Your Career
Training Marketplace

Questions? Call Toll-Free: 1-866-540-9677

Course ID: 252674

e-Learning Bundle

Microsoft Windows Server 2008 R2: Server Virtualization with Hyper-V - Part 2

When you register for training with, you are also supporting local education. Find out how.

  • Instant Access
    From Anywhere
  • Unlimited
  • 6-12 Months
    To Complete


When planning a virtual machine deployment within an enterprise environment where multiple virtual machines will be configured, creating each one from scratch can be time consuming. Creating reference machines and using sysprep is suitable for small to medium sized operations, however, in larger environments automating and managing the processes for provisioning virtual machines can be streamlined even further using SCVMM. Using the Administrator Console in SCVMM to generate a VM template allows the duplication and depersonalization tasks to be performed automatically. This course reviews the information required to deploy virtual machines in enterprise environments and explains the tools provided for provisioning virtual machines in medium and large environments.
  • match the virtual machine image creation method to its description
  • describe the process of cloning a VM
  • clone and deploy a virtual machine
  • describe the characteristics of virtual machine templates
  • sequence the steps to create a virtual machine template
  • add a Hyper-V host to Virtual Machine Manager
  • create a new hardware profile in Virtual Machine Manager
  • use VMM to create a new virtual machine using an existing hardware profile in a given scenario
  • use VMM to create a new virtual machine template in a given scenario
  • use the Self-Service Portal
  • use the SCVMM Admin Console to create a new user role in a given scenario
Virtual Machine (VM) snapshots enable you to revert a VM to a previous state. A Hyper-V snapshot contains all the state information for a running host VM and use differencing disk AVHD files that reference the original VHD and the memory state if the VM is running. When considering a backup strategy for a Hyper-V environment, you must consider the host OS partition, the host data partitions containing the VMs, and the contents of each hosted VM. System Center Data Protection Manager (DPM) 2010 is a streaming backup solution to offer continuous backup that’s part of the System Center suite of management tools. DPM remotely captures VSS images and streams them to a central disk repository. Hyper-V VM migrations are performed in System Center Virtual Machine Manager. Three basic migration types are available – network migration, quick migration and SAN migration. Live Migration is a new feature of Hyper-V R2. Live Migration avoids the downtime associated with other migration types by transferring the memory state over the network in real-time. This course describe how snapshots and backups enable VM recoverability to a previous good state. The various strategies exist to migrate a VM from one host to another, even with near zero downtime are also covered.
  • identify the characteristics of a Hyper-V snapshot
  • describe Hyper-V snapshot management tasks
  • identify the considerations for Hyper-V backup strategies
  • create a backup policy in a particular scenario using Windows Server Backup cmdlets
  • identify the considerations for System Center Data Protection Manager (DPM) 2010
  • recognize DPM server requirements
  • identify considerations for basic VMM migration types
  • identify the features of cluster shared volumes (CSV)
  • identify how CSV simplifies clustering |w for Hyper-V VMs
  • identify processor feature considerations for migration
  • identify considerations for managing virtual server components
Remote Desktop Services is a server role in Windows Server 2008 R2 that provides technologies that enable users to access Windows-based programs or a full Windows Desktops that are hosted on a Remote Desktop Session Host (RD Session Host) server. The remote services can be accessed from within a private network or over the Internet and allows you to centralize the management of your enterprise applications. It provides the mechanism to efficiently deploy and maintain software in an enterprise environment and since programs are installed on RD Session Host server or server farm and not on the client computer, programs are easier to upgrade and to maintain. An RD Session Host server is the server that hosts Windows-based programs or the full Windows desktop for Remote Desktop Services clients. It accepts incoming connections from multiple users and runs unique sessions to support those users as though each person had his or her own computer. The RD session hosts primary functions are to listen for incoming client connections, host sessions and apply computer settings. It will confirm that the user or computer making the connection has a license and log the user on. This course provides an overview of the functionality and features provided by Remote Desktop Services in Windows Server 2008 R2. It explains the different remote desktop server roles required to provide access to Windows based Applications and Desktops to remote users. This course also provides the information required to install and configure a Remote Desktop Session Host Server. Some of the client configuration and security options available for Remote Desktop Client connections are also detailed.
  • describe the features of Remote Desktop Session Hosts
  • match the features of remote desktop services to their descriptions
  • describe features of Remote Desktop Services
  • describe the process of installing a Remote Desktop Session Host Server
  • recognize how you can use the RD Session Host Configuration console to restrict users, configure temporary folders, and deny logons
  • identify how to use the RD Session Host Configuration console to configure license settings
  • identify how to use the RD Session Host Configuration console to configure RD IP virtualization and RD connection broker settings
  • configure remote desktop in a given scenario
  • describe the client configuration options available for Remote Desktop Client connections
  • describe the security options available for Remote Desktop Client connections
The different remote desktop service roles provide a wide range of functionality to remote clients and as a system administrator, it is important to understand the different service roles and their functionality. This course describes how these roles can provide access to a Virtualized desktop infrastructure. Providing Remote desktop securely over the internet via the remote desktop gateway and configuring licensing for remote desktop services is also covered.
  • recognize how to set up Microsoft Windows Server 2008 R2 to support Microsoft VDI
  • identify the new features of RD Web Access in Windows Server 2008 R2
  • describe how to set up VMs for remote access and create VM pools to work with Microsoft VDI
  • identify the options available for assigning personal desktops and configuring personal VMs to work with Microsoft VDI
  • identify characteristics of the RD Gateway role
  • identify the characteristics of the Remote Desktop Licensing role
As a system administrator, it is important to be able to monitor and manage the virtual environments. The System Center family of products can be used to manage and monitor medium- to large-scale Windows client and server products, including virtualized environments. System Center Operations Manager (SCOM) can monitor hosts and VMs against a set of performance metrics and raised issues and actions in Virtual Machine Manager (VMM) in the form of Performance and Resource Optimization (PRO) tips. PRO is a feature of System Center VMM which monitors and optimizes application performance in a virtualized environment. PRO links SCOM 2007 alerts with remedial actions in VMM. This course covers the mechanisms available to resource pool administrators to delegate control of their Hyper-V resources based upon roles within their organizations.
  • recognize how to integrate SCOM with VMM
  • identify the benefits of implementing performance and resource optimization
  • recognize how SCOM 2007 R2 is used to monitor and manage environments
  • identify the characteristics of Authorization Manager
  • assign a role definition to a group of users
  • describe how SCVMM implements role-based delegation

Join The 50,000+ Companies That Have Purchased Training from

  • 50K+ Companies Trained

    Including 90% Of Fortune 500 Companies Have Purchased Training With

  • 300K+ Courses & Videos

    Live Instructor-Led (Classroom & Virtual), Self-Paced E-learning & Custom OnSite Training Solutions From Leading Training Providers

  • 800+ Expert Instructors

    Industry-Leading Subject Matter Experts (SMEs).Tenured &
    Award-Winning Instructor Network

Get the latest industry news, recommended courses, & promotions from sent straight to your inbox.