Logo
programming4us
programming4us
programming4us
programming4us
Home
programming4us
XP
programming4us
Windows Vista
programming4us
Windows 7
programming4us
Windows Azure
programming4us
Windows Server
programming4us
Windows Phone
 
Windows Server

Managing Windows Server 2012 Systems : Configuring Roles, Role Services, and Features (part 5) - Installing components at the prompt

- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019
10/25/2014 9:01:45 PM

Installing components at the prompt

When you want to manage server configuration at a prompt or in a script, you’ll use Windows PowerShell and the ServerManager module. Not only can you use this module’s cmdlets to add or remove roles, role services, and features, but you can use them to view the configuration details and status for these software components.

Going to the prompt for Server Management

You manage roles, role services, and features using the following cmdlets, which are part of the ServerManager module:

  • Get-WindowsFeature Lists the server’s current state with regard to roles, role services, and features.

    Get-WindowsFeature [[-Name] ComponentNames] [-ComputerName Computer]
    [-Credential Credential] [-LogPath LogFile.txt] [-Vhd VhdPath] [-WhatIf]
  • Install-WindowsFeature Installs the named role, role service, or feature. The –IncludeAllSubFeature parameter allows you to install all subordinate role services and features of the named component.

    Install-WindowsFeature [-Name] ComponentNames [-ComputerName Computer]
    [-IncludeAllSubFeature] [-IncludeManagementTools] [-Credential Credential]
    -LogPath LogFile.txt] [-Source SourcePath] [-Restart | -Vhd VhdPath] [-WhatIf]
  • Uninstall-WindowsFeature Removes the named role, role service, or feature.

    Uninstall-WindowsFeature [-Name] ComponentNames [-ComputerName Computer]
    [-IncludeManagementTools] [-Credential Credential] [-LogPath LogFile.txt]
    [-Remove] [-Restart | -Vhd VhdPath] [-WhatIf]

When applicable, you can

  • Use the –ComputerName parameter to specify the name or IP address of a remote computer to work with. Only one computer can be specified.

  • Use the –Credential parameter to pass in a credential for authentication. Credential objects are returned by the Get-Credential cmdlet.

    Note

    You can specify a user name as the credential using the format: “UserName” or “Domain\UserName” where the quotes are required, such as –Credential “CPANDL\Williams”. If you enter a user name, you will be prompted for a password.

  • Use the –LogPath parameter to log error details to a named log file as an alternative to the default logging used. The value you specify sets the path and the name of the log file.

  • Use the –Restart parameter to restart the computer automatically (if restarting is necessary to complete the operation).

  • Use the –Vhd parameter to specify the path to an offline VHD, which can be a relative local path on the target computer, such as C:\virt\server12b.vhd, or a network share specified by the UNC path, such as \\server42\curr\server12b.vhd.

  • Use the –WhatIf parameter to display the operations that would be performed if the command were executed.

Installable roles, role services, and features have a corresponding component name that identifies the component so that you can manipulate it from the PowerShell prompt. This also is true for supplemental components you’ve made available by downloading and installing their installer packages from the Microsoft website. You specify the list of components to install using the –Name parameter. This parameter matches actual component names and not display names. With Get-WindowsFeature, you can use wildcard characters. With Install-WindowsFeature and Uninstall-WindowsFeature, you cannot use wildcards but can use pipelining to get the required input names from another command, such as Get-WindowsFeature.

Understanding component names

Every installable role, role service, and feature has a component name. This name identifies the component so that it can be manipulated from the prompt. Remember, supplemental components are made available by downloading and installing their installer packages from the Microsoft website.

Table 3 provides a hierarchical listing of the component names associated with roles, related role services, and related subcomponents. When you are installing a role, you can use the –IncludeAllSubFeature parameter to install all the subordinate role services and features listed under the role and the –IncludeManagementTools parameter to install the related management tools.

Table 3. Component names for key roles and role services

Component Name

Role

Role Service

Subcomponent

AD-Certificate

Active Directory Certificate Services

  

AD-Domain-Services

Active Directory Domain Services

  

AD-Federation-Services

Active Directory Federation Services

  

ADLDS

Active Directory Lightweight Directory Services

  

ADRMS

Active Directory Rights Management Services

  

ADRMS-Server

 

Active Directory Rights Management Server

 

ADRMS-Identity

 

Identity Federation Support

 

Application-Server

Application Server

  

DHCP

DHCP Server

  

DNS

DNS Server

  

Fax

Fax Server

  

FileAndStorage-Services

File And Storage Services

  

File-Services

 

File and iSCSI Services

 

FS-FileServer

  

File Server

FS-BranchCache

  

BranchCache for Network Files

FS-Data-Deduplication

  

Data Deduplication

FS-DFS-Namespace

  

DFS Namespaces

FS-DFS-Replication

  

DFS Replication

FS-Resource-Manager

  

File Server Resource Manager

FS-VSS-Agent

 

File Server VSS Agent Service

 

FS-iSCSITarget-Server

 

iSCSI Target Server

 

iSCSITarget-VSS-VDS

 

iSCSI Target Storage Provider

 

FS-NFS-Service

 

Server for NFS

 

Storage-Services

 

Storage Services

 

Hyper-V

Hyper-V

  

NPAS

Network Policy and Access Services

  

NPAS-Policy-Server

 

Network Policy Server

 

NPAS-Health

 

Health Registration Authority

 

NPAS-Host-Cred

 

Host Credential Authorization Protocol

 

Print-Services

Print and Document Services

  

Print-Server

 

Print Server

 

Print-Scan-Server

 

Distributed Scan Server

 

Print-Internet

 

Internet Printing

 

Print-LPD-Service

 

LPD Service

 

RemoteAccess

Remote Access

  

DirectAccess-VPN

 

DirectAccess and VPN (RAS)

 

Routing

 

Routing

 

Remote-Desktop-Services

Remote Desktop Services

  

VolumeActivation

Volume Activation Services

  

Web-Server

Web Server (IIS)

  

WDS

Windows Deployment Services

  

WDS-Deployment

 

Deployment Server

 

WDS-Transport

 

Transport Server

 

UpdateServices

Windows Server Update Services

  

UpdateServices-WidDB

 

WID Database

 

UpdateServices-Services

 

WSUS Services

 

UpdateServices-DB

 

Database

 

Table 4 provides a hierarchical listing of the component names associated with features and related subfeatures. When you are installing a feature, you can use the –IncludeAllSubFeature parameter to install all the subordinate second-level and third-level features listed under the feature and the –IncludeManagementTools parameter to install the related management tools.

Table 4. Component names for features and subfeatures

Component Name

Feature

Subcomponent

NET-Framework-Features

.NET Framework 3.5 Features

 

NET-Framework-45-Features

.NET Framework 4.5 Features

 

NET-Framework-45-Core

 

.NET Framework 4.5

NET-Framework-45-ASPNET

 

ASP.NET 4.5

NET-WCF-Services45

 

WCF Services

BITS

Background Intelligent Transfer Service (BITS)

 

BitLocker

BitLocker Drive Encryption

 

BitLocker-NetworkUnlock

BitLocker Network Unlock

 

BranchCache

BranchCache

 

NFS-Client

Client for NFS

 

Data-Center-Bridging

Data Center Bridging

 

EnhancedStorage

Enhanced Storage

 

Failover-Clustering

Failover Clustering

 

GPMC

Group Policy Management

 

InkAndHandwritingServices

Ink and Handwriting Services

 

Internet-Print-Client

Internet Printing Client

 

IPAM

IP Address Management (IPAM) Server

 

ISNS

iSNS Server service

 

LPR-Port-Monitor

LPR Port Monitor

 

ManagementOdata

Management OData IIS Extension

 

Server-Media-Foundation

Media Foundation

 

MSMQ

Message Queuing

 

Multipath-IO

Multipath I/O

 

NLB

Network Load Balancing

 

PNRP

Peer Name Resolution Protocol

 

qWave

Quality Windows Audio Video Experience

 

CMAK

RAS Connection Manager Administration Kit (CMAK)

 

Remote-Assistance

Remote Assistance

 

RDC

Remote Differential Compression

 

RSAT

Remote Server Administration Tools

 

RSAT-Feature-Tools

 

Feature Administration Tools

RSAT-Role-Tools

 

Role Administration Tools

RPC-over-HTTP-Proxy

RPC over HTTP Proxy

 

Simple-TCPIP

Simple TCP/IP Services

 

SMTP-Server

SMTP Server

 

SNMP-Service

SNMP Service

 

User-Interfaces-Infra

User Interfaces and Infrastructure

 

Server-Gui-Mgmt-Infra

 

Graphical Management Tools and Infrastructure

Desktop-Experience

 

Desktop Experience

Server-Gui-Shell

 

Server Graphical Shell

Biometric-Framework

Windows Biometric Framework

 

PowerShellRoot

Windows PowerShell

 

PowerShell

 

Windows PowerShell 3.0

PowerShell-V2

 

Windows PowerShell 2.0 Engine

PowerShell-ISE

 

Windows PowerShell ISE

WindowsPowerShellWebAccess

 

Windows PowerShell Web Access

WAS

Windows Process Activation Service

 

Search-Service

Windows Search Service

 

Windows-Server-Backup

Windows Server Backup

 

Migration

Windows Server Migration Tools

 

WINS

WINS Server

 

Wireless-Networking

Wireless LAN Service

 

WoW64-Support

WoW64 Support

 

XPS-Viewer

XPS Viewer

 

Other -----------------
- Windows Server 2012 : Configuring IPsec (part 7) - Configuring connection security rules - Monitoring IPsec
- Windows Server 2012 : Configuring IPsec (part 6) - Configuring connection security rules - Creating a custom rule, Configuring authenticated bypass
- Windows Server 2012 : Configuring IPsec (part 5) - Configuring connection security rules - Creating an authentication exemption rule, Creating a server-to-server rule, Creating a tunnel rule
- Windows Server 2012 : Configuring IPsec (part 4) - Configuring connection security rules - Types of connection security rules, Creating an isolation rule
- Windows Server 2012 : Configuring IPsec (part 3) - Configuring IPsec settings - Customizing IPsec tunnel authorizations, Configuring IPsec settings using Windows PowerShell
- Windows Server 2012 : Configuring IPsec (part 2) - Configuring IPsec settings - Customizing IPsec defaults
- Windows Server 2012 : Configuring IPsec (part 1) - Understanding connection security
- Microsoft Lync Server 2013 : Director Troubleshooting (part 3) - Synthetic Transactions,Telnet
- Microsoft Lync Server 2013 : Director Troubleshooting (part 2) - DNS Records, Logs
- Microsoft Lync Server 2013 : Director Troubleshooting (part 1) - Redirects, Certificates
 
 
Top 10
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
 
programming4us
Windows Vista
programming4us
Windows 7
programming4us
Windows Azure
programming4us
Windows Server