Microsoft Virtualization. Master Microsoft Server, Desktop, Application, and Presentation Virtualization



Similar documents
(VCP-310)

Configuring Additional Active Directory Server Roles

Domain 1: Identifying Cause of and Resolving Desktop Application Issues Identifying and Resolving New Software Installation Issues

BaanERP. BaanERP Windows Client Installation Guide

Domain 1: Configuring Domain Name System (DNS) for Active Directory

Baan Service Master Data Management

IT Support n n support@premierchoiceinternet.com. 30 Day FREE Trial. IT Support from 8p/user

Engineering Data Management

Ideate, Inc. Training Solutions to Give you the Leading Edge

Security Functions and Purposes of Network Devices and Technologies (SY0-301) Firewalls. Audiobooks

leasing Solutions We make your Business our Business

ODBC. Getting Started With Sage Timberline Office ODBC

E-Plex Enterprise Access Control System

Authentication - Access Control Default Security Active Directory Trusted Authentication Guest User or Anonymous (un-authenticated) Logging Out

Domain 1: Designing a SQL Server Instance and a Database Solution

ContactPro Desktop for Multi-Media Contact Center

On-Premise CRM to Salesforce Migration - Benefits, Challenges and Best Practices

TruStore: The storage. system that grows with you. Machine Tools / Power Tools Laser Technology / Electronics Medical Technology

Optimize your Network. In the Courier, Express and Parcel market ADDING CREDIBILITY

Making training work for your business

Agenda. Outsourcing and Globalization in Software Development. Outsourcing. Outsourcing here to stay. Outsourcing Alternatives

QUADRO tech. PST Flightdeck. Put your PST Migration on autopilot

CCH Accountants Starter Pack

HP Asset Manager. Software version: Service Asset and Configuration Management

3G Security VoIP Wi-Fi IP Telephony Routing/Switching Unified Communications. NetVanta. Business Networking Solutions

Domain 1 Components of the Cisco Unified Communications Architecture

Digital Enterprise Unit. White Paper. Web Analytics Measurement for Responsive Websites

Professional Networking

An Approach to Fusion CRM Adoption

A guide to School Employees' Well-Being

Business Process Services. White Paper. Smart Ways to Implement Smart Meters: Using Analytics for Actionable Insights and Optimal Rollout

Document Control Solutions

CREATIVE MARKETING PROJECT 2016

AGC s SUPERVISORY TRAINING PROGRAM

FortiGuard Fortinet s Global Security Research and Protection

To c o m p e t e in t o d a y s r e t a i l e n v i r o n m e n t, y o u n e e d a s i n g l e,

Conversion Instructions:

iprox sensors iprox inductive sensors iprox programming tools ProxView programming software iprox the world s most versatile proximity sensor

Skytron Asset Manager

client communication

Supply Chain Management

Packages: Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y N Y Y N Y Y N Y Y N Y Y N Y Y N Y Y N Y Y N Y Y

Diploma in Secretarial Administration

Radio Dispatch Systems

PUBLIC RELATIONS PROJECT 2016

Enhancing Oracle Business Intelligence with cubus EV How users of Oracle BI on Essbase cubes can benefit from cubus outperform EV Analytics (cubus EV)

QUADRO tech. FSA Migrator 2.6. File Server Migrations - Made Easy

The Canadian Council of Professional Engineers

Flood Emergency Response Plan

InventoryControl. The Complete Inventory Tracking Solution for Small Businesses

Desktop Management. Desktop Management Tools

Enterprise Security & Risk Management. White Paper. Securing the Future with Next-Generation Data Center Security

IntelliSOURCE Comverge s enterprise software platform provides the foundation for deploying integrated demand management programs.

INVESTMENT PERFORMANCE COUNCIL (IPC) Guidance Statement on Calculation Methodology

Agency Relationship Optimizer

Wells Fargo Insurance Services Claim Consulting Capabilities

Securing the Virtualized Data Center with Next-Generation Firewalls

A Balanced Scorecard

June 3, Voice over IP

Advancement FORUM. CULTIVATING LEADERS IN CASE MANAGEMENT

Assessment of the Board

*The most important feature of MRP as compared with ordinary inventory control analysis is its time phasing feature.

A GUIDE TO BUILDING SMART BUSINESS CREDIT

RightFax Express. One solution. Multiple choices.

A Guide to Better Postal Services Procurement. A GUIDE TO better POSTAL SERVICES PROCUREMENT

Evaluating Model for B2C E- commerce Enterprise Development Based on DEA

e-trader user guide Introduction

Software Engineering Guest Lecture, University of Toronto

Introducing Rational Suite

For customers Key features of the Guaranteed Pension Annuity

How To Write A Privacy Policy For A Busiess

Harnessing Natural and Human Capital

Domain 1 - Describe Cisco VoIP Implementations

Verizon Wireless Broadband Network Connectivity and Data Transport Solutions. Verizon Wireless White Paper

Preserving Your Financial Legacy with Life Insurance Premium Financing.

Enable Compliance, Quality, and Efficiency in Your Safety Operations with Oracle Argus

Telecom. White Paper. Prioritizing Mice Flows in Software Defined Networks for Enhanced Monetization and User Experience

CHAPTER 3 THE TIME VALUE OF MONEY

Mobile CE App Development

Transcription:

Microsoft Virtualizatio Master Microsoft Server, Desktop, Applicatio, ad Presetatio Virtualizatio

Microsoft Virtualizatio Master Microsoft Server, Desktop, Applicatio, ad Presetatio Virtualizatio Thomas Olzak Jaso Boomer Robert M. Keefer James Sabovik Keeth Majors, Techical Editor AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO Sygress is a imprit of Elsevier

Sygress is a imprit of Elsevier 30 Corporate Drive, Suite 400, Burligto, MA 01803, USA Liacre House, Jorda Hill, Oxford OX2 8DP, UK Microsoft Virtualizatio: Master Microsoft Server, Desktop, Applicatio, ad Presetatio Virtualizatio # 2010 ELSEVIER Ic. All rights reserved. No part of this publicatio may be reproduced or trasmitted i ay form or by ay meas, electroic or mechaical, icludig photocopyig, recordig, or ay iformatio storage ad retrieval system, without permissio i writig from the publisher. Details o how to seek permissio, further iformatio about the Publisher s permissios policies ad our arragemets with orgaizatios such as the Copyright Clearace Ceter ad the Copyright Licesig Agecy, ca be foud at our website: www.elsevier.com/permissios. This book ad the idividual cotributios cotaied i it are protected uder copyright by the Publisher (other tha as may be oted herei). Notices Kowledge ad best practice i this field are costatly chagig. As ew research ad experiece broade our uderstadig, chages i research methods, professioal practices, or medical treatmet may become ecessary. Practitioers ad researchers must always rely o their ow experiece ad kowledge i evaluatig ad usig ay iformatio, methods, compouds, or experimets described herei. I usig such iformatio or methods they should be midful of their ow safety ad the safety of others, icludig parties for whom they have a professioal resposibility. To the fullest extet of the law, either the Publisher or the authors, cotributors, or editors, assume ay liability for ay ijury ad/or damage to persos or property as a matter of products liability, egligece or otherwise, or from ay use or operatio of ay methods, products, istructios, or ideas cotaied i the material herei. Library of Cogress Catalogig-i-Publicatio Data Applicatio submitted British Library Cataloguig-i-Publicatio Data A catalogue record for this book is available from the British Library. ISBN: 978-1-59749-431-1 Prited i the Uited States of America 10 11 12 13 14 10 9 8 7 6 5 4 3 2 1 Elsevier Ic., the author(s), ad ay perso or firm ivolved i the writig, editig, or productio (collectively Makers ) of this book ( the Work ) do ot guaratee or warrat the results to be obtaied from the Work. For iformatio o rights, traslatios, ad bulk sales, cotact Matt Pederse, Commercial Sales Director ad Rights; email m.pederse@elsevier.com For iformatio o all Sygress publicatios visit our Web site at www.sygress.com

Ackowledgmets The authors ackowledge Pomeroy IT Solutios ad CDW for supplyig the hardware used i the writig of this book, ad Adrew Page of Microsoft for providig techical validatio of the Microsoft Virtualizatio products. v

Cotets Ackowledgmets.................................................................. v About the Authors................................................................ xv Itroductio...................................................................... xvii CHAPTER 1 What is virtualizatio?... 1 Evolutio of virtualizatio...1 Virtualizatio defied...3 How virtualizatio works...3 Server virtualizatio...4 Cliet virtualizatio...5 Buildig a busiess case for virtualizatio...6 Virtualizatio ad busiess cotiuity...9 The other side of virtualizatio...10 Fially, drop the hammer... 11 Summary...12 CHAPTER 2 Uderstadig Microsoft virtualizatio strategies... 13 Microsoft s IT maturity model...14 Buildig a dyamic dataceter...16 Virtualizatio layers i a dyamic dataceter... 16 Hardware virtualizatio layer... 17 Applicatio virtualizatio layer... 19 Cetralized, optimized desktop maagemet... 22 Applicatio ad presetatio virtualizatio... 24 Desktop hardware virtualizatio... 25 Additioal tools... 25 Summary...26 CHAPTER 3 Istallig Widows Server 2008 ad Hyper-V... 29 Widows Server 2008 ad server core...29 Istallatio requiremets for Hyper-V...30 Hardware requiremets for Hyper-V... 30 Software requiremets for Hyper-V... 31 Supported guests o Hyper-V...31 Istallig Hyper-V...31 Istallig the Hyper-V maagemet cosole o a workstatio...33 Bitlocker ad Hyper-V...36 Summary...37 vii

viii Cotets CHAPTER 4 Maagig Hyper-V... 39 Itroductio to the Hyper-V Maager sap-i...39 Virtual etworks...40 Cofigurig Hyper-V optios...44 Cofigurig virtual machie optios...53 Summary...59 CHAPTER 5 Istallig ad cofigurig Virtual Machie Maager 2008... 61 Itroductio to virtual machie maager...61 System requiremets...62 Acquirig ad istallig VMM...62 Cofigurig VMM for your eviromet...87 Summary... 109 CHAPTER 6 Hyper-V ad high availability... 111 Overview of clusterig cocepts... 111 Microsoft fail-over cluster ad etwork load balacig... 112 Defiig HA for Hyper-V... 113 Makig virtual machies available... 114 Makig virtual machie services available... 115 Thigs to cosider... 116 Summary... 116 CHAPTER 7 Creatig virtual machies ad templates... 119 Creatig your first virtual machie... 119 Coectig to a virtual machie ad basic Hyper-V commads..... 131 What is a virtual machie template?... 136 Creatig your first virtual machie template... 136 Usig a template to create a ew virtual machie... 139 Summary... 141 CHAPTER 8 Performig physical-to-virtual ad virtual-to-virtual migratios... 143 Hyper-V migratios... 143 Microsoft exchage server... 145 Microsoft SQL Server... 147 Microsoft SharePoit techologies... 147 Migratio scearios... 149 Migratig physical to virtual... 150 Physical to virtual System Ceter Virtual Machie Maager 2008 (VMM2008)... 150 Migratig virtual to virtual... 173 Summary... 173

Cotets ix CHAPTER 9 Securig, moitorig, ad maagig a virtual ifrastructure... 175 Securig the Hyper-V Host... 175 Server Core istallatio cosideratios... 176 Network ad domai cosideratios... 177 Securig the virtual machies... 177 Bitlocker drive ecryptio... 179 Syskey.exe... 179 Widows Firewall... 180 Auditig... 180 Desigig your virtual etwork... 180 Moitorig ad other cosideratios... 181 Summary... 181 CHAPTER 10 Creatig a dyamic data ceter with Microsoft System Ceter... 183 Data ceter workload... 185 Hardware optimizatio... 187 Legacy applicatios... 189 Isolated eviromets... 192 Hardware cosolidatio... 194 Approach #1: Clusterig... 195 Approach #2: Clusterig with virtualizatio... 195 Software migratio... 196 Easier test eviromets... 199 Summary... 200 CHAPTER 11 Applicatio virtualizatio (App-V)... 201 What is applicatio virtualizatio?... 201 Applicatio Virtualizatio Maagemet Server... 202 Applicatio Virtualizatio Streamig Server... 202 App-V modes... 203 Stad-aloe mode... 203 Streamig mode... 203 System requiremets... 203 Istallatio... 204 Istallig the.net framework... 205 Istallig SQL 2008... 214 Cofigurig IIS 7... 234 Istallig the App-V Maagemet Server... 238 Istallig the App-V Streamig Server... 261 Summary... 275

x Cotets CHAPTER 12 Deployig App-V packages... 277 What is a App-V package?... 277 Applicatio Virtualizatio Sequecer... 278 Applicatio Virtualizatio Cliet... 279 System requiremets... 279 App-V Cliet requiremets... 279 Istallig the App-V Sequecer... 280 Istallig the App-V Desktop Cliet... 282 Creatig a App-V package... 287 Publishig the App-V package... 308 Streamig the App-V package... 314 Applicatio streamig with Maagemet Servers... 314 New features i App-V 4.5... 314 AutoLoad packages... 314 Applicatio streamig with Streamig Servers... 315 Applicatio streamig with File Servers... 315 Applicatio streamig with IIS... 315 Stad-aloe mode with MSI... 315 Streamig mode with MSI... 316 Summary... 316 CHAPTER 13 Presetatio virtualizatio (Termial Services)... 317 Itroductio to presetatio virtualizatio... 317 The five Widows Server 2008 Termial Services role services... 319 Termial Server... 319 TS Licesig... 319 TS Sessio Broker... 319 TS Gateway... 320 TS Web Access... 320 Istallig the Termial Services Termial Server role... 321 Coectig to a Widows remote desktop... 334 Summary... 336 CHAPTER 14 Itegratig applicatio ad presetatio virtualizatio (Termial Services)... 339 Cofigurig TS RemoteApp... 339 Distributig RemoteApp Program Files... 347 Creatig ad distributig a Widows Istaller package... 347 Creatig ad distributig a Remote Desktop Protocol File... 355 Istallig the TS Web Access role service... 363

Cotets xi Access a Web published remote applicatio... 371 Summary... 375 CHAPTER 15 Desktop virtualizatio... 377 Virtual PC ad XP mode... 377 Istallig ad usig Microsoft Virtual PC 2007 SP1... 379 Creatig a virtual machie i Virtual PC 2007... 381 Istallig Widows Virtual PC ad XP mode... 402 Istallatio ad cofiguratio of XP mode... 408 Itroductio to MED-V... 413 MED-V server istallatio... 415 MED-V Cliet ad Maagemet Applicatio Istallatio... 422 Creatig a Virtual Machie Image... 426 Creatig a MED-V image... 434 Summary... 441 APPENDIX A Migratig virtual machies from Virtual Server 2005... 443 APPENDIX B Case studies... 445 The case of the uexpected upgrade... 445 The case of migratig a legacy hardware platform to App-V or Hyper-V... 446 The case of supportig a large applicatio i a widespread orgaizatio... 447 The case of maagig a growig Data Ceter... 448 The case of limited capacity... 448 APPENDIX C Widows Server 2008 R2 Delta Chages... 451 Itroductio... 452 Networkig chages... 453 DirectAccess... 453 BrachCache... 453 VPN Recoect... 453 DNS cache lockig... 454 DNS Security Extesios... 455 Firewall profiles per etwork coectio... 455 Active Directory chages... 455 AD Recycle Bi... 456 Offlie Domai Joi... 456 AD Best Practices Aalyzer... 458 AD Web services... 460 Maaged Service Accouts... 461

xii Cotets AD Admiistrative Ceter... 461 AD Module for PowerShell... 462 Read-Oly SYSVOL for Read-Oly Domai Cotrollers... 463 File ad prit services chages... 463 Read-Oly DFSR Replicas... 463 File Classificatio Ifrastructure... 463 Prit driver isolatio... 463 Network Scaer Maagemet... 464 Iteret Iformatio Server (IIS) Chages... 464 Request Filterig Module... 464 Best Practices Aalyzer... 464 PowerShell module... 464 Support for Maaged Service Accouts... 464 Hostable Web Core... 465.NET support o server core istalls... 465 Hyper-V Chages... 465 Live Migratio... 465 Processor Ehacemets... 467 Storage Ehacemets... 467 Remote Desktop Services (formerly kow as Termial Services) chages... 467 Remote Desktop Sessio Host... 468 Remote Desktop Virtualizatio Host... 469 RemoteApp ad Desktop Coectio... 469 Remote Desktop Coectio Broker... 469 Remote Desktop Gateway... 470 Remote Desktop Web Access... 471 Remote Desktop Cliet experiece... 472 Remote Desktop Services PowerShell Module ad Best Practice Aalyzer (BPA)... 472 High availability ad recovery chages... 472 Fail-over cluster PowerShell Support... 472 Cluster Shared Volumes... 473 Improved Cluster Validatio... 473 Support for Additioal Cluster Aware Services... 473 Ability to Back up Idividual Files ad Folders... 473 Security Chages... 474 DNSSEC Support... 474 AppLocker... 474 Chages to Network Access Protectio... 474

Cotets xiii Maaged Service Accouts... 475 New Security Auditig Features... 475 Powershell chages... 476 Itegrated Scriptig Eviromet ad Debugger... 476 Backgroud Jobs... 476 Trasactios... 476 Cmdlets for server admiistratio... 476 Summary... 477 Idex...479

About the Authors Thomas Olzak is a IT professioal with over 26 years of experiece i programmig, etwork egieerig, ad security. He has a MBA ad is a CISSP. He is curretly the director of iformatio security at HCR MaorCare, a Ohio-based leadig provider of short- ad log-term medical ad rehabilitatio care with more tha 500 locatios i 32 states. At HCR MaorCare, he is resposible for maagig the corporate security program, chage maagemet, ad busiess cotiuity plaig. He is also the CEO of a security traiig compay. Prior to his curret job, he held positios as a etwork ad server egieer, director of ifrastructure egieerig, director of techical operatios, ad programmig maager at a variety of maufacturig ad distributio compaies. Before joiig the private sector, he served 10 years i the Uited States Army Military Police with 4 years as a military police ivestigator. He has writte a book, Just Eough Security, ad various papers o security maagemet. Jaso Boomer is a seior etwork egieer with HCR MaorCare. He curretly provides seior-level strategic ad techical support for all Microsoft Server ad Cliet devices i the HCR MaorCare eterprise. His specialties iclude server- ad cliet-side automatio solutios; Active Directory desig, implemetatio, ad support; applicatio packagig ad deploymet; ad operatig system deploymet automatio. Jaso s backgroud icludes positios as seior techical cosultat for Pomeroy IT Solutios, as a seior system admiistrator for La-Z-Boy Icorporate, as a seior systems egieer for Sequoia, ad as a seior systems egieer at IaCom. Robert M. Keefer (MCSA þ Messagig, MCSE Widows Server 2003, Securityþ, C EH) is a security aalyst for HCR MaorCare. He curretly works to maitai ad improve the security stace of the compay by idetifyig ad ivestigatig issues, reviewig ad recommedig ew products, ad moitorig systems for policy violatios as well as performig risk assessmets ad peetratio tests. His specialities are i vulerability assessmet ad ethical hackig. Robert s backgroud icludes positios i IS maagemet ad as a seior etwork egieer for a systems itegrator i A Arbor, MI. He curretly resides i southeast Michiga. James Sabovik is the maager of productio operatios at HCR MaorCare, where he has also served as the maager of etwork egieerig ad database admiistratio. He is a IT vetera with more tha 15 years of experiece, icludig desigig, deployig, ad maitaiig such thigs as Active Directory, Exchage, ad server ad etwork ifrastructures. I additio, he has maaged teams of egieers resposible for more tha 600 servers, both physical ad virtual, ad 15,000 cliet devices spread out across the majority of the Uited States. James holds a bachelor s degree i computer ad iformatio sciece from Ohio State Uiversity s College of Egieerig. xv

xvi About the Authors TECHNICAL EDITOR Keeth Majors (MCSE, MCITP, ITIL v3, Projectþ, VMware VCP, Citrix CCEA, CCA) is a vice presidet of systems architecture for Choice Solutios LLC, a systems itegrator headquartered i Overlad Park, KS. Choice Solutios provides IT desig, project maagemet, ad support for eterprise computig systems. He is a key cotributor to defiig best practices for Microsoft techologies, icludig Widows Server, Hyper-V, ad Systems Ceter; Citrix XeApp, XeServer, ad XeDesktop; VMware vsphere ad View; ad developmet of documetatio stadards. He develops techology solutios ad methodologies focused o improvig cliet busiess processes. These techology solutios touch every part of a system s life cycle from assessmet, blueprit, costruct, ad deploymet o projects to operatioal maagemet ad strategic plaig for the busiess process. Keeth holds a bachelor s degree from Colorado Techical Uiversity. He curretly resides i Olathe, KS, with his lovig ad supportive wife, Sady, ad ear their daughter, Tabitha, ad their gradsos, Wesley ( Peaut ) ad Austi. Their so, Keith, is curretly o active duty with the US Navy.

Itroductio The itetio of this book is to provide a thorough referece for those cosiderig a migratio ito the virtualized world. The majority of our target readers will likely be seasoed system admiistrators ad egieers who grew up i ad still maage primarily a hardware-based server eviromet cotaiig a large assortmet of both ewer ad legacy applicatios. As much as we attempt to outlie the graularities of Microsoft virtualizatio as a whole, doe properly, the combiatios ad possibilities are truly edless. The IS world is earig, ad i some cases, has already passed the poit of o retur whe it comes to large-scale virtualizatio implemetatios. Virtualizatio has evolved from somethig fu for ultra-geeks to play with i their spare time, to a solid developmet tool widely used by everybody from high-school studets to goliath software developmet compaies. The ievitable result of this evolutio is a ew way of lookig at eterprise maagemet, for ot oly the dataceter but also all of the compoets used by IS to provide the solutios required by the busiess it supports. The stigma oce placed o the use of virtualizatio by idustry leaders is dimiishig, ad rightly so. We stress throughout the book the importace of proper research ad documetatio. These are two terms commo to the IS world, but rarely used properly. Failure to fully research, uderstad, ad documet your virtualizatio strategy ca easily tur what should be a ejoyable ad very successful trasformatio ito a ightmare for all ivolved. We cover the broad spectrum of Microsoft virtualizatio i a way that will help the IS professioal begi usig virtualizatio i both theory ad practice. Whether you are just begiig your IS career, or you are a seasoed professioal, we hope you fid this book useful i ot oly uderstadig the techology itself but also i learig how to best prepare to use the techology i everythig from a small home-based test lab to a large eterprise productio eviromet. We kew from the begiig that this book would be writte to target our fellow IS peers. The majority of the topics i this book focus o the use of virtualizatio i day-to-day operatios of a eterprise-level IS orgaizatio. We do ot sell Microsoft virtualizatio as the silver bullet to cure all of your IS problems; however, we do feel that the proper use of its collective techologies ca help to alleviate a high amout of iadequacies that plague a large umber of data ceters today. From the small family-owed busiesses to the largest of mega corporatios, there is a aspect of virtualizatio that ca help you to become a more successful IS professioal. Whether it be somethig as simple as usig Disk2VHD to create a backup of a office computer for use i the evet of a uforesee disaster, or somethig as complex as the full implemetatio of Microsoft System Ceter as the framework for maagig thousads of servers, there are beefits to researchig the use of virtualizatio i your eviromet. xvii

xviii Itroductio The true beefits of virtualizatio are ofte uderappreciated, ad i some cases, ot obvious at all to aybody outside of the techical professioal who implemets ad maages it. This ca make the adoptio of virtualizatio a hard sell to those resposible for maagig costs. We discuss this topic at legth i a effort to provide some tools that the IS professioal ca use to promote the implemetatio of virtualizatio through the beefit of icreased efficiecy ad life cycle cost savigs. Usig this book as a referece, you ca begi your dive ito the world of virtualizatio ad start to uderstad the beefits that it may provide for your eviromet. The book will provide you the tools ad explaatios eeded to allow you to create a fresh virtualizatio eviromet. We will walk you through step-by-step istructios o everythig from buildig a Widows 2008 server to istallig ad cofigurig Hyper-V ad App-V. We provide examples of how to publish applicatios i various cofiguratios, as well as detailed explaatios o how to migrate existig servers ito the virtual world, but we will ot be able to show you how to cofigure your eviromet. Every virtualizatio eviromet will be differet. A properly built virtualizatio strategy must take ito accout everythig from the way you cofigure ad maage your servers to how your compay does busiess. Be wary of aybody who promises a shrik-wrapped, plug-ad-play virtualizatio desig for your compay; you must embrace the process of movig ito the virtual world, ad you must be prepared to dig i ad ask the questios that others may be afraid to ask or simply ot kow whom to ask. Virtualizatio techology is truly awe ispirig, which is likely oe of its ow biggest eemies. Before virtualizatio became a maistream techology, it was much easier for maagers ad others resposible for budgets to uderstad the cost of a data ceter, but the days of easily comparig the umber of physical servers with the umber of applicatios or users is quickly becomig a thig of the past. As this evolutio cotiues, you will begi to see budget decisio makers become more ad more depedet o their IS staff to provide reliable iformatio. Be thorough ad cocise, ad uderstad that others will ot likely be able to comprehed the true ature of a virtualized eviromet as you will. Here is a quick outlie of each chapter. Chapter 1: Itroductio to Virtualizatio I this chapter, we discuss the basics of virtualizatio that every IS professioal ad their maagemet should uderstad before jumpig i head first. We talk about the role of virtualizatio i the chagig ladscape of the traditioal data ceter ad its beefits. Chapter 2: Uderstadig Microsoft Virtualizatio Strategies I this chapter, we discuss the strategies of virtualizatio, ad how to begi your approach. We talk about chagig the data ceter from its traditioal cost ceter to a true asset. We touch o the defiitios commo to ay virtualizatio discussio ad explai how virtualizatio exteds far beyod the walls of the data ceter. Chapter 3: Istallig Widows 2008 Server Core ad Hyper-V I this chapter, we cover the step-by-step process used to build a Widows 2008 server, whether you choose the traditioal GUI method or the ewer commad lie (GUI-less) core-istall. With the

Itroductio xix operatig system istalled, we explai the steps take to istall Hyper-V ad get it ready for use. Chapter 4: Maagig Hyper-V I this chapter, we dive ito the process of cofigurig ad maagig a Hyper-V ifrastructure. We examie the various tools icluded i Hyper- V ad how they ca beefit you. We cover the cofiguratio ad use of virtual etworks, ad why you would wat to cofigure them i differet modes. Ad we discuss the differet disk modes available i Hyper-V. Chapter 5: Istallig ad cofigurig Virtual Machie Maager 2008 I this chapter, we talk about Virtual Machie Maager (VMM) ad all of the uderrated fuctioality it provides. We discuss proper VMM library structure ad Hyper-V cosoles that ca be istalled ad used o oserver operatig systems. Chapter 6: Hyper-V ad High Availability I this chapter, we discuss oe of the most highly discussed topics associated with the use of virtualizatio Microsoft s approach to high availability ad how the proper combiatio of Microsoft tools ca be put together i order to provide a very reliable ad highly available virtualizatio ifrastructure. Chapter 7: Creatig Virtual Machies ad Templates I this chapter, we explai virtual machies ad how to best create them. We discuss the importace of proper plaig specific to this fuctioality, ad why you will wat to be especially careful whe creatig virtual machies ad templates. Chapter 8: Performig Physical-to-Virtual ad Virtual-to-Virtual Migratios I this chapter, we discuss the most refereced ad talked about fuctio of virtualizatio; amely, the migratio of physical servers to virtual servers. We talk about the best practices, the importace of vedor support, ad how to prepare for the migratio itself. Chapter 9: Securig, Moitorig, ad Maagig a Virtual Ifrastructure I this chapter, we discuss the methods you will wat to uderstad i securig ad maagig your Hyper-V eviromet. We cover the varyig opiios regardig the eed for security withi the Hyper-V eviromet, ad how you should approach researchig ad applyig this security i your data ceter. Chapter 10: Creatig a Dyamic Data Ceter with Microsoft System Ceter I this chapter, we discuss the Dyamic Data Ceter cocept ad how you ca get there usig the Microsoft System Ceter suite of tools ad cocepts. We revisit the importace of proper plaig ad research ad discuss how virtualizatio for the sake of virtualizig is a bad idea. Chapter 11: Applicatio Virtualizatio I this chapter, we go ito graular detail of settig up a applicatio virtualizatio platform. From the step-by-step build of the server itself, to uderstadig the prerequisites of your App-V farm. Chapter 12: Deployig App-V Packages I this chapter, we demostrate the ease of creatig ad publishig a virtual applicatio withi App-V. We talk about the differet optios available whe publishig a applicatio ad how the differet optios might apply to differet scearios. Chapter 13: Presetatio Virtualizatio (Termial Services) I this chapter, we discuss the highly reovated Microsoft Termial Services ad how this ewer geeratio ca

xx Itroductio provide more efficiet traditioal use, as well as ew fuctioality that may have otherwise goe uoticed. We discuss the Termial Services role i detail ad provide some isight ito how it may help you with maagig your data ceter. Chapter 14: Itegratig Applicatio ad Presetatio Virtualizatio I this chapter, we discuss the ew RemoteApp fuctio available withi the latest geeratio of Termial Services. We talk about how RemoteApp ca be used i associatio with Web Access to provide access to applicatios across the Iteret. Chapter 15: Desktop Virtualizatio I this chapter, we coclude the book with a discussio of desktop virtualizatio ad all of the potetial it provides for a much more streamlied ad efficiet eterprise ladscape of tomorrow. We explai how the techology, although complex, is relatively easy to implemet today, ad why you should cosider it. That is our book i a utshell. We hope you ejoy readig ad usig it as much as we ejoyed researchig ad writig it. Remember that proper research ad documetatio are ot just the key to a successful virtualizatio implemetatio, but key to the success of ay job. Implemetig ad usig virtualizatio are as dyamic as the techology itself, ad virtualizatio is a world that truly defies the phrase it s oly as successful ad complex as you choose to make it. As the use of virtualizatio becomes easier for the ed user, it will udoubtedly become more complex for those who support it, so research the techology regularly ad always verify with peers ad vedors that the approach you followed yesterday is still the right approach to take today.