Milestone 9 ‐ BLUE.LOCAL - seabar24/SYS-480 GitHub Wiki
9.1 Server Core Linked Clone
SysPrep Windows Server Core
Hardware Configuration:
ISO File SERVER_EVAL_X64FRE_en-us_1.iso
- Thin Provisioned Hard Disk
- Network Adapter: 480-WAN
- Datastore ISO FIle for Install
Similar to SysPrep for Windows Server 2019 for installing Windows Server 2019 with some differences:
- Instead of
Windows 2019 Server Standard Evaluation (Desktop Experience)
chooseWindows 2019 Server Standard Evaluation
- Once Install is complete, WE WILL BE SETTING UP ADMINISTRATOR PASSWORD!
When getting to Install VMWare Tools
Click on it
Then within the Server, run the command:
D:\setup64.exe
Go through the default options for installing VMWare Tools and then continue following along with SysPrep here: https://github.com/seabar24/SYS-480/wiki/Milestone-2-%E2%80%90-AD#finishing-up-sysprep
-
Can use
notepad windows-prep.ps1
to edit the windows-prep.ps1 file -
When met with this:
Just press ok and run a
shutdown /r
to restart and continue with the SysPrep
Once Powered Off and CD/DVD
is switched from Datastore ISO File
to Client Device
. Make a snapshot called Base
for making Clones.
Post-Provisioning DC-Blue1
Create a new function within 480-utils.psm1 called Set-Windows-IP
for setting up the Network on Windows Machines:
Then run your 480-utils.psm1
and 480driver.ps1
script to create a new Clone of our server-2019-core.base
named dc-blue1
.
This is for making a Domain Controller on the BLUE1
network.
After dc-blue1
is created, run your Set-Windows-IP
function and add the following to the parameters.
After that try an ssh [email protected]
and if successful, you should be connected to dc-blue1!
9.2 ADDS Deployment
Make two new yaml files for Active Directory Domain Services install.
windows.yaml within the inventories directory and Windows-ADDS.yaml
windows.yaml
Windows-ADDS.yaml
And then I ran the playbook with the following command:
ansible-playbook -i inventories/windows.yaml Windows-ADDS.yaml –ask-pass -K
Then sshing over as [email protected]
we can use the following commands to verify the changes made.
hostname
whoami
Get-ADGroupMember -Identity “Domain Admins”
Get-ADGroupOrganizationalUnit -LDAPFilter ‘(name=*)’ -SearchBase ‘OU=blue1,DC=BLUE,DC=local’ | Format-Table Name