Select Page
Hyper-V Replica BPA Rules

Hyper-V Replica BPA Rules

First published on TECHNET on Oct 01, 2013 A frequent question from our customers is on whether there are standard “best practices” when deploying Hyper-V Replica (or any Windows Server role for that matter). These questions come in many avatars ... continue reading
Online resize of virtual disks attached to replicating virtual machines

Online resize of virtual disks attached to replicating virtual machines

First published on TECHNET on Nov 14, 2013 In Windows Server 2012 R2, Hyper-V added the ability to resize the virtual disks attached to a running virtual machine without having to shutdown the virtual machine. In this blog post we ... continue reading
Using data deduplication with Hyper-V Replica for storage savings

Using data deduplication with Hyper-V Replica for storage savings

First published on TECHNET on Dec 23, 2013 Protection of data has always been a priority for customers, and disaster recovery allows the protection of data with better restore times and lower data loss at the time of failover. However, ... continue reading
Improvements in recovery history

Improvements in recovery history

First published on TECHNET on Jan 27, 2014 Hyper-V replica has always had the capability to maintain multiple recovery points. In this blog post we’ll delve into “undo logs” – a brand new way for storing recovery points introduced in ... continue reading
Screenshot of the Create virtual machine blade

Azure Stack IaaS – part five

Self-service is core to Infrastructure-as-a-Service (IaaS). Back in the virtualization days, you had to wait for someone to create a VLAN for you, carve out a LUN, and find space on a host. If Microsoft Azure ran that way, we ... continue reading

How to deploy a VM template for PAW

First published on TECHNET on Nov 01, 2017 Continuing with the PAW series, after you followed the previous blog to build the PAW device, you can now deploy PAW VMs on it. There are two types of VMs you can ... continue reading

Shielded VMs – additional considerations when running a guarded fabric

First published on TECHNET on Apr 21, 2017 So you’ve deployed a guarded fabric and your VMs are running happily. Having now reached that perfect steady state, let's have a look at the operational and administrative differences relative to a ... continue reading

Step by Step: Shielding existing VMs without VMM

First published on TECHNET on Sep 01, 2016 Continuing on the topic of Shielded VMs from my last blog on creating shielded VMs, this blogpost will share my learnings from validating the scenario. This blogpost doesn't dive deep in terminologies ... continue reading
Step by Step - Shielded VM Recovery

Step by Step – Shielded VM Recovery

First published on TECHNET on Jun 07, 2016 Shielded VMs protect the data and state of a Virtual Machine against inspection, theft and tampering from malware and datacenter administrators and they do so both at rest and in-flight. One of ... continue reading

Step by step – Creating Shielded VMs without VMM

First published on TECHNET on Jun 06, 2016 Hi, I’m Jane, one of the newest members of the Windows Server Security Product Team. My very first hands-on experience is to deploy Shielded VMs with the minimum amount of hardware. It ... continue reading