This is the code repository for Building and Managing a Virtual Environment with Hyper-V Server 2012 R2 [Video], published by Packt. It contains all the supporting project files necessary to work through the video course from start to finish.
The blend of Hyper-V and failover clustering provides strong resilience to your organization's critical applications and services. Where Hyper-V provides hardware abstraction, system consolidation, rapid deployment, and simple portability on one hand, failover clustering adds features such as rapid, automated failure handling and downtime-free maintenance for hardware.
Building and Managing a Virtual Environment with Hyper-V Server 2012 R2 is a video series designed to present the complexities of Hyper-V and failover cluster configuration in easily digestible chunks. The segments feature demonstrations of the concepts explained in the video, being executed on an actual Hyper-V cluster.
You'll begin with the basics of setting up your nodes, gathering them into the cluster, and working with your shared storage system. Then you'll get an in-depth tour of managing your systems using the built-in graphical tools and PowerShell cmdlets. With that foundation, you'll learn advanced concepts of virtual machine migration and cluster protection. You'll also discover detailed maintenance steps, such as how Cluster-Aware Updating keeps your nodes patched without impacting virtual machines.
Building and Managing a Virtual Environment with Hyper-V Server 2012 R2 will present you with the knowledge and examples you need to successfully design and deploy your own Hyper-V clusters.
- Discover the Defense in Depth model and how each Windows Server 2019 security feature plays a role
- Protect data at rest using disk- and file-level encryption
- Use many host-level protections, including Windows Defender, Local Policies, User Rights Assignments, and host-based firewalls
- Develop threat detection procedures using Operations Management Suite
- Apply the best practice of the Principle of Least Privilege using features such as Just in Time Administration and Just Enough Administration
- Lock down Windows servers and client operating systems using Microsoft Baseline Analyzer and Privileged Access Workstations
- Discover the Defence in Depth model and how each Windows Server 2019 security feature plays a role
- Protect data at rest using disk- and file-level encryption
- Use many host-level protections, including Windows Defender, Local Policies, User Rights Assignments, and host-based firewalls
- Develop threat detection procedures using Operations Management Suite
- Apply the best practice of the Principle of Least Privilege using features such as Just in Time Administration and Just Enough Administration
- Lock down Windows servers and client operating systems using Microsoft Baseline Analyzer and Privileged Access Workstations
To fully benefit from the coverage included in this course, you will need:
This is an easy-to-follow set of videos that demonstrate the concepts and techniques of expanding into a fully functional cluster while highlighting the relationship between Hyper-V and failover clustering.
This course has the following software requirements:
Hyper-V 2012 R2, Windows OS