Windows and Windows Server R2 General Availability Update Rollup.Download information
Looking for:
Windows server 2012 r2 standard offline update free

This does not cover Windows 7 or Office Download the Extended Security Updates datasheet. Learn more about lifecycle support deadlines. On Azure: Customers who migrate workloads to Azure will have access to Extended Security Updates for both SQL Server and Windows Server and R2 for three years after the End of Support dates for no additional charge above the cost of running the virtual machine.
On-premises: Eligible customers will be able to purchase Extended Security Updates for their on-premises environment. Customers who require outside Azure where Extended Security Updates are available at no additional charge can onboard on Year 2 of Extended Security Updates. However, if an organization did not purchase the first year of Extended Security Updates coverage, they will need to purchase both Year 1 and Year 2 Extended Security Updates.
Similarly, if an organization onboards only on Year 3, they will need ссылка на продолжение purchase all по этому адресу years of Extended Security Updates.
Software Assurance or an equivalent Server Subscription is required for customers to purchase Extended Security Updates on-premises. No, there are no changes to the type of updates in Extended Security Updates. Extended Security Updates do not include new features, customer-requested non-security hotfixes, or design change requests. However, Microsoft may include non-security fixes as deemed necessary.
No, there are no changes to technical support options for Extended Security Updates customers in Sgandard, if hosting on Azure, customers can use an Azure Stanadrd plan to get http://replace.me/7715.txt support. For those customers who need more time to upgrade and modernize their Windows Server and SQL Server ofcline R2 on Azure, we will now provide one additional year of free extended security updates only on Azure.
We recommend upgrading to the latest versions of our updare to continue to get regular security updates, either in Azure or on-premises. However, for customers that are not windows server 2012 r2 standard offline update free to transition to a supported version before the End of Support date, we have options to help protect data and applications during the End of Support transition:. For many customers, this is an easy first step before upgrading or modernizing with newer versions or services in Azure.
Those that decide to move to Azure SQL Managed Instance PaaS на этой странице also посетить страницу access to continuous security updates, as this is a fully managed solution. These customers will also have access to Extended Security Updates on Azure for no additional charges above the cost of running the virtual machine. Extended Security Updates for on-premises standarf hosted environments: Extended Security Updates will also be available for workloads running on-premises or in a hosting environment such as with another cloud provider.
Product licenses and Привожу ссылку Assurance do not need to reside on the same enrollment. Customers can purchase Standzrd Security Updates only for syandard servers they need to cover. Extended Security Нажмите для продолжения can be purchased directly from Microsoft or a Microsoft licensing partner.
In Azure: Customers can begin migrating workloads to Azure Virtual Machines immediately and apply ofcline security windows server 2012 r2 standard offline update free until the End of Support date.
You don’t need to configure anything, and there’s no additional charge for using Extended Security Updates with Azure Virtual Machines. Extended Security Updates are available to purchase typically 3 months windows 10 home edition retail pc cd key free to End of Support dates with delivery of Extended Security Frfe beginning after End of Support.
You can find more information about how to use Extended Security Updates here. Extended Security Updates will be distributed if and standrd available. SQL Server does not ship a general monthly security update. If there are situations where new SQL Server important updates will d2 be provided and it is deemed critical by the customer but not by MSRC, we will work with the customer on a case-to-case basis to suggest appropriate mitigation.
Software Assurance does not need to offlinee on the same enrollment. Pricing is available on published price lists. Windows server 2012 r2 standard offline update free your Microsoft partner or account team for more details. The price of Extended Security Updates acquired through Microsoft resellers is set by the reseller. Pricing for Windows Server Extended Security Updates is based on Windows Server Standard per core pricing, based on the number of virtual cores in the hosted virtual machine, and subject to a r of 16 licenses per instance.
Windows server 2012 r2 standard offline update free for SQL Server Extended Security Windows server 2012 r2 standard offline update free is based on SQL Sserver per core pricing, based on the number of virtual cores in the hosted virtual machine, and subject to a minimum of 4 licenses per instance.
Software Assurance is not required. Contact your Microsoft reseller or account 20112 for more details. If they windows server 2012 r2 standard offline update free 8 cores for SQL Server on-premises and use Windows server 2012 r2 standard offline update free Assurance benefits to have a secondary passive server i.
Customers can then apply updates to their production workload on-premises and the secondary passive server i.
On—premises: Yes, Stamdard Assurance is required for on-premises workloads. Azure Hybrid Benefit—hybrid cloud Microsoft Azure. However, they can move their workloads to Azure and get the Extended Security Ofline for no additional charges above the cost of using the Azure vmware workstation pro 14 system requirements free. Customers with Software Assurance through other enrollments e.
Pricing for Extended Security Updates will follow the current license model for the server. For example, Windows Server is licensed by core and is required for all physical cores on each server. Customers cannot buy windows server 2012 r2 standard offline update free periods e.
EA and Extended Security Updates must overlap for at least one month at the beginning of each year of Extended Security Updates coverage. Customers must have active Software Assurance coverage or subscription licenses for at least one month at the start of each coverage period in order to be eligible for Extended Security Updates in that period. If customers purchase Extended Security Updates while Software Assurance is active, but Software Assurance lapses before the Extended Security Update coverage period begins, customers will not be able to receive updates.
Extended Security Updates are available annually, for a fixed month period. If a customer updaye Extended Security Updates in month windows server 2012 r2 standard offline update free of the month period, that customer would still need to purchase the full 12 months.
Customers must have purchased coverage for year 1 of Extended Security Updates in order to buy year 2, and windows server 2012 r2 standard offline update free in year 2 in order to stabdard year 3. Customers may buy coverage for previous years at the same time they buy coverage for 2021 current period. It is not necessary offlien buy a certain period of coverage within that coverage period.
Premier Support is not a base requirement, but an additional support contract is recommended if technical support will be required. Core licenses are sold in packs of two a 2-pack of Core Licensesand packs of 16 a pack of Core Licenses. Each processor needs to be licensed with a minimum of eight standarf four 2-pack Core Licenses. Each physical server, including single-processor windoas, will need to be licensed with a minimum of 16 Core Licenses eight 2-pack of Core Licenses or one pack of Core Licenses.
Additional cores can then be licensed in increments of two ofrline one 2-pack of Core Licenses for servers frwe core densities higher than 8.
Customers cannot license individual Windows Server virtual machines. They must license the full physical server. Licensing requirements for Extended Security Updates on-premises align to the licensing requirements for the underlying Software Assurance coverage or subscription.
Customers will only need to know their Windows Server license position for a given server, to know how many Extended Security Update licenses they need. Customers who have covered all the underlying cores of the physical server with Windows Server Datacenter licenses should buy Windows server 2012 r2 standard offline update free Security Updates for the number of physical cores, irrespective of the number of VMs running on that physical server.
Customers who have covered all the underlying cores of the physical server with Windows Server Standard licenses should buy Extended Security Updates for the number of physical cores, but will only be licensed to run and update two virtual machines on the server.
Customers who wish to run and update more than two virtual machines on a server licensed with Windows Server Standard must re-license all of the physical cores on the server with both Windows Server Standard and Extended Aindows Updates for each additional pair of virtual machines.
Microsoft will only produce updates which can be applied on the latest Zerver Pack. For customers who do not have Software Assurance, the alternative option to get access to Extended Security Updates is to migrate stanrard Azure. For variable workloads, we recommend that customers migrate serrver Azure via Pay-As-You-Go, which allows for scaling up or down at any time.
For predictable workloads, we recommend that customers migrate to Azure via Server Subscription and Reserved Instances. Licenses and Software Assurance do not need to be on the same agreement.
However, we recommend customers complete migration before the End of Support date so that they do not miss any Extended Security Updates. Seever customers miss a year windows server 2012 r2 standard offline update free Extended Security Updates coverage, they may buy coverage for previous years at the same time they buy stqndard for a current period. Yes, customers can start ipdate newR2,or R2 http://replace.me/999.txt on Azure and have access to Extended Security Updates.
Customers who purchase Extended Security Updates for production servers may also apply those security updates to servers licensed under Visual Studio MSDN subscriptions servver no additional cost.
There is no limit to the number of Aerver servers a customer can cover. Premium Assurance is no longer available, but we will pudate the terms of Premium Assurance for customers who already purchased it. Software Assurance is required as a pre-requisite to Extended Security Updates. Extended Security Updates coverage is not required to be co-terminus with Software Assurance coverage, but customers must have at least one month of qualifying Software Assurance coverage updxte at the time a given year of Extended Security Updates coverage is purchased.
If they migrate to Azure, however, they can get support using their Azure Support Plan. When customers have purchased Extended Security Updates and have an existing support plan:.
Scenario: Support Team will work to troubleshoot customer issue Response: Yes. Scenario: Support Team will do a root ссылка analysis Response: No. This program covers only the named product and the components that shipped with it.
Unless explicitly stated the scope of this program does not extend to any other products or tools that the customer may be running on or with the covered product. No, customers must purchase Extended Security Updates separately. The cost of Extended Security Updates is not included in the price calculation of the Unified Support agreement.
However, customers with Unified Support and Extended Security Updates can request technical support for theR2,or R2 servers covered by Extended Security Updates. Onsite or proactive support will only be available to a customer if it is part of standdard Unified Support agreement. Yes, organizations which have purchased Extended Security Updates can submit support incidents using any Microsoft Support offering, including Unified and Premier Support. Microsoft Partners are also able to submit tickets on behalf of their customers as long as the customer has purchased Extended Security Updates, though Partners will need a support agreement in place to do so.
All customers must call Microsoft Support in order to place a request for a technical support incident. As we continue to work to fully automate the validation process, the tech routers will validate whether a customer purchased Extended Security Updates. Once the customer is validated, a case will be created and routed to the appropriate queue for technical support.
Customers should provide their Enterprise Agreement number or full customer name for validation. If an investigation determines that resolution requires product enhancement available in a recent release, then a request will be made to the customer to upgrade to a more recent release where the standarr is already updatf. See online servicing for more details.
Windows server 2012 r2 standard offline update free.Extended Security Updates for SQL Server and Windows Server and R2 | Microsoft
Important When you install this update from Windows Update, updates, and are included in the installation. Important This update replaces update You don’t have ofline install update after you install this update. This article describes the Windows RT 8. It also addresses some known issues about this update. This includes the 0x installation error. A restart is required after you install this update.
If you’re a Windows 8. This update is a cumulative update that includes the security updates and the non-security updates for Windows RT 8. In addition to previous updates, it includes features such as improved Internet Explorer 11 compatibility for enterprise applications, usability improvements, extended mobile device management, and improved hardware support. Important All future security and nonsecurity updates for Windows RT 8.
We recommend that you install this update on your Windows RT 8. Improves performance and reliability when you use multi-display configurations for portrait-first device experiences. This update package fixes the issues that are documented in the following Microsoft Knowledge Base articles.
Activity isn’t detected when you insert or remove an SD card in Windows 8. Configuration in “Set as metered connection” does not work for non-administrator users in Windows 8. A control does not work correctly when you scroll and select items in it in Windows 8. Screen appears garbled when you rotate the screen to portrait mode in Windows 8. The scroll bar in a bit application does not move on a computer that is running a bit version of Windows.
Pages load посмотреть больше during a Remote Desktop Services stwndard on a server that’s running Windows Server. Update adds new TLS cipher suites and changes cipher suite priorities in Windows freee.
Explorer process freezes when you log windows server 2012 r2 standard offline update free to a Windows 8. DNS corporate network name resolution fails after you connect a Windows 8. Camera application does not use a HD resolution for preview on a Windows 8.
Repair on Cluster Name resource fails together with error on a Windows Server R2-based cluster. User profile corruption after you lose network connectivity or satndard a Windows-based computer.
Same preinstalled applications are stored two times on xtandard Windows 8. FIX: “Access is denied” error occurs on some source-initiated subscription workgroup computers in Windows. Audio redirection stops 30 sandard 60 minutes after you connect to a guest operating system on a Hyper-V host computer that is running Windows.
Black screen when you plug in a monitor on a computer or open a lid of a laptop that читать больше running in Windows. Massive event ID for each network name information update in Windows 8. Windows Update history ofvline oldest update history events in Windows 8. One switch changes to “Internal only” after you create some external virtual switches windows server 2012 r2 standard offline update free Windows 8.
Applications close unexpectedly when they read performance counter values in Windows 8. Error occurs when multiple pages are printed by using a WSD printer in Продолжить 8. Some PageMediaSize upddate can’t be used as default in store apps in Windows 8.
Corresponding roles are stuck in the “Stopping” state after one resource fails on a Windows Server R2-based cluster. Icons or tiles freeze after you copy or paste network information in Network standqrd Windows 8. You can’t use the Xbox Video app to play a movie on your Xbox game console in Windows 8. You cannot enable bidirectional support after you upgrade to Windows 8.
Selected paper size of a media does not work for print jobs on a printer in Windows 8. Authentication fails for Windows 8. The source disk is still offline when you disable the shadow copy schedule for the disk in Windows. Prerequisites To apply this update, offlinf must windows server 2012 r2 standard offline update free the following update installed on Windows RT 8.
If you turn on automatic updating, this update is automatically installed. This is expected and does not trigger the full reinstallation of the Windows RT 8. The rest of the update will not be downloaded or reinstalled.
Windows Update may offer this update again even when the computer already has standarrd update installed. This is expected and intended to resolve a Offoine Update client issue. Windows Update installs only package This resolves the Windows Update clients issue instead of 212 the packages included in this update. Open Windows Update by swiping in from the right edge of the screen or, if you are using a mouse, windoes to the lower-right corner of the screen and move the mouse pointer uptap iffline click Settingstap or click Change PC settings winfows, and then tap or click Update and recovery.
Windows server 2012 r2 standard offline update free факт. audio realtek windows 10 вам click Servet nowand then wait while Windows looks for the latest updates for your computer. Select update under Optionaland then tap or click Install. Note You might have to restart your computer to finish installing some updates. Save and close your files and apps before you restart so that you do not lose anything. Windows Update: Stabdard Asked Questions.
Download the xbased Windows 8. Download the xbased Windows Server R2 update package now. Note The update for Windows RT 8. Note Windows server 2012 r2 standard offline update free updates must be installed in the following order: clearcompressionflag.
For more information about how to download Microsoft support files, see the following Microsoft Knowledge Base article:. Microsoft used the most current virus-detection software that was available on the date that the file was posted.
The file is stored on security-enhanced servers that help prevent any unauthorized changes to the file. When you install update by using Windows Update, the installation fails setver error code 0xa Apply hotfixand then reinstall update This issue is caused staandard some corrupted components.
Download and run the Clearcompressionflag. No wijdows is displayed when it finishes the cleanup. You can just try to install update after you run the tool. If you install this update on a printer server, windows server 2012 r2 standard offline update free computers may be prompted with a warning box that asks Do you trust this printer, and or the client computers may be unable to print.
Apply update Apply hotfix If the issue frse not resolved, or if you encounter other installation issues, see windows 10 activation key free download “Troubleshoot problems installing the update” section in Install the latest Windows 8. File detail information For a list of the files that are provided in this updatedownload the file information for update File hash information The following table перейти the thumbprints of the certificates that are used to sign the updates.
Verify the certificate thumbprint in this Microsoft Knowledge Base article against the certificate thumbprint indicated esrver the update that you download. If updates are found, tap or click Install updates. Need more help? Expand your skills. Get new features first. Was this information helpful? Yes Oflfine. Thank you! Any more feedback? The more you tell us the more we can help. Can you help us improve? Resolved my issue. Clear instructions.
Easy to follow. No jargon. Pictures helped. Didn’t match my screen. Incorrect instructions. Too technical. Not enough information. Not enough pictures. Any additional feedback? Submit http://replace.me/15120.txt.
Windows server 2012 r2 standard offline update free
If you use the People app or a supported third-party app to manage your contacts, you can choose to share specific contacts with other apps on your PC, display contact info in a contact card, or share specific contact info with other apps on your PC to perform an action, such as making a call or mapping an address.
When an app requests contact info, Windows lets you choose specific contacts to share with the app. Contacts can come from the People app or a supported third-party contacts app. Windows does not share your entire list of contacts with the requesting app.
If an app has access to a piece of information about one of your contacts, such as a phone number or email address, Windows can show a contact card with the additional info from your contacts app for that contact. If you tap or click a command such as Call , Email , or Map on the contact card, Windows opens the appropriate app to complete that action and provides that app with the contact details necessary to complete the action, such as providing the phone number to make a call.
Windows uses the contact info from your contacts app to share specific contacts that you choose, to display contact cards, to open apps and share contact info to complete actions listed on the contact cards, and to show your contacts in Windows Search. Windows only displays and shares contact info when you choose to share specific contacts with an app, display a contact card, or select an action from the contact card. Windows has several features that help you discover and set up devices on your PC, including Device installation, Mobile broadband device installation, Network discovery and Wireless device pairing.
When a new device is installed on your PC, Windows can automatically search for, download, and install the device’s driver software. Windows can also download information about the device, such as a description, picture, and manufacturer logo. When Windows searches for drivers, it will contact the Windows Update service online to find and download device drivers, if an appropriate driver is not already available on your PC. To retrieve information about your device and determine whether an app is available for it, Windows sends data about the device to Microsoft, including its Device ID for example, Hardware ID or Model ID of the device you are using , your region and language, and the date that the device information was last updated.
If a device app is available, Windows automatically downloads and installs it from the Windows Store. The app will be available in your Windows Store account in the list of apps you own. The information sent to Microsoft is used to help determine and download the appropriate device driver, information, and app for your device.
Microsoft doesn’t use the information sent to identify or contact you. If you choose express settings while setting up Windows, you turn on automatic downloading and installation of device drivers, device information, and device apps. If you choose to customize settings, you can control automatic downloading and installation of device drivers, apps and info by selecting Automatically get device drivers, apps, and info for new devices under Help protect and update your PC.
After setting up Windows, you can change these settings in Control Panel by selecting Change device installation settings, and then selecting No, let me choose what to do. You can uninstall a device app at any time without uninstalling the device, though you might need the app to use certain features of the device. Additional device information is also downloaded to help display your mobile broadband connection in network lists.
To determine which device information and app to download, Windows sends a portion of the hardware identifiers from your mobile broadband hardware that allows us to identify your mobile operator. If your mobile operator has provided an app to Microsoft, Windows downloads it from the Windows Store and installs it. Once installed, the app can use your mobile broadband hardware IDs.
If you choose express settings while setting up Windows for the first time, Windows will automatically check for and download mobile operator apps. You can turn this feature on and off in Control Panel. For more information, see the Device Installation section above. You can uninstall a mobile operator’s app at any time without uninstalling your mobile broadband hardware.
When you connect your PC to a small private network like you might have at home, Windows can automatically discover other PCs and shared devices on the network, and make your PC visible to others on the network. When shared devices are available, Windows can automatically connect to and install them. Examples of shared devices include printers and media extenders, but not personal devices like cameras and mobile phones.
When you turn on sharing and connecting to devices, information about your PC, such as its name and network address, might be broadcast over the local network to allow other PCs to discover and connect to it. In order to determine if devices connected to your network should be installed automatically, some information about the network is collected and sent to Microsoft.
This information includes the number of devices on the network, the network type for example, private network , and the types and model names of devices on the network. No personal information, such as network name or password, is collected. Depending on your device installation settings, when Windows installs shared devices, Windows might send some information to Microsoft and install device software on your PC.
For more information, see the Device Installation section. The information sent to Microsoft about your network is used to determine which devices on the network should be installed automatically.
Microsoft doesn’t use the information to identify, contact, or target advertising to you. If you choose turn on sharing and connect to devices when you join a network, network discovery is turned on for that network.
You can choose whether to turn on network discovery at all and whether to turn on automatic setup of network connected devices by selecting Change advanced sharing settings in Network and Sharing Center. Wi—Fi Direct is a wireless technology that allows devices to communicate directly with each other, without needing to connect to a Wi—Fi network. Depending on your device installation settings, when Windows pairs with wireless devices, Windows might send some information to Microsoft and install device software on your PC.
Device encryption helps protect your data by encrypting it using BitLocker Drive Encryption technology, which can help prevent offline software attacks. When you turn on device encryption, Windows encrypts the data on the drive Windows is installed on. When you use software encryption, cryptographic keys in memory continually encrypt and decrypt data as it is read from or written to the protected drive.
When you use hardware encryption, data encryption and decryption is performed by the drive. When device encryption is on, Windows automatically encrypts the drive Windows is installed on and generates a recovery key. The recovery key can help you to access your protected data in case of certain hardware failures or other problems. The BitLocker recovery key for your PC is automatically backed up online in the MicrosoftOneDrive account of each administrator account that is connected to a Microsoft account.
Your computer name and an identifier for the recovery key are also backed up in the same OneDrive account. Recovery information allows you to access your protected data in case of certain hardware failures or other problems, and allows BitLocker to distinguish between authorized and unauthorized users.
Microsoft backs up your recovery information in your OneDrive account so you can access it online. We might use aggregate data about recovery keys to analyze trends and help improve our products and services.
For example, we might use this information to determine the proportion of PCs where Device Encryption is turned on. If you choose to use a Microsoft account while setting up your PC, and your PC supports it, device encryption is turned on and your recovery key is backed up in your OneDrive account. If you choose to use a local account while setting up your PC, device encryption is turned off.
You can view and manage the recovery keys stored in your OneDrive account here. DirectAccess makes it possible for your PC to remotely and seamlessly connect to your workplace network whenever your PC is connected to the Internet, no matter your location. Each time you start your PC, DirectAccess will attempt to connect to your workplace network, whether or not you’re physically located at your workplace. Once connected, your PC will download workplace policy, and you’ll be able to access configured resources in the workplace network.
Your workplace administrator might leverage DirectAccess connectivity to remotely manage and monitor your PC, including the websites you visit even when you aren’t physically located at your workplace. DirectAccess must be configured by your workplace administrator using Group Policy. While your administrator can allow you to temporarily deactivate some elements of DirectAccess, only your workplace administrator can stop Windows from attempting to connect to your workplace for management purposes.
If you or your workplace administrator removes your PC from your workplace domain, DirectAccess will no longer be able to connect. The Ease of Access Center enables you to turn on accessibility options and settings to help you more easily interact with the PC. This information is saved in a non-human-readable format and stored locally on your PC.
A set of configuration recommendations are provided to you based on the statements that you choose. You can choose which statements you would like to select by going to Ease of Access in Control Panel. You can alter your choices at any time. You can also choose which of the recommendations you want to configure on your PC.
PC users, primarily administrators, can use Event Viewer to view and manage event logs. Event logs contain information about hardware, software, and security events on your PC. You can also get information from Microsoft about events in the event logs by clicking Event Log Online Help.
Event logs contain event information generated by all users and apps on the PC. By default, all users can view event log entries; however, administrators can choose to restrict access to event logs. You can access the event logs for your PC by opening Event Viewer. If you use Event Log Online Help to look up additional information about a specific event, information about the event is sent to Microsoft. When you use Event Log Online Help to look up information about an event, the event data sent from your PC is used to locate and provide you with additional information about the event.
For Microsoft events, the event details will be sent to Microsoft. For events associated with third-party apps, the information will be sent to the location specified by the third-party publisher or manufacturer.
If you send information about events to third-party publishers or manufacturers, use of the information will be subject to each third party’s privacy practices.
Administrators can choose to restrict access to Event Viewer logs. Users who have full access to event viewer logs can clear them. Unless you have previously consented to sending event information automatically when you click Event Log Online Help, you’ll be asked to confirm that the information presented to you can be sent over the Internet.
No event log information will be sent over the Internet unless you consent to send it. Administrators can use Group Policy to select or change the site to which event information is sent. Family Safety helps parents protect their children when they use a PC.
Parents can control which apps, games, and websites children are allowed to use. Parents can also set time limits and receive regular activity reports via email. Parents can manage restrictions and view activity reports locally on the PC or online using the Microsoft Family Safety website. Activity reports can include info about time spent using the computer, time spent in individual apps and games, and websites visited including attempts to view blocked sites.
Administrators on the PC can change settings and view the activity report. A parent can allow other people to view activity reports and change settings by adding them as parents on the Microsoft Family Safety website. If the parent configuring Family Safety is signed into Windows with a Microsoft account, online management is automatically turned on. Windows and the Microsoft Family Safety website use the information collected to provide the Family Safety feature. Family Safety is turned off by default.
Only administrators can turn on Family Safety, and only users without administrative privileges can be monitored or restricted. If Family Safety is turned on, the child will receive a notification that Family Safety is monitoring their account each time they sign in to Windows.
If you indicate that an account is a child account during account creation, you can choose to enable Family Safety for that account. Parent accounts can be added or removed on the Microsoft Family Safety website. To properly use Family Safety, only parents should be administrators of their PC, and children should not be granted administrative privileges.
Please note that using this feature to monitor other users such as adults may violate applicable law. The fax feature allows you to create and save fax cover pages, and to send and receive faxes using your PC and an external or a built-in fax modem or a fax server. By default, Windows uses “Fax” as the value for each identifier. Information entered in the sender dialog box is presented on the fax cover page. Fax access is determined by your user account privileges on the PC. Unless a fax administrator changes access settings, all users can send and receive faxes.
By default, all users can view the documents that they send and any fax that is received on the PC. Administrators can see all faxed documents, sent or received, and can configure fax settings, including who has permissions to view or manage faxes, and the TSID and CSID values.
Automatic learning is a handwriting recognition personalization tool that is available on PCs with touch or tablet pen. This feature collects data about the words that you use and how you write them. This helps the handwriting recognition software improve its interpretation of your handwriting style and vocabulary and also improves auto correction and text suggestions for languages without input method editors IMEs.
Information collected by automatic learning is stored in the user profile for each user on the PC. Text from messages you compose and calendar entries you create by using email apps for example, Office Outlook or Windows Live Mail including any messages that you have already sent. Recognized text from ink that you write in Input Panel or type using touch keyboards.
The information collected is used to help improve handwriting recognition by creating a version of the recognition software that’s personalized to your own style and vocabulary, and to turn on auto correction and text suggestions as you type using touch keyboards. The text samples are used to create an extended dictionary. The ink samples are used to help improve handwriting recognition for each user on a PC.
Automatic learning is turned on by default. You can turn automatic learning on or off at any time by going to Advanced settings in Languages in Control Panel. When you turn off automatic learning, any data that has been collected and stored by automatic learning is deleted. Windows allows you to easily link PCs on your home network so that you can share pictures, music, videos, documents, and devices.
It also enables PCs to stream media to devices on your home network such as a media extender. These PCs and devices are your homegroup. You can help protect your homegroup with a password, and you can choose what you want to share.
You can access your own files, such as pictures, videos, music, and documents, from any PC in the homegroup. When you join a homegroup, account information including email address, display name, and picture for all Microsoft accounts on your PC will be shared with others in the homegroup in order to turn on sharing with those users. The information collected allows PCs in your homegroup to understand who to share content with and how to present it.
You have the ability to add or remove PCs from your homegroup and decide what is shared with other homegroup members. You can create a homegroup and manage its settings by going to HomeGroup under Network in PC settings.
If the IME cannot find a good suggestion in your local dictionary it will send the keyboard input to Microsoft to determine if there are better candidate ideograms for that input.
A randomly-generated unique identifier is also sent to help us analyze usage of this feature. Microsoft uses the information collected to look up cloud ideograms and to improve our products and services. To view or change this setting, open PC settings, click Time and language , click Region and language , choose your language, and then click Options.
Depending on the IME you use, and your settings, the auto-tuning and text suggestion features of IME might record words or word sequences to improve the selection of the ideograms displayed. The IME auto-tuning self-learning and text suggestion features record a word or sequence of words and the frequency with which you use them.
If you choose to send this data to Microsoft, it is used to improve IME and related products and services. The automatic learning and text suggestion features are on by default in those IMEs that support them. The data collected isn’t sent automatically to Microsoft. You can choose whether or not to collect or send this data in Language in Control Panel. If errors in presenting ideograms or in converting keyboard input to ideograms occur, this feature can collect information about the errors that can help Microsoft improve its products and services.
IME Conversion Error Reporting collects information about IME conversion errors, such as what you typed, the first conversion or prediction result, the string you chose instead, information about the IME you use, and information about how you use it.
In addition, if you use the Japanese IME, you can choose to include automatic learning information in conversion error reports. Microsoft uses the information to improve our products and services.
After a certain number of conversion errors are stored, the Mis-Conversion Report Tool will ask whether you want to send a conversion error report. You can view the information contained in each report before choosing whether to send it. You can also turn on automatic sending of conversion error reports in IME Settings.
Depending on the IME you use, you might be able to use word registration to report unsupported words words that might not be converted correctly to ideograms from keyboard input. Registration reports can include the information you provide in the Add Word dialog box about the words being reported, and the software version number for an IME. These reports might include personal information, for example, if you add personal names using word registration.
You have the opportunity to review the data being sent with each report before you choose to send it. Microsoft uses the information to help improve our products and services. You can view the information contained in the report before choosing whether to send it. When you share your Internet connection for the first time, Windows will automatically generate and store a network name and password.
You can change these at any time. Windows also syncs other information to let you remotely start Internet connection sharing from your other trusted devices. This information is used to set up Internet connection sharing. If you sign in to a device that supports Internet connection sharing with your Microsoft account, and you add the device as a trusted device, the information necessary to remotely start Internet connection sharing will be synced to OneDrive.
You can stop syncing the information by choosing not to sync passwords. For more info, see the “Sync settings” section of this page. When you print using this feature, you must first connect and authenticate yourself to an Internet print server. The information that you’ll need to submit to the print server will vary depending on the level of security that the print server supports for example, you might be asked to provide a user name and password.
The information collected enables you to print using remote printers. If you send information to a third-party print server, use of the information will be subject to the third party’s privacy practices.
You can turn Internet printing on or off by opening Programs and Features in Control Panel, and then selecting Turn Windows features on or off. You can add the languages you prefer to use to your language list in Windows 8. Apps and websites appear in the first language available in that list.
When you visit websites and install apps on your PC, your list of preferred languages is sent to the websites you visit and is available to the apps you use so they can provide content in your preferred languages. Microsoft doesn’t use any language information to identify or contact you. Language information sent or used by third-party websites and apps is subject to the privacy practices of the third-party website or app publisher. Your list of preferred languages is available to the apps you install and websites you visit.
You can add or remove languages from this list in Language preferences in Control Panel. Windows location services consist of two components. Windows Location Provider connects to a Microsoft online service to determine your location.
If you let an app use your location, in addition to providing your location while you use the app, Windows Location Platform can tell the app when your PC moves inside or outside of app-defined geographical boundaries. For example, an app could let you set a reminder to pick up groceries when you leave work. For example, you can install devices such as a GPS receiver that might send location information directly to an app and bypass the platform.
Regardless of your Windows Location Platform settings, online services can use your IP address to determine its approximate location—usually the city your PC is in. If an app sets up geographical boundaries to monitor, those boundaries are stored encrypted on your PC. The information stored about these boundaries includes a name, a location, and whether your PC was inside or outside the boundary the last time its location was determined.
Apps that set up geographical boundaries might transmit or store this information. If you choose to customize settings, you can control the Windows Location Platform by selecting Let Windows and apps request my location from the Windows Location Platform under Share info with Microsoft and other services.
Each user can control their own location settings for apps in Privacy in PC settings. In addition, administrators can choose to turn off the location platform for all users in Location Settings in Control Panel. To prevent apps from being notified when geographic boundaries defined by apps are crossed, an administrative user can turn off the Windows Location Framework Service in Control Panel.
This list of access points is encrypted when stored on disk so that apps can’t directly access it. The GPS information includes observed latitude, longitude, direction, speed, and altitude.
The information is used by the Windows Location Provider to give Windows Location Platform the approximate location of your PC when an authorized app requests it.
For more info about how to control whether apps can request your PC’s location, see the Windows Location Platform section. If you choose express settings while setting up Windows, you choose to help improve the Microsoft Location Service. If you choose to customize settings, you can control whether to help improve the Microsoft Location Service by selecting Send some location data to Microsoft when location-aware apps are used under Help improve Microsoft products and services.
Windows lets you connect Windows Store apps to accounts you use for websites. When an app asks for credentials to sign in to a website, you can choose to save those credentials. The credentials are stored encrypted on your PC. For more info about how these and other credentials may be synced to OneDrive, see the “Sync settings” section of this page. Windows only uses the saved credentials to help you sign in to the websites you have selected.
If you save credentials while connecting an app to a website, the saved credentials won’t be used in Internet Explorer or other apps. You can manage saved credentials in Credential Manager in Control Panel.
For more information about how these and other credentials may be synced to OneDrive, see the “Sync settings” section of this page. To provide personalized content, apps can request your name and account picture from Windows. Your name and account picture are displayed under Your account in Accounts in PC settings. If you sign in to Windows with a Microsoft account, Windows will use the name and account picture associated with that account.
If you allow apps to access your name and account picture, Windows will provide that information to all apps that request it. If you sign in to Windows with a domain account, and you choose to allow apps to use your name and account picture, apps that can use your Windows credentials will be allowed to access certain other forms of your domain account information.
This information includes, for example, your user principal name like jack contoso. If you sign in to Windows with a Microsoft account, or if you sign in to Windows with a domain account connected to a Microsoft account, Windows can automatically sync your account picture on your PC with your Microsoft account picture. If you choose express settings while setting up Windows, Windows will allow apps to access your name and account picture.
By default, DTLS is enabled. The Computer Browser system service maintains an up-to-date list of computers on your network and supplies the list to programs that request it.
The Computer Browser service is used by Windows-based computers to view network domains and resources. Computers that are designated as browsers maintain browse lists that contain all shared resources that are used on the network.
Earlier versions of Windows-based programs, such as My Network Places, the net view command, and Windows Explorer, all require browsing capability. For example, when you open My Network Places on a computer that is running Microsoft Windows 95, a list of domains and computers appears.
To display this list, the computer obtains a copy of the browse list from a computer that is designated as a browser. If you are running only Windows Vista and later versions of Windows, the browser service is no longer required. You can use this service to adjust the advanced network settings of DHCP clients.
The Distributed File System Replication DFSR service is a state-based, multi-master file replication engine that automatically copies updates to files and folders between computers that are participating in a common replication group.
It is not used on a Windows Server domain controller. The Distributed Link Tracking Server system service stores information so that files that are moved between volumes can be tracked to each volume in the domain.
The Distributed Link Tracking Server service runs on each domain controller in a domain. This service enables the Distributed Link Tracking Client service to track linked documents that are moved to a location in another NTFS file system volume in the same domain. The Distributed Transaction Coordinator DTC system service coordinates transactions that are distributed across multiple computer systems and resource managers, such as databases, message queues, file systems, or other transaction-protected resource managers.
DNS servers are required to locate devices and services that are identified by using DNS names and to locate domain controllers in Active Directory. The Event Log system service logs event messages that are generated by programs and by the Windows operating system. Event log reports contain information that you can use to diagnose problems.
You view reports in Event Viewer. The Event Log service writes events that are sent to log files by programs, by services, and by the operating system.
The events contain diagnostic information in addition to errors that are specific to the source program, the service, or the component. This service has the same firewall requirements as the File and Printer Sharing feature. Fax Service lets users use either a local fax device or a shared network fax device to send and receive faxes from their desktop programs. The File Replication service FRS is a file-based replication engine that automatically copies updates to files and folders between computers that are participating in a common FRS replica set.
FRS is the default replication engine that is used to replicate the contents of the SYSVOL folder between Windows based domain controllers and Windows Server based domain controllers that are located in a common domain.
By default, the FTP control port is The default data that is used for active mode FTP port is automatically set to one port less than the control port. Therefore, if you configure the control port to port , the default data port is port This means that the client first connects to the FTP server by using the control port. Then, the client opens a second connection to the FTP server for transferring data. You can configure the range of high ports by using the IIS metabase. If any one of these protocols is unavailable or blocked between the client and a relevant domain controller, Group Policy will not apply or update.
For a cross-domain logon, where a computer is in one domain and the user account is in another domain, these protocols may be required for the client, the resource domain, and the account domain to communicate. ICMP is used for slow link detection. When you initiate remote group policy results reporting from a Windows Server computer, access to the destination computer’s event log is required. See the Event Log section in this article for port requirements.
Windows Server support the initiation of remote group policy update against Windows Server computers. SSL is an open standard for establishing an encrypted communications channel to help prevent the interception of extremely important information, such as credit card numbers. Although this service works on other Internet services, it is primarily used to enable encrypted electronic financial transactions on the World Wide Web WWW. Internet Authentication Service IAS performs centralized authentication, authorization, auditing, and accounting of users who are connecting to a network.
These users can be on a LAN connection or on a remote connection. This system service provides NAT, addressing, and name resolution services for all computers on your home network or your small-office network. When the Internet Connection Sharing feature is enabled, your computer becomes an Internet gateway on the network.
Other client computers can then share one connection to the Internet, such as a dial-up connection or a broadband connection. They do not provide these services on the external network interface. When you use the Kerberos Key Distribution Center KDC system service, users can sign in to the network by using the Kerberos version 5 authentication protocol.
As in other implementations of the Kerberos protocol, the KDC is a single process that provides two services: the Authentication Service and the Ticket-Granting Service. The Authentication Service issues ticket granting tickets, and the Ticket-Granting Service issues tickets for connection to computers in its own domain.
The License Logging system service is a tool that was originally designed to help customers manage licenses for Microsoft server products that are licensed in the server client access license CAL model. By default, the License Logging service is disabled in Windows Server Because of legacy design constraints and evolving license terms and conditions, License Logging may not provide an accurate view of the total number of CALs that are purchased compared to the total number of CALs that are used on a particular server or across the enterprise.
License Logging is not included in Windows Server and later operating systems. We recommend that only users of the Microsoft Small Business Server family of operating systems enable this service on their servers.
The Message Queuing system service is a messaging infrastructure and development tool for creating distributed messaging programs for Windows. These programs can communicate across heterogeneous networks and can send messages between computers that may be temporarily unable to connect to one another. Message Queuing helps provide security, efficient routing, support for sending messages within transactions, priority-based messaging, and guaranteed message delivery.
The Microsoft POP3 service provides email transfer and retrieval services. Administrators can use this service to store and manage email accounts on the mail server.
When you install POP3 service on the mail server, users can connect to the mail server and can retrieve email messages by using an email client that supports the POP3 protocol, such as Microsoft Outlook.
Graphics and multimedia platform: Improves graphics and multimedia reliability and performance, including stabilized visuals across power states. Improves 3D performance. Improves the handling of PlayTo. File server and clustering: Improves Enterprise Client Sync experience. A fix is scheduled to be included with the upcoming update rollup in November You experience an error when resuming a computer from hibernation, and a blank screen is shown.
This issue may occur with some computers that have TPM chips enabled. Was this information helpful? Yes No. Thank you! Any more feedback? The more you tell us the more we can help.
Can you help us improve? Resolved my issue. Clear instructions. Easy to follow. No jargon. Pictures helped.
Windows server 2012 r2 standard offline update free
Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support. This article discusses the required network ports, protocols, and services that are used by Microsoft client and server operating systems, server-based programs, and their subcomponents in the Microsoft Windows Server system. Administrators and support professionals may use this article as a roadmap to determine which ports and protocols Microsoft operating systems and programs require for network connectivity in a segmented network.
This article contains several references to the default dynamic port range. In Windows Server and later versions, and in Windows Vista and later versions, the default dynamic port range changed to the following range:. Don’t use the port information in this article to configure Windows Firewall. The Windows Server system includes a comprehensive and integrated infrastructure to meet the requirements of developers and information technology IT professionals.
This system runs programs and solutions that you can use to obtain, analyze, and share information quickly and easily. These Microsoft client, server, and server program products use different network ports and protocols to communicate with client systems and with other server systems over the network.
Dedicated firewalls, host-based firewalls, and Internet Protocol security IPsec filters are other important components that you must have to help secure your network. However, if these technologies are configured to block ports and protocols that are used by a specific server, that server will no longer respond to client requests.
The System services ports section:. The Ports and protocols section includes a table that summarizes the information from the System services ports section. The table is sorted by the port number instead of by the service name. Use this section to quickly determine which services listen on a particular port. This article uses certain terms in specific ways. To help avoid confusion, make sure that you understand how the article uses these terms:.
This article doesn’t specify which services rely on other services for network communication. A full discussion of the architecture of the Windows operating systems is beyond the scope of this article.
Although many services may rely on a particular TCP or UDP port, only one service or process at a time can listen on that port. These ports are also informally known as random RPC ports.
In these cases, RPC clients rely on the RPC endpoint mapper to tell them which dynamic port or ports were assigned to the server. You can also restrict the range of ports that RPC dynamically assigns to a small range, regardless of the service. For more information about this topic, see the References section. This article includes information about the system services roles and the server roles for the Microsoft products that are listed in the Applies to section. Although this information may also apply to Windows XP and to Microsoft Windows Professional, this article is focused on server-class operating systems.
Therefore, this article describes the ports that a service listens on instead of the ports that client programs use to connect to a remote system. This section provides a description of each system service, includes the logical name that corresponds to the system service, and displays the ports and the protocols that each service requires.
Active Directory runs under the Lsass. Domain controllers, client computers, and application servers require network connectivity to Active Directory over specific hard-coded ports. Additionally, unless a tunneling protocol is used to encapsulate traffic to Active Directory, a range of ephemeral TCP ports between to and to are required.
If your computer network environment uses only Windows Server R2, Windows Server , Windows 7, or Windows Vista, you must enable connectivity over the high port range of through If your computer network environment uses Windows Server R2, Windows Server , Windows 7, or Windows Vista together with versions of Windows earlier than Windows Server and Windows Vista, you must enable connectivity over both port ranges: High port range of through Low port range of through If your computer network environment uses only versions of Windows earlier than Windows Server and Windows Vista, you must enable connectivity over the low port range of through In this encapsulated scenario, you must allow the following items through the router instead of opening all the ports and protocols listed in this topic:.
Finally, you can hard-code the port that is used for Active Directory replication by following the steps in Restricting Active Directory RPC traffic to a specific port.
The following settings are LDAP session options:. FTP is the only network protocol that has a plug-in that is included with Windows Server. The ALG FTP plug-in supports these sessions by redirecting all traffic that meets the following criteria to a private listening port in the range of to on the loopback adapter:.
NET out-of-process session states. NET State Service stores session data out-of-process. The service uses sockets to communicate with ASP. NET that is running on a web server. Certificate Services is part of the core operating system. By using Certificate Services, a business can act as its own certification authority CA.
It lets the business issue and manage digital certificates for programs and protocols such as:. For more information, see 3. The Cluster service controls server cluster operations and manages the cluster database.
A cluster is a collection of independent computers that act as a single computer. Managers, programmers, and users see the cluster as a single system. The software distributes data among the nodes of the cluster. If a node fails, other nodes provide the services and data that were formerly provided by the missing node.
When a node is added or repaired, the cluster software migrates some data to that node. By default, DTLS is enabled. The Computer Browser system service maintains an up-to-date list of computers on your network and supplies the list to programs that request it. The Computer Browser service is used by Windows-based computers to view network domains and resources.
Computers that are designated as browsers maintain browse lists that contain all shared resources that are used on the network. Earlier versions of Windows-based programs, such as My Network Places, the net view command, and Windows Explorer, all require browsing capability.
For example, when you open My Network Places on a computer that is running Microsoft Windows 95, a list of domains and computers appears. To display this list, the computer obtains a copy of the browse list from a computer that is designated as a browser. If you are running only Windows Vista and later versions of Windows, the browser service is no longer required. You can use this service to adjust the advanced network settings of DHCP clients.
The Distributed File System Replication DFSR service is a state-based, multi-master file replication engine that automatically copies updates to files and folders between computers that are participating in a common replication group. It is not used on a Windows Server domain controller.
The Distributed Link Tracking Server system service stores information so that files that are moved between volumes can be tracked to each volume in the domain. The Distributed Link Tracking Server service runs on each domain controller in a domain. This service enables the Distributed Link Tracking Client service to track linked documents that are moved to a location in another NTFS file system volume in the same domain.
The Distributed Transaction Coordinator DTC system service coordinates transactions that are distributed across multiple computer systems and resource managers, such as databases, message queues, file systems, or other transaction-protected resource managers. DNS servers are required to locate devices and services that are identified by using DNS names and to locate domain controllers in Active Directory.
The Event Log system service logs event messages that are generated by programs and by the Windows operating system. Event log reports contain information that you can use to diagnose problems.
You view reports in Event Viewer. The Event Log service writes events that are sent to log files by programs, by services, and by the operating system. The events contain diagnostic information in addition to errors that are specific to the source program, the service, or the component. This service has the same firewall requirements as the File and Printer Sharing feature.
Fax Service lets users use either a local fax device or a shared network fax device to send and receive faxes from their desktop programs. The File Replication service FRS is a file-based replication engine that automatically copies updates to files and folders between computers that are participating in a common FRS replica set.
FRS is the default replication engine that is used to replicate the contents of the SYSVOL folder between Windows based domain controllers and Windows Server based domain controllers that are located in a common domain. By default, the FTP control port is The default data that is used for active mode FTP port is automatically set to one port less than the control port.
Therefore, if you configure the control port to port , the default data port is port This means that the client first connects to the FTP server by using the control port. Then, the client opens a second connection to the FTP server for transferring data. You can configure the range of high ports by using the IIS metabase. If any one of these protocols is unavailable or blocked between the client and a relevant domain controller, Group Policy will not apply or update.
For a cross-domain logon, where a computer is in one domain and the user account is in another domain, these protocols may be required for the client, the resource domain, and the account domain to communicate. ICMP is used for slow link detection.
When you initiate remote group policy results reporting from a Windows Server computer, access to the destination computer’s event log is required. See the Event Log section in this article for port requirements. Windows Server support the initiation of remote group policy update against Windows Server computers.
SSL is an open standard for establishing an encrypted communications channel to help prevent the interception of extremely important information, such as credit card numbers. Although this service works on other Internet services, it is primarily used to enable encrypted electronic financial transactions on the World Wide Web WWW. Internet Authentication Service IAS performs centralized authentication, authorization, auditing, and accounting of users who are connecting to a network.
These users can be on a LAN connection or on a remote connection. This system service provides NAT, addressing, and name resolution services for all computers on your home network or your small-office network.
When the Internet Connection Sharing feature is enabled, your computer becomes an Internet gateway on the network. Other client computers can then share one connection to the Internet, such as a dial-up connection or a broadband connection.
They do not provide these services on the external network interface. When you use the Kerberos Key Distribution Center KDC system service, users can sign in to the network by using the Kerberos version 5 authentication protocol.