Upgrade Domain Controllers to Windows Server 2012 R2 and Windows Server 2012
Applies To: Windows Server 2012 R2, Windows Server 2012
This topic provides background information about Active Directory Domain Services in Windows Server 2012 R2 and Windows Server 2012 and explains the process for upgrading domain controllers from Windows Server 2008 or Windows Server 2008 R2.
Deprecated features and behavior changes related to AD DS in Windows Server 2012
AD DS interoperability with other server roles and Windows operating systems
Domain controller upgrade steps
The recommended way to upgrade a domain is to promote domain controllers that run newer versions of Windows Server and demote older domain controllers as needed. That method is preferable to upgrading the operating system of an existing domain controller. This list covers general steps to follow before you promote a domain controller that runs a nnewer version of Windows Server:
Verify the target server meets system requirements.
Verify Application compatibility.
Verify security settings. For more information, see Deprecated features and behavior changes related to AD DS in Windows Server 2012 and Secure default settings in Windows Server 2008 and Windows Server 2008 R2.
Check connectivity to the target server from the computer where you plan to run the installation.
Check for availability of necessary operation master roles:
To install the first DC that runs Windows Server 2012 in an existing domain and forest, the machine where you run the installation needs connectivity to the schema master in order to run adprep /forestprep and the infrastructure master in order to run adprep /domainprep.
To install the first DC in a domain where the forest schema is already extended, you only need connectivity to infrastructure master.
To install or remove a domain in an existing forest, you need connectivity to the domain naming master.
Any domain controller installation also requires connectivity to the RID master.
If you are installing the first read-only domain controller in an existing forest, you need connectivity to the infrastructure master for each application directory partition, also known as a non-domain naming context or NDNC.
Be sure to supply the necessary credentials to run the AD DS installation.
Installation action
Credential requirements
Install a new forest
Local Administrator on the target server
Install a new domain in an existing forest
Enterprise Admins
Install an additional DC in an existing domain
Domain Admins
Run adprep /forestprep
Schema Admins, Enterprise Admins, and Domain Admins
Run adprep /domainprep
Domain Admins
Run adprep /domainprep /gpprep
Domain Admins
Run adprep /rodcprep
Enterprise Admins
You can delegate permissions to install AD DS. For more information, see Installation Management Tasks.
Steps-by-step instructions to promote new and replica Windows Server 2012 domain controllers using Windows PowerShell cmdlets and Server Manager can be found in the following links:
Install a New Windows Server 2012 Active Directory Forest (Level 200)
Install a Replica Windows Server 2012 Domain Controller in an Existing Domain (Level 200)
Install a New Windows Server 2012 Active Directory Child or Tree Domain (Level 200)
Install a Windows Server 2012 Active Directory Read-Only Domain Controller (RODC) (Level 200)
Step-by-Step Guide for Setting Up Windows Server 2012 Domain Controller (en-US)
What's new in Windows Server 2012?
New features listed by server role and technology area are listed in the following table. For more whitepapers, video demonstrations, and presentations about other features in Windows Server 2012, see Server and Cloud Platform.
Automatic Maintenance and changes to restart behavior after updates are applied by Windows Update
Prior to the release of Windows 8, Windows Update managed its own internal schedule to check for updates, and to download and install them. It required that the Windows Update Agent was always running in the background, consuming memory and other system resources.
Windows 8 and Windows Server 2012 introduce a new feature called Automatic Maintenance. Automatic Maintenance consolidates many different features that each used to manage its own scheduling and execution logic. This consolidation allows for all these components to use far less system resources, work consistently, respect the new Connected Standby state for new device types, and consume less battery on portable devices.
Because Windows Update is a part of Automatic Maintenance in Windows 8 and Windows Server 2012, its own internal schedule for setting a day and time to install updates is no longer effective. To help ensure consistent and predictable restart behavior for all devices and computers in your enterprise, including those that run Windows 8 and Windows Server 2012, see Microsoft KB article 2885694 (or see October 2013 cumulative rollup 2883201), then configure policy settings described in the WSUS blog post Enabling a more predictable Windows Update experience for Windows 8 and Windows Server 2012 (KB 2885694).
What’s new in AD DS in Windows Server 2012 R2?
The following table summarizes new features for AD DS in Windows Server 2012 R2, with a link to more detailed information where it is available. For a more detailed explanation of some features, including their requirements, see What's New in Active Directory in Windows Server 2012 R2.
Feature |
Description |
---|---|
Allows information workers to join their personal devices with their company to access company resources and services. |
|
Provides access to web application using a new Remote Access role service. |
|
AD FS has simplified deployment and improvements to enable users to access resources from personal devices and help IT departments manage access control. |
|
Domain Controllers running Windows Server 2012 R2 block the creation of duplicate service principal names (SPNs) and user principal names (UPNs). |
|
Enables lock screen applications to be restarted and available on Windows 8.1 devices. |
|
Enables CAs to cryptographically attest in an issued certificate that the certificate requester private key is actually protected by a Trusted Platform Module (TPM). |
|
New credential protection and domain authentication controls to reduce credential theft. |
|
The Windows Server 2003 domain functional level is also deprecated because at the functional level, FRS is used to replicate SYSVOL. That means when you create a new domain on a server that runs Windows Server 2012 R2, the domain functional level must be Windows Server 2008 or newer. You can still add a domain controller that runs Windows Server 2012 R2 to an existing domain that has a Windows Server 2003 domain functional level; you just can’t create a new domain at that level. |
|
There are new functional levels for Windows Server 2012 R2. New features are available at Windows Server 2012 R2 DFL. |
|
Performance improvement in LDAP search efficiency and LDAP search time of complex queries. |
|
LDAP search result statistics were added to event ID 1644 to aid in troubleshooting. |
|
Adjusts the maximum AD Replication throughput from 40Mbps to around 600 Mbps |
What’s new in AD DS in Windows Server 2012?
The following table summarizes the new features for AD DS in Windows Server 2012, with a link to more detailed information where it is available. For a more detailed explanation of some features, including their requirements, see What’s New in Active Directory Domain Services (AD DS).
Feature |
Description |
---|---|
Active Directory-Based Activation (AD BA) see Volume Activation Overview |
Simplifies the task of configuring the distribution and management of volume software licenses. |
Adds role install via Server Manager, simplified trust-setup, automatic trust management, SAML-protocol support, and more. |
|
Active Directory lost page flush events |
NTDS ISAM event 530 with jet error -1119 is logged to detect lost page flush events to Active Directory databases. |
Active Directory Administrative Center (ADAC) adds GUI management of recycle bin feature originally introduced in Windows Server 2008 R2. |
|
Active Directory Replication and Topology Windows PowerShell cmdlets |
Supports the creation and management of Active Directory sites, site-links, connection objects, and more using Windows PowerShell. |
New claims-based authorization platform that enhances the legacy access control model. |
|
ADAC adds GUI support for the creating, editing and assignment of PSOs originally added in Windows Server 2008. |
|
A new security principal type known as a gMSA. Services running on multiple hosts can run under the same gMSA account. |
|
Extends offline domain-join by including DirectAccess prerequisites. |
|
Virtualized DCs can be rapidly deployed by cloning existing virtual domain controllers using Windows PowerShell cmdlets. |
|
Adds new monitoring events and quotas to safeguard against excessive consumption of the global RID pool. Optionally doubles the size of the global RID pool if the original pool becomes exhausted. |
|
Secure Time service |
Enhances security for W32tm by removing secrets from the wire, removing the MD5 hash functions and requiring the server to authenticate with Windows 8 time clients |
Accidentally restoring snapshot backups of virtualized DCs no longer causes USN rollback. |
|
Allow administrators to view the Windows PowerShell commands executed when using ADAC. |
Automatic Maintenance and changes to restart behavior after updates are applied by Windows Update
Prior to the release of Windows 8, Windows Update managed its own internal schedule to check for updates, and to download and install them. It required that the Windows Update Agent was always running in the background, consuming memory and other system resources.
Windows 8 and Windows Server 2012 introduce a new feature called Automatic Maintenance. Automatic Maintenance consolidates many different features that each used to manage its own scheduling and execution logic. This consolidation allows for all these components to use far less system resources, work consistently, respect the new Connected Standby state for new device types, and consume less battery on portable devices.
Because Windows Update is a part of Automatic Maintenance in Windows 8 and Windows Server 2012, its own internal schedule for setting a day and time to install updates is no longer effective. To help ensure consistent and predictable restart behavior for all devices and computers in your enterprise, including those that run Windows 8 and Windows Server 2012, you can configure the following Group Policy settings:
Computer Configuration|Policies|Administrative Templates|Windows Components|Windows Update|Configure Automatic Updates
Computer Configuration|Policies|Administrative Templates|Windows Components|Windows Update|No auto-restart with logged on users
Computer Configuration|Policies|Administrative Templates|Windows Components|Maintenance Scheduler|Maintenance Random Delay
The following table lists some examples of how to configure these settings to provide desired restart behavior.
Scenario |
Recommended configuration(s) |
WSUS managed
|
Set machines to auto-install, prevent auto-reboot until desired time Policy: Configure Automatic Updates (Enabled) Configure automatic updating: 4 – Auto download and schedule the install Policy: No auto-restart with logged-on users… (Disabled) WSUS deadlines: set to Fridays at 11PM |
WSUS managed
|
Set target groups for different groups of machines that should be updated together Use above steps for previous scenario Set different deadlines for different target groups |
Not WSUS-managed – no support for deadlines
|
Policy: Configure Automatic Updates (Enabled) Configure automatic updating: 4 – Auto download and schedule the install Registry key: Enable the registry key discussed in Microsoft KB article 2835627 Policy: Automatic Maintenance Random Delay (Enabled) Set Regular maintenance random delay to PT6H for 6-hour random delay to provide the following behavior:
Alternatively, set a different maintenance time for each group of machines |
For more information about why the Windows engineering team implemented these changes, see Minimizing restarts after automatic updating in Windows Update.
AD DS server role installation changes
In Windows Server 2003 through Windows Server 2008 R2, you ran the x86 or X64 version of the Adprep.exe command-line tool before running the Active Directory Installation Wizard, Dcpromo.exe, and Dcpromo.exe had optional variants to install from media or for unattended installation.
Beginning in Windows Server 2012, command-line installations are performed by using the ADDSDeployment Module in Windows PowerShell. GUI-based promotions are performed in Server Manager using a completely new AD DS Configuration Wizard. To simplify the installation process, ADPREP has been integrated into the AD DS installation and runs automatically as needed. The Windows PowerShell–based AD DS Configuration Wizard automatically targets the schema and infrastructure master roles in the domains where DCs are being added, then remotely runs the required ADPREP commands on the relevant domain controllers.
Prerequisite checks in the AD DS Installation Wizard identify potential errors before the installation begins. Error conditions can be corrected to eliminate concerns from a partially complete upgrade. The wizard also exports a Windows PowerShell script that contains all the options that were specified during the graphical installation.
Taken together, the AD DS installation changes simplify the DC role installation process and reduce the likelihood of administrative errors, especially when you are deploying multiple domain controllers across global regions and domains. More detailed information on GUI and Windows PowerShell-based installations, including command line syntax and step-by-step wizard instructions, see Install Active Directory Domain Services. For administrators that want to control the introduction of schema changes in an Active Directory forest independent of the installation of Windows Server 2012 DCs in an existing forest, Adprep.exe commands can still be run at an elevated command prompt.
Deprecated features and behavior changes related to AD DS in Windows Server 2012
There are some changes related to AD DS:
Deprecation of Adprep32.exe
There is only one version of Adprep.exe and it can be run as needed on 64-bit servers that run Windows Server 2008 or later. It can be run remotely, and must be run remotely if that targeted operations master role is hosted on a 32-bit operating system or Windows Server 2003.
Deprecation of Dcpromo.exe
Dcpromo is deprecated although in Windows Server 2012 only it can still be run with an answer file or command line parameters to give organizations time to transition existing automation to the new Windows PowerShell installation options.
LMHash is disabled on user accounts
Secure defaults in Security templates on Windows Server 2008, Windows Server 2008 R2 and Windows Server 2012 enable the NoLMHash policy which is disabled in the security templates of Windows 2000 and Windows Server 2003 domain controllers. Disable the NoLMHash policy for LMHash-dependent clients as required, using the steps in KB article 946405.
Beginning with Windows Server 2008, domain controllers also have the following secure default settings, compared to domain controllers that run Windows Server 2003 or Windows 2000.
Encryption type or policy |
Windows Server 2008 default |
Windows Server 2012 and Windows Server 2008 R2 default |
Comment |
AllowNT4Crypto |
Disabled |
Disabled |
Third-party Server Message Block (SMB) clients may be incompatible with the secure default settings on domain controllers. In all cases, these settings can be relaxed to allow interoperability, but only at the expense of security. For more information, see article 942564 in the Microsoft Knowledge Base (https://go.microsoft.com/fwlink/?LinkId=164558). |
DES |
Enabled |
Disabled |
Article 977321 in the Microsoft Knowledge Base (https://go.microsoft.com/fwlink/?LinkId=177717) |
CBT/Extended Protection for Integrated Authentication |
N/A |
Enabled |
See Microsoft Security Advisory (937811) (https://go.microsoft.com/fwlink/?LinkId=164559) and article 976918 in the Microsoft Knowledge Base (https://go.microsoft.com/fwlink/?LinkId=178251). Review and install the hotfix in article 977073 (https://go.microsoft.com/fwlink/?LinkId=186394) in the Microsoft Knowledge Base as required. |
LMv2 |
Enabled |
Disabled |
Article 976918 in the Microsoft Knowledge Base (https://go.microsoft.com/fwlink/?LinkId=178251) |
Operating system requirements
The minimum system requirements for Windows Server 2012 are listed in the following table. For more information about system requirements and pre-installation information, see Installing Windows Server 2012. There are no additional system requirements to install a new Active Directory forest, but you should add sufficient memory to cache the contents of Active Directory database in order to improve performance for domain controllers, LDAP client requests, and Active Directory-enabled applications. If you are upgrading an existing domain controller or adding a new domain controller to an existing forest, review the next section to ensure the server meets disk space requirements.
Processor |
1.4 Ghz 64-bit processor |
RAM |
512 MB |
Free disk space requirements |
32 GB |
Screen resolution |
800 x 600 or higher |
Miscellaneous |
DVD drive, keyboard, Internet access |
Disk space requirements for upgrading domain controllers
This section covers disk space requirements only for upgrading domain controllers from Windows Server 2008 or Windows Server 2008 R2. For more information about disk space requirements for upgrading domain controllers to earlier versions of Windows Server, see Disk space requirements for upgrading to Windows Server 2008 or Disk space requirements for upgrading to Windows Server 2008 R2.
Size the disk that hosts the Active Directory database and log files in order to accommodate the custom and application-driven schema extensions, application and administrator-initiated indexes, plus space for the objects and attributes that you will be added to the directory over deployment life of the domain controller (typically 5 to 8 years). Right sizing at deployment time is typically a good investment compared to greater touch costs required to expand disk storage after deployment. For more information, see Capacity Planning for Active Directory Domain Services.
On domain controllers that you plan to upgrade, make sure that the drive that hosts the Active Directory database (NTDS.DIT) has free disk space that represents at least 20% of the NTDS.DIT file before you begin the operating system upgrade. If there is insufficient free disk space on the volume, the upgrade can fail and the upgrade compatibility report returns an error indicating insufficient free disk space:
In this case, you can try an offline defragmentation of the Active Directory database to recapture additional space, and then retry the upgrade. For more information, see Compact the Directory Database File (Offline Defragmentation).
Available SKUs
There are 4 editions of Windows Server: Foundation, Essentials, Standard and Datacenter. The two editions that support the AD DS role are Standard and Datacenter.
In previous releases, Windows Server editions differed in their support of server roles, processor counts and large memory support. The Standard and Datacenter editions of Windows Server support all features and underlying hardware but vary in their virtualization rights – two virtual instances are allowed for Standard edition and unlimited virtual instances are allowed for Datacenter edition.
Windows client and Windows Server operating systems that are supported to join Windows Server domains
The following Windows client and Windows Server operating systems are supported for domain member computers with domain controllers that run Windows Server 2012 or later:
Client operating systems: Windows 8.1, Windows 8, Windows 7, Windows Vista, Windows XP
Computers that run Windows 8.1 or Windows 8 are also able to join domains that have domain controllers that run earlier version of Windows Server, including Windows Server 2003 or later. In this case however, some Windows 8 features may require additional configuration or may not be available. For more information about those features and other recommendations for managing Windows 8 clients in downlevel domains, see Running Windows 8 member computers in Windows Server 2003 domains.
Server operating systems: Windows Server 2012 R2, Windows Server 2012, Windows Server 2008 R2, Windows Server 2008, Windows Server 2003 R2, Windows Server 2003
Supported in-place upgrade paths
Domain controllers that run 64-bit versions of Windows Server 2008 or Windows Server 2008 R2 can be upgraded to Windows Server 2012. You cannot upgrade domain controllers that run Windows Server 2003 or 32-bit versions of Windows Server 2008. To replace them, install domain controllers that run a later version of Windows Server in the domain, and then remove the domain controllers that Windows Server 2003.
If you are running these editions |
You can upgrade to these editions |
---|---|
Windows Server 2008 Standard with SP2 OR Windows Server 2008 Enterprise with SP2 |
Windows Server 2012 Standard OR Windows Server 2012 Datacenter |
Windows Server 2008 Datacenter with SP2 |
Windows Server 2012 Datacenter |
Windows Web Server 2008 |
Windows Server 2012 Standard |
Windows Server 2008 R2 Standard with SP1 OR Windows Server 2008 R2 Enterprise with SP1 |
Windows Server 2012 Standard OR Windows Server 2012 Datacenter |
Windows Server 2008 R2 Datacenter with SP1 |
Windows Server 2012 Datacenter |
Windows Web Server 2008 R2 |
Windows Server 2012 Standard |
For more information about supported upgrade paths, see Evaluation Versions and Upgrade Options for Windows Server 2012. Note that you cannot convert a domain controller that runs an evaluation version of Windows Server 2012 directly to a retail version. Instead, install an additional domain controller on a server that runs a retail version and remove AD DS from the domain controller that runs on the evaluation version.
Due to a known issue, you cannot upgrade a domain controller that runs a Server Core installation of Windows Server 2008 R2 to a Server Core installation of Windows Server 2012. The upgrade will hang on a solid black screen late in the upgrade process. Rebooting such DCs exposes an option in boot.ini file to roll back to the previous operating system version. An additional reboot triggers the automatic rollback to the previous operating system version. Until a solution is available, it is recommended that you install a new domain controller running a Server Core installation of Windows Server 2012 instead of in-place upgrading an existing domain controller that runs a Server Core installation of Windows Server 2008 R2. For more information, see KB article 2734222.
Functional level features and requirements
Windows Server 2012 requires a Windows Server 2003 forest functional level. That is, before you can add a domain controller that runs Windows Server 2012 to an existing Active Directory forest, the forest functional level must be Windows Server 2003 or higher. This means that domain controllers that run Windows Server 2008 R2, Windows Server 2008, or Windows Server 2003 can operate in the same forest, but domain controllers that run Windows 2000 Server are not supported and will block installation of a domain controller that runs Windows Server 2012. If the forest contains domain controllers running Windows Server 2003 or later but the forest functional level is still Windows 2000, the installation is also blocked.
Windows 2000 domain controllers must be removed prior to adding Windows Server 2012 domain controllers to your forest. In this case, consider the following workflow:
Install domain controllers that run Windows Server 2003 or later. These domain controllers can be deployed on an evaluation version of Windows Server. This step also requires running adprep.exe for that operating system release as a prerequisite.
Remove the Windows 2000 domain controllers. Specifically, gracefully demote or forcibly remove Windows Server 2000 domain controllers from the domain and used Active Directory Users and Computers to remove the domain controller accounts for all removed domain controllers.
Raise the forest functional level to Windows Server 2003 or higher.
Install domain controllers that run Windows Server 2012.
Remove domain controllers that run earlier versions of Windows Server.
The new Windows Server 2012 domain functional level enables one new feature: the KDC support for claims, compound authentication, and Kerberos armoring KDC administrative template policy has two settings (Always provide claims and Fail unarmored authentication requests) that require Windows Server 2012 domain functional level. For more information, see Support for claims, compound authentication, and Kerberos armoring.
The Windows Server 2012 forest functional level does not provide any new features, but it ensures that any new domain created in the forest will automatically operate at the Windows Server 2012 domain functional level. The Windows Server 2012 domain functional level does not provide other new features beyond KDC support for claims, compound authentication, and Kerberos armoring. But it ensures that any domain controller in the domain runs Windows Server 2012. For more information about other features that are available at different functional levels, see Understanding Active Directory Domain Services (AD DS) Functional Levels.
After you set the forest functional level to a certain value, you cannot roll back or lower the forest functional level, with the following exceptions: after you raise the forest functional level to Windows Server 2012, you can lower it to Windows Server 2008 R2. If Active Directory Recycle Bin has not been enabled, you can also lower the forest functional level from Windows Server 2012 to Windows Server 2008 R2 or Windows Server 2008 or from Windows Server 2008 R2 back to Windows Server 2008. If the forest functional level is set to Windows Server 2008 R2, it cannot be rolled back, for example, to Windows Server 2003.
After you set the domain functional level to a certain value, you cannot roll back or lower the domain functional level, with the following exceptions: when you raise the domain functional level to Windows Server 2008 R2 or Windows Server 2012, and if the forest functional level is Windows Server 2008 or lower, you have the option of rolling the domain functional level back to Windows Server 2008 or Windows Server 2008 R2. You can lower the domain functional level only from Windows Server 2012 to Windows Server 2008 R2 or Windows Server 2008 or from Windows Server 2008 R2 to Windows Server 2008. If the domain functional level is set to Windows Server 2008 R2, it cannot be rolled back, for example, to Windows Server 2003.
For more information about features that are available at lower functional levels, see Understanding Active Directory Domain Services (AD DS) Functional Levels.
Beyond functional levels, a domain controller that runs Windows Server 2012 provides additional features that are not available on a domain controller that runs an earlier version of Windows Server. For example, a domain controller that runs Windows Server 2012 can be used for virtual domain controller cloning, whereas a domain controller that runs an earlier version of Windows Server cannot. But virtual domain controller cloning and virtual domain controller safeguards in Windows Server 2012 do not have any functional level requirements.
Note
Microsoft Exchange Server 2013 requires a forest functional level of Windows server 2003 or higher.
AD DS interoperability with other server roles and Windows operating systems
AD DS is not supported on the following Windows operating systems:
Windows MultiPoint Server
Windows Server 2012 Essentials
AD DS cannot be installed on a server that also runs the following server roles or role services:
Hyper-V Server
Remote Desktop Connection Broker
Operations master roles
Some new features in Windows Server 2012 affect operations master roles:
The PDC emulator must be running Windows Server 2012 to support cloning virtual domain controllers. There are additional prerequisites for cloning DCs. For more information, see Active Directory Domain Services (AD DS) Virtualization.
New security principals are created when the PDC emulator runs Windows Server 2012.
The RID Master has new RID issuance and monitoring functionality. The improvements include better event logging, more appropriate limits, and the ability to - in an emergency - increase the overall RID pool allocation by one bit. For more information, see Managing RID Issuance.
Note
Though they are not operations master roles, another change in AD DS installation is that DNS server role and the global catalog are installed by default on all domain controllers that run Windows Server 2012.
Virtualizing domain controllers
Improvements in AD DS beginning in Windows Server 2012 enable safer virtualization of domain controllers and the ability to clone domain controllers. Cloning domain controllers in turn enables rapid deployment of additional domain controllers in a new domain and other benefits. For more information, see Introduction to Active Directory Domain Services (AD DS) Virtualization (Level 100).
Administration of Windows Server 2012 servers
Use the Remote Server Administration Tools for Windows 8 to manage domain controllers and other servers that run Windows Server 2012. You can run the Windows Server 2012 Remote Server Administration Tools on a computer that runs Windows 8.
Application compatibility
The following table covers common Active Directory-integrated Microsoft applications. The table covers what versions of Windows Server that the applications can be installed on and whether the introduction of Windows Server 2012 DCs affects application compatibility.
Product |
Notes |
||
---|---|---|---|
Configuration Manager 2007 with SP2 (includes Configuration Manager 2007 R2 and Configuration Manager 2007 R3):
|
|||
Microsoft Office SharePoint Server 2007 is not supported for installation on Windows Server 2012. |
|||
SharePoint 2010 Service Pack 2 is required to install and operate SharePoint 2010 on Windows Server 2012 Servers SharePoint 2010 Foundation Service Pack 2 is required to install and operate SharePoint 2010 Foundation on Windows Server 2012 Servers The SharePoint Server 2010 (without service packs) installation process fails on Windows Server 2012 The SharePoint Server 2010 prerequisite installer (PrerequisiteInstaller.exe) fails with error “This program has compatibility issues.” Clicking “Run the program without getting help” displays the error “Verifying if SharePoint can be installed | SharePoint Server 2010 (without service packs) cannot be installed on Windows Server 2012.” |
|||
Minimum requirements for a database server in a farm The 64-bit edition of Windows Server 2008 R2 Service Pack 1 (SP1) Standard, Enterprise, or Datacenter or the 64-bit edition of Windows Server 2012 Standard or Datacenter Minimum requirements for a single server with built-in database: The 64-bit edition of Windows Server 2008 R2 Service Pack 1 (SP1) Standard, Enterprise, or Datacenter or the 64-bit edition of Windows Server 2012 Standard or Datacenter Minimum requirements for front-end web servers and application servers in a farm: The 64-bit edition of Windows Server 2008 R2 Service Pack 1 (SP1) Standard, Enterprise, or Datacenter or the 64-bit edition of Windows Server 2012 Standard or Datacenter. |
|||
System Center 2012 Configuration Manager Service Pack 1: Microsoft will add the following operating systems to our client support matrix with the release of Service Pack 1:
All site server roles - including site servers, SMS providers, and management points - can be deployed to servers with the following operating system editions:
|
|||
Lync Server 2013 requires with Windows Server 2008 R2 or Windows Server 2012. It cannot be run on a Server Core installation. It can be run on virtual servers. |
|||
Lync Server 2010 can be installed on a new (not upgraded) installation Windows Server 2012 if October 2012 cumulative updates for Lync Server are installed. Upgrading the operating system to Windows Server 2012 for an existing installation of Lync Server 2010 is not supported. Microsoft Lync Server 2010 Group Chat Server is also not supported on Windows Server 2012. |
|||
System Center 2012 Endpoint Protection Service Pack 1 will update the client support matrix to include the following operating systems
|
|||
FEP 2010 with Update Rollup 1 will update the client support matrix to include the following operating systems:
|
|||
Forefront Threat Management Gateway (TMG) |
TMG is supported to run only on Windows Server 2008 and Windows Server 2008 R2. For more information, see System requirements for Forefront TMG. |
||
Windows Server Update Services |
This release of WSUS already supports Windows 8-based computers or Windows Server 2012-based computers as clients. |
||
Windows Server Update Services 3.0 |
Update KB article 2734608 lets servers that are running Windows Server Update Services (WSUS) 3.0 SP2 provide updates to computers that are running Windows 8 or Windows Server 2012: Note Customers with standalone WSUS 3.0 SP2 environments or System Center Configuration Manager 2007 Service Pack 2 environments with WSUS 3.0 SP2 require 2734608 to properly manage Windows 8-based computers or Windows Server 2012-based computers as clients. |
||
Windows Server 2012 Standard and Datacenter are supported for the following roles: schema master, global catalog server, domain controller, mailbox and client access server role Forest Functional Level: Windows Server 2003 or higher Source: Exchange 2013 System Requirements |
|||
Exchange 2010 |
Source: Exchange 2010 Service Pack 3 Exchange 2010 with Service Pack 3 can be installed on Windows Server 2012 member servers. Exchange 2010 System Requirements lists the latest supported schema master, global catalog and domain controller as Windows Server 2008 R2. Forest Functional Level: Windows Server 2003 or higher |
||
SQL Server 2012 |
Source: KB 2681562 SQL Server 2012 RTM is supported on Windows Server 2012. |
||
SQL Server 2008 R2 |
Source: KB 2681562 Requires SQL Server 2008 R2 with Service Pack 1 or later to install on Windows Server 2012. |
||
SQL Server 2008 |
Source: KB 2681562 Requires SQL Server 2008 with Service Pack 3 or later to install on Windows Server 2012. |
||
SQL Server 2005 |
Source: KB 2681562 Not supported to install on Windows Server 2012. |
Known issues
The following table lists known issues related to AD DS installation.
KB article number and title |
Technology area impacted |
Issue/description |
2830145: SID S-1-18-1 and SID S-1-18-2 can't be mapped on Windows 7 or Windows Server 2008 R2-based computers in a domain environment |
AD DS Management/App compat |
Applications that map SID S-1-18-1 and SID S-1-18-2, which are new in Windows Server 2012, may fail because the SIDs cannot be resolved on Windows 7-based or Windows Server 2008 R2-based computers. To resolve this issue, install the hotfix on the Windows 7-based and Windows Server 2008 R2-based computers in the domain. |
2737129: Group Policy preparation is not performed when you automatically prepare an existing domain for Windows Server 2012 |
AD DS Installation |
Adprep /domainprep /gpprep is not automatically run as part of installing the first DC that runs Windows Server 2012 in a domain. If it has never been run previously in the domain, it must be run manually. |
2737416: Windows PowerShell-based domain controller deployment repeats warnings |
AD DS Installation |
Warnings can appear during prerequisite validation and then reappear during the installation. |
2737424: "Format of the specified domain name is invalid" error when you try to remove Active Directory Domain Services from a domain controller |
AD DS Installation |
This error appears if you are removing the last DC in a domain where pre-created RODC accounts still exist. This affects Windows Server 2012, Windows Server 2008 R2, and Windows Server 2008. |
2737463: Domain controller does not start, c00002e2 error occurs, or "Choose an option" is displayed |
AD DS Installation |
A DC does not start because an administrator used Dism.exe, Pkgmgr.exe, or Ocsetup.exe to remove the DirectoryServices-DomainController role. |
2737516: IFM verification limitations in Windows Server 2012 Server Manager |
AD DS Installation |
IFM verification can have limitations as explained in the KB article. |
2737535: Install-AddsDomainController cmdlet returns parameter set error for RODC |
AD DS Installation |
You can receive an error when you try to attach a server to an RODC account if you specify arguments that are already populated on the pre-created RODC account. |
2737560: "Unable to perform Exchange schema conflict check" error, and prerequisites check fails |
AD DS Installation |
Prerequisite check fails when you configure the first Windows Server 2012 DC in an existing domain because DCs are missing the SeServiceLogonRight for Network Service or because WMI or DCOM protocols are blocked. |
2737797: AddsDeployment module with the -Whatif argument shows incorrect DNS results |
AD DS Installation |
The –WhatIf parameter shows DNS server will not be installed but it will be. |
2737807: The Next button is not available on the Domain Controller Options page |
AD DS Installation |
The Next button is disabled on the Domain Controller Options page because the IP address of the target DC does not map to an existing subnet or site, or because the DSRM password is not typed and confirmed correctly. |
2737935: Active Directory installation stalls at the "Creating the NTDS settings object" stage |
AD DS Installation |
The installation hangs because the local Administrator password matches the domain Administrator password, or because networking problems prevent critical replication from completing. |
2738060: "Access is denied" error message when you create a child domain remotely by using Install-AddsDomain |
AD DS Installation |
You receive the error when you run Install-ADDSDomain with the Invoke-Command cmdlet if the DNSDelegationCredential has a bad password. |
2738697: "The server is not operational" domain controller configuration error when you configure a server by using Server Manager |
AD DS Installation |
You receive this error when you try to install AD DS on a workgroup computer because NTLM authentication is disabled. |
2738746: You receive access denied errors after you log on to a local administrator domain account |
AD DS Installation |
When you log on using a local Administrator account rather than the built-in Administrator account and then create a new domain, the account is not added to the Domain Admins group. |
2743345: "The system cannot find the file specified" Adprep /gpprep error, or tool crashes |
AD DS Installation |
You receive this error when you run adprep /gpprep because the infrastructure master is implements a disjoint namespace |
2743367: Adprep "not a valid Win32 application" error on Windows Server 2003, 64-bit version |
AD DS Installation |
You receive this error because Windows Server 2012 Adprep cannot be run on Windows Server 2003. |
2753560: ADMT 3.2 and PES 3.1 installation errors on Windows Server 2012 |
ADMT |
ADMT 3.2 cannot be installed on Windows Server 2012 by design. |
2750857: DFS Replication diagnostic reports do not display correctly in Internet Explorer 10 |
DFS Replication |
DFS Replication diagnostic report does not display correctly because of changes in Internet Explorer 10. |
2741537: Remote Group Policy updates are visible to users |
Group Policy |
This is due to scheduled tasks run in the context of each user who is logged on. The Windows Task Scheduler design requires an interactive prompt in this scenario. |
2741591: ADM files are not present in SYSVOL in the GPMC Infrastructure Status option |
Group Policy |
GP replication can report “replication in progress” because GPMC Infrastructure Status does not follow customized filtering rules. |
2737880: "The service cannot be started" error during AD DS configuration |
Virtual DC cloning |
You receive this error while installing or removing AD DS, or cloning, because the DS Role Server service is disabled. |
2742836: Two DHCP leases are created for each domain controller when you use the VDC cloning feature |
Virtual DC cloning |
This happens because the cloned domain controller received a lease before cloning and again when cloning was complete. |
2742844: Domain controller cloning fails and the server restarts in DSRM in Windows Server 2012 |
Virtual DC cloning |
The cloned DC starts in DSRM because cloning failed for any of a variety of reasons listed in the KB article. |
2742874: Domain controller cloning does not re-create all service principal names |
Virtual DC cloning |
Some three-part SPNs are not recreated on the cloned DC because of a limitation of the domain rename process. |
2742908: "No logon servers are available" error after cloning domain controller |
Virtual DC cloning |
You receive this error when you try to log on after cloning a virtualized DC because cloning failed and the DC is started in DSRM. Log on as .\administrator to troubleshoot the cloning failure. |
2742916: Domain controller cloning fails with error 8610 in dcpromo.log |
Virtual DC cloning |
Cloning fails because the PDC emulator has not performed inbound replication of the domain partition, likely because the role was transferred. |
2742927: "Index was out of range" New-AdDcCloneConfig error |
Virtual DC cloning |
You receive the error after you run New-ADDCCloneConfigFile cmdlet while cloning virtual DCs, either because the cmdlet was not run from an elevated command prompt or because your access token does not contain the Administrators group. |
2742959: Domain controller cloning fails with error 8437: "invalid parameter was specified for this replication operation" |
Virtual DC cloning |
Cloning failed because an invalid clone name or a duplicate NetBIOS name was specified. |
2742970: DC Cloning fails with no DSRM, duplicate source and clone computer |
Virtual DC cloning |
The cloned virtual DC boots in Directory Services Repair Mode (DSRM), using a duplicate name as the source DC because the DCCloneConfig.xml file was not created in the correct location or because the source DC was rebooted before cloning. |
2743278: Domain controller cloning error 0x80041005 |
Virtual DC cloning |
The cloned DC boots into DSRM because only one WINS server was specified. If any WINS server is specified, both Preferred and Alternate WINS servers must be specified. |
2745013: "Server is not operational" error message if you run New-AdDcCloneConfigFile in Windows Server 2012 |
Virtual DC cloning |
You receive this error after you run the New-ADDCCloneConfigFile cmdlet because the server cannot contact a global catalog server. |
2747974: Domain controller cloning event 2224 provides incorrect guidance |
Virtual DC cloning |
Event ID 2224 incorrectly states that managed service accounts must be removed before cloning. Standalone MSAs must be removed but Group MSAs do not block cloning. |
2748266: You cannot unlock a BitLocker-encrypted drive after you upgrade to Windows 8 |
BitLocker |
You receive an “Application not found” error when you try to unlock a drive on a computer that was upgraded from Windows 7. |
See Also
Windows Server 2012 Evaluation Resources Windows Server 2012 Evaluation Guide Install and Deploy Windows Server 2012