FAQ Windows Server 2019


I’m unable to RDP to my server

1) Open up PowerShell Admin window and the run the below command

get-netfirewallrule -displaygroup “Remote Desktop” | ft Name,Enabled -autosize 


If its broke you will see this: 

Name                            Enabled 
—-                            ——- 
RemoteDesktop-UserMode-In-TCP   False 
RemoteDesktop-UserMode-In-UDP   False 
RemoteDesktop-Shadow-In-TCP     False 


Now let’s enable remote desktop: 

netsh advfirewall firewall set rule group=”remote desktop” new enable=Yes

2) On some occasions it has been reported that Win 10 1809 clients see the error below when attempting to RDP to a Server 2019 system.

In these cases it has been found that installing KB4503327, if missing, on the server appears to resolve the issue.


I can't change the timezone

1) Use the Powershell cmdlet Set-TimeZone to adjust it. Open up a PowerShell Admin window and the run the following command to see a list of available time zones:

Get-TimeZone -ListAvailable

This will give you the name of all available time zones.

To set your timezone, run the following command:

Set-TimeZone -Name “Nameoftimezonehere”

Now run Get-TimeZone to see your currently set timezone.

PS C:\Windows\system32> Get-TimeZone

Id : Eastern Standard Time
DisplayName : (UTC-05:00) Eastern Time (US & Canada)
StandardName : Eastern Standard Time
DaylightName : Eastern Daylight Time
BaseUtcOffset : -05:00:00
SupportsDaylightSavingTime : True





Server Automatic Updates and Reboot settings

Disabling Windows Server Automatic Updates

To allow flexibility in server management, Windows Automatic Updates are not disabled by default on Server 2016 and 2019 OS’s. System Administrators that would prefer to disable this feature are encouraged to review and apply the GPO named “DI – BWTST Windows Server Disable Automatic Updates” to their local OUs. The GPO prevents Windows servers from automatically downloading updates and allows BigFix to manage security updates. After application of the GPO, Windows Update can still be triggered manually if needed.

Review Backlogged Reboots and Review Reboot vs No Reboot Properties and Memberships

Review the report GS-Wide: Windows Systems Requiring Restart To Complete Patching. Systems in this report are reporting that a restart is pending on the system, likely due to security patch installations that occurred but were not completed. Systems on this report may need multiple reboots as they catch up with applicable security patch installations. 

Managing the Reboot/No Reboot preferences for systems in MECM and Bigfix must be reviewed and configured separately. 

  • Servers: Patching Reboots on Servers are controlled via BigFix. MECM collection memberships have no affect on server reboots. As a reminder, the GPO “DI – BWTST Windows Server Disable Automatic Updates” is recommended to prevent Windows servers from automatically downloading updates and allows BigFix to manage security updates.  
  • Clients: Reboot/No Reboot behavior needs to be managed in both MECM and BigFix. For MECM, review the local Enterprise Roll-up No Reboot collections (GS-ENT-SITE No Reboot).  

Information on setting the reboot preference property in BigFix can be found here:  
https://tst.usgs.gov/applications/asset-management/ibm-endpoint-manager/bigfix-exception-properties-and-fixlets/.  

Information on configuring MECM No Reboot collections is available here: https://tst.usgs.gov/applications/asset-management/sccm-2012/updating-the-no-reboot-collection/

Comments are closed.