(c) Microsoft Corporation, 1998
Microsoft Confidential
The following sections of this document contain vital information pertaining to this release. Consult these notes before installing this release.
To setup Windows NT 5.0, launch setup using WINNT.EXE or WINNT32.EXE from an existing OS and do not choose to create the boot floppies.
This SCSI device contains the Ultra II chip and is not yet supported on this interim release. This will be supported in a future release.
If your Compaq computer (such as the Compaq Proliant 2500) uses the cpq32fs2.sys driver which supports the built-in Symbios 810 SCSI controller on Windows NT 4.0, you will need to disable it before performing an upgrade to this interim release. For example:
The Symbios 810 will be correctly detected by Windows NT Setup (symc810.sys) and the SCSI device will function correctly.
Slave CD-ROM drive not detected on Compaq Proliant 1600 machinesOn some Compaq Proliant 1600 machines, the system is shipped with a slave CD-ROM drive on the IDE channel. If the user starts the install in a safe build from CD-ROM, the NT5 setup will not be able to detect the CD-ROM drive after the first reboot. There are two ways to workaround this problem.
Having a slave device alone on an IDE channel is not a recommended configuration by ATAPI specification. This issue is fixed in a later build.
Bug Check (Inaccessible_boot_device) on EISA systemsWe do not recommend installing this Interim Developers Release on EISA systems. If your system boots from an EISA SCSI card and bugchecks (Inaccessible _boot_ device), you can get an updated version of the kernel and SCSIPORT.SYS from http://ntbeta.microsoft.com/support/idr2.asp
to resolve the problem. These updated files may also resolve issues with EISA netcards not starting properly. Follow the directions below to update these files.When upgrading Windows NT Server 4.0 with Gateway Services for NetWare installed, previously shared folders may not be present after the upgrade. The shares must be manually re-created.
To re-share the file resource:
You must first disable Diskperf before upgrading to this Interim Developer's Release. Failure to do so will result in a bluescreen and Setup will fail. Diskperf is not supported on this interim release, but will be fixed in a future release.
Note: You will NOT be able to install NT 4.0 on a drive that has been converted to NTFS v5. If you choose to dual-boot NT 4.0 and NT 5.0, you must either install NT 4.0 and apply SP3 or SP4 BEFORE installing NT 5.0 and converting the drive to NTFS v5 or do not convert the boot drive or drive you wish to install NT 4.0 on to NTFS.
Conversion of FAT to NTFS v5 Note: The conversion of FAT to NTFS v5 is not implemented in this Interim Developer's Release. The following information will be implemented in Beta 2.Winnt32.exe started in attended mode will display a file system conversion page providing users an option to convert their existing FAT/FAT32 file systems to NTFS. This FAT to NTFS conversion will only take place if the user confirms this dialog during setup
Installations/upgrades of systems started with Winnt32.exe in unattended mode will convert or leave the file system alone based on the value of the FileSystem key in the answer file. If the FileSystem key does not exist, setup will leave the file system alone. Note: this will not effect the NTFS to NTFS v5 conversions
Starting setup using winnt.exe, boot floppies, or CD boot, textmode setup will allow you to select your file system.
Below is a chart containing the setup/installations scenarios. Please use this chart to find the scenario that applies to your configuration. FAT to NTFS is not implemented in this Interim Developer's Release.
File system conversion (default Behavior) | ||
System state | FAT to NTFS | NTFS to NTFS v5 |
Windows NT 3.51 | ||
Windows NT 3.51 Workstation | Winnt32.exe will display wizard page with the "No" option selected | All mounted NTFS volumes will be converted to NTFS v5. Warning will be displayed and user can cancel setup or proceed. |
Windows NT 3.51 Server (Standalone/DC) | Winnt32.exe will display wizard page with the "Yes" option selected | All mounted NTFS volumes will be converted to NTFS v5. Warning will be displayed and user can cancel setup or proceed. |
Windows NT 4.0 | ||
Windows NT 4.0 Workstation (Pre -Sp3) | Winnt32.exe will display wizard page with the "No" option selected | All mounted NTFS volumes will be converted to NTFS v5. Warning will be displayed and user can cancel setup or proceed. |
Windows NT 4.0 Workstation (SP3) | Winnt32.exe will display wizard page with the "No" option selected | All mounted NTFS volumes will be converted to NTFS v5. Warning will be displayed and user can cancel setup or proceed. If dual boot with NT 4.0 Sp3, setup will copy over updated NTFS.sys to other installations %systemroot%\system32\drivers subdirectory |
Windows NT 4.0 Workstation (SP4 or later) | Winnt32.exe will display wizard page with the "No" option selected | All mounted NTFS volumes will be converted to NTFS v5 |
Windows NT 4.0 Server Pre-sp3 (Standalone/DC) | Winnt32.exe will display wizard page with the "Yes" option selected | All mounted NTFS volumes will be converted to NTFS v5. Warning will be displayed and user can cancel setup or proceed. |
Windows NT 4.0 Server Sp3 (Standalone/DC) | Winnt32.exe will display wizard page with the "Yes" option selected | All mounted NTFS volumes will be converted to NTFS v5. Warning will be displayed and user can cancel setup or proceed. If dual boot with NT 4.0 Sp3, setup will copy over updated NTFS.sys to other installations %systemroot%\system32\drivers subdirectory |
Windows NT 4.0 Server SP4 or later (Standalone/DC) | Winnt32.exe will display wizard page with the "Yes" option selected | All mounted NTFS volumes will be converted to NTFS v5 |
Windows 9x | ||
Windows 95 | No conversion will take place, File system will be left intact | N/A |
Windows 95 OSR2 | No conversion will take place, File system will be left intact | N/A |
Windows 98 | No conversion will take place, File system will be left intact | N/A |
When performing an upgrade from a previous version of Windows NT 5.0 to this Interim Developer's Release, under certain conditions Neomagic or Chips and Technology video drivers may no longer work properly. The workaround is as follows:
After the appropriate drivers have been removed:
You can now perform an upgrade installation from Windows NT 4.0 to this release in VGA mode.
DNS configurations that host registrations under the DHCP assigned domain name will fail on this interim release. To workaround this problem, override the DHCP assigned domain name with the DNS domain name:
This will be fixed in a future release.
Disable the DNS record prioritization to leave response data in the format it is received from the DNS server. This can be done by creating/editing the Registry key value:
Key: \HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters
Value: PrioritizeRecordData (REG_DWORD) 0x0
During fresh installations, the system volume is automatically created on a local volume by dcpromo.exe.
Because the system volume is accessed as \\domain-name\sysvol, it is required that all Windows NT 5.0 domain controllers host a system volume.
The system volume replicates on the same schedule as the Active Directory. As such, you may not notice files being replicated to or from your newly created system volume until two replication periods have elapsed (typically ten minutes). This is because the first replication period is used to update the configuration of other system volumes so that they are aware of the newly created system volume.
Sysvol requires NTFS version 5.0. You can verify the format version of any drive using chkntfs.exe, for example "chkntfs c:".
The Directory Service Migration tool (off-line migration from NetWare bindery and NDS resources) is an optional installation. This component was shipped in Windows NT 5.0 Beta. If you installed this tool using the previous Beta release, complete the steps below to ensure the updated version is installed. This process will overwrite your existing Directory Service Migration data files.
The Directory Service Migration tool performs optimally when run from a domain controller. This is due to less information hitting the network during the configuration (export) to Active Directory. Running this tool from a workstation is not supported in this release.
This is an optional installation. Complete the steps below to install this component.
If you are prompted for Remote Access Service dial-up properties, provide the details and close. This a known problem with the installer which will be fixed in a future release. There is no dial capability associated with the Directory Service Migration tool.
After this component is installed, from Start, Program, Administrative tools, select "Directory Service Manager Tool."
Complete documentation is provided in this release. You can review documentation from both the "Assistant" as well as from the Help menu directly.
Before using Distributed File System (Dfs) on this release, familiarize yourself with the following information.
On this Windows NT 5.0 Interim Developer's Release, the legacy Dfsadmin.exe has been replaced with a Dfs Manager console. This console can be invoked from the Start, Programs, Administrative Tools.
To administer an existing stand-alone Dfs, from the Dfs Manager console, right-click, and select "Connect to Existing Dfs Root." This will permit you to enumerate existing stand-alone Dfs roots and select one. You can alternatively type in the Dfs server root and share name in the edit field provided (ex: \\Server\Share) of the Connect To dialog box.
Use the "Connect to Existing Dfs Root" steps referenced above. You can then select the Domain and Fault Tolerant root to administer. If you encounter problems on this release, we recommend you manually enter the FT-Dfs root \\MachineName\DfsShare. The Dfs Manager will resolve this to the proper Domain Name. This issue will be addressed in a future release.
Creating New Dfs RootsTo create a new Dfs root, run Dfs Manager from the server that will host the Dfs share. A future release of Dfs Manager will allow you to create roots remotely.
The Creation Wizard steps you through the Dfs root creation process. To invoke the wizard from Dfs Manager, Right-Click, and select "New Dfs Root." You can create either a stand-alone (one root) or Fault Tolerant (multiple root participants, DNS naming, leverages Active Directory) Dfs root. In this release, you must reboot of your server to complete the Dfs root setup. No reboot will be necessary in a future release.
The Creation Wizard will not create the directory to host the Dfs root. You must choose an existing directory or create it manually. This issue will be addressed in a future beta release.
After you have setup a Dfs root, and connected to it from Dfs Manager after reboot, you can add child nodes to the Dfs root. Right click on the Dfs root name, and select "New Dfs Child Node."
From any Child Node, you can add replica nodes. Right click on the child node, and select "New Dfs Replica Member."
If you have configured a Fault Tolerant root, and want to add an additional server to co-host the root, run Dfs Manager directly on the server, and step through the "New Dfs root" specifying the same domain and Dfs root name as on the previous computer. In a future release, this will be supported from the "New Root Replica" option.
For this release, support for file replication between child nodes within a replica has been added.
For Fault Tolerant roots, users can now access the root by using either a root server name or by using the domain name. For example:
Dir \\{domain.organization.com}\Dfsroot, or
Dir \\{Dfsroot Server}\Dfsroot Share
If users are unable to resolve domain names, verify the Dfs service (Net Start) is properly started on all domain controllers in the domain.
If the domain is configured to support multiple sites, clients will take preference to child nodes located within their site.
Dfs v5.0 does not currently support Microsoft Cluster Server. This will be supported in a future release.
To remove a Dfs root, use the "Delete Dfs Root" option in Dfs Manager. Perform this locally on the server hosting the Dfs root to be removed. Alternatively:
If a machine-based Dfs configuration is damaged and you are unable to stop hosting a Dfs volume through DfsAdmin, you can reset the service on the computer using the following procedure:
Run Regedt32
HKEY_LOCAL_MACHINE\Software\Microsoft
Delete the folder 'DfsHost', and any subfolders.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services
\DfsDriver\LocalVolumes
Delete any subfolders under this folder. Do not delete the LocalVolumes folder.
Reboot the machine.
If a Fault Tolerant Dfs configuration is damaged and you are unable to stop hosting a Dfs volume through DfsAdmin, you can reset Fault Tolerant Dfs on the computer from Active Directory using the following procedure:
Perform the same steps listed above for a machine based Dfs without rebooting.
Run the Directory Management MMC tool:
Start, Programs, Administrative Tools, Directory Management
Expand the domain name
Select the Fault-tolerant Dfs name to be removed.
Select Action, Delete to remove the FtDfs from the Ds.
Reboot the machine(s) in the fault-tolerant Dfs.
To configure replication between multiple sites, the administrator must perform the following tasks from the Active Directory Sites and Services Manager snap-in located from the Start menu, Programs, Administrative Tools menu "Sites Topology".
Install two or more domain controllers into the domain as replicas, or parent and child. By default they are installed into FirstSite unless subnet objects have been created for each subnet on which a domain controller will reside, and the subnet objects are associated to sites created in Step 3 below.
In the example of two domain controllers to create two sites:
After each site has been seeded, a subnet object for the location can be created and associated to the site. Newly promoted domain controllers will be recognized in the site to which their subnet object is associated. For site policies to operate properly, you must create subnets and associate them to the sites.
This can be performed from one computer if the order is carefully preserved. If Step 4 is completed before Steps 1 and 2, then Steps 1 and 2 must be performed at the location of each replicating domain controller.
When creating replica or child domain controllers, the timezone settings for each must be identical. The system clock between both computers must also be within five minutes of each other. Failure to do so will cause credential failures and will not successfully create a domain controller.
The demotion of a child domain in an arbitrarily deep domain tree structure will fail.
This Interim Developer's Release has support for demotion of domain controllers back to standalone servers. Users are now able to demote a root DC, a child DC, or a replica DC to a member server. In any domain, however, the last domain controller may only be demoted if that domain has no children of its own. The demotion will succeed in simple trees that are no deeper than one level without any problems. However, in trees that contain grandchildren, great-grandchildren, or deeper domains underneath the root domain controller, any attempt to demote a DC deeper than the first child domain of the root domain will fail with endless prompting for credentials.
To work around the problem, the following steps are required:
After following the steps above, the demotions should proceed through to completion successfully.
To configure a domain controller to perform inter-site replication, verify that the Public Key Certficate has been generated as follows:
If the certificate is not present:
Otherwise, continue with the enrollment wizard:
The certificate request wizard should succeed, and you should receive a certificate.
Protection against the PWDUMP utility is not supported in this release. This will be fixed in a future release.
Windows NT Workstation includes the Network Monitor protocol. Windows NT Server includes this protocol and Network Monitor Tools.
If you perform an upgrade to this release from Windows NT 4.0 or Windows NT 5.0 Beta, first remove all Network Monitor components. Failure to remove Network Monitor before upgrading will result in an unknown state.
After the Windows NT upgrade has successfully completed, you can then install the Network Monitor Tools and Network Monitor Agent v2 driver. After it is installed, Network Monitor will be accessible from the Start, Programs, Network Analysis, Network Monitor menu.
Note If you perform an upgrade to this release before removing these components, you will need to remove the Network Monitor components and Network Monitor Agent v2 driver and reinstall them. Adding Network Monitor ComponentsFrom Control Panel\Add/Remove Programs v2\Remove or modify an existing program\click<Next>\select Windows NT Optional Components\click<Modify>\select Networking Options \click<Details>\check Microsoft Network Monitor Tools\click<OK>.
Removing Network Monitor ComponentsFrom Control Panel\Add/Remove Programs v2\Remove or modify an existing program\click <Next>\select Windows NT Optional Components\click <Modify>\select Networking Options\click <Show Subcomponents...>\uncheck Microsoft Network Monitor Tools \click <OK>.
Adding the Network Monitor Agent V2 DriverRight click on the Connection icon\Properties\Networking tab\click <Add>\select Protocols\click <Add>\select Network Monitor Agent v2 Driver\click <OK>\click <OK>.
Removing the Network Monitor Agent V2 DriverRight click on the Connection icon\Properties\Networking tab\select Network Monitor Agent v2 Driver \click <Remove>\click <OK>\click <OK>.
In this release, the SNMP Agent will fail unexpectedly when attempting to browse the 1.3.6.1.2.1. portion of the Management Information Base (MIB). The service will stop processing requests until it is restarted. To workaround this problem:
Run Regedt32
HKEY_LOCAL_MACHINE\Software\Microsoft\RFC1156Agent\CurrentVersion\Parameters\TrapPollTimeMilliSecs
Set the registry variable to FFFFFFFF
The SNMP Agent will hang when attempting to set the following Object Identifier (OID):
1.3.6.1.2.1.4.24.2.1.2.127.0.0.0.2.0.127.0.0.1Upgrading a Windows NT 4.0 Backup Domain Controller to a Windows NT 5.0 Replica
When the Active Directory Installation Wizard in Windows NT Setup prompts you to select either "Leave as a member server" or "Make a domain controller", select "Leave as a member server". After the installation wizard completes the process, leave the Domain and join a Workgroup through the Network ID tab of the System applet. Reboot the system. Select Start, Run and type Dcpromo.exe to install a replica domain controller.
If you select to install "Make a domain controller", the following error message will occur:
Active Directory Installation Failed
The security account manager (SAM) or local security authority (LSA) server was in the wrong state to perform the security operation.
Cancel the Domain Controller wizard (Dcpromo.exe) and restart it. Select Start, Run and type Dcpromo.exe and follow the above instructions.
If the Domain Controller wizard continues to appear after each reboot of the system, edit the following entry in the Registry. Select Start, Run, Regedt32.exe.
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\Current Version\Winlogon\Userinit
remove "dcpromo /upgrade"
Active Directory Manager is the Microsoft Management Console snap-in for administering the Active Directory.
Active Directory Manager supports two modes of operation selected from the snap-in View menu. In Normal mode, only standard objects are displayed as containers, Organizational Units, Groups, Contacts, Users, and Computers. These items display a reduced set of properties.
In Advanced mode, additional containers such as Lost and Found, and System can be viewed. In this mode, additional properties are available such as security and certificate mappings.
Objects such as Users, Groups and Computers are viewed as leaf nodes in the directory. These objects may also be viewed as containers. For example, printers are published in a Computer container. To view objects such as Printers and IPSec Settings, you can view Computers, Users and Groups as containers.
A filter can be applied to display certain types of leaf objects. This allows administrators to selectively view only the object classes that are included in the filter. In this release, there is no visual indication the filter has been applied.
You can now select multiple objects in the Results pane. The operations applicable for this selection are Enable/Disable User Accounts, Send Mail (assumes a mail client is installed and the users' email address attribute is present), Delete and Move.
Group Type is new terminology that defines whether a group may be used as a security principal (can be given permissions to access resources) and as a mail distribution list, or whether the group is strictly a mail distribution list.
Group Scope defines whether the group is Enterprise (Universal group), Domain (Domain Global, similar to Windows NT Global Groups) or Resource (Domain Local, similar to Windows NT Local Groups) wide. Universal Groups and nesting of any group type is only permissible when the domain is running in Native Mode. In Native Mode, the domain can not contain downlevel Windows NT 3.51 or 4.0 domain controllers.
The Active Directory provides a rich security model. To simplify the delegation of authority on objects in the Active Directory to specific users and groups, the "Delegation Wizard" will step administrators through a series of tasks that easily enable them to grant management permissions to users.
The User Principal Name (UPN) is the User Logon Name when accessing the network from Windows NT 5.0 Workstations. An example of a UPN is fredn@antipodes.com. In this release, the only available UPN suffix (for example, antipodes.com) is the domain tree name.
There is a problem promoting the a member server of a domain, ex. mydomain.com, to be a replica server of another domain, ex. myotherdomain.com.DCPROMO will report the following error:
The operation has failed. The error message is "The specified domain did not exist."
Note: This server has been unjoined from domain <NETBIOS name for the domain>.
To workaround this problem, make the server either a member of a workgroup, or a member of the domain for which you wish to make the replica server. Ex. If server myserver is a member server of mydomain.com, we make it a member of myotherdomain.com, or a member of workgroup MYWORKGROUP. Now DCPROMO should complete successfully.
After doing a DCPROMO, some user account privileges will have been removed. Web and Transaction services might not function properly. The following two workarounds will resolve the issue.
Logon Locally Right assigned to IUSR_<ComputerName), IWAM_<ComputerName>
Batch Logon Right assigned to MTS_Admin, IUSR_<ComputerName>, IWAM_<ComputerName>
The "Delegate Control " wizard in the Active Directory Service Manager tool does not correctly grant permissions on DS objects. In order to properly grant permissions on DS objects, use the Security property page of the DS object. This property page is accessible when "Advanced Features" is turned on in Active Directory Service Manager.
The Results Pane is not automatically updated after performing Move operations, deleting containers or Organization Units. Select "Refresh" or F5.
"Sheets up. Cannot delete it!" error message. This may occur when two people are administering the same domain simultaneously or if the user has displayed the properties of an object and then attempt to delete it from the snap-in without first closing the properly sheet.
Close any open property pages. Retry the operation. If there are no open pages, restart the Active Directory Manager.
Failure to modify properties for contact objects with LDAP_CONSTRAINT-VIOLATION. The information contained in the "Address" page for contact objects cannot be modified. Saving information on other pages for contacts will fail in the same way if the "Address" page was previously selected. Reopen the property pages for the contact, and make the modifications directly to the page on which you change the information (excluding "Address").
Logon hours set incorrectly for user accounts. Use User Manager to set the logon hours.
User account expiration date is set incorrectly. Use User Manager to set expiration date.
User's "Member Of" page fails to modify membership if attempting to add the user to a group in another domain to which the administrator does not have write permissions. Ensure the administrator has sufficient privileges in this domain.
Note: During IPSec testing between NT5 systems, if soft associations are established, they may last 8 hours. To delete these, you must log in as Administrator, bring up a command shell, and enter the command "net stop policyagent", followed by "net start policyagent".
If your filter is of the form from "Me" to "Any" IP address or perhaps "Me" to <subnet>, you may experience problems when the system attempts to do a DNS query to an non-IPSec enabled DNS server (NT4, other DNS servers, an NT5 DNS server that does not have IPSec turned on). This happens when the DNS server IP address falls within the destination range of the filter. To work around this, you can do several things:
If DNS name cant be resolved to IP address: A message will pop up if it can not resolve the name to an address.
IF DNS name can be resolved to IP address: the IP address is "cached" in the filter specification.
When the policy is retrieved by the computer, all DNS names in the filters are resolved to their current IP addresses. The new address is the one used. If the DNS lookup fails, then the IP address that is used is the one that was "cached" in the filter specification at the time that the filter was created. If not IP address could be cached, then the filter is discarded
. Generally filters should apply for both directions For IPSec to work between any two systems, you will need an inbound and outbound filter. For example, to use IPSEC from A to B , host A needs to have filter A -> B and another filter B->A. Host B also needs equivalent filters, source B -> destination A, and source A to destination B. The reverse filter can easily be done using the checkbox on the filter specification dialog "Mirrored. With this checkbox checked, a "Yes" will appear in the mirrored column in the filter specification list. The easiest filter specification to use is from "Me" to "Any IP address" with the checkbox markedIf Windows NT 5.0 computers are members of the same NT domain or members of trusted domains then the setup for IPSec is straightforward. Pre-defined IPSec policies are configured to use Windows NT 5.0 Kerberos for authentication. IPSec security should be able to be established easily by activating the polices on each system. As an administrator, you can activate IP Security two ways, using an MMC IPSec snapin administrative tool, or using the Network Connections user interface.
Note: this changes the IP security for all connections, not just the LAN connection.
On Windows NT5.0 Server
- Start -> Programs -> Administrative Tools -> IP Security Management
On Windows NT5.0 Workstation
The first thing to do is build an MMC management tool with all the tools that might be useful for managing IPSec policy and investigating the system behavior. After the management tool is built, you will save it to be run again easily.
Building an MMC IPSec management tool:
On either Windows NT 5.0 Workstation or Server
Now that you have an MMC management tool for IP security, simply activate an IPSec policy.
Note: If your computer is using IPSec policy assigned to it from the directory service, the PolicyAgent event log entry message will be informational and say "Using IPSec policy from the Active Directory", otherwise it will say "Using IPSec policy from the local registry". When using Active Directory policy, the MMC IPSec policy may show a local policy as being active when it is not actually be used by the policy agent.
If you were to look at the services running, you will see the IPSec Policy Agent as started, but still set as a manual start service. This means when you reboot, you will need to do a "net start policyagent" on the command line or start the service from the MMC node Computer Management -> Services -> IPSec Policy Agent
There are no IPSec policies created by default in the NT 5.0 directory service. If you want to use directory based policy, you must use the IPSec MMC snapin to create them. To do this,
When configuring an authentication method for a rule, if you choose certificates then the certificate authority name must be entered in a special format. The browse button currently returns the friendly name of the CA, not the full formatted text required. Follow this procedure to enter the CA name:
- If the Issuer Details appear as:
O = Company
L = Redmond
S = WA
C = US
- Starting at the bottom line of detail, format the line as follows ( the _ underbar characters represent spaces in the syntax below, semicolons delimit the fields):
C_=_US;_S_=_WA;_L_=_Redmond;_O_=_Company
If you have mis-entered this string as a CA name in the rule, the IKE negotiation process will not be able to find a certificate issued by the misspelled CA name. In the Event Security Log, a general processing failure is recorded.
Separately, every 8 hours the clients group policy editor engine (part of winlogon) will check for new policy assignment in the directory, including IPSec policy assignment. So changing to a new IPSec policy assignment for an OU will be detected on the interval, or when the client reboots.
When a client is moved from an OU/Domain which contains IPSec policy assignment, to an OU/Domain which does not have any IPSec policy, the policy that was cached on the local machine may in some cases not be deleted. Check the event log to verify the source of the policy.
RAS IPSec tunneling Client IPSec tunneling does not assign an internal IP address. The same IP address on clients must be used for both the source address of the tunnel and source address for the end-to-end communication.For clients you have to provide either a specific IP address or a DNS name as the tunnel end point. Do not set "Any IP" address or subnet address (128.0.0.0) as the tunnel end point on the client.
For testing IPSec tunnel servers, should specify filters from "Any" or a subnet going to each clients IP address.
Router-router tunnel A ---- GW1 ====== GW2 ----- BThe policy on GW1 should have a rule with a filter specification that says from subnet A going to subnet B, use tunnel end point of GW2, NOT mirrored. And have another filter that specifies from B to A use GW1 as the tunnel end point.
The policy on GW2 should have a rule with a filter specification that says from subnet B going to subnet A, use tunnel end point of GW1, NOT mirrored. And going from subnet A to subnet A use GW2 as the tunnel end point.
Two or more default routes with the same metric On multi-homed machines, make sure you don't have two default routes with the same metric. This can cause ISAKMP negotiation to fail. Symptoms: your negotiation fails going from host A to host B, but succeeds when B initiates to A. ISAKMP policy settingsThe IPSec policy settings for ISAKMP Perfect Forward Secrecy (PFS) for phase 1 and phase 2, as well as the phase 2 key lifetimes must be set identically on each end point. If you do not change the pre-canned policies, you should not encounter this problem.
If you make changes to the phase 2 key lifetimes, make sure the number of bytes transferred per re-key is very large, such as 20Mb or greater. The actual minimum recommended value depends on how much data is being transferred at what rate. A smaller value results in rekey negotiations which are too fast such that they never complete the first renegotiation before starting the second.
Export version of the NT5.0 builds will allow you to configure IPSec policies, such as 56bit DES or 3DES, that the underlying mechanisms do not support.
If the problem can not be resolved using the checklist of steps above, gather the following information, and send it to the Windows NT5.0 Beta Support networking team using typical bug reporting tools. If the problem is reproducible, then output from the commands listed below before and after is most helpful.
Title of Problem (25 words or less):
Description of computer on which the problem is observed:
Description of what you are trying to do
What is the security you want
Description of what happened, the observed problem
Description of the local network to which that computer is connected:
Checks identity of users in Microsoft Windows NT 4.0 domains, Windows NT 5.0 Active Directory, Windows NT 5.0 local Security Accounts Manager (SAM).
List of supported authentication types are:
The Remote Access Policies feature is used to authorize users for access to the network.
Accounting:Windows NT 4.0 IAS log format, and ODBC-compatible Log File Format.
Network Access Servers:IAS is compatible with popular network access servers, such as Ascend, Bay Networks, Cisco, Microsoft Windows NT Remote Access Service, Livingston, U.S. Robotics, and 3Com.
- Verify that Active Directory is switched to "native" mode.
- Verify that the machine running the IAS service has permission to read the user object in that domain.
- If the machine running the IAS service is a member of that domain, then click Register Service in DS in the IAS taskpad to create the access control lists (ACLs) in the directory service.
- If the machine running the IAS service is not a member of that domain, then, create a access control list (ACL) on the user's container so that it allows Read access to all User Objects within the user's container.
In previous versions of Windows NT Server, Services for Macintosh was installed from Network in Control Panel to enable management of Macintosh file and print services. With this release of Windows NT Server, Services for Macintosh is split into File Services for Macintosh, Print Services for Macintosh, and the AppleTalk protocol. In this release, Macintosh clients can use the TCP/IP protocol to access shares on a Windows NT Server that is running File Services for Macintosh (AFP over IP).
Notes
Note that if you install Print Services for Macintosh and have not already installed the AppleTalk protocol, the protocol is installed automatically.
You can install the AppleTalk protocol separately from File Services for Macintosh or Print Services for Macintosh. For example, you can install the AppleTalk protocol for routing purposes only. In this situation, you need AppleTalk, but not File or Print Services for Macintosh.
Note
Note
AppleTalk protocol propertiessuch as a default adapter type and a default zoneare now configured per-connection in the Network Connections folder.
Note
AppleTalk routing propertiessuch as a network range and whether to enable routing, and the zone listare now configured by using the Routing and Remote Access Management console.
Note
In previous versions of Windows NT Server, the Macfile program handled Macintosh file administration, including the creation of Macintosh volumes, passwords, security options, user limits, and permissions. Access to the Macfile menu was from Control Panel, File Manager, and Server Manager. Macintosh volumes and files are now centrally administered through the File Service Management snap-in of the Microsoft Management Console. Both Macintosh and non-Macintosh files are administered by using File Service Management. This improves the integration of Macintosh file management with non-Macintosh files.
Macintosh users may dial in to Windows NT Server 5.0 by using the AppleTalk Remote Access Protocol (ARAP). ARAP installs automatically if the Remote Access Service and AppleTalk protocol are installed. The AppleTalk protocol installs automatically with Print Services for Macintosh. The AppleTalk protocol may also be installed separately. Windows NT Server version 5.0 for ARAP includes the following features:
Note
ARAP client callback functionality is identical to other Dial-In client types. Callback ensures that only users from specific locations can access the Dial-Up server. This saves toll charges for the user. In addition, the ARAP client may specify their number to be called back at the time they dial in, if their account is enabled for callback. To do this, the user specifies their username as Username@Phonenumber. For example, a user called "JohnSmith," whose account is configured for callback, wants to be called back at "5551234." He can enter JohnSmith@5551234 as his user name, and he will get called back at that number.
Guest account authentication and access authorization are identical under ARAP as any other dial-in method.
ARAP requires that user passwords be saved in reversibly encrypted clear-text format on the Dial-Up server. By default, passwords are not stored on the Dial-Up server in clear-text format. Because of the clear-text format requirement, existing users who want to use the ARAP protocol must have their passwords converted to clear-text format in one of two ways. Their administrator must first enable the Dial-Up server to store passwords in clear-text format. For existing accounts, the administrator can then either delete and recreate the accounts, or change the password for the account. Either way, the password is then stored in clear-text format, and the user can dial in using the ARAP protocol.
All account passwords created after enabling clear-text password storage will be saved in clear-text format.
In this release, you cannot store passwords on a domain-wide basis. Instead, you can do it on a per-user basis. So for ARAP clients and to allow Apple Encrypted passwords to work, for each user the admin must:
Note
Note
Macintosh clients may experience problems using the AppleTalk Remote Access Server Callback feature. Specifically, a client may connect initially when they call the server, but when the server calls the client back, modem negotiation fails and the client cannot reconnect.
This is a known issue and requires updating the client modem script file. To resolve the problem, obtain the most current client modem script file from the modem manufacturer, reinstall the script file, and connect again.
Note
Messages to Macintosh users are sent from the File Service Management snap-in. Messages can only be sent to all Macintosh users of the server. Messages cannot be sent to individual users or to those users accessing a particular volume.
Macintosh volume names created by using Windows NT Server version 5.0 cannot exceed 12 characters in length. To create volumes with longer names, you must use the command-line tool Macfile.exe.
For example, to add a volume called Landscape Design on the Error! Bookmark not defined. server using the TREES folder on drive E:, type
macfile volume /add /server:\\magnolia /name:"Landscape Design" /path:e:\trees
When Macintosh user accounts or passwords expire, the Macintosh client receives an inaccurate error message from Windows NT Server. The error message indicates that either the account name or the password is incorrect.
To correct the situation, the Macintosh users password must be changed by the administrator at the Windows NT Server version 5.0 computer.
Administration of Certificate Services - The administration model for Certificate Services has changed with this release. Users of the v1.0 Certificate Server will recall that administration was performed using web pages. Starting with this release, all administration will be done using MMC snap-ins.
Enterprise Policy - A new policy module called "Enterprise Policy" has been included in this release. This is in addition to the default policy shipped with Certificate Server v1.0 and shipped here as well. Enterprise policy is intended to address the need for a policy module that works "out of the box" and is administratable using a provided GUI. Enterprise Policy also publishes CA information, CRLs and user certificates to the Active Directory. Enterprise Policy requires the Active Directory.
Certificate Hierarchies - Certificate Hierarchies are now supported.
- Certificate Services supports processing of requests for certificates from the Certificate Manager. The Certificate Manager is a new MMC snap-in that manages certificates and certificate stores for a user or machine. It is documented elsewhere.Certificate Manager
No upgrade support from previous releases of Certificate Server
It is not possible to upgrade from a previous release of Certificate Server (i.e., v1.0 and its Betas, or NT5 Beta 1), to this release of Certificate Services. This will be addressed in a future release. However, when upgrade support is provided, it will only be from Certificate Server v1.0 on NT 4 to the final release of Certificate Services on NT 5. Upgrades from interim releases will not be provided.
Not all available Cryptographic Service Providers have been tested for use with Certificate Services.
When you install the certificate server, you have a capability to set the specific cryptographic parameters to be used. The form on which this is done is displayed when you check the Advanced options box on the Certificate Authority Type Selection form. When you then click Next, the Public Private Key Pair Generation form will then be displayed. On this form is a scrollable listbox entitled "Cryptographic service providers". This listbox contains the names of all CSPs installed on this machine. The only CSP which has been tested with this release of Certificate Services is the Microsoft Base Cryptographic Provider v1.0 (this is the default). You may also see displayed CSPs for DSS or for various smartcards. The installation process will allow you to select these CSPs, however, no testing has been done with these, they are not supported for use with Certificate Services in this release, and results are unpredictable.
For enterprise policy, the ability to issue certificates is controlled by adding ACLs to certificate templates. There are two ways to do this using the Certificate Templates MMC extension. In this release only one of these ways will work. Using the Certificate Templates extension and the templates listed in the results pane, right click on the template for which you wish to set an ACL. Select the Task menu, followed by the Edit option. This will launch the Certificate Template Wizard. Make your changes as prompted through the Wizard. Using this method will ensure that your changes are made and committed. The other option, using the Properties page for the template, will not work in this release.
Use the Certificate Manager MMC snap-in to obtain certificates when using Enterprise Policy.
With this release, certificates must be obtained using the Certificate Manager when using Enterprise Policy. The web pages available with the v1.0 release are not installed in this release when an Enterprise root or subordinate CA is installed. These will be incorporated in a future release.
The enrollment web pages are still installed when a Stand Alone root or subordinate CA is installed. These may be used just as they were with the v1.0 Certificate Server.
IIS Server Certificate requests are not valid for Enterprise policy
With this release, Certificate Services supports two policy modules. One is called the "Enterprise" policy module and gets installed whenever an Enterprise root or subordinate CA is installed. The other is called the "Default" policy and gets installed whenever a Stand Alone root or subordinate CA is installed. Certificate requests generated by IIS dont currently work with Enterprise policy. Certificate requests from IIS will only work with Default policy in this release. This will be added in a future release.
Microsoft Certificate Services requires that the Subject Common Name specified for the Certificate Server itself during initial setup be limited to the following characters:
a-zA-Z0-9 {space} \()+-./:=?
For maximum compatibility with non-Microsoft systems, it is recommended that all characters of each RDN in any DN specified in a certificate request, issued certificate, and the Certificate Server itself, be further limited to the following characters:
a-zA-Z0-9 {space} ()+-./:=?
IE 5 is not correctly recognized when using Certificate Services web pages.
This is because the browscap.ini file distributed with this release does not correctly specify IE 5. As such, the web pages supplied with Certificate Services are not able to correctly identify IE 5 as a version of Internet Explorer and the wrong pages will be used during enrollment. This will cause enrollment to fail, most likely with an error code of 80093004 on page kgaccept.asp.
This can be fixed manually by editing browscap.ini and a reboot of the server system (to force usage of the updated browscap.ini). You must add the following to the list of valid Microsoft browsers:
;;ie5 in nt5 (TEMP)
[Mozilla/4.0 (compatible; MSIE 5.0; Windows NT 5.0)]
parent=IE 4.0
platform=WinNT
beta=True;;ie5 in nt5 (TEMP2)
[Mozilla/4.0 (compatible; MSIE 5.0b1; Windows NT 5.0)]
parent=IE 4.0
platform=WinNT
beta=TrueThese should be added just before the line for the IE 4.x Wildcard entries, that reads:
;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;; IE 4.x WILDCARD (IF ALL ABOVE FAIL)
Name changes are in process.
This release renames what was formerly known as "Certificate Server" to "Certificate Services". At this time the work needed to complete this is only partially done. In particular, the documentation will often refer to "Certificate Services", whereas the forms will always say "Certificate Server". These terms mean the same thing.
Additionally, most of the documentation describing how to perform tasks using Certificate Services has not yet been incorporated into the standard documentation facility supplied with NT 5. As such, see the section titled Certificate Services Documentation
This section will provide elements of documentation about Certificate Services that has not yet been incorporated into the standard documentation supplied with NT 5. Specifically, what follows is focused on how to perform various administrative tasks. This information will be incorporated in the standard documentation for NT 5 in a future release.
General Prerequisites
- Be logged in to an account that is a member of the Administrators or Cert Server Admins group that controls the certificate services system to be administered.
- Know the name of the certificate services system that you want to administer. This name is uniquely identified by the machine name and the Common Name (CN) of the Distinguished Name (DN) of the certification authority.
- Have added the Certificate Services Manager snap-in for the machine on which the certificate services system in question is running.
To Start or Stop the Certificate Services Service:
To View the certificate of the Certification Authority
To View the current Certificate Revocation List (CRL)
To configure the Certificate Services system to use a new Policy Module
To configure the Certificate Server to use a new Exit Module
To revoke an issued certificate
Notes: The result of this action is that the certificate will be marked as revoked. As such it is no longer displayed in the result panel when the Issued Certificates folder is open. To see the certificate, double click on the Revoked Certificates folder. To publish the fact that this certificate has been revoked, you will need to create and publish a CRL. This is described elsewhere in this document.
To back up the Certificate Services database
To restore the Certificate Services database
To schedule automatic CRL publication
To manually publish a CRL
To add a certificate template to the valid list of certificates to issue
To remove a certificate template from the valid list of certificates to issue
To add a new certificate template
To display issuance policy for a certificate template
To edit basic information or issuance policy for a certificate template
To customize the result pane
To specify query parameters
To Install a Root Certification Authority
To Uninstall a Certification Authority
To Install a Subordinate Certification Authority
Online
- Click the radio button with the label "Send the request directly to a CA already on the network.
- Select the desired CA to service the certificate request. This can be done in two ways. First, by using the Browse button to search the directory for available CAs. Second, by directly specifying it in the Parent CA and Computer Name text boxes. Click Next.
Offline
- Click the radio button with the label "Save the request to a file".
- If you wish to change the default name or location of the request file, click "Browse " and use the Save As dialog to make the changes desired. Click Save. Click Next.
- An informational message will now be displayed that instructs you to use the request file created to obtain a certificate from the parent CA. Click OK.
- Obtain this CAs certificate from the parent CA. The procedure for this will be unique to the parent CA and must be obtained from that CA. At a minimum, the parent CA should provide a file containing the subordinate CAs newly issued certificate and the chain of CAs above it. The format of this file is as a BASE64-encoded X.509v3 certificate.
- Using the Certificate Services Manager snap-in, do the following
- Right click on the node with the CN of the certification authority in question
- Select the Task menu, followed by the Install CA Certificate option
- Use the file selection dialog box to locate the certificate file
- Select the file and click Open
- The certificate will be installed and Certificate Services will be started
- Right click on the node of the certification authority and select Refresh. The status icon for the certification authority will change from disabled to enabled
To Install the Web Client Only
Logon Locally Right assigned to IUSR_<ComputerName), IWAM_<ComputerName>
Batch Logon Right assigned to MTS_Admin, IUSR_<ComputerName>, IWAM_<ComputerName>
This release of Internet Information Server does not support:
- Installation on domain controllers
- Secure Sockets Layer (SSL)
- Client certificate mapping
- Custom error messages
The Key Manager application will be installed by default, but is no longer used to manage certificates.
The IntelliMirror Remote Boot Machine Replacement feature will provide organizations with an easy way to roll out and upgrade an OS, and or recover failed Windows NT 5.0 workstations throughout a corporate network. Below are some of the known issues to be aware of in this Interim Developer's Release
- Do not install the remote boot directory on the same drive that the Windows NT system is installed on. Choose a separate drive that has been formatted with NTFS v5.
- Do not install the DHCP service on the remote boot server machine. These services must be installed on separate server machines.
- Different vendor machine replacement, grouping of remote boot servers, and pre-staging client machine features are not supported within this IDW/S release.
- The following Network PC's are supported in this IDW/S release:
- Hewlett Packard Netvectra
- Compaq Deskpro 4000 N and S models
- The following network cards are supported with the Remote Boot Floppy. The floppy creation utility can be found on the Windows NT CD-ROM under the \Valueadd directory:
- 3Com 3c90x network cards
- HP DeskDirect 10/100 tx
- Intel Pro 100+ and 100B models
Disk replacement with RAW disks is not supported.
The client side caching feature should be disabled on all Domain Controllers and unattended servers, to prevent the possibility of accidentally taking the SMB client offline and using cached data. In order to do this, the following key in the registry should be set:
HKLM/System/CurrentControlSet/Services/MRxSmb/Parameters/CscEnabled REG_DWORD 0
A reboot is required for this to take effect.
On Replicated DCs it is possible that Group Policy information
has not been replicated to its replication partners when an attempt is made to modify
Group Policy information on a replicated DC. To lessen this possibility:
These are normal issues for a replicated environment. We will be making
changes for Beta2 that will lessen the occurrence of these situations. A Group Policy Object (GPO) is made of Sysvol data and DS data. When a client logs on
using a DC that has a GPO with out of sync data (caused by replication schedule
differences) the client will get the what amounts to cached policy. In other
words, any new policy will not be applied until the GPO is back in sync. To turn on Advanced mode for the AD Manager, Right Click on the "root node"
select View and then select Advanced Features. This enables the ability to view the
storage location of the GPO. While in the GPE, bring up the task menu on the root
node and select Properties. The "Block Policy inheritance from parent containers" check box of the Group
Policy Manager is non-functional In the Group Policy Manager dialog it is not evident what Domain the GPO lives in. This
will be fixed for Beta2. For this release this can be found by using the Add button and
selecting "Use existing..." and then Browse. Using the Domain drop down list it
is possible to see a list of all GPOs per Domain. Cancel back out of the dialogs if you do
not want to actually add a GPO to your existing SDOU. The Group Policy Manager Security tab is not present in the IDS. Therefore the affect
of Group Policy for an entire SDOU can not be filtered with Security Groups. This can be
done at the GPO level by using the Security tab at the "root node" of the GPO in
the GPE When the GPE is run against the local machine.
Verbose mode may be enabled to diagnose Group Policy processing. In this IDS the
Application Deployment and Security Settings extensions do not provide any verbose errors.
They will in Beta2. You can use the PolTest tool to enable this or use regedt32 to set the
appropriate registry value. To turn on Verbose logging to the Event log. Enable the RunDiagnosticLoggingGlobal or
RunDiagnosticLoggingGroupPolicy keys. This will tun on Verbose Diagnostic Logging
for Winlogon processing. The other keys listed below are here for completeness.
0 = Normal Logging (as done today in NT4) File deployment to the IE Favorites folder will not display any files
other than shortcuts. Application of Policy frequency - By default Policy is NOT periodically updated. This
may be changed using the Sample GPE extension. We are interested in your feedback on
whether the default should be on or off, but still allow the administrator to turn this
feature on or off, on an as needed basis. Please send your feedback to ManageIt@Microsoft.Com mailto:ManageIt@Microsoft.Com. Logon processing of Group Policy -
Due to the asynchronous logon process of policies, any shell initialization done with
logon scripts may not be processed during the first logon. This would occur if the shell
finishes initialization before the scripts could be executed. Distinguished names are not valid in the NT 5 shells open file dialogs in the
IDS. Therefore they are not valid in the Samples node when specifying a server in the My
Documents sample. Use only the NETBIOS file:///\\server/share naming
convention.
1 = Verbose Logging (similar to what some folks do with debug DLLs)
Default is 0 (or value missing completely)
The Software Policies node of the GPE is only partially complete in this release. It will be for Beta2. Any policy that is more than enabled/disabled will not be able to be changed. Also in this release some policies do not cause the correct action. This will be fixed for Beta2.
In the Interim Developer's Release, there are two Add/Remove Programs applets (Add/Remove Programs and Add/Remove Programs -v2). Add/Remove Programs is now web based and used for adding, removing, or modifying existing applications installed on Windows NT 5.0. Add/Remove Programs - v2 is used for the installation, removal and maintenance of applications deployed through Application Management.
The new Add/Remove Programs applet is now fully functional. The old Add/Remove Programs v2 has not been removed yet it can be used as a backup if you have any problems with the new one. The new Add/Remove Programs might take some time until it displays the initial page. The performance will be improved for beta2. Also the information displayed for the apps might not be accurate at this time. (size, support URL, etc.)