Post-deployment steps - AWS Launch Wizard

Post-deployment steps

The following are post-deployment steps for Internet Information Services (IIS) with AWS Launch Wizard.

(Optional) Run Windows Updates

To help ensure that the deployed servers' operating systems and installed applications have the latest Microsoft updates, run Windows Update on each server.

Run Windows Updates on your RD Gateways using public IP addresses

To run Windows updates on the RD Gateways with their public IP addresses:

  1. Identify the public IP addresses for the RD Gateways, from the Amazon EC2 console.

  2. Use the public IP of the RD Gateway to connect to the instance.

  3. On the taskbar, open the Start menu, and choose Settings.

  4. In the Settings application, choose Update & Security

  5. Choose Check for updates.

  6. Install any updates, and restart if necessary.

Run Windows Updates on your IIS servers by connecting through an RD Gateway or public bastion

To run Windows updates on the IIS servers by connecting from within a public resource such as an RD Gateway or bastion host:

  1. Identify the public IP addresses for the public resource, and also the private IP addresses of the IIS servers, from the Amazon EC2 console.

  2. Use the public IP of the public resource to connect to the instance.

  3. From within the RDP connection to the public resource, use the IIS server's private IP addresses when creating subsequent RDP connections.

    Note

    You will use the nested RDP session within the public resource to the IIS server for the remaining steps.

  4. On the taskbar, open the Start menu, and choose Settings.

  5. In the Settings application, choose Update & Security

  6. Choose Check for updates.

  7. Install any updates, and restart if necessary.

Testing the deployment

To test the deployment, ensure that your IP address being used is entered in the WebAccessCIDR parameter. You can review previously entered Parameters for the Launch Wizard deployment in the AWS CloudFormation console. Next, you can use a web browser to navigate to the URL of the Application Load Balancer to confirm the test page is accessible. The URL can be found in the Outputs of the AWS CloudFormation stack.


    IIS post deployment test image.

Connect to your Windows instances using SSM port forwarding sessions and RDP

You can connect to your deployed resources by completing some prerequisites for Amazon EC2 Systems Manager and using a port forwarding session for the RDP connection. The port forwarding method doesn't require bastion hosts, or for you to open inbound TCP 3389 connections to your resources.

SSM port forwarding prerequisites

To run Windows updates on the servers with Amazon EC2 Systems Manager and port forwarding for RDP sessions, the following prerequisites are required:

* These prerequisites are completed automatically as part of the Launch Wizard deployment.

Connect to your resources using SSM port forwarding sessions

The following steps use the AWS CLI to start an SSM Session Manager connection on a specified Amazon EC2 instance and invoke the SSM document AWS-StartPortForwardingSession. This allows an RDP connection from your computer to the target Amazon EC2 instance using the redirected port.

  1. You can locate instance IDs to connect to from the Amazon EC2 console, for example i-1234567890abcdef0.

  2. Run the following command in the AWS CLI by providing your target instance ID after the --target parameter, and a free local port on your computer for the localPortNumber

    aws ssm start-session --target "your-instance-id" --document-name AWS-StartPortForwardingSession --parameters "portNumber"=["3389"],"localPortNumber"=["56788"]
    
       Establish a port forwarding session with the AWS CLI image.
  3. When the session is established, open the Remote Desktop application, enter localhost:56788, and choose Connect.

    
       Connect with the RDP client using the port forwarding session image.
  4. Enter the credentials to the Amazon EC2 instance to log in. You can find more information on retrieving the user name and password for your instance here.

    
       Successful RDP connection over a port forwarding session image.
  5. When finished, you can exit the RDP session and end the AWS CLI session.

    
       End a port forwarding session with the AWS CLI image.