works with Hyper-V to provide virtual machines that can be used as personal virtual desktops or virtual desktop pools, using RemoteApp and Desktop Connection.

- Easy Print redirection - A proxy for print actions that redirects all printing-related activities to the user's local machine without the need to install drivers on the server, when connecting to Ultimate/Enterprise editions of Windows 7 and to Server 2008 R2 Remote Desktop servers.

Other additions and enhancements include RDS provider for PowerShell, improvements to load balancing and Fair Share CPU scheduling, true multiple monitor support on a remote desktop connection, audio/video improvements and a new version of the Remote Desktop Protocol (RDP) and Remote Desktop Connection (RDC) client. Performance improvements mean you might not need Citrix ICA now to get the kind of performance you want.

What we used to know as Terminal Server running in Application Mode is now called the RD Session Host server. It is a role service that you enable after enabling Remote Desktop Services itself in Server Manager on your Server 2008 R2 machine. RemoteApp is part of the RD Session Host, so you can publish individual applications from your RD Session Host server. However, you will notice that there are a number of other role services that can be enabled for different deployment scenarios, and things can get complicated pretty quickly.

First, you will need an RD Licensing Server, although RDS will operate for 120 days without one. After that, RDS will stop working. Licensing is on a per-user or per-device basis; you will want to use per-user licensing if you have more devices than users (i.e., one user connects from multiple computers) and per-device licensing if you have more users than devices (several users share one computer). It is recommended that the licensing server be installed on a separate server (physical or virtual) that is not an RD Session Host.

If you want to allow users to connect over the Internet via RDP over HTTPS (which will work through firewalls that block RDP and VPN connections), you need to configure an RD Gateway. This, too, is a role service and it should be on a separate machine. Improvements to the Gateway in Server 2008 R2 include configurable idle and session timeouts, background session authentication and authorization, device redirection enforcement, and NAP remediation.

If you have users who need to access remote desktops or remote applications but do not have the RDC client installed, you can set up an RD Web Access server. This role service should be installed on a separate server from the RD session host and IIS will automatically be installed with it. You will need to install and configure an X.509 certificate for the web site, either from your own PKI or a trusted third party certification authority. Users who log onto the URL for your RD web access server will be presented with a page showing only those apps to which you have assigned them access. You can enable single sign-on via Group Policy to simplify user logon.

If you have many users and need to deploy more than one RD Session Host, you can set up an RDS farm and use the RD Connection Broker (which was named Session Broker in Terminal Services) to enable load balancing and reconnection to existing sessions. This ability to reconnect when a user is disconnected is a big advantage of using the Connection Broker instead of Windows Server 2008 R2's NLB or a third party load balancing solution.

In addition to managing your RDS servers via the Remote Desktop Connection Manager and Remote Apps Manager (available in the Administrative Tools menu), Server 2008 R2 adds an RDS module for PowerShell that lets you access the configuration settings of the RDS role services via the PowerShell interface. This makes it possible for you to automate recurring tasks by scripting them, or change settings and perform tasks directly from the command line.

As you can see, there's a lot to love - and a lot to learn - in the new Remote Desktop Services, especially if you're coming from a Server 2003 or prior Terminal Services environment - and we haven't even touched on VDI. We'll save that topic for a future article. In the meantime, if you want to know more about RDS and all of the virtualization technologies in Server 2008 R2, I highly recommend the book Mastering Microsoft Virtualization, published by Sybex. It's written by a group of Microsoft employees and goes into great detail about how RDS works and how to deploy it. You'll also want to check out the Remote Desktop Services Deployment guides on the TechNet web site <http://technet.microsoft.com/en-us/library/dd647502(WS.10).aspx>.

Let us know what you think. Have you tried RDS in Server 2008 R2? What do you like or not like about it? Are you delivering full desktops to thin clients, giving users seamless access to individual applications running on the server via RemoteApp, or deploying some other scenario? What further improvements would you like to see? Write to me at dshinder@windowsnetworking.com and if security is your concern, check out my forthcoming article on securing Remote Desktop Services in Windows Server 2008 R2 that I will be writing for the Windowsecurity.com web site in the next month.

See you next month - Deb.
dshinder@windowsnetworking.com

=======================
Quote of the Month - "Research is what I'm doing when I don't know what I'm doing." - Werner von Braun
=======================


2. ISA Server 2006 Migration Guide - Order Today!
---------------------------------------------------------

Dr. Tom Shinder's best selling books on ISA Server 2000 and 2004 were the "ISA
Firewall Bibles" for thousands of ISA Firewall administrators. Dr. Tom and his
illustrious team of ISA Firewall experts now present to you , ISA Server 2006
Migration Guide
<http://www.amazon.com/exec/obidos/ASIN/1597491993/isaserver1-20/>. This book
leverages the over two years of experience Tom and his team of ISA Firewall
experts have had with ISA 2006, from beta to RTM and all the versions and builds
in between. They've logged literally 1000's of flight hours with ISA 2006 and
they have shared the Good, the Great, the Bad and the Ugly of ISA 2006 with
their no holds barred coverage of Microsoft's state of the art stateful packet
and application layer inspection firewall.

Order your copy of ISA Server 2006 Migration Guide
<http://www.amazon.com/exec/obidos/ASIN/1597491993/isaserver1-20/>. You'll be
glad you did.

3. WindowsNetworking.com Articles of Interest
---------------------------------------------------------

* Understanding Virtual Networking in Microsoft Hyper-V
<http://www.windowsnetworking.com/articles_tutorials/Understanding-Virtual-Networking-Microsoft-Hyper-V.html>

* The Importance of Network Redundancy
<http://www.windowsnetworking.com/articles_tutorials/Importance-Network-Redundancy.html>

* Deploying Windows 7 - Part 25: Managing Drivers – Selection Profiles
<http://www.windowsnetworking.com/articles_tutorials/Deploying-Windows-7-Part25.html>

* Internet Routing: More Complicated Than You Thought
<http://www.windowsnetworking.com/articles_tutorials/Internet-Routing-More-Complicated-Than-You-Thought.html>

* Windows 7 Compatibility Testing (Part 5)
<http://www.windowsnetworking.com/articles_tutorials/Windows-7-Compatibility-Testing-Part5.html>

* Product Review: GFI Backup 2010 Business Edition
<http://www.windowsnetworking.com/articles_tutorials/Product-Review-GFI-Backup-2010-Business-Edition.html>

* Product Review: Syncplicity
<http://www.windowsnetworking.com/articles_tutorials/Product-Review-Syncplicity.html>

* Readers' Choice Award Winner
<http://www.windowsnetworking.com/news/WindowsNetworking-Readers-Choice-Award-IP-PBX-Servers-Cisco-Unified-Communications-Manager-Apr10.html>


4. Administrator KB Tip of the Month
---------------------------------------------------------

How to Set Multiple Services on Multiple Remote Computers

This article can be useful for users who want to set multiple services on remote computers. The following steps can be performed to accomplish this:
Steps:

1. Create a text file: Comps.TXT
2. Put all the computer names in it.
3. Create another text file and put all the services you want to start: Services.TXT
4. Create a batch file: SetServices.CMD and put the following lines in it:
@ Echo OFF
setlocalenabledelayedexpansion
FOR /F "Tokens=*" %%L IN (Comps.TXT) DO (
SET CompName=%%L
FOR /F "Tokens=*" %%L IN (Services.TXT) DO SC \\!CompName! Start %%L auto
)
)
5. Finally, run the SetServices.CMD from a command window.
The above script starts the services mentioned in the Services.TXT file on computers mentioned in the Comps.TXT file.

You can find this administrator tip here <http://www.windowsnetworking.com/kbase/WindowsTips/WindowsVista/AdminTips/Administration/HowToSetMultipleServicesOnMultipleRemoteComputers.html>.

For more administrator tips, go to WindowsNetworking.com/WindowsTips
<http://www.windowsnetworking.com/kbase/WindowsTips/>


5. Windows Networking Tip of the Month
---------------------------------------------------------

Are you getting ready to migrate to Windows Server 2008 R2? Need specific information on how to migrate various server roles - including Active Directory Domain Services and DNS, Certificate Services, DHCP, Branch Cache, File Services, Hyper-V, RRAS, NPS and many more - onto the new platform? This set of migration documentation and tools can ease the process, whether you're moving from Windows Server 2003 or Windows Server 2008, and simplify the deployment of your servers, including those running Server Core or those that are virtualized.

The good news is that most of the tools and scenarios are very flexible, allowing you to migrate between physical and virtual environments or from x86 to x64 based platforms, and they will cover most of the "gotchas" that you might encounter during your migration process and help you prepare for a smooth and pain-free migration with minimal downtime.

Check them out here <http://technet.microsoft.com/en-us/library/dd365353(WS.10).aspx>.


6. WindowsNetworking Links of the Month
---------------------------------------------------------

* Accomplish Goals with Windows Server Networking
<http://technet.microsoft.com/en-us/library/ff730167(WS.10).aspx>

* DirectAccess with Network Access Protection (NAP)
<http://blogs.technet.com/b/wsnetdoc/archive/2010/06/02/directaccess-with-network-access-protection-nap-the-cable-guy-article-for-june-2010.aspx>

* Windows Live Sync blends the best of Sync and Mesh
<http://windowsteamblog.com/windows_live/b/windowslive/archive/2010/06/10/coming-soon-windows-live-sync-beta.aspx>

* 2X Universal Printing and Scanning
<http://www.2x.com/blog/2010/05/virtualization/2x-universal-printing-and-scanning/>

* Don't fire people until after you've wiped their phones
<http://msinfluentials.com/blogs/jesper/archive/2010/04/08/don-t-fire-people-until-after-you-wipe-their-phones.aspx>


7. Ask Sgt. Deb
---------------------------------------------------------

* QUESTION:

I have been working with Active Directory for many years and one big pain that I find is the process that you have to go through to restore a deleted AD object: restore the system state of the domain controller, boot into Directory Services restore mode and do a selective authoritative restore of the object. Sheesh!! It's my understanding that Server 2008 R2 makes this easier. Can you tell me how that works and whether there are any caveats? Thanks! - Allen H.

* ANSWER:

Windows Server R2 includes a new feature that's called Active Directory Recycle Bin. Microsoft recognized that the existing process takes a lot of administrative time and also results in server downtime that can affect productivity, and that there had to be a better way to restore deleted objects to the directory.

You have to enable the AD Recycle Bin feature as it's disabled by default. When you do, the attributes of objects are preserved and restored to the same state they were in right before the deletion occurred. What this means is that if you deleted a user account, when you restore it, it will still have its group memberships and so forth.

As for caveats, before you can enable this feature, you have to raise the forest functional level to Windows Server 2008 R2. This means that all the domain controllers in the forest have to be running WS 2008 R2 - and that can be a big "gotcha". If you can meet that requirement, then by all means, go for it. You can find the instructions on how to enable the AD Recycle Bin and how to use it to restore a deleted AD object here <http://technet.microsoft.com/en-us/library/dd392261(WS.10).aspx>.

TechGenix Sites
---------------------------------------------------------

MSExchange.org <http://www.msexchange.org/>
WindowSecurity.com <http://www.windowsecurity.com/>
ISAserver.org <http://www.isaserver.org/>
VirtualizationAdmin.com <http://www.virtualizationadmin.com/>

--
Visit the Subscription Management <http://www.techgenix.com/newsletter/>
section to unsubscribe.
WindowsNetworking.com is in no way affiliated with Microsoft Corp.
http://www.techgenix.com/advert/index.htm for sponsorship
information or contact us at advertising@windowsnetworking.com
Copyright c WindowsNetworking.com 2010. All rights reserved.

No comments: