More articles by Nirmal Sharma

Managing Windows Azure Resources Using PowerShell

Discover how the 280-plus PowerShell cmdlets for Windows Azure can help you perform advanced administration for Windows Azure-hosted resources, including VMs.

Installing and Activating Hyper-V Linux Integration Services

Learn how to install and activate a key set of components that can help improve the performance of Hyper-V virtual machines running Linux distributions.

15 Core Hyper-V Security Best Practices

Ensuring Hyper-V environments are running securely is a major concern for many enterprises. Minimize your attack surface with these Hyper-V Security Best Practices.

Hyper-V Network Virtualization: Overview and Q&A

Discover how Microsoft Hyper-V Network Virtualization can enable hosting providers to host customer virtual machines without requiring any changes to the physical network topology.

Hyper-V Replica Resynchronization Process

Resynchronizations can become necessary when a Hyper-V Primary Server fails to properly replicate to the Replica Server. Discover what to look for and how to proceed when a Hyper-V resync is needed.

Retrieving Symantec Antivirus Scanning Details from Client PCs

Take advantage of the built-in logging capabilities in Symantec Antivirus and our handy script to retrieve TimeOfLastScan, TimeOfLastVirus and PatternFileUpdate details from client PCs.

Working with NIC Teaming in Windows Server 2012

Discover a network adapter-independent protocol from Microsoft that facilitates NIC teaming for virtual machines on Windows Server 2012.

Troubleshooting Generic and Known Error Messages in Hyper-V Replica

Our latest server tutorial details how to troubleshoot generic error messages in Hyper-V Replica as well as what you should do when a known error message occurs.

Checking Hyper-V Replication Health Using PowerShell Cmdlets

Our latest server tutorial reveals two handy PowerShell cmdlets available for checking Windows Server 2012 Hyper-V Replication status and getting replication statistical data on your VMs.

Understanding Hyper-V VSP/VSC and VMBUS Design

Discover the key role Hyper-V's VSP and VSC components play in improving virtual machine performance by facilitating communication between VMs and the parent partition.

Harnessing the Power of Hyper-V Network Virtual Switches

For any virtualization administrator that's ever found Hyper-V's network virtual switch's capabilities to be a bit on the confusing side, we have the perfect server tutorial for you.

Hyper-V 2012 R2: Pros and Cons of Generation 1 vs. Generation 2 VMs

With Hyper-V in Windows Server 2012 R2 introducing support for two generations of virtual machines, we look at when and why you might want to select one VM generation over the other.

Working with Windows PowerShell and Hyper-V Modules

Discover how Windows PowerShell and the built-in PowerShell cmdlets that ship with Hyper-V can help automate a variety of server admin tasks on Hyper-V virtual machines.

How to Convert a Physical Computer to a Virtual Machine

Our latest Server Tutorial covers virtual machine conversion tools and takes you step by step through the process of converting a physical machine to a VM.

Hyper-V and VMware vSphere Architectures: Pros and Cons

With Microsoft Hyper-V and VMware vSphere tackling virtualization in their own distinct ways, it's important to know the key advantages and disadvantages of each design architecture employed by the two.

Cloning Virtual Domain Controllers in Windows Server 2012

Discover how the new cloning feature in Windows Server 2012 can simplify building a new additional domain controller as well as save time when provisioning domain controllers for rapid deployment.

Virtualizing Active Directory Domain Controllers: General Best Practices

Before virtualizing mission-critical services like Active Directory domain controllers, make sure to brush up on what you should and should not do with our "best practices" reference.

Secure Server Virtualization Using Hyper-V

Authorization Manger makes secure server virtualization more than a pipe dream. These best practices show you the two best ways to secure Hyper-V Server and virtual machines using Authorization Manager.

Hyper-V Security and Authorization Manager, Keys to a Successful Config

Are your Hyper-V virtual machines secure? Learn how to secure them using Authorization Manager.

Configuring Hyper-V Security Using Authorization Manager

When deploying virtualization technologies, key choices must be made to ensure the environment is secure. This article explains how to use Authorization Manager to make Hyper-V as secure as it can be.

Internals of SQL Cluster Setup and Troubleshooting Tips

Setting up SQL Cluster Setup is simple. After that it gets dicey. This article steps through SQL server setup functions, configuring a second node to be cluster-aware, and the all-registry entries and their significance created during the setup.

DNS Client Behavior in Windows Vista and Server 2008

Win Tip: DNS functions differently in the latest versions of Windows. For a quick explanation of DNS client behavior for DNS queries and registrations look no further.

Remote Control in Windows Server 2008

Win Tip: RSAT offers a new way to manage computers remotely in Windows Server 2008.

Background Zone Loading, New Functionality in Win Server 2008 DNS

Win Tip: Microsoft has changed the behavior of DNS server in Windows Server 2008. Now, DNS server loads the zone data from Active Directory while it restarts. This allows the server to respond to client requests coming in for other zones.

WinInstall LE, MSI Creator and Configuration Builder

WinInstall LE is certainly not the only approach to deploying an application-specific setting to multiple computers, but it is one that saves both time and money. Learn its advantages as well as how to use this tool to convert EXE applications to MSI packages.