Windows Server 2016: Work Folders

Windows Server 2016: Work Folders

1) [Windows Server 2016] > [Server Manager] > Add Roles and Features > Server Roles - File and Storage Services - File and iSCSI Services - (x) Work Folders > Add Features > Install

// IIS used for signing self-signed certificate

1) i) [Windows Server 2016] > [Server Manager] > Add Roles and Features > Server Roles - File and Storage Services - (x) Web Server (IIS) > Add Features > Install

2)  [Windows Server 2016] > [Server Manager] > File and Storage Services > Work Folders > To create sync share for Work Folders, start the New Sync Share Wizard > New Sync Share Wizard - Select the server and path - Server and Path >
// Server Name: Data | Status: Online | Cluster Role: Not Clustered

2) i) New Sync Share Wizard - Select the server and path - Server and Path >Locaton: (x) Select by file share:- Name: Test | Path: C:\Test > Next >

// Anyone who is part of domain:-  Domain Users (WIDGET\Domain Users) have access to
// Test Shared Folder.

2) a) File Explorer > This PC - Local Disk (C:) > Test (Folder exist) > Properties - Sharing - Advanced Sharing > (x) Share this folder | Settings:- Share name: Test > Permissions:- Group or User Names: Everyone > Test Properties - Security > Domain Users (WIDGET\Domain Users) - Permissions for Domain Users: Full control >

2) ii) New Sync Share Wizard - User Folder Structure > (x) user alias@domain // Used to seperate two users with the same name (e.g. Tom who is an employee vs Tom who is a outside contractor) > Next > New Sync Share Wizard - Sync Share Name:- Name: Test > Next > New Sync Share Wizard - Sync Access - Add > Select User or Group > Enter the object name to select: Domain Users > New Sync Share Wizard - PC Security Policies > (x) encrypt Work Folders | (x) Automatically lock screen and require a password > Next > Create > Close

3) [Windows Server 2016] > [Server Manager] > File and Storage Services > Work Folders >
Sync Share Name: Test | Path: C:\Test | Status: Enabled | Access Group: WIDGET\Domain Users

4) [Windows Server 2016] > [Server Manager] > Tools > Internet Information Services > Internet Information Services (IIS) Manager > Data (WIDGET\administrator) - Server Certificates > (right-hand side) Create self-signed certificate > Specify a friendly name for the certificate: Data | Select a certificate store for the new certificate: Personal > Server Certificates:-
Name: Data | Issued to: Data.widget.internal | Issued by: Data.widget.internal | Expiration Date: 11/22/2017 >

4) i) [Windows Server 2016] > [Server Manager] > Tools > Internet Information Services > Internet Information Services (IIS) Manager > Data (WIDGET\administrator) - Sites - Default Web Site > (right-hand side) Edit Site> Bindings > Site Bindings -
Type:  | Host name                | Port   | IP Address
http                                          80       *
https     data.widget.internal    443     *

4) ii) [Windows Server 2016] > [Server Manager] > Tools > Internet Information Services > Internet Information Services (IIS) Manager > Data (WIDGET\administrator) - Sites - (right-click) Default Web Site > Manage Website > Stop >

// Microsoft Management Console (mmc) is used to add snap-in for Certificates
5) [Windows Server 2016] > Start Menu > Run > mmc > File - Add/Remove snap-ins > Available snap-ins:- Certificates > This snap-in will always manage certificates for: (x) Computer account > Next > Select the computer you want this snap-in to manage:- (x) Local computer > Finish >

6) [Windows Server 2016] > Start Menu > Run > mmc > Console Root - Certificates (Local Computer) - Trusted Root Certification Authorities - Certificates > (right-click) Issued To: Data.widget.internal | Issued by: Data.widget.internal | Expiration Date: 11/22/2017 >  All Tasks - Export > Export Private Key - Do you want to export the private key with the certificate? (x) Yes , export the private key > Next > Certificate Export Wizard - Security - (x) Password: xxx xxx | Confirm Password : xxx xxx > Next > File to export:- \\dc2\NETLOGON\Data.pfx > Next > Finish >

7) [Windows 10 workstation] > Control Panel > Work Folders > Set up Work Folders > Enter your work email address - Enter a Work Folders URL instead > Work Folders URL:-  https://data.widget.internal > Next (if you encounter an error, you need to add the trust for the certificate - goto Step 7)i & ii) ) > Introducing Work Folders - Work Folders location:- C:\Users\administrator\Work Folders > Security Policies - (x) I accept these policies on my PC > Set up Work Folders >

7) i)  [Windows 10 workstation] > Start Menu > Run > mmc > File - Add/Remove snap-ins > Available snap-ins:- Certificates > This snap-in will always manage certificates for: (x) Computer account > Next > Select the computer you want this snap-in to manage:- (x) Local computer > Finish >

// Import certificate into Windows 10 workstation

7) ii) [Windows 10 workstation] > Start Menu > Run > mmc > Console Root - Certificates (Local Computer) - Trusted Root Certification Authorities - (right-click) Certificates > All Tasks > Import > Certificate Import Wizard > File name: \\dc2\NETLOGON\Data.pfx > Private key protection - Password:  *** *** > Next > Certificate Store (x) Place all certificates in the following store - Certificate Store: Trusted Root Certification Authorities > Next > Finish >

8) [Windows 10 workstation] > File explorer > Work Folders // anything copied into this folder will be synced











Comments

  1. Hi there, I found your website via Google while searching for a related topic, your website came up, windows 10 activator looks great.

    ReplyDelete

Post a Comment