Microsoft Hyper-V und System Center

Werbung
Auf einen Blick
Auf einen Blick
1
Einleitung .................................................................................................................
19
2
Hyper-V im Überblick ...........................................................................................
55
3
Den Host-Server einrichten ................................................................................ 105
4
Host-Farmen und Verfügbarkeit ...................................................................... 277
5
Virtuelle Maschinen .............................................................................................. 389
6
System Center Virtual Machine Manager 2012 .......................................... 553
7
Daten wiederherstellen und Probleme beheben ....................................... 629
8
Migration und Aktualisierung ........................................................................... 721
9
Remotedesktopdienste ....................................................................................... 757
10
Finale und Ausblick ............................................................................................... 809
Inhalt
Inhalt
Geleitwort ..............................................................................................................................................
17
1
Einleitung
19
1.1
Was wir Ihnen bieten ........................................................................................................
19
1.1.1
1.1.2
Das Buch als Ganzes ...........................................................................................
Die zehn Kapitel ...................................................................................................
20
21
Die Autoren ...........................................................................................................................
28
1.2.1
1.2.2
1.2.3
1.2.4
1.2.5
Nicholas Dille ........................................................................................................
Marc Grote .............................................................................................................
Nils Kaczenski .......................................................................................................
Jan Kappen .............................................................................................................
Danke! .....................................................................................................................
28
29
29
30
30
Warum virtualisieren wir eigentlich? ........................................................................
32
1.3.1
1.3.2
1.3.3
Ein Projekt ohne Ziel kann nur scheitern .....................................................
Vor- und Nachteile abwägen ...........................................................................
Stolperfallen vermeiden ....................................................................................
34
35
36
Virtuelle Welten: Die Fallstudien ................................................................................
40
1.4.1
1.4.2
Die A. Datum GmbH ...........................................................................................
Die Contoso AG ....................................................................................................
40
42
Hyper-V und der Virtualisierungsmarkt ...................................................................
44
1.5.1
1.5.2
1.5.3
46
47
50
1.2
1.3
1.4
1.5
Server-Virtualisierung: Eine Historie .............................................................
Die drei Großen am Markt ................................................................................
Microsofts Virtualisierungsweg .....................................................................
2
Hyper-V im Überblick
55
2.1
Die Architektur .....................................................................................................................
57
2.1.1
2.1.2
2.1.3
2.1.4
57
58
60
61
Hypervisor Typ 1 ...................................................................................................
Hypervisor Typ 2 ...................................................................................................
Monolithischer Hypervisor ...............................................................................
Microkernel-Hypervisor .....................................................................................
5
Inhalt
2.2
Paravirtualisierung und Emulation ............................................................................
62
2.3
Hardware-Virtualisierung ...............................................................................................
63
2.4
Der VMBus und die Integration Services ..................................................................
64
2.5
Die Parent Partition ...........................................................................................................
67
2.6
Der Virtualisierungs-Stack ..............................................................................................
69
2.6.1
2.6.2
2.6.3
2.6.4
Virtual Machine Management Service .........................................................
Virtual Machine Worker Process ....................................................................
Virtual Devices ......................................................................................................
Virtualization Service Providers und Virtualization Service Clients ...
69
70
71
72
Child Partitions ....................................................................................................................
72
2.7.1
2.7.2
An Hyper-V angepasste Gast-Systeme .........................................................
Nicht an Hyper-V angepasste Gast-Systeme .............................................
73
73
2.8
Best Practices Analyzer ....................................................................................................
74
2.9
Vergleich mit Hyper-V 2.0 ...............................................................................................
76
2.9.1
2.9.2
Zahlen, Daten, Fakten ........................................................................................
Die großen und kleinen Erweiterungen .......................................................
76
78
Virtuelle Gäste .....................................................................................................................
79
2.10.1
2.10.2
2.10.3
Funktionierende und unterstützte VM-Betriebssysteme ......................
Technische Limits ................................................................................................
Alte Betriebssysteme betreiben .....................................................................
79
81
83
Mit der PowerShell administrieren ............................................................................
84
2.11.1
2.11.2
Der Einstieg ............................................................................................................
Beispiel-Skripte .....................................................................................................
84
89
Microsoft Hyper-V Server 2012 .....................................................................................
92
2.12.1
2.12.2
2.12.3
2.12.4
Installieren und einrichten ...............................................................................
Auf einem USB-Stick installieren ...................................................................
Hyper-V Server 2012 ohne Domäne verwalten ..........................................
Dritthersteller-Tools zur Verwaltung nutzen ............................................
92
95
97
99
Hyper-V auf dem Client ...................................................................................................
100
2.13.1
2.13.2
2.13.3
Anforderungen und Einschränkungen .........................................................
Installieren und Nutzen .....................................................................................
Windows Server 2012 remote verwalten .....................................................
101
101
103
Zusammenfassung .............................................................................................................
104
2.7
2.10
2.11
2.12
2.13
2.14
6
Inhalt
3
Den Host-Server einrichten
105
3.1
Die Grundinstallation .......................................................................................................
105
3.1.1
3.1.2
3.1.3
3.1.4
3.1.5
3.1.6
Festplatten richtig aufteilen ............................................................................
Die CPU auswählen .............................................................................................
GUI vs. Server Core ..............................................................................................
Die Speicherpfade ...............................................................................................
Die Host-Reserven ...............................................................................................
Die Auslagerungsdatei im Management OS ..............................................
106
106
107
112
113
115
Der Arbeitsspeicher ............................................................................................................
116
3.2.1
3.2.2
3.2.3
3.2.4
3.2.5
3.2.6
3.2.7
3.2.8
3.2.9
3.2.10
Arbeitsspeicher »überbuchen«? .....................................................................
Hyper-V und der statische Arbeitsspeicher ................................................
Dynamic Memory – ein Ausweg? ...................................................................
Wie Dynamic Memory funktioniert ..............................................................
Dynamic Memory konfigurieren ....................................................................
Smart Paging .........................................................................................................
NUMA-Einstellungen .........................................................................................
Arbeitsspeicher und das Storage-System ....................................................
Einschränkungen von Dynamic Memory ....................................................
Empfehlungen zu Dynamic Memory ............................................................
118
119
120
123
125
126
127
128
129
132
Das Netzwerk .......................................................................................................................
133
3.3.1
3.3.2
3.3.3
3.3.4
3.3.5
3.3.6
3.3.7
3.3.8
3.3.9
3.3.10
3.3.11
3.3.12
Wie das Netzwerk in Hyper-V funktioniert .................................................
Virtuelle Switches einrichten ..........................................................................
Netzwerktypen in Hyper-V ...............................................................................
Hyper-V-Netzwerke konfigurieren ................................................................
Sprechende Namen wählen .............................................................................
Hardware-Spezialitäten ....................................................................................
Netzwerkkarten-Teams einrichten ................................................................
Erweiterbare Netzwerk-Switches ..................................................................
10-Gigabit-Netzwerke ........................................................................................
Hyper-V-Netzwerkvirtualisierung ..................................................................
Empfehlungen zu Netzwerken in Hyper-V .................................................
Fallbeispiele für das Netzwerk ........................................................................
134
143
149
154
160
163
171
178
187
196
205
207
Der Datenspeicher ..............................................................................................................
209
3.4.1
3.4.2
3.4.3
3.4.4
3.4.5
210
219
222
228
237
3.2
3.3
3.4
Crashkurs Storage: DAS, NAS, SAN oder was? ...........................................
Welches Speichersystem brauche ich wann? ............................................
Lokalen Speicher konfigurieren ......................................................................
Storage Spaces verwenden ..............................................................................
iSCSI-Target mit Windows Server 2012 ........................................................
7
Inhalt
3.4.6
3.4.7
3.4.8
SAN-Speicher anbinden .....................................................................................
vSAN einrichten ....................................................................................................
Fallbeispiele für den Datenspeicher ..............................................................
243
246
250
Sicherheit beginnt beim Design ...................................................................................
252
3.5.1
3.5.2
3.5.3
3.5.4
3.5.5
3.5.6
3.5.7
3.5.8
3.5.9
VM-Umgebungen multiplizieren Nachlässigkeiten ................................
Ganzheitliche Sicherheitskonzepte ...............................................................
Den Host absichern .............................................................................................
Firewall-Virtualisierung .....................................................................................
Port ACL ...................................................................................................................
Hyper-V-Switch-Erweiterungen .....................................................................
CSV und Bitlocker ................................................................................................
Berechtigungen für Hyper-V verwalten .......................................................
Sollen die Hyper-V-Hosts in die Domäne? ..................................................
254
259
265
267
268
269
269
270
272
3.6
Zusammenfassung .............................................................................................................
276
4
Host-Farmen und Verfügbarkeit
277
4.1
Warum ist Verfügbarkeit ein Thema? .......................................................................
277
4.1.1
4.1.2
4.1.3
4.1.4
4.1.5
4.1.6
Was ist überhaupt Verfügbarkeit? ................................................................
Wie abhängig sind wir wirklich? ....................................................................
Was ist eigentlich ein Ausfall? ........................................................................
Wenn Redundanz zum Problem wird ...........................................................
Grenzen des Clusterings ...................................................................................
Das Konzept entscheidet ..................................................................................
278
280
281
283
286
287
Failover-Clustering .............................................................................................................
288
4.2.1
4.2.2
4.2.3
4.2.4
4.2.5
4.2.6
4.2.7
4.2.8
4.2.9
4.2.10
4.2.11
4.2.12
289
289
291
292
293
300
301
304
307
310
312
318
3.5
4.2
8
Überblick ................................................................................................................
Terminologie .........................................................................................................
Cluster-Arten .........................................................................................................
Historie des Windows-Clusterings ................................................................
Neuerungen im Failover-Cluster ....................................................................
Hardware für einen Cluster ..............................................................................
Cluster-Validierung .............................................................................................
Best Practices für Cluster ..................................................................................
Cluster-Quorum ...................................................................................................
Cluster-Speicher ...................................................................................................
Einen Cluster einrichten ....................................................................................
Cluster-Rollen .......................................................................................................
Inhalt
4.2.13
4.2.14
4.2.15
4.2.16
4.2.17
4.2.18
4.2.19
Failover-Cluster verwalten ...............................................................................
Clusterfähiges Aktualisieren ............................................................................
Die Aufgabenplanung einbinden ...................................................................
Node Vote Weights .............................................................................................
Node Drain .............................................................................................................
Virtual Machine Monitoring ............................................................................
Cluster per PowerShell verwalten ..................................................................
324
330
334
335
336
337
339
Speicher-Cluster mit Windows Server 2012 ............................................................
340
4.3.1
4.3.2
Storage Spaces im Cluster ................................................................................
iSCSI-Target als Cluster-Rolle ..........................................................................
341
343
NAS statt SAN .......................................................................................................................
344
4.4.1
4.4.2
Authentifizierung mit »CredSSP« ..................................................................
Authentifizierung mit Kerberos ......................................................................
344
345
4.5
Host-Cluster mit Hyper-V ................................................................................................
347
4.6
Live-Migration ......................................................................................................................
352
4.6.1
4.6.2
4.6.3
4.6.4
4.6.5
4.6.6
4.6.7
4.6.8
Funktionsweise ....................................................................................................
Einsatzszenarien ..................................................................................................
Voraussetzungen .................................................................................................
Konfiguration ........................................................................................................
Verwendung ..........................................................................................................
Speicher-Live-Migration ....................................................................................
Bandbreiten-Management ..............................................................................
Live-Migration im Failover-Cluster ................................................................
353
353
354
356
358
361
364
365
VM-Replikation ....................................................................................................................
366
4.7.1
4.7.2
4.7.3
4.7.4
4.7.5
4.7.6
4.7.7
4.7.8
4.7.9
Funktionsweise ....................................................................................................
Die Hosts konfigurieren ....................................................................................
VM-Replikation aktivieren ................................................................................
VMs konfigurieren ...............................................................................................
Das Replikat ...........................................................................................................
Replizierte VMs testen .......................................................................................
Geplantes Failover ...............................................................................................
Das Replikat in Betrieb nehmen .....................................................................
Wiederherstellungspunkte ..............................................................................
367
368
369
375
379
381
383
384
387
Zusammenfassung .............................................................................................................
388
4.3
4.4
4.7
4.8
9
Inhalt
5
Virtuelle Maschinen
389
5.1
Design und Sizing ...............................................................................................................
390
5.2
Ressourcen einer VM .........................................................................................................
391
5.2.1
5.2.2
5.2.3
5.2.4
5.2.5
5.2.6
5.2.7
5.2.8
5.2.9
392
393
396
402
405
413
423
430
440
5.3
5.4
5.5
Ressourcen-Pools und Verbrauchsmessung ...........................................................
447
5.3.1
5.3.2
5.3.3
449
450
452
10
Verbrauchsmessung für einzelne VMs ........................................................
Ressourcen-Pools als Abrechnungsbasis .....................................................
Ressourcen-Pools einrichten ............................................................................
VM-Verwaltung mit VMConnect .................................................................................
459
5.4.1
5.4.2
5.4.3
459
463
468
VMConnect nutzen .............................................................................................
Datenaustausch mit einer VM ........................................................................
Einstellungen innerhalb einer VM .................................................................
Arbeiten mit Vorlagen ......................................................................................................
472
5.5.1
5.5.2
Sysprep ....................................................................................................................
Vorlagen in System Center 2012 Virtual Machine Manager
mit SP1 .....................................................................................................................
Sicherer Umgang mit SCVMM-Vorlagen .....................................................
Sicherer Umgang mit VM-Vorlagen ..............................................................
472
VM-Snapshots ......................................................................................................................
477
5.6.1
5.6.2
5.6.3
5.6.4
5.6.5
5.6.6
5.6.7
477
478
480
481
482
485
487
5.5.3
5.5.4
5.6
Hyper-V und die USB-Schnittstelle ................................................................
VM erzeugen mit dem Assistenten ...............................................................
VM-Eigenschaften bearbeiten ........................................................................
Arbeitsspeicher .....................................................................................................
Prozessor ................................................................................................................
Festplatten .............................................................................................................
LUNs in einer VM .................................................................................................
Netzwerkkarten ...................................................................................................
Integrationsdienste ............................................................................................
Was ist ein Snapshot? ........................................................................................
Die Technik hinter einem Snapshot ..............................................................
Die Erstellung eines Snapshots .......................................................................
Die Eigenschaften eines Snapshots ..............................................................
Die Anwendung eines Snapshots ..................................................................
Entfernen eines Snapshots ...............................................................................
Der Export eines Snapshots .............................................................................
474
475
477
Inhalt
5.7
Export und Import ..............................................................................................................
488
5.7.1
5.7.2
5.7.3
Der Export ..............................................................................................................
Export von Snapshots ........................................................................................
Der Import ..............................................................................................................
488
489
490
Offline-VMs verwalten .....................................................................................................
494
5.8.1
5.8.2
5.8.3
5.8.4
5.8.5
5.8.6
Windows ohne Setup installieren ..................................................................
Rollen in VHDs installieren ...............................................................................
Windows Updates in VHDs installieren .......................................................
Virtual Machine Servicing Tool .......................................................................
Unbeaufsichtigte Konfiguration einer VHD ...............................................
VHDs optimieren .................................................................................................
494
496
499
501
508
509
Linux-VMs installieren .....................................................................................................
510
5.9.1
5.9.2
5.9.3
5.9.4
Die Integration Services für Linux ..................................................................
Die Installation einer Linux-VM ......................................................................
Die Kompilierung eines eigenen Kernels .....................................................
Erfahrungen mit dem Betrieb .........................................................................
510
511
516
518
Server-Applikationen in VMs betreiben ...................................................................
520
5.10.1
5.10.2
5.10.3
5.10.4
Microsofts Support-Policy ................................................................................
Gast-Cluster ...........................................................................................................
Active Directory ....................................................................................................
Exchange Server ...................................................................................................
521
522
523
532
5.10.5
5.10.6
5.10.7
SQL Server ...............................................................................................................
Oracle Database ...................................................................................................
SharePoint ..............................................................................................................
543
548
550
5.11
Zusammenfassung .............................................................................................................
552
6
System Center Virtual Machine Manager 2012
553
6.1
Funktionen des SCVMMs 2012 ......................................................................................
553
6.1.1
6.1.2
6.1.3
6.1.4
6.1.5
6.1.6
6.1.7
6.1.8
554
554
554
554
555
555
555
555
5.8
5.9
5.10
P2V-Funktionen ....................................................................................................
V2V-Funktionen ...................................................................................................
Zentrale Verwaltungskonsole .........................................................................
Zentrale Bibliothek ..............................................................................................
Bare Metal Provisioning ....................................................................................
Update- und Compliance-Management .....................................................
Storage-Management ........................................................................................
Ressourcenoptimierung ....................................................................................
11
Inhalt
6.2
Neuerungen in SCVMM 2012 .........................................................................................
6.3
SCVMM 2012 installieren .................................................................................................
556
6.3.1
6.3.2
6.3.3
Datenbank .............................................................................................................
Installationsvoraussetzungen .........................................................................
Installationsprozess ............................................................................................
557
557
559
SCVMM 2012 konfigurieren ............................................................................................
566
6.4.1
6.4.2
6.4.3
6.4.4
6.4.5
6.4.6
6.4.7
6.4.8
6.4.9
6.4.10
6.4.11
6.4.12
6.4.13
Host-Gruppen erzeugen ....................................................................................
Ausführungskonten erstellen ..........................................................................
Fabric-Management konfigurieren ...............................................................
Einstellungen ........................................................................................................
Aufträge ..................................................................................................................
Bibliothek ...............................................................................................................
SCVMM-Vorlagen verwalten ...........................................................................
Profile in SCVMM erstellen ...............................................................................
Physische Maschinen in virtuelle Maschinen umwandeln ...................
Virtuelle Maschinen zu virtuellen Maschinen migrieren .......................
Virtuelle Maschinen erzeugen ........................................................................
Eine private Cloud einrichten ..........................................................................
Cloud zuweisen ....................................................................................................
566
569
570
578
581
582
583
583
590
593
594
596
600
System Center App Controller 2012 ............................................................................
601
6.5.1
6.5.2
6.5.3
Neuerungen in App Controller Service Pack 1 ............................................
App Controller installieren ...............................................................................
App Controller einsetzen ..................................................................................
602
602
606
Dynamische Optimierung und Energieoptimierung in SCVMM ...................
609
6.6.1
6.6.2
Dynamische Optimierung ................................................................................
Energieoptimierung ............................................................................................
610
612
Update-Management .......................................................................................................
614
6.7.1
6.7.2
WSUS-Server zu SCVMM hinzufügen ...........................................................
Update-Basislinie konfigurieren .....................................................................
615
617
SCVMM-Datensicherung und Wiederherstellung ...............................................
619
6.8.1
6.8.2
SCVMM-Datenbankwiederherstellung ........................................................
Weitere SCVMM-Konfigurationselemente sichern .................................
620
620
VMware vSphere und Citrix XenServer integrieren ............................................
621
6.9.1
6.9.2
6.9.3
6.9.4
621
621
622
623
6.4
6.5
6.6
6.7
6.8
6.9
12
Unterstützung von VMware vSphere und ESX-Hosts .............................
Unterschiede zu SCVMM 2008 R2 .................................................................
Systemvoraussetzungen ...................................................................................
VMware vCenter Server zu SCVMM hinzufügen ......................................
555
Inhalt
6.9.5
6.9.6
6.9.7
6.9.8
Vorlagen eines VMware vCenter Servers hinzufügen .............................
Citrix XenServer ....................................................................................................
Systemvoraussetzungen ...................................................................................
Einschränkungen der Verwaltung von VMware vCenter ......................
624
624
625
626
Migration von SCVMM 2008 R2 zu SCVMM 2012 .................................................
626
6.10.1
6.10.2
Update von SCVMM 2008 R2 zu SCVMM 2012 ohne SP1 .......................
Upgrade von SCVMM 2008 R2 zu SCVMM 2012 mit SP1 ........................
627
627
6.11
Zusammenfassung .............................................................................................................
628
7
Daten wiederherstellen und Probleme beheben
629
7.1
Restore ist mehr als Backup! .........................................................................................
629
7.2
Anforderungen klären ......................................................................................................
631
7.3
Methoden auswählen .......................................................................................................
634
7.4
Ebenen des Backups ..........................................................................................................
634
7.4.1
7.4.2
7.4.3
7.4.4
7.4.5
7.4.6
Application-Level Backup ..................................................................................
Image-Level Backup ............................................................................................
Die Tücken von Images für die Datensicherung .......................................
Disaster Recovery .................................................................................................
Konsistenztypen ..................................................................................................
Recovery Objectives ............................................................................................
635
637
638
644
645
647
Die Wiederherstellung planen ......................................................................................
649
7.5.1
7.5.2
Fallbeispiele ...........................................................................................................
Fazit: Die Wiederherstellung planen ............................................................
650
656
Windows Server-Sicherung ............................................................................................
656
7.6.1
7.6.2
7.6.3
7.6.4
7.6.5
7.6.6
7.6.7
7.6.8
Neuerungen in Windows Server 2012 ...........................................................
Einschränkungen .................................................................................................
Windows Server-Sicherung installieren .......................................................
VM-Sicherung einrichten ..................................................................................
Wiederherstellung ..............................................................................................
Überwachung .......................................................................................................
Backup innerhalb virtueller Maschinen .......................................................
Besonderheiten im Failover-Cluster ..............................................................
658
658
659
659
667
671
671
672
System Center Data Protection Manager 2012 SP1 ..............................................
672
7.7.1
7.7.2
672
673
6.10
7.5
7.6
7.7
Neue Funktionen in SCDPM 2012 SP1 ............................................................
Systemanforderungen .......................................................................................
13
Inhalt
7.7.3
7.7.4
7.7.5
7.7.6
7.7.7
SCDPM 2012 installieren ....................................................................................
Inbetriebnahme ...................................................................................................
Virtuelle Maschinen sichern ............................................................................
Virtuelle Maschinen wiederherstellen .........................................................
Erweiterte Systemadministration ..................................................................
675
677
682
686
690
7.8
Ereignisprotokolle nutzen ..............................................................................................
696
7.9
Virtuelle Umgebungen überwachen .........................................................................
702
7.9.1
Performanceüberwachung und -Tuning von
Windows Server 2012 .........................................................................................
Leistungsüberwachung von Hyper-V-Hosts ...............................................
Hyper-V mit System Center 2012 Operations Manager
überwachen ...........................................................................................................
Hyper-V mit Drittanbieter-Tools überwachen ..........................................
Performance von Hyper-V-Systemen überwachen ..................................
705
706
707
VM-Monitoring ....................................................................................................................
707
7.10.1
7.10.2
7.10.3
Voraussetzung für das VM-Monitoring .......................................................
VM-Monitoring einrichten ...............................................................................
VM-Monitoring überwachen ...........................................................................
708
708
710
PRO-Integration ..................................................................................................................
711
7.9.2
7.9.3
7.9.4
7.9.5
7.10
7.11
7.11.1
703
704
Anforderungen für die PRO-Integration in der
SCOM-Umgebung ...............................................................................................
Die PRO-Integration vorbereiten ....................................................................
PRO-Integration für SCVMM 2012 ..................................................................
PRO-Integration aktivieren ...............................................................................
712
712
714
716
7.12
Zusammenfassung .............................................................................................................
720
8
Migration und Aktualisierung
721
8.1
Von Hyper-V 2.0 auf 3.0 umstellen ............................................................................
721
8.1.1
8.1.2
Einzel-Hosts migrieren ......................................................................................
Failover-Cluster migrieren ................................................................................
721
725
8.2
Von VMware vSphere zu Hyper-V migrieren .........................................................
733
8.3
Den SCVMM aktualisieren ..............................................................................................
735
8.3.1
8.3.2
8.3.3
739
739
739
7.11.2
7.11.3
7.11.4
14
SCVMM-Datenbank vorbereiten ....................................................................
SCVMM-Dienstkonto vorbereiten .................................................................
SCVMM-Server aktualisieren ...........................................................................
Inhalt
8.3.4
8.3.5
8.4
8.5
Zu einem neuen SCVMM-Server migrieren ................................................
SCVMM-Agenten aktualisieren ......................................................................
740
740
Microsoft Virtual Machine Converter Solution Accelerator ............................
741
8.4.1
8.4.2
741
743
MVMC-Funktionen ..............................................................................................
MVMC Automation Toolkit ..............................................................................
Physische Server virtualisieren .....................................................................................
744
8.5.1
8.5.2
8.5.3
Wann ist P2V nützlich? ......................................................................................
Wann und wie sollte ich P2V nicht nutzen? ...............................................
Die Migration technisch umsetzen ...............................................................
744
746
747
8.6
Zusammenfassung .............................................................................................................
755
9
Remotedesktopdienste
757
9.1
Bereitstellungsvarianten .................................................................................................
757
9.2
Zielgruppen ...........................................................................................................................
759
9.3
Architektur .............................................................................................................................
761
9.3.1
9.3.2
Kommunikation zwischen den Rollendiensten ........................................
Verschlüsselte Kommunikation .....................................................................
763
767
Installation .............................................................................................................................
767
9.4
9.4.1
Schnellstart-Installation einer sitzungsbasierten
Desktopbereitstellung .......................................................................................
Schnellstart-Installation einer Bereitstellung virtueller Desktops .....
769
772
Verwaltung ............................................................................................................................
776
9.5.1
Mit dem Server-Manager administrieren ...................................................
777
9.5.2
Mit der PowerShell automatisieren ..............................................................
780
Desktop-Integration ..........................................................................................................
784
9.6.1
9.6.2
9.6.3
9.6.4
Die Verbindung einrichten ...............................................................................
Persönliche Ressourcen einbinden ................................................................
Die Verbindung entfernen ................................................................................
Thin Clients ............................................................................................................
784
788
789
790
Verbindungsprotokoll ......................................................................................................
791
9.7.1
9.7.2
9.7.3
792
793
795
9.4.2
9.5
9.6
9.7
RemoteFX Adaptive Graphics ..........................................................................
Multi-Stream .........................................................................................................
Die Grafikkarte virtualisieren ..........................................................................
15
Inhalt
9.7.4
9.7.5
9.7.6
USB umleiten ........................................................................................................
Multi-Touch ...........................................................................................................
Verfügbarkeit ........................................................................................................
796
796
797
Virtuelle GPUs konfigurieren ........................................................................................
797
9.8.1
9.8.2
vGPUs für virtuelle Clients ................................................................................
Software-GPU für den Sitzungs-Host ...........................................................
797
800
9.9
Den Sitzungs-Host virtualisieren .................................................................................
801
9.10
Best Practices für virtuelle Desktops .........................................................................
803
9.11
Best Practices für den Virtualisierungs-Host ..........................................................
805
9.12
Lizenzierung ..........................................................................................................................
805
9.12.1
9.12.2
Lizenzierung der sitzungsbasierten Bereitstellung ..................................
Lizenzierung der Bereitstellung virtueller Desktops ................................
806
808
Zusammenfassung .............................................................................................................
808
9.8
9.13
10 Finale und Ausblick
809
10.1
Lizenzierung für Hyper-V ................................................................................................
810
10.1.1
10.1.2
810
812
10.2
Server: Das Betriebssystem ..............................................................................
Applikationen: Lizenzmobilität .......................................................................
Die Fallbeispiele im fertigen Zustand ........................................................................
813
10.2.1
10.2.2
Die A. Datum GmbH ...........................................................................................
Die Contoso AG ....................................................................................................
813
815
10.3
Werkzeugkasten für Hyper-V .......................................................................................
819
10.4
Hyper-V im virtuellen Testlabor ...................................................................................
820
10.5
Community und Quellen .................................................................................................
823
Index .......................................................................................................................................................
827
16
Index
Index
00-15-5D...................................................................... 438
10GE 씮 10-Gigabit-Ethernet
10GE-Netzwerk
mögliches Design............................................... 194
10-Gigabit-Ethernet ............................................... 187
1541................................................................................... 29
4K-Platte..................................................................... 415
5Nine............................................................................ 178
5nine Manager for Hyper-V................................... 99
99,999 Prozent Verfügbarkeit ........................... 279
A
A. Datum GmbH
Vorstellung .............................................................. 40
Abfrageinitiatorcomputer .................................. 242
Abrechnung
nutzungsbasierte ............................................... 447
Absolute
Bandbreiten-Reservierungsmodus ............. 192
Abstraktionsebene
für virtuelle Switches ........................................ 457
Access Control List ................................................. 261
ACL 씮 Access Control List
ACPI.............................................................................. 440
Active Directory ...................................................... 272
Active Directory Forest Recovery................. 653
Benutzerkonto wiederherstellen.................. 633
in einer VM ........................................................... 523
Schema................................................................... 693
vollständiger Ausfall ........................................ 653
wiederherstellen ................................................. 651
ADHD........................................................................... 478
ADK 씮 Windows Assessment and
Deployment Kit
Administration
getrennte ............................................................... 275
Administrator mit Leseberechtigung ............ 578
Agent
Datensicherung .................................................. 634
Aktiv-/Aktiv-Cluster .............................................. 291
Allgemeine Anwendung ...................................... 318
Allgemeiner Dienst................................................ 318
Allgemeines Skript................................................. 318
Ältere Netzwerkkarte ............................67, 396, 430
Always-on Database .............................................. 545
AMD Virtualization................................63, 106, 820
AMD-V 씮 AMD Virtualization
Änderungsjournal .................................................. 678
Anforderung
Datenwiederherstellung.........................631, 655
geschäftliche ...........................................................34
Angriffsfläche........................................................... 262
Anhalten
VM............................................................................ 462
Anteil an Gesamtressourcen (CPU) ................. 407
Anwendung
virtualisieren........................................................ 521
Anwendung 씮 Applikation
Anwendungs- und Dienstprotokoll ................ 697
Anwendungsadministrator.......................578, 580
Anwendungspaket ................................................. 582
Anwendungsprofil ........................................582, 583
Anwendungsprotokoll ......................................... 697
Anwendungsskript................................................. 582
Anwendungsvirtualisierung.............................. 521
Anzeigename
einer VM .......................................................394, 401
App Controller ...................................... 559, 587, 601
Appliance ................................................................... 214
Application Consistency...................................... 646
Application-Level Backup.................................... 635
Applikation
Datensicherung .................................................. 634
Lizenz ...................................................................... 812
virtualisieren...............................................405, 520
App-V ........................................................................... 807
Arbeitsspeicher........................................................ 116
beim Start.....................................................122, 404
dynamischer ........................................................ 125
einer VM .......................................................394, 402
Puffer....................................................................... 126
statischer ............................................................... 125
überbuchen........................................................... 403
Umfang .................................................................. 126
Arbeitsspeicherpuffer........................................... 404
Arbeitsspeicherumfang ....................................... 404
Archivattribut 씮 Windows Server-Sicherung
Aufgabenplaner....................................................... 335
Auftrag ........................................................................ 582
Ausfall
Definition .............................................................. 281
vermeiden ................................................................33
827
Index
Ausfall-Rechenzentrum....................................... 285
Ausfallsicherheitsplanung.................................. 651
Ausfallwahrscheinlichkeit .................................. 278
Ausfallzeit
tolerierbare........................................................... 280
Ausführungskonto.....................258, 566, 569, 584
Auslagerung.............................................................. 118
Auslagerungsdatei ........................................115, 223
Authoritative Restore ........................................... 656
Automatische Startaktion................................... 402
Automatische Stoppaktion ................................ 402
AVHD(X)-Datei................................................478, 489
AZMan......................................................................... 270
Azman.msc................................................................ 270
Azure 씮 Windows Azure
B
B2D2T........................................................................... 695
Backup................................................................629, 722
Application-Level ............................................... 635
Ebene....................................................................... 634
Image-Level .......................................................... 637
Methode................................................................. 634
Backup-Server .......................................................... 651
Backup-Software ..................................................... 636
Ballooning ................................................................. 124
Bandbibliothek ........................................................ 695
Bandbreite
auf virtuelle Netzwerke verteilen................. 192
Bandbreiten-Management .............. 364, 434, 574
Bandbreiten-Reservierung ................................. 190
Bandbreiten-Verwaltung..................................... 183
für eine virtuelle Netzwerkkarte .................. 434
Bandlaufwerk ...............................677, 678, 681, 692
Bare Metal............................................... 554, 555, 582
Bare-Metal-Hypervisor 씮 Hypervisor
Baseboard Management Controller............... 610,
612, 614
Benutzerdichte ...............................................802, 804
Benutzerrolle.............566, 578, 579, 600, 601, 607
Berechtigung
für VMConnect.................................................... 460
Bereitstellung virtueller Desktops................... 758
Best Practices Analyzer ................................. 74, 262
Best-Effort-Support................................................ 522
Bestmöglicher Knoten.......................................... 328
Bevorzugter Besitz ................................................. 291
BGInfo ......................................................................... 471
828
BI 씮 Business Intelligence
Bibliothek....................554, 562, 582, 588, 599, 624
Bibliotheksfreigabe............................. 475, 578, 589
Bibliotheks-Server ............ 555, 557, 571, 589, 737
Biener-Haken, Cara ...................................................43
Bildschirmfoto......................................................... 463
Bildschirminhalt
kippt nach links .................................................. 463
BIN-Datei.................................................................... 128
BIOS .............................................................................. 525
Einstellung ............................................................ 460
virtuelles ................................................................ 398
Bitlocker ..................................................................... 269
Blade-Server .............................................................. 533
Blech................................................................................35
Blockgröße
von Festplatten ................................................... 415
Blockorientierter Speicher.................................. 420
Blockorientiertes Protokoll ................................ 215
Bluescreen
bei der Live-Migration...................................... 410
BMC 씮 Baseboard Management Controller
Boot from SAN ......................................................... 222
BPA 씮 Best Practices Analyzer
Brand im Server-Raum ......................................... 650
Broadcom................................................................... 178
Budget für IT ............................................................. 279
Business Intelligence............................................. 544
C
C64 ...................................................................................29
CAB 씮 Cabinet-Datei
Cabinet-Datei............................................................ 499
Calista Technologies 씮 RemoteFX
CAU 씮 Cluster Aware Updating
CCR 씮 Failover-Cluster
CentOS......................................................................... 511
CheckDisk .................................................................. 749
Checkpoint 씮 Snapshot
Child Partition.............................................................72
Chkdsk......................................................................... 692
CIFS 씮 Common Internet File System
Cisco Nexus 1000V ................................................ 178
Citrix ...................................................................759, 780
XenApp............................................................ 49, 780
XenServer ............19, 57, 61, 415, 553, 554, 572,
573, 584, 597, 610, 621, 625
XenServer 6.0....................................................... 625
XenServer 6.1 ................................... 47, 48, 49, 625
Index
Client
virtueller ................................................................ 129
Client-Zugriffspunkt.....................................319, 321
Cloning........................................................................ 472
Cloning-Prozess....................................................... 257
Cloud..........556, 566, 579, 584, 595, 596, 597, 608
Desktop-as-a-Service ...............................805, 806
Hosted .................................................................... 607
Private .................................................................... 607
Service Provider Licensing
Agreement ..............................................805, 806
Software-as-a-Service....................................... 805
Cloud-Bibliothek..................................................... 588
Cloud-Kapazität....................................................... 596
Cluster
aus VMs ................................................................. 522
hybrider Aufbau ................................................. 523
Cluster Aware Updating..........294, 330, 331, 336,
354, 365, 615
Cluster Bootstrapping........................................... 530
Cluster Continuous Replication (CCR) ........... 537
Cluster Name Object ............................................. 290
Cluster Node Weight ............................................. 336
Cluster 씮 Failover-Cluster
Cluster Shared Volume ...... 48, 53, 290, 293, 297,
311, 320, 342, 348, 673, 683, 703, 727
v2 ................................................................................. 53
Cluster Shared Volume File System ................ 311
Cluster.exe........................................................300, 339
Cluster-Dienst .......................................................... 710
Clusterfähiges Aktualisieren 씮 Cluster Aware
Updating
Cluster-Knoten ........................................................ 541
Cluster-Migrationsassistent......................299, 729
CNO 씮 Cluster Name Object
Codename Viridian................................................... 51
Committed Memory ............................................. 126
Common Internet File System................214, 346,
357, 678
Compliance-Management .................................. 554
COM-Port
in einer VM ........................................................... 400
Compute-Cluster .................................................... 291
Computerkennwort............................................... 639
Computerkonto ...................................................... 639
Configuration Manager ..............................553, 694
Connectix ........................................................... 46, 414
Connectix Virtual PC................................................ 45
Contoso AG
Vorstellung .............................................................. 42
Converged Fabric.................................................... 188
Converged Network...................208, 217, 251, 817
Copy on Write .......................................................... 636
Core 씮 CPU
CP-40...............................................................................46
CPU
Begrenzung........................................................... 408
Core.................................................................390, 405
für SQL Server ...................................................... 547
Kern ......................................................................... 405
Kompatibilität .................................................... 409
logische ......................................107, 114, 405, 704
Oracle Database ................................................. 549
Reserve ................................................................... 407
Ring.............................................................................64
Sockel ...................................................................... 390
Version ................................................................... 409
Virtualisierung .......................................................63
virtuelle ......................................107, 114, 406, 704
Crash Consistency .................................................. 645
Crawler
SharePoint ............................................................ 551
Credential Security Support Provider ........... 344,
357, 568
CredSSP 씮 Credential Security Support
Provider
CSS 씮 Microsoft Customer Support Services
CSV............................................................. 348, 658, 726
Netzwerk................................................................ 190
CSV 씮 Cluster Shared Volume
CSVFS 씮 Cluster Shared Volume File System
D
DaaS 씮 Cloud
DAG 씮 Database Availability Group
DAS 씮 Direct Attached Storage
Data Center Bridging....................................189, 208
Data Protection Manager ........254, 620, 672, 703
Agent-Koordinator............................................ 679
DPM 2010 .............................................................. 673
Hyper-V Express Full Backup......................... 683
Installation ........................................................... 677
Item Level Recovery .......................................... 689
Schutz-Agent............................678, 682, 684, 695
Schutzgruppe..............................................680, 681
Speicherplatzrechner........................................ 681
Speicher-Pool ....................................................... 691
Verwaltungskonsole ...................... 675, 679, 686
Vorbereitungs-Tool ........................................... 694
Wiederherstellungsassistent ......................... 686
829
Index
Database Availability Group ..............44, 310, 538
Database Mirroring................................................ 545
Datacenter Edition
Windows Server 2012 ........................................ 810
Dateien kopieren
zwischen Host und VM .................................... 464
Dateiorientiertes Protokoll 씮 Protokoll
Dateisystem
NTFS ........................................................................ 234
ReFS ......................................................................... 234
VSS ........................................................................... 636
Datenaustausch
Integrationsdienst ............................................. 441
mit einer VM ...............................................400, 463
Datenbank-Server..........................................543, 548
Datenbankwiederherstellung............................ 620
Datenkorruption..................................................... 655
Datensicherung....................................................... 629
braucht kein Mensch ........................................ 629
zwischendurch ....................................................... 38
Datenspeicher.......................................................... 209
Fallbeispiel ............................................................ 250
flexibler .................................................................. 229
Performance ........................................................ 220
Datenträger
zwischen Host und VM austauschen ......... 465
Datenträger bearbeiten (Befehl) ....................... 419
Datenträger überprüfen (Befehl)...................... 420
Datenträgerbereinigungs-Tool ......................... 691
Datenverkehr trennen
per VLAN................................................................ 193
Datenverlust............................................................. 630
maximal tolerierbarer ..................................... 648
Datenwiederherstellung...................................... 630
Endbenutzer ......................................................... 693
DCB 씮 Data Center Bridging
dcpromo.exe............................................................. 644
Debian......................................................................... 515
Default
Bandbreiten-Reservierungsmodus ............. 192
Demilitarisierte Zone...... 251, 259, 273, 567, 673
Deployment Image Servicing
and Management .............................................. 496
Der Weg ist das Ziel................................................... 32
Desktopbereitstellung.......................................... 758
Device Specific Module ..................... 219, 244, 427
devmgr_show_nonpresent_devices .............. 754
DFS 씮 Distributed File System
DFS-Namespaceserver.......................................... 318
DHCP Guard 씮 DHCP-Wächter
DHCP 씮 Dynamic Host Configuration Protocol
830
DHCP-Server ....................................................264, 318
DHCP-Wächter......................................................... 439
Diagnosemöglichkeit............................................ 702
Dienstvorlage ........................................ 472, 582, 583
Differentiated Services Code Point ................. 365
Differenz-Festplatte......................................416, 417
Domänencontroller .......................................... 526
Differenzierung (Festplatte) ............................... 416
Dille, Nicholas .............................................................28
Direct Attached Storage ............ 49, 210, 243, 246,
305, 533
Disaster Recovery ..........................................644, 745
Disk2Vhd .................................................................... 748
Diskettenlaufwerk
in einer VM ........................................................... 400
Disk-Image ................................................................ 637
Diskless Server ................................................222, 252
Diskpart .........................................................................95
DISM 씮 Deployment Image Servicing
and Management
Distributed File System...........................................44
Distributed Key Management.......................... 737,
738, 739, 740
Distributed Management Task Force ............. 447
Distributed Network Name ................................ 299
Distributed Resource Scheduling........................48
VMware.....................................................................47
DKM 씮 Distributed Key Management
DMTF 씮 Distributed Management Task Force
DMZ 씮 Demilitarisierte Zone
DMZ-Server ............................................................... 260
DNN 씮 Distributed Network Name
DO 씮 Dynamic Optimization
Dokumentation
Notwendigkeit..................................................... 651
Dom0..............................................................................61
Domäne
Host als Mitglied ................................................ 272
separate ................................................................. 274
Domänencontroller
aus der Domäne entfernen ............................ 652
physischer ............................................................. 530
Ressource............................................................... 531
virtualisieren........................................................ 523
wiederherstellen ................................................. 651
DOS..................................................................................28
Downtime.................................................................. 732
geplante ................................................................. 282
ungeplante............................................................ 282
Verringerung........................................................ 724
DPM 씮 Data Protection Manager
Index
DRS 씮 Distributed Resource Scheduling
DSCP 씮 Differentiated Services Code Point
DSM 씮 Device Specific Module
Dynamic Host Configuration
Protocol ........................................................439, 587
Dynamic Memory .....................114, 120, 125, 404,
537, 538, 539, 586
soziale Auswirkung ........................................... 124
SQL Server ............................................................. 545
Dynamic Optimization ..............................541, 575,
610, 625, 711
Dynamics 씮 Enterprise Resource Planning
Dynamisch erweiterbare Festplatte.......416, 539
Dynamische MAC-Adresse ................................. 438
Dynamische Optimierung 씮 Dynamic
Optimization
Dynamischer Arbeitsspeicher...........82, 114, 404
E
E/A-Virtualisierung mit Einzelstamm ... 64, 178,
180, 183, 436
Eildienst...................................................................... 280
Eingeschränkte Kerberos-Delegation............ 344,
345, 357, 568
Emulation ..................................................................... 62
Emulierte Netzwerkkarte .................................... 430
Emuliertes Gerät ........................................................ 71
Endbenutzer-Datenwiederherstellung.......... 693
Endpoint Protection.............................................. 306
Energiebedarf
einer virtuellen Umgebung ............................... 35
Energieoptimierung 씮 Power Optimization
Enlightenment.....................................................63, 65
Enterprise Resource Planning ........................... 544
Dynamics .............................................................. 544
SAP........................................................................... 544
Entwicklungslabor
für Hyper-V........................................................... 820
Ereignis-ID................................................................. 701
Ereignisprotokoll .................................................... 696
ERP 씮 Enterprise Resource Planning
ERP-System .................................................................. 37
Erweiterbarer Netzwerk-Switch........................ 178
Erweitern
VHD-/VHDX-Datei ............................................ 419
Erweiterungs-Manager für Switche................. 575
Ethernet-Frame
Maximalgröße .................................................... 188
Ethernet-Pool ........................................................... 457
Event Viewer 씮 Ereignisprotokoll
Event-ID 씮 Ereignis-ID
Exchange
Datenbank ............................................................ 535
Datensicherung .................................................. 631
Server .............................................................532, 680
Server 2003........................................................... 534
Server 2007 ..................................................535, 537
Server 2010 ..................................................534, 537
Server 2013 ............................................................ 538
Server Lizenz ........................................................ 813
Exchange Edge-Server .......................................... 817
Export....................................................... 722, 724, 726
einer VM ................................................................ 488
virtuelle Maschine ............................................. 638
F
Fabric ..................................... 573, 586, 624, 628, 740
Administrator...................................................... 578
Management .................................... 554, 566, 570
Failback ..............................................................289, 290
Failover ...........................................289, 318, 327, 328
Netzwerkkarte ..................................................... 189
Failover-Cluster ................ 206, 253, 293, 306, 353,
365, 537, 577, 586, 615, 672, 702, 725, 738
API............................................................................ 333
Cluster Name Object ......................................... 290
Cluster Shared Volume .................................... 290
Continuous Replication................................... 292
Datenträger.......................................................... 299
Dienst.............................................................294, 338
DLL ........................................................................... 319
Ereignis..........................................................325, 326
Funktionalität ..................................................... 289
Grenze..................................................................... 286
Heartbeat ...............207, 290, 307, 312, 316, 329
IP-Adresse.....................................................290, 327
keine Mehrheit .................................................... 310
Knoten .......... 289, 292, 294, 298, 301, 306, 307,
308, 311, 312, 314, 318, 327, 329, 334, 336,
338, 613, 614
Knoten- und Dateifreigabemehrheit.......... 310
Knoten- und Datenträgermehrheit ............ 309
Knotenmehrheit ................................................. 309
Kommunikation................................................. 312
Konfiguration...................................................... 304
löschen ................................................................... 726
Manager ................................................................ 314
maximale Anzahl Knoten..................................77
831
Index
maximale Anzahl VMs ....................................... 77
Name....................................................................... 314
Parameter ............................................................. 340
Prüfbericht............................................................ 314
Quorum ........ 289, 294, 298, 307, 308, 311, 336
Registrierung ....................................................... 299
Ressource ........................................... 326, 337, 339
Rolle................ 289, 290, 306, 311, 318, 320, 328
Server ...................................................................... 289
Split Brain ............................................................. 307
Stimme ................................................................... 308
und Dynamic Memory..................................... 130
Update.................................................................... 721
Validierung........................................ 290, 302, 304
Validierungsassistent....................................... 301
Validierungsbericht .......................................... 304
Validierungstest ................................................. 303
verschachtelter ................................................... 282
Verwaltungskonsole ............293, 295, 324, 325,
326, 335, 688, 710
Voter .................................................... 289, 308, 335
Zeugendatenträger ........................ 307, 310, 316
Zeugenfreigabe ................................................... 308
Fall, Clara ............................................................. 40, 813
Fallbeispiele
im fertigen Zustand .......................................... 813
Fallstudie....................................................................... 40
Fat Client .................................................................... 758
FC 씮 Fibre Channel
FC-HBA........................................................................... 82
FCoE 씮 Fibre Channel over Ethernet
Fehler
Best Practices Analyzer....................................... 74
in einer Anwendung.......................................... 286
Festplatte
defekte .................................................................... 231
Differenzierung..........................................416, 417
dynamisch erweiterbare ................................. 416
in einer VM ........................................................... 413
lokale ...................................................................... 211
mit fester Größe.................................................. 416
Pass-through ....................................................... 420
Festplatte voll........................................................... 489
Festplattendatei
in einem VM-Snapshot .................................... 478
Fibre Channel .................... 209, 216, 300, 311, 425,
577, 677, 683
LUN in einer VM anbinden............................. 429
Fibre Channel over Ethernet .......... 189, 208, 216,
251, 300, 817
832
Fibre-Channel-Adapter......................................... 397
Fielmalz, Anke.............................................................40
File Transfer Protocol............................................ 214
Filesystem Consistency........................................ 646
Finn, Aidan ...................................................................31
Firewall 씮 Windows-Firewall
Five-Nine .................................................................... 279
Flatrate
für virtuelle Maschinen ................................... 812
Forefront Threat Management
Gateway 2012 ....................................................... 180
Forefront TMG 씮 Forefront Threat Management Gateway 2012
Fragmentierung
Dateisystem ......................................................... 417
Frame........................................................................... 117
Front-Firewall........................................................... 259
FSUTIl.EXE.................................................................. 323
FTP 씮 File Transfer Protocol
Fünf Minuten
Kerberos-Ticket ................................................... 527
Funktionsprofil............................583, 584, 586, 599
G
Gast-Betriebssystem-Profil............. 474, 475, 579,
583, 584, 600
Gast-Cluster ........................................... 424, 522, 545
Gast-Cluster 씮 Guest Failover Clustering
Gast-Teaming ........................................................... 440
Gateway ...................................................................... 576
GbE 씮 Gigabit-Ethernet
Gelöschte VM
importieren .......................................................... 493
GEM.................................................................................28
Geo-Cluster.......................................................291, 292
Geräte-Manager
inaktive Geräte ................................................... 754
Geschäftsführung
Verantwortung ................................................... 287
Geschäftsprozess ....................................34, 632, 648
Abhängigkeit von IT ......................................... 277
Geschwindigkeit
Speichersystem ................................................... 210
Gewichtung
Bandbreiten-Reservierungsmodus.............. 192
Gewissheit
überprüfen ...............................................................39
Gigabit-Ethernet ..................................................... 187
Index
Gleichwertiges Objekt........................................... 588
Globally Unique Identifier .................................. 472
einer VM ................................................................... 71
GPT 씮 GUID Partition Table
Grenze .....................................................................76, 81
für virtuellen Computer (CPU) ...................... 407
Gröbner, Christian .................................................... 31
Group Managed Service Accounts................... 298
Group Policy Preferences.................................... 476
Gruppenrichtlinie .........................................272, 468
Guest Cluster ............................................................ 522
Guest Failover Clustering.................................... 545
GUID Partition Table ....................................587, 691
GUID 씮 Globally Unique Identifier
H
Hannover...................................................................... 29
Hardware
Datenwiederherstellung ........................649, 654
einsparen.................................................................. 35
emulierte .................................................................. 81
Überwachung ...................................................... 702
Hardware Load Balancer...................................... 764
Hardware-Beschleunigung
Netzwerkkarte..................................................... 434
Hardware-Profil........253, 474, 583, 585, 586, 620
Hardware-Topologie verwenden (NUMA).... 413
Hardware-Virtualisierung...................................... 63
HBA 씮 Host-Bus-Adapter
Headcrash.................................................................. 281
Heartbeat ................................................................... 290
zwischen VM und Host ....................................... 65
Henne-Ei-Problem.................................................. 530
Herunterfahren
VM............................................................................ 462
Herunterfahren des Betriebssystems
Integrationsdienst ............................................. 440
Hierarchie
Ressourcen-Pool ................................................. 454
High Availability
VMware..................................................................... 47
Horizontales Skalieren .............299, 308, 317, 328
Host identifizieren ................................................. 470
Host-Bus-Adapter .......................219, 254, 304, 429
Host-Cluster.............................................................. 347
Hosted Cloud............................................................ 607
Host-Gruppe.................................566, 579, 610, 614
Hosting Mode .......................................................... 538
Host-Name
auf dem VM-Desktop anzeigen .................... 471
Host-Profil .............................................. 583, 587, 599
Host-Server
Name in einer VM anzeigen .......................... 470
weitere Dienste betreiben ............................... 531
wiederherstellen ................................................. 651
Host-Teaming .......................................................... 440
Hot-Add Memory ..........................................123, 545
Hot-Spare ................................................................... 232
HRL 씮 VM-Replikation
HTTPS .......................................................................... 767
hv_
Treibermodule in Linux ................................... 512
Hybrid-Cluster ......................................................... 523
Hyper-Threading .......................... 81, 106, 114, 405
Hyper-V....................................................................... 766
Administration ohne Domäne ........................97
Administrator...................................................... 270
Express Full Backup........................................... 683
Installation auf USB-Stick .................................95
Integrationsdienst ............................................. 684
Lizenz .........................................................................92
Manager ...................................................................97
Monitor .................................................................. 706
Remoteverwaltung konfigurieren..................94
Replikatbroker..................................................... 318
Server-Konfiguration...........................................93
Switch ..................................................................... 261
Switch Extension ................................................ 178
Switch-Erweiterung...........................78, 269, 575
Switch-Erweiterung (maximale Anzahl)......82
Version 1.0................................................................45
Version 2.0 ...............................................................45
Version 3.0 ...............................................................45
VSS Writer ....................................................657, 684
Hyper-V Replica................................................ 53, 295
Hyper-V Server 2012 .................................................92
Hypervisor.................................................55, 180, 389
Bare Metal................................................................57
hosted ........................................................................58
Logical Processor ............................................... 704
Microkernel .............................................................61
monolithischer.......................................................60
nativer .......................................................................57
Partition................................................................. 705
Root Virtual Processor ..................................... 704
Typ 1............................................................................57
Typ 2 ...........................................................................58
Virtual Processor................................................ 704
Xen ..............................................................................46
833
Index
I
I/O Operations per Second .....220, 301, 311, 540
I/O-Last ....................................................................... 341
IBM Cambridge Scientific Center........................ 46
Icons
für VM-Verbindungen erzeugen .................. 461
ID einer VM ............................................................... 490
IDE-Controller
in einer VM ..................................................398, 413
IDS 씮 Intrusion Detection System
IIS 씮 Internet Information Services
ILR 씮 Item Level Recovery
Image..................................................................524, 637
Datensicherung .................................................. 634
Probleme bei der Datensicherung............... 638
Image-Level Backup............................................... 637
ImDisk......................................................................... 466
Import ......................................................................... 724
einer VM .......................................................488, 490
VM in einen Cluster........................................... 351
Improvisation
strukturierte......................................................... 288
Improvisieren
nach einem Schaden......................................... 281
Infiniband.................................................................. 311
Initiator....................................................................... 218
Initiatorcache ........................................................... 242
initram ........................................................................ 518
Inkonsistenz
Active Directory.................................................. 524
In-Place-Update....................................................... 735
In-Place-Upgrade .................................................... 725
Input 64 ......................................................................... 29
Installationsmedium
in einer VM ........................................................... 396
Installationsreihenfolge
Hyper-V-Cluster .................................................. 347
Integration Component 씮 Integrationsdienst
Integration Service 씮 Integrationsdienst
Integrationsdienst .............65, 401, 430, 440, 657,
684, 753
aktualisieren ........................................................ 444
Datenaustausch ................................................. 441
für Linux ................................................................ 510
Herunterfahren des Betriebssystems ......... 440
installieren............................................................ 462
Linux ................................................................ 66, 442
Sicherung (Volume-Momentaufnahme) .. 442
Takt.......................................................................... 442
834
Zeitsynchronisation .......................................... 440
Zeitsynchronisierung........................................ 528
Integritätsmonitor ................................................. 575
Intel Virtualization Technology........63, 106, 820
Intel VT 씮 Intel Virtualization Technology
Internet Information Services..................606, 763
Internet SCSI 씮 iSCSI
Internetinformationsdienste 씮 Internet
Information Services
Intrusion Detection System ............................... 259
Intrusion Prevention System ...................259, 264
IOPS 씮 I/O Operations per Second
IPS 씮 Intrusion Prevention System
IPsec ............................................................................. 477
IPsec Task Offloading 씮 IPsec-Task-Abladung
IPsec-Task-Abladung .......................... 183, 436, 576
IPv6......................................................................375, 427
Irrtum
gefährlicher .............................................................38
iSCSI..................... 188, 216, 300, 311, 425, 677, 683
Initiator.........................................................218, 426
LUN in einer VM anbinden............................. 426
Netzwerkverkehr ................................................ 238
Target................................................... 218, 340, 427
Target als Cluster ............................................... 343
Target in Windows Server 2012 .................... 237
ISO-Datei ...........................................................572, 588
zum Datenaustausch ....................................... 466
ISO-Image .........................................................253, 257
Item Level Recovery .....................................683, 689
iX (Zeitschrift)..............................................................29
J
JBOD 씮 Just a Bunch of Disks
Jetzt-Stand
VM-Snapshot ....................................................... 481
Journal......................................................................... 678
Jumbo Frame
in Linux-VM.......................................................... 511
Just a Bunch of Disks ....................................211, 341
K
Kaczenski, Nils ............................................................29
Kapazitätsplanung ................................................. 802
Kappen, Jan...................................................................30
Katastrophe............................................................... 644
Index
KCD 씮 Eingeschränkte Kerberos-Delegation
Keine Mehrheit
nur Datenträger ................................................. 310
Kennwort
Computer .............................................................. 639
Kerberos .................................................. 273, 357, 568
Protokoll ................................................................ 527
Kerberos Constrained Delegation 씮 Eingeschränkte Kerberos-Delegation
Kern 씮 CPU
Kernel
für Linux kompilieren ...................................... 516
Kernprozess ................................................................. 21
Kestel, Sebastian ........................................................ 30
Key/Value Pair Exchange .................................... 441
Klonen......................................................................... 474
Domänencontroller .......................................... 526
Knoten- und Dateifreigabemehrheit.............. 310
Knoten- und Datenträgermehrheit ................ 309
Knotenmehrheit ..................................................... 309
Knowledge Worker 씮 Zielgruppe
Köln................................................................................. 29
Kompatibilität
von CPUs ............................................................... 409
Kompatibilitätseinstellung ................................ 586
Kompilierung eines Linux-Kernels ................. 516
Komplexität
der Virtualisierung ............................................... 33
IT-Netzwerk .......................................................... 284
Komprimieren
VHD-/VHDX-Datei ............................................ 419
Konfiguration
einer VM exportieren........................................ 488
Konfigurationsanbieter ....................................... 580
Konfigurationsfehler ............................................ 655
Konsistenz................................................................. 641
Datenbank ............................................................ 636
Datensicherung .................................................. 638
systemübergreifend .......................................... 649
Konsistenzprüfung ................................................ 680
Konsistenztyp .......................................................... 645
Konsolenverbindung ............................................ 459
Kontextwechsel....................................................... 117
Konvertieren
VHD-/VHDX-Datei ............................................ 419
Konzept
für Ausfallsicherheit ......................................... 287
Kopieren
einer VM ................................................................ 492
Korruption von Daten .......................................... 655
Kosten sparen .............................................................33
Kurzzeitspeicher ............................................677, 681
KVM.............................................................................. 821
L
LACP 802.3ad ...............................................................49
Langzeitspeicher ............................................677, 695
Lastenausgleich ..............................................333, 610
Lastenausgleichsmethode .................................. 575
Lastenausgleichsmodul ..............................574, 597
Lastverteilung
Netzwerkkarte ..................................................... 189
Layer-2-Switch.......................................................... 190
LCPU 씮 Logische CPU
Legacy-Netzwerkadapter .............................. 67, 705
Leistungsindikator ................................................. 330
Leistungsklasse........................................................ 804
Linux
in einer VM ........................................................... 510
Integrationsdienst ...................................... 66, 442
Troubleshooting in Hyper-V.......................... 518
Live-Migration .....................53, 207, 295, 312, 317,
322, 331, 337, 353, 354, 364, 533,
568, 610, 611, 727
Grenze........................................................................37
Netzwerk................................................................ 190
Speichermigration .................353, 360, 361, 362
vSAN beachten .................................................... 429
Lizenzierung ............................................................. 810
Applikation........................................................... 812
benutzerbezogene.............................................. 806
endgerätebezogene ........................................... 806
Virtual Desktop Access .................................... 808
Lizenzmobilität ....................................................... 812
Load Balancer ........................................................... 817
Logical Unit Number...... 216, 218, 316, 320, 340,
344, 421, 429, 533
in einer VM ........................................................... 424
Logische CPU ............................................................ 405
Logischer Switch ..................................................... 575
Logisches Netzwerk ............................ 574, 592, 597
vom physischen Netzwerk entkoppeln...... 190
Löschmethode ......................................................... 264
LUN 씮 Logical Unit Number
Lüscher, Michel...........................................................31
Lync .............................................................................. 131
835
Index
M
MAC-Adresse ...................................................117, 722
dynamische .......................................................... 438
einer virtuellen Netzwerkkarte..................... 437
MAC-Adress-Pool.................................................... 574
Mailbox-Rollen-Kalkulator ................................. 540
Mailserver
wiederherstellen ................................................. 633
Mainframe.................................................................... 46
Maintenance Host.................................................. 503
Malware ...................................................................... 650
Management OS 씮 Management-Betriebssystem
Management Pack.................................................. 705
Katalog .................................................................. 715
Management-Betriebssystem .............................. 67
Netzwerk................................................................ 190
Mandantenadministrator................................... 578
Mandantenfähigkeit ............................................. 596
MAP 씮 Microsoft Assessment and Planning
Toolkit
Master Boot Record ......................................587, 691
Maurer, Thomas......................................................... 31
Maximales RAM.............................................121, 404
Maximalwert............................................................... 76
MBR 씮 Master Boot Record
MBSA 씮 Microsoft Baseline Security Analyzer
MDOP 씮 Microsoft Desktop Optimization Pack
Mean Time Between Failures............................. 283
Mehrheit
keine Mehrheit .................................................... 310
Knoten.................................................................... 309
Knoten und Dateifreigabe.............................. 310
Knoten und Datenträger ................................ 309
Memory
Buffer ...................................................................... 126
Pressure.................................................................. 124
Weight .................................................................... 126
memoryreserve....................................................... 115
Messung
von VM-Ressourcen .......................................... 457
Metering............................................................447, 457
Metrik
zur Abrechnung der VM-Nutzung............... 448
Microsoft
Assessment and Plannung Toolkit ............. 311
Baseline Security Analyzer ............................. 262
Customer Support Services ............................ 301
Desktop Optimization Pack.................... 50, 807
836
Dynamics .............................................................. 544
Enterprise Desktop Virtualization .................50
Exchange ............................................ 130, 266, 689
Exchange Server 2007 ...................................... 308
Forefront Threat Management Gateway
2010 .................................................................... 267
Forefront Unified Access Gateway 2010... 267
Message Analyzer .....................................184, 186
SharePoint ................................550, 673, 680, 689
SQL Server .... 131, 317, 557, 558, 559, 619, 689
SQL Server Management Pack...................... 712
Virtual PC ......................................... 46, 50, 59, 414
Virtual Server..........................................................58
Virtual Server 2005 ........................................... 521
Virtual Server 2005 R2 ............................535, 737
Virtual Server 2005 R2 SP1..........................45, 51
Windows Server 2012 Hyper-V .........................47
Microsoft-Update-Datei ....................................... 499
Mindest-Bandbreite............................................... 188
Minimale Server-Benutzeroberfläche............ 107
Minimales RAM..............................................121, 404
Mirror .......................................................................... 231
Möglicher Besitzer.................................................. 291
Momentaufnahme 씮 Snapshot
Most Valuable Professional ...................................28
Mountpoint .............................................................. 235
MPIO 씮 Multipfad-E/A
MSA 씮 Microsoft Message Analyzer
MSI-Paket ................................................................... 181
MSU 씮 Microsoft-Update-Datei
MTBF 씮 Mean Time Between Failures
Multihomed DC....................................................... 532
Multipath I/O 씮 Multipfad-E/A
Multipfad-E/A ...........196, 208, 219, 240, 243, 250
Multi-Site-Cluster ................................................... 335
MVP 씮 Most Valuable Professional
N
N_Port ID Virtualization.........................................82
Name
einer VM ................................................................ 401
Namenskonvention
für Netzwerkkarten ........................................... 469
für Ressourcen-Pools ........................................ 453
NAS 씮 Network Attached Storage
NDIS 씮 Network Device Interface Specification
NDMP 씮 Network Data Management Protocol
Nested Virtualization............................................ 821
netlogon ..................................................................... 642
Index
Network Attached Storage .................49, 210, 214,
243, 344, 678, 817
Network Data Management Protocol ........... 425,
634, 645
Network Device Interface Specification ....... 178,
179, 181, 184, 575
Network File System..............................48, 214, 678
Network Load Balancing................... 574, 575, 597
Network Time Protocol ........................................ 527
Netzwerk
Datenverkehr messen....................................... 449
Fallbeispiel ............................................................ 207
iSCSI......................................................................... 238
PVLAN........................................................................ 79
Trace........................................................................ 186
Virtualisierung....................................................... 79
Netzwerkanmeldedienst ..................................... 641
Netzwerkfreigabe.................................................... 688
Netzwerkkarte
ältere ................................................................ 67, 430
Bandbreiten-Verwaltung ................................ 434
benennen............................................................... 469
dimensionieren ................................................... 432
einrichten in einer VM ..................................... 433
emulierte ............................................................... 430
Hardware-Beschleunigung ............................ 434
im Management OS .......................................... 188
in Debian einrichten ......................................... 515
in einer VM ........................................ 395, 396, 430
MAC-Adresse........................................................ 437
maximale Anzahl ................................................. 82
synthetische .................................................. 67, 430
Teaming........................................................305, 575
überbuchen .......................................................... 432
Netzwerknamenressource.................................. 290
Netzwerkstandort................................................... 574
Netzwerkverbindung
interne zwischen Host und VM .................... 464
Netzwerkverkehr
separieren ............................................................. 190
Neu starten
VM............................................................................ 462
Neumann, Daniel....................................................... 31
NEWSID....................................................................... 472
NFS 씮 Network File System
NIC-Teaming............................................................. 206
NIC-Teamvorgang
in einer VM ........................................................... 439
NLB 씮 Network Load Balancing
Node Drain ................................................................ 336
Node Vote Weight .................................................. 335
None
Bandbreiten-Reservierungsmodus.............. 192
Non-Uniform Memory Access .................127, 411
Notfall-Rechenzentrum ....................................... 815
NPIV 씮 N_Port ID Virtualization
NT 4.0
Prozessorkompatibilität ................................. 411
NTFS 씮 Dateisystem
NTP 씮 Network Time Protocol
NUMA 씮 Non-Uniform Memory Access
O
Objektermittlung.................................................... 706
Offline
Datenträger.......................................................... 422
OOBE 씮 Out of the Box Experience
OpenFlow-Switch.................................................... 178
Operations Manager....... 307, 553, 580, 693, 702,
705, 710
Management Pack ...................................307, 693
Root Management Server............................... 712
Verwaltungskonsole ......................................... 713
Oracle
Support................................................................... 548
VirtualBox................................................................59
Oracle Database....................................................... 548
Ressource............................................................... 549
Orchestrierung ........................................................ 615
OU-Struktur .............................................................. 272
Out of the Box Experience .................................. 473
Overcommit 씮 Überbuchen
P
P2V.........................................................39, 52, 554, 590
alte Hardware ..................................................... 744
DHCP....................................................................... 754
für Domänencontroller ..........................525, 746
Offline ..................................................................... 748
Online ..................................................................... 747
Physical-to-virtual-Migration..........................39
USB........................................................................... 746
verschlüsseltes Laufwerk ................................ 751
Pacifica ...........................................................................63
Packet .......................................................................... 117
Pagefile........................................................................ 223
Paging.......................................................................... 118
Paravirtualisierung .....................................62, 64, 72
837
Index
Parent Partition...................................................61, 67
Parität.......................................................................... 231
Partition ........................................................................ 46
Child Partition........................................................ 72
Festplatte............................................................... 223
Parent Partition..................................................... 67
Partitionsstil GPT......................................245, 246
Virtualisierung....................................................... 63
Pass-through Disk ............................... 225, 355, 420
Export einer VM.................................................. 489
Passthrough Storage 씮 Pass-through Disk
Patch-Strategie......................................................... 253
PCI Express................................................................ 436
PDC-Emulator .................................................527, 530
Peek-&-Poke-Poster .................................................. 29
Performance and Resource Optimization... 296,
581, 737
Performance Baseline........................................... 704
Perimeter-Netzwerk .....................................273, 567
Persistenz-Modus................................................... 575
Physical to Virtual 씮 P2V
Physical-to-virtual-Migration 씮 P2V
Physische Festplatte
in einer VM ........................................................... 420
PKI 씮 Public Key Infrastructure
Platz, Dennis ...................................................... 43, 813
Plug-in......................................................................... 334
PMADSchemaExtension...................................... 694
PO 씮 Power Optimization
Port ACL...................................................................... 268
Port-Adresse
virtueller Fibre-Channel-HBA........................ 429
Port-Gruppe .............................................................. 621
Port-Klassifizierung......................................575, 597
Port-Profil .................................................................. 576
systemeigenes ..................................................... 576
Port-Spiegelung..............................................184, 185
auf einem virtuellen Switch ........................... 439
Power and Resource Optimization
Funktion ................................................................ 706
Integration ........................................ 714, 716, 719
Power Optimization .......................... 555, 575, 610,
612, 614, 625
Power User 씮 Zielgruppe
PowerShell.................................................23, 181, 659
Administration von Hyper-V ........................... 84
Einstieg...................................................................... 85
Export-Skript........................................................... 84
Get-Help.................................................................... 87
Intellisense............................................................... 86
838
ISE................................................................................85
Skript..........................................................................91
Übersicht der Commandlets.............................92
Update.......................................................................87
Präsentationsvirtualisierung............................. 757
Preboot Execution Environment...........430, 571,
572, 587, 628
Primordial
Ressourcen-Pool ................................................. 454
Speicher-Pool ....................................................... 232
Priorität
von VM ................................................................... 407
Private Cloud ..................................................... 25, 607
PRO 씮 Performance and Resource
Optimization
Projektablauf ...............................................................21
Projektpraxis ...............................................................32
Projektziel.....................................................................33
Protected Mode ..........................................................63
Protokoll
dateiorientiertes................................................. 214
Provisionierung ...................................................... 474
Prozentwert für Verfügbarkeit.......................... 279
Prozess ........................................................................ 117
Prozessor
in einer VM ........................................................... 405
Prozessorarchitektur............................................. 688
Prozessorkompatibilität .............................354, 409
Prozessorversion .................................................... 409
PRTG Network Monitor........................................ 706
Prüfpunkt 씮 Snapshot
Public Key Infrastructure .................................... 605
PXE 씮 Preboot Execution Environment
Q
Quality of Service (QoS) 씮 BandbreitenManagement
Quick-Migration.............................................337, 539
Quorum ................................................... 250, 348, 727
Quote ........................................................................... 600
R
RAC 씮 Real-Application Cluster
Rachfahl, Carsten .......................................................31
RADC 씮 RemoteApp- und DesktopVerbindung
Index
RAID
Alternative............................................................ 230
für RAM.................................................................. 123
Konfiguration...................................................... 212
Level 1.............................................................231, 310
Level 5 ..................................................................... 231
RAM.............................................................................. 116
tatsächlicher Bedarf.......................................... 133
Random I/O .............................................................. 547
Raw Device Mapping............................................. 226
RCO 씮 Recovery Consistency Objective
RDMA 씮 Remote Direct Memory Access
RDP 씮 Remote Desktop Protocol, Remotedesktop-Protokoll
RDS CAL Per Device 씮 Lizenzierung
RDS CAL Per User 씮 Lizenzierung
RDS CAL 씮 Remote Desktop Services Client
Access License
RDS 씮 Remote Desktop Services
Read-Only Domain Controller .................298, 651
Real-Application Cluster ...................................... 549
Recovery
Methode................................................................. 634
Szenario ................................................................. 649
Recovery Consistency Objective .............647, 648
Recovery Objective ................................................ 647
Recovery Point Objective ...........................647, 648
Recovery Time Actual ..................................647, 648
Recovery Time Objective..................................... 647
Red Hat ....................................................................... 511
Redirected I/O.......................................................... 342
Redo-Log .................................................................... 549
Redundant Array of Independent Disks 씮 RAID
Redundanz ................................................................ 278
problematische ................................................... 283
standortübergreifende..................................... 815
Redundanzkonzept................................................... 43
Redundanztyp
Storage Space ...................................................... 231
ReFS 씮 Reliable File System
Regelwerk
zur Konfiguration ................................................. 74
Relationale Datenbank......................................... 635
Relative Gewichtung (CPU)................................. 407
Reliable File System ............................................... 673
Remote Desktop...................................................... 761
aktivieren in einer VM...................................... 468
Lizenzierung................................................766, 805
Remote Desktop Protocol ................................... 464
Remote Desktop Services.................................... 557
und Dynamic Memory..................................... 130
Remote Desktop Services Client Access
License...........................................................766, 806
benutzerbasierte ................................................ 766
endgerätebasierte.............................................. 766
Remote Direct Memory Access......................... 297
Remote Server Administration Tools............. 557
Remote-Aktualisierung........................................ 332
RemoteApp ......................................................758, 783
Funktionsweise ................................................... 763
RemoteApp- und Desktopverbindung .......... 784
Remotedesktopdienst........................................... 757
Bereitstellung virtueller Desktops ............... 772
Gateway................................................................. 765
Historie................................................................... 759
Schnellstart-Installation ................................. 768
Sitzungsbasierte Desktopbereitstellung ... 769
Sitzungs-Host ...................................................... 765
Verbindungs-Broker.......................................... 764
Virtualisierungs-Host....................................... 765
WebAccess............................................................. 763
Remotedesktop-Gateway .................................... 762
Remotedesktop-Lizenzierung ........................... 762
Remotedesktop-Protokoll.......266, 464, 761, 791
virtuelle Kanäle................................................... 791
RemoteFX .........................................................354, 791
3D-Grafikkarte .................................................... 397
Adaptive Graphics ............................................. 792
Contact Rectangle ............................................. 796
Multi-Touch.......................................................... 796
Relative Timing................................................... 796
Touch Frames ...................................................... 796
USB Redirection .................................................. 796
Verfügbarkeit....................................................... 797
vGPU ....................................................................... 795
RemoteFX Adaptive Graphics 씮 RemoteFX
Remoteserver-Verwaltungstools (RSAT)....... 103
repadmin.................................................................... 642
Replay-Angriff.......................................................... 527
Replikat
SAN-basiertes....................................................... 637
Replikation
Active Directory.................................................. 524
des Active Directorys ........................................ 640
Reserve für virtuellen Computer (CPU)......... 407
Ressource
Maximalwerte in einer VM ............................ 391
Ressourcenabhängigkeit ..................................... 290
Ressourcengruppe.................................................. 290
Ressourcen-Pool...................................................... 447
einrichten .............................................................. 452
VMware.....................................................................48
839
Index
Ressourcentyp
in einem Ressourcen-Pool .............................. 447
Restore ...............................................................629, 655
Reverse Proxy .......................................................... 817
Risikoplanung .......................................................... 651
RODC 씮 Read-Only Domain Controller
Rogue DHCP Server ............................................... 439
Rogue Router............................................................ 439
Rollback ...................................................................... 649
Rolleninhaber .......................................................... 329
Root Domain ............................................................ 653
Root Partition........................................................... 705
Router Guard 씮 Router-Wächter
Router-Wächter ....................................................... 439
RPO 씮 Recovery Point Objective
RSAT 씮 Remote Server Administration Tools
RTA 씮 Recovery Time Actual
RTO 씮 Recovery Time Objective
S
SaaS 씮 Cloud
Sammlung ................................................................. 764
Sitzung ................................................................... 764
virtueller Desktops ............................................ 764
SAN 씮 Storage Area Network
SAP 씮 Enterprise Resource Planning
SAS 씮 Serial Attached SCSI
SATA 씮 Serial ATA
SBC 씮 Server-Based Computing
Scale-Out File Server.....................................308, 346
SCC 씮 Single Copy Cluster
SCCM 씮 Configuration Manager
SCDPM 씮 System Center 2012 Data Protection
Manager
Schaden
für das Unternehmen ....................................... 281
Schadensszenario................................................... 632
Schattenkopie ....................................... 387, 636, 656
Schwenk des Rechenzentrums ......................... 285
SCOM 씮 Operations Manager
SCR................................................................................ 537
Screenshot
einer VM ................................................................ 463
SCSI............................................................................... 292
Controller in einer VM .................. 396, 399, 413
SCVMM 씮 System Center 2012 Virtual Machine
Manager
SCVMM 씮 Virtual Machine Manager
SCW .....................................................................254, 262
840
Second Level Address Translation ..........101, 106
Second Level Paging .....................................118, 127
Security Configuration Editor ........................... 254
Security Identifier................................ 256, 472, 643
Selbst signiertes Zertifikat .................................. 605
Selbstaktualisierung.............................................. 332
Self-Service
Benutzer........................................................578, 588
Benutzergruppe .................................................. 606
Benutzerrolle...............................................587, 600
sepago ............................................................................28
Sequential Write I/O.............................................. 547
Serial ATA..........................................................106, 310
Serial Attached SCSI ............................ 106, 300, 310
Server Cloning.......................................................... 255
Server Message Block ...... 112, 214, 477, 678, 688
SMB 3.0............................. 252, 297, 323, 673, 727
Server Virtualization Validation
Program .............................................. 522, 535, 544
Server-Applikation
Lizenz ...................................................................... 812
Server-Ausfall ........................................................... 630
Server-Based Computing.............................. 28, 758
Server-Core-Installation....................................... 107
Server-Manager ..............................................107, 312
Server-Virtualisierung
Vor- und Nachteil..................................................35
Service Level Agreement ..................................... 680
Setup ............................................................................ 722
sFlow ............................................................................ 178
SFTP 씮 Simple File Transfer Protocol
Shared Nothing Live-Migration...............320, 724
Shared Nothing Live-Migration 씮 LiveMigration
Shared-SAS ................................................................ 341
SharePoint ................................................................. 673
in einer VM ........................................................... 550
Ressource............................................................... 550
Support................................................................... 550
SharePoint 씮 Microsoft
Shortcut
für VM-Verbindungen erzeugen .................. 461
Sicherheitsprotokoll.............................................. 697
Sicherung (Volume-Momentaufnahme)
Integrationsdienst ............................................. 442
Sicherungsagent ..................................................... 636
SID 씮 Security Identifier
Silje, Peter......................................................................41
Silverlight................................................................... 607
SIM 씮 Windows System Image Manager
Simple File Transfer Protocol............................. 622
Index
Simultask ...................................................................... 46
Single Copy Cluster................................................ 537
Single Point of Failure..................................254, 308
Single Sign-on .......................................................... 272
Single-Root I/O Virtualization 씮 E/AVirtualisierung mit Einzelstamm
Sitter, Till ....................................................................... 40
Sitzungsbasierte Desktop-Bereitstellung ..... 758
Sitzungsbasierter Desktop.................................. 758
Sitzungs-Host..................................................762, 765
Sitzungssammlung.......................................764, 782
Sitzungssammlung 씮 Sammlung
Skalieren
horizontales .............................299, 308, 317, 328
SLA 씮 Service Level Agreement
SLAT 씮 Second Level Address Translation
Small Business Server ........................................... 131
Smart Paging ...................................................126, 401
SMB 씮 Server Message Block
SMI-S 씮 Storage Management Initiative –
Specification
SMP 씮 Storage Management Provider
Snapshot .....................353, 477, 539, 601, 658, 722
anwenden ............................................................. 482
Checkpoint............................................................ 477
Dateigröße............................................................ 484
Datensicherung .................................................. 634
einer VM ......................................................... 37, 477
entfernen ............................................................... 485
exportieren ..................................................487, 489
Name....................................................................... 480
Prüfpunkt .....................................................477, 601
SAN-basierter....................................................... 637
virtuelle Maschine ............................................. 637
VM............................................................................ 462
zurücksetzen ........................................................ 482
zusammenführen............................................... 486
SoC 씮 System-on-a-Chip
Sockel........................................................................... 405
Lizenzierung pro................................................. 811
SOFS 씮 Scale-Out File Server
Soft Partitioning...................................................... 548
Software Assurance ............................................... 813
Software-VSS-Provider ......................................... 683
Solid State Disk ........................................................ 106
Spaghetticode ............................................................. 29
Sparziel .......................................................................... 33
Speicher
zentraler ................................................................ 210
Speicherbedarf des Betriebssystems .............. 801
Speicher-Cluster...................................................... 340
Speichergerät
Vorteil ..................................................................... 236
Speicherkapazität
Host-Server ........................................................... 210
Speicherklassifizierung ........................................ 599
Speichern
VM............................................................................ 462
Speichernetzwerk
mit 10GE im Host-Server ................................. 196
Speicherort
für die Smart-Paging-Datei............................ 401
für Snapshot-Datei ............................................ 401
Speicherpfad............................................................. 227
einer VM ................................................................ 394
Speicher-Pool .................... 212, 228, 230, 297, 311,
340, 341, 691
RAM ......................................................................... 120
Speicherseite ............................................................ 118
Speichersystem
Komplettkopie .................................................... 645
Spiegel ......................................................................... 231
SPLA 씮 Cloud
Split Brain .........................................................208, 307
SPoF 씮 Single Point of Failure
SQL Server...................317, 543, 557, 558, 559, 619
Dynamic Memory .............................................. 545
Support................................................................... 544
SQL Server 2012........................................................ 673
Lizenz ...................................................................... 813
SQL Server Core Library ....................................... 714
SQL Server 씮 Microsoft
SQL Server-Profil ............................................583, 587
squeeze (Debian)..................................................... 515
SR-IOV 씮 Single-Root I/O Virtualization
SSD 씮 Solid State Disk
Standard Edition
Windows Server 2012 ........................................ 810
Standby-Cluster....................................................... 291
Starten
VM............................................................................ 462
Startreihenfolge
in einer VM ........................................................... 398
Startvorgang
einer VM beobachten ....................................... 460
Stolperfalle ...................................................................36
Storage ...............................................................210, 340
Storage Area Network .... 210, 215, 254, 300, 301,
305, 307, 310, 311, 320, 344, 397, 533, 555
Datensicherung .................................................. 634
Datenträger in einer VM ................................. 423
virtuelles ................................................................ 426
841
Index
Storage Management Initiative –
Specification ........................................................ 577
Storage Management Provider......................... 577
Storage Space 씮 Speicher-Pool
Storage-Controller.................................................. 300
Storage-Management ..................................554, 555
Storage-Migration ..................................................... 53
Storge Area Network ............................................. 305
Strg + Alt + Ende .............................................462, 463
Strg + Alt + Entf........................................................ 463
Strom sparen ............................................................... 33
Stromversorgung
Ausfall .................................................................... 650
Stromzähler .............................................................. 449
Subject Alternate Name ....................................... 606
Support
Best Practices Analyzer....................................... 74
für Cluster ............................................................. 522
für virtuelle Umgebung ...................................... 37
Oracle Database................................................. 548
SharePoint ............................................................ 550
SQL Server ............................................................. 544
Support-Policy
für virtuelle Umgebungen .............................. 521
SVVP 씮 Server Virtualization Validation
Program
Switch
Layer 2 ....................................................................... 78
Switch-Erweiterung ............................................... 182
Synchronisierungs-Engine ................................. 684
Synthetische Netzwerkkarte .............................. 430
Synthetisches Gerät.................................................. 72
Sysinternals .............................................................. 471
Sysprep ...........................................256, 472, 473, 775
System Center 2012
App Controller........................... 45, 559, 587, 601
Configuration Manager ............... 501, 553, 694
Data Protection Manager .......... 254, 542, 620,
672, 673, 703
Endpoint Protection.......................................... 306
Operations Manager ...........307, 553, 580, 693,
702, 705, 710, 712, 713
Operations Manager (SCOM)....................45, 53
Orchestrator............................................................ 46
Service Manager und System Center
Orchestrator....................................................... 46
Virtual Machine Manager.............53, 253, 254,
296, 333, 474, 501, 541, 553, 673, 703,
712, 714, 717
842
System Center Virtual Machine
Manager 2007 ........................................................52
System Center Virtual Machine
Manager 2008 R2 ............................................... 555
System State ....................................................651, 653
Systemadministration 씮 Zielgruppe
Systemeigenes Port-Profil................................... 576
systeminfo................................................................. 101
System-on-a-Chip ................................................... 792
Systemprotokoll...................................................... 696
Systemstate
Active Directory.................................................. 524
Systemvorbereitungsprogramm ..................... 472
Systemzeit ................................................................. 440
T
Tablespace ................................................................. 549
Takt
Integrationsdienst ............................................. 442
Tape-Library.............................................................. 645
Target........................................................................... 218
Task Worker 씮 Zielgruppe
Tastaturpuffer .......................................................... 463
Teaming
Netzwerkkarte ..................................................... 189
Terminal-Dienst .............................................130, 759
Testlabor
für Hyper-V ........................................................... 820
Text aus Zwischenablage eingeben................. 463
Thin Provisioning.......................223, 232, 417, 425
Thread ......................................................................... 117
TLS/SSL...............................................................765, 767
TMG 씮 Forefront Threat Management
Gateway 2012
Toaster......................................................................... 214
Tombstone Recovery ............................................ 655
Tool
Convert-WindowsImage.ps1 .......................... 494
dism ...................................................... 496, 499, 509
dism /Apply-Image............................................ 496
dism /Apply-Unattend ..................................... 509
dism /Enable-Feature ....................................... 499
dism /Get-ImageInfo ........................................ 496
dism /Get-PackageInfo.................................... 500
dism /Mount-Image....................... 496, 499, 509
dism /Unmount-Image ................ 496, 499, 509
PsExec ..................................................................... 502
Sysprep ..........................................................508, 509
Index
SysPrep /Mode .................................................... 509
VM Services Tool ................................................ 501
WIM2VHD ............................................................. 495
TPM 씮 Trusted Platform Module
Transactional Consistency.................................. 646
Transaktion......................................................640, 646
Transaktionsprotokoll
SQL Server ............................................................. 547
Tree (Active Directory) ......................................... 653
Trusted Platform Module.................................... 269
U
Überbuchen
Arbeitsspeicher ................................ 118, 127, 403
Speicherplatz im Storage Space ................... 233
Überprovisionierung ............................................... 82
Überwachung
rechtliche Bedenken.......................................... 697
Ubuntu........................................................................ 513
UE-V 씮 User Experience Virtualization
Undo-Log ................................................................... 549
Unified Messaging Server ..........................535, 538
Unterbrechungsfreie Stromversorgung ....... 305
Unternehmenseigene Zertifizierungsstelle ........................................................................ 605
Unterstütztes Gast-Betriebssystem ................... 80
Update
Fehler rückgängig machen ............................ 482
fehlerhaftes .......................................................... 654
Update Sequence Number .................................. 640
Rollback ................................................................. 640
Update-Ausführungsprofil ........................332, 333
Update-Basislinie.................................................... 617
Update-Katalog........................................................ 590
Uplink-Port-Profil................................................... 575
USB
Anschluss lokaler Geräte ................................... 83
USB-auf-Ethernet-Adapter ............................. 393
USB-Festplatte in einer VM ............................ 423
USB-Platte für Server vermeiden ................. 230
USB-Schnittstelle in einer VM ....................... 392
User Experience Virtualization......................... 807
USN 씮 Update Sequence Number
USN Rollback ......................................... 524, 525, 746
USV 씮 Unterbrechungsfreie Stromversorgung
V
V2V................................................................52, 554, 733
Vanderpool...................................................................63
VCO 씮 Virtual Computer Object
vCPU................................................................................81
Prozessorfunktion einschränken ....................83
vCPU 씮 Virtuelle CPU
VDA 씮 Lizenzierung
VDev 씮 Virtual Device
VDI 씮 Virtual Desktop Infrastructure
VDI 씮 Virtuelle Desktop-Infrastruktur
Veeam ONE für Hyper-V...................................... 706
Verbindungs-Broker.....................................761, 764
Verbrauchsmessung.............................................. 447
Verfügbarkeit ........................................................... 277
Definition .............................................................. 278
zugesagte .............................................................. 282
Verfügbarkeitsklasse ............................................. 281
Verkleinern
VHD-/VHDX-Datei ............................................ 419
Versicherungspolice.............................................. 287
Vertrauensstellung ................................................ 675
Verwaiste Ressourcen ........................................... 590
Verwaltungsbetriebssystem .............................. 178
VF 씮 Virtual Function
VFD 씮 Virtual Floppy Disk
VHD 씮 Virtual Hard Disk
VHD-Datei.................................................................. 588
VHDX 씮 Virtual Hard Disk Extended
Viel hilft viel....................................................... 24, 390
VIP-Profil 씮 Virtual Machine Manager
VIP-Vorlage 씮 Virtual Machine Manager
Virenscanner ............................................78, 263, 266
Virtual-to-Virtual-Migration 씮 V2V
Virtual Computer Object ..................................... 298
Virtual Desktop Infrastructure....... 107, 129, 418
Virtual Device..............................................................71
Virtual Floppy Disk ................................................ 466
Virtual Function...................................................... 436
Virtual Hard Disk Extended ............................... 494
Virtual Hard Disk ..........................................414, 494
erweitern ............................................................... 419
im Host einbinden ............................................. 467
komprimieren...................................................... 419
konvertieren......................................................... 419
verkleinern ............................................................ 419
Virtual IDE Controller ........................................... 705
Virtual Iron...................................................................46
843
Index
Virtual LAN...................................... 78, 260, 347, 574
VLAN-ID ................................................................. 190
VLAN-ID, virtuelle Netzwerkkarte ............... 434
Virtual Machine Generation ID ........................ 524
Virtual Machine Health Summary .................. 704
Virtual Machine Management Service ............. 69
Virtual Machine Manager ......253, 254, 296, 333,
553, 597, 600, 673, 703
Administrator-Rolle .......................................... 717
Agent...........................................562, 590, 628, 740
Anwendungsadministrator ..................578, 579
Anwendungspaket ............................................ 582
Anwendungsprofil ....................................582, 583
Anwendungsskript ............................................ 582
Auftrag ................................................................... 582
Ausführungskonto ......................... 566, 569, 584
Benutzerrolle ........566, 578, 579, 600, 601, 607
Bibliothek ...............554, 562, 582, 588, 599, 624
Bibliotheksfreigabe ........................ 477, 578, 589
Bibliotheks-Server ..................555, 557, 571, 589
Cloud.....556, 566, 579, 584, 595, 596, 597, 608
Cloud-Bibliothek................................................. 588
Cloud-Kapazität ................................................. 596
Compliance-Management ............................. 554
Datenbank ............................................................ 738
Dienstkonto.......................................................... 739
Dienstvorlage .............................................582, 583
Dynamic Optimization.................................... 575
Fabric ..........................................573, 586, 624, 628
Fabric-Administrator ....................................... 578
Fabric-Management ...................... 554, 566, 570
File System ............................................................... 47
Funktionsprofil .......................583, 584, 586, 599
Gast-Betriebssystem-Profil 579, 583, 584, 600
Hardware-Profil............ 579, 583, 585, 586, 620
Host-Gruppe ............................566, 579, 610, 614
Host-Profil ......................................... 583, 587, 599
Konfigurationsanbieter................................... 580
Lastenausgleich.................................................. 610
Lastenausgleichsmethode.............................. 575
Lastenausgleichsmodul..........................574, 597
logischer Switch.................................................. 575
logisches Netzwerk......................... 574, 592, 597
MAC-Adress-Pool ............................................... 574
Management Pack ............................................ 714
Mandantenadministrator.............................. 578
Mandantenfähigkeit ........................................ 596
Migration .............................................................. 735
Netzwerkstandort.............................................. 574
Port-Gruppe ......................................................... 621
Port-Klassifizierung .................................575, 597
844
Port-Profil.............................................................. 576
Power Optimization.............555, 575, 610, 612,
614, 625
Self-Service Portal .............................................. 739
Self-Service-Benutzer ...............................578, 588
Self-Service-Benutzergruppe.......................... 606
Self-Service-Benutzerrolle ......................587, 600
SQL Server-Profil........................................583, 587
Storage-Management ...................................... 554
Verwaltungskonsole .............541, 564, 565, 712
Verwaltungs-Server........................................... 562
VIP-Profil ............................................................... 597
VIP-Vorlage .......................................................... 574
Virtual Center .........................................................47
virtuelle Anwendung ........................................ 582
VMM-Vorlage ...................................................... 566
VM-Vorlage .......................................................... 589
Vorlage................................................................... 259
Webanwendung.................................................. 582
Virtual Machine Monitor .......................................55
Virtual Machine Queue ..................... 183, 435, 576
Virtual Machine Servicing Tool ........................ 501
Virtual Machine Worker Process.........................70
Virtual PC ...............................................................46, 50
Virtual PC 씮 Microsoft
Virtual Server 씮 Microsoft
Virtual Storage Device .......................................... 705
VirtualBox ................................................................. 821
VirtualBox 씮 Oracle
Virtual-Floppy-Format ......................................... 400
Virtualisierung
Präsentation ........................................................ 757
warum? .....................................................................32
Virtualisierungs-Host ..................................762, 765
Virtualisierungs-Stack .............................................69
Virtualisierunsgprojekt
Planung.....................................................................32
Virtualization Service Client .................................72
Virtualization Service Provider............................72
Virtualization Stack ..................................................69
VirtualManagerDB ................................................. 561
Virtual-Netzwerkadapter..................................... 705
Virtuelle CPU ............................................................ 406
Virtuelle Desktop-Infrastruktur .............107, 129,
418, 758
Virtuelle Festplatte................................................. 413
in einer VM ........................................................... 395
kopieren ................................................................. 637
zum Datenaustausch ....................................... 466
Virtuelle Floppy Disk
zum Datenaustausch ....................................... 466
Index
Virtuelle Hardware................................................. 396
dimensionieren ................................................... 390
Virtuelle Maschine................................................. 389
anhalten ................................................................ 462
Anzeigename....................................................... 401
Arbeitsspeicher ................................................... 402
COM-Port .............................................................. 400
Diskettenlaufwerk ............................................. 400
Export ............................................................488, 638
exportieren ........................................................... 488
Festplatte............................................................... 413
Fibre Channel....................................................... 429
IDE-Controller ..................................................... 398
im Cluster erzeugen .......................................... 349
Import..................................................................... 488
importieren .......................................................... 490
Integrationsdienst ....................................401, 462
kopieren ................................................................. 492
Netzwerkkarte..................................................... 430
neu starten ........................................................... 462
NIC-Teaming........................................................ 439
physische Festplatte.......................................... 420
Prozessor ............................................................... 405
Remote Desktop aktivieren............................ 468
Ressource .............................................................. 391
SAN-Datenträger................................................ 423
SCSI-Controller.................................................... 399
Snapshot................................................................ 462
USB-Festplatte..................................................... 423
zurücksetzen ........................................................ 462
Virtueller Datenträger
Storage Space ...................................................... 231
Virtuelles Gerät .......................................................... 71
Virtuelles Netzwerk
im Management OS einrichten .................... 191
Virtuelles SAN .......................................................... 429
VLAN 씮 Virtual LAN
VM 씮 Virtuelle Maschine
VM Vid Partition ..................................................... 705
VMBus............................................................................ 64
VMConnect ......................................................445, 459
VMDK 씮 VMware
VMFS 씮 Virtual Machine Manager, File System
VMFS 씮 VMware
VM-Generation ID.........................................524, 527
vmickvpexchange .................................................. 441
VMM 씮 Virtual Machine Manager
VM-Monitoring ....................................................... 707
VMMS 씮 Virtual Machine Management
Service
vMotion 씮 VMware
VMQ 씮 Virtual Machine Queue
VM-Replikation ..............................................354, 366
Authentifizierung............................ 368, 370, 376
Domänencontroller .......................................... 526
Erstkopie................................................................ 373
Failover-TCP/IP ................................................... 375
geplantes Failover ............................................. 384
Hyper-V Replica Log ......................................... 367
Kompression ...............................................370, 376
Replikat .........................................................366, 379
Replikat-Server........................367, 370, 372, 387
Synchronisation ................................................. 378
Testfailover........................................................... 381
Testreplikat........................................................... 382
Wiederherstellungspunkt ........... 367, 372, 376,
381, 387
VM-Replikation 씮 Hyper-V Replica
VM-Snapshot
für SQL Server ...................................................... 545
VMST 씮 Virtual Machine Servicing Tool
VM-Vorlage ...............265, 472, 473, 474, 476, 477,
589, 608
VMware....................................................................... 572
ESX .....................47, 554, 584, 597, 610, 621, 737
ESX 3.5..................................................................... 622
ESX 4.1 ..................................................................... 622
ESX Server .........................................................57, 63
ESX Server 2.5 ..........................................................46
ESXi................................................................... 47, 621
ESXi 3.5.................................................................... 622
ESXi 4.1.................................................................... 622
GSX Server.........................................................46, 58
Player ...................................................................... 821
Server ..................................................................46, 58
Tools ........................................................................ 734
vCenter ......................................... 48, 571, 621, 623
vCenter 4.1 ............................................................. 622
vCenter 5.1 ............................................................. 622
vCenter Server ..................................................... 737
VMDK............................................................... 48, 621
vMotion ................................................... 48, 63, 621
vSphere.................................. 19, 47, 553, 554, 573
vSphere Hypervisor ..............................................57
vSphere Server 5.1 ..................................................47
Workstation ......................................................... 821
VMWP 씮 Virtual Machine Worker Process
Vollredundanz ......................................................... 285
Volume
im Storage Space................................................ 234
845
Index
Volume Shadow Copy Service....... 297, 442, 542,
636, 638, 646, 672, 683
Hardware-Provider ........................................... 683
Software-Provider.............................................. 683
Voter 씮 Failover-Cluster
VSC 씮 Virtualization Service Client
VSP 씮 Virtualization Service Provider
vSphere 씮 VMware
VSS 씮 Volume Shadow Copy Service
vSwitch
Name im Cluster................................................. 347
W
Wachstum
unkontrolliertes..................................................... 36
Wahrsam, Inge............................................................ 43
WAN 씮 Wide Area Network
Warnung
Best Practices Analyzer....................................... 74
Warteschlange für virtuelle Computer.......... 435
Wartungsfenster ..................................................... 580
Wartungsmodus ..................................................... 611
Wartungsplan........................................................... 692
Wartungsvorgang
Ausfallzeit ............................................................. 282
Wasserschaden ........................................................ 650
Wasserzähler ............................................................ 449
WDS 씮 Windows Deployment Services
WebAccess .............................................. 762, 763, 784
Webserver
für SharePoint ..................................................... 551
Webserver-Zertifikat ............................................. 605
Weight
Bandbreiten-Reservierungsmodus ............. 192
Werkzeug
Datenwiederherstellung ................................. 631
WFP 씮 Windows Filtering Platform
WID 씮 Windows Internal Database
Wide Area Network ................................................ 675
Wiederanlaufzeit
entworfene............................................................ 818
Wiederherstellen
VM über Snapshot ............................................. 478
Wiederherstellung ................................................. 710
Host-Server........................................................... 651
planen..................................................................... 649
Qualität.................................................................. 633
Wiederherstellungszeit........................................ 647
WIM 씮 Windows Imaging Format
846
Windows 8 ........................................................100, 680
App Bar................................................................... 796
Charms ..........................................................785, 796
Einschränkung bei der Hyper-VNutzung ............................................................ 101
Hyper-V-GUI-Verwaltungstools................... 103
Windows 8 Server ......................................................20
Windows Assessment and
Deployment Kit .........................................509, 558
Windows Automated Installation Kit ............ 736
Windows Azure...............................................602, 673
Windows Deployment Services ..... 430, 557, 572
Windows Filtering Platform...178, 179, 181, 575
Windows Imaging Format .................................. 494
Windows Internal Database ............................... 765
Windows Management Instrumentation .... 331
Windows Network Load Balancing.................. 764
Windows NT 4.0
Prozessorkompatibilität ................................. 411
Windows Remote Management ..............331, 558
2.0............................................................................. 736
Windows Server 2003 ........................................... 680
Windows Server 2008 R2..................................... 680
Windows Server 2012
Editionen und Lizenzen ................................... 810
Essentials............................................................... 810
Foundation ........................................................... 810
Windows Server Backup 씮 Windows
Server-Sicherung
Windows Server Failover-Cluster..................... 290
Windows Server Update Services...........331, 500,
501, 557, 571, 615, 616
Windows Server-Sicherung .......................656, 691
Archivattribut...................................................... 660
Einmalsicherung ................................................ 659
NTBACKUP............................................................ 656
Sicherungszeitplan ............................................ 659
Wiederherstellung.............................................. 667
Windows System Image Manager ................... 509
Windows Update..................................................... 494
auf Host-Servern ................................................ 444
Windows Update-Katalog.................................... 573
Windows XP .............................................................. 680
Windows-Failover-Cluster 씮 Failover-Cluster
Windows-Failover-Cluster-Umgebung .......... 688
Windows-Firewall ..... 266, 312, 358, 369, 468, 585
WinRM 씮 Windows Remote Management
Wissensdatenbank ................................................. 706
WMI 씮 Windows Management
Instrumentation
Wolfpack..................................................................... 292
Index
World Wide Name .........................................219, 429
World Wide Node Name ...................................... 219
World Wide Port Name ........................................ 219
Worldwide Name ....................................................... 82
WSFC 씮 Windows Server Failover-Cluster
WSMan........................................................................... 98
WSUS 씮 Windows Server Update Services
WWN............................................................................... 82
WWN 씮 World Wide Name
WWNN 씮 World Wide Node Name
WWPN 씮 World Wide Port Name
www.gruppenrichtlinien.de ............................... 529
X
XenApp 씮 Citrix
XenServer 씮 Citrix
XP Mode ........................................................................ 59
Z
Zähler
für VM-Ressourcen ............................................ 457
Zeitplaner................................................................... 117
Zeitpunkt
VM wiederherstellen......................................... 477
Zeitscheibenprinzip........................................ 55, 389
Zeit-Server ................................................................. 527
Zeitsynchronisation
im Active Directory ........................................... 527
Integrationsdienst ............................................. 440
Zertifikat..................................................................... 623
selbst signiert....................................................... 605
Subject Alternate Name .................................. 606
Webserver.............................................................. 605
Zeugendatenträger ............................. 307, 310, 316
Zeugenfreigabe........................................................ 308
Ziel
definieren .................................................................35
der Virtualisierung ...............................................33
des Unternehmens................................................34
Zielgruppe.................................................................. 804
Knowledge Worker ............................................ 759
Power User............................................................ 760
Systemadministration ..................................... 760
Task Worker ......................................................... 759
Zurücksetzen
VM............................................................................ 462
Zusammenführen
von Snapshots ..................................................... 486
Zustand einer VM
wiederherstellen ................................................. 477
Zwei-Knoten-Cluster ............................................. 726
Zwischenablage ....................................................... 464
Inhalt an eine VM senden............................... 463
847
Herunterladen