A quick rundown how to NIC Team in Server Core:

1. We connect to the remote host and check what NICs are available to Team. We want to make a not of the adapter names.

2. We create a new team and specify a name. Then we add NIC01 and NIC02 to the team.

3. Once we do that, the it will ask if it is ok and it will add the default settings:
TeamingMode:’SwitchIndependent’ and LoadBalancingAlgorithm:’Dynamic’

TeamingMode

In this “Switch Independent Mode” the switches are not aware that different interfaces on the server comprise a team. Instead, all the teaming logic is done exclusively on the server.

There is also the option for “Switch Dependent Mode”, wherein all NICs that comprise the team are connected to the same switch for aggregation rather than redundancy.

LoadBalancingAlgorithm

— Dynamic:
Uses the source and destination TCP ports and the IP addresses to create a hash for outbound traffic. Moves outbound streams from team member to team member as needed to balance team member utilization. When you specify this algorithm with the TeamingMode parameter and the SwitchIndependent value, inbound traffic is routed to a particular team member.
— TransportPorts:
Uses the source and destination TCP ports and the IP addresses to create a hash, and then assigns the packets that have the matching hash value to one of the available interfaces. When you specify this algorithm with the TeamingMode parameter and the SwitchIndependent value all inbound traffic arrives on the primary team member.
— IPAddresses:
Uses the source and destination IP addresses to create a hash, and then assigns the packets that have the matching hash value to one of the available interfaces. When you specify this algorithm with the TeamingMode parameter and the SwitchIndependent value, all inbound traffic arrives on the primary team member.
— MacAddresses:
Uses the source and destination MAC addresses to create a hash and then assigns the packets that have the matching hash value to one of the available interfaces. When you specify this algorithm with the TeamingMode parameter and the SwitchIndependent value, all inbound traffic arrives on the primary team member.
— HyperVPort:
Distributes network traffic based on the source virtual machine Hyper-V switch port identifier. When you specify this algorithm with the TeamingMode parameter and the SwitchIndependent value, inbound traffic is routed to the same team member as the switch port’s outgoing traffic.

4. Once that is done you should have a team

We can check which NICs are the member, the status it is in, if it is up , or degraded
(mine was degraded since I only connected one NIC :oP)

Sources:
– https://technet.microsoft.com/en-us/library/jj130849(v=wps.630).aspx
http://www.windowsnetworking.com/articles-tutorials/windows-server-2012/windows-nic-teaming-using-powershell-part1.html

As I found out today, Hyper-V Server 2012 R2
(the FREE version!) does support Bitlocker! Hooray!

Here is how to set it up:

1. You have to install the Bitlocker feature.

2. If you don’t have a TPM you will need to allow the use of Bitlocker without a TPM via GP. Either in your domain or via the local group policy snapin on the machine in question. To do that edit the following group policy key to “Enabled”.
Since we are on the Hyper-V Core machine, you have to setup remote management first, and make use of the MMC -> Group Policy Object editor.

Make sure to check “Alllow BitLocker without a compatible TPM

BL

3. Encrypting a drive with Bitlocker requires that a system administrator provides Bitlocker with one or more security protectors to protect the drive. I will be using a password, however one can also use a USB key and other methods to lock and unlock the Bitlocker volume.

You should be prompted to enter you self defined password twice and you should receive a randomly generated recovery key printed on the screen. You should copy this down immediately so it’s not lost as it will be the only way to recover the volume if the user password is forgotten.

HINT: To have the recovery key automatically saved to a USB thumb drive add the following to the end of the command:

Where X: should be the drive letter of the USB thumb drive.

Once the protectors have been put in place we can start the encryption of the volume with the following command:

After the command is executed you will be prompted to restart your computer to complete the Bitlocker drive test. The test checks that you are able to log in to your system with Bitlocker enabled. Once the computer has restarted and you have made it back into Windows Bitlocker should start encrypting the drive.

You can keep an eye on the status of the encryption process with the following command:

Source:
http://jack-brennan.com/bitlocker-on-server-2012-and-hyper-v-server-core

Since managing it remotely in anon domain environment is a pain in the neck and I’ll have to setup quite a few servers in the next couple of weeks, here a quick ‘how to’ mange Hyper-V Server 2016 remotely.

SERVER CONFIGURATION

1. Run

2. Configure Remote Management + ping (Opt. 4 -> Opt. 4 -> Opt. 1)
3. Enabled Remote Desktop (Opt. 7 -> e -> Opt. 2)
4. Run this command to allow RDP through the server’s firewall:

5. Launch Powershell and execute this command:


CLIENT CONFIGURATION

1. Add an entry to the hostfile as you can not add a Hyper-V server via IP
(e.g. 192.168.1.1 HOSTSRV01.WORGROUP HOSTSRV01)

2. Run -> dcomcnfg, right-click on ‘My Computer’ -> Properties -> COM Security Tab -> Access Permissions -> Edit Limits -> Anonymous Logon -> Allow ‘Local & Remote’ Access

3.

4. Install the RSAT Tools for your Operating system. Open the Server Manager and add the Hyper-V host as a server.

5. You should get a permission error, run the following command:

Now you should be able to remote manage / create / edit your Hyper-V Server.