The Dynamic Desktop Browse by Tags - Mert's Desktop - Site Home - TechNet Blogs

Mert's Desktop

This blog is about enterprise computing

Browse by Tags

Related Posts
  • Blog Post: Hyper-V Attack Surface

    An important part of Virtualization security is to secure the physical host which is Hyper-V in our case. The link below includes a spreadsheet you can download that lists all the attack surfaces for Windows Server 2008. Hyper-V Attack Surface Reference Workbook
  • Blog Post: PowerShell Management Library for Hyper-V

    A great toolkit for Hyper-V management using PowerShell. Lots of Hyper-V functions which you can use for your virtual machine operations. PowerShell Management Library for Hyper-V
  • Blog Post: Linux Integration Components for Hyper-V

    When installed in a supported Linux virtual machine running on Hyper-V, the Linux Integration Components provide. Driver support for synthetic devices: The Linux integration components include support for both the synthetic network controller and synthetic storage controller that have been developed...
  • Blog Post: Free Hyper-V Virtualization Online Course

    This 2-hour online course provides IT Professionals the knowledge to implement and manage Hyper-V in an IT environment. Topics covered in the course include: · Features of Hyper-V · Features of server consolidation · Hyper-V implementation · Creation of virtual machines · Dynamic datacenters...
  • Blog Post: Impressive Virtualization Case Study : 85% virtualized, 30:1 VM density

    Impressive virtualization case study from Kroll Factual Data. Some highlights: · A ble to develop, test and deploy new products within three days. · A datacenter which has the ability to deploy additional computing resources in less than 15 minutes. · A datacenter that is 85 percent virtualized...
  • Blog Post: VDI Security - Virtual Desktop Configuration

    The following recommended best practices can help you enhance security when configuring virtual machines on servers running the Hyper-V role: · Configure virtual machines to use fixed-sized virtual hard disks. · Store virtual hard disks and snapshot files in a secure location. · Decide how much...