<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>The Server-Side Technology Staff &#8211; The Server Side Technology</title>
	<atom:link href="https://www.theserverside.technology/author/tsststaff/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.theserverside.technology</link>
	<description>in-depth information for tech pros</description>
	<lastBuildDate>Thu, 12 Jan 2023 21:40:54 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.0.3</generator>
	<item>
		<title>Acronis Storage Gateway: how to replace a node for the Backup Service</title>
		<link>https://www.theserverside.technology/2023/01/12/acronis-storage-gateway-how-to-replace-a-node-for-the-backup-service/?pk_campaign=feed&#038;pk_kwd=acronis-storage-gateway-how-to-replace-a-node-for-the-backup-service</link>
					<comments>https://www.theserverside.technology/2023/01/12/acronis-storage-gateway-how-to-replace-a-node-for-the-backup-service/?pk_campaign=feed&#038;pk_kwd=acronis-storage-gateway-how-to-replace-a-node-for-the-backup-service#respond</comments>
		
		<dc:creator><![CDATA[The Server-Side Technology Staff]]></dc:creator>
		<pubDate>Thu, 12 Jan 2023 21:40:37 +0000</pubDate>
				<category><![CDATA[SysAdmins]]></category>
		<category><![CDATA[acronis]]></category>
		<category><![CDATA[acronis storage gateway]]></category>
		<category><![CDATA[backup]]></category>
		<guid isPermaLink="false">https://www.theserverside.technology/?p=1775</guid>

					<description><![CDATA[<div style="margin: 5px 5% 10px 5%;"><img src="https://www.theserverside.technology/wp-content/uploads/2023/01/data_analysis_backup-300x141.jpg" width="300" height="141" title="" alt="" /></div><div>
<p>Acronis Storage Gateway is the HCI solution from Acronis. The solution, which is provided to partners, allows to build a cluster of storage and computing nodes that can become both the target for the Acronis CyberProtect service, that is an on-premise storage solution for backups, but also an hyper-converged solution that allows to deploy a wide range of storage and computing services, including virtual machines.</p>



<p>In this post we will describe how to perform a typical maintenance operation for the Backup Storage service, that is the removal of a node from the cluster. It happens, as in our case, when you want to decommission a node that you&#8217;re going to replace either because it is not working anymore or because you want to change the topology of the cluster.</p>



<p>In our case we needed to replace an old node that had a specific amount of storage space with a bigger node on a faster server and with more storage space.</p>



Step 1: release node from the Backup Storage 



<p>The first step you need to perform is releasing the node from the Backup Storage service, going to Storage Services and the choosing Backup Storage.</p>



The menu items you need to use


<p>Once there you will see the current topology of the Backup storage, that is all the nodes that you have allocated for that specific service. In our case, you can see only two nodes because we have already removed the third one, the one we&#8217;re going to replace.</p>



List of the nodes currently used by the backup storage service



<p>Should you have any other node added to your cluster but not yet used, you would see another list of available nodes here, ready to included into available backup storage space.</p>



<p>Now this is the part where Acronis documentation is not clear enough. They explain how to remove a node from the infrastructure, i.e. out of the whole cluster, but they&#8217;re not clear how to do that if the node is allocated. That wouldn&#8217;t be difficult per se but the real question we faced was how to ensure that no data loss will happen.</p>



<p>It is relatively easy to understand that you can go to the Infrastructure menu, enter Nodes and attempt to remove the node. You would easily know that once you attempt to release a node </p>






<p>you will be presented a choice to release the node, optionally deciding not to migrate data to other nodes thereby incurring in a data loss. However, that won&#8217;t work if you don&#8217;t deallocate the node out of existing services.</p>



<p>So the first step is going to Storage services > Backup storage, selecting the node that you would like to start releasing and then click on Release</p>






Step 2: releasing the node out of the cluster



<p>Once you click on &#8220;Release&#8221; as explained above, nothing much seems to happen. Acronis Gateway will migrate active services out of the node (for example, Primary metadata or metadata and the Storage service) and it will exclude the node out of rotations so no new data will be stored on [...]</div><img src="https://stats1.vaisulweb.cloud/piwik.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Fwww.theserverside.technology%2F2023%2F01%2F12%2Facronis-storage-gateway-how-to-replace-a-node-for-the-backup-service%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Dacronis-storage-gateway-how-to-replace-a-node-for-the-backup-service&amp;action_name=Acronis+Storage+Gateway%3A+how+to+replace+a+node+for+the+Backup+Service&amp;urlref=https%3A%2F%2Fwww.theserverside.technology%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://www.theserverside.technology/2023/01/12/acronis-storage-gateway-how-to-replace-a-node-for-the-backup-service/?pk_campaign=feed&#038;pk_kwd=acronis-storage-gateway-how-to-replace-a-node-for-the-backup-service/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<enclosure url="https://www.theserverside.technology/wp-content/uploads/2023/01/data_analysis_backup.jpg" length="688750" type="image/jpg" />
<media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://www.theserverside.technology/wp-content/uploads/2023/01/data_analysis_backup-300x141.jpg" width="300" height="141" medium="image" type="image/jpeg">
	<media:copyright>The Server Side Technology</media:copyright>
	<media:title></media:title>
	<media:description type="html"><![CDATA[]]></media:description>
</media:content>
<media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://www.theserverside.technology/wp-content/uploads/2023/01/data_analysis_backup-300x141.jpg" width="300" height="141" />
	</item>
		<item>
		<title>Windows Server 2022: RDP error 0x11 and Users group</title>
		<link>https://www.theserverside.technology/2022/09/08/windows-server-2022-rdp-error-0x11-and-users-group/?pk_campaign=feed&#038;pk_kwd=windows-server-2022-rdp-error-0x11-and-users-group</link>
					<comments>https://www.theserverside.technology/2022/09/08/windows-server-2022-rdp-error-0x11-and-users-group/?pk_campaign=feed&#038;pk_kwd=windows-server-2022-rdp-error-0x11-and-users-group#respond</comments>
		
		<dc:creator><![CDATA[The Server-Side Technology Staff]]></dc:creator>
		<pubDate>Thu, 08 Sep 2022 21:04:35 +0000</pubDate>
				<category><![CDATA[SysAdmins]]></category>
		<category><![CDATA[microsoft]]></category>
		<category><![CDATA[rdp]]></category>
		<category><![CDATA[remote desktop]]></category>
		<category><![CDATA[windows server]]></category>
		<category><![CDATA[windows server 2022]]></category>
		<guid isPermaLink="false">https://www.theserverside.technology/?p=1766</guid>

					<description><![CDATA[<div style="margin: 5px 5% 10px 5%;"><img src="https://www.theserverside.technology/wp-content/uploads/2022/09/desktop_computer_coffee-300x200.jpg" width="300" height="200" title="" alt="" /></div><div>
<p>We have been fighting for months with a weird behaviour where Windows Server 2022 all of sudden was becoming no more accessible via RDP after a while. That was happening only on some VMs, not all of them.</p>



<p>The symptom was simple: you were trying to connect to a Windows Server 2022 server hosted in a VM, the RDP connection screen was showing to you the classic certificate warning and when you decide to go on server was logging you in for a very short time then the connection crashed. We were able to login via Hyper-V console but RDP was no-go. Nothing was working while the fact you were correctly logging in was proved by the fact that another session started from Hyper-V console was being forced out when you were attempting to login by the same username. However, logging in never completed.</p>



<p>We were quite upset since that seemed to affect and increasingly number of VMs until we discovered a shocking thing: the issue was caused by the removal of Users group access to C:\ folder. 😟😟</p>



<p>That&#8217;s a change we usually perform on Web Servers and actually Web Servers were the most affected kind of servers. Not sure which is the connection between Users group access to C:\ folder but if we re-enable the access for that group, RDP starts working again.</p>



<p>Just crazy! One the strangest thing that happened to us. We used to remove Users access to C:\ for ages and that showed no issues on any Windows Server version since 2003 or so. Hope this might help anyone else!</p>



<p>(credit where is due)</p>
</div><img src="https://stats1.vaisulweb.cloud/piwik.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Fwww.theserverside.technology%2F2022%2F09%2F08%2Fwindows-server-2022-rdp-error-0x11-and-users-group%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Dwindows-server-2022-rdp-error-0x11-and-users-group&amp;action_name=Windows+Server+2022%3A+RDP+error+0x11+and+Users+group&amp;urlref=https%3A%2F%2Fwww.theserverside.technology%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://www.theserverside.technology/2022/09/08/windows-server-2022-rdp-error-0x11-and-users-group/?pk_campaign=feed&#038;pk_kwd=windows-server-2022-rdp-error-0x11-and-users-group/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<enclosure url="https://www.theserverside.technology/wp-content/uploads/2022/09/desktop_computer_coffee.jpg" length="557601" type="image/jpg" />
<media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://www.theserverside.technology/wp-content/uploads/2022/09/desktop_computer_coffee-300x200.jpg" width="300" height="200" medium="image" type="image/jpeg">
	<media:copyright>The Server Side Technology</media:copyright>
	<media:title></media:title>
	<media:description type="html"><![CDATA[]]></media:description>
</media:content>
<media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://www.theserverside.technology/wp-content/uploads/2022/09/desktop_computer_coffee-300x200.jpg" width="300" height="200" />
	</item>
		<item>
		<title>How to clear Powershell history (done right!)</title>
		<link>https://www.theserverside.technology/2021/10/30/how-to-clear-powershell-history-done-right/?pk_campaign=feed&#038;pk_kwd=how-to-clear-powershell-history-done-right</link>
					<comments>https://www.theserverside.technology/2021/10/30/how-to-clear-powershell-history-done-right/?pk_campaign=feed&#038;pk_kwd=how-to-clear-powershell-history-done-right#respond</comments>
		
		<dc:creator><![CDATA[The Server-Side Technology Staff]]></dc:creator>
		<pubDate>Sat, 30 Oct 2021 15:02:45 +0000</pubDate>
				<category><![CDATA[SysAdmins]]></category>
		<category><![CDATA[powershell]]></category>
		<category><![CDATA[trick]]></category>
		<category><![CDATA[windows server]]></category>
		<guid isPermaLink="false">https://www.theserverside.technology/?p=1678</guid>

					<description><![CDATA[<div style="margin: 5px 5% 10px 5%;"><img src="https://www.theserverside.technology/wp-content/uploads/2021/10/powershell-300x150.jpg" width="300" height="150" title="" alt="" /></div><div>
<p>You might find youserlf in a situation where you need to clear Powershell command history. For example, for us it was needed because we needed to prepare templates for virtual machines deployment and we needed to activate a specific software before finalizing the template.</p>



<p>Unfortunately you need to type a command to enter the code and activate the software and those templates could be used by our customers that might be able to retrieve the correct code by simply striking arrow-up. If you look for a solution you will find that Powershell has a specific command to do that:</p>



Clear-History




<p>However, you might find that this won&#8217;t solve your problem. Some history gets cancelled and some don&#8217;t or sometimes nothing at all gets removed and all of your history is still available to anyone logging using that account.</p>



<p>Turned out that there&#8217;s a way to check actually where Powershell stores your history. Just issue this command:</p>



<p></p>



PS C:\Users\Administrator&#62; (Get-PSReadlineOption).HistorySavePath
C:\Users\Administrator\AppData\Roaming\Microsoft\Windows\PowerShell\PSReadLine\ConsoleHost_history.txt




<p>The result is the location of the history file. Just edit this file and remove those lines you don&#8217;t want other users to access.</p>



<p>Neat trick but actually we&#8217;re not sure why the dedicated command is not working as expected. </p>
</div><img src="https://stats1.vaisulweb.cloud/piwik.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Fwww.theserverside.technology%2F2021%2F10%2F30%2Fhow-to-clear-powershell-history-done-right%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Dhow-to-clear-powershell-history-done-right&amp;action_name=How+to+clear+Powershell+history+%28done+right%21%29&amp;urlref=https%3A%2F%2Fwww.theserverside.technology%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://www.theserverside.technology/2021/10/30/how-to-clear-powershell-history-done-right/?pk_campaign=feed&#038;pk_kwd=how-to-clear-powershell-history-done-right/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<enclosure url="https://www.theserverside.technology/wp-content/uploads/2021/10/powershell.jpg" length="19975" type="image/jpg" />
<media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://www.theserverside.technology/wp-content/uploads/2021/10/powershell-300x150.jpg" width="300" height="150" medium="image" type="image/jpeg">
	<media:copyright>The Server Side Technology</media:copyright>
	<media:title></media:title>
	<media:description type="html"><![CDATA[]]></media:description>
</media:content>
<media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://www.theserverside.technology/wp-content/uploads/2021/10/powershell-300x150.jpg" width="300" height="150" />
	</item>
		<item>
		<title>Windows Server 2022 and Azure Stack HCI: Microsoft is slowly attempting to murder Windows Server &#8211; part 1</title>
		<link>https://www.theserverside.technology/2021/08/21/windows-server-2022-and-azure-stack-hci-microsoft-is-slowly-attempting-to-murder-windows-server-part-1/?pk_campaign=feed&#038;pk_kwd=windows-server-2022-and-azure-stack-hci-microsoft-is-slowly-attempting-to-murder-windows-server-part-1</link>
					<comments>https://www.theserverside.technology/2021/08/21/windows-server-2022-and-azure-stack-hci-microsoft-is-slowly-attempting-to-murder-windows-server-part-1/?pk_campaign=feed&#038;pk_kwd=windows-server-2022-and-azure-stack-hci-microsoft-is-slowly-attempting-to-murder-windows-server-part-1#respond</comments>
		
		<dc:creator><![CDATA[The Server-Side Technology Staff]]></dc:creator>
		<pubDate>Sat, 21 Aug 2021 17:58:25 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[SysAdmins]]></category>
		<category><![CDATA[Windows Server]]></category>
		<category><![CDATA[azure]]></category>
		<category><![CDATA[azure stack]]></category>
		<category><![CDATA[azure stack hci]]></category>
		<category><![CDATA[linux]]></category>
		<category><![CDATA[microsoft]]></category>
		<category><![CDATA[windows]]></category>
		<category><![CDATA[windows server]]></category>
		<guid isPermaLink="false">https://www.theserverside.technology/?p=1631</guid>

					<description><![CDATA[<div style="margin: 5px 5% 10px 5%;"><img src="https://www.theserverside.technology/wp-content/uploads/2021/08/server2022-300x169.jpg" width="300" height="169" title="" alt="" /></div><div>
<p>Microsoft released Windows Server 2022 a few weeks ago. It did so earlier than expected, which is pretty odd, but it seems that the development of new features was already complete and mature so there was no point to wait a few months more. The last sentence pretty much explains the current status of Windows Server: so few changes, albeit interesting ones, that the product can be released months earlier than planned and without much fanfare.</p>



<p>While generally speaking the development of new features and functionalities for server applications mostly moved out of the base operating system and while we can also concede that Windows Server has many features at the OS level so it is difficult to design new ones, the fact each new release of Windows Server keeps bringing few new features is definitely because of Microsoft errors. Server applications today are either simple, think about a website or a Web application, or complicated. In the latter case, you generally think about microservices, Kubernetes and so on.</p>



<p>So we might say that since a few years Windows Server became more a tool to build base infrastructures than the base for new applications. That means that you usually install something on top of Windows Server to manage and deploy applications and you don&#8217;t usually rely on OS services only to develop your application. It is safe to say that it is a common scenario because Linux too is experiencing the same transformation.</p>



<p>However, Microsoft could have responded to Linux popularity by upping the ante and push more innovation into Windows Server and they didn&#8217;t.</p>



Windows Server 2022 &#8211; continued fragmentation



<p>The new Windows Server version has some nice and neat features. Besides a better Kubernetes compatibility, which is basically mandatory today, it features and big work to improve security. Credit where is due. That improves a lot both standalone servers security but it is also a fundamental improvement when deploying clusters, the famous infrastructures. </p>



<p>Other improvements include TLS 1.3 enabled by default and a few improvements around SMB, all of them improve security.</p>



<p>There would be other two important features to mention, one of them would be very important, but surprise: they won&#8217;t be available to all customers but only to those using Azure. At least for now.</p>



<p>Microsoft introduced Windows Server Datacenter: Azure Edition, another attempt to fragment Windows Server but the first one to draw a line between &#8220;standard&#8221; Windows Server and Azure versions. And we cannot welcome this kind of behavior because it basically starts to leave non-Azure Windows Server installations behind in an attempt to force Windows customers to move to Azure. Quite frankly, this is indecent especially when you factor how much Windows Server costs when compared to its competitor.</p>



<p>Features that Microsoft is withholding from its non-Azure customers are very important.</p>



<p>First, there is the much awaited hot-patching, that is a way to patch Windows without rebooting. Microsoft aims to use hot-patching especially for security patches and it would be a very ground-breaking innovation when considering how many emergency updates are needed [...]</div><img src="https://stats1.vaisulweb.cloud/piwik.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Fwww.theserverside.technology%2F2021%2F08%2F21%2Fwindows-server-2022-and-azure-stack-hci-microsoft-is-slowly-attempting-to-murder-windows-server-part-1%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Dwindows-server-2022-and-azure-stack-hci-microsoft-is-slowly-attempting-to-murder-windows-server-part-1&amp;action_name=Windows+Server+2022+and+Azure+Stack+HCI%3A+Microsoft+is+slowly+attempting+to+murder+Windows+Server+%26%238211%3B+part+1&amp;urlref=https%3A%2F%2Fwww.theserverside.technology%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://www.theserverside.technology/2021/08/21/windows-server-2022-and-azure-stack-hci-microsoft-is-slowly-attempting-to-murder-windows-server-part-1/?pk_campaign=feed&#038;pk_kwd=windows-server-2022-and-azure-stack-hci-microsoft-is-slowly-attempting-to-murder-windows-server-part-1/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<enclosure url="https://www.theserverside.technology/wp-content/uploads/2021/08/server2022.jpg" length="354615" type="image/jpg" />
<media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://www.theserverside.technology/wp-content/uploads/2021/08/server2022-300x169.jpg" width="300" height="169" medium="image" type="image/jpeg">
	<media:copyright>The Server Side Technology</media:copyright>
	<media:title></media:title>
	<media:description type="html"><![CDATA[]]></media:description>
</media:content>
<media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://www.theserverside.technology/wp-content/uploads/2021/08/server2022-300x169.jpg" width="300" height="169" />
	</item>
		<item>
		<title>Acronis agent not registered, Windows Server core and SSL issues</title>
		<link>https://www.theserverside.technology/2020/06/16/acronis-agent-not-registered-windows-server-core-and-ssl-issues/?pk_campaign=feed&#038;pk_kwd=acronis-agent-not-registered-windows-server-core-and-ssl-issues</link>
					<comments>https://www.theserverside.technology/2020/06/16/acronis-agent-not-registered-windows-server-core-and-ssl-issues/?pk_campaign=feed&#038;pk_kwd=acronis-agent-not-registered-windows-server-core-and-ssl-issues#respond</comments>
		
		<dc:creator><![CDATA[The Server-Side Technology Staff]]></dc:creator>
		<pubDate>Tue, 16 Jun 2020 23:39:30 +0000</pubDate>
				<category><![CDATA[SysAdmins]]></category>
		<category><![CDATA[acronis]]></category>
		<category><![CDATA[powershell]]></category>
		<category><![CDATA[ssl]]></category>
		<category><![CDATA[tls1.2]]></category>
		<category><![CDATA[windows server]]></category>
		<category><![CDATA[windows server core]]></category>
		<guid isPermaLink="false">https://www.theserverside.technology/?p=1604</guid>

					<description><![CDATA[<div style="margin: 5px 5% 10px 5%;"><img src="https://www.theserverside.technology/wp-content/uploads/2020/06/ssl_website-300x174.jpeg" width="300" height="174" title="" alt="" /></div><div>We had previously identified what happened to those two boxes but that explanation is out of scope. This post is about how you can quickly recover form that situation.



<p>A few days ago we had a weird issue on a couple of servers after upgrading Acronis agent. Console was unable to start any backup plan, either automatically or manually, complaining that the agent was not registered anymore. That looked weird since we had updated our agents many times in the past but this time, somehow, agents unregistered or were unable to re-register. </p>



<p>Actually, this round of updates had caused issues on a couple of Linux servers too but those had been quickly fixed by rebooting those machines. We quickly noticed that servers that were failing both had Windows Server Core as their base OS and SQL Server was installed on them too and in the end we decided to access those machines and manually re-register those agents as detailed inside Acronis documentation. It was surprising to find that agent was unable to re-register, complaining that the endpoint certificate was invalid or, more specifically, the Certification Authority that signed the certificate was unknown.</p>



<p>Thing is that both those server were working fine before the update plus we seemed to be unable to re-register those agents even when using Acronis own endpoint. The same error was reported, which was so weird seems it could well be (though unlikely) that our own customized certificate had something wrong &#8211; even if it was working fine when accessed through browsers or on other machines &#8211; but Acronis own certificate could not have had any issue.</p>



Updating root certificates



<p>The very single fact that agent was reporting an unknown certificate authority was pretty indicative but we also had troubles connecting to the endpoint on our own, for example when using Powershell</p>



Invoke-WebRequest -UseBasicParsing -Uri https://cloud.acronis.com



<p>Definitely there was a problem connecting to SSL endpoints. While PowerShell was only complaining that the underlying connection was closed, Acronis agent reported a much more specific issue so we decided to investigate and check if we had any problems with our root certificates. We decided to update them altogether, just in case:</p>



md C:\Temp
cd C:\Temp
# Download ALL root certificates from Windows Update
certutil.exe -generateSSTFromWU roots.sst
# Import ALL root certificates back inside root authorities
$sstContainer = (Get-ChildItem -Path C:\temp\roots.sst)
$sstContainer &#124; Import-Certificate -CertStoreLocation Cert:\LocalMachine\Root



<p>Right after you do this, you need to reboot the affected machine to let it reload all root certificates. </p>



Encryption issue



<p>That didn&#8217;t fix the problem per se. Once the first machine was back, any attempt to connect to our endpoint or Acronis own one using Powershell was still failing. So we decided to investigate to check if machine was not using the proper cypher and we decided to force TLS1.2 in Powershell by using:</p>



# Force PowerShell to use TLS1.2
[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12



<p>Then you have to remember not to close that session or your will need to issue that command again. So now we attempted to connect to our endpoint or Acronis endpoint again and&#8230; bingo! It was working fine!</p>



PS [...]</div><img src="https://stats1.vaisulweb.cloud/piwik.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Fwww.theserverside.technology%2F2020%2F06%2F16%2Facronis-agent-not-registered-windows-server-core-and-ssl-issues%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Dacronis-agent-not-registered-windows-server-core-and-ssl-issues&amp;action_name=Acronis+agent+not+registered%2C+Windows+Server+core+and+SSL+issues&amp;urlref=https%3A%2F%2Fwww.theserverside.technology%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://www.theserverside.technology/2020/06/16/acronis-agent-not-registered-windows-server-core-and-ssl-issues/?pk_campaign=feed&#038;pk_kwd=acronis-agent-not-registered-windows-server-core-and-ssl-issues/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<enclosure url="https://www.theserverside.technology/wp-content/uploads/2020/06/ssl_website.jpeg" length="50287" type="image/jpg" />
<media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://www.theserverside.technology/wp-content/uploads/2020/06/ssl_website-300x174.jpeg" width="300" height="174" medium="image" type="image/jpeg">
	<media:copyright>The Server Side Technology</media:copyright>
	<media:title></media:title>
	<media:description type="html"><![CDATA[]]></media:description>
</media:content>
<media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://www.theserverside.technology/wp-content/uploads/2020/06/ssl_website-300x174.jpeg" width="300" height="174" />
	</item>
	</channel>
</rss>
