Remote Access Disk Management

I am wanting to be able to manage the new installation of windows 2012r2 core, which is a workgroup.

I can see the event logs etc, but when I try device manager or disk manager I receive rpc error.

What do I need to configure?

February 12th, 2014 11:10am

Hi,

Before going further, would you please let me know the detailed error message you received while remotely accessing to Disk Management? Please refer to the following article to see if it helps.

What needs to be configured to do remote disk management of a Server Core installation in Windows Server 2012 via PowerShell?

http://blogs.technet.com/b/wincat/archive/2012/05/02/what-needs-to-be-configured-to-do-remote-disk-management-of-a-server-core-installation-in-windows-server-2012-via-powershell.aspx

Best Regards,

Andy Qi

TechNet Subscriber Support

If you are TechNet Subscription user and have any feedback on our support quality, please send your feedback here.

Free Windows Admin Tool Kit Click here and download it now
February 13th, 2014 6:25am

I've posted this to a number of forums.  It has allowed me to manage almost everything remotely.  There are still some things with disk manager that don't work quite right, but they can be handled correctly from Server Manager instead of disk manager.  I run this on every server I build and I try to do almost all my management remotely.  Some things do require command line.  Microsoft has gotten a lot better over the years on the MMCs handling things remotely, but they are not 100% there.

Oops, as I clicked submit, I saw the fact that your server is in a workgroup.  My script assumes domain.  But, http://social.technet.microsoft.com/Forums/windowsserver/en-US/fe80f0aa-0697-4657-a1da-19d36b036698/guide-to-remote-manage-hyperv-servers-and-vms-in-workgroups-or-standalone?forum=winserverhyperv is another post talking about how another person accomplished in a workgroup.

#
#  Set-UcsHyperVRemoteMgmt.ps1
#
#   C A U T I O N:  Ensure these settings conform to company security policy
#
# This script works on a variety of settings that are easiest done from the
# local machine to make it remotely manageable by a management workstation.
#
# To find rule names
#    Get a list of possible groups
#    Get-NetFirewallRule | Select DisplayGroup -Unique | Sort DisplayGroup
#
# To list the applicable rules that may be set.
#    Get-NetFirewallRule | Where { $_.DisplayGroup Eq Remote Volume Management} | Format-Table Name

# Ensure Server Manager remoting is enabled
Configure-SMRemoting.exe -Enable

# Set some firewall rules

#  Enable ping requests in and out
Set-NetFirewallRule Name FPS-ICMP4-ERQ-In Enabled True -Profile Any
Set-NetFirewallRule Name FPS-ICMP6-ERQ-In Enabled True -Profile Any
Set-NetFirewallRule Name FPS-ICMP4-ERQ-Out Enabled True -Profile Any
Set-NetFirewallRule Name FPS-ICMP6-ERQ-Out Enabled True -Profile Any

#  Enable remote volume management - firewall rules need to be set on both
#  source and destination computers
#  ***NOTE*** Policy must also be set on system to "Allow remote access
#  to the Plug and Play interface"
#  This is done with gpedit.msc locally or gpedit for domain policy
Set-NetFirewallRule Name RVM-VDS-In-TCP Enabled True -Profile Any
Set-NetFirewallRule Name RVM-VDSLDR-In-TCP Enabled True -Profile Any
Set-NetFirewallRule Name RVM-RPCSS-In-TCP Enabled True -Profile Any

#  Enable DCOM management requests in
Try
{
    Set-NetFirewallRule Name ComPlusNetworkAccess-DCOM-In Enabled True -Profile Any
}
Catch
{
    Write-Host "ComPlusNetworkAccess-DCOM-In not set; assuming core installation"
}

#  Enable remote service management
Set-NetFirewallRule Name RemoteSvcAdmin-In-TCP Enabled True -Profile Any
Set-NetFirewallRule Name "RemoteSvcAdmin-NP-In-TCP Enabled True -Profile Any
Set-NetFirewallRule Name RemoteSvcAdmin-RPCSS-In-TCP Enabled True -Profile Any

#  Enable Remote Event Log Management
Set-NetFirewallRule Name "RemoteEventLogSvc-In-TCP Enabled True -Profile Any
Set-NetFirewallRule Name RemoteEventLogSvc-NP-In-TCP Enabled True -Profile Any
Set-NetFirewallRule Name RemoteEventLogSvc-RPCSS-In-TCP Enabled True -Profile Any

#  Enable Remote Scheduled Tasks Management
Set-NetFirewallRule Name RemoteTask-In-TCP Enabled True -Profile Any
Set-NetFirewallRule Name RemoteTask-RPCSS-In-TCP Enabled True -Profile Any

#  Enable Windows Firewall Remote Management
Set-NetFirewallRule Name RemoteFwAdmin-In-TCP Enabled True -Profile Any
Set-NetFirewallRule Name RemoteFwAdmin-RPCSS-In-TCP Enabled True -Profile Any

#  Enable WMI management requests in
Set-NetFirewallRule Name WMI-WINMGMT-In-TCP Enabled True -Profile Any

#  Enable Remote Shutdown
Set-NetFirewallRule Name Wininit-Shutdown-In-Rule-TCP-RPC Enabled True -Profile Any

#  Enable Network Discovery on the Domain Network
Set-NetFirewallRule Name NETDIS-FDPHOST-In-UDP Enabled True -Profile Domain
Set-NetFirewallRule Name NETDIS-FDPHOST-Out-UDP Enabled True -Profile Domain

#  Set some services to automatically start and start them.
Set-Service -Name PlugPlay -StartupType Automatic
Start-Service PlugPlay
Set-Service -Name RemoteRegistry -StartupType Automatic
Start-Service RemoteRegistry
Set-Service -Name vds -StartupType Automatic
Start-Service vds

#  Enable Remote Desktop
(Get-WmiObject Win32_TerminalServiceSetting -Namespace root\cimv2\TerminalServices).SetAllowTsConnections(1,1) | Out-Null
(Get-WmiObject -Class "Win32_TSGeneralSetting" -Namespace root\cimv2\TerminalServices -Filter "TerminalName='RDP-tcp'").SetUserAuthenticationRequired(0) | Out-Null

#  Enable Remote Desktop rules for all profiles
Set-NetfirewallRule -Name "RemoteDesktop-UserMode-In-TCP" -Enabled True -Profile Any
Set-NetfirewallRule -Name "RemoteDesktop-UserMode-In-UDP" -Enabled True -Profile Any		
February 14th, 2014 6:44pm

This topic is archived. No further replies will be accepted.

Other recent topics Other recent topics