dcsimg

More articles by Nirmal Sharma

When Hyper-V External Virtual Network Switches Disrupt Network Connectivity

Creating an external virtual network switch changes the packet flow on the Hyper-V host, which can potentially create connectivity problems.

Checking Active Directory Replication Using PowerShell

Discover six useful PowerShell cmdlets offered through Windows Server 2012 for checking and troubleshooting Active Directory replication status.

Choosing the Best Deployment Method for Implementing Hyper-V Network Virtualization

Learn when to use System Center Virtual Machine Manager 2012 R2 and when to use PowerShell cmdlets for deploying Microsoft HNV.

Azure Virtual Network Primer: Overview and Q&A for IT Pros

Discover how you can create your own virtual lab in the cloud by connecting several Microsoft Azure virtual machines using an Azure Virtual Network.

Managing Windows Azure Resources Using PowerShell

Discover how the 280-plus PowerShell cmdlets for Windows Azure can help you perform advanced administration for Windows Azure-hosted resources, including VMs.

Installing and Activating Hyper-V Linux Integration Services

Learn how to install and activate a key set of components that can help improve the performance of Hyper-V virtual machines running Linux distributions.

15 Core Hyper-V Security Best Practices

Ensuring Hyper-V environments are running securely is a major concern for many enterprises. Minimize your attack surface with these Hyper-V Security Best Practices.

Hyper-V Network Virtualization: Overview and Q&A

Discover how Microsoft Hyper-V Network Virtualization can enable hosting providers to host customer virtual machines without requiring any changes to the physical network topology.

Hyper-V Replica Resynchronization Process

Resynchronizations can become necessary when a Hyper-V Primary Server fails to properly replicate to the Replica Server. Discover what to look for and how to proceed when a Hyper-V resync is needed.

Retrieving Symantec Antivirus Scanning Details from Client PCs

Take advantage of the built-in logging capabilities in Symantec Antivirus and our handy script to retrieve TimeOfLastScan, TimeOfLastVirus and PatternFileUpdate details from client PCs.

Working with NIC Teaming in Windows Server 2012

Discover a network adapter-independent protocol from Microsoft that facilitates NIC teaming for virtual machines on Windows Server 2012.

Troubleshooting Generic and Known Error Messages in Hyper-V Replica

Our latest server tutorial details how to troubleshoot generic error messages in Hyper-V Replica as well as what you should do when a known error message occurs.

Checking Hyper-V Replication Health Using PowerShell Cmdlets

Our latest server tutorial reveals two handy PowerShell cmdlets available for checking Windows Server 2012 Hyper-V Replication status and getting replication statistical data on your VMs.

Understanding Hyper-V VSP/VSC and VMBUS Design

Discover the key role Hyper-V's VSP and VSC components play in improving virtual machine performance by facilitating communication between VMs and the parent partition.

Harnessing the Power of Hyper-V Network Virtual Switches

For any virtualization administrator that's ever found Hyper-V's network virtual switch's capabilities to be a bit on the confusing side, we have the perfect server tutorial for you.

Hyper-V 2012 R2: Pros and Cons of Generation 1 vs. Generation 2 VMs

With Hyper-V in Windows Server 2012 R2 introducing support for two generations of virtual machines, we look at when and why you might want to select one VM generation over the other.

Working with Windows PowerShell and Hyper-V Modules

Discover how Windows PowerShell and the built-in PowerShell cmdlets that ship with Hyper-V can help automate a variety of server admin tasks on Hyper-V virtual machines.

How to Convert a Physical Computer to a Virtual Machine

Our latest Server Tutorial covers virtual machine conversion tools and takes you step by step through the process of converting a physical machine to a VM.

Hyper-V and VMware vSphere Architectures: Pros and Cons

With Microsoft Hyper-V and VMware vSphere tackling virtualization in their own distinct ways, it's important to know the key advantages and disadvantages of each design architecture employed by the two.

Cloning Virtual Domain Controllers in Windows Server 2012

Discover how the new cloning feature in Windows Server 2012 can simplify building a new additional domain controller as well as save time when provisioning domain controllers for rapid deployment.

Virtualizing Active Directory Domain Controllers: General Best Practices

Before virtualizing mission-critical services like Active Directory domain controllers, make sure to brush up on what you should and should not do with our "best practices" reference.

Secure Server Virtualization Using Hyper-V

Authorization Manger makes secure server virtualization more than a pipe dream. These best practices show you the two best ways to secure Hyper-V Server and virtual machines using Authorization Manager.

Hyper-V Security and Authorization Manager, Keys to a Successful Config

Are your Hyper-V virtual machines secure? Learn how to secure them using Authorization Manager.

Configuring Hyper-V Security Using Authorization Manager

When deploying virtualization technologies, key choices must be made to ensure the environment is secure. This article explains how to use Authorization Manager to make Hyper-V as secure as it can be.

Internals of SQL Cluster Setup and Troubleshooting Tips

Setting up SQL Cluster Setup is simple. After that it gets dicey. This article steps through SQL server setup functions, configuring a second node to be cluster-aware, and the all-registry entries and their significance created during the setup.