Environment:

Server: Windows 2012 R2 Standard - Server Essentials Installed.

Client: Windows 10 build 1709

Getting on the Client "Cannot connect to SERVERNAME"

 

Option 1:

On the Client

  1. Uninstall the Connector Software and any other Previous connector software.
  2. Delete folders under C:\ProgramData\Microsoft\Windows Server [both Data and Log folders]
  3. Start "Task scheduler" now delete all the tasks in the folder "Microsoft > Windows > Windows Server Essentials"
    • Now Delete the folder "Windows Server Essentials".
  4. Clean Temp Directories [%temp% & C:\Windows\Temp]
  5. Reboot Client
  6. Add the following Registry to Skip Domain Join when re-installing the Connector Software.
    • Elevated Command Prompt: reg add "HKLM\SOFTWARE\Microsoft\Windows Server\ClientDeployment" /v SkipDomainJoin /t REG_DWORD /d 1
  7. Reinstall Connector Software http://SERVERNAME/connect

If this still doesn't connect the computer up to the Server now try option 2 on the Essentials Server.

 

Option 2:

On the Essentials Server

  1. Open an Elevated PowerShell Prompt
    • Run the command: Set-NetNatTransitionConfiguration –IPv4AddressPortPool @(“192.168.1.10, 6001-6601”, “192.168.1.10, 6603-47000”)

NOTE: Replace the IP address with the IP Address of your Essentials Server

2. Open Dashboard and see if the Devices are now Online.

 

NOTE: a GPO with Firewall settings should be in place for Management:

Windows-FirewallSettings:

  • Computer Configuration:
    • Administrative Templates > Network > Network Connections > Windows Firewall > Domain Profile: Enable
      • Windows Firewall: Allow ICMP exceptions
        • Allow inbound echo request
      • Windows Firewall: Allow inbound file and printer sharing exception
        • Local subnets [ex. 192.168.1.0/24]
      • Windows Firewall: Allow inbound remote administration exception
        • Local subnets [ex. 192.168.1.0/24]
      • Windows Firewall: Allow inbound Remote Desktop exceptions
        • Local subnets [ex. 192.168.1.0/24]
      • Windows Firewall: Protect all network connections
        • Enabled…
    • Administrative Templates > Network > Network Connections > Windows Firewall > Standard Profile: Enable
      • Windows Firewall: Allow ICMP exceptions
        • Allow inbound echo request
      • Windows Firewall: Allow inbound file and printer sharing exception
        • Local subnets [ex. 192.168.1.0/24]
      • Windows Firewall: Allow inbound remote administration exception
        • Local subnets [ex. 192.168.1.0/24]
      • Windows Firewall: Allow inbound Remote Desktop exceptions
        • Local subnets [ex. 192.168.1.0/24]
      • Windows Firewall: Protect all network connections
        • Enabled…
    • Administrative Templates > Windows Components > Windows Remote Management (WinRM) > WinRM Service: Enable
      • Allow remote server management through WinRM
        • Local subnets [ex. 192.168.1.0/24]
    • Etc…

See additional postings for Windows-FirewallSettings GPO configuration for Client Management.  Coming Soon...