Category: Servers (Page 2 of 2)

Hyper-V Quick Create: Newtonsoft.json 12.0.0 error cannot quick create

Resolution found here: https://www.reddit.com/r/HyperV/comments/1he54pv/comment/m92ko75/?utm_source=share&utm_medium=web3x&utm_name=web3xcss&utm_term=1&utm_content=share_button&rdt=43004

If you run into this error when trying to Quick Create in Hyper V:

“Could not load file or assembly ‘Newtonsoft.Json, Version=12.0.0.0,

Culture=neutral, PublicKeyToken=30ad4fe6b2a6aeed’ or one of its

dependencies. The located assembly’s manifest definition does not

match the assembly reference. (Exception from HRESULT:

0x80131040)”

Then the workaround is an easy one.

============

u/overlockfr

It’s caused by a file that somehow got updated in the Hyper-V install.

Here’s how to fix it, until Hyper-V gets updated properly.

Create a file called VMCreate.exe.config with the content below, and then move it to C:\Program Files\Hyper-V

<assemblyBinding xmlns="urn:schemas-microsoft-com:asm.v1">

  <dependentAssembly>

    <assemblyIdentity name="Newtonsoft.Json" publicKeyToken="30ad4fe6b2a6aeed" culture="neutral" />

    <bindingRedirect oldVersion="0.0.0.0-12.0.0.0" newVersion="13.0.0.0" />

  </dependentAssembly>

</assemblyBinding>

That’s it; with this the VM creation tool will be able to start again

I’ve now included that config file to this article- just download it and put it in the folder listed.

Windows Remote Desktop Freezes on login

For windows machines running Windows 11 24H2 version. There are instances where RDP works on the first login and then freezes on subsequent logins. The following adjustment on the Host machine the user is connecting to fixes this issue.

Go to Gpedit.msc then take the following path

Local Computer Policy> Computer Configuration > Administrative Templates > Windows Components > Remote Desktop Services > Remote Desktop Session Host > Connections > Select network detection on the server – set to Enabled, Turn off Connect Time Detect and Continuous Network Detect

Make sure to hit apply and restart the device to ensure it takes.

Mapping Network Drives via Group Policy in Server 2022

Here’s a cleaned-up, polished version of your article—formatted professionally for your company’s Knowledge Base while keeping it practical and technical:


📘 Mapping Network Drives via Group Policy in Windows Server 2022

Overview

This guide explains how to automatically map shared network folders as drives using Group Policy Preferences (GPP) on Windows Server 2022. It also covers the roles of Organizational Units (OUs) and Security Groups, along with best practices for scalable, flexible management.


🔧 Key Components & Requirements

Before proceeding, ensure the following:

  • Windows Server 2022 domain environment
  • Domain-joined client systems
  • Users and computers are located in Organizational Units (OUs) (not default containers)
  • Shared folders with proper NTFS and share permissions

🧩 Understanding OUs vs. Security Groups

ConceptDescription
Organizational Units (OUs)Logical containers for users, computers, and other OUs. They support GPO linkage and delegation of administrative rights.
Security GroupsMembership-based collections used for granting permissions (NTFS, shares) and GPP item-level targeting.

Key Differences:

  • A user or computer can reside in only one OU at a time.
  • Users can belong to multiple security groups simultaneously.
  • OUs apply policies broadly and help delegate control.
  • Groups grant granular access control and can span across OUs.

⚠️ Important: Default containers like Users and Computers do not support GPOs. Move all accounts into proper OUs for Group Policies to apply.


🏗️ Active Directory Structure Best Practices

a. Create Organizational Units

Method 1 – ADUC GUI:

  1. Open Active Directory Users and Computers (ADUC).
  2. Right-click the domain → New → Organizational Unit.
  3. Name and optionally protect the OU from accidental deletion.

Method 2 – PowerShell:

New-ADOrganizationalUnit -Name "Sales" -Path "DC=contoso,DC=com"

b. Move Users and Computers to OUs

Via ADUC:
Select and drag users/computers into the desired OU.

Via PowerShell:

Get-ADUser jdoe | Move-ADObject -TargetPath "OU=Sales,DC=contoso,DC=com"

c. Create Security Groups

In ADUC:
Inside an OU → New → Group
Choose:

  • Type: Security
  • Scope: Global / Domain Local / Universal

Add user members as needed.

Users can belong to multiple groups for layered permissions and access control.


🗂️ Creating and Linking the Drive-Mapping GPO

  1. Open Group Policy Management Console (GPMC).
  2. Right-click the target OU or domain root
    Create a GPO in this domain and Link it here…
  3. Name it (e.g., Drive Maps – Universal).
  4. Right-click the new GPO → Edit.
  5. Navigate to:
    User Configuration → Preferences → Windows Settings → Drive Maps

⚙️ Configuring Drive Mapping (with Item-Level Targeting)

  1. Right-click Drive MapsNew → Mapped Drive
  2. On the General tab:
  • Action: Create or Update
  • Location: UNC path (e.g., \\Server\Share)
  • Drive Letter: Choose desired letter
  • Label: (Optional) Friendly name
  1. On the Common tab:
  • Check Run in logged-on user’s security context
  • Enable Item-level targeting → Click Targeting…
  • Add Security Group condition(s)

Optional enhancements:

  • Remove this item when it is no longer applied – automatically unmaps drives when users leave a group.
  • 🔁 Apply once and do not reapply – useful for one-time setups.

This allows one GPO to deploy multiple drive mappings, each targeted to different security groups, across any OU.


🔗 Linking and Applying the GPO

  1. Link the GPO to the desired OU(s) or domain root.
  2. On clients, run:
   gpupdate /force

or simply reboot.

Users who:

  • Have their account within the linked OU, and
  • Belong to one of the targeted Security Groups

will automatically receive the appropriate mapped drives.


🧰 Maintenance & Troubleshooting

  • Verify GPO scope:
  gpresult /h report.html

or use

  Get-GPOReport
  • Adjust mappings by changing security group membership, not by moving users between OUs.
  • Keep GPOs modular—avoid editing the Default Domain Policy.
  • Use Item-Level Targeting to minimize GPO clutter and boost performance.

📋 Summary Table

TaskTool / MethodNotes
Create OUADUC / PowerShellNew-ADOrganizationalUnit
Move AccountsADUC / PowerShellMove-ADObject
Create Security GroupADUCAdd users, define scope
Link Drive-Mapping GPOGPMCUser Config → Preferences → Drive Maps
Configure Mapped DriveGPP + TargetingSet UNC, drive letter, group conditions
Enable Cleanup OptionsWithin preference itemUse “Remove this item…” / “Apply once…”
Apply / Test PolicyCommand linegpupdate / gpresult
Maintain SetupADUC / PowerShellAdjust memberships, review policies

💡 Final Thoughts

A user belongs to one OU, but can be part of many groups.
Using Item-Level Targeting with Security Groups enables flexible, modular, and scalable GPO management across OUs.

This approach:

  • Simplifies administration
  • Reduces GPO sprawl
  • Keeps drive mappings logical and maintainable

Tip: Combine OUs for structure and Groups for control. That balance keeps your environment clean, efficient, and easy to scale.


Would you like me to format it for Markdown, Confluence, or SharePoint export? I can adjust the headings and table syntax accordingly.

Upgrade Domain Controller System Level

5/1/24, 9:32 PM Upgrade Domain Controller from Server 2016 to Server 2022 | Configuration Manager ManishBangia

U U a a

Upgrade Domain Controller from

Server 2016 to Server 2022

by Manish | SCCM

In this post we will be upgrade existing Domain controller Windows Server

2016 to Server 2022 which is also known as in-place upgrade. For

Windows Server 2022 upgrade, there are few pre-requisites to be met

because we need to have latest schema applied on DC and also have to

use adprep /forestprep and adprep /domainprep commands.

Table Of Contents

Windows Server 2022 Upgrade path

In-place upgrade from Windows Server 2012 R2

to Windows Server 2022

In-place upgrade from Windows Server 2016 to

Windows Server 2022

In-place upgrade from Windows Server 2019 to

Windows Server 2022

Download Windows Server

In-place Upgrade Process

Verification steps

Conclusion

2

We need to run Adprep /forestprep once in the forest, while adprep

/domainprep needs to be run on each domain where we are trying to

_

vignette 1/17

5/1/24, 9:32 PM Upgrade Domain Controller from Server 2016 to Server 2022 | Configuration Manager ManishBangia

upgrade from Server 2016.

th

Windows Server 2022 release date is 18 Aug, 2021 with Mainstream

th th

End date specified as 13 Oct 2026 and Extended End date as 14

Oct 2031.

Windows Server 2022 Upgrade path

Not every Windows server can be upgraded to server 2022 directly. There

are specific upgrade paths we need to follow. There is a nice article on

Microsoft page which explains it, however it doesn’t show Windows Server

2022 server details as they still need to update it (at the time of writing this

blog).

As Windows Server 2022 Schema version is exactly same as Server

2019, I am assuming the path mentioned in the image should work for In-

place upgrade from Server 2012 R2 as well (haven’t tested yet). Following

are the servers which can be upgraded:

In-place upgrade from Windows Server 2012 R2 to

Windows Server 2022

2

_

vignette 2/17

5/1/24, 9:32 PM Upgrade Domain Controller from Server 2016 to Server 2022 | Configuration Manager ManishBangia

We can upgrade. Server can directly be upgraded from Windows Server

  1. This is only valid for Windows Server 2012 R2 (not for Windows

Server 2012). Hence, we can skip version 2016,2019. (Note: I still need

to test this behaviour yet). However, we need to upgrade the schema

before upgrade.

The steps mentioned in this article, should be applicable for Server 2012

R2 as well.

In-place upgrade from Windows Server 2016 to

Windows Server 2022

We can upgrade. Server can directly be upgraded to Windows server

2022, hence we can skip 2019 version. For this version also, we need to

upgrade the schema on Windows Server.

In-place upgrade from Windows Server 2019 to

Windows Server 2022

We can upgrade. This is one of the easiest upgrade method as we don’t

have to upgrade the schema.

Download Windows Server

Windows Server 2022 can be downloaded through Windows Server

Evaluations. Windows Server 2022 iso has also been made available on

Visual Studio Subscription

Once downloaded, either extract the content of ISO locally or mount the

ISO.

In-place Upgrade Process

If you try to run in-place upgrade process without running adprep tool you

will get following error as shown in the image:

Active Directory on this domain controller does not contain Windows

Server 2022 ADPREP /FORESTPREP updates.

2

_

vignette 3/17

5/1/24, 9:32 PM Upgrade Domain Controller from Server 2016 to Server 2022 | Configuration Manager ManishBangia

Verify Current AD Schema

Run the following PowerShell command (in elevated mode) to verify :

Get-ADObject (Get-ADRootDSE).schemaNamingContext –

Property objectVersion

2

We can see objectVersion is 87, this schema version is associated with

“Windows Server 2016”, here is more information on various schema

numbers:

_

vignette 4/17

5/1/24, 9:32 PM Upgrade Domain Controller from Server 2016 to Server 2022 | Configuration Manager ManishBangia

AD version objectVersion

Windows Server 2000 13

Windows Server 2003 30

Windows Server 2003 R2 31

Windows Server 2008 44

Windows Server 2008 R2 47

Windows Server 2012 56

Windows Server 2012 R2 69

Windows Server 2016 87

Windows Server 2019 88

Windows Server 2022 88

We can see that Schema version 88 is same for both Servers 2019 &

  1. Hence, that’s the reason we don’t need to upgrade the schema in

case of in-place upgrade from Windows Server 2019 version.

Open command prompt (elevated rights) on Domain controller and

navigate to source directory of Windows Server ISO. In my case the

location was d:\support\adprep\adprep.exe.

2

_

vignette 5/17

5/1/24, 9:32 PM Upgrade Domain Controller from Server 2016 to Server 2022 | Configuration Manager ManishBangia

Run the command adprep.exe /forestprep

Type C and press enter to continue with upgrade of schema. This will

upgrade current schema version from 87 to 88.

Schema update in Windows Server 2022 uses Sch88.ldf

This process creates 2 log files under

c:\windows\debug\adprep\logs\yyyymmddhhmmss with name ADPrep.log

& ldif.log.

ADPrep.log will show you successful upgrade of Schema.

ldif.log will show you attributes which has been extended to schema such

as ms-PKI-DPAPIMasterKeys, ms-PKI-RoamingTimeStamp and others.

2

_

vignette 6/17

5/1/24, 9:32 PM Upgrade Domain Controller from Server 2016 to Server 2022 | Configuration Manager ManishBangia

Run adprep.exe /domainprep to update the domain-wide information.

Let’s begin installation of Server 2022. Launch setup.exe with admin

rights.

Under Product key page provide the KMS client setup key. Following are

the keys for your reference based upon the version you are using:

Windows Server 2022 Datacenter: WX4NM-KYWYW-QJJR4-XV3QB-

6VM33

Windows Server 2022 Standard: VDYBN-27WPP-V4HQT-9VMD4-VMK7H

2

Click here for KMS Client Setup key provide by Microsoft.

As these are the KMS keys, this needs to be activated later with KMS

_

vignette 7/17

5/1/24, 9:32 PM Upgrade Domain Controller from Server 2016 to Server 2022 | Configuration Manager ManishBangia

server within your environment.

On Select Image page, I am going with Windows Server 2022

Datacenter (Desktop Experience) version for full GUI experience, click

Next.

2

_

vignette 8/17

5/1/24, 9:32 PM Upgrade Domain Controller from Server 2016 to Server 2022 | Configuration Manager ManishBangia

Under Applicable notices and license terms page, click Accept.

2

_

vignette 9/17

5/1/24, 9:32 PM Upgrade Domain Controller from Server 2016 to Server 2022 | Configuration Manager ManishBangia

Under Choose what to keep, this is the page which actually helps us

going with the real need of in-place upgrade without loosing files, settings

and apps, click Next.

2

_

vignette 10/17

5/1/24, 9:32 PM Upgrade Domain Controller from Server 2016 to Server 2022 | Configuration Manager ManishBangia

It will first check for available updates, and you might see Getting

Updates.

2

_

vignette 11/17

5/1/24, 9:32 PM Upgrade Domain Controller from Server 2016 to Server 2022 | Configuration Manager ManishBangia

Once ready to install, hit Install button.

2

_

vignette 12/17

5/1/24, 9:32 PM Upgrade Domain Controller from Server 2016 to Server 2022 | Configuration Manager ManishBangia

Verification steps

The process will first extract the binaries to hidden folder

c:\$WINDOWS.~BT.

2

_

vignette 13/17

5/1/24, 9:32 PM Upgrade Domain Controller from Server 2016 to Server 2022 | Configuration Manager ManishBangia

Once extracted, reboot will happen and server upgrade process will

initiate.

This process might take some time depending upon the size of your infra.

Once completed, login to the server.

Launch run window (press Windows + R) and type Winver, this will show

the Microsoft Windows Server 2022 version 21H2 (OS Build

20348.169).

Where 20348 is the build version and 169 is the patch version which gets

updated with every security update.

Open registry (regedit) and navigate to

Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows

NT\CurrentVersion

2

You will be able to see lots information, especially ProductName which I

am interested in.

_

vignette 14/17

5/1/24, 9:32 PM Upgrade Domain Controller from Server 2016 to Server 2022 | Configuration Manager ManishBangia

Conclusion

Windows Server 2022 can be upgrade from Server 2019, Server 2016

and probably with Server 2012 (yet to test). Important thing to consider is

to upgrade the schema from Server 2016 and 2012. Upgrading from

Server 2019 doesn’t require Schema upgrade as schema version is 88,

which is same for both Server 2019 & Server 2022. Running adprep

commands are the crucial steps to perform while planning to upgrade

domain controller.

How to take over a server when you don’t know the password

How to take over a server when you don’t know the password:
Put in disk for server 2022 (USB/DVD is fine, as long as you can boot from it)
Boot from install media
Next
Repair your computer
Troubleshoot
Command prompt
Find out what your bootable drive is, might be C drive, might be D- just pick them,
then run Dir
Once you find the right volume, browse into windows directory
Cd windows
Cd system32
Rename utilman.exe utilman.old
Copy cmd.exe utilman.exe
Dir cmd.exe
Dir utilman.exe
To confirm sizes match
Cd..
Cd..
bcdedit /set {bootmgr} timeout 15
bcdedit /set displaybootmenu yes
Close cmd window, reboot machine using GUI
Upon reboot, use F8 and boot into safe mode (OR ELSE SFC)
Click accessibility button to bring up command prompt
Now run:
Net user administrator DEAD1599@@ /domain
(Don’t use domain if not a domain machine)
Log in with new password to confirm it
Reboot into normal mode and log in with new password

How to delete Hyper-V snapshots (checkpoints)

How to Delete a Snapshot Using Hyper-V Manager or PowerShell

Updated: May 23, 2023

Written by: NAKIVO Team

Snapshots, which are known as checkpoints in Hyper-V, come in handy when you need to retain the last properly running state of a VM before deploying new software or installing an update. However, you have to be careful while deleting snapshots otherwise, you might lose important data.

In this post, we explain the mechanism of Hyper-V checkpoints. We will cover when to use these checkpoints and show how to delete snapshots from the Hyper-V Manager interface and by using PowerShell.

NAKIVO for Hyper-V Backup

Agentless, application-aware backups for Hyper-V. Anti-ransomware protection, instant VM boot from backup, other virtual/physical platform support and more.

DISCOVER SOLUTION

Hyper-V Checkpoints Mechanism

Before we go into detail about how Hyper-V checkpoints work, let me clear up any confusion related to the terms snapshots and checkpoints.

Snapshots and checkpoints represent the same capability of saving the state of a VM at a particular point in time. This state can be reverted to in the future if an issue occurs with the VM. Microsoft refers to the feature of saving the state of a VM as snapshots for releases before Windows Server 2012 R2. In subsequent releases, Microsoft uses the term checkpoints. In addition, snapshots is the term used in VMware environments. In this post, we are using both terms interchangeably as the covered mechanism and procedures apply to both snapshots and checkpoints. So, how do checkpoints/snapshots work?

How Hyper-V checkpoints are saved

Hyper-V VM data is saved in the form of a .vhdx file. When a checkpoint is created, the .vhdx file becomes a read-only file. New modifications applied to the VM are saved in a differencing virtual hard disk. This differencing virtual hard disk is saved in the form of a .avhdx file in the same folder as that containing the .vhdx file.

You can create a chain of checkpoints. Each checkpoint represents the state of the VM at a specific point in time. Each checkpoint is represented by an .avhdx file.

The mechanism of Hyper-V checkpoints is efficient with storage utilization. However, the performance of virtual disk reading operations is significantly reduced. The reason is that reading files would require checking the whole chain of checkpoints (.avhdx files) until the VM’s .vhdx file is reached.

A VM with no checkpoints created

In the screenshot below, you can see one parent .vhdx virtual disk and two .avhdx disks after creating two Hyper-V checkpoints for a VM.

the VM files after creating two checkpoints

According to this mechanism, deleting a .avhdx file does not delete the checkpoint. Instead, this kind of deletion breaks the chain and leads to data loss.

To delete a checkpoint without losing data, the .avhdx file should be merged with another (parent) .avhdx file (or .vhdx file) in the chain. If this checkpoint is the only checkpoint for the VM, the .avhdx file is merged with the .vhdx file, and the .vhdx file becomes writable again.

In the next section, we will show how to delete snapshots (checkpoints) from the Hyper-V Manager interface without losing data.

Delete Snapshots by Using the Hyper-V Manager Interface

Hyper-V Manager is a free GUI tool for managing Hyper-V hosts and VMs. It can be used to provision VMs, allocate RAM, create snapshots or delete them.

To delete the Hyper-V snapshot (checkpoint) from the Hyper-V Manager interface:

  1. Select the host from the left pane.
  2. Select the VM from the Virtual Machines pane.
  3. Right-click the checkpoint to be deleted from the Checkpoints pane. Select Delete Checkpoint…
deleting a Hyper-V snapshot or checkpoint in Hyper-V Manager

In the screenshot below, you can see a parent .vhdx virtual disk and an .avhdx snapshot file after deleting the second Hyper-V checkpoint.

The deleted checkpoint’s .avhdx is merged automatically with another .avhdx

Delete Snapshots by Using PowerShell

To perform bulk actions on Hyper-V VMs, Windows PowerShell is more efficient than the Hyper-V Manager GUI as you can use commands to delete multiple snapshots at once. Besides, some actions, such as deleting a checkpoint that has no delete option in the GUI, can only be accomplished via PowerShell.

The delete option is unavailable in the Hyper-V Manager interface for a Hyper-V checkpoint

A checkpoint that cannot be deleted from the Hyper-V Manager is called a lingering checkpoint. Lingering checkpoints happen when a VM backup job fails.

When a VM backup job begins using a backup solution, the VM is placed into read-only mode. The new data submitted by VM users is saved to a special type of checkpoint called a recovery checkpoint. When the backup job completes successfully, the recovery checkpoint’s .avhdx file is merged with the VM .vhdx file, and the checkpoint is automatically deleted. However, if the backup job fails, the recovery checkpoint is not deleted automatically and remains as a lingering checkpoint.

To delete a checkpoint by using PowerShell:

  1. Open the Windows PowerShell ISE as administrator.
  2. Get the checkpoint exact name with the command Get-VMSnapshot. Provide the VMName when prompted.
  3. Run the command:Get-VM -Name <VMName> | Get-VMSnapShot -Name <CheckpointName> | Remove-VMSnapshot
  4. Verify that the checkpoint has been successfully deleted with the command:Get-VMSnapshot
Deleting a recovery checkpoint from Windows PowerShell ISE

Final Thoughts

Creating checkpoints is a good practice for the sake of testing and creating an acceptance environment. However, keeping checkpoints is not recommended in a production environment. Checkpoints adversely impact the Hyper-V performance of reading operations.

Deleting checkpoints’ files from the disk directly leads to data loss. Checkpoints should be deleted from the Hyper-V Manager. The PowerShell can be used as well to delete them specially if they have no delete option in the Hyper-V Manager GUI.

Adopting a backup and replication solution is crucial for your data and application protection.

Extracting IRST Drivers from the EXE file

**************************************************************************

* 6.  INSTALLING THE SOFTWARE

**************************************************************************

6.1 General Installation Notes

a.  If you are installing the operating system on a computer configured for RAID or AHCI

    mode, you may pre-install the Intel(R) Rapid Storage Technology driver using the 

    “F6” (Load Driver) installation method described in section 6.3 below.

b.  If you’re installing the operating system on a computer configured for ‘Intel(R) Smart 

    Response Technology’ or ‘System Acceleration with Intel(R) Optane(TM) Technology’, you 

    must pre-install the Intel(R) Rapid Storage Technology driver using the 

    “F6” (Load Driver) installation method described in section 6.3 below.  The Intel(R) RST pre-OS version must support the Intel(R) RST technology that you are installing to.

c.  To install Intel(R) Rapid Storage Technology from within the OS during runtime, 

    double-click on the self-extracting and self-installing setup file and answer all

    prompts presented.

6.2 Intel(R) RST Windows Automated Installer*. Installation from HDD, USB, or CD-ROM

Note: This method is applicable to computers configured for RAID or AHCI mode.

a.  Obtain the Intel(R) Rapid Storage Technology setup file name: SetupRST.exe and

    double-click to self-extract and to begin the setup process.

b.  The Welcome window appears. Click ‘Next’ to continue.

c.  For systems running in RAID mode, the Uninstallation Warning window appears. You will 

    not be able to uninstall the driver in this mode. Click ‘Next’ to continue.

d.  The Software License Agreement window appears. If you agree to these terms, click the

    check box then click ‘Yes’ to continue.

e.  Select the check box to install Intel(R) Optane(TM) Memory and Storage Management application if required then click ‘Next’ to continue.

f.  If the Windows Automated Installer* Wizard Complete window is shown without a prompt 

    to restart the system, click ‘Finish’ and proceed to step “g”. If it is shown with a 

    prompt to restart the system, select ‘I want to restart my computer now.’ 

    (selected by default) and click ‘Finish’. Once the system has restarted, proceed to 

    step “g”.

g.  To verify that the driver was loaded correctly, refer to section 7.

6.3 Pre-Installation of INTEL(R) RST driver using the “Load Driver” Method.

a.  Extract driver files from SetupRST.exe:

    – Open terminal in the directory with SetupRST.exe by right-clicking the directory

      and selecting “Open in Terminal” or “Open PowerShell here”

    – Enter the following command:

      ./SetupRST.exe -extractdrivers SetupRST_extracted

b.  Copy all driver files from the SetupRST-extracted to a USB key media.

c.  For Microsoft Windows OS*:

    – During the operating system installation, after selecting the location to install 

      Windows, click ‘Load Driver’ to install a third party SCSI or RAID driver.

d.  When prompted, insert the USB media and press Enter.

e.  Follow the prompts and browse to the location of the installation files.  Select the 

    appropriate ‘.inf’ file (64 or 32 bit).  If a supported controller is detected there 

    will be no error message. Follow prompts to continue and complete the installation.

Checking Domain Function level and upgrading if needed

Windows Server 2022 Datacenter: WX4NM-KYWYW-QJJR4-XV3QB-6VM33

Windows Server 2022 Standard: VDYBN-27WPP-V4HQT-9VMD4-VMK7H

1- 

Run the following PowerShell command (in elevated mode) to verify :

Get-ADObject (Get-ADRootDSE).schemaNamingContext -Property objectVersion

Compare to:

AD version

Windows Server 2000

13

Windows Server 2003

30

Windows Server 2003 R2

31

Windows Server 2008

44

Windows Server 2008 R2

47

Windows Server 2012

56

Windows Server 2012 R2

69

Windows Server 2016

87

Windows Server 2019

88

Windows Server 2022

88

CMD 

Open command prompt (elevated rights) on Domain controller and

navigate to source directory of Windows Server ISO. In my case the

location was d:\support\adprep\adprep.exe.

cd..

cd..

cd DVD (assuming you copied the DVD contents to a folder on the C drive called DVD

cd support

cd adprep

Run the command adprep.exe /forestprep

Run adprep.exe /domainprep

Newer posts »

© 2026 Ultrex Staff

Theme by Anders NorenUp ↑