Tuesday, January 27, 2015

The Imperfect Lab: Letting Additional Administrators Remotely Connect to Servers

An age-old server administration best practice is to make sure that everyone who is administering servers on your network are doing it with their own "admin" credentials.

Up until this point, I've done all my remote Azure sessions (PS-Session) with the built-in administrator account.  This works fine if you are only person connecting remotely to a server. But what if you want to grant others administrative rights to your machine and they would also like to connect remotely?

Your first step would likely be to add them to the local administrators group. Since you've already turned on the "remote management" feature for yourself, you might expect this to work out of the box.

But you probably overlooked this little note in the "Configure Remote Management" box when you enabled remote management - "Local Administrator accounts other than the built-in admin may not have rights to manage this computer remotely, even if remote management is enabled."

That would be your hint that some other force might be at work here.  Turns out that UAC is configured to filter out everyone except the built-in administrator for remote tasks.

A review of this TechNet information gives a little more detail:

"Local administrator accounts other than the built-in Administrator account may not have rights to manage a server remotely, even if remote management is enabled. The Remote User Account Control (UAC) LocalAccountTokenFilterPolicy registry setting must be configured to allow local accounts of the Administrators group other than the built-in administrator account to remotely manage the server."

To open up UAC to include everyone in your local Admins group for remote access, you'll need to make some registry changes.

Follow these steps to manually edit the registry:

  1. Click Start, type regedit in the Start Search box, and then click regedit.exe in the Programs list.
  2. Locate and then click the following registry subkey:
  3. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system
  4. On the Edit menu, point to New, and then click DWORD Value.
  5. Type LocalAccountTokenFilterPolicy for the name of the DWORD, and then press ENTER.
  6. Right-click LocalAccountTokenFilterPolicy, and then click Modify.
  7. In the Value data box, type 1, and then click OK.
  8. Exit Registry Editor.

Now you will be able to remotely connect and administer your server using PowerShell with any account you've give Admin rights too for that particular server.  This would hold true for servers in Azure, as well as servers on your local network.

Special shout out to Bret Stateham for bringing this "remote admin road-bump" to my attention. Sometimes what looks like an "Azure" problem, is really a "Server" feature. :-)

Tuesday, January 20, 2015

The Imperfect Lab: Not So SharePointed

On my list of thing to try with the Imperfect Lab was deploying a SharePoint Farm from the new portal since there is this nifty wizard that just does all the work of building the servers for you.  Just a few clicks and boom, SharePoint!

But alas, it was not quite to be. While the portal does do what it claims, produces a test/dev scenario of SharePoint, it's completely isolated.  And completely isolated isn't exactly what I wanted. When you use the portal configuration "wizard" you are prompted for several bits of information that you can't get around.
  1. You are prompted to give a domain name for a new FOREST domain.
  2. You must create a NEW virtual network.

Because I wanted to create a little Imperfect Lab "team site" and experiment a bit with SharePoint 2013, I wanted to use my existing domain and my existing network.  But that isn't an option allowed via the portal "journey", to get what I want, I'll have to build it out the old-fashioned way, one server at a time.

Had I know this before I started this project, I might have considered creating the SharePoint farm first, then using that domain and network as the basis for the rest of my lab projects.  Oh well, that’s why we experiment in the first place right?  Live and learn. I guess I'll swing back around to this SharePoint project a bit later.

Meanwhile, if a completely isolated SharePoint playground is something you need, by all means check out the new Azure portal and give it go.  And if you need more than what the test environment provides, you might find the complete Planning for SharePoint 2013 on Azure Infrastructure Services guide useful.

Friday, January 16, 2015

Early Experts Exam Study Guide for 70-533: Implementing Microsoft Azure Infrastructure Solutions

One of the greatest challenges with certification exams is finding study materials for new exams. To get you started, I've starting pulling together some resources I've collected based off the targets skills listed for 70-533.

Exam 70-533 is one of three exams that can be successfully passed to complete the Microsoft Specialist certification on Microsoft Azure.  The other exams in this series include:

70-532, Developing Microsoft Azure Solutions
70-534, Architecting Microsoft Azure Solutions

This exam guide is not intended as a replacement for any formal training on Microsoft Azure or for this exam that might come available in the future, however we all have to start somewhere, right? You can find the PDF version of the exam guide here and it will be updated as I collect additional resources.

If you also plan to prepare for Exam 70-532, you can find some study resources at:
If you plan to prepare for Exam 70-534, check out these resources:
If you are looking for study resources for other Microsoft certifications and  you didn't get here from there already, check out http://EarlyExperts.net for other study guides and information.

Windows Server 2003 Still Around? Check out some useful webcasts!

Ah, Windows Server 2003, that sturdy workhorse that just keeps going and going.  If you still have a server or two chugging along, you might find some of these upcoming webcasts of interest.


For additional information, you can also visit Microsoft Virtual Academy for some on-demand courses.




Wednesday, January 14, 2015

The Imperfect Lab: Syncing AD to Azure AD

Today I decided to ease myself into my next steps and build out a member server to sync AD to.  I reused some previous PowerShell to deploy a member server and join it to my domain.  It is possible to run the sync services on an existing domain controller, but as a best practice I don't like to install one-off applications on my domain controllers.  I like to keep them identical, thus the need for different member server to perform the sync role.

I had previously uploaded the Microsoft Azure AD Sync Services (aka AADSync) application to my Azure file share, but you can find it at http://aka.ms/azureadsync.  You will want to install and run the Microsoft Azure AD Connection Tool.  Please note that Microsoft Azure AD Sync Services is DIFFERENT from Windows Azure Active Directory Sync (aka DirSync)

Once the Sync Server is built, you will want to kick off the installation of the application, but not before you'd made some adjustments to your Azure Directory.  In the Portal, I went to my directory and created a new user account to be my Azure AD Administrator (newuser@imperfectlab.com) and made it a Global Administrator.  You will also need to go through the sign-in process to set a non-temporary password.

Once you have this account, you simply need to throw the switch under "Directory Integration -> Directory Sync" from Inactive to Active.  Once the setting is saved, the "Last Sync" field will say "never synced".  Now go over to your sync server and run that connection tool.

You'll need the account and credentials you created for the new Azure AD Admin and some information about your domain.  For the addition of the forest, you'll need your domain name and the username and password of a enterprise domain admin from your local domain.  This will be different than the account your created directly in Azure AD.

Leave the User Matching page at the defaults but select "Password Synchronization" from the Optional Features. Finally, review your configuration screen and verify that "Synchronize Now" is checked and click finish.  At this point, your users should sync into Azure AD and after a few minutes you'll see a list of them in the portal.

If you want to make any changes to the settings of your AD Sync, like adding in a feature, simply rerun the tool after disabling the Azure AD Sync Task in Task Scheduler.  The task will be re-enabled automatically when you finish the wizard again.

If you want to force a sync for Azure AD Sync Services for any reason, the default location of the command line tool is:
c:\program files\microsoft azure ad sync\bin\directorysyncclientcmd [initial|delta]


Happy Syncing!

Tuesday, January 13, 2015

Seattle IT Pros: Feb 4th is the next SITPUG Meeting!

The  next meeting for the Seattle IT Pros User Group is scheduled for Wednesday, February 4, 2015 at the Microsoft Civica Office Commons (South Tower) in Bellevue, WA at 6:00PM. Please RSVP if  you will be attending! 

The guest speaker will be Ben Armstrong of Microsoft. Officially Ben is a Principle Program Manager at Microsoft who works on the Hyper-V development team. Unofficially, he is the virtualization guru at Microsoft. Some of you may know him as the Virtual PC Guy from his blog posts on MSDN. The topic of his presentation is Hyper-V in Windows 10. Ben will discuss the new functionality for Hyper-V that is coming in Windows 10 and the new scenarios Microsoft is hoping to enable in the new version.

Ben’s complete bio is available here.

Windows 8 Giveaway
SITPUG will be giving away a copy of Windows 8 Professional at the meeting. The name of the lucky winner will be announced at the end of the meeting. Please check out the rules on the SITPUG Web site.

Directions
The meeting is held at the Microsoft Civica Office in Bellevue. Parking will be validated by the receptionist at the sign in. Visit the Directions page for details.

Microsoft Civica Office
205 108th Avenue NE
Suite 200 (4th floor)
Bellevue, WA 98004

Friday, January 9, 2015

Certification Update

With the new year, you might be taking a fresh look at some certifications to round out your resume or impress your boss.  Now is the time to tackle them, because the free "2nd Shot" is back!

Between January 5 and May 31, 2015, take any Microsoft Certified Professional (MCP) or Microsoft Dynamics exam, and get a free Second Shot if you fail the first take.  Learn more! 

Speaking of certifications, the new Azure certifications are available.  Just one test and you can be Microsoft Specialist in Developing or Architecting Microsoft Azure Solutions or Implementing Azure Infrastructure.

Wednesday, January 7, 2015

The Imperfect Lab: Adding A Custom Domain

This will be a super short post, because this task is super easy!

My lab in Azure wouldn't be complete without its own custom domain. Honestly, this is one of those "just pop over to the Portal" tasks because it only takes a few clicks, particularly if you are only doing it once.  But you won't be able to complete in a hurry, because your registrar will update the public DNS entries on their own sweet time and that update is needed to complete the process.

By the way, if you really want to do this without the Portal, you can find information on installing the right PowerShell modules and the commands here. (http://msdn.microsoft.com/en-us/library/azure/jj151815.aspx)  If you are going to managing multiple tenants over time, PowerShell will likely be the best way to go.

Anyway, when you are in the Portal, click "Active Directory" in the navigation.  Select the domain directory you want to add a custom domain to.  In this case, I wanted to create a new Azure Directory for the Imperfect Lab, so I clicked "New" and then went to APP SERVICES -> ACTIVE DIRECTORY -> DIRECTORY -> CUSTOM CREATE.

I named my directory "ImperfectLab" and picked my region.  The domain name for the directory is now "Imperfectlab.onmicrosoft.com".  Since I don't want to be using the "onmicrosoft.com" moniker for very long, I need to add my recently purchased domain.  You actually have to a own (or at least control) the domain you want to add because it's requirement to add a TXT or MX record to your public DNS.

Click into the directory you want to use and go to the "Domains" section. On the bottom action bar, click "Add". Then type in the FQDN for your "real" domain, in my case "imperfectlab.com".  You be given the information to create either at TXT or MX record that needs to be added to your DNS records managed by your registrar.

My registrar doesn't accept the @ symbol for the parent zone, but leaving that field blank worked fine.  You have to add the record, wait for the external DNS to update and then return to the portal to verify it.

Once verified, you can create (or sync) users into your Azure Active Directory using either your "user@domain.onmicrosoft.com" UPN or your "user@domain.com" UPN.

Monday, January 5, 2015

The Imperfect Lab: Fleshing Out Active Directory

Having a domain with no users isn't any fun.  So my next task for the Imperfect Lab was to create a few accounts to act as my users for provisioning access and eventually syncing with Azure Active Directory.

You can do a lot with some basic PowerShell to create OUs and User Accounts.  Here are a few basic lines that would create something in my lab domain:

New-ADOrganizationalUnit –Name “DOGS” –Path “DC=imperfectlab, DC=Com”

New-ADUser -Name "Lizbeth Tiburon" -Path "OU=DOGS,dc=imperfectlab,dc=com" -AccountPassword $newPassword -Department "Career Changed" -SamAccountName "LTibu" -Surname "Tiburon" -GivenName "Lizbeth" -DisplayName "Lizbeth Tiburon"

Those lines would create a OU and then a user account in the new OU.  But what if you wanted to create more users at once?  I could simply duplicate the 2nd line, but figured there had to a relatively easy way to get data straight from a CSV file.

I did some looking around online and since no good Internet search goes unpunished, I found this: https://gallery.technet.microsoft.com/scriptcenter/PowerShell-Create-Active-7e6a3978#content by @mwashamtx.  Honestly, this a great script that I couldn't have written by myself at this point, but I was able to tweak it enough to do my bidding. 

I changed the paths (to reflect the drive letter and file location I set up using Azure Files), removed a lot of the fields the script used to populate account attributes and edited the CSV file to match.  I uploaded my CSV file to my Azure file share. I left the script writer's five character SAM account name creation as is and ran it remotely via PS-Session on my domain controller.  The DC tapped the CSV file in my Azure File share and wrote the log to that same location.  The script does some great error handling, which was really helpful for troubleshooting.  Mission accomplished!

And for those of you who are curious about the user created in that line above, Lizbeth is a dog who didn't complete the training to become a guide dog

MS ITPro Evangelists Blogs

More Great Blogs