Service Pack 1 (SP1) for Windows 7 and for Windows Server 2008 R2 is now available. This service pack is an update to Windows 7 and to Windows Server 2008 R2 that addresses customer and partner feedback.
SP1 for Windows 7 and for Windows Server 2008 R2 is a recommended collection of updates and improvements to Windows that are combined into a single installable update.
Windows 7 SP1 can help make your computer safer and more reliable. Windows Server 2008 R2 SP1 provides a comprehensive set of innovations for enterprise-class virtualization. This includes new virtualization capabilities with Dynamic Memory and Microsoft RemoteFX.
Consumer end-users can find general information about Windows 7 SP1 at the following Microsoft website:
Windows 7 SP1 page on TechNet
Windows Server 2008 R2 SP1 page on TechNet Note After you apply Service Pack 1, the startup setting of the DHCP Client Service changes from disabled to automatic. To avoid this, apply the hotfix that is described in Microsoft Knowledge Base (KB) article 2684965. For more information about KB 2684965, click the following article number to view the article in the Microsoft Knowledge Base:
A certification authority (CA) is responsible for attesting to the identity of users, computers, and organizations. The CA authenticates an entity and vouches for that identity by issuing a digitally signed certificate. The CA can also manage, revoke, and renew certificates.
Enterprise CAs are integrated with Active Directory Domain Services (AD DS). They publish certificates and certificate revocation lists (CRLs) to AD DS. Enterprise CA's use information that is stored in AD DS, including user accounts and security groups, to approve or deny certificate requests. Enterprise CAs use certificate templates. When a certificate is issued, the Enterprise CA uses information in the certificate template to generate a certificate with the appropriate attributes for that certificate type.
If you want to enable automated certificate approval and automatic user certificate enrollment, use Enterprise CAs to issue certificates. These features are available only when the CA infrastructure is integrated with Active Directory. Additionally, only Enterprise CAs can issue certificates that enable smart card sign-in, because this process requires that smart card certificates are mapped automatically to the user accounts in Active Directory.
Stand-alone CAs don't require AD DS, and they don't use certificate templates. If you use stand-alone CAs, all information about the requested certificate type must be included in the certificate request. By default, all certificate requests that are submitted to stand-alone CAs are held in a pending queue until a CA administrator approves them. You can configure stand-alone CAs to issue certificates automatically upon request, but it's less secure and it's not recommended because requests aren't authenticated.
You must use stand-alone CAs to issue certificates when you're using a non-Microsoft directory service or when AD DS isn't available. You can use both enterprise and stand-alone certification authorities in your organization.
A root CA is the CA that is at the top of a certification hierarchy, where all certificate chains terminate. When the root CA certificate is present on the client, the root CA is trusted unconditionally. Whether you use enterprise or stand-alone CAs, you need to designate a root CA.
Since the root CA is the top CA in the certification hierarchy, the Subject field of the certificate has the same value as the Issuer field. Likewise, because the certificate chain terminates when it reaches a self-signed CA, all self-signed CAs are root CAs. The decision to designate a CA as a trusted root CA can be made at the enterprise level or locally by the individual IT administrator.
A root CA serves as the foundation upon which you base your certification authority trust model. It guarantees that the subject's public key corresponds to the identity information shown in the subject field of the certificates it issues. Different CAs might also verify this relationship by using different standards; therefore, it's important to understand the policies and procedures of the root certification authority before choosing to trust that authority to verify public keys.
The root CA is the most important CA in your hierarchy. If your root CA is compromised, all CAs in the hierarchy and all certificates issued from it are considered compromised. You can maximize the security of the root CA by keeping it disconnected from the network and by using subordinate CAs to issue certificates to other subordinate CAs or to end users. A disconnected root CA is also known as an Offline root CA.
CAs that aren't root CAs are considered subordinate. The first subordinate CA in a hierarchy obtains its CA certificate from the root CA. This first subordinate CA can use this key to issue certificates that verify the integrity of another subordinate CA. These higher subordinate CAs are referred to as intermediate CAs. An intermediate CA is subordinate to a root CA, but it serves as a higher certifying authority to one or more subordinate CAs.
An intermediate CA is often referred to as a policy CA because it's typically used to separate classes of certificates that are distinguished through policies. For example, policy separation includes the level of assurance that a CA provides or the geographical location of the CA to distinguish different end-entity populations. A policy CA can be online or offline.
The private key is part of the CA identity, and it must be protected from compromise. Many organizations protect CA private keys by using a hardware security module (HSM). If an HSM isn't used, the private key is stored on the CA computer.
Offline CAs should be stored in secure locations and not connected to the network. Issuing CAs use their private keys when issuing certificates, so the private key must be accessible (online) while the CA is in operation. In all cases, the CA and its private key on the CA should be physically protected.
An HSM is a dedicated hardware device that is managed separately from the operating system. HSMs provide a secure hardware store for CA keys, in addition to a dedicated cryptographic processor to accelerate signing and encrypting operations. The operating system utilizes the HSM through the CryptoAPI interfaces, and the HSM functions as a cryptographic service provider (CSP) device.
HSMs typically are PCI adapters, but they're also available as network-based appliances, serial devices, and USB devices. If an organization plans to implement two or more CAs, you can install a single network-based HSM and share it among multiple CAs.
Customers who use Windows Server 2008 or Windows Server 2008 R2 products and services should migrate to Microsoft Azure to take advantage of three additional years of Critical and Important security updates at no additional charge and modernize when ready. For environments other than Azure, we recommend customers upgrade to the latest version before the deadline. For customers who cannot meet the end-of-support deadline may purchase Extended Security Updates to keep server workloads protected until they upgrade (some restrictions apply).
We recommend that you migrate to Azure or upgrade to the current product versions before the support end dates. This lets you take advantage of the latest product innovations and make sure you have uninterrupted support from Microsoft.
The Azure Migration and Modernization Center has a full range of tools available to help you assess your current on-premises environment, migrate your workloads onto Azure, and optimize your Azure usage to best suit your needs. Microsoft also works with many Partners, who are available to help you at every step of the journey.
This issue didn't start untill last night. I have 3 portal layers (hosted feature layers) that are supposed to update every evening. They didn't update last night. I wasn't aware of this issue till the customer reported that their apps were getting an error that said couldn't add layer to the map. This morning I created a new map image service that works great. The issue alone is with hosted feature layers. All other services that are not hosted feature layers draw just fine.
Here is a rundown of my issues... 1. Hosted feature layers are unable to be added to map. 2. When I go to the rest endpoints for the hosted feature layers I see a list of the layers but when you click on one it goes no further. So it is like they are there but it cant see them. 3. IN any application that uses a hosted feature layer it gets a message that layer can't be added to the map. 4. I can't upload a csv file or anything that I wish to create a hosted feature layer. The error I get states Error While analyzing file. There was an error trying to analyze your file. Please check that file is formatted cortrectly. I have tried this with several different csv files and all produce the same results. 5. I can upload an image. I have no problem doing that. I can also upload using the Add CSV file only option. 6. I validated the datastore and it validated correctly. 7. I checked the federation and it is valid also. 7. I tried adding a hosted feature layer in pro also and this also failed. So this was all working yesterday and it is not working today. They did patch our server last night so I had them roll back the patches and it is still not working. I need to addresss this issue asap and get it working for my end users.
What does the portal log say about the 3 hosted feature services? What about the other hosted feature services work except the 3 hosted feature services we are having trouble with? Also, Have you tried to stop the services and start them manually or restart the portal services?
Appears to be an issue related to connectivity between ArcGIS Server and ArcGIS DataStore. Although, you mentioned datastore is validating correctly. Did you validate through Server Manager or Server Admin API?
7fc3f7cf58