Creating an external virtual network switch changes the packet flow on the Hyper-V host, which can potentially create connectivity problems.
More articles by Nirmal Sharma
Discover six useful PowerShell cmdlets offered through Windows Server 2012 for checking and troubleshooting Active Directory replication status.
Learn when to use System Center Virtual Machine Manager 2012 R2 and when to use PowerShell cmdlets for deploying Microsoft HNV.
Discover how you can create your own virtual lab in the cloud by connecting several Microsoft Azure virtual machines using an Azure Virtual Network.
Discover how the 280-plus PowerShell cmdlets for Windows Azure can help you perform advanced administration for Windows Azure-hosted resources, including VMs.
Learn how to install and activate a key set of components that can help improve the performance of Hyper-V virtual machines running Linux distributions.
Ensuring Hyper-V environments are running securely is a major concern for many enterprises. Minimize your attack surface with these Hyper-V Security Best Practices.
Discover how Microsoft Hyper-V Network Virtualization can enable hosting providers to host customer virtual machines without requiring any changes to the physical network topology.
Resynchronizations can become necessary when a Hyper-V Primary Server fails to properly replicate to the Replica Server. Discover what to look for and how to proceed when a Hyper-V resync is needed.
Take advantage of the built-in logging capabilities in Symantec Antivirus and our handy script to retrieve TimeOfLastScan, TimeOfLastVirus and PatternFileUpdate details from client PCs.
Discover a network adapter-independent protocol from Microsoft that facilitates NIC teaming for virtual machines on Windows Server 2012.
Our latest server tutorial details how to troubleshoot generic error messages in Hyper-V Replica as well as what you should do when a known error message occurs.
Our latest server tutorial reveals two handy PowerShell cmdlets available for checking Windows Server 2012 Hyper-V Replication status and getting replication statistical data on your VMs.
Discover the key role Hyper-V's VSP and VSC components play in improving virtual machine performance by facilitating communication between VMs and the parent partition.
For any virtualization administrator that's ever found Hyper-V's network virtual switch's capabilities to be a bit on the confusing side, we have the perfect server tutorial for you.
With Hyper-V in Windows Server 2012 R2 introducing support for two generations of virtual machines, we look at when and why you might want to select one VM generation over the other.
Discover how Windows PowerShell and the built-in PowerShell cmdlets that ship with Hyper-V can help automate a variety of server admin tasks on Hyper-V virtual machines.
Our latest Server Tutorial covers virtual machine conversion tools and takes you step by step through the process of converting a physical machine to a VM.
With Microsoft Hyper-V and VMware vSphere tackling virtualization in their own distinct ways, it's important to know the key advantages and disadvantages of each design architecture employed by the two.
Discover how the new cloning feature in Windows Server 2012 can simplify building a new additional domain controller as well as save time when provisioning domain controllers for rapid deployment.
Before virtualizing mission-critical services like Active Directory domain controllers, make sure to brush up on what you should and should not do with our "best practices" reference.
Authorization Manger makes secure server virtualization more than a pipe dream. These best practices show you the two best ways to secure Hyper-V Server and virtual machines using Authorization Manager.
Are your Hyper-V virtual machines secure? Learn how to secure them using Authorization Manager.
When deploying virtualization technologies, key choices must be made to ensure the environment is secure. This article explains how to use Authorization Manager to make Hyper-V as secure as it can be.
Setting up SQL Cluster Setup is simple. After that it gets dicey. This article steps through SQL server setup functions, configuring a second node to be cluster-aware, and the all-registry entries and their significance created during the setup.