Friday, January 17, 2014

CertUtil commands for Certificate Authorities

View Intermediate CA certificate store

To view the content of the client computer’s Intermediate Certification Authorities certificate store, type the following command at a command-line prompt.
C:\Windows\System32>certutil -enterprise -viewstore CA

View NTAuth Container

To view the content of the NTAuth container in AD DS for a domain named Corp.contoso.com, you would type the following command on a single line and press ENTER:
C:\Windows\System32>certutil -viewstore "ldap:///CN=NTAuthCertificates,CN=Public Key Services,CN=Services,CN=Configuration,DC=corp,DC=contoso,DC=com"

  NTAuth update

To update the content of the NTAuth container in AD DS for a domain controller, you would type the following command on a single line and press ENTER:

C:\Windows\System32>certutil -dspublish -f "the_certificate" NTAuthCA

View Trusted Root CAs

To view the content of the client computer’s Trusted Root Certification Authorities Enterprise certificate store, type the following command at a command-line prompt.
C:\Windows\System32>certutil -enterprise -viewstore Root

Add Trusted Root CAs

To add certificates of the client computer’s Trusted Root Certification Authorities Enterprise certificate store, type the following command at a command-line prompt.
C:\Windows\System32>certutil -addstore Root "Certificate name"

View Domain Controller cert status

To view the status of the Domain Controller certificates, type the following command at a command-line prompt.
C:\Windows\System32>certutil -dcinfo verify




Check Domain Controller cert revocation status


To check for these conditions:
  • Open the certificate, click on the details tab, and select "Copy to file" to export the certificate (DER format is fine). At the command prompt, run:
    C:\Windows\System32>Certutil -verify -urlfetch SERVER.cer

Tuesday, January 14, 2014

2008 DC Status Unavailable when changing directory servers

Problem:

Hello, while upgrading our Active Directory infrastructure to Server 2008 R2 I noticed whenever I right click on my domain, from one of the roles, and choose "Change Domain Controller", and the change Directory Server menu comes up it shows one of my W2K8 DC's status as being "Unavailable", Why is that? It does not prevent me from managing them or performing any function that i know of. I have the firewall's off thinking it was some kind of SNMP traffic but that didn't change anything.



Resolved:

This "status unavailable" can occur if you have disabled the IPv6 bindings on your NICs but not disabled IPv6 components. You can disable IPv6 components by editing the registry by enabling the following. NOTE: Always backup your registry in case something goes wrong! If you feel comfortable enough that you are capable, then go for it, otherwise let a good SysAdmin do the work!

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\TCPIP6\Parameters

REG_DWORD: DisabledComponents, 0xFFFFFFFF (4294967295)

Removing a trusted Certificate Authority from “Trusted Root Certification Authorities” certificate store in Active Directory

Problem
You have previously deployed multiple Active Directory Enterprise Root Certificate Authorities in the domain and because you’ve had to redeploy the CA a few times using the same name, you notice that your domain joined workstations and servers now have multiple root certificates stored in the Trusted Root Certification Authorities certificate store:
image

Solution
I was unsure as to whether there was an easy way to remove these root certificates in the Trusted Root Certification Authorities certificate store so I went ahead and reached out to our Microsoft partner support and the response I received was to review the following KB article:
How to remove a trusted Certificate Authority from computers in the domainhttp://support.microsoft.com/kb/555894
The article’s instructions appear to be pretty straight forward as it demonstrates the user of a batch file and script to automate the process:
clip_image001

The first step was to download the following SDK:
Download:  Platform SDK Redistributable: CAPICOMhttp://www.microsoft.com/en-us/download/details.aspx?id=25281
The problem I immediately noticed was that there were a few typos in the script (namely the removeca.vbs filename):



clip_image001[4]
… and when I finally launched it on a Windows 7 64-bit desktop, it would error out with:

C:\Temp\RemoveCA>c:\windows\system32\regsvr32 capicom.dll /s
C:\Temp\RemoveCA>cscript remove.vbs
Microsoft (R) Windows Script Host Version 5.8
Copyright (C) Microsoft Corporation. All rights reserved.
C:\Temp\RemoveCA\remove.vbs(13, 1) Microsoft VBScript runtime error: ActiveX com
ponent can't create object: 'CAPICOM.Store'
C:\Temp\RemoveCA>
clip_image001[6]

Since it looks like Microsoft suggests to use logon scripts to clean up these root certificates, I simply went ahead and looked into using the certutil.exe command to remove certificates and then created a simplified batch file to remove the entries.
The first step was to determine the right syntax and it took quite a bit of time because I did not find the following TechNet article too straight forward:
http://technet.microsoft.com/en-us/library/cc732443(v=ws.10).aspx
In any case, the proper syntax is the following:
certutil -delstore -enterprise root "<Serial number>”
The command above will remove the certificate located in the Trusted Root Certification Authorities Computer Store of the workstation you execute this command.  To determine the serial number, simply open up the certificate’s properties and navigate to the Details tab, then select the Serial number field as such:
imageimage

Copy the serial number and slot it into the end of the command added quotes:
certutil -delstore -enterprise root “5f 92 5c 79 5a 90 49 bc 4e e7 f7 96 fb c7 de 62”
clip_image001[8]

Once the command successfully executes (it doesn’t take long), you will see the following output:
C:\>certutil -delstore -enterprise root "5f 92 5c 79 5a 90 49 bc 4e e7 f7 96 fb c7 de 62"
root
Deleting Certificate 5
CertUtil: -delstore command completed successfully.
C:\>
Proceed with testing this on a workstation with all of the certificates you intend on deleting one after another and copying and pasting the command into notepad as such:
certutil -delstore -enterprise root "55 8c 2e b5 cc ae 92 89 41 5b 25 33 f7 ef 6c 2e"
certutil -delstore -enterprise root "79 7a f4 a9 9e 81 79 ba 44 b5 91 bc 85 d0 b0 df"
certutil -delstore -enterprise root "58 35 46 65 2a 6e 47 93 48 31 62 3a 49 83 eb 24"
certutil -delstore -enterprise root "27 77 84 a8 49 39 3c b2 4e c7 e9 47 8f 1b 52 60"
certutil -delstore -enterprise root "58 ed e0 1e 68 68 06 a2 4b d3 14 5d 11 f2 7a 85"
certutil -delstore -enterprise root "2e cc 73 20 fe 05 0a 88 44 d8 fb 3a 96 1a 99 5a"
certutil -delstore -enterprise root "25 a5 76 4c c6 fb ca 8a 4d c1 bd 46 e4 9c 3c 37"
certutil -delstore -enterprise root "60 15 e8 95 34 09 ff a3 42 16 26 9a fc fd 67 29"
certutil -delstore -enterprise root "5f 92 5c 79 5a 90 49 bc 4e e7 f7 96 fb c7 de 62"
clip_image001[10]

Once you have removed all of the certificates, save the notepad file as a batch file then take it to another workstation to execute verifying that all of the certificates you intend on deleting are removed.  Once you have validated that the batch file works as intended, proceed with creating a new GPO in your Active Directory and apply it to the OU with the workstations you want the certificates removed:
image

Note that I applied this batch file to the following policy setting:

Computer Configuration –> Policies –> Windows Settings –> Scripts –> Startup

Hope this helps anyone looking for a way to clean up their root certificates.

Wednesday, January 8, 2014

Configuring KMS Server for Windows Server 2008 R2, Windows 7, and Office 2010 Enterprise Sites

Thanks to PeteNetLive for this write up. Because of the environment I work in I couldn't produce any screen shots..his write provided them! good job!

Given the amount of deployments I do, it's surprising that I don't use KMS more often. Like most technical types, I find a way that works for me, and that's the way I do things from then on. However these last few weeks I've been putting in a new infrastructure for a local secondary school. Their internet access is through a proxy server, that refuses to let Windows activation work. Unfortunately the "Administrators" of this proxy server were not disposed to give me any help, or let me anywhere near it, to fix it.
So after activating a dozen servers over the phone, I decided enough was enough "I'm putting in a KMS Server!"
I'm deploying KMS on Windows Server 2008 R2, and it is for the licensing and activation of Serer 2008 R2 and Windows 7. I will also add in the licensing KMS mechanism for Office 2010 as well.
Note: If you are using Server 2003 it will need SP1 (at least) and this update.

Solution

To be honest it's more difficult to find out how to deploy a KMS server, than it actually is to do. I've gone into a fair bit of detail below but most of you will simply need to follow steps 1-4 (immediately below). In addition, after that I've outlined how to deploy KMS from command line. Then how to test it, and finally how to add Microsoft Office 2010 Licenses to the KMS Server.

Install Microsoft Windows 2008 R2 Key Management Service (EASY)

1. The most difficult part is locating your KMS Key! If you have a Microsoft License agreement, log into the the Microsoft Volume License Service Center, and retrieve the KMS License Key for "Windows Server 2008 Std/Ent KMS B"
Note: To License/Activate Server 2008 R2 AND Windows 7 THIS IS THE ONLY KEY YOU NEED. You do NOT need to add additional keys for Windows 7. (You DO for Office 2010, but I'll cover that below).
Locate 2008 KMS Key

2. Armed with your new key, you simply need to change the product key on the server that will be the KMS server, to the new key. Start > Right Click "Computer" > Properties. (Or Control Panel > System). Select "Change Product Key" > Enter the new KMS Key > Next.
Install KMS Key

3. You will receive a warning that you are using a KMS Key > OK. You may now need to activate your copy of Windows with Microsoft, this is done as normal, if you can't get it to work over the internet you can choose to do it over the phone.
KMS Key Warning

4. In a corporate environment (behind an edge firewall) you may have the local firewall disabled on the server. If you do NOT then you need to allow access through the local firewall for the "Key Management Service", (this runs over TCP port 1688). To allow the service, Start > Firewall.cpl {enter} > Allow program or feature through Windows Firewall" > Tick Key Management Service > OK.
KMS Firewall Exception
Note: Should you wish the change the port the service uses, you can do so with the following command, i.e. to change it to TCP Port 1024;
cscript c:\Windows\System32\slmgr.vbs /SPrt 1024
That's It! That is all you should need to do, your KMS Server is up and running.

Install Microsoft Windows 2008 R2 Key Management Service from Command Line

You will notice below that I'm running these commands from command windows running as administrator (Right click "Command Prompt" > Run as administrator).
1. Locate your "Windows Server 2008 Std/Ent KMS B" Key > From command line issue the following command;
cscript c:\Windows\System32\slmgr.vbs /ipk XXXXX-XXXXX-XXXXX-XXXXX-XXXXX
Note: To License/Activate Server 2008 R2 AND Windows 7 THIS IS THE ONLY KEY YOU NEED. You do NOT need to add additional keys for Windows 7. (You DO for Office 2010, but I'll cover that below).
Install KMS Key from Command Line

2. Providing the command runs without error, we have just changed the product key for this Windows server to be the KMS key.
Change Server Product Key

3. Now we need to activate the Windows Server > Run the following command;
c:\Windows\System32\slui.exe
Select "Activate Windows online now" > Follow the on screen prompts.
Activate KMS Key

4. When complete, it should tell you that it was successfully activated.
KMS Activation Sucessfull

5. In a corporate environment (behind an edge firewall) you may have the local firewall disabled on the server. If you do NOT then you need to allow access through the local firewall for the "Key Management Service", (this runs over TCP port 1688). To allow the service, Start > Firewall.cpl {enter} > Allow program or feature through Windows Firewall" > Tick Key Management Service > OK.
KMS Firewall Exception
Note: Should you wish the change the port the service uses, you can do so with the following command, i.e. to change it to TCP Port 1024;
cscript c:\Windows\System32\slmgr.vbs /SPrt 1024
That's It! That is all you should need to do, your KMS Server is up and running.
Testing the Key Management Server
Before it will start doing what you want it to, you need to meet certain thresholds, with Windows 7 clients it WONT work till it has had 25 requests from client machines. If you are making the requests from Windows 2008 Servers then the count is 5. (Note: For Office 2010 the count is 5 NOT 25)
Interestingly: On my test network I activated five Windows 7 machines, then one server, and it started working.
Windows 7 and Windows 2008 R2 have KMS Keys BUILT INTO THEM, if you are deploying/imaging machines you should not need to enter a key into them (unless you have entered a MAK key on these machines then you will need to change it to a client KMS Key). These are publicly available (see here).
1. The service works because it puts an SRV record in your DNS, when clients want to activate, they simply look for this record before they try and activate with Microsoft, if they find the record, they activate from your KMS Server instead. If you look on your domain DNS servers, expand "Forward Lookup Zones" > {your domain name} > _tcp > You will see an entry for _VLMCS that points to your KMS Server.
KMS DNS Resord

2. From your client machines you can test that they can see the SRV record, by running the following command;
nslookup -type=srv _vlmcs._tcp
Note: If this fails, can your client see the DNS server? And is it in the domain?
Query KMS DNS Record

3. There is no GUI console for KMS to see its status, so run the following command on the KMS server;
cscript c:\Windows\System32\slmgr.vbs /dli
Check KMS Server Status

4. As I've mentioned above, with Windows clients you need 25, and Windows Servers you will need 
5 requests before KMS will work, before this you will see;
Windows Activation
A problem occurred when Windows tried to activate. Error Code 0xC004F038
Activation Error 0xC004F038

5. For each of these failures, look-in the KMS Server, and the "Current count" will increment by 1 till it starts to work). In a live environment this wont be a problem, (You probably wont be looking at KMS with less than 25 clients!). On a test network just clone/deploy a load of machines until you hit the threshold.
KMS Current Count

 

Troubleshooting KMS Clients

To make things simple the command to execute on the clients, is the same command that you run on the KMS server to check the status.
cd c:\windows\system32
slmgr /dli
KMS Client Initial Grace Period
KMS CLient Licenced
KMS CLient Licenced
For further troubleshooting, see the following links.

Adding an Office 2010 KMS Key to Your KMS Server.

In addition to servers and clients, KMS can activate and handle Office 2010 licenses as well. You simply need to add in Office support, and your Office 2010 KMS key. As mentioned above, unlike Windows clients, you only need five requests to the KMS server before it will start activating Office 2010 normally.
If you want a KMS Server for JUST OFFICE 2010 and not Windows, then simply install and run the Office 2010 Key Management Service Host.
1. First locate your Office 2010 KMS Key! If you have a Microsoft License agreement, log into the the Microsoft Volume License Service Center, and retrieve the KMS License Key for "Office 2010 Suites and Apps KMS"
Locate Office 2010 KMS Key
Note: As with Windows 7, and Server 2008 R2, Office 2010 comes with a KMS key already installed, if you have changed the key to a MAK key you can change it back using the Microsoft public KMS keys (see here).

KMS Office 2010 License Pack

3. When prompted type/paste in your "Office 2010 Suites and Apps KMS" product key > OK.
Add Office 2010 KMS Key

4. It should accept the key.
Add Office Activation to KMS Host

5. Press {Enter} to close.
KMS Server Updated for Office 2010

6. Once you have five Office 2010 installations they should start to activate from your KMS server.
Office 2010 KMS Activation

Troubleshooting Office 2010 KMS Activation

If you have a client that refuses to work you can manually force it to activate against your KMS server;
x64 Bit Clients. (Where kms.domaina.com is the FQDN of the KMS server)
cscript "C:\Program Files (x86)\Microsoft Office\Office14\OSPP.VBS" /sethst:kms.domaina.com
cscript "C:\Program Files (x86)\Microsoft Office\Office14\OSPP.VBS" /act
 
x32 Bit Clients. (Where kms.domaina.com is the FQDN of the KMS server)
cscript "C:\Program Files\Microsoft Office\Office14\OSPP.VBS" /sethst:kms.domaina.com
cscript "C:\Program Files\Microsoft Office\Office14\OSPP.VBS" /act