notes for 74-409 microsoft exam

Upload: rameshbabu

Post on 04-Jun-2018

223 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/13/2019 Notes for 74-409 Microsoft exam

    1/71

    http://www.accelerated-ideas.com/aiMExamsChoose.aspxhttp://social.technet.microsoft.com/wiki/contents/articles/7329.network-load-balancing-nlb-survival-guide.aspx

    1. Multitenant security and Isolation

    Provided through Server virtualization provides a fully isolated network layer of the datacenterthrough programmatically managed and extensible capabilities. This enables connection to thenetwork of virtual machines with policy enforcement for security and isolation. Provides

    flexibility to restrict access to a virtual machine on any node while maintaining isolation of thenetwork and storage traffic. Provides enhanced security and isolation of customers networksfrom one another. In windows 2008 R2, Server virtualization provides isolation between virtualmachines. However, the network layer of the datacenter is not fully isolated, and Layer 2connectivity is implied between different workloads that are running over the same infrastructure.

    2. Router guard: Router guard drops router advertisement and redirection messages fromunauthorized virtual machines that are acting as routers.

    3. The Hyper-V Extensible Switch is a Layer 2 virtual network switch that provides programmatically managed and extensible capabilities to connect virtual machines to the physicalnetwork. The Hyper-V Extensible Switch is an open platform that lets vendors provide extensions

    written to standard Windows application programming interface (API) frameworks. Multiplemonitoring and filtering extensions can be supported at the entrance and outlet portions of theHyper-V Extensible Switch. Provides traffic visibility at different layers and enables statisticaltraffic data to be gathered.

    4. Integration services: The Integration Services are a set of drivers that allow a virtual machine tocommunicate directly with the hypervisor For those who come from a VMware background, theIntegration Services are comparable to the VMware Tools. Virtual machines can function withoutthe Integration Services, but they will perform much better if the Integration Services are installed.

    http://www.accelerated-ideas.com/aiMExamsChoose.aspxhttp://social.technet.microsoft.com/wiki/contents/articles/7329.network-load-balancing-nlb-survival-guide.aspxhttp://social.technet.microsoft.com/wiki/contents/articles/7329.network-load-balancing-nlb-survival-guide.aspxhttp://social.technet.microsoft.com/wiki/contents/articles/7329.network-load-balancing-nlb-survival-guide.aspxhttp://social.technet.microsoft.com/wiki/contents/articles/7329.network-load-balancing-nlb-survival-guide.aspxhttp://social.technet.microsoft.com/wiki/contents/articles/7329.network-load-balancing-nlb-survival-guide.aspxhttp://www.accelerated-ideas.com/aiMExamsChoose.aspx
  • 8/13/2019 Notes for 74-409 Microsoft exam

    2/71

    Virtual machines that do not use the Integration Services must rely on emulated hardware, whichdegrades the virtual machines overall performance. Unfortunately however, the IntegrationServices are only compatible with virtual machines that are running Windows operating systems

    5. Hyper V replication - Starting in Windows Server 2012 R2, the frequency of replication, which previously was a fixed value, is configurable. You can set this value in the ConfigureReplication Frequency page of the Enable Replication wizard or in the Replication section forthe virtual machine in Hyper-V Manager. You can configure the replication frequency so that thechanges are sent every 30 seconds, every 5 minutes, or every 15 minutes

    6. Hyper-V Replica provides asynchronous replication of Hyper-V virtual machines between twohosting servers. It is simple to configure and does not require either shared storage or any

    particular storage hardware. Any server workload that can be virtualized in Hyper-V can bereplicated. Replication works over any ordinary IP-based network, and the replicated data can beencrypted during transmission. Hyper-V Replica works with standalone servers, failover clusters,or a mixture of both. The servers can be physically co-located or widely separated geographically.The physical servers do not need to be in the same domain, or even joined to any domain at all

    7. You can set up replication of Hyper-V virtual machines as long as you have any two physicalWindows Server 2012 or Windows Server 2012 R2 servers which support the Hyper-V role. Thetwo (or three, in the case of extended replication) servers can be physically co-located or incompletely separate geographical locations. Either (or both of) the primary and Replica serverscan be part of a failover cluster and mixed standalone and clustered environments are supported

    8. Live Migrations: Windows Server 2008 R2 introduced the Live Migration feature, which permitsusers to move a running virtual machine from one physical computer to another with nodowntime assuming that the virtual machine is clustered. Windows Server 2012 Hyper-V

    provides the ability to migrate virtual machines, with support for simultaneous live migrations.That is, users can move several virtual machines at the same time.

    9. Live migrations are not limited to a cluster. Virtual machines can be migrated across cluster boundaries, and between stand-alone servers that are not part of a cluster

    10. Live storage migration: Live storage migration allows users to move virtual hard disks that areattached to a running virtual machine. Users can transfer virtual hard disks to a new location forupgrading or migrating storage, performing back-end storage maintenance, or redistributing thestorage load.

    11. NUMA - A NUMA topology can be projected onto a virtual machine, and guest operatingsystems and applications can make intelligent NUMA decisions.

    12. Windows Server 2012 Hyper-V enables support for SR-IOV-capable network devices and allowsthe SR-IOV virtual function of a physical network adapter to be assigned directly to a virtualmachine. Reduces network latency and host CPU overhead (for processing network traffic);increases network throughput

    13. Windows Server 2012 Hyper-V can reclaim the unused memory from virtual machines with aminimum memory value lower than their startup value.

    14. Smart paging - If a virtual machine is configured with a lower minimum memory than its startupmemory and Hyper-V needs additional memory to restart it, Hyper-V smart paging is used to

  • 8/13/2019 Notes for 74-409 Microsoft exam

    3/71

    bridge the gap between minimum and startup memory. Provides a reliable way to keep virtualmachines running when there is not enough physical memory available

    15. Runtime memory configuration - Users can make configuration changes to Dynamic Memory(increase maximum memory or decrease minimum memory) when a virtual machine is running.

    16. Resource metering - Resource Metering allows users to track how many CPU, memory, storage,and network resources are consumed by a virtual machine over time. This information is gatheredautomatically (without the need to constantly collect data from the virtual machine) and persistswith the virtual machine through live migration/other mobility operations. Windows Server 2012Hyper-V can track and report the amount of data transferred per IP address or virtual machine

    17. VHDX format = VHDX supports up to 64 TB of storage. It helps to provide protection fromcorruption due to power failures by logging updates to the VHDX metadata structures. It alsohelps to prevent performance degradation on large-sector physical disks by optimizing structurealignment.

    18. Offloaded data transfer support = Windows Server 2012 Hyper-V uses SAN copy offload to copylarge amounts of data from one location to another.

    19. Data center bridging - Windows Server 2012 Hyper-V uses DCB-capable hardware to convergemultiple types of network traffic onto a single network adapter, with a maximum level of serviceto each. Helps to reduce the cost and complexity of maintaining separate traffic for network,management, live migration, and storage. Makes it easy to change allocations to different trafficflows

    20. Virtual Fibre Channel in Hyper-V provides Fibre Channel ports within the guest operating system.

    21. QOS- Windows Server 2012 Hyper-V uses minimum bandwidth to assign specific bandwidth foreach type of traffic and to ensure fair sharing during congestion.

    22. Network Interface Card (NIC) Teaming for load balancing and failover (LBFO) - WindowsServer 2012 Hyper-V provides built-in support for NIC Teaming: A virtual machine can havevirtual network adapters that are connected to more than one virtual switch. If a network adapterunder that virtual switch is disconnected, it still has connectivity. NIC Teaming supports up to 32network adapters in a team

    23. Guest Clustering - Workloads can be virtualized by directly accessing cluster guest operatingsystems and storage over Fibre Channel or through iSCSI. Provides the ability to connect FibreChannel directly from within virtual machines

    24. Affinity virtual machine rules - Administrators can configure partnered virtual machines tomigrate simultaneously at failover.

    25. Anti-affinity virtual machine rules - Administrators can specify that two virtual machines cannotcoexist on the same node in a failover scenario

    26. NIC Teaming - NIC Teaming which allows multiple network interfaces to work together as ateam, preventing connectivity loss if one network adapter fails. NIC Teaming also allows you toaggregate bandwidth from multiple network adapters, so for example, four 1-gigabyte (GB)

  • 8/13/2019 Notes for 74-409 Microsoft exam

    4/71

    network adapters can provide an aggregate of 4 GB/second of throughput. In Windows Server2012 R2, the load-balancing algorithms have been further enhanced with the goal to better utilizeall NICs in the team, significantly improving performance.

    27. The advantages of a Windows NIC Teaming solution are that it works with all network adaptervendors, spares you from most potential problems that proprietary solutions cause, provides acommon set of management tools for all adapter types, and is fully supported by Microsoft.

    28. Memory ballooning the technique used to reclaim unused memory from a virtual machine to begiven to another virtual machine that has memory needs

    29. SMB Direct - the SMB protocol has provided support for Remote Direct Memory Access(RDMA) network adapters, which allows storage performance capabilities that rival FiberChannel. RDMA network adapters enable this performance capability by operating at full speedwith very low latency due to the ability to bypass the kernel and perform write and readoperations directly to and from memory. This capability is possible since reliable transport

    protocols are implemented on the adapter hardware and allow for zero-copy networking withkernel bypass. With this capability, applications, including SMB, can perform data transfersdirectly from memory, through the adapter, to the network, and then to the memory of theapplication requesting data from the file share.

    30. Resource metering

    Hyper-V in Windows Server 2012 R2 helps providers build a multitenant environment in whichvirtual machines can be served to multiple clients in a more isolated way. Because a single clientmay have many virtual machines, aggregation of resource use data can be a challenging task.However, Windows Server 2012 R2 simplifies this task by using resource pools, a Hyper-Vfeature that allows for resource metering. Resource pools are logical containers that collect theresources of the virtual machines that belong to one client, permitting single-point querying of theclients overall resource use. Resource Metering in Windows Ser ver 2012 R2 can measure andtrack a series of important data points, including the following: The average CPU, in megahertz, used by a virtual machine over a period of time.

    The average physical memory, in megabytes, used by a virtual machine over a period of time.

    The lowest amount of physical memory, in megabytes, assigned to a virtual machine over a period of time.

    The highest amount of physical memory, in megabytes, assigned to a virtual machine over a period of time.

    The highest amount o f disk space capacity, in megabytes, allocated to a virtual machine over a

    period of time. The total incoming network traffic, in megabytes, for a virtual network adapter over a period oftime.

    The total outgoing network traffic, in megabytes, for a virtual network adapter over a period oftime

  • 8/13/2019 Notes for 74-409 Microsoft exam

    5/71

    31. Cluster shared volume: you can create a Cluster Shared Volume on virtually any iSCSI or FibreChannel accessible storage device. This can include a SAN, a physical NAS appliance or even aserver that is configured to act as a shared storage device.

    32. Storage QoS is a new feature in Windows Server 2012 R2 that allows you to restrict diskthroughput for overactive or disruptive virtual machines and can be configured dynamically whilethe virtual machine is running. For maximum bandwidth applications, it provides strict policies tothrottle IO to a given virtual machine to a maximum IO threshold. For minimum bandwidthapplications, it provides policies for threshold warnings that alert of an IO starved VM when the

    bandwidth does not meet the minimum threshold.33. Moving of Virtual machines:

    Hyper-V gives you three different options including: Move the Virtual Machines Data to a Single Location This option placesall of the virtual machine components into a single location. Move the Virtual Machines Data by Selecting Where to Move Each Item This option gives you the most flexibility because it allows you to controlwhere each virtual machine component will be placed. This is usuallythe option that you will use when performing cluster-to-standalonehost migrations. Move Only the Virtual Machine This option moves the virtual machineitself to a new host, but leaves the Virtual Hard Disk in its original locationon the Cluster Shared Volume.

  • 8/13/2019 Notes for 74-409 Microsoft exam

    6/71

  • 8/13/2019 Notes for 74-409 Microsoft exam

    7/71

    When you move the virtual machine storage, the third option in the above will changed to move

    only the virtual machine hard disk

    34. While creating failover cluster, You can select multiple network adapters, but as a best practiceyou should reserve a network adapter for management traffic and reserve an adapter for clustercommunications (such as cluster heartbeats and live migration traffic).

    35. Failover clustering requirements:

    Cluster name The configuration process requires that a unique name be assigned to thecluster. The name you choose should be different from any of the computer names that are usedwithin your Active Directory.

  • 8/13/2019 Notes for 74-409 Microsoft exam

    8/71

    Cluster node hardware Another important consideration is the cluster nodes themselves. Thenodes do not have to use identical hardware, but they should all use the same CPU architectureand ideally they should be equipped with comparable amounts of memory

    Domain membership Domain membership isnt an absolute requirement for cluster nodes, but the configuration process is a lot easier if all of the cluster nodes are members of a commonActive Directory domain. Domain membership allows Kerberos authentication to be used.

    Node names Just as the cluster requires a cluster name, each cluster node requires a uniquecomputer name

    Network adapters Hyper-V is very flexible in terms of the network adapter requirements forcluster nodes. However, it is generally recommended that each cluster node have a minimum ofthree network adapters. You should reserve one adapter should be reserved for managementtraffic and another adapter for cluster traffic. The third (and any additional adapters) are used forvirtual machine traffic.

    Node IP addresses As a best practice, you should assign a static IP address to each clusternodes management NIC. However, you will also need to decide how you want to handle IPaddress assignment for the other NICs.

    Cluster IP address In addition to the IP addresses assigned to physical NICs you must assigna static IP address to the cluster. This IP address is used to communicate with the cluster as awhole rather than with an individual cluster node.

    36. What are server roles, role services, and features?

    This section defines the terms role , role service , and feature as they apply to WindowsServer 2008 R2.

    Roles A server role is a set of software programs that, when they are installed and properlyconfigured, lets a computer perform a specific function for multiple users or other computerswithin a network. Generally, roles share the following characteristics.

    They describe the primary function, purpose, or use of a computer. A specific computer can bededicated to perform a single role that is heavily used in the enterprise, or may perform multipleroles if each role is only lightly used in the enterprise.

    They provide users throughout an organization access to resources managed by other computers,such as Web sites, printers, or files that are stored on different computers.

    They typically include their own databases that can queue user or computer requests, or recordinformation about network users and computers that relates to the role. For example, ActiveDirectory Domain Services includes a database for storing the names and hierarchicalrelationships of all computers in a network.

    As soon as they are properly installed and configured, roles function automatically. This allowsthe computers on which they are installed to perform prescribed tasks with limited usercommands or supervision.

    Role services Role services are software programs that provide the functionality of a role. Whenyou install a role, you can choose which role services the role provides for other users andcomputers in your enterprise. Some roles, such as DNS Server, have only a single function, andtherefore do not have available role services. Other roles, such as Remote Desktop Services, have

  • 8/13/2019 Notes for 74-409 Microsoft exam

    9/71

    several role services that can be installed, depending on the remote computing needs of yourenterprise.

    You can consider a role as a grouping of closely related, complementary role services, for which,most of the time, installing the role means installing one or more of its role services.

    Features

    Features are software programs that, although they are not directly parts of roles, can support oraugment the functionality of one or more roles, or improve the functionality of the server,regardless of which roles are installed. For example, the Failover Clustering feature augments thefunctionality of other roles, such as File Services and DHCP Server, by allowing them to joinserver clusters for increased redundancy and improved performance. Another feature, TelnetClient, lets you communicate remotely with a telnet server over a network connection, afunctionality that enhances the communication options of the server.

    37. In Hyper V installation Allow this Server to Send and Receive Live Migrations of VirtualMachines

    Select the authentication protocol to be used by live migration traffic. If the clusternodes reside in the same Active Directory domain, then you should use the Kerberos protocol.Kerberos is more secure than CredSSP and the configuration process is easier using the DiskManagement Console to provision a storage array will work in Windows Server 2012, but thatmethod is primarily suited for volumes that are stored on legacy versions of Windows Server. If astorage volume is stored on Windows Server 2012, Microsoft recommends using a new featurecalled Windows Storage Spaces. The main benefits to using Windows Storage Spaces instead ofthe Disk Management Console include:

    Volumes created using Windows Storage Spaces can be thin provisioned. You can add additional physical disk space as needed. You can choose the type of redundancy that is most beneficial. Storage resources can be provisioned much more quickly than they can through the DiskManagement Console.

    38. The first step in the process of configuring Windows Storage Spaces is to create a storage pool. Astorage pool is a collection of physical disks that act as a pool of storage resources. After thestorage pool is created, the next step is to create a virtual disk within the storage pool. This virtualdisk will act as a repository for the virtual machine components that will be stored within theCluster Shared Volume. Fixed size provisioning delivers better performance, but thin

    provisioning is more flexible and makes more efficient use of storage space.

    39. Microsoft supported configuring Windows Server 2008 R2 as an iSCSI target, but doing sorequired you to download an additional component. In Windows Server 2012, the iSCSI targetsoftware is built into the operating system, so there is nothing extra to download

    40. Most settings can be configured only if turned off Adding or removing hardware componentsConfiguring memory, processor, disk settings Few settings are configurable while virtualmachine is running Connecting a network adapter to a virtual switchAdding a virtual hard disk to a SCSI controller Enable or disable Integration Services

    41. What Is Smart Paging? Memory Management technique that uses physical disk resources astemporary memory Ensures that a virtual machine can always restart Used during virtual machine

  • 8/13/2019 Notes for 74-409 Microsoft exam

    10/71

    restart only If Hyper-V is low on memory, and The virtual machine has more startup thanminimum RAM, and Memory cannot be reclaimed from other virtual machines Temporarilydegrades virtual machine performance Used only for a limited time, and then removed Not usedwhen a virtual machine started from the Off state Virtual machine operating system paging isalways preferred

    42. Integration Services Makes a guest operating system aware that it is running on a virtualmachine Many operating systems include integration services

    o Install the latest integration serviceso VMBus and synthetic devices supporto Time synchronization, mouse release, VSSo Managed as virtual machine settings

    43. Only Performance Monitor can monitor Hyper-V. Many Hyper-V performance objects addedOther tools monitor only their virtual environment Parent partition is also considered a virtualmachine

    44. Virtual machine tools monitor the virtual environment

    45. Heavy utilization in virtual machine does not mean that Hyper-V host is heavy utilized (and viceversa)

    46. NUMA non uniform memory access. Non-uniform memory access (NUMA ) is a computermemory design used in multiprocessing , where the memory access time depends on the memorylocation relative to a processor. Under NUMA, a processor can access its own local memoryfaster than non-local memory (memory local to another processor or memory shared between

    processors). The benefits of NUMA are limited to particular workloads, notably on servers wherethe data are often associated strongly with certain tasks or users.

    NUMA architectures logically follow in scaling from symmetric multiprocessing (SMP)architectures. They were developed commercially during the 1990s by Burroughs (later Unisys ),Convex Computer (later Hewlett-Packard ), Honeywell Information Systems Italy (HISI) (laterGroupe Bull ), Silicon Graphics (later Silicon Graphics International ), Sequent Computer Systems (later IBM ), Data General (later EMC ), and Digital (later Compaq , now HP). Techniquesdeveloped by these companies later featured in a variety of Unix-like operating systems , and to anextent in Windows NT .

    47. Layer 2 switching uses the media access control address (MAC address) from the host's networkinterface cards (NICs) to decide where to forward frames. Layer 2 switching is hardware based ,[1]

    which means switches use application-specific integrated circuit (ASICs) to build and maintainfilter tables (also known as MAC address tables or CAM tables ). One way to think of a layer 2switch is as a multiport bridge .

    48. Layer 2 switching provides the following

    Hardware-based bridging (MAC) Wire speed High speed

    http://en.wikipedia.org/wiki/Computer_storagehttp://en.wikipedia.org/wiki/Computer_storagehttp://en.wikipedia.org/wiki/Computer_storagehttp://en.wikipedia.org/wiki/Computer_storagehttp://en.wikipedia.org/wiki/Multiprocessinghttp://en.wikipedia.org/wiki/Multiprocessinghttp://en.wikipedia.org/wiki/Multiprocessinghttp://en.wikipedia.org/wiki/Symmetric_multiprocessinghttp://en.wikipedia.org/wiki/Symmetric_multiprocessinghttp://en.wikipedia.org/wiki/Symmetric_multiprocessinghttp://en.wikipedia.org/wiki/Burroughs_large_systemshttp://en.wikipedia.org/wiki/Burroughs_large_systemshttp://en.wikipedia.org/wiki/Burroughs_large_systemshttp://en.wikipedia.org/wiki/Unisyshttp://en.wikipedia.org/wiki/Unisyshttp://en.wikipedia.org/wiki/Unisyshttp://en.wikipedia.org/wiki/Convex_Computerhttp://en.wikipedia.org/wiki/Convex_Computerhttp://en.wikipedia.org/wiki/Hewlett-Packardhttp://en.wikipedia.org/wiki/Hewlett-Packardhttp://en.wikipedia.org/wiki/Hewlett-Packardhttp://en.wikipedia.org/wiki/Honeywellhttp://en.wikipedia.org/wiki/Honeywellhttp://en.wikipedia.org/wiki/Honeywellhttp://en.wikipedia.org/wiki/Groupe_Bullhttp://en.wikipedia.org/wiki/Groupe_Bullhttp://en.wikipedia.org/wiki/Silicon_Graphicshttp://en.wikipedia.org/wiki/Silicon_Graphicshttp://en.wikipedia.org/wiki/Silicon_Graphicshttp://en.wikipedia.org/wiki/Silicon_Graphics_Internationalhttp://en.wikipedia.org/wiki/Silicon_Graphics_Internationalhttp://en.wikipedia.org/wiki/Silicon_Graphics_Internationalhttp://en.wikipedia.org/wiki/Sequent_Computer_Systemshttp://en.wikipedia.org/wiki/Sequent_Computer_Systemshttp://en.wikipedia.org/wiki/Sequent_Computer_Systemshttp://en.wikipedia.org/wiki/IBMhttp://en.wikipedia.org/wiki/IBMhttp://en.wikipedia.org/wiki/IBMhttp://en.wikipedia.org/wiki/Data_Generalhttp://en.wikipedia.org/wiki/Data_Generalhttp://en.wikipedia.org/wiki/Data_Generalhttp://en.wikipedia.org/wiki/EMC_Corporationhttp://en.wikipedia.org/wiki/EMC_Corporationhttp://en.wikipedia.org/wiki/EMC_Corporationhttp://en.wikipedia.org/wiki/Digital_Equipment_Corporationhttp://en.wikipedia.org/wiki/Digital_Equipment_Corporationhttp://en.wikipedia.org/wiki/Digital_Equipment_Corporationhttp://en.wikipedia.org/wiki/Compaqhttp://en.wikipedia.org/wiki/Compaqhttp://en.wikipedia.org/wiki/Compaqhttp://en.wikipedia.org/wiki/HPhttp://en.wikipedia.org/wiki/HPhttp://en.wikipedia.org/wiki/HPhttp://en.wikipedia.org/wiki/Unix-likehttp://en.wikipedia.org/wiki/Unix-likehttp://en.wikipedia.org/wiki/Operating_systemhttp://en.wikipedia.org/wiki/Operating_systemhttp://en.wikipedia.org/wiki/Operating_systemhttp://en.wikipedia.org/wiki/Windows_NThttp://en.wikipedia.org/wiki/Windows_NThttp://en.wikipedia.org/wiki/Windows_NThttp://en.wikipedia.org/wiki/Data_Link_Layerhttp://en.wikipedia.org/wiki/Data_Link_Layerhttp://en.wikipedia.org/wiki/Media_access_control_addresshttp://en.wikipedia.org/wiki/Network_cardhttp://en.wikipedia.org/wiki/Network_cardhttp://en.wikipedia.org/wiki/LAN_switching#cite_note-1http://en.wikipedia.org/wiki/LAN_switching#cite_note-1http://en.wikipedia.org/wiki/LAN_switching#cite_note-1http://en.wikipedia.org/wiki/Application-specific_integrated_circuithttp://en.wikipedia.org/wiki/Application-specific_integrated_circuithttp://en.wikipedia.org/wiki/Application-specific_integrated_circuithttp://en.wikipedia.org/wiki/CAM_Tablehttp://en.wikipedia.org/wiki/CAM_Tablehttp://en.wikipedia.org/wiki/CAM_Tablehttp://en.wikipedia.org/wiki/Network_bridgehttp://en.wikipedia.org/wiki/Network_bridgehttp://en.wikipedia.org/wiki/Network_bridgehttp://en.wikipedia.org/wiki/Network_bridgehttp://en.wikipedia.org/wiki/CAM_Tablehttp://en.wikipedia.org/wiki/Application-specific_integrated_circuithttp://en.wikipedia.org/wiki/LAN_switching#cite_note-1http://en.wikipedia.org/wiki/Network_cardhttp://en.wikipedia.org/wiki/Network_cardhttp://en.wikipedia.org/wiki/Media_access_control_addresshttp://en.wikipedia.org/wiki/Data_Link_Layerhttp://en.wikipedia.org/wiki/Windows_NThttp://en.wikipedia.org/wiki/Operating_systemhttp://en.wikipedia.org/wiki/Unix-likehttp://en.wikipedia.org/wiki/HPhttp://en.wikipedia.org/wiki/Compaqhttp://en.wikipedia.org/wiki/Digital_Equipment_Corporationhttp://en.wikipedia.org/wiki/EMC_Corporationhttp://en.wikipedia.org/wiki/Data_Generalhttp://en.wikipedia.org/wiki/IBMhttp://en.wikipedia.org/wiki/Sequent_Computer_Systemshttp://en.wikipedia.org/wiki/Silicon_Graphics_Internationalhttp://en.wikipedia.org/wiki/Silicon_Graphicshttp://en.wikipedia.org/wiki/Groupe_Bullhttp://en.wikipedia.org/wiki/Honeywellhttp://en.wikipedia.org/wiki/Hewlett-Packardhttp://en.wikipedia.org/wiki/Convex_Computerhttp://en.wikipedia.org/wiki/Unisyshttp://en.wikipedia.org/wiki/Burroughs_large_systemshttp://en.wikipedia.org/wiki/Symmetric_multiprocessinghttp://en.wikipedia.org/wiki/Multiprocessinghttp://en.wikipedia.org/wiki/Computer_storagehttp://en.wikipedia.org/wiki/Computer_storage
  • 8/13/2019 Notes for 74-409 Microsoft exam

    11/71

  • 8/13/2019 Notes for 74-409 Microsoft exam

    12/71

    CSV, clustered roles can fail over quickly from one node to another node without requiring achange in drive ownership, or dismounting and remounting a volume. CSV also help simplify themanagement of a potentially large number of LUNs in a failover cluster.

    57. CSV provide a general-purpose, clustered file system, which is layered above NTFS (or ReFS inWindows Server 2012 R2). CSV applications include:

    Clustered virtual hard disk (VHD) files for clustered Hyper-V virtual machines

    Scale-out file shares to store application data for the Scale-Out File Server clustered role.Examples of the application data for this role include Hyper-V virtual machine files andMicrosoft SQL Server data. (Be aware that ReFS is not supported for a Scale-Out FileServer.) For more information about Scale-Out File Server, see Scale-Out File Server forApplication Data Overview

    58. What Is Offloaded Data Transfer? In Traditional data copy model Server issues read request toSAN, Data is read and transferred into memory and Data is transferred and written from memoryto SAN. Issues: CPU and memory utilization, increased traffic,Offload-enabled data copy model- Server issues read request and SAN returns token, Serverissues write request to SAN using token, SAN completes data copy and confirms completion,Benefits: Increased performance, reduced utilization. SAN must support Offloaded Data Transfer

    59. differencing disk is a virtual hard disk you use to isolate changes to a virtual hard disk or theguest operating system by storing them in a separate file. A differencing disk is similar to theUndo Disks feature because both offer a way to isolate changes in case you want to reverse them.However, Undo Disks is associated with a virtual machine and all disks assigned to it, while adifferencing disk is associated only with one disk. In addition, Undo Disks is intended to be ashorter-term method of isolating changes. For more information, see Using Undo Disks .

    60. A differencing disk is associated with another virtual hard disk that you select when you createthe differencing disk. This means that the disk to which you want to associate the differencingdisk must exist first. This virtual hard disk is called the "parent" disk and the differencing disk isthe "child" disk. The parent disk can be any type of virtual hard disk. The differencing disk storesall changes that would otherwise be made to the parent disk if the differencing disk was not beingused. The differencing disk provides an ongoing way to save changes without altering the parentdisk. You can use the differencing disk to store changes indefinitely, as long as there is enoughspace on the physical disk where the differencing disk is stored. The differencing disk expandsdynamically as data is written to it and can grow as large as the maximum size allocated for the

    parent disk when the parent disk was created.

    61. Emulated hardware is a software construct that the hypervisor presents to the virtual machine asthough it were actual hardware. This software component implements a unified least-common-denominator set of instructions that are universal to all devices of that type. This all butguarantees that it will be usable by almost any operating system, even those that Hyper-V Serverdoes not directly support. These devices can be seen even in minimalist pre-boot executionenvironments, which is why you can use a legacy network adapter for PXE functions and can

    boot from a disk on an IDE controller.

    http://technet.microsoft.com/en-us/library/hh831349.aspxhttp://technet.microsoft.com/en-us/library/hh831349.aspxhttp://technet.microsoft.com/en-us/library/hh831349.aspxhttp://technet.microsoft.com/en-us/library/hh831349.aspxhttp://technet.microsoft.com/en-us/library/cc720325(v=ws.10).aspxhttp://technet.microsoft.com/en-us/library/cc720325(v=ws.10).aspxhttp://technet.microsoft.com/en-us/library/cc720325(v=ws.10).aspxhttp://technet.microsoft.com/en-us/library/cc720325(v=ws.10).aspxhttp://technet.microsoft.com/en-us/library/hh831349.aspxhttp://technet.microsoft.com/en-us/library/hh831349.aspx
  • 8/13/2019 Notes for 74-409 Microsoft exam

    13/71

    The drawback is that it can be computationally expensive and therefore slow to operate. Thesoftware component is a complete representation of a hardware device, which includes the needfor IRQ and memory I/O operations. Within the virtual machine, all the translation you see in theabove images occurs. Once the virtual CPU has converted the VMs communication into thatmeant for the device, it is passed over to the construct that Hyper-V has. Hyper-V must then

    perform the exact same functions to interact with the real hardware. All of this happens in reverseas the device sends data back to the drivers and applications within the virtual machine.

    62. Synthetic hardware is different from emulated hardware in that Hyper-V does not create asoftware construct to masquerade as a physical device. Instead, it uses a similar technique to theWindows HAL and presents an interface that functions more closely to the driver model. Theguest still needs to send instructions through its virtual CPU, but its able to use the driver modelto pass these communications directly up into Hyper-V through the VMBus. The VMBus driver,and the drivers that are dependent on it, must be loaded in order for the guest to be able to use thesynthetic hardware at all. This is why synthetic and SCSI devices cannot be used prior toWindows startup.

    63. SR-IOV (single root i/o virtualization) eliminates the need for the hypervisor to perform asintermediary at all. They expose virtual functions , which are unique pathways to communicatewith a hardware device. So, a virtual function is assigned to a specific virtual machine; the virtualmachine manifests that as a device. No other device or computer system, whether in the hostcomputer or inside that virtual machine, can use that virtual function at all. Whereas all traditionalvirtualization requires the hypervisor to manage resource sharing, SR-IOV is an agreement

    between the hardware and software to use any given virtual function for one and exactly one purpose.

    64. UEFI (Unified Extensible Firmware Interface) is a standard firmware interface for PCs, designedto replace BIOS (basic input/output system). This standard was created by over 140 technology

    companies as part of the UEFI consortium, including Microsoft. It's designed to improve softwareinteroperability and address limitations of BIOS. Some advantages of UEFI firmware include:

    Better security by helping to protect the pre-startup or pre-boot process against bootkit attacks.

    Faster startup times and resuming from hibernation.

    Support for drives larger than 2.2 terabytes (TB).

    Support for modern, 64-bit firmware device drivers that the system can use to address more than17.2 billion gigabytes (GB) of memory during startup.

    Capabililty to use BIOS with UEFI hardware.

    65. In Generation 2 emulated devices are removed

    66. N_Port ID virtualization (NPIV) is a technology that defines how multiple virtual servers canshare a single physical Fibre Channel port identification (ID). NPIV allows a single host busadaptor (HBA ) or target port on a storage array to register multiple World Wide Port Names(WWPNs) and N_Port identification numbers. This allows each virtual server to present a

    http://searchnetworking.techtarget.com/definition/virtual-serverhttp://searchnetworking.techtarget.com/definition/virtual-serverhttp://searchnetworking.techtarget.com/definition/virtual-serverhttp://searchstorage.techtarget.com/definition/Fibre-Channelhttp://searchstorage.techtarget.com/definition/Fibre-Channelhttp://searchstorage.techtarget.com/definition/Fibre-Channelhttp://searchstorage.techtarget.com/definition/host-bus-adapterhttp://searchstorage.techtarget.com/definition/host-bus-adapterhttp://searchstorage.techtarget.com/definition/host-bus-adapterhttp://searchstorage.techtarget.com/definition/arrayhttp://searchstorage.techtarget.com/definition/arrayhttp://searchstorage.techtarget.com/definition/arrayhttp://searchnetworking.techtarget.com/definition/virtual-serverhttp://searchnetworking.techtarget.com/definition/virtual-serverhttp://searchnetworking.techtarget.com/definition/virtual-serverhttp://searchnetworking.techtarget.com/definition/virtual-serverhttp://searchstorage.techtarget.com/definition/arrayhttp://searchstorage.techtarget.com/definition/host-bus-adapterhttp://searchstorage.techtarget.com/definition/Fibre-Channelhttp://searchnetworking.techtarget.com/definition/virtual-server
  • 8/13/2019 Notes for 74-409 Microsoft exam

    14/71

    different world wide name to the storage area network (SAN ), which in turn means that eachvirtual server will see its own storage -- but no other virtual server's storage.

    67. Virtual Machine Connection is a tool that you can use to connect to the virtual machines that runon a local or remote server.

    o Connects to virtual machines on local and remote Hyper-Vo Port 2179 used (can be modified in the registry)o Connection allowed by Windows Firewallo Installed as part of Hyper-V role or RSAT feature

    68. Virtual switch: Parent has physical network adapter(s) Each virtual machine (and parent) has virtual network adapter(s) Each virtual network adapter is connected to a virtual switch Type of virtual switch is: External connects to a physical or wireless adapter Internal parent and virtual machine connections only Private virtual machine connections only

    69. Availability

    70. Windows Server 2012 Hyper-V Role introduces a new capability, Hyper-V Replica, as a built-inreplication mechanism at a virtual machine (VM) level. Hyper-V Replica can asynchronouslyreplicate a selected VM running at a primary site to a designated replica site across LAN/WAN.The following schematic presents this concept. Here both a primary site and a replica site areWindows Server 2012 Hyper-V hosts where a primary site runs production or the so-called

    primary VMs, while a replica site is standing by with replicated VMs off and to be brought online,should the primary site experiences a planned or unplanned VM outage. Hyper-V Replicarequires neither shared storage, nor a specific storage hardware. Once an initial copy is replicatedto a replica site and replication is ongoing, Hyper-V Replica will replicate only the changes of aconfigured primary VM, i.e. the deltas, asynchronously

    71. Hyper V replica

    http://searchstorage.techtarget.com/definition/storage-area-network-SANhttp://searchstorage.techtarget.com/definition/storage-area-network-SANhttp://searchstorage.techtarget.com/definition/storage-area-network-SANhttp://searchstorage.techtarget.com/definition/storage-area-network-SAN
  • 8/13/2019 Notes for 74-409 Microsoft exam

    15/71

    72. VLAN ID is Used to isolate network traffic for nodes that are connected to the same physical

    network. VLAN ID can be configured on Virtual machine network adapter External and Internalvirtual switch

    73. Virtual Machine Moving Options Virtual machine and storage migration Includes from Windows Server 2012 to Windows Server 2012 R2 Quick migration requires failover clustering Live migration requires only network connectivity Improved performance in Windows Server 2012 R2 Hyper-V Replica

    74. Asynchronously replicate virtual machines- Configure replication frequency and extended replication Exporting and Importing of a virtual machine Exporting while virtual machine is running Can import virtual machine without prior export

  • 8/13/2019 Notes for 74-409 Microsoft exam

    16/71

    75. Hyper-V Replica has the following components: Replication engine

    o Manages replication configuration and handles initial replication, delta replication,failover, and test-failover

    o Change tracking module

    o Keeps track of the write operations in the virtual machine Network moduleo Provides a secure and efficient channel to transfer data

    Hyper-V Replica Broker server roleo Provides seamless replication while a virtual machine is running on different failover

    cluster nodes Management tools

    o Hyper-V Manager, Windows PowerShell, Failover Cluster Manager

    76. Failover Failover

    o Initiated at replica virtual machineo Primary virtual machine has failed (turned off or unavailable)o Data loss can occuro Reverse the replication after primary site is recovered

    Test failovero Non-disruptive testing, with zero downtimeo New virtual machine created in recovery siteo From the replica checkpointo Turned off and not connectedo Stop Test Failover

    Planned failover

    Initiated at primary virtual machine which is turned off Sends data that has not been replicated Fail over to replica server Start the replica virtual machine Reverse the replication after primary site is restored

    77. Failover cluster Shared storage using SMB, iSCSI, Fibre Channel, Fibre Channel over Ethernet(FCoE) or Serial-Attached SCSI (SAS)

    78. SMB Share Applications profile should be used when No access-based enumeration or share

    caching

    79. Using Virtual Hard Disk Sharing as Shared Storage A failover cluster runs inside virtual machines A shared virtual disk used as a shared storage

    o Virtual machines do not need access to iSCSI or FC SANo Presented as virtual SAS disk

  • 8/13/2019 Notes for 74-409 Microsoft exam

    17/71

    o Can be used only for data Requirements for shared virtual disk

    o Virtual hard disk must be in .vhdx formato Connected by using a virtual SCSI adaptero Stored on a scale-out file server or CSV

    Supported operating systems in a virtual machineo Windows Server 2012 or Windows Server 2012 R2

    80. Preferred owners Virtual machine will start on preferred Hyper-V host Start on possible owner only preferred owners are unavailable If preferred and possible owners are unavailable, virtual machine will move to other failover

    cluster node, but not startApp Controller: Replaces the now deprecated VMM self-service portal

    81. Host Groups?

    Allows collective management of physical hostso Can nest host groups: Parent-Child inheritance applies

    Configurable properties include:o Naming & moving group, allow unencrypted file transferso Placement rules: Virtual machine must, should, must not or should not match the hosto Host reserves: Can reserve various resources for host alone

    Includes CPU, Memory, Disk I/O and space, Network I/Oo Dynamic optimization for determining vm load

    Resource default: CPU 30%, RAM 512MB, Disk I/O 0% Power optimization included

    o Network: Can assign varied network resources: IP pools, load balancers, logical networks

    & MAC poolso Storage: Can assign storage pools and logical units resources

    82. Operations Manager provides: Application monitoring in both the private and public clouds Dashboards Health monitoring Alerts Agent and agentless monitoring Fabric monitoring

    83. With Service Manager, you can: Implement service management, as defined in the ITIL and the Microsoft Operations Framework Use the built-in process management packs to provide processes for:

    o Defining templates and workflowso Implementing change requests and change request templateso Manually designing activity templateso Enforcing compliance

  • 8/13/2019 Notes for 74-409 Microsoft exam

    18/71

    84. Orchestrator provides the ability to: Automate processes across systems, platforms, and cloud services Automate best practices Connect different systems from different vendors Implement built-in integration packs

    Implement end-to-end automation across multiple System Center products

    85. Storage solution implementing block storage Implementing Fibre Storage Virtual Fibre Channel Adapters Implementing iSCSI Storage

    86. Storage solution implementing file storage SMB 3.0:o Enables virtual machine storage on SMB 3.0 file shareso Requires Windows Server 2012 file serverso Requires fast network connectivityo Provide redundancy and performance benefits

    NFS:o Enables you can use NFS Shares to deploy VMware to virtual machines

    87. Snapshots. With this method, the SAN creates a writable snapshot of an existing logical unitCloning. With this method, the SAN creates an independent copy of an existent logical unit

    88. You can integrate VMM and Windows Server Update Server (WSUS) to provide scanning andcompliance of your virtualization infrastructure

    An update baseline is a set of required updates assigned to a scope of infrastructure servers withinthe private cloud

    If you move a host or host cluster to a new host group, the object will inherit the baselineassociated with the target host group

    If you assign a baseline specifically to a standalone host or host cluster, the baseline will stay withthe object when it moves from one host group to another

    89. When integrating WSUS and VMM:

    You must have WSUS 3.0 SP2 x64 or newer You should limit languages, products, and classifications in WSUS Integration with Configuration Manager is possible, if WSUS server is managed by Configuration

    Manager Also use reporting capabilities for compliance information

    90. SMB 3.0:

  • 8/13/2019 Notes for 74-409 Microsoft exam

    19/71

    Enables virtual machine storage on SMB 3.0 file shares Requires Windows Server 2012 file servers

    91. Virtual Machine Manager Library? Hosted on Library servers Stores resources used to create virtual machines

    Catalog of stored resourceso Some resources stored in VMM database

    Contains templates and profiles Contains library shares

    o Shared folders on the Library serverso Can be organized into subfolderso Indexed for quick retrieval

    Data deduplicationo Variable chunkingo Compression of primary data to other storage areas

    92. Virtual machine manager library is hosted on the library servers and stores resources used tocreate virtual machine

    93. Library stored resources include: File-based resources answer and driver files, virtual floppy and hard drives, ISO images,

    Windows PowerShell and SQL Server scripts, web deployment, and SQL DAC files Virtual machines templates and profiles Equivalent objects Cloud library Self-service user content Orphaned resources Updated catalogs and baselines Stored virtual machines and services

    94. Library servers can be associated with particular host groups

    95. Considerations for Highly Available Library Servers

    VMM management servers cannot be on the same cluster as library servers1. When a cluster fails over, library shares on it go offline until the cluster comes back up2. The SQL Server running the VMM database should also be clustered3. As an alternative to failover clustering, you can add more library servers4. VMM library servers do not replicate files

    o Manually copy files using robocopy or another similar utility

    96. data deduplication is a specialized data compression technique for eliminating duplicate copiesof repeating data. Related and somewhat synonymous terms are intelligent (data) compression

    http://en.wikipedia.org/wiki/Data_compressionhttp://en.wikipedia.org/wiki/Data_compressionhttp://en.wikipedia.org/wiki/Data_compressionhttp://en.wikipedia.org/wiki/Data_compression
  • 8/13/2019 Notes for 74-409 Microsoft exam

    20/71

    and single-instance (data) storage . This technique is used to improve storage utilization and canalso be applied to network data transfers to reduce the number of bytes that must be sent. In thededuplication process, unique chunks of data, or byte patterns, are identified and stored during a

    process of analysis. As the analysis continues, other chunks are compared to the stored copy andwhenever a match occurs, the redundant chunk is replaced with a small reference that points tothe stored chunk. Given that the same byte pattern may occur dozens, hundreds, or eventhousands of times (the match frequency is dependent on the chunk size), the amount of data thatmust be stored or transferred can be greatly reduced .[1]

    5. This type of deduplication is different from that performed by standard file-compression tools,such as LZ77 and LZ78 . Whereas these tools identify short repeated substrings inside individualfiles, the intent of storage-based data deduplication is to inspect large volumes of data andidentify large sections such as entire files or large sections of files that are identical, in orderto store only one copy of it. This copy may be additionally compressed by single-file compressiontechniques. For example a typical email system might contain 100 instances of the same 1 MB(megabyte ) file attachment. Each time the email platform is backed up, all 100 instances of theattachment are saved, requiring 100 MB storage space. With data deduplication, only oneinstance of the attachment is actually stored; the subsequent instances are referenced back to thesaved copy for deduplication ratio of roughly 100 to 1.

    97. Virtual machine checkpointa. Checkpoint creates .avhd/.avhdx file

    b. A non-checkpointed .vhd/.vhdxc. All subsequent changes are written to the .avhd/.avhdx filed. When reverted, the and .avhd/.avhdx file is deleted

    98. Virtual Machine Cloning? a. Rapid way to deploy a virtual machine

    b. Makes copy of the .vhd/.vhdx, configuration files, and memory contents

    c. Original can be online if using System Center 2012 R2 Virtual Machine Managerd. Cloned virtual machine is an exact copy with the same identitye. The cloned virtual machine has the same name and domain SID of the original virtual

    machinef. After cloning, run Sysprep, or manually change to unique settings and valuesg. Ensure sufficient disk space exists on host

    99. Virtual machine conversiona. Convert Citrix XenServer virtual machines to Hyper-V via a P2V conversion

    b. Virtual-to-virtual machine conversion supports converting:i. In System Center 2012 VMM

    1. ESX/ESXi 3.5 Update 52. ESX/ESXi 4.03. ESX/ESXi 4.14. ESXi 5.1

    ii. In System Center 2012 SP1 VMM and System Center 2012 R2 VMM1. ESX/ESXi 4.12. ESXi 5.1

    100. Types of cloud

    http://en.wikipedia.org/wiki/Single-instance_storagehttp://en.wikipedia.org/wiki/Single-instance_storagehttp://en.wikipedia.org/wiki/Single-instance_storagehttp://en.wikipedia.org/wiki/Data_deduplication#cite_note-1http://en.wikipedia.org/wiki/Data_deduplication#cite_note-1http://en.wikipedia.org/wiki/Data_deduplication#cite_note-1http://en.wikipedia.org/wiki/LZ77_and_LZ78http://en.wikipedia.org/wiki/LZ77_and_LZ78http://en.wikipedia.org/wiki/LZ77_and_LZ78http://en.wikipedia.org/wiki/Megabytehttp://en.wikipedia.org/wiki/Megabytehttp://en.wikipedia.org/wiki/Megabytehttp://en.wikipedia.org/wiki/Emailhttp://en.wikipedia.org/wiki/Emailhttp://en.wikipedia.org/wiki/Emailhttp://en.wikipedia.org/wiki/Emailhttp://en.wikipedia.org/wiki/Megabytehttp://en.wikipedia.org/wiki/LZ77_and_LZ78http://en.wikipedia.org/wiki/Data_deduplication#cite_note-1http://en.wikipedia.org/wiki/Single-instance_storage
  • 8/13/2019 Notes for 74-409 Microsoft exam

    21/71

    101. Windows 2012 networking

    102. Manageability comparison

  • 8/13/2019 Notes for 74-409 Microsoft exam

    22/71

    103. Hardware requirements for Hyper-v installationHyper V, however, is only available on the 64 bit editions of Windows Server. The CPU musthave the necessary virtualization extensions available and turned on in the BIOS. Both the major

    processor manufacturers (Intel and AMD) have CPUs with these extensions available. In addition,the CPU must support hardware enforced Data Execution Prevention, or DEP. For Intel

    processors, this requires enabling the XD bit; for AMD processors it is the NX bit.

    104. Hyper V requires a minimum of two physical network adapters: one for hypervisor

    management and one for VM to network connectivity. If you plan to cluster your devices, installa third adapter

    105. Server Core is a minimal installation of Windows Server 2008, with only thoseapplications and services required for operation.

    106. Hyper V is installed as a role. (A role is a predefined function for a server, such as DNS,Active Directory Controller, or Hyper V.) Before you can install the Hyper V role, you mustinstall the Hyper V update packages for Windows Server 2008 (KB950050), as well as theLanguage Pack for Hyper V (KB951636). Hyper V v2 comes preinstalled in Server 2008 R2; yousimply have to enable it.

    107. Virtual networks

    a. Virtual networks allow the virtual machine to communicate with the rest of yournetwork, the host machine, and other virtual machines. With the Virtual NetworkManager, you can create the following types of virtual networks

    b. Private network allows a virtual machine to communicate only with another virtualmachine on the host.

  • 8/13/2019 Notes for 74-409 Microsoft exam

    23/71

    c. Internal network sets up communication between the host system and the virtualmachines on it.

    d. External network connects virtual machines and the host physical network. This allowsthe virtual machine to communicate on the same network as the host, operating as anyother node on the network.

    108. Virtual Machine Reserve and Virtual Machine Limita. refer to the amount of host resources reserved for the virtual machines exclusive us e and

    the maximum it can consume, respectively. Relative weight comes into play whenmultiple virtual machines are running on the same host and essentially gives a priorityvalue to each virtual machine

    109. The Automatic Stop Action cannot take place if the host machine is shut downunexpectedly.

    110. VMM not only consolidates the functionality built into Hyper V but also adds to it. WithVMM performing, physical to virtual (P2V) migrations are greatly simplified and can be donewithout service interruption. VMM will also convert your VMware machines to VHDs using asimilar technique called virtual to virtual transfers.

    111. VMM is not included with Windows Server 2008 unlike most of the products and must be purchased and licensed separately. VMM is available from the Microsoft Volume LicenseServices Web site

    112. VMM stores all the resources used in the creation of virtual machines in the VMMlibrary. Your enterprise must have at least one library server. In the default setup, each VMMserver contains a library server and share ( Figure 5.13 ). If you already have an existing libraryserver, point this VMM server to it.

    113. You cannot move or remove a library server or share once setup is complete. So givesome thought to where you place them before completing the installation.

    114. VMM Administrator Console. The Admin Console can be installed locally on the VMMserver for convenience when you are standing at the console. You can also install it on aworkstation, allowing you to administer your virtual environment right from your desktop

    115. There are two parameters you configure in the Host Properties window, Figure 5.31 . Thefirst sets one or more default virtual machine paths. VM paths are locations to store filesassociated with deployed virtual machines. Enter the paths you would like to set by clicking theAdd button after entering each one. There is also a Remove button if you make any mistakes. Thesecond parameter that can be set is the port used for remote connection to your VMs via VirtualMachine Remote Control. You can accept the default port or configure it to meet the security

    policies at your company.

    116. Virtual Machine Remote Control (VMRC) connections are made from within the VMMconsole by simply right clicking on the VM of choice and selecting Connect to virtual machine.VMRC provides you with remote access very similar to Remote Desktop; however, because it isgranted via the host, you can connect to a VM before the guest OS has booted

    117. Network binding selecting from the three types: private network, internal network, or physical network adapter. Private network allows the virtual machines to communicate with eachother, but not with the host. Internal network allows the VMs to talk to each other and with the

  • 8/13/2019 Notes for 74-409 Microsoft exam

    24/71

    host. You can further require that communication with the host be via a VLAN. SelectingPhysical network adapter binds the VMs to a physical NIC allowing them to communicate witheach other, the host, and other machines on your network. This is the same as the External settingin the Hyper V Manager

    118. There are two common types of clusters: fail over and load balanced. Fail over clustersconsist of a single node that typically handles all of the client requests, called the Primary node,and one or more nodes that are largely inactive unless the Primary node goes offline; these arecalled secondary nodes. In a load balanced cluster, all of the nodes participate actively in servingclient requests. In most cases, a load balanced cluster can also serve as a fail over cluster, sinceone or more nodes of the load balanced cluster can typically fail without the other nodes beingimpacted.

    119. In any cluster, two major challenges present themselves: determining the status of a nodemember (particularly in fail over clusters), and determining which node of a cluster currentlycontrols a clustered application and its data. The first challenge is met with a heartbeat network,which is typically a physically separate set of network cards that communicate a signal, orheartbeat, to determine the status of each node. Data ownership is tracked by a data partitioncalled the Quorum. The Quorum is a separate partition from the shared data, that also needs to beequally accessible to all nodes in a cluster. The quorum tracks which node is the owner of a givenset of applications or data.

  • 8/13/2019 Notes for 74-409 Microsoft exam

    25/71

    120. Virtual machines that have VHDs on the same shared disk are placed in the same Serviceor Application Group. If one virtual machine needs to be moved, then all of the virtual machinesin the same group will be moved if you are using Differencing Disks for your VHDs, they alsomust be stored on shared storage, in the same Application or Services group as the original parentdisk. As with the other situations above, failure to do so means the VM will not start up in a failover event The total amount of physical system memory is shared by all the virtual machines.Once allocated to a VM, the memory cannot be used by another VM.

    121. Dynamic VHD files start out small and grow up to the limit you assign. Hyper V willallow you to allocate more virtual disk space than physical space. Exercise caution whenoversubscribing your hard disk or you might run out of space at runtime. Oversubscribing the Cdrive is strongly discouraged for this reason.

    122. If your virtual machine does not automatically launch, you may have missed checking theStart the virtual machine after it is created box in the previous step. If so, skip to the next sectionConnecting to a Virtual Machine and Basic Hyper V Commands and follow the steps to startyour VM. Once it is running, return here.

    123. Note If your VM is running Windows Server 2008, you may be prompted to confirm youwant to upgrade a previous version of integration services. Windows Server 2008 was originally

    built with an integration services version that was compatible with the beta version of Hyper V. Ifyou see this prompt, click OK. Note If you receive an error at this point referring to not beingable to start the virtual machine, you may not have properly configured virtualization in the BIOSof the machine's motherboard. Consult your manufacturer's documentation for details.

    124. virtual machine template is an image of a virtual machine you can lever age to quicklycreate a new VM without stepping through the entire OS and application installation process.Using templates increases your agility when asked to standup a new environment. But perhapsmore impor tantly, it saves you time. There are many scenarios where a template can provevaluable. For example, you can create a template of each OS in use in your enterprise, completewith your standard applications already installed. Those standard applications might include yourantivirus prod uct, data backup software, or a monitoring agent.

    125. SYSPREP removes any unique values assigned to the instance of the OS duringinstallation. When SYSPREP finishes, your VM should shutdown and be ready for export.

    126. Virtual machine names in the Hyper V Manager are not tied to the name given to the VMfrom within its operating system. However, we strongly encourage you to keep these namessynchronized to reduce confusion whenever possible

    127. If you are planning to virtualize your Exchange environment, you must use ExchangeServer 2007 with Service Pack 1 or later. Earlier, Exchange versions are not fully supported on avirtual platform. The use of the Unified Messaging role is not supported if your Exchange serveris running within a virtual platform. It is important to note that the base Exchange 2007 systemrequirements WITHOUT the use of virtualization is Windows 2003, but the use of this operatingsystem as a host for Exchange 2007 is not supported in the virtualization world. We mention this

    because some may consider building Exchange 2007 in a nonvirtual environment with the plan tomigrate the complete operating system into Hyper V at a later date. If you plan to do this, you

  • 8/13/2019 Notes for 74-409 Microsoft exam

    26/71

    must build your environment using Windows 2008 or later Exchange 2007 on a virtual platformsupports all of the most common forms of storage. These include virtual hard drives (VHD),SCSI, and iSCSI storage. If you plan to use SCSI or iSCSI, you must configure it to be presentedas block level storage within the hardware virtualization software, and it must be dedicated to theExchange guest machine. Exchange 2007 does not support the use of network attached storage,

    but if the storage is attached at the host level, the guest will see it as local storage. Should you plan to use SCSI or iSCSI in your virtual Exchange environment, Hyper V only supports VHDsup to 2040 gigabytes (GB) in size, and virtual IDE drives up to 127 GB; plan accordingly.

    128. Use a synthetic network adapter provided by the Hyper V Integration tools instead of alegacy network adapter when configuring networking for the virtual machine. Avoid emulateddevices for SQL Server deployments when possible. These devices can result in significantlymore CPU overhead when com pared to synthetic devices

    129. SQL Server is I/O intensive, so it is recommended that you use the pass through diskoption as opposed to the fixed size Virtual Hard Disks (VHDs). Dynamic VHDs are notrecommended for performance reasons.

    130. Do not use the Hyper V snapshot feature on virtual servers that are connected to aSharePoint Products and Technologies server farm. This is because the timer services and thesearch applications might become unsynchronized during the snapshot process and once thesnapshot is finished, errors or inconsistencies can arise. Detach any server from the farm beforetaking a snapshot of that server.

    131. Deploy Clustered Storage Spaces

    Storage Spaces and Failover Clustering in Windows Server together, these technologies provide aresilient, highly available, and cost-efficient solution that you can scale from simple deploymentsto the needs of a large datacenter. You can build a failover cluster for your physical workloads orfor virtual workloads that are available through the Hyper-V role.

    The basic building block of a clustered storage spaces deployment is a small collection of servers,typically two to four, and a set of shared Serial Attached SCSI (SAS) just-a-bunch-of-disks(JBOD) enclosures. The JBOD enclosures should be connected to all the servers, where eachserver has redundant paths to all the disks in each JBOD enclosure. The following figure showsan example of the basic building block.

  • 8/13/2019 Notes for 74-409 Microsoft exam

    27/71

    Figure 1: Example of clustered storage spaces

    By using Cluster Shared Volumes (CSVs), you can unify storage access into a single namespacefor ease of management. A common namespace folder is created at the pathC:\ClusterStorage\ with all the CSVs in the failover cluster. All cluster nodes can access a CSV atthe same time, regardless of the number of servers, the number of JBOD enclosures, or thenumber of provisioned virtual disks. This unified namespace enables highly available workloadsto transparently fail over to another server if a server failure occurs. It also enables you to easilytake a server offline for maintenance.

    Clustered storage spaces can help protect against the following risks:

    Physical disk failures When you deploy a clustered storage space, protection against physical disk failures is provided by creating storage spaces with the mirror or parityresiliency types. Additionally, mirror spaces use dirty region tracking (DRT) to trackmodifications to the disks in the pool. When the system resumes from a power fault or ahard reset event and the spaces are brought back online, DRT makes disks in the poolconsistent with each other.

    Data access failures If you have redundancy at all levels, you can protect against failedcomponents, such as a failed cable from the enclosure to the server, a failed SAS adapter,

    power faults or failure of a JBOD backplane. For example, in an enterprise deployment,you should have redundant SAS adapters, SAS I/O modules, and power supplies. To

    protect against complete disk enclosure failure, you can use redundant JBOD enclosures.

    Data corruptions and volume unavailability Both the NTFS file system and theResilient File System (ReFS) help protect against corruption. For NTFS, improvementsto the Chkdsk tool in Windows Server 2012 can greatly improve availability. For moreinformation, see NTFS Health and Chkdsk . If you deploy highly available file servers(without using CSVs), you can use ReFS to enable high levels of scalability, high

    http://technet.microsoft.com/en-us/library/hh831536.aspxhttp://technet.microsoft.com/en-us/library/hh831536.aspxhttp://technet.microsoft.com/en-us/library/hh831536.aspxhttp://technet.microsoft.com/en-us/library/hh831536.aspx
  • 8/13/2019 Notes for 74-409 Microsoft exam

    28/71

    availability, and data integrity regardless of hardware or software failures. For moreinformation about ReFS, see Resilient File System Overview .

    Server node failures Through the Failover Clustering feature, you can provide highavailability for the underlying storage and workloads. This helps protect against serverfailure and enables you to take a server offline for maintenance without serviceinterruption.

    Notes: - powershell command

    Export-VM Exports a virtual machine (VM) to disk.Export-VMSnapshot Exports a snapshot as a virtual machine (VM) and writes it to disk.

    Checkpoint-VM Creates a snapshot of a virtual machine (VM).

    Compare-VM Compares a virtual machine (VM) to a host and returns a compatibilityreport.

    132. DHCP Guard- With DHCP Guard, Microsoft has introduced a new way to look atsecurity within virtual environments

    The growth in virtual machines has introduced new security and network challenges. Dynamic

    Host Configuration Protocol (DHCP) servers are used to allocate network addresses and other

    key information to computers. Part of that information is the DNS server that the computer will

    use to search for other machines on the Internet. This makes DHCP server a very attractive target

    for hackers.

    With network infrastructure increasingly being locked down, hackers have started to ship

    malware which includes its own DHCP server. Additionally, at major conferences and even in

    many hotels and city centres, it is easy to deploy a DHCP server that will capture a lot of

    unprotected computers.

    Once those computers have been captured, their network traffic can be captured and then

    examined. This can yield a lot of very sensitive information such as usernames and passwords for

    corporate networks, online banking and other services. This mechanism also makes it easy for

    hackers to direct valid user network requests to bogus sites that will deploy malware onto thecomputers compromising them

    It is not just criminals that create bad DHCP servers. In any test and development environment

    there can be multiple servers created as part of a test programme. If these servers are routed to the

    http://technet.microsoft.com/library/hh831724.aspxhttp://technet.microsoft.com/library/hh831724.aspxhttp://technet.microsoft.com/library/hh831724.aspxhttp://technet.microsoft.com/en-us/library/hh848491.aspxhttp://technet.microsoft.com/en-us/library/hh848491.aspxhttp://technet.microsoft.com/en-us/library/hh848512.aspxhttp://technet.microsoft.com/en-us/library/hh848512.aspxhttp://technet.microsoft.com/en-us/library/hh848512.aspxhttp://technet.microsoft.com/en-us/library/hh848539.aspxhttp://technet.microsoft.com/en-us/library/hh848539.aspxhttp://technet.microsoft.com/en-us/library/hh848612.aspxhttp://technet.microsoft.com/en-us/library/hh848612.aspxhttp://technet.microsoft.com/en-us/library/hh848612.aspxhttp://technet.microsoft.com/en-us/library/hh848539.aspxhttp://technet.microsoft.com/en-us/library/hh848512.aspxhttp://technet.microsoft.com/en-us/library/hh848512.aspxhttp://technet.microsoft.com/en-us/library/hh848491.aspxhttp://technet.microsoft.com/library/hh831724.aspx
  • 8/13/2019 Notes for 74-409 Microsoft exam

    29/71

    wrong network segment, they can end up being seen by a live production environment and

    inadvertently cause problems.

    DHCP Guard is a configuration setting for VMs that talks to Active Directory to retrieve the list

    of valid DHCP servers on the network. It determines what ports the computer should listen on forDHCP requests and blocks DHCP messages on other ports.

    133. List of cmdlets for powershell hyper v

    cmdlet Description

    Add-VMDvdDrive Installs a DVD drive in a virtual machine (VM).

    Add-VMFibreChannelHba Installs a virtual Fibre Channel host bus adapter in avirtual machine (VM).

    Add-VMHardDiskDrive Installs a hard disk drive in a virtual machine (VM).

    Add-VMMigrationNetwork Adds a network to the list of networks that can be usedfor virtual machine (VM) migration.

    Add-VMNetworkAdapter Installs a network adapter in a virtual machine (VM).

    Add-VMNetworkAdapterAcl Creates an access control list (ACL) to apply to thetraffic sent or received by a virtual machine (VM)network adapter.

    Add-VMNetworkAdapterExtendedAcl Creates an extended ACL for a virtual network adapter.

    Add-VmNetworkAdapterRoutingDomainMapping

    Adds a routing domain and virtual subnets to a virtualnetwork adapter.

    Add-VMRemoteFx3dVideoAdapter Installs a RemoteFX video adapter in a virtual machine(VM).

    Add-VMScsiController Installs a SCSI controller in a virtual machine (VM).

    Add-VMStoragePath Adds a path to a storage resource pool.

    Add-VMSwitch Adds a network to a resource pool.

    Add-VMSwitchExtensionPortFeature Adds a flow sheet document (FSD) to a virtual networkadapter in a virtual machine or the managementoperating system (which runs the Hyper-V role).

    Add-VMSwitchExtensionSwitchFeature Adds a flow sheet document (FSD) to a virtual switch.

    Checkpoint-VM Creates a snapshot of a virtual machine (VM).

    Compare-VM Compares a virtual machine (VM) to a host and returns acompatibility report.

    Complete-VMFailover Completes the failover process of the virtual machine(VM).

    Connect-VMNetworkAdapter Connects a virtual network adapter to a virtual network.

    Connect-VMSan Associates a host bus adapter with a virtual storage areanetwork (VMSAN).

    http://technet.microsoft.com/en-us/library/hh848576.aspxhttp://technet.microsoft.com/en-us/library/hh848576.aspxhttp://technet.microsoft.com/en-us/library/hh848550.aspxhttp://technet.microsoft.com/en-us/library/hh848550.aspxhttp://technet.microsoft.com/en-us/library/hh848470.aspxhttp://technet.microsoft.com/en-us/library/hh848470.aspxhttp://technet.microsoft.com/en-us/library/hh848493.aspxhttp://technet.microsoft.com/en-us/library/hh848493.aspxhttp://technet.microsoft.com/en-us/library/hh848564.aspxhttp://technet.microsoft.com/en-us/library/hh848564.aspxhttp://technet.microsoft.com/en-us/library/hh848505.aspxhttp://technet.microsoft.com/en-us/library/hh848505.aspxhttp://technet.microsoft.com/en-us/library/dn464289.aspxhttp://technet.microsoft.com/en-us/library/dn464289.aspxhttp://technet.microsoft.com/en-us/library/dn464285.aspxhttp://technet.microsoft.com/en-us/library/dn464285.aspxhttp://technet.microsoft.com/en-us/library/dn464285.aspxhttp://technet.microsoft.com/en-us/library/hh848520.aspxhttp://technet.microsoft.com/en-us/library/hh848520.aspxhttp://technet.microsoft.com/en-us/library/hh848453.aspxhttp://technet.microsoft.com/en-us/library/hh848453.aspxhttp://technet.microsoft.com/en-us/library/hh848456.aspxhttp://technet.microsoft.com/en-us/library/hh848456.aspxhttp://technet.microsoft.com/en-us/library/hh848573.aspxhttp://technet.microsoft.com/en-us/library/hh848573.aspxhttp://technet.microsoft.com/en-us/library/hh848490.aspxhttp://technet.microsoft.com/en-us/library/hh848490.aspxhttp://technet.microsoft.com/en-us/library/hh848465.aspxhttp://technet.microsoft.com/en-us/library/hh848465.aspxhttp://technet.microsoft.com/en-us/library/hh848539.aspxhttp://technet.microsoft.com/en-us/library/hh848539.aspxhttp://technet.microsoft.com/en-us/library/hh848612.aspxhttp://technet.microsoft.com/en-us/library/hh848612.aspxhttp://technet.microsoft.com/en-us/library/hh848593.aspxhttp://technet.microsoft.com/en-us/library/hh848593.aspxhttp://technet.microsoft.com/en-us/library/hh848496.aspxhttp://technet.microsoft.com/en-us/library/hh848496.aspxhttp://technet.microsoft.com/en-us/library/hh848585.aspxhttp://technet.microsoft.com/en-us/library/hh848585.aspxhttp://technet.microsoft.com/en-us/library/hh848585.aspxhttp://technet.microsoft.com/en-us/library/hh848496.aspxhttp://technet.microsoft.com/en-us/library/hh848593.aspxhttp://technet.microsoft.com/en-us/library/hh848612.aspxhttp://technet.microsoft.com/en-us/library/hh848539.aspxhttp://technet.microsoft.com/en-us/library/hh848465.aspxhttp://technet.microsoft.com/en-us/library/hh848490.aspxhttp://technet.microsoft.com/en-us/library/hh848573.aspxhttp://technet.microsoft.com/en-us/library/hh848456.aspxhttp://technet.microsoft.com/en-us/library/hh848453.aspxhttp://technet.microsoft.com/en-us/library/hh848520.aspxhttp://technet.microsoft.com/en-us/library/dn464285.aspxhttp://technet.microsoft.com/en-us/library/dn464285.aspxhttp://technet.microsoft.com/en-us/library/dn464289.aspxhttp://technet.microsoft.com/en-us/library/hh848505.aspxhttp://technet.microsoft.com/en-us/library/hh848564.aspxhttp://technet.microsoft.com/en-us/library/hh848493.aspxhttp://technet.microsoft.com/en-us/library/hh848470.aspxhttp://technet.microsoft.com/en-us/library/hh848550.aspxhttp://technet.microsoft.com/en-us/library/hh848576.aspx
  • 8/13/2019 Notes for 74-409 Microsoft exam

    30/71

    Convert-VHD Converts the format version and type of virtual hard diskfile of a virtual machine (VM).

    Copy-VMFile Copies a file to a virtual machine.

    Debug-VM Debugs a virtual machine.

    Disable-VMEventing Disables virtual machine eventing.

    Disable-VMIntegrationService Disables an integration service on a virtual machine(VM).

    Disable-VMMigration Disables migration on one or more virtual machinehosts.

    Disable-VMRemoteFXPhysicalVideoAdapter Disables a particular RemoteFX physical graphics

    processing unit (GPU) adapter for use with a RemoteFXvirtual machine (VM).

    Disable-VMResourceMetering Disables resource utilization data collection for a virtualmachine (VM) or a resource pool.

    Disable-VMSwitchExtension

    Disables one or more extensions and the feature sets

    associated with each extension for one or morespecified switches.

    Disconnect-VMNetworkAdapter Disconnects a virtual network adapter from a virtualnetwork or a network resource pool.

    Disconnect-VMSan Removes a host bus adapter from a virtual storage areanetwork (VMSAN).

    Dismount-VHD Specifies the path to the files representing the virtualhard disks to be dismounted.

    Enable-VMEventing Enables the automatic refresh of Hyper-V objects "live" objects for the current Windows PowerShellsession.

    Enable-VMIntegrationService Enables an integration service on a virtual machine(VM).

    Enable-VMMigration Enables migration on one or more Hyper-V hosts.

    Enable-VMRemoteFXPhysicalVideoAdapter Enables one or more RemoteFX physical video adaptersfor use with RemoteFX-enabled virtual machines.

    Enable-VMReplication Enables replication of a virtual machine.

    Enable-VMResourceMetering Enables the collection of resource utilization data for oneor more virtual machines (VM) or resource pools.

    Enable-VMSwitchExtension Enables one or more extensions and the feature setsassociated with each extension on one or more

    specified virtual switches.Export-VM Exports a virtual machine (VM) to disk.

    Export-VMSnapshot Exports a snapshot as a virtual machine (VM) and writesit to disk.

    Get-VHD Creates a VHDObject for each virtual hard disk filespecified by path or associated with a virtual machine(VM).

    http://technet.microsoft.com/en-us/library/hh848454.aspxhttp://technet.microsoft.com/en-us/library/hh848454.aspxhttp://technet.microsoft.com/en-us/library/dn464282.aspxhttp://technet.microsoft.com/en-us/library/dn464282.aspxhttp://technet.microsoft.com/en-us/library/dn464280.aspxhttp://technet.microsoft.com/en-us/library/dn464280.aspxhttp://technet.microsoft.com/en-us/library/hh848571.aspxhttp://technet.microsoft.com/en-us/library/hh848571.aspxhttp://technet.microsoft.com/en-us/library/hh848488.aspxhttp://technet.microsoft.com/en-us/library/hh848488.aspxhttp://technet.microsoft.com/en-us/library/hh848578.aspxhttp://technet.microsoft.com/en-us/library/hh848578.aspxhttp://technet.microsoft.com/en-us/library/hh848596.aspxhttp://technet.microsoft.com/en-us/library/hh848596.aspxhttp://technet.microsoft.com/en-us/library/hh848498.aspxhttp://technet.microsoft.com/en-us/library/hh848498.aspxhttp://technet.microsoft.com/en-us/library/hh848545.aspxhttp://technet.microsoft.com/en-us/library/hh848545.aspxhttp://technet.microsoft.com/en-us/library/hh848534.aspxhttp://technet.microsoft.com/en-us/library/hh848534.aspxhttp://technet.microsoft.com/en-us/library/hh848487.aspxhttp://technet.microsoft.com/en-us/library/hh848487.aspxhttp://technet.microsoft.com/en-us/library/hh848562.aspxhttp://technet.microsoft.com/en-us/library/hh848562.aspxhttp://technet.microsoft.com/en-us/library/hh848462.aspxhttp://technet.microsoft.com/en-us/library/hh848462.aspxhttp://technet.microsoft.com/en-us/library/hh848500.aspxhttp://technet.microsoft.com/en-us/library/hh848500.aspxhttp://technet.microsoft.com/en-us/library/hh848544.aspxhttp://technet.microsoft.com/en-us/library/hh848544.aspxhttp://technet.microsoft.com/en-us/library/hh848506.aspxhttp://technet.microsoft.com/en-us/library/hh848506.aspxhttp://technet.microsoft.com/en-us/library/jj136049.aspxhttp://technet.microsoft.com/en-us/library/jj136049.aspxhttp://technet.microsoft.com/en-us/library/hh848481.aspxhttp://technet.microsoft.com/en-us/library/hh848481.aspxhttp://technet.microsoft.com/en-us/library/hh848541.aspxhttp://technet.microsoft.com/en-us/library/hh848541.aspxhttp://technet.microsoft.com/en-us/library/hh848491.aspxhttp://technet.microsoft.com/en-us/library/hh848491.aspxhttp://technet.microsoft.com/en-us/library/hh848512.aspxhttp://technet.microsoft.com/en-us/library/hh848512.aspxhttp://technet.microsoft.com/en-us/library/hh848611.aspxhttp://technet.microsoft.com/en-us/library/hh848611.aspxhttp://technet.microsoft.com/en-us/library/hh848611.aspxhttp://technet.microsoft.com/en-us/library/hh848512.aspxhttp://technet.microsoft.com/en-us/library/hh848491.aspxhttp://technet.microsoft.com/en-us/library/hh848541.aspxhttp://technet.microsoft.com/en-us/library/hh848481.aspxhttp://technet.microsoft.com/en-us/library/jj136049.aspxhttp://technet.microsoft.com/en-us/library/hh848506.aspxhttp://technet.microsoft.com/en-us/library/hh848544.aspxhttp://technet.microsoft.com/en-us/library/hh848500.aspxhttp://technet.microsoft.com/en-us/library/hh848462.aspxhttp://technet.microsoft.com/en-us/library/hh848562.aspxhttp://technet.microsoft.com/en-us/library/hh848487.aspxhttp://technet.microsoft.com/en-us/library/hh848534.aspxhttp://technet.microsoft.com/en-us/library/hh848545.aspxhttp://technet.microsoft.com/en-us/library/hh848498.aspxhttp://technet.microsoft.com/en-us/library/hh848596.aspxhttp://technet.microsoft.com/en-us/library/hh848578.aspxhttp://technet.microsoft.com/en-us/library/hh848488.aspxhttp://technet.microsoft.com/en-us/library/hh848571.aspxhttp://technet.microsoft.com/en-us/library/dn464280.aspxhttp://technet.microsoft.com/en-us/library/dn464282.aspxhttp://technet.microsoft.com/en-us/library/hh848454.aspx
  • 8/13/2019 Notes for 74-409 Microsoft exam

    31/71

    Get-VM Retrieves a VMObject for each virtual machine (VM) onthe Hyper-V host.

    Get-VMBios Retrieves the BIOS configuration of a virtual machine(VM).

    Get-VMComPort Retrieves a list of the COM ports associated with a

    virtual machine (VM).

    Get-VMConnectAccess Retrieves a list of users that have access to connect to avirtual machine (VM).

    Get-VMDvdDrive Retrieves a list of DVD drives that are attached to avirtual machine (VM).

    Get-VMFibreChannelHba Retrieves a list of all Fibre Channel host bus adaptersassociated with a virtual machine (VM).

    Get-VMFirmware Gets the firmware configuration of a virtual machine.

    Get-VMFloppyDiskDrive Retrieves a list of floppy disk drives that are attached toa virtual machine (VM).

    Get-VMHardDiskDrive Retrieves a list of the hard disk drives that are attachedto a virtual machine (VM).

    Get-VMHost Retrieves the configuration of a Hyper-V host.

    Get-VMHostNumaNode Retrieves the NUMA topology of a Hyper-v host.

    Get-VMHostNumaNodeStatus Retrieves a list that associates each virtual machine(VM) with the allocated resources for each NUMA Nodeon the host.

    Get-VMIdeController Retrieves a list of the IDE controllers associated with avirtual machine (VM).

    Get-VMIntegrationService Retrieves the integration services configuration of avirtual machine (VM).

    Get-VMMemory Retrieves the memory configuration of a virtual machine(VM).

    Get-VMMigrationNetwork Retrieves a list of the networks that have been added formigration on a Hyper-V host.

    Get-VMNetworkAdapter Retrieves a list of the virtual network adapters of avirtual machine (VM), the management operatingsystem, or both.

    Get-VMNetworkAdapterAcl Retrieves an access control list (ACL) configured for avirtual machine (VM) network adapter.

    Get-VMNetworkAdapterExtendedAcl Gets extended ACLs configured for a virtual network

    adapter.Get-VMNetworkAdapterFailoverConfiguration Retrieves the Failover IP settings on a virtual machine(VM) network adaptor.

    Get-VmNetworkAdapterIsolation Gets isolation settings for a virtual network adapter.

    Get-VMNetworkAdapterRoutingDomainMapping Gets members of a routing domain.

    Get-VMNetworkAdapterVlan Retrieves virtual local area network (VLAN) settings

    http://technet.microsoft.com/en-us/library/hh848479.aspxhttp://technet.microsoft.com/en-us/library/hh848479.aspxhttp://technet.microsoft.com/en-us/library/hh848617.aspxhttp://technet.microsoft.com/en-us/library/hh848617.aspxhttp://technet.microsoft.com/en-us/library/hh848587.aspxhttp://technet.microsoft.com/en-us/library/hh848587.aspxhttp://technet.microsoft.com/en-us/library/hh848538.aspxhttp://technet.microsoft.com/en-us/library/hh848538.aspxhttp://technet.microsoft.com/en-us/library/hh848501.aspxhttp://technet.microsoft.com/en-us/library/hh848501.aspxhttp://technet.microsoft.com/en-us/library/hh848588.aspxhttp://technet.microsoft.com/en-us/library/hh848588.aspxhttp://technet.microsoft.com/en-us/library/dn464288.aspxhttp://technet.microsoft.com/en-us/library/dn464288.aspxhttp://technet.microsoft.com/en-us/library/hh848502.aspxhttp://technet.microsoft.com/en-us/library/hh848502.aspxhttp://technet.microsoft.com/en-us/library/hh848504.aspxhttp://technet.microsoft.com/en-us/library/hh848504.aspxhttp://technet.microsoft.com/en-us/library/hh848513.aspxhttp://technet.microsoft.com/en-us/library/hh848513.aspxhttp://technet.microsoft.com/en-us/library/hh848553.aspxhttp://technet.microsoft.com/en-us/library/hh848553.aspxhttp://technet.microsoft.com/en-us/library/hh848615.aspxhttp://technet.microsoft.com/en-us/library/hh848615.aspxhttp://technet.microsoft.com/en-us/library/hh848466.aspxhttp://technet.microsoft.com/en-us/library/hh848466.aspxhttp://technet.microsoft.com/en-us/library/hh848542.aspxhttp://technet.microsoft.com/en-us/library/hh848542.aspxhttp://technet.microsoft.com/en-us/library/hh848597.aspxhttp://technet.microsoft.com/en-us/library/hh848597.aspxhttp://technet.microsoft.com/en-us/library/hh848592.aspxhttp://technet.microsoft.com/en-us/library/hh848592.aspxhttp://technet.microsoft.com/en-us/library/hh848526.aspxhttp://technet.microsoft.com/en-us/library/hh848526.aspxhttp://technet.microsoft.com/en-us/library/hh848574.aspxhttp://technet.microsoft.com/en-us/library/hh848574.aspxhttp://technet.microsoft.com/en-us/library/dn464278.aspxhttp://technet.microsoft.com/en-us/library/dn464278.aspxhttp://technet.microsoft.com/en-us/library/hh848557.aspxhttp://technet.microsoft.com/en-us/library/hh848557.aspxhttp://technet.microsoft.com/en-us/library/dn464277.aspxhttp://technet.microsoft.com/en-us/library/dn464277.aspxhttp://technet.microsoft.com/en-us/library/dn464284.aspxhttp://technet.microsoft.com/en-us/library/dn464284.aspxhttp://technet.microsoft.com/en-us/library/dn464284.aspxhttp://technet.microsoft.com/en-us/library/hh848516.aspxhttp://technet.microsoft.com/en-us/library/hh848516.aspxhttp://technet.microsoft.com/en-us/library/hh848516.aspxhttp://technet.microsoft.com/en-us/library/dn464284.aspxhttp://technet.microsoft.com/en-us/library/dn464284.aspxhttp://technet.microsoft.com/en-us/library/dn464277.aspxhttp://technet.microsoft.com/en-us/library/hh848557.aspxhttp://technet.microsoft.com/en-us/library/dn464278.aspxhttp://technet.microsoft.com/en-us/library/hh848574.aspxhttp://technet.microsoft.com/en-us/library/hh848526.aspxhttp://technet.microsoft.com/en-us/library/hh848592.aspxhttp://technet.microsoft.com/en-us/library/hh848597.aspxhttp://technet.microsoft.com/en-us/library/hh848542.aspxhttp://technet.microsoft.com/en-us/library/hh848466.aspxhttp://technet.microsoft.com/en-us/library/hh848615.aspxh