Virtualization Forensics: Acquisition and analysis of a clustered VMware ESXi servers
|
|
|
- Terence Howard
- 10 years ago
- Views:
Transcription
1 Virtualization Forensics: Acquisition and analysis of a clustered VMware ESXi servers Dennis Cortjens [email protected] PLAN 28th of February, 2014 Contents 1 Information Introduction Problem Position Questions Main Sub Goal Scope
2 1 Information 1 1 Information 1.1 Introduction Virtualization plays an important role in the world of IT. In enterprise IT infrastructures it has proven to be very efficient and cost effective. It reduces the amount of physical servers needed for the IT demand and with that the need for large energy consuming data centres. In IT there are different forms of virtualization, but the well-known is the virtual machine. Simply described as a system within a system. It is often used for virtualizing operating systems and the is quite some software for this. This software can be divided in native (type 1) and hosted (type 2) hypervisors or virtual machine managers. A native hypervisor runs directly on the hardware as a virtual machine operating system, where a hosted hypervisor is a virtual machine application on a operating system. The well-known native (type 1) hypervisors are: Microsoft Hyper-V Server Oracle VM Server (Xen based) VMware ESXi The well-known hosted (type 2) hypervisors are: Kernel-based Virtual Machine (KVM) Microsoft Windows Virtual PC Oracle VirtualBox VMware Fusion VMware Workstation Xen Some of these hypervisors can be clustered, distributing and sharing virtual machines and storage across the IT infrastructure. 1.2 Problem Over the last years virtualization has become increasingly popular. A lot of companies (small business and enterprise) adopted virtualization with the use of virtual machines in their IT infrastructure and even for personal use it is very popular. However, the world of digital forensics seems a little bit slow in this matter. It has been researched and documented, but not extensively. There are some books available with general knowledge about the workings of virtualization, but not on how to acquire and analyse it. Especially when it comes to the acquisition and analysis of large clusters of hypervisors with virtual machines and storage distributed across IT infrastructures. ESXi is the widely adopted virtualization architecture by industry-leading virtualization software company VMware. Multiple ESXi servers can be clustered to distribute and share virtual machine and storage. Therefore it is adopted by a lot of companies as an efficient and cost effective solution for IT infrastructures. Besides that, ESXi is freely available and can be (mis)used for personal, small business and enterprise use. With that the chance of computer crime experts and digital forensic investigators running into such systems has also increased. This is noticeable by a significant increase of searches at large data centres and running into clustered VMware ESXi servers last year (2013). A study into the acquisition and analysis of clustered VMware ESXi servers can provide a first guide line for computer crime experts and digital forensic investigators running into such situations.
3 1.3 Position Position A literature study on the forensic acquisition and analysis of clustered VMware ESXi servers resulted in no information to that specific subject. However, there were a book, thesis and blog article related to the subject. In 2010 Diane Barrett and Gregory Kipper wrote a (guide) book on virtual environments for digital forensic investigators. They describe virtualization in high detail. Even the acquisition and analysis of virtual environments, but from a desktop application perspective and not from a (clustered) hypervisor server perspective [1]. At the time of writing the book this wasn t a well-known and popular solution yet. The book is somewhat outdated, but a good basis and reference for this research. It is a good book on virtualization forensics and a must have for all computer crime experts and digital forensic investigators with a specialization in this subject. In 2011 Manish Hirwani researched the forensic analysis of VMware virtual hard disks and wrote a thesis about it. He describes the acquisition and analysis of VMware virtual disks using AccesData s Forensic ToolKit, FTK Imager and Guidance Software s EnCase [2]. The VMware virtual disk (VMDK) is still used within all of VMware s product, similarly the VMware ESXi architecture. Nowadays there is full support for the VMDK format in the last versions of the mentioned forensic software. The thesis is somewhat outdated, but still a good basis and reference for this research. In 2013 Phil Hagen wrote a article on his blog about VMware snapshots. He describes the calculation of snapshot creation times from the snapshot meta file (VMSD) with a python script (code published in the article). There is also a very good comment on this article with some links to software tools for analysing VMware snapshots and even the memory part of these snapshots [3]. This will be very useful for the analysis part of this research. 1.4 Questions Main How can clustered VMware ESXi servers be acquired and analysed in a forensic sound way within the least amount of time? Sub The main question is researched with the following sub questions: 1. How does VMware ESXi works? 2. What are the forensic artefacts of VMware ESXi? 3. How does a VMware ESXi cluster works? 4. What can be distributed within a cluster? 5. What are the additional forensic artefacts of a cluster? 6. What is the forensic and best way to freeze the virtual machines? 7. What is the forensic and fastest way of acquiring the virtual machines? 8. How can a cluster configuration be analysed? 1.5 Goal The goals are set by the following sub questions: How does VMware ESXi works? Determine the workings of VMware ESXi. What are the forensic artefacts of VMware ESXi? Determine the forensic artefacts of of VMware ESXi. How does a VMware ESXi cluster works? Determine the workings of a VMware ESXi cluster. What can be distributed within a cluster? Determine what can be distribute and shared within a VMware ESXi cluster.
4 1.6 Scope 3 What are the additional forensic artefacts of a cluster? Determine the additional forensic artefacts of a VMware ESXi cluster (if different). What is the forensic and best way to freeze the virtual machines? Determine the forensic and best way to freeze a virtual machine running on VMware ESXi. Forensic way above best way! What is the forensic and fastest way of acquiring the virtual machines? Determine the forensic and best way to acquire a virtual machine on VMware ESXi. This will be measured by the time difference in acquiring the virtual machine over the IT network and acquiring the full hard disk drive of the VMware ESXi servers. Forensic way above fastest way! How can a cluster configuration be analysed? Determine how the full cluster can analysed using (forensic) software. 1.6 Scope This project is limited by the following scope: It focuses on being usable for the investigation of large scale IT infrastructures; The test environment cluster will consist of 3 physical servers (representable for large scale IT infrastructures, concept stays the same); It focuses on forensic value and validity; It focuses on version 5.5 of VMware ESXi; The measurement will be primary based on time, but speed will be mentioned; It will provide a first guide line for acquiring and analysing (clustered) VMware ESXi environments.
5 REFERENCES 4 References [1] Diane Barrett and Gregory Kipper, Virtualization and Forensics, [2] Manish Hirwani, Forensic Analysis of VMware Hard Disks, [3] Phil Hagen s Scratch Pad: VMware Snapshot Forensics, vmware-snapshot-forensics/, 20th of March List of Figures List of Tables
IOS110. Virtualization 5/27/2014 1
IOS110 Virtualization 5/27/2014 1 Agenda What is Virtualization? Types of Virtualization. Advantages and Disadvantages. Virtualization software Hyper V What is Virtualization? Virtualization Refers to
Installing & Using KVM with Virtual Machine Manager COSC 495
Installing & Using KVM with Virtual Machine Manager COSC 495 1 Abstract:. There are many different hypervisors and virtualization software available for use. One commonly use hypervisor in the Linux system
Virtualization and Forensics
Virtualization and Forensics A Digital Forensic Investigator's Guide to Virtual Environments Diane Barrett Gregory Kipper Technical Editor Samuel Liles ELSEVIER AMSTERDAM BOSTON HEIDELBERG LONDON NEWYORK
Anh Quach, Matthew Rajman, Bienvenido Rodriguez, Brian Rodriguez, Michael Roefs, Ahmed Shaikh
Anh Quach, Matthew Rajman, Bienvenido Rodriguez, Brian Rodriguez, Michael Roefs, Ahmed Shaikh Introduction History, Advantages, Common Uses OS-Level Virtualization Hypervisors Type 1 vs. type 2 hypervisors
Hypervisor Software and Virtual Machines. Professor Howard Burpee SMCC Computer Technology Dept.
Hypervisor Software and Virtual Machines Learning Objectives Understand the common features of today s desktop virtualization products Select and implement a desktop virtualization option on a Linux, Mac,
Definitions. Hardware Full virtualization Para virtualization Hosted hypervisor Type I hypervisor. Native (bare metal) hypervisor Type II hypervisor
Virtualization Objectives Definitions Why Problems Versions Virtualization vs Cloud Creating a New Virtual Machine Working with a Virtual Machine Virtual Machine Settings Virtual Machine Snapshots Definitions
Forensic Acquisition and Analysis of VMware Virtual Hard Disks
Forensic Acquisition and Analysis of VMware Virtual Hard Disks Manish Hirwani, Yin Pan, Bill Stackpole and Daryl Johnson Networking, Security and Systems Administration Rochester Institute of Technology
A cure for Virtual Insanity: A vendor-neutral introduction to virtualization without the hype
A cure for Virtual Insanity: A vendor-neutral introduction to virtualization without the hype Tim Hall Oracle ACE Director Oracle ACE of the Year 2006 OakTable Network OCP DBA (7, 8, 8i, 9i, 10g, 11g)
The Do s and Don ts of Server Virtualization Back to basics tips for Australian IT professionals
The Do s and Don ts of Server Virtualization Back to basics tips for Australian IT professionals Virtualization is a well-established in today s IT environments, but it still remains a top priority among
Virtualization with Windows
Virtualization with Windows at CERN Juraj Sucik, Emmanuel Ormancey Internet Services Group Agenda Current status of IT-IS group virtualization service Server Self Service New virtualization features in
Comparing Free Virtualization Products
A S P E I T Tr a i n i n g Comparing Free Virtualization Products A WHITE PAPER PREPARED FOR ASPE BY TONY UNGRUHE www.aspe-it.com toll-free: 877-800-5221 Comparing Free Virtualization Products In this
Virtualization & Cloud Computing (2W-VnCC)
Virtualization & Cloud Computing (2W-VnCC) DETAILS OF THE SYLLABUS: Basics of Networking Types of Networking Networking Tools Basics of IP Addressing Subnet Mask & Subnetting MAC Address Ports : Physical
Wishful Thinking vs. Reality in Regards to Virtual Backup and Restore Environments
NOVASTOR WHITE PAPER Wishful Thinking vs. Reality in Regards to Virtual Backup and Restore Environments Best practices for backing up virtual environments Published by NovaStor Table of Contents Why choose
2) Xen Hypervisor 3) UEC
5. Implementation Implementation of the trust model requires first preparing a test bed. It is a cloud computing environment that is required as the first step towards the implementation. Various tools
Implementing and Managing Windows Server 2008 Hyper-V
Course 6422A: Implementing and Managing Windows Server 2008 Hyper-V Length: 3 Days Language(s): English Audience(s): IT Professionals Level: 300 Technology: Windows Server 2008 Type: Course Delivery Method:
6422: Implementing and Managing Windows Server 2008 Hyper-V (3 Days)
www.peaklearningllc.com 6422: Implementing and Managing Windows Server 2008 Hyper-V (3 Days) Introduction This three-day instructor-led course teaches students how to implement and manage Windows Server
AN INTRODUCTION TO SERVER VIRTUALIZATION
AN INTRODUCTION TO SERVER VIRTUALIZATION It s green. It s flexible. It s cost effective. It s virtualization. A publication of IT Cloud design by Paul Philippe Berthelon Bravo from The Noun Project CONTENTS:
In addition to their professional experience, students who attend this training should have technical knowledge in the following areas.
6422A - Implementing and Managing Windows Server 2008 Hyper-V Course Number: 6422A Course Length: 3 Days Course Overview This three-day instructor-led course teaches students how to implement and manage
Week Overview. Installing Linux Linux on your Desktop Virtualization Basic Linux system administration
ULI101 Week 06b Week Overview Installing Linux Linux on your Desktop Virtualization Basic Linux system administration Installing Linux Standalone installation Linux is the only OS on the computer Any existing
Introduction to Virtualization
Høgskolen i Telemark Telemark University College Department of Electrical Engineering, Information Technology and Cybernetics Introduction to Virtualization Hans- Petter Halvorsen, 2013.11.27 Faculty of
2010 Virtualization and Cloud Computing Survey
SPECIAL REPORT Executive Summary... 2 Introduction... 3 Methodology... 3 Sample... 3 About Zenoss, Inc.... 3 2010 Virtualization and Cloud Computing Usage... 4 2010 Virtualization and Cloud Computing Survey
Virtualization for Cloud Computing
Virtualization for Cloud Computing Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF CLOUD COMPUTING On demand provision of computational resources
Virtualization Technologies. Embrace the new world of healthcare
Virtualization Technologies Embrace the new world of healthcare Overview Introduction and Virtualization Basics Core Virtualization Technologies Enterprise Server Virtualization Solutions End User and
13.1 Backup virtual machines running on VMware ESXi / ESX Server
13 Backup / Restore VMware Virtual Machines Tomahawk Pro This chapter describes how to backup and restore virtual machines running on VMware ESX, ESXi Server or VMware Server 2.0. 13.1 Backup virtual machines
Virtual Computing and VMWare. Module 4
Virtual Computing and VMWare Module 4 Virtual Computing Cyber Defense program depends on virtual computing We will use it for hands-on learning Cyber defense competition will be hosted on a virtual computing
RUNNING vtvax FOR WINDOWS
RUNNING vtvax FOR WINDOWS IN A AVT / Vere Technologies TECHNICAL NOTE AVT/Vere Technical Note: Running vtvax for Windows in a Virtual Machine Environment Document Revision 1.1 (September, 2015) 2015 Vere
Security. Environments. Dave Shackleford. John Wiley &. Sons, Inc. s j}! '**»* t i j. l:i. in: i««;
Security N Environments '' J J H -. i ^ s j}! Dave Shackleford '**»* t i j i««; l:i in: John Wiley &. Sons, Inc. Contents Introduction.. : xix Chapter l Fundamentals of Virtualization Security Virtualization
Virtualization and Disaster Recovery
Virtualization and Disaster Recovery Ray Trygstad Director of Information Technology, Associate Director, Information Technology & Management Degrees Illinois Institute of Technology NetSecure 09 March
Trusteer Rapport Virtual Implementation Scenarios
Trusteer Rapport Virtual Implementation Scenarios Technical White Paper Version 1.0 October 2012 new threats, new thinking Contents About this Document 1 1. Overview of Virtual Desktop/Machine Environments
Outline. Introduction Virtualization Platform - Hypervisor High-level NAS Functions Applications Supported NAS models
1 2 Outline Introduction Virtualization Platform - Hypervisor High-level NAS Functions Applications Supported NAS models 3 Introduction What is Virtualization Station? Allows users to create and operate
Installing Windows On A Macintosh Or Linux Using A Virtual Machine
Installing Windows On A Macintosh Or Linux Using A Virtual Machine At Shaw Programs, the software we develop is made using Microsoft Access. As with all Microsoft Software it requires Windows in order
CPET 581 Cloud Computing: Technologies and Enterprise IT Strategies. Virtualization of Clusters and Data Centers
CPET 581 Cloud Computing: Technologies and Enterprise IT Strategies Lecture 4 Virtualization of Clusters and Data Centers Text Book: Distributed and Cloud Computing, by K. Hwang, G C. Fox, and J.J. Dongarra,
Download Virtualization Software Download a Linux-based OS Creating a Virtual Machine using VirtualBox: VM name
Download Virtualization Software You will first need to download and install a virtualization product. This will allow you to create a virtual machine which you can install a Linux distribution on. I recommend
Acronis Backup Product Line
New Generation Data Protection Powered by Acronis AnyData Technology Acronis Backup Product Line Speaker name Introducing Acronis Backup Acronis Backup Target: Smaller environments, home office, remote
Onboarding VMs to Cisco OpenStack Private Cloud
White Paper Onboarding VMs to Cisco OpenStack Private Cloud This white paper will explain the process for exporting existing virtual machines from either VMware vsphere or AWS EC2 into Cisco OpenStack
MS-6422A - Implement and Manage Microsoft Windows Server Hyper-V
MS-6422A - Implement and Manage Microsoft Windows Server Hyper-V Table of Contents Introduction Audience At Completion Prerequisites Microsoft Certified Professional Exams Student Materials Outline Introduction
RED HAT ENTERPRISE VIRTUALIZATION
Giuseppe Paterno' Solution Architect Jan 2010 Red Hat Milestones October 1994 Red Hat Linux June 2004 Red Hat Global File System August 2005 Red Hat Certificate System & Dir. Server April 2006 JBoss April
Virtualization and Other Tricks.
Virtualization and Other Tricks. Pavel Parízek, Tomáš Kalibera, Peter Libič DEPARTMENT OF DISTRIBUTED AND DEPENDABLE SYSTEMS http://d3s.mff.cuni.cz CHARLES UNIVERSITY PRAGUE Faculty of Mathematics and
Vocera Voice 4.3 and 4.4 Server Sizing Matrix
Vocera Voice 4.3 and 4.4 Server Sizing Matrix Vocera Server Recommended Configuration Guidelines Maximum Simultaneous Users 450 5,000 Sites Single Site or Multiple Sites Requires Multiple Sites Entities
CSE 501 Monday, September 09, 2013 Kevin Cleary [email protected]
CSE 501 Monday, September 09, 2013 Kevin Cleary [email protected] What is Virtualization? Practical Uses What can be virtualized Popular virtualization products Demo Question, answer, discussion Can
Course Syllabus. Implementing and Managing Windows Server 2008 Hyper-V. Key Data. Audience. At Course Completion. Prerequisites
Course Syllabus Implementing and Managing Windows Server 2008 Hyper-V Key Data Product #: 3961 Elements of this syllabus are subject to change. This three-day instructor-led course teaches students how
SCO Virtualization Presentation to Customers
SCO Virtualization Presentation to Customers 1 Content Virtualization An Overview Short introduction including key benefits Additional virtualization information from SCO Additional information about Virtualization
Comparing Virtualization Technologies
CHAPTER 2 Comparing Virtualization Technologies With this chapter, we begin our exploration of several popular virtualization strategies and explain how each works. The aim is to bring you the operational
TechTarget Windows Media
TechTarget Windows Media SearchWinIT.com SearchExchange.com SearchSQLServer.com SearchEnterpriseDesktop.com SearchWindowsServer.com SearchDomino.com LabMice.net E-Guide Hyper-V: What you need to know before
Open Source Mainframe Backup with Hercules
Open Source Mainframe Backup with Hercules An Overview of the Hercules Disaster Recovery Solution 1 Issue: Mainframe Computer Backup Why? Business Need stay in business 60% of all organizations that have
Setting up Windows Phone 8 environment in VMWare
Setting up Windows Phone 8 environment in VMWare Pre Requisites Windows Phone 8 SDK is only supported with 64-bit Windows 8 Pro or higher. VMware player 5.0.1 or workstation 9. ( The Hypervisor is not
Server and Storage Virtualization. Virtualization. Overview. 5 Reasons to Virtualize
Server and Storage Virtualization. Overview Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] These slides and audio/video recordings of this class lecture are at:
VMware Server 2.0 Essentials. Virtualization Deployment and Management
VMware Server 2.0 Essentials Virtualization Deployment and Management . This PDF is provided for personal use only. Unauthorized use, reproduction and/or distribution strictly prohibited. All rights reserved.
VIRTUALIZATION 101. Brainstorm Conference 2013 PRESENTER INTRODUCTIONS
VIRTUALIZATION 101 Brainstorm Conference 2013 PRESENTER INTRODUCTIONS Timothy Leerhoff Senior Consultant TIES 21+ years experience IT consulting 12+ years consulting in Education experience 1 THE QUESTION
Intro to Virtualization
Cloud@Ceid Seminars Intro to Virtualization Christos Alexakos Computer Engineer, MSc, PhD C. Sysadmin at Pattern Recognition Lab 1 st Seminar 19/3/2014 Contents What is virtualization How it works Hypervisor
System Requirements Guide
SAP Business One PUBLIC System Requirements Guide SAP Business One Applicable Release: All Releases as of SAP Business One 2007 and higher All Countries English December 2011 SUPPORTED PLATFORMS OVERVIEW
Product Brief. it s Backed Up
Product Brief it s Backed Up IT Authorities, Inc. 1/11/2010 Table of Contents Contents Table of Contents... 2 it s Backed Up... 3 Backup... 3 Backup, Continued... 4 Backup, Continued... 5 Application Aware
Deploying and Managing Microsoft System Center Virtual Machine Manager
Deploying and Managing Microsoft System Center Virtual Machine Manager Overview About this Course This three-day instructor-led course teaches students how to implement a Microsoft System Center Virtual
9/26/2011. What is Virtualization? What are the different types of virtualization.
CSE 501 Monday, September 26, 2011 Kevin Cleary [email protected] What is Virtualization? What are the different types of virtualization. Practical Uses Popular virtualization products Demo Question,
Chapter 16: Virtual Machines. Operating System Concepts 9 th Edition
Chapter 16: Virtual Machines Silberschatz, Galvin and Gagne 2013 Chapter 16: Virtual Machines Overview History Benefits and Features Building Blocks Types of Virtual Machines and Their Implementations
Performance Comparison of VMware and Xen Hypervisor on Guest OS
ISSN: 2393-8528 Contents lists available at www.ijicse.in International Journal of Innovative Computer Science & Engineering Volume 2 Issue 3; July-August-2015; Page No. 56-60 Performance Comparison of
Running vtserver in a Virtual Machine Environment. Technical Note. 2015 by AVTware
Running vtserver in a Virtual Machine Environment Technical Note 2015 by AVTware Table of Contents 1. Scope... 3 1.1. Introduction... 3 2. General Virtual Machine Considerations... 4 2.1. The Virtualization
Making a Smooth Transition to a Hybrid Cloud with Microsoft Cloud OS
Making a Smooth Transition to a Hybrid Cloud with Microsoft Cloud OS Transitioning from today s highly virtualized data center environments to a true cloud environment requires solutions that let companies
Microsoft Windows Server 2008: MS-6422 Implementing and Managing Hyper V Virtualization 6422
coursemonster.com/us Microsoft Windows Server 2008: MS-6422 Implementing and Managing Hyper V Virtualization 6422 View training dates» Overview This three day instructor led course teaches students how
Professional Xen Visualization
Professional Xen Visualization William von Hagen WILEY Wiley Publishing, Inc. Acknowledgments Introduction ix xix Chapter 1: Overview of Virtualization : 1 What Is Virtualization? 2 Application Virtualization
PRIVATE CLOUD PLATFORM OPTIONS. Stephen Lee CEO, ArkiTechs Inc.
PRIVATE CLOUD PLATFORM OPTIONS Stephen Lee CEO, ArkiTechs Inc. WHAT IS THE CLOUD? Virtualization? Virtualization hosted by someone else? NIST DEFINITION (SP 800-145) Cloud computing is a model for enabling
Software to Simplify and Share SAN Storage Sanbolic s SAN Storage Enhancing Software Portfolio
Software to Simplify and Share SAN Storage Sanbolic s SAN Storage Enhancing Software Portfolio www.sanbolic.com Table of Contents About Sanbolic... 3 Melio File System... 3 LaScala Volume Manager... 3
ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy
ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy OVERVIEW The global communication and the continuous growth of services provided through the Internet or local infrastructure require to
Learn the Essentials of Virtualization Security
Learn the Essentials of Virtualization Security by Dave Shackleford by Dave Shackleford This paper is the first in a series about the essential security issues arising from virtualization and the adoption
OpenStack Cloud Migration:
OpenStack Cloud Migration: Cloud Migration from VMware to OpenStack July 07, 2015 DONGJOON MIN ISA TECHNOLOGIES,INC. [email protected] 1 Table of Contents Executive Summary.. 3 What is V2C Cloud Migration..
Using SUSE Cloud to Orchestrate Multiple Hypervisors and Storage at ADP
Using SUSE Cloud to Orchestrate Multiple Hypervisors and Storage at ADP Agenda ADP Cloud Vision and Requirements Introduction to SUSE Cloud Overview Whats New VMWare intergration HyperV intergration ADP
Full and Para Virtualization
Full and Para Virtualization Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF x86 Hardware Virtualization The x86 architecture offers four levels
How bare-metal client hypervisors will mean the end of agent-based Windows management
How bare-metal client hypervisors will mean the end of agent-based Windows management Abstract... 2 Understanding the old (current?) way of managing desktops.... 2 How do companies manage desktops currently?...
Server Virtualization and Consolidation
Server Virtualization and Consolidation An Ideal cost effective solution to maximize your Return on Investment of your organization's hardware infrastructure It is quit evident today that Business owners,
Best Practices for Virtualised SharePoint
Best Practices for Virtualised SharePoint Brendan Law [email protected] @FlamerNZ Flamer.co.nz/spag/ Nathan Mercer [email protected] @NathanM blogs.technet.com/nmercer/ Agenda Why Virtualise? Hardware
Virtualization. Pradipta De [email protected]
Virtualization Pradipta De [email protected] Today s Topic Virtualization Basics System Virtualization Techniques CSE506: Ext Filesystem 2 Virtualization? A virtual machine (VM) is an emulation
Outline SSS6422 - Microsoft Windows Server 2008 Hyper-V Virtualization
Outline SSS6422 - Microsoft Windows Server 2008 Hyper-V Virtualization Duration: Three consecutive Saturdays About this Course This instructor led course teaches students how to implement and manage Windows
How To Image A Single Vm For Forensic Analysis On Vmwarehouse.Com
MCP+I, MCSE, CCSA, CCSE, CISSP-ISSAP, CISM, CISA, CIFI, CCE, ACE, GCFE, GCFA, GSEC, VCP4/5, vexpert Senior SANS Instructor - [email protected] 1 A Lot To Cover In ½ An Hour We simply can not cover all cloud
Sanbolic s SAN Storage Enhancing Software Portfolio
Software to Simplify and Share SAN Storage Sanbolic s SAN Storage Enhancing Software Portfolio Overview of Product Suites www.sanbolic.com Version 2.0 Page 2 of 10 Contents About Sanbolic... 3 Sanbolic
Efficient Load Balancing using VM Migration by QEMU-KVM
International Journal of Computer Science and Telecommunications [Volume 5, Issue 8, August 2014] 49 ISSN 2047-3338 Efficient Load Balancing using VM Migration by QEMU-KVM Sharang Telkikar 1, Shreyas Talele
Disaster Recovery Infrastructure
Disaster Recovery Infrastructure An Ideal cost effective solution to protect your organizations critical IT infrastructure with business continuity. Organization's IT infrastructure usually evolves with
Server and Storage Virtualization
Server and Storage Virtualization. Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] These slides and audio/video recordings of this class lecture are at: 7-1 Overview
Virtualization: What does it mean for SAS? Karl Fisher and Clarke Thacher, SAS Institute Inc., Cary, NC
Paper 347-2009 Virtualization: What does it mean for SAS? Karl Fisher and Clarke Thacher, SAS Institute Inc., Cary, NC ABSTRACT SAS groups virtualization into four categories: Hardware Virtualization,
Tenable Webcast Summary Managing Vulnerabilities in Virtualized and Cloud-based Deployments
Tenable Webcast Summary Managing Vulnerabilities in Virtualized and Cloud-based Deployments Introduction Server virtualization and private cloud services offer compelling benefits, including hardware consolidation,
Installing ModelRisk on Macintosh A quick start guide. Vose Software
Installing ModelRisk on Macintosh A quick start guide Vose Software Contents 1 Introduction 2 2 Method 1: Boot Camp 3 2.1 Installing ModelRisk using Boot Camp.................... 4 3 Method 2: Virtualization
How to Install the VMware ESXi Hypervisor on Physical Hardware
How to Install the VMware ESXi Hypervisor on Physical Hardware I am not responsible for your actions or their outcomes, in any way, while reading and/or implementing this tutorial. I will not provide support
Making Data Security The Foundation Of Your Virtualization Infrastructure
Making Data Security The Foundation Of Your Virtualization Infrastructure by Dave Shackleford hytrust.com Cloud Under Control P: P: 650.681.8100 Securing data has never been an easy task. Its challenges
VMware vsphere: Install, Configure, Manage [V5.0]
VMware vsphere: Install, Configure, Manage [V5.0] Gain hands-on experience using VMware ESXi 5.0 and vcenter Server 5.0. In this hands-on, VMware -authorized course based on ESXi 5.0 and vcenter Server
The Xen of Virtualization
The Xen of Virtualization Assignment for CLC-MIRI Amin Khan Universitat Politècnica de Catalunya March 4, 2013 Amin Khan (UPC) Xen Hypervisor March 4, 2013 1 / 19 Outline 1 Introduction 2 Architecture
How To Get The Most Out Of Redhat.Com
RED HAT ENTERPRISE VIRTUALIZATION AND CLOUD STRATEGY Aram Kananov EMEA Product Marketing Manager Platform and Cloud Business Units Red Hat 1 RED HAT BRINGS COMMUNITY, VENDORS, USERS TOGETHER 2 RED HAT
FAQ. NetApp MAT4Shift. March 2015
i FAQ NetApp MAT4Shift March 2015 TABLE OF CONTENTS 1 General... 3 1.1 Solution Overview...3 What is NetApp MAT4Shift?... 3 What business needs does this solution address?... 3 What is the value of the
Digital Forensics. Tom Pigg Executive Director Tennessee CSEC
Digital Forensics Tom Pigg Executive Director Tennessee CSEC Definitions Digital forensics Involves obtaining and analyzing digital information as evidence in civil, criminal, or administrative cases Analyze
How to create a Virtual machine from a Macrium image backup
ImgToVhd is a utility that creates VHD files from Macrium backup images. These can then be used to create a bootable virtual machine facilitating quick access to a failed machine whose repair would be
MANAGING PRINT SERVER DEVICES WITH "WINDOWS XP" VIRTUAL MACHINES
MANAGING PRINT SERVER DEVICES WITH "WINDOWS XP" VIRTUAL MACHINES Summary: You can install and configure older print server devices by running the "Windows XP"-only proprietary configuration software utilities
Virtualization and the U2 Databases
Virtualization and the U2 Databases Brian Kupzyk Senior Technical Support Engineer for Rocket U2 Nik Kesic Lead Technical Support for Rocket U2 Opening Procedure Orange arrow allows you to manipulate the
Reader s Choice Preferred product
PHD Virtual Technologies Reader s Choice Preferred product Sample Customer by Vertical Financial & Services Retail, Manufacturing & Healthcare Technology & Electronics Government Education Managed Service
