Systems Admin

Step-by-Step Guide: Installing and Using Windows Admin Center (WAC) on a Domain-Joined Windows 11 PC

Server Manager has been the “manage your Windows Servers” tool since the Windows 2008 era, and it shows. It assumes a single trusted-network model, doesn’t play well with hybrid or cloud environments, and the per-server console workflow is painful at scale. Windows Admin Center (WAC) is Microsoft’s replacement: a browser-based management surface that handles Windows Servers, failover clusters, hyper-converged infrastructure, Windows 10/11 endpoints, and Azure resources from one HTTPS interface. No installed agent on managed servers (it uses standard remote management protocols), no client software per admin (any modern browser works), and a clean extension model for adding capabilities.

This walkthrough installs WAC on a domain-joined Windows 11 admin workstation, configures HTTPS port 6516, adds a remote Windows Server 2022 domain controller, and walks through managing Roles and Features through the browser. The deployment-on-Windows-11-instead-of-the-server pattern is deliberate — treating WAC as a per-admin tool rather than centralized infrastructure is the right starting point for most environments.

What you need before starting

  • A domain-joined Windows 11 (or 10) admin workstation
  • Domain Administrator credentials (for managing remote servers, not for running the installer itself)
  • HTTPS port 6516 open inbound on the workstation’s Windows Defender Firewall
  • Microsoft Edge or Chrome — any reasonably modern browser works
  • Do not install WAC on a Domain Controller. WAC manages DCs from elsewhere; running it on a DC is unsupported and creates an unnecessary attack surface on a tier-0 system.

What WAC actually manages

  • Windows Servers — the core use case. Roles, features, services, scheduled tasks, registry, files, certificates, firewall, networking, the lot.
  • Failover Clusters — through the Cluster Manager extension
  • Hyper-Converged Infrastructure — Storage Spaces Direct, Azure Stack HCI
  • Windows 10 / 11 endpoints — via the same protocols
  • Azure resources — via Azure-integration extensions; bridges your on-prem and cloud management surfaces

Install WAC on Windows 11

Step 1 — Download the installer

Open Edge, navigate to aka.ms/WACDownload, press Enter. The shortlink redirects to the official Microsoft download page; the MSI installer downloads automatically (or click Download manually). The Microsoft Evaluation Center is an alternative source if you prefer.

Microsoft Edge browser navigating to aka.ms/WACDownload.
aka.ms/WACDownload — the canonical shortlink for the Windows Admin Center installer.
Microsoft download page for Windows Admin Center.
The Microsoft download page after the redirect.
WindowsAdminCenter MSI saved to the Downloads folder.
The MSI lands in Downloads — usually named WindowsAdminCenterYYMM.msi matching the release version.

Step 2 — Launch the MSI

From Downloads, double-click the .msi (e.g. WindowsAdminCenter2306.msi). The installer takes a moment to prepare its environment.

WAC MSI installer preparing to launch.
Installer prep — takes a few seconds before the welcome screen appears.

Step 3 — License agreement

Welcome screen appears. Accept the license terms, click Next.

WAC setup welcome screen.
WAC setup welcome screen.
WAC license agreement acceptance dialog.
Accept the EULA to continue.

Step 4 — Pick Express Setup

Two installation modes: Express and Custom. Express is right for most workstation deployments — it picks reasonable defaults and uses a self-signed certificate for HTTPS. Custom is for cases where you need to specify a different port, point at a non-default install location, or pre-install a real certificate.

WAC Express setup option highlighted.
Express Setup is the right answer unless you have specific requirements that need Custom.
WAC mode confirmation dialog.
Confirm Express mode — reasonable defaults all the way down.

Step 5 — Microsoft Update opt-in

WAC asks whether to receive updates via Microsoft Update. Pick the opt-in — security and feature updates ship through this channel and you want them. Click Next.

WAC Microsoft Update opt-in screen.
Take the Microsoft Update opt-in — WAC ships updates through the same channel as Windows itself.

Step 6 — Diagnostic data

WAC sends diagnostic data to Microsoft. Two levels:

  • Required — install and configuration telemetry only
  • Required + Optional — adds detailed app usage, error reports, performance metrics

For a lab or test environment, Required + Optional is fine. For production with strict telemetry policies, pick Required only.

WAC Required diagnostic data option.
Required-only telemetry — the safer pick for environments with telemetry restrictions.
WAC Required and Optional diagnostic data option.
Required + Optional — richer telemetry; useful for lab and test environments.

Step 7 — HTTPS port and shortcut

The default HTTPS port is 6516. Change it only if you have a conflict or a policy requirement. Keep the default URL as https://localhost:6516. Tick Create a desktop shortcut. Click Install.

WAC HTTPS port 6516 configuration with desktop shortcut option.
HTTPS port 6516, desktop shortcut on, then Install — the typical install completes in 3–5 minutes.

Step 8 — Wait for install

Install runs for a few minutes. WAC sets up its IIS-hosted UI, registers the service, and configures the firewall rule for inbound 6516.

Step 9 — Pick the certificate

WAC needs an HTTPS certificate. The Express installer creates a self-signed cert and prompts you to confirm using it. Pick the self-signed cert and OK. For production, replace the self-signed cert with one issued by your internal CA (or a public CA if WAC will be reachable from outside) — instructions are in the WAC docs. Self-signed is fine for lab and initial deployment.

Step 10 — Launch WAC

Double-click the desktop shortcut. WAC opens in your default browser at https://localhost:6516. The first browser load shows a certificate warning if you used the self-signed cert — that’s expected; trust it once and the warning disappears.

WAC desktop shortcut on Windows 11.
Desktop shortcut, courtesy of the Express installer.
WAC certificate selection prompt in browser.
Self-signed cert prompt — expected on first load. Trust it for the local-only WAC instance; replace with a CA-issued cert for production.
WAC sign-in screen in Edge.
WAC sign-in at https://localhost:6516 — sign in with your domain admin credentials.
Initial WAC dashboard listing the local Windows 11 PC.
Initial dashboard — only the local Windows 11 workstation is listed until you add remote servers.

Add and manage remote servers

Step 11 — Wait for extension updates

On first launch, WAC checks for and applies extension updates in the background. Wait for the updates to finish; click OK on the confirmation when extensions are current. The extension model is how WAC adds new capabilities — new server roles get manageability through extensions, and Microsoft ships updates regularly.

WAC extensions updating in the background.
Background extension updates run on first launch — let them finish before adding servers.
WAC extensions updated confirmation.
Extensions current — ready to add managed servers.

Step 12 — Add the domain controller as a managed server

Click + Add in the top panel > Add Connections > Server Connection. Three ways to find the server: type the hostname, search Active Directory, or import from a list (CSV of servers, useful for bulk add). For a single server, type the FQDN:

DC.smart.local

WAC reaches the server, confirms reachability, and asks for credentials if needed. Click Add. The server appears in the connections list.

WAC Add Connections panel with Server Connection selected.
+ Add > Add Connections > Server Connection — the standard path to add a managed server.
WAC server connection form with DC.smart.local entered.
FQDN entry; AD search and CSV import are alternative paths for larger environments.

Step 13 — Connect and explore

Click the new server. The WAC dashboard for that server opens with system overview, real-time CPU/RAM/network/disk panels, and a left-nav of management surfaces: Roles & Features, Services, Files, Registry, Event Viewer, Performance Monitor, Scheduled Tasks, Updates, PowerShell, Remote Desktop, and many more depending on installed extensions.

WAC server overview for DC.smart.local.
Server overview tile for the newly-added DC — click into it for the full management dashboard.
WAC dashboard for DC.smart.local showing CPU, RAM, and tools.
Full server management dashboard — live performance counters, role/feature management, services, files, registry, and the rest of the Windows Server admin surface in one browser tab.

Step 14 — Manage roles through the browser

Open Roles & Features from the left nav. WAC shows every role and feature on the target server with current install status. From here you can install new roles (Web Server, DHCP, etc.), remove ones you don’t need, or just inspect what’s installed — same operations as Server Manager’s Add Roles wizard, but in a browser, against a remote server, without RDP.

WAC Roles and Features management page.
Roles and Features management through the browser — install, remove, or inspect without RDPing to the server.

Security considerations

If you install WAC in gateway mode (a centralized WAC instance that all admins connect to, rather than per-workstation installs), open inbound HTTPS 6516 on the gateway server’s firewall. For larger environments configure Role-Based Access Control (RBAC) to delegate per-server access without granting full admin everywhere — helpdesk staff get read-only or specific tool access, senior admins get full management.

You can also sign into WAC directly from the DC console if you must (handy for emergency in-band management when the workstation can’t reach the DC over the network), but per the prerequisites — don’t install WAC on a DC.

WAC running from the domain controller itself.
You can sign into WAC from the DC if needed — but the WAC install itself belongs on a non-DC workstation.

Bonus: Azure integration

WAC ships with Azure integration extensions: Azure VM management, Azure Backup, Azure Monitor, Azure Security Center, and more. Register WAC with Azure under Settings > Azure — once registered, hybrid management surfaces appear inline in the WAC UI alongside on-prem ones. Useful for environments with workloads in both places.

Extending WAC

The extension model is what keeps WAC current. Open Settings > Extensions to see installed extensions and browse available ones — Storage Migration Service, Cluster Manager, Azure Hybrid Center, and many third-party extensions for backup vendors, SIEM tools, etc. Install only what you actually need; extensions add UI surface and slightly increase the WAC instance size.

Things that bite people in production

Don’t install on a DC

This is in the prerequisites for a reason. DCs should be tier-0 with minimal additional services running. WAC is a management surface and a privileged-access target — running it on a DC creates a path for credential theft from the DC itself.

Replace the self-signed cert for production

Self-signed certs work but produce browser warnings on every machine that hasn’t trusted them. For any production deployment, get a cert from your internal CA or a public CA (if WAC will be exposed externally), and configure WAC to use it. The Microsoft docs cover the cert-replacement procedure in detail.

Gateway mode for teams

Per-workstation WAC installs are fine for one or two admins. For larger teams, install WAC in gateway mode on a dedicated server — everyone connects to the same WAC instance, RBAC is centrally managed, and audit logs land in one place. The trade-off is one more server to maintain; the win is centralized control.

Watch the firewall rule

The Express install opens inbound 6516 on Windows Defender Firewall. If you’re running a third-party firewall on the WAC host, you have to open 6516 there yourself. If WAC users are on a different subnet from the WAC host, the path between them also needs 6516 open.

Manage WAC like any other web app

WAC is a privileged management surface. Treat the host as a tier-1 (or tier-0, if it manages tier-0 servers) machine: limit who can sign in, enable strong authentication (smart cards, MFA via cloud auth), patch promptly, and log everything. A compromised WAC host is one step from a compromised everything-WAC-manages.

Where this fits

WAC is the modern admin surface for Windows Server. The companion pieces are managing Active Directory through Windows Admin Center, managing the DNS Server role through WAC, and enabling Remote Desktop using WAC — once WAC is installed, the rest of the WAC-based admin walkthroughs work against any server you’ve added. For broader Windows Server hygiene see the Windows Server Administration pathway.

Leave a Reply