Log On/Register  

855.838.5028

Understanding Windows Server 2012

Duration: 2 days
Course Price: $1,095

Course Overview

When Microsoft announces a new version of Windows, we just never know whether we're getting mostly bug fixes and tweaks (NT 3.51, 2003 R2), a bushel of sizeable, discrete changes that are nice, but not earth-shaking (NT 4.0, Server 2008), or a disc full of game-changers (NT 3.5, Windows 2000, Vista).

Give Windows Server 2012 a look, however, and you'll see that it's all three. 2012 includes a completely new storage subsystem that's almost certainly keeping some SAN vendors up at night. A near-complete focus on virtualization and remote administration ( for example, Server core is the default install) clearly drove most of 2012's innovations. Game-changers all, but they might be outdone by a completely new file sharing system called Dynamic Access Control that grants access not just on the basis of group memberships but also on the basis of your user account attributes, what sort of workstation you're sitting at and if particular keywords exist in a file.

The new server also contains a lot of hey-that's-not-essential-but-it's-pretty-cool stuff as well, and plenty of it. Over two thousand new in-the-box PowerShell tools. A new software-based NIC teaming feature which makes that linchpin of high availability affordable by even the smallest network. And then there's the new DirectAccess, which enables any enterprise to build a policy-driven and non-user-irritating VPN in essentially a half-dozen clicks. (It really is that easy — no certs, no IPv6.)

And little fit-and-finish tweaks? Almost too many to tell. It's no longer dangerous to virtualize a domain controller. 2008's flexible password policies and the 2008R2's AD Recycle Bin finally get a GUI as part of enhancements to Active Directory Administrative Center. Typing long, complex passwords is no longer a game of blind man's buff, with a small new button that lets you see what you typed in your logon password field.

We haven't seen these many changes to Server since the turn of the century — which is pretty cool — but discovering, testing, and analyzing them all could be a pretty daunting and extremely time-consuming task for IT professionals and managers whose plates are already over-full... which is why we created this training course. Your training course director and instructor — you never get the second-string instructors at MR&D seminars! — is Windows Server expert Mark Minasi, the popular columnist, trusted technical commentator and author of 37 books on computing topics, including the best-selling line of Mastering Windows Server books that have sold millions of copies in their nearly twenty year lifespan. Mark has been working with Server 2012 since its earliest betas, enabling him to pass along "just the good stuff," and so provide an expert guided tour of what you need to know about Server 2012. You'll learn what's great, what's just okay, what's forgettable. Even better, Mark gets that done for you in just three fast, fun, information-packed days that include a bit of "catch-up" tutorials on storage and cluster technologies.

Many IT shops are "version skippers," rolling out only every other version of Server to their data centers, and that's often a wise move. But is skipping 2012 a good idea for your organization? Join Mark and get the independent answer!

Key Seminar Benefits

  • Quickly understand what Server 2012 can (or can't) do for you, enabling you to start planning sooner

  • Know which of Server 2012's new capabilities help your existing network and desktops, rather than ones that require Windows 8 desktops

  • Get tips on installing Server quickly, easily and cheaply

  • See dozens of PowerShell examples that will not only show you how to save time administering

  • Save time and avoid having to spend weeks poring through white papers and Web sites about 2012 — get the answers that you want now from a recognized industry expert

  • Understand the four — count 'em, four! — GUI options on Server, and choose the right one for you

  • Configure your system easily with PowerShell and Server Manager

  • Get the most out of your NICs with software NIC teaming (and know when teaming won't help)

  • See how to "glue together" several PowerShell cmdlets to create a better IPConfig

  • Offer better DHCPs services cheaply with DHCP failover

  • Review and fill in your storage and iSCSI knowledge

  • See how to set up and manage Windows storage technology with Storage Spaces, an inexpensive SAN replacement

  • Discover why you need fear CHKDSK no more

  • Understand how Windows servers provide storage as iSCSI "servers"

  • Learn the basics of Windows clusters, see how 2012 improves clusters and understand what that "active/active" stuff is all about

  • Grasp how the new file server — SMB 3.0 — can replace SAN shared storage in Server 2012

  • Realize the benefits of the file server's new encryption and "multi-TCP" can secure and speed your file services

  • Know exactly what the heck the "scale-out file server for application data" is, and whether or not it can help you

  • Discover "access-denied file server remediation" — an obscure name for a new and improved "access denied" error message — and how to exploit and configure it to cut down help desk calls

  • Survey and then "deep dive" into Dynamic Access Control (DAC), a completely new way of securing files and file folders to simplify share permissions, exploit the user information that you've already got in Active Directory, classify files containing potentially troublesome data, and more easily use permissions to assist in meeting compliance requirements like HIPAA or SOX

  • Examine the new file classification infrastructure (FCI) component of DAC, which lets you define file classification types and then classify files either manually or automatically

  • Use Hyper-V and 2012 to quickly clone virtual DCs for standard DC expansion and fast forest reconstruction

  • Utilize AD activation to simplify licensing Enterprise Windows systems

  • See how 2012 Hyper-V virtual machines can be easily created with PowerShell

  • Know how to do "poor person's clustering" with Hyper-V replication

  • Simplify VM management with "shared nothing" live migration

Course Overview

When Microsoft announces a new version of Windows, we just never know whether we're getting mostly bug fixes and tweaks (NT 3.51, 2003 R2), a bushel of sizeable, discrete changes that are nice, but not earth-shaking (NT 4.0, Server 2008), or a disc full of game-changers (NT 3.5, Windows 2000, Vista).

Give Windows Server 2012 a look, however, and you'll see that it's all three. 2012 includes a completely new storage subsystem that's almost certainly keeping some SAN vendors up at night. A near-complete focus on virtualization and remote administration ( for example, Server core is the default install) clearly drove most of 2012's innovations. Game-changers all, but they might be outdone by a completely new file sharing system called Dynamic Access Control that grants access not just on the basis of group memberships but also on the basis of your user account attributes, what sort of workstation you're sitting at and if particular keywords exist in a file.

The new server also contains a lot of hey-that's-not-essential-but-it's-pretty-cool stuff as well, and plenty of it. Over two thousand new in-the-box PowerShell tools. A new software-based NIC teaming feature which makes that linchpin of high availability affordable by even the smallest network. And then there's the new DirectAccess, which enables any enterprise to build a policy-driven and non-user-irritating VPN in essentially a half-dozen clicks. (It really is that easy — no certs, no IPv6.)

And little fit-and-finish tweaks? Almost too many to tell. It's no longer dangerous to virtualize a domain controller. 2008's flexible password policies and the 2008R2's AD Recycle Bin finally get a GUI as part of enhancements to Active Directory Administrative Center. Typing long, complex passwords is no longer a game of blind man's buff, with a small new button that lets you see what you typed in your logon password field.

We haven't seen these many changes to Server since the turn of the century — which is pretty cool — but discovering, testing, and analyzing them all could be a pretty daunting and extremely time-consuming task for IT professionals and managers whose plates are already over-full... which is why we created this training course. Your training course director and instructor — you never get the second-string instructors at MR&D seminars! — is Windows Server expert Mark Minasi, the popular columnist, trusted technical commentator and author of 37 books on computing topics, including the best-selling line of Mastering Windows Server books that have sold millions of copies in their nearly twenty year lifespan. Mark has been working with Server 2012 since its earliest betas, enabling him to pass along "just the good stuff," and so provide an expert guided tour of what you need to know about Server 2012. You'll learn what's great, what's just okay, what's forgettable. Even better, Mark gets that done for you in just three fast, fun, information-packed days that include a bit of "catch-up" tutorials on storage and cluster technologies.

Many IT shops are "version skippers," rolling out only every other version of Server to their data centers, and that's often a wise move. But is skipping 2012 a good idea for your organization? Join Mark and get the independent answer!

Key Seminar Benefits

  • Quickly understand what Server 2012 can (or can't) do for you, enabling you to start planning sooner

  • Know which of Server 2012's new capabilities help your existing network and desktops, rather than ones that require Windows 8 desktops

  • Get tips on installing Server quickly, easily and cheaply

  • See dozens of PowerShell examples that will not only show you how to save time administering

  • Save time and avoid having to spend weeks poring through white papers and Web sites about 2012 — get the answers that you want now from a recognized industry expert

  • Understand the four — count 'em, four! — GUI options on Server, and choose the right one for you

  • Configure your system easily with PowerShell and Server Manager

  • Get the most out of your NICs with software NIC teaming (and know when teaming won't help)

  • See how to "glue together" several PowerShell cmdlets to create a better IPConfig

  • Offer better DHCPs services cheaply with DHCP failover

  • Review and fill in your storage and iSCSI knowledge

  • See how to set up and manage Windows storage technology with Storage Spaces, an inexpensive SAN replacement

  • Discover why you need fear CHKDSK no more

  • Understand how Windows servers provide storage as iSCSI "servers"

  • Learn the basics of Windows clusters, see how 2012 improves clusters and understand what that "active/active" stuff is all about

  • Grasp how the new file server — SMB 3.0 — can replace SAN shared storage in Server 2012

  • Realize the benefits of the file server's new encryption and "multi-TCP" can secure and speed your file services

  • Know exactly what the heck the "scale-out file server for application data" is, and whether or not it can help you

  • Discover "access-denied file server remediation" — an obscure name for a new and improved "access denied" error message — and how to exploit and configure it to cut down help desk calls

  • Survey and then "deep dive" into Dynamic Access Control (DAC), a completely new way of securing files and file folders to simplify share permissions, exploit the user information that you've already got in Active Directory, classify files containing potentially troublesome data, and more easily use permissions to assist in meeting compliance requirements like HIPAA or SOX

  • Examine the new file classification infrastructure (FCI) component of DAC, which lets you define file classification types and then classify files either manually or automatically

  • Use Hyper-V and 2012 to quickly clone virtual DCs for standard DC expansion and fast forest reconstruction

  • Utilize AD activation to simplify licensing Enterprise Windows systems

  • See how 2012 Hyper-V virtual machines can be easily created with PowerShell

  • Know how to do "poor person's clustering" with Hyper-V replication

  • Simplify VM management with "shared nothing" live migration

Course Outline

Server 2012: The Big Picture

  1. A really quick look at the list of new things in 2012 can be a bit overwhelming, but it all seems to make better sense if you understand what seem to be the big goals of the new server. We'll start off the course with those topics in this first section.

    1. "A persistent whiff of the Cloud"
    2. Pervasive virtualization-friendly aspects
    3. Should appeal to more organizations, with an unusual number of new capabilities for small and medium-sized organizations, or just anyone who's pinching pennies
    4. AD features tend not to require any new functional levels
    5. Remote administration is assumed to be the default
    6. PowerShell owns 2012... but it's not a bad thing, really
     
  2. Installing and Managing Server 2012 Like a Pro, or, Better, Like an Evil Overlord!

    Server 2012 comes with a real treasure trove of useful new tools, but none of those tools are of any value if you don't know how to install them, start them up and point them where you want them to go. Rolling out Server 2012 is similar to deploying Servers 2008 and 2008 R2, as it still uses the "Panther" setup engine, so if you've installed 08 or R2, then 2012 setup won't seem too foreign, although it does have a few new wrinkles. Once the server's running, however, get ready for some big changes, as Server Core and remote access is the default configuration. If your next question is "so does Server 2012 have a GUI at all?," the answer is "sure... four GUIs in fact, counting Server Core." Assuming you've opted for the traditional style of GUI, you'll find that 2012 has something called Server Manager, but it's completely different from the Server Managers we've seen since 2003 SP1. The new Server Manager is, however, not the biggest change in server management, believe it or not — no, that title has to go to the ten-fold increase in PowerShell tools. The more things change, though, the more they stay the same, as in the end analysis every server needs the same sort of tender loving care — give it a name, give it an IP address, assign some roles and features, join it to a domain and the like. Once you've finished this section, you'll be ready to crack the whip on your new servers more quickly, easily, and consistently ruthlessly. Miss this section, and you may end up helplessly trapped in the Roles and Features wizard, and trust us, that is a terrible way to go!

    1. Setting up Server 2012
      1. Hardware requirements
      2. Upgrade considerations
      3. Server Core or not? New answers with 2012
      4. Make Server 2012 setup easier with autounattend.xml
    2. The new Server Manager
      1. Meet Metro: it's (groan) two desktops in one!
      2. Meet the almost-Metro/Mango/Multi-Server Manager
      3. The four GUIs of 2012
      4. A real multi-server perspective and new "server pools"
      5. Server Manager's now PowerShell under the hood
      6. Remote management is the default
      7. Service-centric management rather than server-centric management
      8. Exporting and importing server configuration
      9. Handling roles and services with SM and with PowerShell
      10. Event management (and new filtering!) in roles and services
      11. Shutdown and restart (yes, even that's different)
      12. A bit of PowerShell 101 (and 102 and 103 and 104...): the essential PowerShell "survivor's guide"
      13. Easier PowerShell: show-command, the new Integrated Script Editor, finding the missing help files
      14. Multi-server management with PowerShell
     
  3. 2012 Networking

    Many new 2012 features seem to fall in the category of "hey, it's almost like someone at Microsoft actually uses the product," kind of. We imagine that building their Azure cloud led to a bunch of "why don't we..." questions. How to keep track of static IP addresses... especially when they're a half-yard apiece long, like IPv6 addresses? Why the heck is making fault tolerant DHCP so difficult? How come "teamed" NICs — a great idea all along — cost so much? In this section, you'll learn about a bunch of nice networking add-ons that we're pretty sure will be welcome additions to your network infrastructure ... or at least will make building a test network easier.

    1. Dozens of new networking PowerShell commands
    2. Building a better IPConfig
    3. NIC Teaming
      1. Bandwidth aggregation
      2. Fault tolerance
      3. Choosing a teaming mode
      4. Selecting the best load balancing algorithm
      5. Building a team from the GUI
      6. Building a team from PowerShell
      7. In what situations should you expect teaming to work?
    4. RDMA support: what it is, why you care
    5. IPAM
      1. Static IP address management
      2. DNS and DHCP monitoring
      3. IPAM setup (you're going to be thankful for PowerShell here, trust us)
      4. Provisioning options
      5. Tracking a user's IP addresses
      6. Troubleshooting IPAM failures
      7. Reports
    6. DHCP clusters
      1. Types: understanding failover versus load balanced modes
      2. Configuring a maximum client lead time (MCLT)
      3. Configuring hot standby mode
      4. Configuring load sharing mode
      5. Securing cluster communications
      6. Failover modes: "communications interrupted" and "partner down"
      7. Controlling failover from PowerShell and the GUI
    7. DNSSEC made insanely easy

     

  4. SAN-sational Storage: Storage Tech Made Simple

    Storage Area Networks (SANSs) and shared storage have been around and common for a while, but now Microsoft's gotten serious with some storage offerings, as you'll learn very soon. Before that, though, we'll do a quick review of what networked storage technologies are all about, cover all the essential buzzwords and do a bit of a "level-set."

    1. The world before SANs
    2. SAN concepts: a socket in the wall for data
    3. From physical to virtual and back, kind of: what SANs do
    4. Block storage versus file storage
    5. Talking SCSI, but not offending: intiators, SCSI IDs, targets, LUNs
    6. Why all this is better than just plugging drives into servers
    7. Interfaces: fiber channel, iSCSI
    8. Drive options: SATA and SAS
    9. Command languages: ATA and SCSI
    10. Storage made just for clusters: sharing LUNs without tears
    11. iSCSI background: iSCSI for the uninitiated
      1. What problem is iSCSI trying to solve?
      2. Re-using terms: back to initiators, targets and LUNs
      3. iSCSI as an Internet protocol
      4. iSCSI performance: moving the dial from software to hardware
      5. Names in iSCSI

     

  5. Storage in Server 2012

    Much has changed in the network storage world since NT 3.1 appeared, including the various technologies allowing for storage area networks and shared storage in general, technologies that Windows has largely ignored... until now. With Server 2012, you can easily take some commodity hardware, throw a bunch of drives and a few NICs in it, and in no time you've got an iSCSI-aware shared storage device and, even better, a shared storage device that you can control using Windows' familiar management tools. Even if you currently have and love your SAN, there's still storage issues that you'll love about 2012, including a kindler, gentler CHKDSK and, finally, native 4K sector support.

    1. Native 4K sector support
    2. All kinds of new PowerShell support
    3. Native support for ISO and VHD mounting
    4. Storage Spaces: a SANer way to do network storage
      1. JBOD to Storage Pool (both the GUI and PowerShell way)
      2. Storage Pool to "virtual disk" (not the kind you think)
      3. Virtual disk into volumes
        1. Overcommit option
        2. Can de-dup (more on that later)
        3. Fault tolerance options
        4. It's all offline by default: Server 2012's "SAN policy"
      4. Volumes into iSCSI "virtual disks"
      5. iSCSI initiators in Windows clients and servers
      6. iSCSI targets
      7. NFS shares
    5. Managing a Storage Space
      1. Controlling parity: interleaves, columns and stripes
      2. How tolerant is the fault tolerance?
      3. Controlling disk modes (autoselect, hotspare, journal, retired)
      4. Two-way and three-way mirrors
      5. Incorporating journal disks in Storage Spaces
      6. Handling a drive fault
      7. Retiring a drive
      8. Collecting health information
    6. De-Dup in 2012
      1. Variable-block de-dup in 2012
      2. Compression options
      3. Scheduling de-dup
      4. De-dup in networking
    7. iSCSI support in Windows
      1. Setting up target and initiator (server and client) software
      2. Creating the target and LUN via GUI and PowerShell
      3. Connecting to the initiator
      4. Enabling shared storage for clusters: multiple initiators connected to a single target
    8. CHKDSK without tears — fear the CHKDSK reboot no more
    9. Resilient File System (ReFS) concepts and features
    10. BitLocker 2012
      1. "Used disk space only" encryption control
      2. Encrypt the disk before installing Server
      3. AD can auto-supply a BitLocker PIN
    11. User data affinity: keep those roaming profiles from roaming everywhere

     

  6. Cluster Background and Basics: Windows Clusters Made Simple

    One of the biggest and, unfortunately, most expensive innovations in the network business is Windows Clusters. Clusters provide a way to combine a whole bunch of moderately-reliable systems into one big and very reliable systems. If PC server-based networks can convince even the most risk-averse to shut off their mainframes, it'll be clusters that can do that. (And have done that, actually.) But clusters have been only the province of well-heeled organizations, which is why most IT pros have never created one. Server 2012 changes that, though, offering a way to build truly cheap but still quite reliable clusters. In this section, we'll get you all caught up on "the story so far" in clusters so you're ready to learn about what 2012 delivers.

    1. Basic idea: two or more servers, a third device with shared storage, redundant networking
    2. Heartbeats, quorum/witness disks
    3. The problem of "shared nothing"
    4. One answer: "cluster shared volumes" (CSVs)
    5. What CSVs did in R2
    6. CSV limitations
    7. Cluster setup planning and skills
    8. The trick to connecting iSCSI storage to a cluster

     

  7. SMB 3.0: File Servers Get Better, Part One

    There are few things as old in the Windows world as the file server service, software that contains code literally written back in 1969, or, rather that once contained code that old. Microsoft took a stab at modernizing Server Message Block (SMB) back in 2006, with Vista and Server 2008, and after a rocky start, SMB 2.0's turned out to be a useful, if undersung, upgrade. Server 2012/Windows 8's new file server service, first dubbed SMB 2.2 and then rechristened SMB 3.0 with 2012's Release Candidate, includes some features that are obscure but will thrill its users as well as a few that will get pretty widespread attention — for example, you can now build a super-cheap file cluster using just a file share instead of a SAN device.

    1. SMB 3.0 overview: the big goals
    2. SMB Direct: the fastest file shares in the world
    3. Encrypted SMB
      1. How it works, how it's new
      2. Enabling it
      3. Handling downlevel clients
    4. SMB Multichannel: teamed NICs plus file shares
    5. File shares as shared storage
    6. Scale-Out File Server for Application Data
      1. How SOFS differs from traditional clustered file shares
      2. Clients and transparent failover
      3. Cluster shared volumes return in SOFS
      4. VHD and SQL with SOFS: a marriage made in Redmond
      5. Building an SOFS
    7. CSVs can now boot with AD
    8. SMB directory leasing: faster branch office access

     

  8. Dynamic Access Control: File Servers Get Better, Part Two

    The competition for the title of "most significant change in Server 2012" is a pretty tough one, but Dynamic Access Control (DAC) may be the winner. It's a huge topic — it probably wouldn't be hard to build a complete day's class on it — but in movie/TV terms, it is really nothing less than a complete re-imagining of what file servers do and how they do it. As you probably know, before 2012, we controlled access to file shares via group memberships — if you were a member of the right group, you got to the share. DAC adds many ways to control access to a file share. You can require users to be members of multiple groups or to have particular Active Directory attributes before granting access. You can control access to a share based on the machine the user's sitting at. You can link access to a file based on file type and ontents, as in "only allow access to files of type 'source code' to users with the title 'programmer.'" But wait, there's more... you can tell 2012 to classify a file as being of type "source code" if it included the text "#include," and, well, that's not all ... which is why you won't want to miss this section.

    1. DAC explained from a "what it changes" point of view
    2. Example DAC scenarios
      1. Using DAC to assist in compliance
      2. Keeping complex permissions consistent across the organization
      3. Automatically classifying files
    3. The players: users, devices, resources
    4. Simplest DAC: multi-group policies
      1. Enabling DAC
      2. Creating a multi-group permission
      3. Troubleshooting DAC with Window's improved "effective permissions"
    5. Claims: using AD attributes
    6. Workstations get into the act: device groups, device claims
    7. Resource information: FCI (file classification infrastructure)
      1. What is FCI?
      2. "Resource properties:" picking out the dangerous files and keeping prying eyes away
      3. Classifying files by hand
      4. Classifying files automatically with the File System Resource Manager
      5. Building permissions that are file-content-aware
    8. Central Access Policies
      1. Why bother? Simplifying creating complex rules
      2. Step one: create central access rules
      3. Step two: assemble central access policies
      4. Step three: deploy central access policies with group policies
      5. Applying a central access policy to a share
    9. "Access Denied" remediation
    10. Less Bloat: DAC, Kerberos and smaller tokens
      1. Quick review: what's "token bloat?"
      2. Resource group compression
      3. Relax the bloat messages: GPs to quiet shrill DCs
      4. Kerberos armoring: making DAC possible

     

  9. "Dynamic Audit Control:" Thinning Out the Logs

    Why does everyone talk about the problem of obesity among Americans but so few talk about how bloated most event logs are? By now, you will have seen that Dynamic Access Control lets you fine-tune who gets to your sensitive data and, more importantly, who doesn't. Interestingly enough, that sort of fine-tuned set of access controls now also works on audit logs. That's why it's nice that you can now use DAC-like policies to tell the event log what sorts of events to ignore. In this section, learn how to keep your logs lean, mean, and much more information rich.

    1. What you can do with DAC-like event log policies
    2. Creating an event log policy

     

  10. Active Directory in 2012

    Like other pieces of Windows Server 2012, Active Directory gets a number of upgrades. The biggest ones are — no surprise — virtualization-related, but the one that may be most administrators' favorite may be the one that makes KMS activation largely irrelevant, or possibly the boy-does-that-make-my-life-easier group managed service accounts.

    1. An easier "first DC" than before
    2. DCPROMO's gone, new-adforest arrives (yup, more PowerShell!)
    3. ADUC's retired, AD Administrative Center's front and... center
    4. Learning PowerShell gets easier in 2012 with the PowerShell History Viewer
    5. Running services under domain accounts gets easier with group managed service accounts
    6. 2012 can clone DCs in under five minutes (virtually)
      1. How it works
      2. Do's and don'ts
      3. Configuring the XML (it's not that bad)
      4. Usage example: super-fast forest recovery
    7. It's now safe to roll back snapshots of virtualized DCs
    8. Bye-bye KMS servers: joining AD activates your systems
    9. Delegation gets a bit more secure with resource-based constrained delegation
    10. Fewer DC reboots

     

  11. Hyper-V in Server 2012

    As you've already read, in some senses virtualization is the subtle and central theme of Server 2012. Our last section looks at the changes in Windows' central engine for virtualization — Hyper-V server.

    1. 2012 Hyper-V scale changes: bigger clusters, more VMs, new networking
    2. Virtual networking with new "Hyper-V virtual switch," SR-IOV and virtual Fiber Channel adapters
    3. New virtual storage
      1. VHDXes pump up virtual drives
      2. 4K support
      3. 16TB size
      4. Solves import problems
      5. Converting between VHD and VHDx
    4. Virtual machine application monitoring
    5. Simplified shared storage for Hyper-V clusters
      1. Simple SMB 3.0 file shares
      2. Scale-out file server
    6. Hyper-V Shared Nothing Live Migration vs Hyper-V Replication
    7. Hyper-V Shared Nothing Live Migration (SNOLM)
      1. Overall considerations
      2. Enabling Live Migration
      3. Firewall considerations
      4. Reference: constrained Kerberos delegation explanation
      5. Configure NICs for live migration
      6. Storage migration options
      7. Using PowerShell to do SNOLM
      8. Handling problems... processor mismatch, network switch mismatch
    8. Hyper-V Replication (HVR)
      1. HVR steps: overview
      2. Initial replication
      3. Firewall considerations
      4. Powershell and GUI steps
      5. Doing a planner failover
      6. Doing an test failover
      7. Doing an unplanned failover

 

Learn More
Please type the letters below so we know you are not a robot (upper or lower case):