![windows driver inf windows driver inf](https://i.stack.imgur.com/wjHXd.png)
A workaround might be to get a USB Ethernet Adapter to manage the drivers remotely with MMC or Windows Admin Center (or use the WiFi interface). NOTE: I have not tried this in the Core edition. When trying to get a NUC7I3BNH installed with Windows Server 2019 not long ago I had some apparent success without having to fiddle around with editing and signing.
#Windows driver inf install
Maybe I could install the original driver package using device manager remotely now, should I want a signed driver. After that, I was able to install the modded driver. This enabled the F8 menu that allowed me to disable driver signature verification. Without a start button, I couldn't select the Advanced Startup, so I found another way to do it: bcdedit /set displaybootmenu yes This resulted in an error about it being an unsigned driver package. inf file to comment out the CatalogFile = line by placing a semi-colon in front of it. This resulted in an error about an incorrect hash. In my case, Intel already had the install information in the file, so it was just copying 2 lines. inf file and added the correct devices under the Server 2016 heading.
#Windows driver inf how to
Although it doesn't truly answer the question on how to force a driver installation from the CLI, it does solve my problem (and similar ones).įirst, I edited the. I spend hours to enable Remote Desktop only to learn that there is an unresolved bug that prevents RDP connections even if the firewall settings and the service policy settings are ok. If you plug your cable to another port Windows will complain that there is no active network adapter.Īlso be aware that Server 2019 Core is not fully mature as of now. The number 1 adapter was the physical port 2 in my case. If you have multiple NICs beware that the numbering on the device is not the same as in the drivers. I also installed the PROSet Adapter Configuration Utility from Intel to check the adapter settings and verify the hardware and cabling. Then you can set testsigning to off again and re-enable secure boot (if applicable). You can check with devmanview if the driver shows up with your NICs. Then change to the driver directory and and install the drivers with pnputil /a. Then you need to disable signature checks with Bcdedit.exe -set TESTSIGNING ON (UEFI secure boot needs to be disabled in the BIOS) and reboot as this function can only enabled/disabled by rebooting. Then you need to patch the corresponding inf to move the lines with your vendor string from the Windows 10 section to the Windows Server section, it seems that this part is also ok in your case. Then you need to ensure that you have NDIS68 drivers, previous versions will not work.
![windows driver inf windows driver inf](https://aws1.discourse-cdn.com/arduino/original/4X/2/5/4/2546cb35c2038b4c1031eeb70f6c6e640fa0f9f2.png)
I know that you already have the string, but just to make sure that there is no mistake. I have sucessfully installed an unsupported NIC driver on Windows Server Core 2019.įirst you should use the free devmanview tool from NirSoft to check that you have the correct PnP vendor string.