Windows Server 2008 R2 and Windows 7
Service Pack 1 Test Focus Guide
Microsoft Corporation
Published: June 2010
Version: 1.2
Abstract
This document focuses on key changes introduced with Service Pack 1 (SP1) for both Windows
Server 2008 R2 (“Server”) and Windows 7 (“Client”). These changes, spanning several key areas,
fall into three categories:

Changes to simplify administrative and management tasks

Ongoing improvements to overall quality: security, reliability, and performance

Support for emerging technologies and standards
Each change and its associated test scenarios are provided along with known issues and KB
articles wherever appropriate. This document highlights the changes and some common and
interesting scenarios for each change. Some of the scenarios might require special hardware.
Such prerequisites are also mentioned for each scenario.
Copyright
This document is provided “as-is.” Information and views expressed in this document, including
URL and other Internet website references, may change without notice. You bear the risk of
using it.
This document doesn't provide you with any legal rights to any intellectual property in any
Microsoft product. You may copy and use this document for your internal, reference purposes.
© 2010 Microsoft. All rights reserved.
Microsoft and Windows are trademarks of the Microsoft group of companies. All other
trademarks are property of their respective owners.
Contents
Windows 7 SP1 / Windows Server 2008 R2 SP1 Test Focus Guide ................................................. 5
Scope of This Document .............................................................................................................. 5
Providing Feedback ...................................................................................................................... 5
Major Changed Areas................................................................................................................... 6
SP1 Beta Test Guidance for IHV ................................................................................................... 8
Test Environment & Setup........................................................................................................ 9
Test Scenarios ........................................................................................................................... 9
Test Result Reporting Template ............................................................................................. 13
Server Roles & Priorities ............................................................................................................ 14
Networking................................................................................................................................. 15
DHCP ....................................................................................................................................... 15
Quality Improvements in DHCP........................................................................................... 15
Key Scenarios....................................................................................................................... 16
Network Load Balance ............................................................................................................ 20
Quality Improvements in NLB ............................................................................................. 20
Key Scenarios....................................................................................................................... 20
Branch Cache .......................................................................................................................... 23
What is Branch Cache.......................................................................................................... 23
Key Scenarios....................................................................................................................... 23
Storage ....................................................................................................................................... 25
File Server Resource Management ......................................................................................... 25
Quality Improvements in File Service.................................................................................. 25
Key Scenarios....................................................................................................................... 25
Server Technologies ................................................................................................................... 29
DNS ......................................................................................................................................... 29
Quality Improvements in DNS Server.................................................................................. 29
Key Scenarios....................................................................................................................... 29
Remote Desktop Services (Terminal Services) ....................................................................... 32
Quality Improvements in Remote Desktop Services........................................................... 32
Key Scenarios....................................................................................................................... 32
Directory Services ................................................................................................................... 35
Quality Improvements in Directory Services....................................................................... 35
Key Scenarios....................................................................................................................... 35
Internet Information Services (IIS) ......................................................................................... 42
Quality Improvements in IIS ................................................................................................ 42
Key Scenarios....................................................................................................................... 42
Clustering and High Availability .............................................................................................. 43
Quality Improvements in Clustering and High Availability ................................................. 43
Key Scenarios....................................................................................................................... 43
ADFS ........................................................................................................................................ 45
What is ADFS? ..................................................................................................................... 45
Key Scenarios....................................................................................................................... 45
Right Mamagement Server ..................................................................................................... 48
Quality Improvements in RMS ............................................................................................ 48
Key Scenarios....................................................................................................................... 48
Network Access Protection..................................................................................................... 54
What is NAP? ....................................................................................................................... 54
Key Scenarios....................................................................................................................... 54
Distributed File System/Replication ....................................................................................... 58
What is Distributed File System/Replication? ..................................................................... 58
Key Scenarios....................................................................................................................... 58
Windows Data Access Components (Windows DAC) ............................................................. 60
Quality Improvements in Windows DAC ............................................................................. 60
Key Scenarios....................................................................................................................... 60
Client Technologies (Applicable to both Server & Client) .......................................................... 62
Print ........................................................................................................................................ 62
Quality Improvements in printing ....................................................................................... 62
Key Scenarios....................................................................................................................... 63
RemoteFX for Remote Desktop Virtualization Host ............................................................... 66
What is RemoteFX for Remote Desktop Virtualization Host .. Error! Bookmark not defined.
Key Scenarios........................................................................... Error! Bookmark not defined.
Miscellaneous ............................................................................................................................ 66
Dynamic Memory ................................................................................................................... 70
What is Dynamic Memory? ................................................................................................. 70
Key Scenarios....................................................................................................................... 73
SQL Server............................................................................................................................... 75
Quality Improvements in SQL Server .................................................................................. 75
Key Scenarios....................................................................................................................... 75
Windows 7 SP1 / Windows Server 2008 R2
SP1 Test Focus Guide
Microsoft continuously improves Windows 7® and Windows Server® 2008 R2 by providing
ongoing updates while working with software and hardware vendors to deliver application
compatibility and hardware compatibility improvements. Service Pack 1 (SP1) is another vehicle
through which Microsoft provides operating system improvements to customers.
SP1 is an update to both Windows 7 and Windows Server 2008 R2 that, along with
improvements delivered to users via other channels, addresses feedback from our customers.
As with previously released updates, SP1 contains changes that are focused on supporting new
types of hardware, adding support for several emerging standards, and addressing specific
reliability, performance, and compatibility issues. SP1 also continues to improve upon the IT
administration experience. While SP1 is not intended to be a vehicle for releasing new features,
some existing features do gain slightly enhanced functionality in SP1.
Scope of This Document
This document focuses on key changes introduced with SP1 for both Windows Server 2008 R2
(“Server”) and Windows 7 (“Client”). These changes, spanning several key areas, fall into three
categories:

Changes to simplify administrative and management tasks

Ongoing improvements to overall quality: security, reliability, and performance

Support for emerging technologies and standards
Each change and its associated test scenarios are provided along with known issues and KB
articles wherever appropriate. This document highlights the changes and some common and
interesting scenarios for each change. Some of the scenarios might require special hardware.
Such prerequisites are also mentioned for each scenario.
Providing Feedback
Please use your Connect account to provide suggestions or file bugs regarding this content.
Important
Before you begin, log onto your Connect account and download the Feedback tool.
Once it is downloaded, you can use Feedback for the duration of the beta program.
To send feedback:
1. Log onto your Connect account.
2. Open and fill out a bug submission form.
a. Run the Feedback tool.
b. Attach the resulting Feedback CAB file to the bug.
3. Submit the bug.
Major Changed Areas
This section describes the major areas and subareas that underwent various changes toward
improving quality across the operating system.
Area
Changed Major Subareas
Base Technologies
.NET Framework
Emulation Layer
File Systems (Local)
HAL
Kernel
Plug and Play
Power Management
Client Technologies
Client Platform
Date And Time
Desktop Shell
Area
Changed Major Subareas
Graphics Infrastructure
Internet Explorer
Logon
Computer Management
Automated Tasks
Core Virtualization
Hypervisor (HV)
Virtual Devices
Data Services
Data Access Components
Drivers
1394
PCI
Printers
Secure Digital (SD)
USB Core
Multimedia
Audio/Video Core
Codecs & DSP
Media Center
Media Center Extender
Media Foundation
Networking
DHCP
IPsec
Network Driver Interface Specification (NDIS)
RRAS
TCP/IP
Area
Changed Major Subareas
Windows Filtering Platform (WFP)
Wireless Services
Security
Authentication
Crypto
PKI
Server Technologies
ADFS
Clustering and High Availability
Directory Services
DNS Server
File Systems (Remote)
Internet Information Services (IIS)
Right Management Server
Remote Desktop Service
Windows Data Access Component
Storage
Core Storage
Personal Storage
SP1 Beta Test Guidance for IHV
This section describes the test scenarios for third party drivers/devices. The aim of this testing is
to find regressions in third party device driver functionality from the previous RTM and to find
high impact, high applicability/opportunity issues in third party devices and drivers relatively
early in the ship cycle.
Test Environment & Setup
1. Coverage on both x86-based and x64-based computers. Itanium-based computers would be
nice to have as well.
2. Coverage on both Windows 7 and Windows Server 2008 R2 operating systems (as
applicable).
3. Coverage on latest drivers displaying the Designed for Windows logo.
4. Coverage on Home, Ultimate, Business, and Server editions.
Test Scenarios
In the following table, the devices refer to the device that is controlled by your driver: Audio,
Video, Print, Networking, USB, Storage, Optical, etc. In most cases, the driver under test should
be installed prior to performing these tests.
Categories
Test ID
Test Variations
SP Update
T1
1. SP Installation: Ensure that all devices continue to work
after a service pack install, for example Windows 7 SP1
installs fine on Windows 7 RTM or Windows Server 2008
R2 SP1 installs on Windows Server 2008 R2 RTM.
2. SP Uninstallation: Ensure that all devices continue to work
after a service pack is uninstalled, for example after SP1 is
uninstalled from Windows 7 or Windows Server 2008 R2.
3. Ensure that the system does not stop responding or other
serious issues occur while installing or uninstalling SP1.
4. Default Device Settings: Ensure device settings are
preserved across SP installations and uninstallations.
5. Non-Default Device Settings: Ensure non-default device
settings are not turned on across SP installations and
uninstallations.
6. Please ensure that the non-Microsoft applications
(Developed by the IHVs) that control or configure the
Categories
Test ID
Test Variations
devices are functioning properly after installing the service
pack.
Power Management
T2
1. S2, S3, S4, Hybrid Sleep (standby, hibernate states): Ensure
that devices continue to function properly after returning
from low power states in SP1.
2. Test some of T2, T3 & T4 on DC (Battery) in the Power
Saver scheme.
Plug and Play
T3
1. Where applicable, ensure devices continue to function
after plugging them in and disconnecting them from the
system.
2. Hybrid of Plug and Play and power management tests: Go
to standby, unplug, come back from standby, and then plug
in and test for functionality.
3. Docking: Ensure that devices continue to function properly
after docking and undocking of laptops.
4. Driver Installation: Ensure that during and after the
installation of a new version of the driver that the device
functions properly.
5. Driver Uninstallation: Ensure that the uninstallation of a
driver results in the system reverting back to use the
previous version of driver.
6. Inbox: Ensure that the device drivers load properly when
device is activated.
Scenario Based
T4
Video
1. Record video images or photos on peripheral devices,
capture on disk, save and upload to a website.
2. Extend displays to second or third monitors or external
projectors.
3. Use video chat IM along with text IM.
Categories
Test ID
Test Variations
Netwo 1. Copy large files to/from network using wired/wireless
rking
connection.
2. Stream videos from network.
3. Load songs from websites to peripheral devices such as a
Zune or an iPod.
Audio
1. Stream and play an audio file from the Internet.
2. Play back an audio file.
3. Play back a DVD.
Print
1. Open a picture with photo gallery and print it.
2. Open an Excel Spreadsheet, put data in tables, and then
print it.
3. Scan a paper document and view the scanned image on the
computer.
4. Print from PowerPoint.
5. Print an Adobe PDF file.
6. Print from Word.
Basic optional
features installation
and uninstallation
1. Enable all optional features before installing the service
pack.
Run Optionalfeatures.exe in an elevated command prompt
and select every check box in the tree.
2. SP Installation: Ensure that the service pack installed
successfully.
3. Ensure that all optional features are intact.
4. Disable all optional features.
5. Ensure that all optional features are disabled successfully.
Categories
Test ID
Test Variations
Basic scenario for
Dism.exe and Disk
Cleanup Utility
S1
1. SP Installation: Ensure that SP installed successfully, for
example Windows 7 SP1 installs successfully on Windows 7
RTM or Windows Server 2008 R2 SP1 installs on Windows
Server 2008 R2.
Note
Ensure your
offline
environment
provides SP1
binaries since
the
SPScavenge
functionality
will be
introduced in
SP1.
2. Capture the state of installed features by running the
following command:
Run dir “%windir%\” /b/s/a:d>files_before.txt
3. Run Dism.exe in an elevated command prompt to remove
the staged features superseded by SP installation
(Otherwise the execution fails
ERROR_ELEVATION_REQUIRED):
%windir%\system32\dism.exe /Online
/Cleanup-Image /spsuperseded
SP1 cannot
be uninstalled
after running
the DISM
command.
4. Capture the state of installed features by running the
following command:
Run dir “%windir%\” /b/s/a:d>files_after.txt
5. The difference between files_before.txt and files_after.txt
is the list of items that were removed by Dism.exe.
6. Ensure that SP1 can’t be uninstalled from Software
Explorer.
S2
1. SP Installation: Ensure that SP installed successfully.
2. Capture the state of the installed features by running the
following command:
dir “%windir%\” /b/s/a:d>files_before.txt
3. Run cleanmgr.exe to access the Disk Cleanup application:
Categories
Test ID
Test Variations
Run cleanmgr.exe
4. Click “Clean up system files” to list system files for cleanup.
5. Select the item “Backup files required to uninstall service
pack” and clear all the other items.
6. Click OK, and then confirm the operation.
7. Capture the state of installed features by running the
following command:
Run dir “%windir%\” /b/s/a:d>files_after.txt
8. The difference between files_before.txt and files_after.txt
is the list of items that were removed by Cleanmgr.exe.
9.
Ensure that SP1 can’t be uninstalled from Software
Explorer.
Unexpected Results

Bug checks

Computer stops responding

Loss of functionality

Unusable system after update to SP1
Test Result Reporting Template
Driver Name & Version:
PNP ID:
Operating System / Platform:
Test ID
Result
T1
Pass
T2
..
..
..
When reporting issues, please capture the following logs:

%WINDIR%\WindowsUpdate.log

%WINDIR%\Inf\setupapi.dev.log

%WINDIR%\Inf\setupapi.app.log

%WINDIR%\Logs\CBS\CBS.log

%WINDIR%\Logs\CBS\CBS.persist.log

%WINDIR%\Panther\setupact.log

%WINDIR%\Panther\setuperr.log

%WINDIR%\MEMORY.DMP (if exists)

%WINDIR%\Minidump\*.dmp

Dxdiag

Msinfo32
Server Roles & Priorities
What follows are the priorities for roles based on the changes that were made in various
features related to each of these roles. These can be used to prioritize various tests and
scenarios on Windows Server 2008 R2.
S No
Role Priority
Server Roles
1
P0
Hyper-V
2
P0
Terminal Services
3
P0
Active Directory Rights
Management Services
4
P0
Print Services
5
P0
Cluster
6
P0
File Services
7
P0
RRAS
8
P0
Active Directory Domain Services
9
P1
DNS Server
10
P1
Active Directory Lightweight
Directory Services
11
P1
Active Directory Certificate
Services
12
P1
Network Policy And Access
Services (NAP)
Networking
DHCP
Quality Improvements in DHCP
Windows Server 2008 R2 SP1 DHCP has improved the functionality and
reliability in both the IP lease and IP scope features.
Key Scenarios
Scenario 1 – MAC-Based Filtering
Goal:
Verify that the client can get the leases from DHCP server properly.
Prerequisites or specific configuration for the scenario:
Install Windows Server 2008 R2 SP1, DHCP Server
Applicability:
Server
Step-by-step scenario description:
1. Connect Windows Server 2008 R2 SP1 DHCP server with clients that are
running various Windows operating systems.
2. Add filters to DHCP server using Netsh or UI.
3. If there is an allow list, only the clients in the “allow” list should get leases.
All clients in the “deny” list must not get leases.
4. If there is no “allow” list all clients except those in the deny list should get
leases.
5. More information about the guideline can be found at
http://technet.microsoft.com/enus/library/ee405265%28WS.10%29.aspx.
Expected results:
The clients on the “deny” list cannot obtain leases, but other clients can get
leases depending on the configuration of the DHCP server.
Exceptions:
None
Scenario 2 – Split Scope
Goal:
Verify the DHCP scope split feature.
Prerequisites or specific configuration for the scenario:
A server running Windows Server 2008 R2 SP1, two DHCP Servers.
Applicability:
Server
Step-by-step scenario description:
1. Set up two DHCP servers on the same network.
2. The administrator should create a working scope on one of them (or she
may use a pre-configured one). She can then use the split scope wizard to
extend this scope to another DHCP server on the same network.
3. More information about the guideline can be found at
http://technet.microsoft.com/enus/library/ee405264%28WS.10%29.aspx.
Expected results:
The feature will automatically set up a scope and the required exclusions on
the other server.
Exceptions:
None
Scenario 3 – DHCID
Goal:
Verify the DHCP DHCID feature.
Prerequisites or specific configuration for the scenario:
Install Windows Server 2008 R2 SP1, DHCP Servers.
Applicability:
Server
Step-by-step scenario description:
1. One Windows Server 2008 R2 SP1 DHCP server configured to do A/AAAA
registrations for clients and configured to use this feature.
2. The DNS server address should be set on the DHCP server and the DNS
server should be reachable through the DHCP server. There should be
some non-Windows clients (such as Linux) trying to acquire lease from the
DHCP server.
3. The DHCP server should register these clients on the DNS server if and
only if no other client having the same FQDN name is registered in the
DNS server.
4. More information about the guideline can be found at
http://technet.microsoft.com/enus/library/ee404786%28WS.10%29.aspx.
Expected results:
The clients can be registered in the DNS server by the DHCP properly.
Exceptions:
None
Scenario 4 – Information Refresh Time Option (Option 32)
Goal:
Verify the Information Refresh Time Option (option 32).
Prerequisites or specific configuration for the scenario:
Install Windows Server 2008 R2 SP1, DHCP Servers.
Applicability:
Server
Step-by-step scenario description:
1. One Windows Server 2008 R2 DHCP server configured with V6 scopes
connected to various V6 clients. The clients under test should be in
stateless mode (in a windows client this would mean the M flag should be
set to 0 and the O flag should be set to 1).
2. These clients would only acquire other configuration parameters through
the DHCP server.They will automatically configure their ipv6 addresses.
The clients should try to reacquire the options from the DHCPv6 server
based on the value of Information Refresh Time Option. Hence any
change in the acquired options done in the DHCP server between the
option acquisition and refresh of the client would be reflected in the client
after the refresh.
3. More information about the guideline can be found at
http://technet.microsoft.com/en-us/library/cc722532.aspx.
Expected results:
Any change in the acquired options done in the DHCP server between the
option acquisition and refresh of the client would be reflected in the client
after the refresh.
Exceptions:
None
Network Load Balance
Quality Improvements in NLB
Windows Server 2008 R2 SP1 NLB has improved the functionality and reliability
in the Extended Affinity.
Key Scenarios
Scenario 1 – Scalable Shopping Cart Web Application
Goal:
Verify extended affinity improvement.
Prerequisites or specific configuration for the scenario:
A three-node cluster with IIS installed.
Applicability:
Server
Step-by-step scenario description:
In this scenario, the same web application is installed on two computers.
These two computers are joined together in an NLB cluster so that when
client traffic arrives to the cluster IP address, it will be load-balanced
between the two computers. This will result in faster response rates for
clients accessing the web application. Start with a two-node cluster, then
under heavy client traffic, add another node to the cluster. With extended
affinity enabled, we can guarantee that the client state information will be
managed by only one server in the cluster. This scenario can be applied to
any web application that requires client state to be preserved on the server.
More information about the guideline can be found at
http://blogs.msdn.com/clustering/archive/2009/10/21/9910338.aspx.
Expected results:
The client state information will be managed by only one server in the
cluster.
Exceptions:
None
Scenario 2 – Split brain with two-way extended affinity
Goal:
Verify extended affinity improvement.
Prerequisites or specific configuration for the scenario:
A two-node cluster and one client computer, with SP1 installed.
Applicability:
Server
Step-by-step scenario description:
Create a two-node NLB cluster. Freeze one of the nodes (for example,
Node2). Send a connection from client to NLB cluster. Now Node1 has
extended affinity for the client. Freeze Node1 and resume Node2. Send a
connection from the client to NLB cluster. Now Node2 has extended affinity
for the client. Resume Node1. Make sure that NLB cluster converges and
the client has extended affinity to only one node. More information about
the guideline can be found at http://technet.microsoft.com/enus/library/cc754833(WS.10).aspx.
Expected results:
The NLB cluster converges and the client has extended affinity to only one
node.
Exceptions:
None
Scenario 3 – TMG server with integrated NLB
Goal:
Verify the integration between TMG server and NLB.
Prerequisites or specific configuration for the scenario:
A cluster with four or more nodes and TMG (formerly ISA) server.
Applicability:
Server
Step-by-step scenario description:
Configure an array of TMG servers to protect the internal network. Enable
integrated NLB on the array of TMG servers. The inbound/outbound traffic
is load balanced between the TMG servers and no split brain occurs during
cluster operation. More information about the guideline can be found at
http://technet.microsoft.com/en-us/library/bb794741.aspx.
Expected results:
The inbound/outbound traffic is load-balanced between the TMG servers
and no split brain occurs during cluster operation.
Exceptions:
None
Branch Cache
What is Branch Cache
BranchCache reduces WAN link utilization and improves application responsiveness for branch
office workers when accessing servers over slow, congested connections. Clients retrieve data
from a cache within the branch office instead of from remote servers. The cache may be
distributed amongst the clients in the branch (Distributed Cache mode) or may reside on a local
server (Hosted Cache mode).
BranchCache only works between Windows 7 clients and Windows Server 2008
R2 servers hosting content accessible using the HTTP, SMB, and BITS protocols.
BranchCache is disabled by default on clients and must be installed on servers.
Key Scenarios
Scenario 1 – Deploy a remote office in hosted cache mode
Goal:
Verify the functionality of the remote office in the hosted cache mode.
Prerequisites or specific configuration for the scenario:
Two clients and two servers with SP1 installed.
Applicability:
Server, Client
Step-by-step scenario description:
In hosted cache mode, remote office clients rely on a locally deployed server when storing
or retrieving cacheable content. To test this scenario two clients and two servers are
needed. One server provides content using one of the BranchCache enabled protocols
(HTTP or SMB) and the other acts as a hosted cache server that will store and serve content.
In this scenario, the first client downloads data from the content server and provides it to
the hosted cache. The second client attempts to download the same content, and retrieves
it from the hosted cache server instead of the content server.
More information about the guideline can be found at
http://technet.microsoft.com/library/ee649232(WS.10).aspx.
Expected results:
In this scenario, the first client downloads data from the content server and
provides it to the hosted cache. The second client attempts to download the
same content, and retrieves it from the hosted cache server instead of the
content server.
Exceptions:
None
Scenario 2 – Deploy a remote office in distributed cache mode
Goal:
Verify the distributed cache mode for remote office.
Prerequisites or specific configuration for the scenario:
Two clients and one server with SP1 installed.
Applicability:
Server, Client
Step-by-step scenario description:
In distributed cache mode, branch office clients cache content locally and provide it to each
other on demand. To test this scenario two clients and one servers are needed. The server
provides content using one of the BranchCache enabled protocols (HTTP or SMB). In this
scenario, the first client downloads data from the content server and caches it locally. The
second client attempts to download the same content, and retrieves it to its peer instead of
the content server.
More information about the guideline can be found at
http://technet.microsoft.com/library/ee649232(WS.10).aspx
Expected results:
In this scenario, the first client downloads data from the content server and
caches it locally. The second client attempts to download the same content,
and retrieves it to its peer instead of the content server.
Exceptions:
None
Storage
File Server Resource Management
Quality Improvements in File Service
Windows Server 2008 R2 SP1 File Server Resource Management has improved
the scalability and reliability of the File Classification infrastructure.
Key Scenarios
Scenario 1 – Using Content Classifier on a large set of files
Goal:
Classify a variety of files (such as text files, Office documents, etc.) with
FSRM built-in Content Classifier using Regular Expressions.
Prerequisites or specific configuration for the scenario:
Installation of File Server Resource Management (FSRM) feature in windows
Server 2008 R2 SP1.
Applicability:
Server
Step-by-step scenario description:
1. Configure a FSRM classification property, such as Business Impact:
HBI/MBI/LBI.
2. Create a new classification rule to govern over local folder or a mount
point. File Classification Infrastructure (FCI) is capable of handling a
large number of files.
3. Configure this classification rule to classify files based on its content.
Use Content Classifier as the classifier, and then configure the content
classifier to use Regular expressions.
4. Run Classification right away, or configure automatic classification
schedule to make it run periodically. Note that classification can be
configured to run at specific hours (such as non-peak hours). If
classification couldn’t be finished in one scheduled time slot, it will
resume in the next one.
5. Configure some File Management Tasks to act on the classification
results. This is done by the settings in Condition tab when
creating/editing the File Management Task. One example of such task is
to apply encryption to files that are classified as HBI of its Business
Impact property.
Read More:
http://blogs.technet.com/filecab/archive/2009/05/11/classifying-filesbased-on-location-and-content-using-the-file-classification-infrastructurefci-in-windows-server-2008-r2.aspx
Expected results:
 Files should be classified based on the contents correctly, regardless of
the size or the amount of files at the location configured in the
classification rule.

For Office documents, the classification property set by FSRM can be
read by inspecting the properties of the file when they are opened in
Microsoft Office.

File Management Tasks performed specified actions (such as file
encryption) on schedule and on the right set of files specified by the
user.

Files residing on mounted volume should be classified and auctioned
upon with no differences than any other files.

Files that are read-only should be skipped in the automatic
classification.

Since FSRM classification is incremental (unless configured otherwise by
user), a second classifications over the same set of file should take
much less time to complete.
Exceptions:
None
Scenario 2 – Use FCI in conjunction with other FSRM features in a cluster environment
Goal:
Verify the FCI functionality in the cluster environment.
Prerequisites or specific configuration for the scenario:
Multiple server computers; Installation of File Server Resource Management
(FSRM) feature; Installation of Cluster feature.
Applicability:
Server
Step-by-step scenario description:
1. Configure a Quota (FSRM Quota, not NTFS Disk quota) over a folder on
the cluster volume; for example, a hard limit of a maximum of 1 Gb of
data is allowed in that folder.
2. Configure a File Screening of the files in that folder; for example,
prohibiting any Mp3/Avi file to be placed in that folder.
3. Configure a File classification for the files in that folder; for example, all
files that have word ‘Confidential’ in its content should be classified as
HBI (high business impact).
4. Run classification on the folder.
5. Move the corresponding file server resource to other nodes in the
cluster.
Expected results:
 All FSRM features should expect to work normally when they are jointly
affecting any folder on a cluster volume.

Whenever a resource move or failover happens, FSRM settings should
be moved to the corresponding node intact, and work on the new node
as before.
Exceptions:
None
Server Technologies
DNS
Quality Improvements in DNS Server



On an Internet-facing DNS server, all internal and external (Internet facing names) can be
resolved.
AD integration and forest recovery mechanism.
DNSSEC was designed to protect the Internet from certain attacks, such as DNS cache
poisoning [0]. It is a set of extensions to DNS, which provide: a) origin authentication of DNS
data, b) data integrity, and c) authenticated denial of existence. These mechanisms require
changes to the DNS protocol. DNSSEC adds four new resource record types: Resource
Record Signature (RRSIG), DNS Public Key (DNSKEY), Delegation Signer (DS), and Next Secure
(NSEC). These new RRs are described in detail in RFC 4034.
Key Scenarios
Scenario 1 – EDNS probe and name resolution
Goal:
On an Internet-facing DNS server, make sure that all internal and external
(Internet-facing names) are resolved.
Prerequisites or specific configuration for the scenario:
Install Windows Server 2008 R2 SP1
Applicability:
Server
Step-by-step scenario description:
1. On a server with both forwarding and Internet-facing server, install
Windows Server 2008 R2 SP1.
2. Enable EDNS (dnscmd /config /EnableEDnsProbes 1).
3. Ensure that the DNS servers behind routers and firewalls are able to
resolve names post the SP1 installation.
4. Ensure that all internal and external names are resolved.
Expected results:
All internal and external (Internet facing names) are resolved.
Exceptions:
None
Scenario 2 – Active Directory Integration and forest recovery
Goal:
To ensure the DNS Active Directory integration and forest recovery
mechanism work.
Prerequisites or specific configuration for the scenario:
DNS servers hosting Active Directory integrated zones and with SP1 installed.
Applicability:
Server
Step-by-step scenario description:
1. Install SP1 on DNS servers hosting Active Directory integrated zones.
2. Try forest recovery using this Microsoft white paper:
http://www.microsoft.com/downloads/details.aspx? displaylang=en&FamilyID=326c8a7adcad-4333-9050-a6303ff3155c.
3. For Active Directory integrated zones, attempt zone transfers and make sure that the
memory consumption does not increase after installing the service pack.
Expected results:
No increases in memory consumption after installing the service pack when
doing the zone transferring.
Exceptions:
None
Scenario 3 – DNSSEC
Goal:
To catch and fix any deployment-blocking issues in signing static zones, trust anchor
configuration, and key rollover.
Prerequisites or specific configuration for the scenario:
Windows Server 2008 R2 SP1
Applicability:
Server
Step-by-step scenario description:
The deployment guideline is
http://www.microsoft.com/downloads/details.aspx?FamilyID=7a005a14-f740-4689-8c439952b5c3d36f&DisplayLang=en.
Expected results:
 There should not be any performance or functionality changes from RTM for DNSSEC
deployment.
 DNSSEC signed zones should be able to be deployed without significant processing
penalty side-by-side with regular DNS Server Deployment.
Exceptions:
None
Remote Desktop Services (Terminal Services)
Quality Improvements in Remote Desktop Services
Windows Server 2008 R2 SP1 Remote Desktop Services ( Terminal Services) has fixed issues to
improve reliability, scalability, and security.
Key Scenarios
Scenario 1 – Remote Desktop Connection
Goal:
User can do remote desktop connection without getting the “Version
mismatch” error dialog.
Prerequisites or specific configuration for the scenario:
Both client and server computer should be Windows 7 SP1 or Windows
Server 2008 R2 SP1.
Applicability:
Server & Client
Step-by-step scenario description:
Run Mstsc.exe or launch Remote Desktop from the Start Menu.
Expected results:
Users should be able to start Remote Desktop successfully.
Exceptions:
None
Scenario 2 – Large scale Remote Desktop Services deployment
Goal:
User can do remote desktop connection without any functionality errors.
Prerequisites or specific configuration for the scenario:
The server should have Windows Server 2008 R2 SP1 installed on it.
Applicability:
Server
Step-by-step scenario description:
Install Remote Desktop Session Host on Windows Server 2008 R2 SP1
serversusing this Step-by-Step Guide. Install the Remote Desktop WebAccess
Role Services as well. Enable all client experience features including device
redirection, multiple monitor, etc.
Expected results:
Users should be able to connect to their work computer through tsgateway or
RAS. Users will connect from Windows 7,Windows Vista, Windows, XP,
Windows Server 2003, and various network configurations.
Exceptions:
None
Scenario 3 – Remote Desktop Virtualization
Goal:
Enable you to publish virtual resources to the users in your organization. RDV
is aimed squarely not only at consolidation of the resources but also on the
discovery mechanism of these virtualized resources.
Prerequisites or specific configuration for the scenario:
Set up a Connection Broker and a Remote Desktop WebAccess Server and 4
Remote Desktop Virtualization Hosts (instructions). The server should be
Windows Server 2008 R2 SP1.
Applicability:
Server
Step-by-step scenario description:
1. Set up four Remote Desktop Virtualization Hosts (instructions).
2. Deploy a VM Pool (instructions) of at least 4 VMs and Configure 4
Personal Virtual Desktops (instructions).
3. You will also need to deploy a Connection Broker and a Remote Desktop
WebAccess Server.
Expected results:
Remote Desktop Virtualization works as expected. The virtual resource can be
published.
Exceptions:
None
Scenario 4 – Remote Desktop Session Host Farm with Clustered Connection Broker
Goal:
To verify the RDSH Farm managed properly by broker.
Prerequisites or specific configuration for the scenario:
6 servers with Windows Server 2008 R2 SP1 installed.
Applicability:
Server
Step-by-step scenario description:
1. Install RDSH role on Windows Server 2008 R2 SP1 on six servers.
2. Setup a failover cluster for the Connection Broker role with two nodes
(instructions).
3. Setup a Remote Desktop WebAccess Server.
4. Join the six RDSH servers to the farm (instructions).
Expected results:
The availability of the RDSH resource is improved.
Exceptions:
None
Directory Services
Quality Improvements in Directory Services
Windows Server 2008 R2 SP1 directory service has fixed issues to improve functionality and
reliability.
Key Scenarios
Scenario 1 – Disjoint Namespace
Goal:
This is to verify the disjoint namespace.
Prerequisites or specific configuration for the scenario:
Two pre-existing domains. Servers are installed with Windows Server 2008 R2
SP1.
Applicability:
Server
Step-by-step scenario description:
1. Create two different Domains.
2. Following the guideline: http://technet.microsoft.com/enus/library/cc773264(WS.10).aspx
Expected results:
The disjoint namespace feature can work when one or more domain member
computers have a primary Domain Name Service (DNS) suffix that does not
match the DNS name of the Active Directory domain of which the computers
are members.
Exceptions:
None
Scenario 2 – Active Directory Domain Services in the perimeter network (also known as DMZ)
Goal:
Verify that Active Directory Domain Services function properly in a perimeter network.
Prerequisites or specific configuration for the scenario:
A pre-existing domain. Servers are installed with Windows Server 2008 R2
SP1.
Applicability:
Server
Scenario description:
The deployment guideline is http://technet.microsoft.com/enus/library/dd728034(WS.10).aspx.
Expected results:
No functionality failure with the active directory in the perimeter network
environment.
Exceptions:
None
Scenario 3 – Active Directory Lag Sites
Goal:
To verify the functionality of the lag site.
Prerequisites or specific configuration for the scenario:
Existing domain, with SP1 installed
Applicability:
Server
Scenario description:
The deployment guideline is
http://blogs.technet.com/askds/archive/2008/10/20/lag-site-or-hot-site-akadelayed-replication-for-active-directory-disaster-recovery-support.aspx.
Expected results:
Active Directory lag site can be used as a quick way to recover accidentally
deleted objects without having to resort to finding the most recent successful
backup within the tombstone lifetime of the domain that has the data.
However, note that this is not recommended as a disaster recovery strategy.
Exceptions:
None
Scenario 4 – Domain Controllers in Hyper-V
Goal:
To verify the virtualized domain controller works as expected.
Prerequisites or specific configuration for the scenario:
Windows Server 2008 R2 SP1 (Standard, Enterprise, Foundation, or
Datacenter edition)
Applicability:
Server
Step-by-step scenario description:
The deployment guideline is http://technet.microsoft.com/enus/library/dd363553(WS.10).aspx.
Expected results:
The virtualized domain controller can perform a physical domain controller.
Exceptions:
None
Scenario 5 – Certificate-based Authentication Infrastructure
Goal:
Verify the functionality of the certificate-based authentication infrastructure.
Prerequisites or specific configuration for the scenario:
See the requirement in http://technet.microsoft.com/enus/library/cc730847(WS.10).aspx.
Applicability:
Server
Scenario description:
When a certificate-based logon method (for example, smart-card logon) is
used, and authentication mechanism assurance is enabled, an additional
group membership is added to the user’s access token during logon. The
deployment guideline is http://technet.microsoft.com/enus/library/cc730847(WS.10).aspx.
Expected results:
The certificate-based authentication infrastructure works as expected in the
Active Directory environment.
Exceptions:
None
Scenario 6 – Branch Office Topology
Goal:
Verify the topology and functionality of the Branch Office.
Prerequisites or specific configuration for the scenario:
A pre-existing read-only domain controller with SP1 installed.
Applicability:
Server
Scenario description:
In an ideal strategy, remote offices have the benefit of data and service
locality without the costs of securing and administering the information
technology (IT) infrastructure. Read-only domain controllers (RODCs) map
well to that strategy because they can cache the data that the remote office
needs, and they provide delegation for specific management tasks. The
deployment guideline is http://technet.microsoft.com/enus/library/dd734758(WS.10).aspx.
Expected results:
The read-only domain controller is working well in the existing environment.
Exceptions:
None
Scenario 7 – Managed Service Accounts
Goal:
Verify the topology and functionality of the remote office.
Prerequisites or specific configuration for the scenario:
None.
Applicability:
Server
Scenario description:
Managed service accounts are used to run various services for applications that are operating
in your domain environment. More details: http://technet.microsoft.com/enus/library/dd378925(WS.10).aspx .
Expected results:
Services for applications running in the remote office work well with Managed Service
Accounts.
Exceptions:
None
Scenario 8 – Offline domain join
Goal:
Verify the topology and functionality of the remote office.
Prerequisites or specific configuration for the scenario:
None.
Applicability:
Server
Scenario description:
You can use offline domain join to join computers to a domain without contacting a domain
controller over the network. You can join computers to the domain when they first start up
after an operating system installation. No additional restart is necessary to complete the
domain join. This helps reduce the time and effort required to complete a large-scale
computer deployment in places such as datacenters. For more details see the following:
http://technet.microsoft.com/en-us/library/dd391977(WS.10).aspx.
Expected results:
Deployment of computers in the remote office should work with no access to
a domain controller.
Exceptions:
None
Internet Information Services (IIS)
Quality Improvements in IIS
IIS has improved the publishing functionality in the SP1 for FTP.
Key Scenarios
Scenario 1 – FTP site publishing and configuration
Goal:
Verify the publishing functionality for FTP.
Prerequisites or specific configuration for the scenario:
None
Applicability:
Server
Step-by-step scenario description:
1. Create a new FTP site: http://go.microsoft.com/fwlink/?LinkId=89115
2. Add FTP publishing to an existing Web site: http://go.microsoft.com/fwlink/?LinkId=89116
3. Configure FTP over SSL: http://go.microsoft.com/fwlink/?LinkId=89117
4. Configure FTP user isolation: http://go.microsoft.com/fwlink/?LinkId=89118
5. Configure FTP virtual host names: http://go.microsoft.com/fwlink/?LinkId=89119
6. Configure FTP firewall settings: http://go.microsoft.com/fwlink/?LinkId=100090
7. Configure folder quotas for use with FTP: http://go.microsoft.com/fwlink/?LinkId=100092
8. Configure IIS Manager Authentication for FTP:
http://go.microsoft.com/fwlink/?LinkId=100142
Expected results:
The FTP site can be published as expected.
Exceptions:
None
Clustering and High Availability
Quality Improvements in Clustering and High Availability
Cluster service has improved the support for complex MPIO configurations in CVT. The changes
enabled the Failover service (clssvc) and UI (cluadmin) under VM-Scale.
Key Scenarios
Scenario 1 – Failover Service (clssvc) and UI (cluadmin) under VM-Scale
Goal:
Verify that virtual machines running on Hyper-V can use the dynamic memory
as expected.
Prerequisites or specific configuration for the scenario:
Windows Server 2008 R2 SP1
Applicability:
Server
Step-by-step scenario description:
1. Create 64 VMs per node. Each VM should be configured to use dynamic
memory. Each VM should have some load which causes memory
allocations and de-allocations.
2.
Cluster all VMs. Guideline: http://technet.microsoft.com/enus/library/dd197477(WS.10).aspx.
3.
Verify the following scenarios: LiveMigration (use cluadmin),
QuickMigration (use cluadmin), Failover (use cluadmin), Machine disaster
(expected restart, unexpected restart).
Expected results:
The failover service in VM-scale functions well.
The dynamic memory management mechanism functions well.
Exceptions:
None.
Scenario 2 – CVT in complex MPIO setup
Goal:
To verify the CVT works fine in complex MPIO setup.
Prerequisites or specific configuration for the scenario:
Windows Server 2008 R2 SP1.
Applicability:
Server
Step-by-step scenario description:
1. Configure a cluster setup with 8+ nodes with each node having 8+ MPIO
paths to disk. The guideline is http://technet.microsoft.com/en-
us/library/dd197477(WS.10).aspx.
2.
Run CVT (Cluster Validation Test).
Expected results:
All disk related cluster validation tests pass.
Exceptions:
None
ADFS
What is ADFS?
Active Directory Federation Services (AD FS) is a server role in Windows Server 2008 R2 that
provides Web single-sign-on (SSO) technologies to authenticate a user to multiple Web
applications over the life of a single online session.
For more information about ADFS, please see the following TechNet article:
http://technet.microsoft.com/en-us/library/dd391937(WS.10).aspx.
Key Scenarios
Scenario 1 – Classic Two Forests federated web SSO scenario
Goal:
Verify that the SAML security token can be cleaned after sign out.
Prerequisites or specific configuration for the scenario:
None
Applicability:
Server
Step-by-step scenario description:
The deployment guideline is http://technet.microsoft.com/enus/library/cc757344(WS.10).aspx.
Expected results:
After using sign-out, the SAML security token can also be used to access
resources.
Exceptions:
None
Scenario 2 – Two Forests ADFS Scenario with one way Forest Trust
Goal:
Verify that two Forests ADFS with one way Forest Trust can function well.
Prerequisites or specific configuration for the scenario:
None
Applicability:
Server
Step-by-step scenario description:
The deployment guideline is http://technet.microsoft.com/enus/library/dd378921(WS.10).aspx.
Expected results:
ADFS for two forests with a one-way forest trust functions properly.
Exceptions:
None
Scenario 3 – Interoperation with non-Microsoft federation services
Goal:
Verify that the ADFS can interoperate well with non-Microsoft federation
service.
Prerequisites or specific configuration for the scenario:
None
Applicability:
Server
Step-by-step scenario description:
The deployment guideline is http://technet.microsoft.com/enus/library/dd378921(WS.10).aspx.
Expected results:
Both ADFS and non-Microsoft federation service works as expected.
Exceptions:
None
Scenario 4 – Interoperation with older versions of ADFS
Goal:
Verify that the ADFS can interop well with older versions of ADFS.
Prerequisites or specific configuration for the scenario:
None
Applicability:
Server
Step-by-step scenario description:
The ADFS deployment guideline is http://technet.microsoft.com/enus/library/dd378921(WS.10).aspx.
Expected results:
Both Windows Server 2008 R2 SP1 ADFS and Windows Server 2003/2008
ADFS work properly.
Exceptions:
None
Right Mamagement Server
Quality Improvements in RMS
1. Support for non-Microsoft federationservices: ADRMS Support for non-Microsoft
federation servers.
2. Mac Office support: Enable RMS Server to support Mac Office RMS features.
3. Authentication Update: Enables integration with the Microsoft Federation Gateway for
authentication to work across Organizational Boundaries.
Key Scenarios
Scenario 1 – Federated Group Expansion
Goal:
Verify the federated group expansion.
Prerequisites or specific configuration for the scenario:
None
Applicability:
Server
Step-by-step scenario description:
1. Group expansion on federated environment.
2. Publish documents from resource domain and restrict the permission
to a group in account domain.
Expected results:
The user in the account domain group can open the document as
expected.
Exceptions:
None
Scenario 2 – SQM support
Goal:
Verify the RMS feature will be not impacted by the SQM.
Prerequisites or specific configuration for the scenario:
None
Applicability:
Server
Step-by-step scenario description:
Switch on CEIP on RM Server.
Expected results:
The functionality will not be impacted by SQM.
Exceptions:
None
Scenario 3 – Power shell for RMS Admin
Goal:
Verify that Power shell can be used to configure the RMS settings.
Prerequisites or specific configuration for the scenario:
None
Applicability:
Server
Step-by-step scenario description:
1. Setup RMS.
2. Use Windows PowerShell to configure the RMS server: Server
settings, policy settings, federal settings.
Expected results:
The RMS server can be configured by using Windows PowerShell.
Exceptions:
None
Scenario 4 – Power shell for RMS Setup
Goal:
Verify the RMS can be set up by using Windows PowerShell.
Prerequisites or specific configuration for the scenario:
None
Applicability:
Server
Step-by-step scenario description:
Use Windows Powershell to setup and provision RMS.
Expected results:
The RMS should be set up successfully.
Exceptions:
None
Scenario 5 – Federated Support for non-Microsoft federation servers
Goal:
Verify the ADRMS can support a non-Microsoft federation server.
Prerequisites or specific configuration for the scenario:
None
Applicability:
Server
Step-by-step scenario description:
1. Set up RMS server.
2. Set up non-Microsoft federation server.
3. Verify the RMS server can work with non-Microsoft federation
server.
Expected results:
The RMS with the non-Microsoft federation server as expected.
Exceptions:
None
Scenario 6 – Mac Office Support
Goal:
Verify the Mac Office RMS feature.
Prerequisites or specific configuration for the scenario:
None
Applicability:
Server
Step-by-step scenario description:
1. Set up RMS server.
2. Set up Mac Office.
3. Verify the RMS server can support Mac Office.
Expected results:
The RMS works well with Mac Office as expected.
Exceptions:
None
Scenario 7 – Authentication Update
Goal:
Verify the integration between the RMS server and Microsoft Federation
Gateway.
Prerequisites or specific configuration for the scenario:
None
Applicability:
Server
Step-by-step scenario description:
Set up the RMS server and integrate with the Microsoft Federation
Gateway.
Expected results:
The authentication should work across organizational boundaries as
expected.
Exceptions:
None
Network Access Protection
What is NAP?
Network Access Protection (NAP) is a new platform and solution that controls access to network
resources based on a client computer’s identity and compliance with corporate governance
policy. NAP allows network administrators to define granular levels of network access based on
who a client is, the groups to which the client belongs, and the degree to which that client is
compliant with corporate governance policy. If a client is not compliant, NAP provides a
mechanism to automatically bring the client back into compliance and then dynamically increase
its level of network access.
For more information about NAP, please see the following TechNet article:
http://technet.microsoft.com/en-us/network/bb545879.aspx.
Key Scenarios
Scenario 1 – NAP with IPSec Enforcement
Goal:
Verify NAP functions as expected in the IPSec enforcement scenario.
Prerequisites or specific configuration for the scenario:
None
Applicability:
Server
Step-by-step scenario description:
1. Deploy a NAP CA.
2. Deploy an HRA server.
3. Deploy a NAP Health Policy Server.
4. Configure Policies for IPsec enforcement.
5. Deploy NAP Client settings.
6. Deploy IPsec policies for NAP.
7. For more detailed information, the deployment guideline is
http://www.microsoft.com/downloads/details.aspx?FamilyID=298ff9561e6c-4d97-a3ed-7e7ffc4bed32&displaylang=en.
Expected results:
After deployment, the NAP platform works as expected in the IPSec
environment.
Exceptions:
None
Scenario 2 – NAP with DHCP Enforcement NAP
Goal:
Verify NAP functions well in the DHCP enforcement scenario.
Prerequisites or specific configuration for the scenario:
None
Applicability:
Server
Step-by-step scenario description:
The deployment guideline is
http://www.microsoft.com/downloads/details.aspx?FamilyID=ac38e5bb18ce-40cb-8e59-188f7a198897&displaylang=en.
Expected results:
After deployment, the NAP platform works as expected in the DHCP
environment.
Exceptions:
None
Scenario 3 – NAP with VPN Enforcement
Goal:
In this scenario, NAP will use the VPN enforcement method. NAP with VPN
enforcement can be used to enforce organizational compliance policies on
remote clients.
Prerequisites or specific configuration for the scenario:
None
Applicability:
Server
Step-by-step scenario description:
The deployment guideline is
http://www.microsoft.com/downloads/details.aspx?FamilyID=729bba0
0-55ad-4199-b441-378cc3d900a7&displaylang=en.
Expected results:
After deployment, the NAP platform works as expected in the VPN
environment.
Exceptions:
None
Scenario 4 – NAP with 802.1X Enforcement
Goal:
Verify NAP functions properly in the 802.1x enforcement scenario.
Prerequisites or specific configuration for the scenario:
None
Applicability:
Server
Step-by-step scenario description:
The deployment guideline is
http://www.microsoft.com/downloads/details.aspx?FamilyID=8a0925
ee-ee06-4dfb-bba2-07605eff0608&displaylang=en.
Expected results:
After deployment, the NAP platform works as expected in the 802.1x
environment.
Exceptions:
None
Distributed File System/Replication
What is Distributed File System/Replication?
The DFS Replication service is a distributed multi master file replication service. It has been
designed to be a replacement for the NT File Replication Service and is typically used by
customers for the following purposes:
a) Replication of files and folders between file servers so as to achieve the following:
 Consolidation of data over the WAN from several branch office servers to a
datacenter to enable reliable low cost centralized backups.
 To replicate updates, software, documents, and other common LOB application data
to remote office file servers.
b) Replication of the contents of the SYSVOL share on domain controllers operating in
Windows Server 2008 domain functional level and above.
A lot of enterprise customers have invested heavily in cluster hardware and infrastructure to
provide highly available services in their enterprises. These customers would like to leverage
their significant investments to cater to their file replication needs as well. Customers would like
to operate their enterprise data center servers in a clustered environment so they can provide
“always-on” replication services to branch offices. This clustered environment needs to be
highly resilient to failures (hardware and software) of individual data center servers and thus
helps enterprises attain the stringent availability metrics in their datacenter SLAs.
Key Scenarios
Scenario 1 – RODC Sysvol replication
Goal:
Verify the new feature in the DFS Replication service that it has the ability to
configure a given replicated folder as read-only.
Prerequisites or specific configuration for the scenario:
None
Applicability:
Server
Step-by-step scenario description:
In Windows Server 2008 R2, one of the new features in the DFS
Replication service is the ability to configure a given replicated folder as
read-only. The contents of a read only replicated folder cannot be
modified locally. The contents of the read-only replicated folder are
however kept in sync with those on a read-write enabled replicated folder
by the DFS Replication service. It is possible to configure a replicated
folder as read-only on a particular replication member server in a given
replication group. The new read-only replicated folders design extends to
the SYSVOL replicated folder on Windows Server 2008 R2 based Read-only
domain controllers (RODC). Read-only domain controllers that are using
the DFS Replication service for replication of the SYSVOL replicated folder
will benefit from the new read-only replicated folders feature. Therefore,
it is not possible to make any modifications to the contents of the SYSVOL
share on the read-only domain controller.
More information can be found here
http://blogs.technet.com/filecab/archive/2008/02/04/how-does-dfsrfunction-on-read-only-domain-controllers.aspx.
Expected results:
The DFSR can configure a given replicated folder as read-only.
Exceptions:
None
Windows Data Access Components (Windows DAC)
Quality Improvements in Windows DAC
In this service pack, changes in ActiveX Data Objects (ADO) and Remote Desktop Services have
improved reliability, security, and compatibility.
Key Scenarios
Scenario 1 – ADO application retrieving connectionstring property
Goal:
ADO applications can run without memory leak.
Prerequisites or specific configuration for the scenario:
Client and server systems using Windows 7 SP1 or Windows Server 2008 R2
SP1.
Applicability:
Client and server
Step-by-step scenario description:
Application uses ADO at its data access layer and retrieving ADO
ConnectionString property.
Expected results:
No memory leak
Exceptions:
None
Scenario 2 – ADO application batch update
Goal:
ADO applications can run without memory leak.
Prerequisites or specific configuration for the scenario:
Client and server systems using Windows 7 SP1 or Windows Server 2008 R2
SP1.
Applicability:
Client and Server
Step-by-step scenario description:
Application uses ADO at its data access layer and sends batch updates to a
SQL Server database.
Expected results:
No memory leak
Exceptions:
None
Scenario 3 – Remote Data Services (RDS)
Goal:
RDS application will not load object marked as KillBit by Internet Explorer.
Prerequisites or specific configuration for the scenario:
Client and server computer using Windows 7 SP1 or Windows Server 2008 R2
SP1.
Applicability:
Client and Server
Step-by-step scenario description:
A Web application uses RDS for remote data services, and receives a KillBit
object from a compromised server.
Expected results:
RDS will validate the received object and guarantee not loading a KillBit
object.
Exceptions:
None
Scenario 4 – ODBC Asynchronous Connection
Goal:
ODBC API introduced in Windows 7 ODBC Asynchronous Connection feature
is compatible with ISO by using the function ID defined in ISO 9075:2008. This
feature only introduce one new API – SQLCancelHandle.
Prerequisites or specific configuration for the scenario:
Client and server systems using Windows 7 SP1 or Windows Server 2008 R2
SP1.
Applicability:
Client and Server
Step-by-step scenario description:
Customer application uses SQLGetFunctions to query the function ID, so that
the application can know whether SQLCanCelHandle is supported by the
driver or not.
Expected results:
The customer application should query function ID 2050 (the function ID
defined in ISO 9075:2008) for the ODBC API SQLCancelHandle.
(note: in Windows 7 andWindows Server 2008 R2 RTM, SQLCancelHandle uses
function ID 1022)
Exceptions:
none
Client Technologies (Applicable to both Server &
Client)
Print
Quality Improvements in printing
Windows Server 2008 R2 SP1 printing has improved the functionality
andreliability for print andscan management.
Key Scenarios
Scenario 1 – Print Management
Goal:
Print Management provides a central administration point for sharing printers
on a network and managing print server and network printer tasks. Verify the
Print Management feature.
Prerequisites or specific configuration for the scenario:
Install Windows Server 2008 R2 SP1 for 1 server; install Windows 7 SP1 for 1
client.
Applicability:
Server, Client
Step-by-step scenario description:
The Print Management snap-in is installed by default on computers running Windows 7, but it
is not installed on computers running Windows Server 2008 R2. Use either one of the
following methods to install the Print Management snap-in on a computer running Windows
Server 2008 R2:

To install the Print Management snap-in and configure the server to be a print server From Server Manager, use the Add Roles Wizard to install both the Print and
Document Services role and the Print Server role service.

To install the Print Management snap-in without configuring the server to be a print
server - From Server Manager, use the Add Features Wizard to install the Print
Services Tools option of the Remote Server Administration Tools feature.
To open Print Management on a computer running Windows 7 or Windows Server 2008 R2,
click Start, point to Administrative Tools, and then click Print Management.
More information can be found in the following guidelines:

Print Management: http://technet.microsoft.com/en-us/library/cc766474.aspx

Checklist: Deploy Print Servers: http://technet.microsoft.com/enus/library/cc771729.aspx

Deploying Printers and Print Servers: http://technet.microsoft.com/enus/library/cc770760.aspx

Managing Printers and Print Servers:
http://technet.microsoft.com/en-us/library/cc754769.aspx
Expected results:
You can share printers on a network and centralize print server and network
printer management tasks using the Print Management snap-in for Microsoft
Management Console (MMC). Print Management helps you to monitor print
queues and receive notifications when print queues stop processing print
jobs. It also enables you to migrate print servers and deploy printer
connections using Group Policy.
Exceptions:
None
Scenario 2 – Scan Management
Goal:
Verify the Scan management feature. Scan servers are used to communicate
with scanners that support Web Services on Devices (WSD), run scan
processes, route scanned documents, and log scan-related events. On a
computer running Windows Server 2008 R2, you first install the Print and
Document Services role and then install the Distributed Scan Server role
service in Server Manager. The Distributed Scan Server role service also
installs the Scan Management snap-in.
After a scan server is installed, you can use the scan server configuration
wizard to modify existing server settings.
Prerequisites or specific configuration for the scenario:
Install Windows Server 2008 R2 SP1 for 1 server.
Applicability:
Server
Step-by-step scenario description:
To install and configure a scan server
1. Open Server Manager.
2. In the left pane, click Roles, and do the following:
a. If the Print and Document Services role is not installed, in the right pane, click
Add Roles. Follow the instructions in the Add Roles Wizard to specify the
domain user service account, local temporary folder, SMTP mail server for emailing scanned documents, server authentication certificate, and user and
group security permissions.
b. If the Print and Document Services role is already installed, in the left pane,
click Roles, and then click Print and Document Services. Follow the
instructions in the Add Roles Services Wizard to specify the domain user
service account, local temporary folder, SMTP mail server for e-mailing
scanned documents, server authentication certificate, and user and group
security permissions.
More information about the guidelines can be found here:

Scan Management: http://technet.microsoft.com/enus/library/dd759124.aspx

Overview of Scan Management: http://technet.microsoft.com/enus/library/dd759067.aspx

Checklist: Install, Configure, and Get Started with Scan Management:
http://technet.microsoft.com/en-us/library/dd871109.aspx

Managing from a client computer: http://technet.microsoft.com/enus/library/dd871137.aspx
Expected results:
You can use Scan Management to monitor network scanners, install scan
servers,and process scanned documents and route scanned documents to
network folders, to Windows SharePoint Services Web sites, and to e-mail
recipients in your domain network.
Exceptions:
None
RemoteFX for Remote Desktop Virtualization Host
RemoteFX Beta Testing
Connect over a high bandwidth, low latency connection to a RemoteFX-enabled virtual
machine. Use the following types of content.
o Play streaming Flash content (e.g. youtube.com and hulu.com)
o Use Silverlight content (e.g. Bing maps)
o Use Productivity applications (e.g. MS Outlook, MS Word, Product Studio) and
verify typing responsiveness and overall responsiveness
o Use DirectX applications (e.g. PowerPoint 2010, Google Earth )
o Use your company’s Line of Business applications

Report problems and blocking bugs via
https://connect.microsoft.com/WindowsServer/feedback/CreateFeedback.aspx to make the
product better for your organization.
RemoteFX Step by Step Guides and Deployment Documents


Hardware requirements for
RemoteFX(http://go.microsoft.com/fwlink/?LinkId=191918)
What’s New in RemoteFX (http://go.microsoft.com/fwlink/?LinkId=192437)





Deploying a Single RemoteFX Server Step-by-Step Guide
(http://go.microsoft.com/fwlink/?LinkId=177903)
Deploying RemoteFX for Personal Virtual Desktops Step-by-Step Guide
(http://go.microsoft.com/fwlink/?LinkId=192429)
Deploying RemoteFX for Virtual Desktop Pools Step-by-Step Guide
(http://go.microsoft.com/fwlink/?LinkId=192433)
Configuring USB Device Redirection with RemoteFX Step-by-Step Guide
(http://go.microsoft.com/fwlink/?LinkId=192432)
Hyper-V: Using Hyper-V and Failover Clustering for High Availability
(http://technet.microsoft.com/en-us/library/cc732181(WS.10).aspx)
Scenario: RemoteFX multiple monitor support
o
Server (Hyper-v Host): 1 or more RD Virtualization Host server with RemoteFX
enabled.
o Virtual Machine (Hyper-v Guest): Host the maximum number of RemoteFX
virtual machines RD Virtualization Host you can (dependent on the amount of
GPU dedicated VRAM per Server).
o Scenario specific requirement: Assign multiple monitors each RemoteFX virtual
machine. Connect to these virtual machines from a client with the assigned
number of monitors.
The following table lists the maximum resolutions supported on RemoteFX in
Windows Server 2008 R2 with SP1:

Maximum Resolution
Maximum number of monitors
1024 x 768
4
1280 x 1024
4
1600 x 1200
3
1900 x 1200
2
Expected results: Media applications, DirectX applications, Office work well in
RemoteFX virtual machines with multiple monitors when connected to over the
LAN.
Scenario: RemoteFX high resolution support
o
o
Server (Hyper-v Host): 1 or more RD Virtualization Host server with RemoteFX
enabled
Virtual Machine (Hyper-v Guest): Host the maximum number of RemoteFX
virtual machines RD Virtualization Host you can (dependent on the amount of
GPU dedicated VRAM per Server).
o
Scenario specific requirement: Assign at least 1600x1200 resolutions to each
RemoteFX virtual machine. Connect to these virtual machines from a client with
the assigned number of monitors.
The following table lists the maximum resolutions supported on RemoteFX in
Windows Server 2008 R2 with SP1:

Maximum Resolution
Maximum number of monitors
1024 x 768
4
1280 x 1024
4
1600 x 1200
3
1900 x 1200
2
Expected results: Media applications, DirectX applications, Office work well in
RemoteFX virtual machines with high resolution when connected to over the LAN.
Scenario: Multiple GPU support




Server (Hyper-v Host): 1 or more RD Virtualization Host server with RemoteFX
enabled. Each RemoteFX server has at least 2 identical GPUs.
Virtual Machine (Hyper-v Guest): Host the maximum number of RemoteFX virtual
machines RD Virtualization Host you can (dependent on the amount of GPU
dedicated VRAM per Server).
Scenario specific requirement: Each RemoteFX server has at least 2 identical GPUs.
Expected results: The number of VMs/screens that can be hosted on the server
doubles (compared to using a single GPU). Media applications, DirectX applications,
Office work well in RemoteFX virtual machines when connected to over the LAN.
Scenario: RemoteFX High Availability
o
o

Server (Hyper-v Host): At least 2 RD Virtualization Host servers with RemoteFX
enabled.
Virtual Machine (Hyper-v Guest): Host the maximum number of RemoteFX virtual
machines on each RD Virtualization Host that you can (dependent on the amount of
GPU dedicated VRAM per Server).
Scenario specific requirement: Create a Highly available collection of RemoteFX
virtual machines. Each of the nodes in the cluster must be RemoteFX capable
machines and must have identical GPUs



Live migrate the VMs from one host to another
Quick migrate the VMs from one host to another
Expected results: Media applications, DirectX applications, Office work well during
Live and Quick migration of RemoteFX virtual machines.
Scenario: RemoteFX Application Compatibility
o
o


Server (Hyper-v Host): 1 or more RD Virtualization Host server with RemoteFX
enabled.
Virtual Machine (Hyper-v Guest): Host the maximum number of RemoteFX virtual
machines on each RD Virtualization Host that you can (dependent on the amount of
GPU dedicated VRAM per Server).
Scenario specific requirement: Host at custom or line of business applications in
RemoteFX. Applications that use DirectX, WPF, Silverlight, Flash and other rich
media content are preferable.
Expected results: Line of business applications work well in RemoteFX virtual
machines when connected to over the LAN.
Scenario: RemoteFX USB redirection


Server (Hyper-v Host): 1 or more RD Virtualization Host server with RemoteFX
enabled.
Virtual Machine (Hyper-v Guest): Host the maximum number of RemoteFX virtual
machines on each RD Virtualization Host that you can (dependent on the amount of
GPU dedicated VRAM per Server).

Scenario specific requirement: Attach USB devices like multi-function printers,
scanners, biometric devices, webcams, VoIP Phones/Headsets to the client device.
Use these devices inside the RemoteFX session.

Expected results: USB devices work well with RemoteFX for RDVH.
Scenario: Use RD Connection Broker, RD Web Access with RemoteFX

Server (Hyper-v Host): 1 or more RD Virtualization Host server with RemoteFX
enabled, RD Connection Broker, RD Web Access.

Virtual Machine (Hyper-v Guest): Host the maximum number of RemoteFX virtual
machines on each RD Virtualization Host that you can (dependent on the amount of
GPU dedicated VRAM per Server).

Scenario specific requirement: Use RD Connection Broker and RD Web Access to
access personal or pooled RemoteFX virtual machines.

Expected results: The Microsoft in-box solution (RD Connection Broker, RD Web
Access) work well with RemoteFX.
Miscellaneous
Dynamic Memory
What is Dynamic Memory?
Dynamic memory overview
Dynamic memory allows you to configure a virtual machine so that the amount of memory
assigned to the virtual machine is adjusted while the virtual machine is running, in reaction to
the amount of memory that is actually being used by the virtual machine. This allows you to run
a higher number of virtual machines on a given physical computer. It also ensures that memory
is always distributed optimally between running virtual machines.
Before enabling dynamic memory in a virtual machine you need to ensure that the latest version
of integration services is installed in the virtual machine.You can then enable dynamic memory
for a virtual machine using the memory settings under the virtual machine settings. Once
dynamic memory is enabled there are four parameters that you can configure:



Initial memory.
This is the amount of memory that is required to start the virtual machine. This value
needs to be high enough to allow the guest operating system to boot, but should be as
low as possible to allow for optimal performance with dynamic memory.The virtual
machine will never be assigned less memory than the initial memory value.
Maximum memory.
The virtual machine will not be allowed to use more memory than is specified by this
value. This value can be configured anywhere from the initial memory value up to
64GB.
Memory buffer.
The memory buffer value indicates how much memory is assigned to the virtual
machine when compared to the amount of memory actually needed by the applications

and services running inside the virtual machine.
The memory buffer will not be maintained if there is not enough physical memory
available in the computer to give every virtual machine its requested memory buffer.
Memory priority.
The memory priority value reflects how memory will be distributed amongst virtual
machines if there is not enough physical memory available in the computer to give every
virtual machine its requested amount of memory.
Higher priority virtual machines will be given more memory when compared to lower
priority virtual machines with similar settings.
Supported guest operating systems
Dynamic memory is supported for the following guest operating systems:












Windows Server 2008 R2 Enterprise Edition (32-bit and 64-bit)
Windows Server 2008 R2 Datacenter Edition (32-bit and 64-bit)
Windows 7 Ultimate Edition (32-bit and 64-bit)
Windows 7 Enterprise Edition (32-bit and 64-bit)
Windows Server 2008 Enterprise Edition (32-bit and 64-bit)
Windows Server 2008 Datacenter Edition (32-bit and 64-bit)
Windows Vista Ultimate Edition (32-bit and 64-bit)
Windows Vista Enterprise Edition (32-bit and 64-bit)
Windows Server 2003 R2 Enterprise Edition (32-bit and 64-bit)
Windows Server 2003 R2 Datacenter Edition (32-bit and 64-bit)
Windows Server 2003 Enterprise Edition (32-bit and 64-bit)
Windows Server 2003 Datacenter Edition (32-bit and 64-bit)
If you enable dynamic memory for a virtual machine that is running an operating system that is
not on this list, the guest operating system will only be able to access the initial memory.
For each supported operating system you should follow the published required and
recommended memory values prior to installing the latest integration services and enabling
dynamic memory. Once dynamic memory is enabled you can use a lower initial value in order to
get the best performance out of dynamic memory. The maximum memory value should always
be greater than the required memory for the operating system that is running in the virtual
machine.
Operating System
Required
Memory
Recommended
Memory
Initial Memory (with
DM enabled)
Windows Server 2008 R2 Enterprise
Edition
512MB
N/A
512MB
Windows Server 2008 R2 Datacenter
Edition
512MB
N/A
512MB
Windows 7 Ultimate Edition
1GB
N/A
512MB
Windows 7 Enterprise Edition
1GB
N/A
512MB
Windows Server 2008 Enterprise Edition
512MB
1GB
512MB
Windows Server 2008 Datacenter
Edition
512MB
1GB
512MB
Windows Vista Ultimate Edition
512MB
1GB
512MB
Windows Vista Enterprise Edition
512MB
1GB
512MB
Windows Server 2003 R2 Enterprise
Edition
128MB
256MB
128MB
Windows Server 2003 R2 Datacenter
Edition
512MB
1GB
128MB
Windows Server 2003 Enterprise Edition
128MB
256MB
128MB
Windows Server 2003 Datacenter
Edition
512MB
1GB
128MB
Tuning dynamic memory for best performance
If you enable dynamic memory on a virtual machine and are not satisfied with the performance
that you receive from the virtual machine, there are multiple configuration changes that you can
make to potentially improve performance:

Increase the size of the page file inside the guest operating system.
A larger page file inside the virtual machine allows larger amounts of memory to be
added to the running virtual machine if it is needed suddenly. It also lets the virtual
machine run better when the availability of physical memory is limited.

Increase the memory buffer configured for the virtual machine.
Increasing the memory buffer will result in more memory being assigned to the virtual
machine when compared to the amount of memory actually needed by the applications
and services running inside the virtual machine. This extra memory can then be used for
file caching purposes, and may help with the performance of IO intensive applications
and services.
 Increase the initial memory for the virtual machine.
Some applications assign fixed amounts of memory based on the amount of memory
available when the application first starts. These applications will perform better with
higher values for the initial memory.
Alternatively, if you are seeing poor performance due to too much memory being
removed from the virtual machine, increasing the initial memory value can also alleviate
this problem.
It should be noted that by increasing the initial memory value, the overall flexibility and
effectiveness of dynamic memory is reduced.
Increase the virtual machine memory priority.
Increasing the virtual machine memory priority will ensure that available physical memory is
assigned to this virtual machine before being
Key Scenarios
Scenario 1 – Dynamic Memory and Hyper-V Failover clustering
Goal:
Verify that virtual machines running on Hyper-V can use the dynamic memory
well.
Prerequisites or specific configuration for the scenario:
Windows Server 2008 R2 SP1
Applicability:
Server
Step-by-step scenario description:
1. Create 64 VMs per node. Each VM should be configured to use dynamic
memory. Each VM should have some load which causes memory
allocations and de-allocations.
2.
Cluster all VMs. Guideline: http://technet.microsoft.com/enus/library/dd197477(WS.10).aspx.
3.
Verify the following scenarios: LiveMigration (use cluadmin),
QuickMigration (use cluadmin), Failover (use cluadmin), Machine disaster
(expected restart, unexpected restart).
By enabling dynamic memory on virtual machines in a Hyper-V failover cluster you are able to
get better utilization of your hardware. However this comes with risk that a virtual machine
may fail to start after a hardware failure if other virtual machines do not relinquish memory
when requested to do so. In order to mitigate this risk, for following guidelines should be
followed:

Calculate the amount of physical memory available in the cluster when a node has
failed (or when multiple nodes have failed if you want to be able to sustain the failure
of multiple nodes). Then ensure that:
o
The sum value of all initial memory values for all virtual machines on the
cluster does not exceed this value.
o
The expected performance of the virtual machines when they are limited to
this value is acceptable in your environment.
o
The sum value of all maximum memory values for all virtual machines is no
more than twice this value.
Expected results:
The failover service in VM-scale functions well and the dynamic memory
management mechanism functions well.
Exceptions:
None.
SQL Server
Quality Improvements in SQL Server
Windows Server 2008 R2 SP1 SQL Server 2008 has improved the functionality for failover
cluster.
Key Scenarios
Scenario 1 – Basic SQL Server 2008 Failover Clustering Installation, using Create Failover
Cluster and Add Node features
Goal:
Verify the basic failover clustering installation of SQL Server 2008: Create
Failover Cluster and Add Node features.
Prerequisites or specific configuration for the scenario:
Install Windows Server 2008 R2 SP1, SQL server 2008
Applicability:
Server
Step-by-step scenario description:
Using the basic SQL Server failover cluster installation method, install a 2node SQL Server 2008 R2 RTM+SP1 (using SQL Server 2008 slipstream)
failover cluster instance on Windows Server 2008 R2 SP1.
The installation method is http://msdn.microsoft.com/enus/library/ms179410.aspx.
Expected results:
The basic SQL Server 2008 Failover cluster installation succeeds.
Exceptions:
None
Scenario 2 – Advanced SQL Server 2008 Failover Clustering Installation, using Prepare Failover
Cluster and Complete Failover Cluster features
Goal:
Verify the Advanced failover clustering installation of SQL Server 2008:
Prepare Failover Cluster and Complete Failover Cluster features.
Prerequisites or specific configuration for the scenario:
Install Windows Server 2008 R2 SP1, SQL server 2008
Applicability:
Server
Step-by-step scenario description:
Using the advanced SQL Server failover cluster installation method, install a 2node SQL Server 2008 R2 RTM+SP1 (using SQL Server 2008 slipstream)
failover cluster instance after Windows Server 2008 R2 SP1.
The installation method is http://msdn.microsoft.com/enus/library/ms179410.aspx.
Expected results:
The advanced SQL Server 2008 Failover cluster installation succeeds.
Exceptions:
None
Scenario 3 – Installing Windows Server 2008 R2 SP1 after installing SQL Server
2008 (using basic installation method) on Windows Server 2008 R2
Goal:
Verify the SQL Server 2008 failover feature after installing the service pack
(using the basic installation method).
Prerequisites or specific configuration for the scenario:
Install Windows Server 2008 R2 SP1, SQL server 2008
Applicability:
Server
Step-by-step scenario description:
1. Install SQL server 2008.
2. Install the failover feature with the basic installation method.
3. Install the service pack.
The installation method is http://msdn.microsoft.com/enus/library/ms179410.aspx.
Expected results:
The SQL Server 2008 failover feature works as expected after installing the
service pack (using the basic installation method).
Exceptions:
None
Scenario 4 – Installing Windows Server 2008 R2 SP1 after installing SQL Server
2008 (using advanced installation method) on Windows Server 2008 R2
Goal:
Verify the SQL Server 2008 failover feature after installing the service pack
(using the advanced installation method).
Prerequisites or specific configuration for the scenario:
Install Windows Server 2008 R2 SP1, SQL server 2008
Applicability:
Server
Step-by-step scenario description:
1. Install SQL server 2008.
2. Install the failover feature with the advanced installation method.
3. Install the service pack.
The installation method is http://msdn.microsoft.com/enus/library/ms179410.aspx.
Expected results:
The SQL Server 2008 failover feature works well after installing the service
pack (using the advanced installation method).
Exceptions:
None
Scenario 5 – Apply SQL Server 2008 SP1 CU6 after installing a two-node SQL
Server 2008 failover cluster (using basic installation method) at the RTM+SP1
level using the slipstream method on Windows Server 2008 R2. Then apply
Windows Server 2008 R2 SP1.
Goal:
Verify the SQL Server 2008 failover feature and SP1 CU6 after installing the
service pack (using the basic installation method).
Prerequisites or specific configuration for the scenario:
Install Windows Server 2008 R2 SP1, SQL server 2008
Applicability:
Server
Step-by-step scenario description:
1. Using the basic SQL Server failover cluster installation method, install a two-node SQL
Server 2008 RTM+SP1 (using SQL Server 2008 slipstream) failover cluster instance on
Windows Server 2008 R2.
2. Install the service pack after the SQL Server failover cluster installation.
3. Apply SQL Server 2008 SP1 CU6.
The installation method is http://msdn.microsoft.com/enus/library/ms179410.aspx.
Expected results:
The SQL Server 2008 SP1 CU6 works well after installing the service pack
(using the basic installation method).
Exceptions:
None