20745A ENU Companion
20745A ENU Companion
20745A
Implementing a Software-Defined
DataCenter
Companion Content
ii Implementing a Software-Defined DataCenter 10
Information in this document, including URL and other Internet Web site references, is subject to change
without notice. Unless otherwise noted, the example companies, organizations, products, domain names,
e-mail addresses, logos, people, places, and events depicted herein are fictitious, and no association with
any real company, organization, product, domain name, e-mail address, logo, person, place or event is
intended or should be inferred. Complying with all applicable copyright laws is the responsibility of the
user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in
or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical,
photocopying, recording, or otherwise), or for any purpose, without the express written permission of
Microsoft Corporation.
Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property
rights covering subject matter in this document. Except as expressly provided in any written license
agreement from Microsoft, the furnishing of this document does not give you any license to these
patents, trademarks, copyrights, or other intellectual property.
The names of manufacturers, products, or URLs are provided for informational purposes only and
Microsoft makes no representations and warranties, either expressed, implied, or statutory, regarding
these manufacturers or the use of the products with any Microsoft technologies. The inclusion of a
manufacturer or product does not imply endorsement of Microsoft of the manufacturer or product. Links
may be provided to third party sites. Such sites are not under the control of Microsoft and Microsoft is not
responsible for the contents of any linked site or any link contained in a linked site, or any changes or
updates to such sites. Microsoft is not responsible for webcasting or any other form of transmission
received from any linked site. Microsoft is providing these links to you only as a convenience, and the
inclusion of any link does not imply endorsement of Microsoft of the site or the products contained
therein.
These license terms are an agreement between Microsoft Corporation (or based on where you live, one of its
affiliates) and you. Please read them. They apply to your use of the content accompanying this agreement which
includes the media on which you received it, if any. These license terms also apply to Trainer Content and any
updates and supplements for the Licensed Content unless other terms accompany those items. If so, those terms
apply.
BY ACCESSING, DOWNLOADING OR USING THE LICENSED CONTENT, YOU ACCEPT THESE TERMS.
IF YOU DO NOT ACCEPT THEM, DO NOT ACCESS, DOWNLOAD OR USE THE LICENSED CONTENT.
If you comply with these license terms, you have the rights below for each license you acquire.
1. DEFINITIONS.
a. “Authorized Learning Center” means a Microsoft IT Academy Program Member, Microsoft Learning
Competency Member, or such other entity as Microsoft may designate from time to time.
b. “Authorized Training Session” means the instructor-led training class using Microsoft Instructor-Led
Courseware conducted by a Trainer at or through an Authorized Learning Center.
c. “Classroom Device” means one (1) dedicated, secure computer that an Authorized Learning Center owns
or controls that is located at an Authorized Learning Center’s training facilities that meets or exceeds the
hardware level specified for the particular Microsoft Instructor-Led Courseware.
d. “End User” means an individual who is (i) duly enrolled in and attending an Authorized Training Session
or Private Training Session, (ii) an employee of a MPN Member, or (iii) a Microsoft full-time employee.
e. “Licensed Content” means the content accompanying this agreement which may include the Microsoft
Instructor-Led Courseware or Trainer Content.
f. “Microsoft Certified Trainer” or “MCT” means an individual who is (i) engaged to teach a training session
to End Users on behalf of an Authorized Learning Center or MPN Member, and (ii) currently certified as a
Microsoft Certified Trainer under the Microsoft Certification Program.
g. “Microsoft Instructor-Led Courseware” means the Microsoft-branded instructor-led training course that
educates IT professionals and developers on Microsoft technologies. A Microsoft Instructor-Led
Courseware title may be branded as MOC, Microsoft Dynamics or Microsoft Business Group courseware.
h. “Microsoft IT Academy Program Member” means an active member of the Microsoft IT Academy
Program.
i. “Microsoft Learning Competency Member” means an active member of the Microsoft Partner Network
program in good standing that currently holds the Learning Competency status.
j. “MOC” means the “Official Microsoft Learning Product” instructor-led courseware known as Microsoft
Official Course that educates IT professionals and developers on Microsoft technologies.
k. “MPN Member” means an active Microsoft Partner Network program member in good standing.
l. “Personal Device” means one (1) personal computer, device, workstation or other digital electronic device
that you personally own or control that meets or exceeds the hardware level specified for the particular
Microsoft Instructor-Led Courseware.
m. “Private Training Session” means the instructor-led training classes provided by MPN Members for
corporate customers to teach a predefined learning objective using Microsoft Instructor-Led Courseware.
These classes are not advertised or promoted to the general public and class attendance is restricted to
individuals employed by or contracted by the corporate customer.
n. “Trainer” means (i) an academically accredited educator engaged by a Microsoft IT Academy Program
Member to teach an Authorized Training Session, and/or (ii) a MCT.
o. “Trainer Content” means the trainer version of the Microsoft Instructor-Led Courseware and additional
supplemental content designated solely for Trainers’ use to teach a training session using the Microsoft
Instructor-Led Courseware. Trainer Content may include Microsoft PowerPoint presentations, trainer
preparation guide, train the trainer materials, Microsoft One Note packs, classroom setup guide and Pre-
release course feedback form. To clarify, Trainer Content does not include any software, virtual hard
disks or virtual machines.
2. USE RIGHTS. The Licensed Content is licensed not sold. The Licensed Content is licensed on a one copy
per user basis, such that you must acquire a license for each individual that accesses or uses the Licensed
Content.
2.1 Below are five separate sets of use rights. Only one set of rights apply to you.
2.2 Separation of Components. The Licensed Content is licensed as a single unit and you may not
separate their components and install them on different devices.
2.3 Redistribution of Licensed Content. Except as expressly provided in the use rights above, you may
not distribute any Licensed Content or any portion thereof (including any permitted modifications) to any
third parties without the express written permission of Microsoft.
2.4 Third Party Notices. The Licensed Content may include third party code tent that Microsoft, not the
third party, licenses to you under this agreement. Notices, if any, for the third party code ntent are included
for your information only.
2.5 Additional Terms. Some Licensed Content may contain components with additional terms,
conditions, and licenses regarding its use. Any non-conflicting terms in those conditions and licenses also
apply to your use of that respective component and supplements the terms described in this agreement.
a. Pre-Release Licensed Content. This Licensed Content subject matter is on the Pre-release version of
the Microsoft technology. The technology may not work the way a final version of the technology will
and we may change the technology for the final version. We also may not release a final version.
Licensed Content based on the final version of the technology may not contain the same information as
the Licensed Content based on the Pre-release version. Microsoft is under no obligation to provide you
with any further content, including any Licensed Content based on the final version of the technology.
b. Feedback. If you agree to give feedback about the Licensed Content to Microsoft, either directly or
through its third party designee, you give to Microsoft without charge, the right to use, share and
commercialize your feedback in any way and for any purpose. You also give to third parties, without
charge, any patent rights needed for their products, technologies and services to use or interface with
any specific parts of a Microsoft technology, Microsoft product, or service that includes the feedback.
You will not give feedback that is subject to a license that requires Microsoft to license its technology,
technologies, or products to third parties because we include your feedback in them. These rights
survive this agreement.
c. Pre-release Term. If you are an Microsoft IT Academy Program Member, Microsoft Learning
Competency Member, MPN Member or Trainer, you will cease using all copies of the Licensed Content on
the Pre-release technology upon (i) the date which Microsoft informs you is the end date for using the
Licensed Content on the Pre-release technology, or (ii) sixty (60) days after the commercial release of the
technology that is the subject of the Licensed Content, whichever is earliest (“Pre-release term”).
Upon expiration or termination of the Pre-release term, you will irretrievably delete and destroy all copies
of the Licensed Content in your possession or under your control.
4. SCOPE OF LICENSE. The Licensed Content is licensed, not sold. This agreement only gives you some
rights to use the Licensed Content. Microsoft reserves all other rights. Unless applicable law gives you more
rights despite this limitation, you may use the Licensed Content only as expressly permitted in this
agreement. In doing so, you must comply with any technical limitations in the Licensed Content that only
allows you to use it in certain ways. Except as expressly permitted in this agreement, you may not:
• access or allow any individual to access the Licensed Content if they have not acquired a valid license
for the Licensed Content,
• alter, remove or obscure any copyright or other protective notices (including watermarks), branding
or identifications contained in the Licensed Content,
• modify or create a derivative work of any Licensed Content,
• publicly display, or make the Licensed Content available for others to access or use,
• copy, print, install, sell, publish, transmit, lend, adapt, reuse, link to or post, make available or
distribute the Licensed Content to any third party,
• work around any technical limitations in the Licensed Content, or
• reverse engineer, decompile, remove or otherwise thwart any protections or disassemble the
Licensed Content except and only to the extent that applicable law expressly permits, despite this
limitation.
5. RESERVATION OF RIGHTS AND OWNERSHIP. Microsoft reserves all rights not expressly granted to
you in this agreement. The Licensed Content is protected by copyright and other intellectual property laws
and treaties. Microsoft or its suppliers own the title, copyright, and other intellectual property rights in the
Licensed Content.
6. EXPORT RESTRICTIONS. The Licensed Content is subject to United States export laws and regulations.
You must comply with all domestic and international export laws and regulations that apply to the Licensed
Content. These laws include restrictions on destinations, end users and end use. For additional information,
see www.microsoft.com/exporting.
7. SUPPORT SERVICES. Because the Licensed Content is “as is”, we may not provide support services for it.
8. TERMINATION. Without prejudice to any other rights, Microsoft may terminate this agreement if you fail
to comply with the terms and conditions of this agreement. Upon termination of this agreement for any
reason, you will immediately stop all use of and delete and destroy all copies of the Licensed Content in
your possession or under your control.
9. LINKS TO THIRD PARTY SITES. You may link to third party sites through the use of the Licensed
Content. The third party sites are not under the control of Microsoft, and Microsoft is not responsible for
the contents of any third party sites, any links contained in third party sites, or any changes or updates to
third party sites. Microsoft is not responsible for webcasting or any other form of transmission received
from any third party sites. Microsoft is providing these links to third party sites to you only as a
convenience, and the inclusion of any link does not imply an endorsement by Microsoft of the third party
site.
10. ENTIRE AGREEMENT. This agreement, and any additional terms for the Trainer Content, updates and
supplements are the entire agreement for the Licensed Content, updates and supplements.
12. LEGAL EFFECT. This agreement describes certain legal rights. You may have other rights under the laws
of your country. You may also have rights with respect to the party from whom you acquired the Licensed
Content. This agreement does not change your rights under the laws of your country if the laws of your
country do not permit it to do so.
13. DISCLAIMER OF WARRANTY. THE LICENSED CONTENT IS LICENSED "AS-IS" AND "AS
AVAILABLE." YOU BEAR THE RISK OF USING IT. MICROSOFT AND ITS RESPECTIVE
AFFILIATES GIVES NO EXPRESS WARRANTIES, GUARANTEES, OR CONDITIONS. YOU MAY
HAVE ADDITIONAL CONSUMER RIGHTS UNDER YOUR LOCAL LAWS WHICH THIS AGREEMENT
CANNOT CHANGE. TO THE EXTENT PERMITTED UNDER YOUR LOCAL LAWS, MICROSOFT AND
ITS RESPECTIVE AFFILIATES EXCLUDES ANY IMPLIED WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT.
14. LIMITATION ON AND EXCLUSION OF REMEDIES AND DAMAGES. YOU CAN RECOVER FROM
MICROSOFT, ITS RESPECTIVE AFFILIATES AND ITS SUPPLIERS ONLY DIRECT DAMAGES UP
TO US$5.00. YOU CANNOT RECOVER ANY OTHER DAMAGES, INCLUDING CONSEQUENTIAL,
LOST PROFITS, SPECIAL, INDIRECT OR INCIDENTAL DAMAGES.
It also applies even if Microsoft knew or should have known about the possibility of the damages. The
above limitation or exclusion may not apply to you because your country may not allow the exclusion or
limitation of incidental, consequential or other damages.
Please note: As this Licensed Content is distributed in Quebec, Canada, some of the clauses in this
agreement are provided below in French.
Remarque : Ce le contenu sous licence étant distribué au Québec, Canada, certaines des clauses
dans ce contrat sont fournies ci-dessous en français.
EXONÉRATION DE GARANTIE. Le contenu sous licence visé par une licence est offert « tel quel ». Toute
utilisation de ce contenu sous licence est à votre seule risque et péril. Microsoft n’accorde aucune autre garantie
expresse. Vous pouvez bénéficier de droits additionnels en vertu du droit local sur la protection dues
consommateurs, que ce contrat ne peut modifier. La ou elles sont permises par le droit locale, les garanties
implicites de qualité marchande, d’adéquation à un usage particulier et d’absence de contrefaçon sont exclues.
EFFET JURIDIQUE. Le présent contrat décrit certains droits juridiques. Vous pourriez avoir d’autres droits
prévus par les lois de votre pays. Le présent contrat ne modifie pas les droits que vous confèrent les lois de votre
pays si celles-ci ne le permettent pas.
Module 1
Introduction to server virtualization
Contents:
Lesson 1: Overview of Microsoft Virtualization 2
Lesson 1
Overview of Microsoft Virtualization
Contents:
Question and Answers 3
Resources 6
Introduction to server virtualization 1-3
You need to enable the users in the Marketing department to use Application A. You also need to
minimize processor utilization due to Application A on Marketing computers.
( ) Containers
( ) RemoteApp program
( ) Hyper-V
( ) Containers
( ) Application Virtualization (App-V)
(√) RemoteApp program
( ) Hyper-V
Containers are available only on Windows Server 2016 and not on Windows 10, which the
Marketing computers use. You could potentially use App-V to resolve the issue by virtualizing
both applications, but Application A would run locally on each Marketing computer and you
would not meet the goal of minimizing processor utilization. User state virtualization will not help
you with application compatibility issues. You could use Hyper-V or RemoteApp, but the
requirement to minimize the utilization of the local processor is achieved by using RemoteApp.
Answer: Answers will vary and will include different types of virtualization, such as server
virtualization, network virtualization, and user state virtualization. Each of those virtualizations has
different requirements and benefits. For example, with server virtualization, you must install
Hyper-V role and user state virtualization is part of Windows operating system.
Question: Are there any specific requirements for that type of virtualization?
1-4 Implementing a Software-Defined DataCenter
Answer: Answers will vary and depends on the virtualization type. For example, there are no
specific requirements for user state virtualization, while for server virtualization, you must meet
certain hardware prerequisites, such as Second Level Address Translation (SLAT) 64-bit operating
system and Directory Access Protocol (DAP) and you must install Hyper-V role. SLAT is a new
prerequisite for the Windows Server 2016 Hyper-V role.
Answer: The Microsoft solution for server virtualization is Hyper-V. Hyper-V is available as a role
in Windows Server 2016 and as a feature in the 64-bit version of Windows 10 and in Hyper-V
Server 2016. Hyper-V is also available in the previous versions of the Windows Server and
Windows client operating systems.
Question: Can you establish communication between two virtual machines that are running on the same
Hyper-V host?
Answer: Virtual machines are isolated and you cannot establish direct communication from one
virtual machine to another, even when they are running on the same Hyper-V host. However,
virtual machines can have network connectivity if they are connected to the same network.
Question: Which product would you typically use to manage network virtualization?
Answer: Network virtualization is included in Hyper-V in Windows Server 2016 and you can
manage it by using Windows PowerShell. However, it is not practical or feasible to use Windows
PowerShell to manage network virtualization in dynamic environments. In such environments,
you would typically configure and manage network virtualization by using System Center 2016
Virtual Machine Manager.
Answer: Yes, you can install the trial version of Windows Server 2016 on a virtual machine that is
running in Client Hyper-V on the 64-bit version of Windows 10 Pro. Client Hyper-V has the same
set of core features as Hyper-V on Windows Server.
Question: Which Windows Server 2016 role must you deploy if you want to implement a VDI solution for
your company?
Answer: If you want to implement a VDI solution for your company, you must deploy the
Remote Desktop Services role. This role is included in Windows Server 2016 and in previous
versions of Windows Server.
Introduction to server virtualization 1-5
Answer: In the Windows operating system, user environment, settings, and data are stored in the
user profile, which is separate from the operating system files.
Question: Can you control which settings will roam when you configure users with roaming user profiles?
Answer: No. When you configure users with roaming user profiles, all settings roam and you
cannot exclude specific settings from roaming.
Answer: Yes. You can use presentation virtualization to run Windows applications on Android
devices. With presentation virtualization, you separate the application from the operating system
that is running on the device. Though the application is running on the remote computer that is
running Windows Server, the Android device will display the application window.
Question: Can you run RemoteApp programs if you do not have network connectivity?
Answer: No. You do not need to install virtualized applications. Such applications are stored as
data files on a Windows device and you can run them only if the App-V client is installed on the
device.
Answer: No. Containers do not include operating system images. Containers use operating
system virtualization and the host on which you want to use the container must have an
operating system image that the container can reference. However, the operating system image
is not included in the container; it must be available on the host on which you want to use the
container. The host might already have the operating system or obtains it from the image
repository before you can run the container.
Question: Which two container types can you run on Windows Server 2016? What is the difference
between them?
Answer: On Windows Server 2016, you can run Windows Server containers and Hyper-V
containers. Hyper-V containers provide more strict isolation between containers and the host
operating system.
1-6 Implementing a Software-Defined DataCenter
Resources
Additional Reading: For more information, refer to Microsoft Hyper-V Server 2016:
https://aka.ms/jusri9
Lesson 2
Introducing the software-defined datacenter
Contents:
Question and Answers 8
Resources 10
1-8 Implementing a Software-Defined DataCenter
Question: You plan to use converged networking in your datacenter. What should you include in each
Hyper-V host?
Answer: You should include two RDMA adapters in each Hyper-V host and add them to the
team. This would ensure redundant network connectivity and sufficient bandwidth. Then, you
would create multiple virtual network adapters on top of the RDMA team for different purposes.
Question: Which System Center 2016 component can you use for managing compute, storage, and
networking in a software-defined datacenter?
Answer: You can manage compute, storage, and networking in a software-defined datacenter by
using System Center 2016 Virtual Machine Manager.
Answer: You can increase the utilization of a physical server by installing multiple roles on it or
by using server virtualization and running multiple virtual machines on it.
Answer: In traditional datacenters, you use different networks for different purposes. For
example, you have separate networks for accessing storage, managing servers, and client access.
Converged networking enables you to use the same physical network for different purposes by
using virtual networks and virtual network adapters. Rather than separating networks physically
or by using VLAN tagging, you use policies and Quality of Service (QoS) to control who has
access to virtual network and how much bandwidth is available to that network.
Software-defined networking
Question: Which Windows Server 2016 feature enables you to increase network throughput and provides
resiliency against network adapter failure?
Answer: Windows Server 2016 includes support for network teaming. This feature enables you to
increase network throughput and provides resiliency against network adapter failure by adding
multiple network adapters in the team. In Windows Server 2016, you can also team RDMA
adapters, which was not possible in previous Windows Server versions.
Introduction to server virtualization 1-9
Question: Do you need to have separate physical network adapters for accessing iSCSI storage,
performing Live Migration, and accepting client connections?
Answer: We recommend that you have at least two physical network adapters, which you can
add to the team to achieve high availability. You can create multiple virtual network adapters for
different types of traffic and they can all share the same physical team. You can configure quality
of service policies to ensure that each virtual network adapter has sufficient bandwidth.
Software-defined storage
Question: Which Windows Server 2016 feature enables you to create highly available and scalable
storage by using local storage from multiple servers?
Answer: Windows Server 2016 includes the Storage Spaces Direct feature, which enables you to
create highly available and scalable storage from local server storage. To be able to implement
Storage Spaces Direct, servers with local storage must be nodes in a failover cluster.
Question: Which protocol is used for accessing storage on highly available scale-out file server shares?
Answer: Clients and servers access highly available scale-out file server shares by using the Server
Message Block (SMB3) protocol.
Software-defined compute
Question: Can you perform live migration of virtual machines only between the nodes in the same
failover cluster?
Answer: No. You can perform live migration of running virtual machines between Hyper-V hosts
regardless of whether they are nodes of the same failover cluster or not. You can perform live
migration between any two Hyper-V hosts as long as there is network connectivity between
them.
Question: Why it is important that Hyper-V hosts have CPUs from the same manufacturer?
Answer: If you want to perform virtual machine live migration, the source and destination
Hyper-V hosts must have the same CPU model from the same manufacturer, because the CPUs
must support the same low-level instruction set. Different CPU models and CPUs from different
manufacturers do not support the same low-level instruction set.
Answer: System Center 2016 includes several components, such as Virtual Machine Manager,
Configuration Manager, Operations Manager, Service Manager, Orchestrator, and Data
Protection Manager. Each component provides different features and you can implement each of
them independent from the others. Based on your needs, you can decide which System Center
2016 components you should implement to manage the datacenter.
Question: Which System Center 2016 component do you use for monitoring a datacenter infrastructure
and triggering remediation actions if the server is not operating as expected?
Answer: You can use System Center 2016 Operations Manager for monitoring the health and
performance of a datacenter infrastructure.
1-10 Implementing a Software-Defined DataCenter
Resources
Additional Reading: For more information, refer to 4 datacenter challenges and how
Windows Server 2016 software defined networking can help: https://aka.ms/in97ur
Additional Reading: For more information, refer to Software-Defined Datacenter with
Windows Server 2016 Preview: https://aka.ms/uq3wpu
Software-defined networking
Additional Reading: For more information, refer to Software Defined Networking (SDN):
https://aka.ms/a8csz4
Software-defined storage
Additional Reading: For more information, refer to Ten reasons you’ll love Windows
Server 2016: Software-Defined Storage: https://aka.ms/rljj9n
Software-defined compute
Additional Reading: For more information, refer to Ten reasons you’ll love Windows
Server 2016: Software-Defined Storage: https://aka.ms/rljj9n
Additional Reading: For more information, refer to 5 THINGS YOU'LL LOVE ABOUT
SYSTEM CENTER 2016: https://aka.ms/sfdydo
Introduction to server virtualization 1-11
Lesson 3
Extending virtualization to the cloud
Contents:
Question and Answers 12
Resources 13
Demonstration: Using the Azure portal 13
1-12 Implementing a Software-Defined DataCenter
Answer: No. Microsoft Azure has a pay as you go pricing model and you have to pay only for
what you use. You will pay lower fees than your colleague if:
• Your four virtual machines use less resources and are of a smaller size than your colleague’s
virtual machine.
• You virtual machines are turned off most of the time while your colleague’s virtual machine
is running all the time.
Question: Do you need to install any client software to be able to manage Azure from your Windows 10
computer?
Answer: You can manage Azure by using the Azure portal or the Azure classic portal. Because
both the portals run on a web browser such as Microsoft Edge or Internet Explorer, you do not
need to install anything in Windows 10 or in Windows Server 2016. However, if you want to
manage Azure by using Windows PowerShell, then you need to install the Azure PowerShell
module.
Question: How does Azure help ensure high availability of the services it is offering?
Answer: In Azure, all the data is stored at least three times inside the same datacenter. With geo-
replication, Azure can also store data in a second datacenter in the same geographical region.
Question: Which service model is most appropriate for developers who need to develop highly available
and scalable web services, but do not want to maintain web servers or update the operating systems on
which web servers are running?
Answer: For developers who want to focus on web service development, but do not want to be
responsible for infrastructure maintenance, the Platform as a Service (PaaS) service model is most
appropriate.
Introduction to server virtualization 1-13
Managing Azure
Question: What must you install on Windows Server 2016 if you want to manage Azure by using
Windows PowerShell?
Answer: If you want to manage Azure by using Windows PowerShell on Windows Server 2016,
you need to first download and install the Azure PowerShell module. You can download it from
the PowerShell Gallery or by using the Web Platform Installer.
Question: In how many different ways can you create a virtual machine in Azure?
Answer: You can create a virtual machine in Azure in several different ways. If you prefer a GUI,
you can create a virtual machine by using the Azure portal or the Azure classic portal. If you need
to create multiple virtual machines in Microsoft Azure or you want to automate the process of
creating virtual machines, then you should use Windows PowerShell with the Azure PowerShell
module.
Answer: If you want to create a hybrid cloud, you should create a virtual network in Azure and
then deploy site-to-site VPN.
Question: What must you create in Microsoft Azure to be able to extend an on-premises datacenter to
Azure?
Answer: To be able to extend an on-premises datacenter to Azure, you must create an Azure
virtual network. You will also need to configure the VPN gateway and establish a site-to-site VPN
connection.
Resources
Managing Azure
2. In the Internet Explorer address box, type http://manage.windowsazure.com, and then press Enter.
3. On the Sign in to your account page, sign in with the Microsoft account that has the associated
Azure subscription with Pa55w.rd as the password. If you follow the instructions, the account will be
in the format <YourInitials>[email protected].
Note: For example, if your name is Don Funk and you are creating the account on August
15, 2016, the account name will be [email protected].
4. Show the available Azure services in the navigation pane. Point out VIRTUAL MACHINES and
RECOVERY SERVICES and briefly explain why they are used.
5. In the navigation pane, click SETTINGS and point out Subscription in the details pane.
6. Click CREDIT STATUS at the top of the Azure classic portal and briefly discuss the pay-as-you-go
Azure pricing model.
9. In the DNS NAME text box, type <YourInitials>DDMMYY and press Enter (for example, DF150816
if your name is Don Funk and you are creating virtual machine on August 15, 2016).
10. Verify that in the IMAGE drop-down box, Windows Server 2012 R2 Datacenter is selected.
17. In the Azure portal, on the Hub blade on the left, click More services, show the available services,
and then click Virtual machines.
18. On the Virtual machines blade, click +Add. The compute blade opens.
19. On the Compute blade, in the Search Compute text box, type Windows Server, click Windows
Server 2012 R2 Datacenter, and then click Windows Server 2012 R2 Datacenter again.
20. On the Windows Server 2012 R2 Datacenter blade, point out that you can choose either Resource
Manager or Classic in the Select a deployment model drop-down list. Leave Resource Manager
selected and click Create. This opens the Create virtual machine blade and the Basics blade.
21. On the Basics blade, specify the following settings, and then click OK:
o Name: AzureVM1
o Password: 20745Pa55w.rd
22. On the Choose a size blade, click A1 Standard, and then click Select.
23. On the Settings blade, review the default values, and then click OK.
24. On the Summary blade, review the settings for the new virtual machine, and then click OK.
25. Point out the Deployment started message in the notification area at the top of the page.
26. In the Azure portal, on the Hub blade on the left, click More services, and then click Virtual
machines (classic). Point out that you see the virtual machine named <YourInitials>DDMMYY that
you created in Azure classic portal.
1-16 Implementing a Software-Defined DataCenter
Answer: Windows 10 and other Windows operating systems use user state virtualization by
default, because user settings and data are stored in the user profile, which is separate from the
operating system and program files. However, if you want to be able to selectively control which
user and computer settings are synchronized between domain-joined Windows 10 computers,
you need to use Windows 10 Enterprise, which includes User Experience Virtualization (UE-V).
Question: Which tool can you use to configure network virtualization?
Answer: Although you can manually configure network virtualization by using Windows
PowerShell, you will probably use tools such as System Center 2016 Virtual Machine Manager for
configuring network virtualization; it is considerably more complex to configure network
virtualization statically by using Windows PowerShell. If you move a virtual machine to a different
Hyper-V host, you must also manually update the network virtualization configuration. Virtual
Machine Manager enables you to configure network virtualization by using a GUI, and it
automatically updates the configuration if you move virtual machines between virtualization
hosts.
Question: What is the difference between a standard network adapter and a Remote Direct Memory
Access (RDMA) adapter?
Answer: Standard network adapters require CPU processing and operating system involvement
on both sides when you transfer data over a network between two computers. RDMA adapters
use direct memory access from the memory of one computer into the memory of another
computer and do not involve the operating system of either computer.
Question: What you need to have to be able to create Azure virtual machines and use other Azure
services?
Answer: Before you can use any Azure service or create Azure virtual machines, you must have
an Azure subscription.
Introduction to server virtualization 1-17
Answer: In the second exercise, you first created two Azure virtual machines, which are an
example of server virtualization. You then connected to an Azure virtual machine by using the
RDP protocol, which is an example of presentation virtualization.
Question: Why did you need to create a Microsoft account before you were able to use your Azure Pass
to create an Azure subscription?
Answer: The Azure portal requires you to sign in with a Microsoft Account or a work or school
account. To be able to create a Work or school account, you need Azure AD, which is available as
part of the Azure subscription. This means that you must have a Microsoft Account before you
can create an Azure subscription.
Question: Will you be able to use the Azure subscription that you created in the second exercise after the
end of this class?
Answer: In the second exercise, you created a trial Azure subscription, which has a spending
limit. You can use this Azure subscription for up to one month or until you meet the spending
limit, whatever happens first.
Overview of Hyper-V virtualization 2-1
Module 2
Overview of Hyper-V virtualization
Contents:
Lesson 1: Installing and configuring the Hyper-V Role 2
Lesson 2: Creating and managing virtual hard disks and virtual machines 10
Lesson 3: Creating and using Hyper-V virtual switches 18
Lesson 1
Installing and configuring the Hyper-V Role
Contents:
Question and Answers 3
Resources 5
Demonstration: Creating a Nano Server image 5
Demonstration: Managing Hyper-V 7
Overview of Hyper-V virtualization 2-3
Answer: You can use PowerShell Direct only for managing virtual machines that are running on a
local Hyper-V host. To manage virtual machines that are running on a remote Hyper-V host, you
can either first connect to remote Hyper-V and then use PowerShell Direct, or connect to virtual
machines directly by using PowerShell remoting.
Hyper-V architecture
Question: You install Windows Server 2016 in a virtual machine named VM1. Can you monitor disk
input/output (I/O) for the physical server from VM1?
Answer: Because VM1 is running in a virtual environment, you can monitor only the resources
that are available to VM1 from inside the virtual machine. You can monitor disk input/output
(I/O) that is from VM1, but not disk I/O for the entire physical server. If you need to monitor disk
I/O for the entire server, you will need to monitor Hyper-V in the parent partition.
Question: You plan to use Hyper-V virtualization on a Windows Server 2016 host. The driver for the
physical server’s display adapter is not included in Windows Server 2016. Do you need to install the driver
for the display adapter into each virtual machine that runs on the host?
Answer: Virtual machines use a standard virtualized display adapter for which the driver is
included in Windows Server 2016 and other operating systems. Therefore, you do not need to
install a driver for the display adapter into each virtual machine that runs on the host. You must
install a driver for the display adapter only once—into the parent partition of the physical host.
Answer: No. When you installed the Hyper-V role, the appropriate Windows Firewall rules to
allow remote Hyper-V management were created and enabled automatically. Therefore, you do
not have to create these rules manually.
Answer: Both settings only specify a default folder for storing appropriate objects. When you
create a new virtual machine, these settings define the default location, but you can configure
any alternate location to which you have write permissions.
Question: When you connect to a Windows 10 virtual machine on a Windows Server 2016 Hyper-V host,
is enhanced session mode used by default?
Answer: By default, Enhanced Session Mode is enabled on a Hyper-V host, but Enhanced Session
Mode policy is not enabled. This prevents you from using Enhanced Session Mode when
connecting to virtual machines; this mode is used only if both settings are enabled.
2-4 Implementing a Software Defined DataCenter
Answer: No. Although Nano Server is on the Windows Server installation media, you cannot
install it by using the Windows Server 2016 Setup Wizard. You can use the setup wizard to
install only Windows Server 2016 with Desktop Experience or Server Core. You can deploy Nano
Server by using Windows PowerShell.
Question: What is the benefit of having Nano Server as a Hyper-V host versus having Windows Server
2016 with Desktop Experience as a Hyper-V host?
Answer: Nano Server has a considerably smaller disk footprint, and fewer roles and features, than
Windows Server 2016 with Desktop Experience, and it requires less overhead. Smaller overhead
means that more resources are available to virtual machines, and fewer roles and features need
fewer updates and server restarts. You cannot manage Nano Server locally, but when you
manage it remotely, you can manage it in the same way that you manage Windows Server 2016
with Desktop Experience.
Question: Which package must you add to a Nano Server image to be able to use Nano Server as a
Hyper-V host?
Answer: To be able to use Nano Server as a Hyper-V host, you must add the compute package
to the image. You can add the compute package to Nano Server by specifying the -Compute
parameter or the -Package Microsoft-NanoServer-Compute-Package parameter with the
New-NanoServerImage cmdlet.
Managing Hyper-V
Question: Your virtualization environment has three Hyper-V hosts. In Hyper-V Manager, can you view
the virtual machines on all three Hyper-V hosts simultaneously?
Answer: No. While you can use Hyper-V Manager to connect to and manage all three Hyper-V
hosts, in Hyper-V Manager you can view only virtual machines from one Hyper-V host at a time.
If you need to provide a list of virtual machines from all three servers, you can use Windows
PowerShell or Failover Cluster Manager (in the case of highly available virtual machines), or you
can install Virtual Machine Manager (VMM).
Question: You want to manage a Nano Server virtual machine from a Hyper-V host by using PowerShell
Remoting. Do you need to have network connectivity to the virtual machine to manage it?
Answer: Because you want to manage Nano Server virtual machine from the Hyper-V host on
which the virtual machine is running, network connectivity is not required. You can connect to
the virtual machine by using PowerShell Direct, which utilizes VMbus.
Overview of Hyper-V virtualization 2-5
Resources
Additional Reading: To read more about installing Nano Server, refer to “Install Nano
Server” at: https://aka.ms/r2f4xn
Managing Hyper-V
Note: The actual drive letter on which course virtual machines are stored can be different.
Drive C: is used in the instructions, but you should use the drive on which course virtual machines
are stored in your environment.
Note: If the mounted Windows Server 2016 ISO is assigned different letter than D:, edit the
value of the $ISO variable in the second line and then save the file.
4. In Windows PowerShell ISE, select rows 2 and 3, and press F8. Explain that this assigns values to the
variables $ISO and $Module.
5. In Windows PowerShell ISE, place the cursor in row 5 that starts with the following, and then press F8:
$SecurePassword
Explain that this cmdlet stores the password that the local Nano Server administrator uses.
6. In Windows PowerShell ISE, place the cursor in row 6 that starts with the following cmdlet, and then
press F8:
Import-Module
Explain that this cmdlet imports the PowerShell module that contains cmdlets for creating and
managing the Nano Server image.
2-6 Implementing a Software Defined DataCenter
7. In Windows PowerShell ISE, place the cursor in row 7 that starts with the following cmdlet, and then
press F8:
Get-Command
Point out the three cmdlets that are included in the module, and explain when they are used.
8. In Windows PowerShell ISE, place the cursor in row 8 that starts with the following cmdlet, and then
press F8:
New-NanoServerImage
Point out that this cmdlet creates a new Nano Server image, and explain the parameters that are used
with the cmdlet.
9. After the Nano Server image is created, in Windows PowerShell ISE, place the cursor in row 10 that
starts with the following cmdlet, and press F8:
Edit-NanoServerImage
Explain that this cmdlet is used for editing existing Nano Server image, and point out that it is used
for adding the Failover Clustering feature to Nano Server.
10. In File Explorer, in the navigation pane, expand This PC, and point out the number of volumes that
LON-HOST has.
11. In File Explorer, navigate to C:\VMs\Nano1, and double click the Nano1.vhd file.
12. In File Explorer, in the navigation pane, point out that an additional volume is added.
13. In File Explorer, navigate to C:\Labfiles, in the details pane right-click Mod02, and then click Copy.
14. In File Explorer, navigate to the volume that was added when you mounted the Nano Server image.
In the details pane, right-click an empty space, and then select Paste.
15. In the details pane, right-click an empty space, click New, click Folder, type your name, and then
press Enter.
16. In File Explorer, in the navigation pane, right-click the mounted volume and select Eject. This closes
File Explorer.
17. In Windows PowerShell ISE, place the cursor in row 12 that starts with the following cmdlet, and then
press F8:
New-VM
Explain that this cmdlet creates a virtual machine named NANO1 that uses the image that you
created in this demonstration.
18. In Windows PowerShell ISE, place the cursor in row 13 that starts with the following cmdlet, and then
press F8:
Start-VM
20. In NANO1, type Administrator as the User name, press TAB, type the password Pa55w.rd, and then
press Enter.
Overview of Hyper-V virtualization 2-7
21. In the Nano Server Recovery Console, point out that the Computer Name has a value NANO1 and
Domain membership has a value Adatum.com.
22. On LON-HOST1, in Windows PowerShell ISE, place the cursor in row 15 that starts with the following
cmdlet, and then press F8:
Enter-PSSession
Explain that you are connecting to NANO1 virtual machine by using PowerShell Direct. When
prompted for credentials, enter the username Nano1\Administrator and the password Pa55w.rd.
Note: The Commands pane refreshes as the session establishes; it now shows the cmdlets
that are available on the NANO1 computer. Also notice that the prompt now includes the
[NANO1] prefix because you are connected to the remote Nano1 computer.
23. In Windows PowerShell ISE, place the cursor in row 16 that contains the following command, and
then press F8:
Dir C:\
Point out that Nano Server has six folders on volume C:, including Mod02 and a folder with your
name.
24. In Windows PowerShell ISE, in the command pane, type Exit, and press Enter.
3. In Hyper-V Manager, in the navigation pane, right-click Hyper-V Manager and select Connect to
Server.
4. In the Select Computer dialog box, verify that Another computer radio button is selected, in the
text box type LON-SVR1, and then click OK.
5. To add NANO1 to Hyper-V Manager repeat steps 3 and 4.
6. In Hyper-V Manager, in the navigation pane, verify and point out that LON-SVR1 is selected. In the
actions pane, click Hyper-V Settings.
7. On the Hyper-V Settings for LON-SVR1 page, in the navigation pane, click Virtual Machines, and
in the details pane, point out that C:\ProgramData\Microsoft\Windows\Hyper-V displays.
8. In the navigation pane, click Storage Migrations, and point out that 2 simultaneous storage
migrations are allowed.
9. Close the Hyper-V Settings for LON-SVR1 page.
10. In Hyper-V Manager, in the navigation pane, select NANO1. In the actions pane, click Hyper-V
Settings.
11. On the Hyper-V Settings for NANO1 page, in the navigation pane, click Virtual Machines, and in
the details pane, point out that C:\ProgramData\Microsoft\Windows\Hyper-V displays.
12. In the navigation pane, click Storage Migrations, and point out that 2 simultaneous storage
migrations are allowed.
2-8 Implementing a Software Defined DataCenter
13. Close the Hyper-V Settings for NANO1 page and minimize Hyper-V Manager.
14. On LON-HOST1, in File Explorer, navigate to C:\LabFiles\Mod02, right-click Demo2.ps1, and click
Edit. The file opens in Windows PowerShell ISE.
15. In Windows PowerShell ISE, place the cursor in row 3 that has the following cmdlet, and press F8:
16. In Windows PowerShell ISE, place the cursor in row 5 that has the following cmdlet, and press F8:
Explain that this cmdlet sets the allowed number of simultaneous storage migrations.
19. On the Hyper-V Settings for NANO1 page, click Virtual Machines, and point out that C:\VMs is
specified as the virtual machine location.
20. In the navigation pane, click Storage Migrations, and point out that the number of simultaneous
storage migrations allowed is set to 3.
21. To close Hyper-V Settings for NANO1, click OK.
22. In Hyper-V Manager, in the navigation pane, click LON-SVR1, and then in the Actions pane click
Hyper-V Settings.
23. On the Hyper-V Settings for LON-SVR1 page, click Virtual Machines, and point out that C:\VMs is
specified as the virtual machine location.
24. In the navigation pane, click Storage Migrations, and point out that the number of simultaneous
storage migrations allowed is set to 3.
25. To close Hyper-V Settings for LON-SVR1 click OK, and minimize Hyper-V Manager.
26. In Windows PowerShell ISE, place the cursor in row 7 that has the following cmdlet, and press F8:
Get-Service | Measure-Object
27. In Windows PowerShell ISE, place the cursor in row 9 that starts with the following, and press F8:
$Session
Explain that this creates a PowerShell Direct session to NANO1. When prompted for credentials, enter
the username Nano1\Administrator and the Pa55w.rd.
28. In Windows PowerShell ISE, place the cursor in row 11 that starts with the following, and press F8:
Copy-Item
Explain that this cmdlet copies the file through PowerShell Direct and that no network connectivity to
virtual machine is needed.
29. In Windows PowerShell ISE, place the cursor in row 13 that has the following cmdlet, and press F8:
Enter-PSSession $Session
Overview of Hyper-V virtualization 2-9
Explain that this enters the established session. Point out that the prompt now displays the [NANO1]
prefix.
30. In Windows PowerShell ISE, place the cursor in row 15 that has the following cmdlet, and press F8:
Get-Service | Measure-Object
Explain that this counts the number of services on NANO1 and that this number is considerably lower
than the number of services on LON-HOST1.
31. In Windows PowerShell ISE, place the cursor in row 17 that contains the following command, and
press F8:
Dir C:\
Point out that the script Services.ps1 that you copied earlier is available on the C: drive of NANO1.
32. In Windows PowerShell ISE, place the cursor in row 19 that contains the following command, and
press F8:
PSEdit C:\Services.ps1
33. Run the remote script by pressing the green arrow on the toolbar or by pressing F5.
34. In Windows PowerShell ISE, in the command pane, type Exit, and press Enter.
35. Close Windows PowerShell ISE.
2-10 Implementing a Software Defined DataCenter
Lesson 2
Creating and managing virtual hard disks and virtual
machines
Contents:
Question and Answers 11
Resources 13
Demonstration: Creating new virtual machines 15
Demonstration: Using nested virtualization and Integration Services 16
Overview of Hyper-V virtualization 2-11
Answer: You can resize a virtual machine static memory only if the virtual machine is running
Windows Server 2016 or Windows 10. Windows Server 2012 R2 does not support resize or static
memory, and therefore you cannot resize VM1 memory while the virtual machine is running.
Question: You have a Windows Server 2016 virtual machine named VM1 that is running on a Windows
Server 2016 Hyper-V host. Can you install a Hyper-V role in VM1?
Answer: By default, nested virtualization is not enabled, and you cannot install Hyper-V in VM1.
But if you enable nested virtualization for VM1, you can install Hyper-V in VM1.
Question: Can you create a differencing virtual hard disk in .vhdx format that has virtual hard disk in .vhd
format as its parent?
Answer: No. All virtual hard disks in the differencing hierarchy must be in the same format, either
.vhd or .vhdx. If you want to create a differencing virtual hard disk in .vhdx format, then its parent
must also be in ,vhdx format.
Answer: No. IDE controllers and legacy network adapters are available only for Generation 1
virtual machines; they are not available for Generation 2 virtual machines.
Question: Can you convert a Generation 1 Windows Server 2016 virtual machine to a Generation 2 virtual
machine?
Answer: No. You can select the generation of the virtual machine only when you create the
virtual machine, and you cannot change it later. If you already have a Generation 1 virtual
machine, you cannot convert it to a Generation 2 virtual machine, regardless of the operating
system on that virtual machine.
Question: Can you modify a Generation 1 virtual machine memory settings while it is running?
Answer: If a Generation 1 virtual machine is configured with static memory settings, you cannot
modify it while the virtual machine is running. If the Generation 1 virtual machine has dynamic
memory enabled, you can decrease the minimum RAM and increase the maximum RAM while it
2-12 Implementing a Software Defined DataCenter
is running, and you can always modify the memory weight. But if Windows Server 2016 or
Windows 10 is installed on a Generation 2 virtual machine, then you could also add or remove
memory while the virtual machine is running.
Answer: If the operating system in the virtual machine already includes Integration Services, you
do need to verify if the latest version of Integration Services is installed. If the virtual machine was
migrated from a previous version of the Hyper-V host or if the operating system already includes
Integration Services, for example, Windows Server 2012, then you probably need to update them.
Question: If you want to copy a file to a virtual machine by using the copy-item cmdlet, do you need to
install Integration Services onto a Windows Server 2016 virtual machine?
Answer: Windows Server 2016 includes Integration Services, and you do not need to install it if
Windows Server 2016 is running in the virtual machine. But you must enable Guest integration
service for the virtual machine because this service is not enabled by default and is required to
copy a file to the virtual machine by using the copy-item cmdlet.
Answer: No. You can configure nested virtualization only for virtual machines that are
configured with static memory.
Answer: No. You cannot enable nested virtualization in Hyper-V Manager. You can enable
nested virtualization only from Windows PowerShell by running the Set-VMProcessor cmdlet
with the ExposeVirtualizationExtensions parameter set to $true.
Answer: No, you cannot. A shielded virtual machine must be a Generation 2 virtual machine, and
you cannot change a Generation 1 virtual machine into a Generation 2 virtual machine. The only
Overview of Hyper-V virtualization 2-13
option would be to create a new Generation 2 virtual machine, which you could then configure
to be a shielded virtual machine.
Question: Can you run a shielded virtual machine on a Windows Server 2016 Standard edition Hyper-V
host?
Answer: No. The Windows Server 2016 Standard edition does not support shielded virtual
machines. You can run shielded virtual machines only on the Windows Server 2016 Datacenter
edition.
Answer: For TPM-trusted attestation, the Hyper-V hosts must have TPM 2.0 and UEFI 2.3.1.
Servers that are in use today do not include those components. Therefore, you cannot use them
with TPM-trusted attestation; you can use them only with admin-trusted attestation.
Question: Which server role must be present on the network if you want to run shielded virtual
machines?
Answer: You can run shielded virtual machines on the guarded fabric. The guarded fabric
includes Hyper-V hosts and the Host Guardian Service (HGS) server. HGS assures that Hyper-V
hosts are healthy, and without it you cannot run shielded virtual machines.
Answer: You need a guardian key to create a shielded virtual machine. But if you want to create
a shielded virtual machine on a Hyper-V host that is not part of a guarded fabric, you can obtain
a guardian key on a computer that has connectivity to HGS, store it in a file, and then import it to
the Hyper-V host.
Question: Can you convert an existing Generation 2 virtual machine to a shielded virtual machine?
Answer: Yes, you can convert an existing Generation 2 virtual machine to a shielded virtual
machine. For example, you can use Windows Azure Portal or System Center 2016 Virtual Machine
Manager to perform the conversion.
Resources
Additional Reading: For more about the Hyper-V virtual hard disk formats, refer to:
“Hyper-V storage I/O performance” at: https://aka.ms/vlcyvp
Additional Reading: To read more about virtual machine configuration versions, refer to
“Upgrade virtual machine version in Hyper-V on Windows 10 or Windows Server 2016” at:
https://aka.ms/j14tr5
Additional Reading: To read more about Hyper-V Integration Services, refer to:
“Managing Hyper-V Integration Services” at: https://aka.ms/h2a2tl
Additional Reading: To read more about dynamic memory in Hyper-V, refer to: “Hyper-V
Dynamic Memory Overview” at: https://aka.ms/maq249
Additional Reading: To read more about dynamic memory in Linux virtual machines, refer
to: “Microsoft Loves Linux Deep Dive #3: Linux Dynamic Memory and Live Backup” at:
https://aka.ms/qai4fb
Additional Reading: To read more about nested virtualization, refer to: “Run Hyper-V in a
Virtual Machine with Nested Virtualization” at: https://aka.ms/dx4dmq
Additional Reading: To read step-by-step instructions for configuring HGS, refer to: “Step
by Step – Configuring the Host Guardian Service in Windows Server 2016” at:
https://aka.ms/jnz36y
To read step-by-step instructions for creating shielded virtual machines in an environment
without SCVMM, refer to: “Step by step – Creating Shielded VMs without VMM” at
https://aka.ms/mky6ov
Additional Reading: To read more in-depth information on shielded virtual machines in a
white paper on deploying guarded hosts and shielded virtual machines, refer to: “Guarded Fabric
Deployment Guide for Windows Server 2016” at: https://aka.ms/hucofa
To watch a Microsoft Ignite session on guarded virtual machines, refer to: “Harden the Fabric:
Protecting Tenant Secrets in Hyper-V” at: https://aka.ms/i6s12q
Overview of Hyper-V virtualization 2-15
2. In the New Virtual Machine Wizard, on the Before You Begin page, click Next.
3. On the Specify Name and Location page, in the Name field, type LON-VM2, and then click Next.
4. On the Specify Generation page, click Generation 2, and then click Next.
5. On the Assign Memory page, in Startup Memory, type 1024, select the Use Dynamic Memory for
this virtual machine check box, and then click Next four times.
6. On the Completing the Virtual Machine Wizard page, click Finish. A virtual machine named LON-
VM2 is created.
7. In File Explorer, navigate to C:\LabFiles\Mod02, right-click Demo3.ps1, and click Edit. The script
opens in Windows PowerShell ISE.
8. In Windows PowerShell ISE, place the cursor in row 3 that starts with the following, and press F8:
New-VM
New-VHD
Explain that this cmdlet creates a new virtual hard disk, and discuss some of its parameters.
10. In Windows PowerShell ISE, place the cursor in row 7 that starts with the following cmdlet, and press
F8:
Add-VMHardDiskDrive
Explain that this cmdlet adds a virtual hard disk drive to the existing virtual machine, and point out its
parameters.
11. On LON-HOST1, in Hyper-V Manager, right-click LON-VM2, and then click Settings.
12. In Settings for LON-VM2, point out that four types of hardware display in the Add Hardware section
in the details pane. Point out also that in the left pane, in the Hardware section, no BIOS, IDE
Controllers, COM ports, or Diskette Drive are listed, but that Firmware is listed, and then click OK.
14. In Settings for LON-VM1, point out that there are five types of hardware listed in the Add Hardware
section, in the details pane. Point out also that in the left pane, in the Hardware section, BIOS, IDE
Controllers, COM ports, and Diskette Drive are listed, but Firmware is not listed, and then click OK.
2-16 Implementing a Software Defined DataCenter
2. In Server Manager, in the menu bar, click Manage, and then click Add Roles and Features.
3. In the Add Roles and Features Wizard, on the Before you begin page, click Next.
4. On the Select installation type page, ensure that the Role-based or feature-based installation
option is selected, and then click Next.
5. On the Select destination server page, ensure that Select a server from the server pool is
selected, and then click Next.
6. On the Select server roles page, in the Roles section, click Hyper-V.
7. In the Add Roles and Features Wizard, verify that Include management tools (if applicable) is
selected, and then click Add Features. Explain that Validation results show an error because nested
virtualization is not enabled.
8. In the Add Roles and Features Wizard dialog box, click OK and then click Cancel.
9. In the 20745A-LON-SVR2 window, click the Action menu, click Shut Down, and then click Shut
Down.
10. On LON-HOST1, click Start, and then click the Windows PowerShell tile.
11. In the Windows PowerShell window, run the following cmdlet:
12. In the 20745A-LON-SVR2 window, click the File menu, and then click Settings.
13. In the Settings for 20745A-LON-SVR2 window, in the navigation pane, expand the Network
Adapter that is connected to the Internal Network, and click Advanced Features. In the details pane,
select the Enable MAC address spoofing check box, and then click OK.
14. In the 20745A-LON-SVR2 window, click the Action menu, and then click Start.
15. Wait until LON-SVR2 starts, and then sign in with the user name Adatum\Administrator and
password Pa55w.rd.
18. In the Add Roles and Features Wizard, on the Before you begin page, click Next.
19. On the Select installation type page, ensure that the Role-based or feature-based installation
option is selected, and then click Next.
20. On the Select destination server page, ensure that Select a server from the server pool is
selected, and then click Next.
21. On the Select server roles page, in the Roles section, click Hyper-V.
22. In the Add Roles and Features Wizard, verify that Include management tools (if applicable) is
selected, and then click Add Features. Explain that this time there is no error because you enabled
nested virtualization for LON-SVR2.
29. On the Confirm installation selection page, select the Restart the destination server
automatically if required option, click Yes, and then click Install.
30. On LON-SVR1, click Start, and then click Server Manager.
31. In Sever Manager, click the Tools menu, and then click Services.
32. In the Services window, in the details pane, point out that the Hyper-V Time Synchronization Service
is running.
33. On LON-SVR1, on the taskbar, click Start, type command, and then click Command Prompt.
35. Point out the current time, type 11:00 as the current time, and then press Enter.
36. In the Command Prompt window, type Time, and press Enter twice. Point out that the time was
automatically set back to its previous value, and explain that Integration Services automatically
synchronized the time on LON-SVR1 with the time on LON-HOST1.
Note: You might need to wait a few seconds for the time to reset.
37. On LON-HOST1, in Hyper-V Manager, in the navigation pane, verify that LON-HOST1 is selected. In
the details pane, right-click LON-SVR1, and then click Settings.
38. In Settings for LON-SVR1, in the navigation pane, click Integration Services. In the details pane,
clear the Time synchronization check box, and then click OK.
39. On LON-SVR1, in Services, right-click Services (Local), and then click Refresh. Point out that the
Hyper-V Time Synchronization Service is not running, and then close Services.
40. In LON-SVR1, at the command prompt, type Time and press Enter. Point out the current time, type
11:00 as the current time, and then press Enter again.
41. At the command prompt, type Time, and then press Enter twice. Confirm that the returned time is a
few seconds after 11:00, because the time on the virtual machine is no longer synchronizing with the
Hyper-V host.
42. In the LON-SVR1 window, click the File menu, click Settings, and in the navigation pane, click
Integration Services. In the details pane, select the Time synchronization check box, and then click
OK.
43. On LON-SVR1, at the command prompt, type Time, and press Enter twice. Point out that the time on
the virtual machine is synchronized with the time on LON-HOST1.
2-18 Implementing a Software Defined DataCenter
Lesson 3
Creating and using Hyper-V virtual switches
Contents:
Question and Answers 19
Resources 20
Demonstration: Using Virtual Switch Manager 20
Demonstration: Configuring advanced virtual switch features 21
Overview of Hyper-V virtualization 2-19
Answer: Yes, you likely want to create virtual switch on Hyper-V host, because if there is no
virtual switch on a Hyper-V host, you cannot connect virtual machines to a network. Additionally,
virtual machines cannot communicate with other computers on the network, or between
themselves, even if they are running on the same Hyper-V host. The Hyper-V host still has
network connectivity, but a virtual switch does not control its network traffic. In practice, you
always create one or more virtual switches on a Hyper-V host.
Answer: You can manage Hyper-V virtual switches by using the Virtual Switch Manager action in
Hyper-V Manager, or by using Windows PowerShell cmdlets, such as New-VMSwitch or Set-
VMSwitch.
Question: Can a virtual machine access the Internet if it is connected to an internal virtual switch?
Answer: If a virtual machine is connected to an internal virtual switch, its connectivity is generally
limited to the Hyper-V host itself, and to other virtual machines that are running on the same
Hyper-V host and are connected to the same internal virtual switch. However, if the Hyper-V host
has Internet connectivity and is configured to perform NAT, then the virtual machine could also
have Internet connectivity. Another way to achieve Internet connectivity would be to configure
another virtual machine with two network adapters, one connected to the internal network and
the other connected to the external network as a gateway.
VLAN tagging
Question: Why can you create only a maximum of 4,094 VLAN networks?
Answer: The Ethernet frame reserves only 12 bits for VLAN Identification (VLAN ID), and that
limits the number of VLANs that you can create. However, many physical switches do not support
that many virtual networks.
Question: Why can you not configure a VLAN ID for a private virtual switch?
Answer: A VLAN ID on a virtual switch specifies the virtual LAN that the management operating
system uses for all network communications through the network interface that is connected to
virtual switch. As a management operating system is not connected to a private virtual switch,
you cannot configure a VLAN ID for a private virtual switch.
Answer: No. You should enable DHCP guard protection only on virtual machines in which the
(potentially) rogue DHCP server is installed. When you enable DHCP guard protection on a virtual
machine, DHCP in this virtual machine cannot provide TCP/IP settings to other systems on the
2-20 Implementing a Software Defined DataCenter
network. DHCP guard protection settings have no effect on whether the virtual machine can
obtain TCP/IP settings.
Question: Do you configure router guard per virtual machine, per virtual network adapter, or per virtual
switch?
Answer: Router guard functionality is provided by Hyper-V virtual switch, but it is configured per
virtual network adapter.
Resources
Additional Reading: In Windows Server 2016 you can create a virtual switch that provides
NAT functionality for a virtual network. To read step-by-step instructions on how to create a
virtual switch, refer to: “Set up a NAT network” at: https://aka.ms/ryi5d2
3. In the right pane, in the Create virtual switch section, click Private, and then click Create Virtual
Switch.
4. In the Virtual Switch Manager for the LON-HOST1 window, in the Name text box, type Demo
Network, and then click OK.
5. On LON-SVR3, on the taskbar, right-click Start, and then click Windows PowerShell.
6. In Windows PowerShell, run the following command, and point out that four replies are returned:
ping LON-DC1
8. In the Settings for 20745A-LON-SVR3 window, in the left pane, click Network Adapter, in the
Virtual Switch drop-down box, click Demo Network, and then click OK.
9. In LON-SVR3, in Windows PowerShell, run the command ping 172.16.0.10, explain that this is the IP
address of LON-DC1. Point out that this time LON-DC1 is not reachable because now LON-SVR3 is
on different network as LON-DC1.
10. On LON-HOST1, in Hyper-V Manager, right-click 20745A-LON-SVR3, and then click Settings.
11. In the Settings for 20745A-LON-SVR3 window, in the left pane, click Network Adapter, in the
Virtual Switch drop-down box, click Internal Network, and then click OK.
12. In LON-SVR3, in Windows PowerShell, run the following two commands:
13. Explain that the first cmdlet configures LON-SVR3 to obtain an IP address automatically from a
Dynamic Host Configuration Protocol (DHCP) server. Point out that the ping command confirms that
LON-SVR3 has network connectivity to LON-DC1.
14. On LON-HOST1, in Hyper-V Manager, right-click 20745A-LON-SVR3, and then click Settings.
15. In Settings for 20745A-LON-SVR3, in the left pane, click Network Adapter, and then in the right
pane, click Enable virtual LAN identification.
ping 172.16.0.10
18. Point out that the destination host is not reachable, because LON-SVR3 is connected to a different
VLAN than LON-DC1.
19. On LON-HOST1, in Hyper-V Manager, right-click 20745A-LON-SVR3, and then click Settings.
20. In Settings for 20745A-LON-SVR3, in the left pane, click Network Adapter, in the right pane, clear
the Enable virtual LAN identification checkbox and then click OK.
21. On LON-SVR3, in the Windows PowerShell window, run the following command, and explain why the
hosts can now communicate again:
ping LON-DC1
3. In the details pane, right-click the INF folder, and then click Copy.
4. In File Explorer, in the navigation pane, click the down arrow, type \\LON-SVR3\share, and then
press Enter.
5. In File Explorer, in the details pane, right-click anywhere, and then click Paste.
6. When a window showing the progress of the copy process displays, note the copy speed and how
long the process takes.
7. When the copy process completes, right-click the INF folder, click Delete, and then in the Delete
Folder confirmation message box, click Yes.
9. In Settings for 20745A-LON-SVR1, in the left pane, click the Network Adapter that is connected to
Internal Network, and then in the details pane, click Enable bandwidth management. In the
Minimum bandwidth text box, type 10, in the Maximum bandwidth text box, type 10, and then
click OK.
10. On LON-SVR1, in File Explorer, right-click in the details pane, and then click Paste.
11. When the window showing the progress of the copy process displays, note out that the copy process
takes noticeably longer to complete.
2-22 Implementing a Software Defined DataCenter
12. On LON-SVR3, in the Windows PowerShell window, run the following commands, pressing Enter at
the end of each line:
ipconfig /release
ipconfig /renew
13. Review the output, and point out that TCP/IP settings on LON-SVR3 were obtained successfully.
14. On LON-HOST1, in Hyper-V Manager, right-click 20745A-LON-DC1, and then click Settings.
15. In Settings for 20745A-LON-DC1, in the left pane, expand Network Adapter, click Advanced
Features, in the right pane, select the Enable DHCP guard check box, and then click OK.
16. On LON-SVR3, in a Windows PowerShell window, run the following commands, pressing Enter at the
end of each line:
ipconfig /release
ipconfig /renew
17. Explain that this time process takes considerably longer, and LON-SVR3 will not obtain TCP/IP
settings. This is because when you enable DHCP guard on the virtual machine on which the DHCP
server is running, you cannot retrieve TCP/IP settings from that virtual machine.
Overview of Hyper-V virtualization 2-23
Lesson 4
Implementing failover clustering with Hyper-V
Contents:
Question and Answers 24
Resources 27
Demonstration: Creating a failover cluster 27
Demonstration: Creating a virtual machine role and performing live migration 28
2-24 Implementing a Software Defined DataCenter
Answer: Yes. Windows Server 2016 supports cluster functional level, which enables you to have
Windows Server 2012 R2 and Windows Server 2016 nodes in the same failover cluster. This
enables you to upgrade the operating system on failover cluster nodes without any downtime of
the services that by a cluster offers.
Answer: Although shared storage is commonly used, it is not required for a failover cluster. With
Windows Server 2016, you can use Storage Spaces Direct, which can use local storage on the
nodes as a CSV.
Question: How can you make a critical service available during the maintenance of the server that offers
the service?
Answer: Server maintenance and server downtime are unavoidable, and therefore, critical
services must be available from multiple servers. If one of the servers is in maintenance mode or
restarted, service is still available on other servers. An alternative is that the service is available as
a highly available role in a failover cluster that automatically moves the service to a different
failover cluster node if necessary.
Answer: No. Internet small computer system interface (iSCSI) and Fibre Channel storage are not
the only two available storage options for clustering. You also can use virtual hard disk sharing as
shared storage, and you can store a shared virtual hard disk on an SMB3 share or Cluster Shared
Volumes (CSV).
Question: What must you do if you want to use storage replica on a Hyper-V host that is running the
Windows Server 2016 Standard edition?
Answer: Storage Replica is available only in Windows Server 2016 Datacenter edition. If you want
to use that feature with Hyper-V, you must upgrade the server to the Windows Server 2016
Datacenter edition.
Answer: You can provide failover clustering at two different levels: at the Hyper-V host level and
on the virtual machine level. If you want to implement failover clustering on the virtual machines
to protect some of the services included in the virtual machines, then the operating system on
the virtual machines must include failover clustering. However, if you want to make the entire
virtual machine highly available, you must implement failover clustering at the Hyper-V host
level, and the virtual machine operating system does not need to support it. For example, you
Overview of Hyper-V virtualization 2-25
can make a virtual machine that is running Windows 10 highly available with failover clustering at
the Hyper-V host level, even though failover clustering is not a part of Windows 10.
Question: Must all nodes in a failover cluster run the same version of the Windows Server operating
system?
Answer: No. Windows Server 2016 introduces the cluster functional level that enables you to
have Windows Server 2012 R2 and Windows Server 2016 nodes in the same failover cluster. This
is especially useful when you want to upgrade the cluster, because you can upgrade individual
nodes of the cluster without any downtime. After you update the cluster functional level to the
Windows Server 2016 level, that cluster cannot have Windows Server 2012 R2 nodes. Updating
the cluster functional level is irreversible.
What is a quorum?
Question: Will clients still be able to connect to a cluster role if the failover cluster has three nodes and
the internode network fails?
Answer: You should plan your failover cluster in such a way that it provides redundancy and that
the internode network never fails. If the internode network were to fail, the nodes cannot
communicate or participate in the voting, although they still have access to the shared storage
and to the clients. Depending on the quorum model, it is possible that a single node continues to
run the cluster role and clients can still connect to it.
Question: Can a failover cluster that originally had six nodes still run cluster roles if three nodes fail and
only three nodes remain online?
Answer: It depends. Based on the quorum model used, and whether all three nodes failed
simultaneously or whether there was time between each failure, the remaining three nodes might
still run cluster roles. The nodes must have enough resources and use the default dynamic
quorum model.
Question: Where can you access CSV on a Windows Server 2016 failover cluster node?
Answer: CSV is mounted in the C:\ClusterStorage folder on each failover cluster node. If you
want to access the first CSV in the failover cluster, you can access it in the
C:\ClusterStorage\Volume1 folder on any failover cluster node.
Answer: To use a shared virtual disk, a virtual machine must be running Windows Server 2012 or
newer Windows Server operating system. You should also ensure that the latest version of
Integration Services is installed on the virtual machine that will use a shared virtual hard disk.
Technically, you do not need to install anything onto the virtual machines to add a shared virtual
disk.
Question: In Windows Server 2016, can you back up a shared virtual hard disk while the virtual machines
that are using it are running?
2-26 Implementing a Software Defined DataCenter
Answer: Yes. In Windows Server 2016, you can back up a shared virtual hard disk while virtual
machines that are using it are running. The disks must be in the .vhds format.
Answer: For the cluster to be supported by Microsoft, it must pass all the cluster validation tests.
You must either verify the validation test results that your coworker performed or run the
validation tests yourself.
Question: You have a failover cluster with three nodes. The Hyper-V role is installed only on one node.
Can you create a virtual machine role on the cluster?
Answer: Yes, you can create a virtual machine role on the cluster. But a virtual machine can run
only on a single node, and only on the node that has the Hyper-V role installed. Therefore, it is
not highly available. You should also install the Hyper-V role on the other failover cluster nodes.
Answer: If you move a virtual machine between the nodes or if failover occurs, the virtual
machine will run on a different node. If on that node there is no virtual switch with the name that
the virtual machine is configured to use, the virtual machine will not have network connectivity.
Question: Why is virtual machine startup priority and start order important?
Answer: Virtual machines run different loads, and some loads are dependent on each other. For
example, a web application can be dependent on a SQL database that it uses for generating
webpages and stores user data. You can use start order to control the order in which the virtual
machines start, and ensure that the virtual machines that others depend on start first.
Answer: You can configure virtual machine monitoring to act up events in the System,
Application, or Security logs. If an application is writing events in one of those logs, you can
monitor that application in the virtual machine.
Overview of Hyper-V virtualization 2-27
Question: If you plan to monitor a service in a highly available virtual machine in a failover cluster, how
should you configure that service in Service Control Manager?
Answer: If you plan to monitor a service in a virtual machine, you should configure one of the
recovery options for this service in Server Control Manager as Take no action.
Resources
Additional Reading: Windows Server 2016 includes support for Storage Spaces Direct. You
can use Storage Spaces Direct to build highly available and scalable storage for failover cluster
from local storage that is attached to the cluster nodes. To read more about Storage Spaces
Direct, refer to: “Storage Spaces Direct in Windows Server 2016” at: https://aka.ms/kv76r1
Additional Reading: To read more about CSV, refer to: “Use Cluster Shared Volumes in a
Failover Cluster” at: https://aka.ms/hghmdv
Additional Reading: To read more about using a shared virtual hard disk, refer to: “Deploy
a Guest Cluster Using a Shared Virtual Hard Disk” at: https://aka.ms/irm8io
Additional Reading: To learn more about deploying a Hyper-V cluster, refer to: “Deploy a
Hyper-V Cluster” at: https://aka.ms/dx9tzk
Additional Reading: To read more about hardware validation tests for a failover cluster,
refer to: “Validate Hardware for a Failover Cluster” at: https://aka.ms/ay5xf8
2. In the Failover Cluster Manager, in the Actions pane, click Create Cluster.
3. In the Create Cluster Wizard, on the Before You Begin page, click Next.
4. On the Select Servers page, in the Enter server name box, type LON-SVR1; LON-SVR2, click Add,
and then click Next.
8. On the Confirmation page, click Next. Point out that during validation, several warnings are
detected.
9. After all validation tests are performed, click View Report. Show the Failover cluster validation report,
and then close Internet Explorer.
11. On the Access Point for Administering the Cluster page, in the Cluster Name box, type LON-
CLUST, in the Address box, type 172.16.1.100, and then click Next.
12. On the Confirmation page, review the settings, and then click Next.
14. On LON-DC1, on the taskbar, click Start, and then click Server Manager.
15. In Server Manager, click Tools, and then click Active Directory Users and Computers.
16. In Active Directory Users and Computers, in the navigation pane, expand the Adatum.com domain,
click the Computers container, and point out that it contains computer accounts for LON-SVR1,
LON-SVR2, and LON-CLUST, which were added when you created the failover cluster.
17. Close Active Directory Users and Computers.
18. On LON-SVR1, on the taskbar, click File Explorer.
19. In File Explorer, in the navigation pane, click Local Disk (C:). In the details pane, double-click the
ClusterStorage folder, and point out that the folder is empty.
20. In Failover Cluster Manager, in the navigation pane, expand LON-CLUST.Adatum.com, expand
Storage, and click Disks.
21. In the Failover Cluster Manager, verify that you see two disks in the details pane. Right-click Cluster
Disk 2, and then click Add to Cluster Shared Volumes.
22. In File Explorer, point out that the ClusterStorage folder now contains a mounted volume for
Volume1, which was added when you added the disk to the CSV.
2. In the High Availability Wizard, on the Before You Begin page, click Next.
3. On the Select Role page, click the Virtual Machine role, and then click Next.
4. On the Select Virtual Machine page, select the LON-TEST1 virtual machine, and then click Next.
6. On the Summary page, point out that the virtual machine hard disk is not stored on cluster storage,
and then click Finish.
7. In Failover Cluster Manager, in the navigation pane, click Roles. In the details pane, right-click LON-
TEST1, click Move, and then click Virtual Machine Storage.
Overview of Hyper-V virtualization 2-29
8. In the Move Virtual Machine Storage box, in the lower-left window, click Volume1. In the top
window, click the Virtual Machine LON-TEST1 object, and while holding down the mouse button,
drag it to the lower right window. After you release the mouse button, click Start.
9. In Failover Cluster Manager, in the details pane, point out that the Owner node for the LON-TEST1
virtual machine is LON-SVR1.
11. Right-click LON-TEST1, and click Connect. At the command prompt, type ping 172.16.0.10 -t, and
press Enter. Explain that 172.16.0.10 is the IP address of LON-DC1, and then minimize the LON-
TEST1 window.
12. In Failover Cluster Manager, right-click LON-TEST1, click Move, click Live Migration, and then click
Select Node.
13. In Move Virtual Machine, confirm that LON-SVR2 is selected, and then click OK.
14. In Failover Cluster Manager, point out that Live Migration is moving LON-TEST1, and that LON-
SVR2 is now its Owner Node.
15. On the taskbar, maximize LON-TEST1 windows, and point out that no ping was lost while the virtual
machine was moved between nodes.
2-30 Implementing a Software Defined DataCenter
Answer: If you want a Windows Server failover cluster to be Microsoft supported, all failover
cluster hardware components must be certified for Windows Server. In addition, the failover
cluster configuration, which includes servers, network, and storage, must pass all tests in the
Validate Cluster Configuration Wizard.
Overview of Hyper-V virtualization 2-31
Answer: You first should generalize the operating system on the virtual hard disk by running the
Sysprep command. Then, you can copy the virtual hard disk and add the copy to the new virtual
machine, or you can create a differencing virtual hard disk and then use the existing virtual hard
disk as a parent. In the second scenario, you should not modify the parent disk, and you should
be aware of the performance implications.
Question: What must you do before you can create a Nano Server image by using the New-
NanoServerImage cmdlet?
Question: When creating failover clustering in virtual machines, which storage types can virtual machines
use as shared storage?
Answer: When creating failover clustering, virtual machines can use iSCSI SAN, Fibre Channel
SAN, or shared virtual hard disks as shared storage.
Installing and configuring System Center 2016 Virtual Machine Manager 3-1
Module 3
Installing and configuring System Center 2016 Virtual
Machine Manager
Contents:
Lesson 1: Overview of System Center 2016 VMM 2
Lesson 2: Installing System Center 2016 VMM 4
Lesson 1
Overview of System Center 2016 VMM
Contents:
Question and Answers 3
Installing and configuring System Center 2016 Virtual Machine Manager 3-3
Question: Categorize each VMM Fabric item into the appropriate category. Indicate your answer by
writing the category number to the right of each item.
Items
1 PXE
2 Port Profiles
3 Arrays
4 Infrastructure
6 QoS Policies
7 All Hosts
8 VIP Templates
9 Providers
10 vCenter
11 Load Balancers
Answer:
Lesson 2
Installing System Center 2016 VMM
Contents:
Question and Answers 5
Resources 5
Demonstration: Installing VMM 5
Installing and configuring System Center 2016 Virtual Machine Manager 3-5
( ) Windows ADK
Answer:
( ) Windows ADK
Feedback:
Review the Virtual Machine Manager System Requirements topic page. You require all the items
above for the installation of the VMM management server, except for the Microsoft Deployment
Toolkit with Update 2.
Resources
Additional Reading: For more information, refer to System Requirements for System
Center 2016: https://aka.ms/nq57r5
Additional Reading: For more information, refer to Microsoft Azure Stack:
https://aka.ms/aj5sua
Additional Reading: For more information, refer to VMM ports and protocols:
https://aka.ms/xrf0d8
Additional Reading: For more information, refer to Windows Assessment and Deployment
Kit (ADK) for Windows 10: https://aka.ms/n2tz8a
Files\Microsoft Learning\20745\Drives, select the file named VMM2016_EVAL.iso, and then click
the Open button.
Note: The drive letter that is used to mount the DVD might be different than E:\. If so, use
the drive letter that is labeled DVD Drive.
Note: When the Microsoft System Center 2016 Virtual Machine Manager screen
displays, note that all of the hyperlinks on the page, except for Install and Local Agent, link to
Microsoft websites.
5. On the Select Features to install page, click VMM management server. When you do so, a
Microsoft System Center VMM Setup window appears, with a message that asks if you would like
to install VMM management server on a cluster node. Click Yes. Note that the VMM console will also
select by default, and then click Next.
6. On the Product registration information page, in the Name text box, type Administrator, and in
the Organization box, type A. Datum Corporation.
7. You can install VMM as an evaluation edition by leaving the Product Key box blank. You can also
provide the product key after installation. After pointing this out to students, click Next.
8. On the Please read this license agreement page, select the I have read, understood and agree
with the terms of the license agreement check box. You can use the Print button to print and save
the license agreement for later viewing. Click Next.
9. On the Diagnostic and Usage Data page, review the program with the students, emphasizing that
there is no penalty to decline participation. Click Next.
10. On the Installation location page, click Next.
11. On the Prerequisites page, you might get a warning informing you the SQL Server Command Line
Utilities are not installed. You can proceed. Click Next.
12. On the Database configuration page, in the Server name text box, verify that LON-VMM displays.
Note: The Existing database box should populate with the following value
VirtualManagerDB.
Note: The Store my keys in the Active Directory check box is grayed out. This is because
it was already done on LON-VMM.
Note: Point out that under the Distributed Key Management section, you can store
encryption keys for VMM in AD DS instead of on the local machine. For highly available VMM
installations, you must do this.
Installing and configuring System Center 2016 Virtual Machine Manager 3-7
Note: Emphasize to the class that administrators cannot change the service account after
they install VMM. If necessary, you can remove VMM from the server, make the necessary
change, and then reinstall it. However, you also could, as part of the removal procedures, retain
the VMM database and then use it again after you reinstall VMM. Explain that this would be a
potentially laborious and complex action. Explain also that if you are installing a highly available
VMM management server, you must use a domain account. This domain account needs to have
local administrator access on all host and management servers in the domain.
16. On the Port configuration page, make note of the ports shown, but do not change them.
Note: Point out the default port numbers that are assigned to various entities and
functions. Do not make any changes, but ask students about circumstances in which they might
make changes. Answers might include the port number already in use by another process, or the
desire to change default port assignments to a different number for enhanced security.
20. While VMM is being installed on LON-SVR3, go to LON-HOST1, and then, in the taskbar, click File
Explorer.
21. In File Explorer, go to D:\Program Files\Microsoft Learning\20745\Drives, and double-click
VMM2016_EVAL.iso. This will mount the ISO into the next available drive letter and open the DVD
drive in File Explorer. Make a note of the drive letter.
22. In the details pane, double-click Setup.exe. If the file extension .exe is not showing, in File Explorer,
in the ribbon, select View, and then select the File name extensions check box.
23. The System Center 2016 screen will appear. Under Virtual Machine Manager, click the Install
hyperlink.
24. On the Select Features to install page, click the VMM console, and then click Next.
25. On the Please read this notice page, select the I agree with the terms of this notice check box,
and then click Next.
29. On the Installation summary page, review the selections, and then click Install.
30. On the Microsoft System Center 2016 Virtual Machine Manager screen, clear the Check for the
latest Virtual Machine Manager updates and Open VMM console when this wizard closes check
boxes, and then click Close.
31. On the System Center 2016 screen, click Close.
3-8 Implementing a Software-Defined DataCenter
32. On LON-HOST1, minimize Server Manager. you should see the Virtual Machine Manager
Console icon on the Desktop. Right-click the icon, and then click Pin to taskbar.
33. In File Explorer, return to the already mounted VMM2016_EVAL.iso drive letter (it should be on the
drive letter it used in step 21 above). Click UR1 to open the folder.
34. Double-click the kb3190598_AdminConsole_amd64.msp file. This will install the Update Rollup 1
for the VMM 2016 console.
36. On the Connect to Server page, in the Server name text box, type VMM-HA2.adatum.com:8100.
Also, point out the options for specifying credentials. The default selection, Use current Microsoft
Windows session identity, is sufficient because you are signed in as the domain administrator. Click
Connect.
37. Switch to LON-SVR3. On the Microsoft System Center 2016 Virtual Machine Manager screen,
clear the Check for the latest Virtual Machine Manager updates and Open VMM console when
this wizard closes check boxes, and then click Close.
38. On the Microsoft System Center 2016 Virtual Machine Manager screen, click Close.
42. In the details pane, right-click VMM-HA2, and then select Properties.
43. In the VMM-HA2 Properties window, at the bottom, note Node: LON-VMM. Click Cancel.
44. In the details pane, right-click VMM-HA2 again, click Move, and then click Select Node.
45. In the Move Clustered Role window, select LON-SVR3. Click OK.
Note: In the details pane of the Failover Cluster Manager console, note the VMM-HA2 role
will show a status of Pending. Wait until the Status shows as Running.
48. If the VMM Console you left open in step 36 is still open, proceed to step 50. Otherwise, the VMM
console may be trying to reconnect, but is not completing the connection. If so, close the
Connecting to VMM window, and then, on the taskbar, double-click the VMM console icon.
Lesson 3
Adding hosts and managing host groups
Contents:
Question and Answers 10
Resources 11
Demonstration: Using the VMM console 11
Demonstration: Adding Hyper-V host and cluster to VMM 13
Demonstration: Managing host groups 15
3-10 Implementing a Software-Defined DataCenter
Question: Categorize each item into the appropriate category. Indicate your answer by writing the
category number to the right of each item.
Items
3 Uses a subscription ID
4 Enables VMM to balance the virtual machine loads automatically within a host cluster
7 Assign different resource types including IP pools, load balancers, logical networks, and MAC
pools.
Answer:
Resources
Additional Reading: For more information, refer to System Requirements: VMware ESX
Hosts: https://aka.ms/cjxojb
2. Switch to LON-VMM, open Server Manager, click Tools, and then click Failover Cluster Manager.
3. In the Failover Cluster Manager console, expand VMM-HA.adatum.com, and in the console tree,
select Roles.
4. In the details pane, right-click VMM-HA2, click Move, and then click Select Node.
6. In the details pane of the Failover Cluster Manager console, note the VMM-HA2 role will show a
status of Pending. Wait until the Status shows as Running.
7. Return to LON-HOST1. In the taskbar, double-click the VMM console icon, verify that the value in the
Server name text box is VMM-HA2.adatum.com:8100.
Note: Because the VMM server role is running on the VMM-HA failover cluster, you can
connect to the failover cluster node’s fully qualified domain name, which is VMM-
HA2.Adatum.com. This helps you ensure that your VMM console is not connected to a
particular server, but to the node on which the active server is running. Switching the failover
cluster node back to LON-VMM helps ensure the continuity of the created objects in later
modules.
Note: The Server name text box displays VMM-HA2.adatum.com:8100, which is the
server you are currently signed on to. However, you installed the VMM console on another
computer, LON-SVR3. You do not need to type that computer’s name here, because the Virtual
Machine Manager service is a shared resource on a node in the failover cluster. Currently, that
node is LON-SVR3. As a best practice, use the Fully Qualified Domain Name (FQDN) of a
computer or shared resource cluster name instead of a single host name. Using the FQDN means
that you can normally find the server on any routable network, if the firewalls allow the 8100 port
through. 8100 is the default VMM port, and reflects the self-assigned port number during the
VMM management server installation. If you used a different port number during installation,
you would need to change it here.
9. On the bottom of the Connect to Server page is the Credentials section, which has two options: Use
current Microsoft Windows session identity and Specify credentials. By default, the Use current
Microsoft Windows session identity option is selected.
3-12 Implementing a Software-Defined DataCenter
Note: However, if you want to sign in by using alternate credentials, you can select the
second option, and then supply the user domain and name in the User name text box and the
corresponding password in the Password text box. This can be useful when an administrator is
testing user roles and permissions.
10. The last item at the bottom of the page is the Automatically connect with these settings check
box. Without making any changes, click Connect.
Note: When the VMM console opens, mention that the VMM console always opens to the
last node that it was in when you last closed the console. Point out the main areas of the
consoles: workspace, console tree, details pane, and ribbon.
11. In the Workspace area, point out the five main workspaces: VMs and Services, Fabric, Library, Jobs,
and Settings.
12. Select each of the five workspaces and show how the console tree changes. Do not expand any items
in the tree yet.
Note: In the details pane, show students that different details panes display in the middle
and right, depending on the selected workspace and the selected item in that workspace’s
console tree. Mention that sometimes two details panes display, one on top of the other.
Note: Point to the ribbon at the top of the console. Point out that all System Center 2016
components have a ribbon at the top of their respective consoles. Explain that the VMM console
ribbon has different items, icons, buttons, and tabs on it, depending on the workspace selected
and the item selected in that workspace’s console tree.
13. In the lower left, click the Library workspace. In the Library console tree (area on the left directly
above workspaces), click Templates.
14. On the ribbon, on the Home tab, click Create Service Template.
Note: In the New Service Template window, explain that you can start a service template
from several different patterns, depending on what you select in the Patterns area.
Note: Point out to the class that this opens Notepad in which Windows PowerShell
cmdlets display. You can use these cmdlets to create the same item that the user interface can
create. Explain that you can also save these cmdlets as a Windows PowerShell script, so that you
can alter and run them later, document your configuration or learn how to write Windows
PowerShell scripts. Point out that most of the Create items within the VMM console will have a
View Script button located within them. Explain that some of the more advanced VMM wizards
will have several pages, and that you will often find the View Script option on the last page.
18. Do not close the VMM console, because you will use it again in the next demonstration.
Installing and configuring System Center 2016 Virtual Machine Manager 3-13
2. In the console tree, right-click Run As Accounts, and then click Create Run As Account.
3. In the Create Run As Account window, in the Name, Description and User name text boxes, type
adatum\VMMRunas, in the Password and Confirm password text boxes, type Pa55w.rd, and then
click Finish.
Note: A Run As Account is a named set of stored credentials that you can provide instead
of manually entering a username and password to run a process. Only administrators and
delegated administrators can create and manage Run As Accounts.
6. Right-click All Hosts, and then click Add Hyper-V Hosts and Clusters.
7. In the Add Resource Wizard, on the Resource Location page, select the Windows Server
computers in a trusted Active Directory domain option (it should be the default selection).
Note: Describe the other options that are available. Note that as previously mentioned,
some of the other selections might require additional prerequisites. Also, review the Windows
Server computers in a perimeter network option, reviewing the steps from the “Considerations
for Adding Hyper-V Virtualization Resources” topic. Because there is no perimeter network, you
cannot demonstrate these steps.
8. Click Next.
9. On the Credentials page, review the two options. In the Use an existing Run As Account section,
click Browse, in the Select a Run As Account window, select the adatum\VMMRunas item, click
OK, and then click Next.
10. On the Discovery Scope page, note the two options: Specify Windows Server computers by
names and Specify an Active Directory query to search for Windows Server computers. Select
the Specify Windows Server computers by names option, in the Computer names text box, type
LON-HOST1.adatum.com, and then click Next.
11. On the Target resources page, in the Discovered computers section, select the LON-
HOST1.adatum.com check box, and then click Next.
Note: If you receive an error stating the Target server is not recognized, press F5 to refresh.
12. When a VMM pop-up window displays, warning you that if Hyper-V is not enabled on the selected
server, VMM will do so, click OK.
Note: On the Host Settings page, note that on the Host group drop-down menu, there is
only one option, All Hosts. Note the Reassociate this host with this VMM environment check
box. This check box selection reassigns to this VMM management server those hosts that have
been assigned to a different one. For this demonstration, you do not need to select this feature.
3-14 Implementing a Software-Defined DataCenter
Under this check box is a field to add virtual machine placement paths as default locations to
store virtual machines on the host.
14. On the Summary page, on the upper right part of the page, click View Script.
15. When Notepad opens, point out the Windows PowerShell cmdlets necessary to run a script in
Windows PowerShell to add the LON-HOST1 host to this VMM management server. Explain to the
students how this can be useful to document your work or to create another host, perhaps at a later
time.
16. Close Notepad.
Note: When the Jobs pop-up window displays, point out that this window shows all the
individual steps being taken to add the host. The final step, which is Add virtual machine host,
takes the longest. This step occurs at several stages of job completion, which is normal.
18. When the job finishes, close the Jobs window. If a warning icon (yellow triangle) displays with the text
Add virtual machine host Completed w/ info, this is because Multipath I/O is not enabled for
known storage arrays.
19. In the VMs and Services console tree, under All Hosts, verify that LON-HOST1 displays.
Note: Point out to the class all the virtual machines that now display in the virtual machine
details pane. Explain that from here, you can select the virtual machines, and perform a wide
variety of actions on them..
20. With LON-HOST1 still selected, on the ribbon, click the Folder tab, and then click Properties.
21. In the Properties dialog box, review the content of the following tabs:
o General. This tab provides extensive information, including the system management BIOS
(SMBIOS) ID and the VMM agent version.
o Status. On this tab, you can view all the jobs on this host that have run. If any jobs have failed,
you can select them and then click Repair All. When you select any failed jobs or jobs that have
completed with information, information displays in the Error details pane. You use the Copy
Errors option to copy and paste the error details into another program.
o Hardware. Most of the settings that display on the Hardware tab are for information only, and
you cannot change them. However, there are a few settings on this tab that you can change.
Point out to the class that in the CPU section, there is a NUMA modes check box that you can
use to allow virtual machines to span non-uniform memory access (NUMA) nodes. In the
Network adapters section, you can select the adapters, logical networks, and switches (if they
exist), and make changes to them. In the Advanced section, under the Baseboard Management
Controller (BMC) Settings area, you can also make other changes. Show this as well.
o Host Access. On the Host Access tab, you can supply different host management credentials
such as Run As Accounts. You can also specify whether the host is available for placement, and
set the remote connection port.
o Virtual Machine Paths. On this tab, you can view detailed information about every virtual
machine on the host. You can also register additional virtual machine paths.
Installing and configuring System Center 2016 Virtual Machine Manager 3-15
o Reserves. If you do not want to use the host reserves settings from the parent host group, you
can use the Override host reserve settings from parent host group check box to turn off
inheritance, and change the resources reserved for this host. When you select this check box,
several configurable items display that you can use to set the reserved resources. Show this to the
class, but make no changes.
o Storage. You use this tab to make extensive changes to various storage elements, including disks,
Internet SCSI (iSCSI), Fibre Channel, Serial Attached SCSI (SAS) arrays, and file shares. You can also
add and remove storage elements; however, the various disks and arrays must already be
available.
o Virtual Switches. Similar to the Storage tab, you can make many changes on the Virtual
Switches tab, including creating new logical and standard switches. Review the parameters with
the class, but make no changes.
o Migration settings. You can configure a number of migration settings on this tab, including live
storage migration, live migration settings, performance options, and authentication protocols for
use when migrating.
o Placement paths. On this tab, you can specify both of the default virtual machine paths. The
default parent disk paths use running virtual machine placement.
o Servicing Windows. You can use this tab to add or remove servicing windows, if they exist.
o Host Guardian Service. You can use this tab to enable the Host Guardian Service and use a
Code Integrity policy to restrict software that can run on the host. This tab is new to System
Center 2016 VMM.
o Custom Properties. You use this tab to assign and manage custom properties. Click Manage
Custom Properties to show the students the various object types that they can select. Explain
that by clicking the Create button, students can create custom properties.
Note: Point out the View Script option. Explain that by clicking this option, you can create
a Windows PowerShell script with cmdlets that will make the same changes that you can make
with the Properties dialog box. You can save the Windows PowerShell script, and alter or rerun it
later, or simply keep it for documentation.
3. On the ribbon, on the Home tab, click Create Host Group. Verify that a new folder named New
host group appears in the console tree under All Hosts. Highlight this folder, in this space, type
London Host Group, and then press Enter.
4. In the VMs and Services console tree, click LON-HOST1, and then on the ribbon, click the Host tab.
On the ribbon, click Move to Host Group.
5. In the Move Host Group pop-up dialog box, in the Parent host group drop-down box, click
London Host Group, and then click OK.
3-16 Implementing a Software-Defined DataCenter
7. In the London Host Group Properties dialog box, review the various pages that you can configure.
8. On the London Host Group Properties page, note the View Script option in the lower-left corner. If
you were to make changes to this host group and then wanted to apply the same changes to another
host group, you could save the script, change the name of the host group within it, and then use it to
make those changes.
9. In the London Host Group Properties dialog box, click Cancel.
10. In the VMM console ribbon, in the Window section, click PowerShell.
11. In the Windows PowerShell – Virtual Machine Manager command window, type the following
three commands, pressing Enter after each:
12. Return to LON-HOST1, and then, in the VMM console, verify that LON-HOST1 is now in the London
Host Group.
13. Right-click London Host Group, and then click Add Hyper-V Hosts and Clusters.
14. In the Add Resource Wizard, on the Resource Location page, select the Windows Server
computers in a trusted Active Directory domain option (it should be the default selection).
17. On the Discovery Scope page, select the Specify Windows Server computers by names option, in
the Computer names text box, type LON-CLUST, and then click Next.
18. On the Target resources page, in the Discovered computers section, select the LON-
CLUST.Adatum.com check box, and note that LON-SVR1.Adatum.com and LON-
SVR2.Adatum.com are both part of the LON-CLUST failover cluster and are therefore listed under it.
Click Next.
19. When a VMM pop-up window displays, warning you that if Hyper-V is not enabled on the selected
server, VMM will do so, click OK.
20. On the Host settings page, note that London Host Group is selected, and then click Next.
21. On the Summary page, click Finish. The Jobs window displays.
22. When the job finishes, close the Jobs window. If a warning icon (yellow triangle) displays with the text
Add virtual machine host Completed w/ info, this is because Multipath I/O is not enabled for
known storage arrays.
23. In the VMs and Services console tree, under All Hosts, verify that LON-CLUST and the two nodes in
it, LON-SVR1 and LON-SVR2, display.
24. Complete the steps in Task 3: “Prepare the environment for the next module” and Task 4: “Run script
and complete configuration for the next module” in Exercise 3: “Managing an Azure subscription by
using VMM” of the lab.
Installing and configuring System Center 2016 Virtual Machine Manager 3-17
In a complex VMM environment with many Hyper-V hosts in multiple locations, take advantage of host
groups nesting and inheritance. For example, you could use a geographic order to the top level of your
host groups, with functional host groups under them. Properties set at the higher levels will propagate to
the lower levels.
Review Questions
Question: Which major VMM component are the three main groups of resources —compute,
networking, and storage—all part of?
Prerequisites for installing VMM cause failures. Ensure all prerequisites are met, to include
Windows ADK and the proper service account and
permissions.
Host group Run As Account does not work Ensure the host group Run As Account is not the
properly. same as the VMM service account.
3-18 Implementing a Software-Defined DataCenter
Answer: Earlier, you added LON-SVR3 as an additional node in the VMM-HA2 role. This role is
running the VMM service on the LON-VMM node. When you first run the Microsoft System
Center 2016 Technical Preview 5 Virtual Machine Manager Setup Wizard, it noted that you
were the second node in that failover cluster.
Question: What did you notice about your Azure virtual machines when you added the subscription into
the VMM console?
Answer: When you added the Azure subscription to the VMM console, you are able to see the
virtual machine you created in the classic portal, but not the virtual machines you created in the
new portal. This is expected behavior. To manage the virtual machines you created in the new
portal, you must use the new portal website for Azure.
Managing storage fabric and fabric updates 4-1
Module 4
Managing storage fabric and fabric updates
Contents:
Lesson 1: Overview of server virtualization storage technologies 2
Lesson 1
Overview of server virtualization storage technologies
Contents:
Question and Answers 3
Resources 3
Demonstration: Configuring an iSCSI target server 4
Managing storage fabric and fabric updates 4-3
Answer: When deploying Storage Spaces Direct in a VMM 2016 environment, it is possible to use
either the disaggregated approach or hyper-converged approach. The answers might vary, but
the two main factors to consider are scalability and operational simplicity. The disaggregated
approach allows you to scale the compute and storage components independently, while the
hyper-converged model scales the compute and storage components together. On the other
hand, the disaggregated approach involves deployment of two separate clusters which must
closely interact with each other. The hyper-converged model includes a single cluster only.
Answer: Answers might vary. When choosing between the two replication methods, you should
consider performance and potential for data loss. Synchronous replication ensures that the
content of the source and the replication target is crash-consistent. However, to accomplish this,
the source must wait for the acknowledgement of the successful write completed at the target,
which affects its performance. Asynchronous replication eliminates the impact of writes at the
target on the source’s performance, but it introduces potential for data loss if the source fails
before its data fully replicates to the target.
Resources
Additional Reading: For more information, refer to “Windows Offloaded Data Transfers
Overview” at: https://aka.ms/u5epuc
Additional Reading: VMM 2016 simplifies deployment of Scale-Out File Server clusters by
supporting the addition of bare-metal nodes directly to a Scale-Out File Server cluster.
For more information, refer to: “Provision a scale-out file server (SOFS) cluster from bare metal
computers in the VMM fabric” at: https://aka.ms/oit11y
Additional Reading: For more information, refer to: “Manage scale-out file server (SOFS)
in the VMM fabric” at: https://aka.ms/li602f
Additional Reading: For more information, refer to “Implement Hyper-V Virtual Fibre
Channel” at: https://aka.ms/agsmwi
4-4 Implementing a Software-Defined DataCenter
Additional Reading: For more information, refer to: “Storage Spaces Direct in Windows
Server 2016” at: https://aka.ms/rrac66
Additional Reading: For more information, refer to: “Storage Replica overview” at:
https://aka.ms/lwi8w6
3. In the iSCSI VIRTUAL DISKS section, click TASKS, and then click New iSCSI Virtual Disk.
4. In the New iSCSI Virtual Disk Wizard, on the Select iSCSI virtual disk location page, click C:, and
then click Next.
5. On the Specify iSCSI virtual disk name page, in the Name text box, type Disk11, and then click
Next.
6. On the Specify iSCSI virtual disk size page, in the Size text box, type 15, click Dynamically
expanding, and then click Next.
7. On the Assign iSCSI target page, click New iSCSI target, and then click Next.
8. On the Specify target name page, in the Name text box, type Lab4-Host, and then click Next.
9. On the Specify access servers page, click Add. In the Select a method to identify the initiator
dialog box, click Browse, in the Browse text box, type LON-HOST1 and then click Check Names. If
prompted for credentials, in the username box, type Adatum\Administrator, and in the password
box, type Pa55w.rd. Click OK twice and then click Next.
10. On the Enable Authentication page, click Next.
14. In Windows PowerShell, create additional virtual disks and add them to the Lab4-Host target by
typing the following cmdlets, and then pressing Enter at the end of each line:
15. In Server Manager, on the toolbar, click the Refresh icon. Confirm that virtual disk Disk12.vhdx
displays and is mapped to the Lab4-Host target.
Managing storage fabric and fabric updates 4-5
16. In Server Manager, click Tools, and then click iSCSI Initiator. In the Microsoft iSCSI dialog box,
click Yes.
17. In the iSCSI Initiator Properties dialog box, in the Target text box, type LON-SS, click Quick
Connect, and then click Done.
20. In Computer Management, in the navigation pane, click Disk Management. In the details pane,
confirm that two disks are added, that they have the size of 15 GB, and that they are offline.
4-6 Implementing a Software-Defined DataCenter
Lesson 2
Managing storage fabric
Contents:
Question and Answers 7
Resources 7
Demonstration: Deploying and managing VMM storage 8
Managing storage fabric and fabric updates 4-7
( ) Nonclustered Hyper-V using nonclustered SMB file share for virtual disk storage
Answer:
(√) Hyper-V using a Scale-Out File Server for virtual disk storage
( ) Nonclustered Hyper-V using nonclustered SMB file share for virtual disk storage
(√) Hyper-V using CSV for virtual disk storage
Feedback:
Starting with Windows Server 2016, failover clustering incorporates storage Quality of Service
(QoS) policies, which are stored in the cluster database. Windows Server 2016 supports storage
QoS in two scenarios:
• Nonclustered or clustered Hyper-V hosts serving as the compute tier with Scale-Out File
Servers serving as the storage tier.
• Clustered Hyper-V hosts with Cluster Shared Volumes (CSVs)
Storage Spaces Direct in disaggregated mode relies on Scale-Out File Servers for storing
virtual disk files, so it is one of the supported scenarios.
Resources
Additional Reading: For more information, refer to: “Set up a Virtual Fibre Channel in the
VMM storage fabric” at: https://aka.ms/szv9fd
Additional Reading: For more information, refer to: “Provision a scale-out file server
(SOFS) cluster from bare metal computers in the VMM fabric” at: https://aka.ms/oit11y
Additional Reading: For more information, refer to: “Provision a scale-out file server
(SOFS) from standalone file servers in the VMM fabric” at: https://aka.ms/k84ce9
Additional Reading: For more information, refer to: “Manage Storage Spaces Direct in
VMM” at: https://aka.ms/n23ezd
4-8 Implementing a Software-Defined DataCenter
2. On the Select Provider Type page, click SAN and NAS devices discovered and managed by a
SMI-S provider, and then click Next.
3. Click the Protocol drop-down list, and then click SMI-S WMI.
4. In the Provider IP address or FQDN: text box, type lon-ss.adatum.com, and then click Browse.
5. On the Select a Run As account page, click adatum\VMMRunas and click OK.
7. On the Gather Information page, review the discovery result, and then click Next.
8. On the Select Storage Devices page, click Create Classification, and in the Name text box, type
Gold, and in the Description text box, type SSD SAS Drives, and then click Add.
9. Click Create Classification, and in the Name text box, type Silver, and in the description text box,
type 7K SATA Drives, and then click Add.
10. Select the iSCSITarget: LON-SS:C check box, click the Classification drop-down list, click Silver,
then in the Host Group drop-down list, click All Hosts, and then click Next.
11. On the Summary page, click Finish.
12. Wait for the job to finish, and then close the Jobs window. Job is expected to complete with the
Completed w/Info status.
3. Click the storage pool drop-down list, and then click iSCSITarget: LON-SS:C.
4. In the Name text box, type LON-APP1_C, and in the Size (GB) text box, clear the existing value, and
then type 20.
5. In the Host group: drop-down list, click All Hosts, and then click OK.
6. In the Fabric navigation pane, click Classifications and Pools. Verify that the new LUN displays.
Managing storage fabric and fabric updates 4-9
Lesson 3
Managing fabric updates
Contents:
Question and Answers 10
Demonstration: Implementing fabric updates 10
4-10 Implementing a Software-Defined DataCenter
Answer: You must identify the Knowledge Base (KB) number of the update and then create an
update exception.
Question: VMM can share the same WSUS server with System Center Configuration Manager.
( ) True
( ) False
Answer:
(√) True
( ) False
3. In the Add Windows Server Update Services Server dialog box, in the Computer name text box,
type LON-WSUS, and then in the TCP/IP port text box, type 8530.
4. Click the Enter a user name and password option. In the User name text box, type
Adatum\Administrator, and in the Password text box, type Pa55w.rd, and then click Add.
5. In the Jobs window, click the Add Update Server job. At the bottom of the Jobs window, click the
Summary tab, and then monitor the status of the configuration job.
6. When the job displays the status Completed w/ info, close the Jobs window. Disregard any error
messages related to the WSUS synchronization failures. This is expected.
7. With the Update Server node selected, verify that LON-WSUS.adatum.com displays in the results
pane, and that the Agent Status column displays Responding.
Create a baseline
1. In the VMM console, click the Library workspace.
2. In the navigation pane, expand the Update Catalog and Baselines node, and then click Update
Baselines.
3. On the ribbon, click Create, and then click Baseline.
4. In the Update Baseline Wizard, on the General page, in the Name text box, type Windows Server
2016 (Demo Baseline), and then click Next.
6. In the Add Updates to Baseline dialog box, click the text box at the top, and then type Windows
Server 2016. Click the first update, press Ctrl + Shift, and then press the Down arrow key. This will
select all the filtered updates. Click Add, and then click Next.
7. On the Assignment Scope page, select all the check boxes, and then click Next.
Managing storage fabric and fabric updates 4-11
8. On the Summary page, review the details, and then click Finish.
9. In the Jobs window, click the Change properties of a baseline job. At the bottom of the Jobs
window, click Summary, and then monitor and review the configuration job.
10. When the job displays the text Completed, close the Jobs window.
11. Confirm that the new baseline is visible in the Baselines pane.
4-12 Implementing a Software-Defined DataCenter
Answer: The answers might vary, but students will probably mention the capabilities of Storage
Spaces Direct. From a performance standpoint, Storage Spaces Direct offers an alternative to a
storage area network (SAN). It removes scalability limitations associated with the Scale-Out File
Server in Windows Server 2012 R2. Instead of relying on external Just a Bunch of Disks (JBODs), it
provides the ability to share directly attached serial attached SCSI (SAS), Serial ATA (SATA), or
Non-Volatile Memory Express (NVMe) drives across up to 16 servers in the same Windows Server
2016 failover cluster. One disadvantage is that Storage Spaces Direct requires the use of Windows
Server 2016 Datacenter Edition, which involves a significant licensing cost.
Managing storage fabric and fabric updates 4-13
Answer: To ensure that the scope of the baseline includes the new file server, you must configure
the Assignment Scope setting of the VMM fabric baseline.
Configure and manage the Virtual Machine Manager library and library objects 5-1
Module 5
Configure and manage the Virtual Machine Manager library
and library objects
Contents:
Lesson 1: Overview of the VMM library 2
Lesson 2: Preparing Windows for deployment in VMM 6
Lesson 1
Overview of the VMM library
Contents:
Question and Answers 3
Demonstration: Working with the VMM library 4
Configure and manage the Virtual Machine Manager library and library objects 5-3
Answer: No, file-based resources that you copy to the library are not immediately visible in the
VMM console. VMM must first refresh the view and index the content, which happens once per
hour by default but can also be triggered manually. You should also be aware that not all
resources appear in the VMM console.
Question: Do you need to use VMM installation media to add a file server as a VMM library server to the
fabric?
Answer: No, you do not need VMM installation media to add a file server as a VMM library
server to the fabric. You can add a file server as a library server to the fabric by using the VMM
console and Windows PowerShell; this will take care of all file server configurations.
Question: Does the VMM library include a replication mechanism that can be used for replicating library
content to multiple library servers?
Answer: No, the VMM library does not include a replication mechanism. If you want to replicate
resources between library servers, either copy them manually, implement a scheduled task to
replicate them automatically, or implement a feature such as storage replica.
Question: How can you prevent remote Hyper-V hosts from accessing and copying resources from the
library server?
Answer: You can configure the library server properties to include information about VM
networks to which the library server is connected.
5-4 Implementing a Software-Defined DataCenter
Answer: To make the VMM library content highly available, you can have either multiple library
servers that store equivalent objects or deploy the VMM library server in a failover cluster.
Question: How can you replicate the VMM library resources between multiple library servers?
Answer: VMM does not include any replication or synchronization functionality that would
replicate content between library servers. You can either manually add resources individually to
each library server, use a script to copy it among library servers, use a scheduled task that would
trigger copy operation, or implement a storage replica feature.
2. In File Explorer, in the navigation pane, expand This PC, click Allfiles (D:); in the details pane, right-
click on the empty space, select New, click Folder, type VMMLibrary, and then press Enter.
3. In the details pane, right-click VMMLibrary, select Share with, and then click Specific People; in the
text box, type domain users, click Add, click the down arrow near Read, click Read/Write, click
Share, and then click Done.
4. On LON-HOST1, on the taskbar, click File Explorer and navigate to C:\Labfiles\Mod05 folder.
5. In details pane, right-click on Lab5-LON-SVR3-Setup.ps1 file, click Run with PowerShell and wait
until script executes.
6. On LON-HOST1, on the taskbar, click Virtual Machine Manager, and then click Connect.
9. In the Add Library Server wizard, on the Enter Credentials page, click Browse, click the
DomainAdmin Run As account, click OK, and then click Next.
10. On the Select Library Servers page, in the Computer name text box, type LON-HOST1, and then
click Add. In the Computer name text box type LON-SVR3, and then click Add again. Verify that
both hosts are added in the Selected servers section, and then click Next.
11. On the Add Library Shares page, in the Select library shares to add section, select the Base and
VMMLibrary check boxes. Select the Add default Resources check box for VMMLibrary, and then
click Next.
Note: The Default Resources option adds the ApplicationsFrameworks folder to the
share.
12. On the Summary page, point out the View Script button and explain that clicking on it will bring up
the Notepad with the Windows PowerShell cmdlets linked together in a script that will recreate all
the selections that you made in the wizard. Click the Add Library Servers button.
Note: This a very useful file that can help you document your administrative actions and
recreate your environment.
Configure and manage the Virtual Machine Manager library and library objects 5-5
13. When the Jobs window opens, notice the two Add library server jobs. When both jobs are
complete, close the Jobs window.
14. In the VMM console, in the Library pane, point out that two library servers are added. Below the
LON-HOST1.adatum.com expand the Base folder and below the lon-svr3.adatum.com library
server expand the VMMLibrary folder. Point out that only the VMMLibrary folder below the Lon-
svr3.adatum.com library server has the ApplicationFrameworks folder.
15. Right-click the LON-HOST1.adatum.com library server, and then select Properties.
16. On the General page, in the Host Groups drop-down list box, select London Host Group, click
View Script and then, on the LON-HOST1.adatum.com Properties dialog box, click OK.
17. In the Notepad click File, click Save As; in the Save as type drop-down list box, select All files (*.*);
in the File name text box type \\LON-SVR3\VMMLibrary\ LibraryAssociation1.ps1; click Save, and
then close the Notepad.
18. In the Library pane, right-click on lon-svr3.adatum.com, and then click Refresh.
19. In the Library pane, expand the VMMLibrary node below the lon-svr3.adatum.com node, and then
double-click Scripts; in the details pane, right-click on script1.ps1, and then click Properties.
20. On the script1.ps1 Properties page, in the Family text box, type VMM Management; in the
Release text box type 1.0, point out the value of the Path property, and then click OK.
25. In the Equivalent Library Objects window, point out that script1.ps is listed and explain that this is
because it has the same Family and Release value. Mention that you can also view objects with
different values, then click OK twice.
5-6 Implementing a Software-Defined DataCenter
Lesson 2
Preparing Windows for deployment in VMM
Contents:
Question and Answers 7
Resources 8
Demonstration: Using Sysprep to prepare a Windows image 9
Configure and manage the Virtual Machine Manager library and library objects 5-7
( ) Windows PE
( ) offlineServicing
( ) specialize
( ) generalize
( ) oobeSystem
Answer:
(√) Windows PE
(√) offlineServicing
(√) specialize
( ) generalize
(√) oobeSystem
Feedback:
During the default Windows Server 2016 installation, the following four Windows setup
configuration passes occur:
• Windows PE
• offlineServicing
• specialize
• oobeSystem
The generalize configuration pass occurs only if you generalize a Windows image and not during
the default Windows Server 2016 installation.
Question: Which tools can be used for generalizing Windows installation and for applying a Windows
image to a volume? Where you can get those tools?
Answer: You can generalize a Windows installation by using sysprep.exe, and you can apply a
Windows image to a volume by using the Expand-WindowsImage cmdlet. Both are part of the
default Windows Server 2016 or Windows 10 installation.
Overview of Sysprep
Question: Why would you run sysprep.exe to generalize an operating system in the virtual hard disk that
will be used for deploying new VMs?
Answer: Sysprep.exe generalizes an operating system by removing all settings that are specific to
current installation. For example, it will remove the name of the computer—it’s SID—and empty
the Recycle Bin and all events in Event Viewer. You would run syprep.exe because a virtual hard
disk with the installed operating system will be deployed multiple times, and you do not want
multiple computers on the network to have the same identity, as this would cause conflicts.
Question: Can you generalize Windows Server 2016 if the computer is a domain member? Can the
Windows Server 2016 VM that you deploy from the generalized image be an AD DS member?
Answer: Yes, you can generalize Windows Server 2016 whether a computer is in a workgroup or
a domain. A generalized image does not include information about AD DS membership, but you
can provide that information during deployment, typically by using an answer file. This means
5-8 Implementing a Software-Defined DataCenter
that the Windows Server 2016 VM that you deploy from the generalized image can be an AD DS
member, which is a common scenario.
Answer: You can create a Windows answer file by using the Windows Image System Manager.
This tool is part of Windows ADK, and you can download it from the Microsoft portal.
Question: Why would you want to use an answer file with a generalized Windows image?
Answer: You create a generalized Windows image by running Sysprep, which deletes all
computer-specific settings that are unique to installed Windows, such as the computer SID and
the computer name. Windows system cannot run without these settings. You can provide them
interactively through the Windows Setup Wizard when the Windows system starts for the first
time, but very often administrators prefer to use an answer file to provide those settings.
Question: Should you use the DISM tool for capturing the reference installation of Windows if you plan
to deploy it to VMs?
Answer: No, you should run DISM only if you plan to deploy a generalized Windows image to
physical computers. If you deploy it to VMs, you can simply copy the virtual hard disk with a
generalized installation of Windows to the VMM library.
Answer: Although you can use additional tools for applying a Windows image to a virtual hard
disk, doing so is not required. Windows Server 2016 and Windows 10 include the Windows
PowerShell cmdlet Expand-WindowsImage, which can be used for applying a Windows image
to a physical or virtual hard disk.
Resources
Additional Reading: For more information, refer to How configuration passes work:
https://aka.ms/d0q30p
Configure and manage the Virtual Machine Manager library and library objects 5-9
Additional Reading: For more information, refer to Download the Windows ADK:
https://aka.ms/ol85tb
4. The System Preparation Tool 3.14 dialog box explains the different available options and their
meaning. Select the Generalize check box; in the Shutdown Options drop-down list box, select
Shutdown; verify that in the System Cleanup Action drop-down list box Enter System Out-Of-Box
Experience (OOBE) is selected; and then click OK.
5. After LON-SYSPREP is turned off, in Hyper-V Manager right-click on LON-SYSPREP, and then click
Export; in the Location text box, type C:\Exported; and then click Export.
6. In File Explorer, navigate to the C:\Exported\LON-SYSPREP\Virtual Hard Disks folder, and point
out that it contains two .vhd files. Explain that these are parent and differencing disks and that they
contain the generalized Windows Server 2016 installation.
7. Explain that you can merge the differencing disk with its parent, such as when using the Edit Disk
option in Hyper-V Manager, and then copy the merged .vhd file to the Library.
8. In Hyper-V Manager, in the details pane, double-click LON-SYSPREP, click the Action menu, and
then click Start. While the VM is starting, explain that Sysprep has removed its identity and, as a
result, you can use it for deploying many VMs. Emphasize that the settings that Sysprep has removed,
including many additional settings, can be provided by VMM and/or an answer file.
11. On the Customize settings page, in the Password and Reenter password text boxes, type
Pa55w.rd, and then click Finish.
12. Sign in to LON-SYSPREP as user Administrator by using the password Pa55w.rd. Emphasize that
the VM was deployed considerably faster than if you were to install Windows Server 2016 from the
installation media.
5-10 Implementing a Software-Defined DataCenter
Lesson 3
Working with profiles
Contents:
Question and Answers 11
Resources 13
Demonstration: Creating a hardware profile and guest OS profile 13
Configure and manage the Virtual Machine Manager library and library objects 5-11
Answer: As its name suggests, you would use a physical computer profile when you need to
deploy a physical computer; for example, a Hyper-V cluster or a scale-out file server. Even when
you are deploying physical computers by using VMM, virtual hard disks are still required, as they
are deployed to physical computers, on which the boot from a virtual hard disk feature is used.
Answer: Hardware profiles can be used as templates for hardware configuration of VMs. They
enable you to perform rapid VM deployment with consistent hardware configuration.
Question: Is a hardware profile stored on the VMM library share or in the VMM database?
Answer: A hardware profile is one of the resource types that is stored in the VMM database.
Answer: The guest OS profile contains configuration settings for operating system setup and
other settings that provide a consistent operating system environment.
Question: Can you modify settings of the operating system that runs in a VM by modifying the guest OS
profile?
Answer: You can use Guest OS profile settings when you deploy a new VM. After the VM is
deployed, modifications of the guest OS profile have no effect on the operating system that runs
in the VM. Modifications of the guest OS profile has an effect only on the operating system of the
VMs that are deployed after you perform the modification.
Answer: It depends. If the VM was deployed as a standalone VM and not as part of the service,
the SQL Server profile will not be applied, although the VM was deployed based on the VM
template. If the VM was deployed as part of the service, the SQL Server profile will apply to it.
Question: You have a virtual hard disk that contains a generalized installation of Windows Server 2016
and three instances of SQL Server 2016. How many SQL Server profiles do you need to configure all three
SQL Server instances?
Answer: You can use the SQL Server profile to configure multiple instances of the SQL Server on
the same VM. In each scenario, you need a single SQL Server profile that must include the
configuration settings for three deployments of SQL Server.
Answer: In a standard installation of the SQL Server, all server binaries are copied, and the SQL
Server is configured so that you can immediately start using the server. Be aware that an SQL
Server, similar to a Windows operating system, has several unique settings that should not be
used by other servers on the network. When you are preparing SQL Server to be deployed as part
of a service, only SQL Server binaries are copied, but SQL Server is not configured. SQL Server
5-12 Implementing a Software-Defined DataCenter
receives its unique configuration during service deployment from the SQL Server profile or from
the SQL Server configuration file.
Question: Do you need to run sysprep.exe to prepare the SQL Server to be deployed as part of a service?
Answer: You must prepare the SQL Server for deployment differently than you would when
generalizing the Windows operating system. While you generalize Windows by running
sysprep.exe, which removes some of the Windows settings, you prepare SQL Server by selecting
the image preparation of a stand-alone instance of the SQL Server setup option.
Answer: Web applications are one of the application types that can be deployed by using the
application profile. You can add and deploy web application to the application profile only if it is
stored in the VMM library.
Question: How can you ensure that only the first VM in the service will have additional files? Those files
are not available in a generalized virtual hard disk that is used for deploying VMs in a service.
Answer: You can achieve this goal by creating an application package, specify the script that will
copy additional files, and specify that the script should be triggered only when the first VM in the
service is created.
Question: Which library object must you create before you can create the VM shielding data library
object?
Answer: You can create the VM shielding data library object independently from other objects in
the library. This means that you can create the VM shielding data library object whether or not
there is any other object in the library.
Answer: A capability profile does not specify configuration; it specifies a range for each resource
that can be included in a VM. Capability profiles can be added to private clouds to control if VMs
and services that you want to deploy to the cloud meet the limitations of a capability profile.
Hardware profiles and hardware configuration in a VM template can be validated against a
capability profile to verify if a VM with such a hardware configuration could be deployed to the
cloud.
Configure and manage the Virtual Machine Manager library and library objects 5-13
Resources
Additional Reading: For more information, refer to Install SQL Server 2016 using Sysprep:
https://aka.ms/yztb7a
2. In the New Hardware Profile window, on the General tab, in the Name text box, type HW Profile1.
Point out that you can create Generation 1 and Generation 2 profiles, and then click Hardware
Profile tab.
3. On the Hardware Profile tab, click Processor, and then, in Number of processors text box, type 2.
Point out the check box in the details pane, and explain when it can be beneficial.
4. Click Memory, and then set the Virtual machine memory to 2 GB.
5. Below Bus Configuration, click Virtual DVD drive, click Remove, and then click Yes.
6. Below Network Adapters, click Network Adapter 1, and explain the available options in details
pane.
7. In the Advanced section, click Availability, select the Make this virtual machine highly available
check box, explain the effect of this setting, and then click OK to create the hardware profile.
8. In the VMM console, in the Library workspace, right-click Guest OS Profiles, and then select Create
Guest OS Profile.
9. In the New Guest OS Profile window, on the General tab, in Name text box, type Guest OS
Profile1, explain the options in Compatibility drop-down list box, and then click the Guest OS
Profile tab.
10. On the Guest OS Profile tab, in Operating system drop-down list box, select Windows Server
2016 Datacenter.
11. Click Identity Information, and explain why you must use wildcards when specifying identity
information. In the Computer name box, type LON-FS## and point out that ## are replaced with
two digits during VM deployment.
12. Click Admin Password, select the Specify the password of the local administrator account radio
button, and then, in the Password and Confirm text boxes, type Pa55w.rd.
13. Below Roles and Features, click Roles, point out the available roles, and then select the DNS Server
check box.
14. Below Roles and Features, click Features, and then point out the available features.
15. Below Networking, click Domain/Workgroup. In the details pane, select the Domain radio button,
and then, in the Domain text box, type adatum.com.
16. Click the Select the Run As account to use for joining the domain radio button, click Browse, click
the DomainAdmin Run As account, and then click OK. Explain why it is better to use a Run As
account than to specify credentials for joining the domain.
5-14 Implementing a Software-Defined DataCenter
17. Below Scripts, point out the Answer File and [GUIRunOnce] Commands sections, explain why they
can be used, and then click OK to create a guest OS profile.
18. In the VMM console, point out that Guest OS Profile1 is listed in the details pane.
Configure and manage the Virtual Machine Manager library and library objects 5-15
Lesson 4
Working with VM templates
Contents:
Question and Answers 16
Resources 17
Demonstration: Creating a VM template 17
5-16 Implementing a Software-Defined DataCenter
Answer: The VM template is one of the resource types that is stored in the VMM database. VM
templates are not stored as files on library shares.
Question: How can you transfer a VM template between the VMM management server that manages the
demonstration environment and the VMM management server that manages the production
environment?
Answer: Because the VM template is stored in a VMM database, you cannot simply copy it as a
file between VMM library servers that are used by VMM deployments. You must first export the
VM template into a .xml file, transfer the. xml file to another library server, and then import it into
VMM.
Overview of VM templates
Question: Does every VM template include an OS configuration, an application configuration, and an SQL
Server configuration?
Answer: Although the VM template can include the above-mentioned configurations, including
them in the VM template is not mandatory. When you create a new VM template, you can select
that the guest OS profile is not required, which is the default configuration, in which case the VM
profile will not include an OS configuration, an application configuration, or an SQL Server
configuration.
Question: Do you need to manually configure all the settings in the VM profile?
Answer: It depends. If the VMM library includes hardware profiles, guest OS profiles, application
profiles and SQL Server profiles, you can import settings from those profiles in to the VM
template, and you do not need to configure them manually.
Question: Can you create a VM template for a Generation 2 VM if you use a VM template for a
Generation 1 VM as the source?
Answer: No. You can select the Generation of VM if you are creating a new VM template that is
based on the virtual hard disk. If the VM template is based on an existing VM template, then it
must be for the same VM Generation as the source. In this situation, the source VM template is
for deploying Generation 2 VMs; a new VM template can also be used for deploying Generation
2 VMs only.
Shielded VM template
Question: How is a template for deploying shielded VMs different from a VM template for deploying
standard, non-shielded VMs?
Answer: A template for deploying standard, nonshielded VMs can be used for deploying
Generation 1 or Generation 2 VMs, references a standard virtual hard disk in .vhd or .vhdx format,
and includes all configuration settings for VM deployment. A VM template for deploying shielded
VMs can deploy only a Generation 2 VM, it references an encrypted and signed virtual hard disk
Configure and manage the Virtual Machine Manager library and library objects 5-17
in .vhdx format, and it does not include all configuration settings, as sensitive information is
stored in the encrypted VM shielding data file.
Question: Can you deploy and run standard, nonshielded VMs to guarded fabric?
Answer: Yes, guarded fabric can run standard, nonshielded VMs, and encrypted VMs that are not
shielded and shielded VMs.
Answer: You can verify if a hardware profile is referenced and used by any other VMM objects by
opening its property page and checking if any VMM object is listed on the dependency tab.
Question: Can you remove a hardware profile and a guest OS profile from the library if they will not be
used in the future but were used for deploying several VMs in the last year?
Answer: Before removing any resource from the library, you should first verify that it is not
referenced and used by other objects. If there is no dependency and the resource will not be
used in the future, you can remove it from the library. Hardware profiles and guest OS profiles
are not linked to VMs that were deployed by using them. Removing the hardware profile of a
guest OS profile has no effect on the existing VMs.
Resources
Shielded VM template
Additional Reading: For more information, refer to the Guarded Fabric Deployment Guide
for Windows Server 2016: https://aka.ms/b1rcvc
3. On the Identity page, in the VM Template name text box, type VM Template1. Point out that you
can specify a Generation 1 or Generation 2 VM, and explain how this selection has an effect on
available hardware components, and then click Next.
4. On the Configure Hardware page, in the Hardware Profile drop-down list box, select HW Profile1.
Point out the hardware configuration that is inherited from the selected profile, and then click Next.
5. On the Configure Operating System page, in the Guest OS profile drop-down list box, select
Guest OS Profile1. Point out settings that are inherited from the selected profile. Emphasize that you
can modify the settings, and then click Next.
6. On the Application Configuration page, point out available options, mention that they are applied
only if a VM is deployed as part of the service, and then click Next.
5-18 Implementing a Software-Defined DataCenter
7. On the SQL Server configuration page explain when you would use this setting, emphasize that SQL
Server should already be included in the image, mention that these settings are applied only if a VM
is deployed as part of the service, and then click Next.
8. On the Summary page, click View Script, and explain how scripts can be used to automate object
creation.
9. In Notepad, click File, and then click Save As. In the Save as type drop-down list box, select All files
(*.*). iIn the File name text box, type \\LON-SVR3\VMMLibrary\Scripts\VMTemplate1.ps1, click
Save, and then close Notepad.
10. On the Summary page, click Create, and then close the Jobs window after the VM template is
created.
11. In the VMM console, in details pane, right-click on VM Template1, and then click Properties.
12. Show and discuss the settings on the General, Hardware Configuration and OS Configuration tabs,
and point out that you configured those settings in HW Profile1 and the Guest OS Profile1 profiles.
13. Click on the Settings tab and, in the Quota Points text box, enter 3. Explain when and why quota
points are used.
14. Show the information on the Dependencies tab and Access tabs, and then click OK.
Configure and manage the Virtual Machine Manager library and library objects 5-19
Answer: The VMM library is a repository that contains file-based resources, such as answer files,
.iso images, and virtual hard disks, that are stored on library servers. The VMM library also
provides access to VM templates, guest OS profiles, and hardware profiles that are stored in the
VMM database.
Question: Do you need to have a hardware profile and a guest OS profile in a the VMM library to create
a VM template?
Answer: No. You can use a hardware profile and a guest OS profile as a source for the hardware
configuration and operating system configuration that is specified in the VM template. But if you
do not have those profiles or you want the settings in VM template to be considerably different
than those that are specified in the hardware profile and the guest OS profile, you can specify
those settings in the VM template, without referencing or inheriting them from the profiles.
Question: Can you use an application profile and an SQL Server profile when deploying an individual
VM?
Answer: You can configure an application configuration and an SQL Server configuration in a
VM template. But those settings are applied only if the VM is deployed as part of the service. If
you deploy an individual VM, then those settings do not apply.
When managing synchronization between library servers in VMM, it is important that the folder structure
between library servers is kept in sync. This is especially important when managing empty folders that
tenants might use to store VMs. When synchronizing content between library servers, some file copying
utilities might skip folders if they are empty. This might result in tenants being unable to store VMs in the
library.
5-20 Implementing a Software-Defined DataCenter
Answer: A guest OS profile provides a configuration that is used when deploying VMs. If you do
not use wildcards such as # or *, the operating system name in all VMs that are deployed by
using the guest OS profile are the same. As you typically want to use a different name for each
VM operating system, you use wildcards for identity information.
Question: Why would you associate a library server with the host group?
Answer: If you have multiple locations, you want the resources from the local VMM library to be
used. When you associate a library server with the host group, the VMM management server will
primarily use resources from that library server when deploying VMs to virtualization hosts that
are in the associated host group.
Managing the networking fabric 6-1
Module 6
Managing the networking fabric
Contents:
Lesson 1: Networking concepts in VMM 2
Lesson 1
Networking concepts in VMM
Contents:
Question and Answers 3
Resources 3
Managing the networking fabric 6-3
( ) True
( ) False
Answer:
(√) True
( ) False
Feedback:
Resources
Lesson 2
Managing Software Defined Networking
Contents:
Question and Answers 5
Resources 5
Managing the networking fabric 6-5
Answer: When defining a logical switch, you should consider including virtual ports in its
settings. This involves adding one or more port classifications, which you should map to one or
more virtual port profiles. Port classifications are descriptive labels, which tenant admins can
select when deploying their VMs. You, as a fabric admin, can control specifically what that label
represents by managing the virtual port profiles that the port classifications map to.
Virtual port profiles allow you to control such settings as:
• Offload settings:
• Security settings:
o MAC spoofing
o DHCP guard
o Router guard
o Guest teaming
o Institute of Electrical and Electronic Engineers (IEEE) priority tagging
o Guest-specified IP addresses (used in HNV to allow tenants to create guest clusters)
• Bandwidth settings:
Resources
Additional Reading: You can install virtual switch extension managers and network
managers in your VMM environment. For details regarding this procedure, refer to:
https://aka.ms/onj11y
6-6 Implementing a Software-Defined DataCenter
Lesson 3
Understanding network function virtualization
Contents:
Question and Answers 7
Resources 7
Managing the networking fabric 6-7
Answer: Yes. This is one of the benefits of the HNV. VMs on different virtual networks can have
overlapping IP addresses. They can communicate with other VMs on the same virtual network.
Resources
Additional Reading: For more information about planning an SDN infrastructure, refer to:
https://aka.ms/phopj1
Additional Reading: For the steps involved in configuring Access Control Lists for
Datacenter Firewall on per virtual subnet level, refer to; https://aka.ms/qu709y. For the steps
involved in configuring Access Control Lists for Datacenter Firewall on per virtual network
interface level, refer to https://aka.ms/yw5z0u.
6-8 Implementing a Software-Defined DataCenter
• After you deploy Network Controller, modify its logging configuration. By default, logs are stored in
the %systemdrive%\SDNDiagnostics folder. We recommend that you change the log location to a
remote file share. To accomplish this, run the Set-NetworkControllerDiagnostic cmdlet, and use the
DiagnosticLocation parameter to specify the target folder.
Review Question
Question: Where does Software Defined Networking (SDN) fit into your organization’s plans?
Answer: The answers might vary, but, in general, enterprises should be looking to move toward a
Software Defined Networking (SDN) infrastructure because it allows for rapid changes to the
ever-increasing IT demands of business. By using SDN, enterprises can create new environments
and dismantle them as required, without the need for lengthy change impact analyses.
Tools
The diagnostic tools that are available in HNV based on Windows Server 2016 belong to the RSAT-
NetworkController server feature. As stated earlier in the “Common Issues and Troubleshooting Tips”
section, you need to install this feature and import the NetworkControllerDiagnostics and
hnvdiagnostics Windows PowerShell modules to make the tools described here available. The tools are
implemented as Windows PowerShell cmdlets or scripts.
You can use the following tools to perform diagnostics related to Network Controller:
• Debug-NetworkControllerConfigurationState. You can run this script from the VMM server or
from any server that is able to communicate with the REST IP address of Network Controller and that
has the private key of the Network Controller REST certificate installed in its personal certificate store.
The script returns a list of tenant and fabric resources in a failure or warning configuration state.
• Debug-SlbConfigState. You can run this script from any Network Controller node. Its purpose is to
diagnose the Network Controller SLB Manager functionality. It stores the results of this diagnosis in
the C:\Tools\SlbConfigState.txt file and includes such information as the state of the SLBM MUX
instances, the BGP peering status, advertised routes, and a list of VIPs.
• Debug-WinFabNodeStatus. You can run this script from any Network Controller node. Its purpose is
to diagnose the replication status and health state of all the Network Controller nodes.
• Get-Replica. You can run this script from any Network Controller node. Its purpose is to identify the
primary nodes hosting Network Controller modules, such as SlbManagerService or SDNAPI.
• Get-ConnectivityResults.ps1. You can run this script from any Network Controller node. This allows
you to collect the results of running the following scripts:
o Test-VNetPing.ps1. This script tests the connectivity between two CA IP addresses.
• Get-PACAMapping. You can run this script from any Hyper-V host that is connected to the HNV
provider logical network. The script displays a table containing a list of VMs on the local host,
including their CAs, PAs, VSIDs, and MAC addresses.
• Get-CustomerRoute. You can run this script from any Hyper-V host that is connected to the HNV
provider logical network. The script displays a table containing the CA routing information. Each table
row contains an RDID with its corresponding VSID, CA IP address prefix, and CA IP address next hop,
which represents the default gateway associated with the HNV distributed router.
• Test-LogicalNetworkConnection. You can run this script from any Hyper-V host that is connected
to the HNV provider logical network. The script tests the connectivity to the PA IP address of a
remote Hyper-V host that you specify.
You cannot deploy a VM on a specific VM Check that the uplink port profile includes the
network to a VM host. required logical network site.
You cannot deploy a VM with the chosen port Ensure that the logical switch has the required port
classification. classification included in its definition.
You are unable to create a VM in an HNV Ensure that a sufficient number of IP addresses exists
network. in the IP address pool of the HNV provider logical
network.
No network connectivity exists between two Verify that Windows Firewall is not blocking the
Windows Server tenant VMs on the same network traffic.
virtual network. Ensure that each VM has an IP address within the
tenant’s virtual network IP address space.
On both VMs, run Test-VNetPing.sp1 to perform
the connectivity test. Use the Get-
NCVirtualNetwork cmdlet to identify the virtual
network resource ID corresponding to the tenant’s
virtual network.
Verify that no distributed firewall policies are in
place that apply to the virtual network adapters of
the VMs or the virtual subnets where the VMs reside.
Run the Debug-
NetworkControllerConfigurationScript cmdlet to
identify resources that return error codes. Use the
error codes to determine recovery actions based on
the information provided at https://aka.ms/dxv9rb.
If the two VMs do not reside on the same physical
computer, check the connectivity between their
respective Hyper-V hosts. To accomplish this, start
by running the Get-ProviderAddress cmdlet on
both hosts to identify their respective PA IP
addresses. Use the Get-NCLogicalNetwork cmdlet
to determine the resource ID of the HNV provider
logical network connecting the two hosts.
Verify that the physical switches on the physical
network carrying the encapsulated packets support
6-10 Implementing a Software-Defined DataCenter
No connectivity exists to tenant VMs via SLB. Verify that SLB Manager on Network Controller is
operational.
Check the connectivity among the SLB infrastructure
components, including SLB Manager, the SLB
Manager MUX instances, and the SLB host agents.
Run the Debug-SlbConfigState cmdlet on Network
Controller.
Use Windows Performance Monitor to track the SDN
SLBM counters, including:
• SLBM LEEngine Configurations Total.
Make sure that its value is greater than zero.
• VIP Endpoints Total. Make sure that its
value is greater than or equal to 2.
• HP Clients connected. Make sure that its
value is equal to the number of Hyper-V
hosts.
• Muxes Connected and Muxes reporting
healthy. Make sure that these values are
equal to the number of MUX instances.
Ensure that routers are able to exchange routes with
SLB MUXs by using BGP peering. Reference the
vendor’s documentation for details regarding this
procedure.
Verify that the VIPs assigned to SLB Manager and
the tenant-facing VIPs are within the SLB VIP ranges
you defined.
Network Controller cannot communicate with Verify basic IP connectivity over the management
Hyper-V hosts. logical network by using the Test-NetConnection
cmdlet.
Identify the configuration state of Network
Controller by running the Debug-
NetworkControllerConfigurationState cmdlet.
Test the connectivity from the Hyper-V hosts to the
REST IP address of Network Controller over port
Managing the networking fabric 6-11
Answer: No. Network Controller must be able to connect to the VMM infrastructure, including
the Hyper V hosts that will host tenant VMs. It does not require direct connectivity to the VMs.
Question: How can you customize the deployment of Network Controller in the VMM environment?
Answer: You can modify the .xml file that serves as the basis of the VMM service template. This is
the approach included in the lab to account for the resource limitations of the lab environment.
Question: How can you control which port classifications will be available when provisioning a tenant VM
to a VM network?
Answer: You can control which port classifications will be available during the provisioning a
tenant VM by deploying a logical switch to the Hyper V hosts where the tenant VMs will reside.
As part of defining the logical switch, you can specify port classifications along with the
corresponding virtual ports.
Creating and managing virtual machines by using Virtual Machine Manager 7-1
Module 7
Creating and managing virtual machines by using Virtual
Machine Manager
Contents:
Lesson 1: Virtual machine management tasks 2
Lesson 2: Creating, cloning, and converting virtual machines 9
Lesson 1
Virtual machine management tasks
Contents:
Question and Answers 3
Demonstration: Operating virtual machines 4
Demonstration: Migrating storage and virtual machines 6
Demonstration: Working with checkpoints 7
Creating and managing virtual machines by using Virtual Machine Manager 7-3
Items
1 Start
4 Pause
7 Store in library
Virtual machine ribbon Virtual machine settings in the Virtual machine properties
tasks in the VMM console Hyper-V console in the VMM console
Answer:
1. On LON-HOST1, on the desktop, double-click the Virtual Machine Manager Console icon.
2. On the Connect to Server page, ensure lon-vmm.adatum.com:8100 is in the Server name text
box, and then click Connect.
3. In the Virtual Machine Manager console, in the Fabric workspace, and in the console tree click the
All Hosts folder.
6. In the Hardware pane, scroll to the Network adapters section, and then click the network adapter
corresponding to Microsoft Hyper-V Network Adapter – Ethernet.
7. On the Network adapter details page, ensure that both the Used by management and Available
for placement check boxes are selected.
8. Expand Microsoft Hyper-V Network Adapter – Ethernet and then click Logical network.
9. In the Logical network connectivity pane, select the Management check box.
13. In the Details pane, right-click lon-svr2.adatum.com, and then click Properties
14. In the lon-svr2.adatum.com properties window, click Hardware.
15. In the Hardware pane, scroll to the Network adapters section, and then click the network adapter
corresponding to Microsoft Hyper-V Network Adapter – Ethernet.
16. On the Network adapter details page, ensure that both the Used by management and Available
for placement check boxes are selected.
17. Expand Microsoft Hyper-V Network Adapter – Ethernet, and then click Logical network.
18. In the Logical network connectivity pane, select the Management check box.
4. In the VMs and Services console tree, expand All Hosts, expand London Hosts 1, and then click
LON-SVR1.
5. In the virtual machines details pane, click LON-TEST1. Explain that clicking the virtual machine in the
VM’s details pane opens the Virtual Machine tab in the ribbon. Explain that an alternative way to
accomplish this is to click the Virtual Machine tab directly.
Creating and managing virtual machines by using Virtual Machine Manager 7-5
6. Show the options available in the ribbon on LON-TEST1. Because the virtual machine is not running,
many icons will be grayed out.
9. In the ribbon, click the Connect or View icon, and in the drop-down list box, click Connect via
Console.
10. In the Virtual Machine Viewer – LON-TEST1, on server LON-SVR1.adatum.com, window, in the
command window, type the following command, and then press Enter:
ipconfig /all
12. In the VMM console, in the ribbon, click the Pause button.
15. Switch to the Virtual Machine Viewer for LON-TEST1, which is the single server icon on the taskbar.
Point out that the virtual machine is grayed out, and cannot be accessed.
17. In the VMM console, verify that LON-TEST1 is still selected, and then in the ribbon, click the Resume
icon.
18. Return to the Virtual Machine Viewer, and note that the virtual machine is accessible now (is no
longer grayed out).
19. On the top bar of the Virtual Machine Viewer, click File, and then click Exit.
20. In the ribbon, click the Manage Checkpoints icon. Explain to the students that you will discuss more
about checkpoints in a later topic.
21. In LON-TEST1 Properties, in the console tree, beginning with the General tab, go through each tab
and provide students with a broad overview of what actions they can take on that tab.
23. Point out to students that the Delete icon in the ribbon is grayed out, as it is still running and has yet
not been shut down. Explain that selecting Delete removes the virtual machine from both the
console and the host, and it deletes the virtual machine’s virtual hard disk (or disks) and files.
24. As time permits, click any additional icons in the ribbon and describe their functionality.
25. Explain that in the ribbon, students can click the Shutdown icon to turn off a virtual machine that is
running a full operating system. Mention that this is the proper way to turn off a virtual machine that
is running a full operating system. For the purpose of this demonstration, even though LON-TEST1 is
running Windows PE, click Shutdown. A pop-up window appears explaining that any connected
users will lose service. In the pop-up window, click Yes. The shutdown attempt will fail. Because LON-
TEST1 is running Windows PE, it does not have the Integration Services installed, and it cannot
process the shutdown operation from the VMM console. Click the Power Off button on the Virtual
Machine tab in the VMs and Services workspace. In the popup window, click Yes.
26. After LON-TEST1 stops, in the ribbon, click the Create icon.
7-6 Implementing a Software-Defined DataCenter
27. Explain to students that in this case you cannot make a virtual machine template from LON-TEST1, as
it is running only the Windows Preinstallation Environment (Windows PE).
28. In the ribbon, click the Home tab, and then click the Create Virtual Machine icon.
29. Explain to students how you can make a new virtual machine from here. Tell them that you will
explain the process for creating virtual machines, cloning, and templates functionality in a later topic.
6. On the Choose Move Type page, select the Move the virtual machine’s storage option, and then
click Next.
7. On the Choose Options for Moving Storage page, select the Move only the virtual machine’s
virtual hard disks option, and then click Next.
8. On the Select Items to Move page, confirm that disk LON-MOVE1.vhdx is selected, and then click
Next.
9. On the Choose a new location for attached virtual hard disk page, in the Folder text box, type
\\LON-SVR3\Share\LON-MOVE1, and then click Next.
12. In Settings for LON-MOVE1, under IDE Controller 0, click Hard Drive, and confirm that LON-
MOVE1.vhdx is stored on a network share. Click OK.
13. On LON-HOST1, in Hyper-V Manager, right-click LON-MOVE2, and then click Settings.
14. In Settings for LON-MOVE2, under IDE Controller 0, click Hard Drive. Confirm that the hard drive
is using the LON-MOVE2.vhdx virtual hard disk, and that the virtual hard disk is stored locally.
15. Click Checkpoints. Confirm that checkpoints are stored locally, and then click OK.
17. Confirm that storage was moved successfully by running the following cmdlet:
Note: The DestinationStoragePath property does not report data, so the following
actions need to be completed to see if LON-MOVE2.vhdx moved.
Creating and managing virtual machines by using Virtual Machine Manager 7-7
19. In Settings for LON-MOVE2, under IDE Controller 0, click Hard Drive. Confirm that LON-
MOVE2.vhd is now stored on a network share. Explain that the virtual hard disk was moved while
virtual machine was running, and then click OK.
2. In the Hyper-V manager console, in the details pane, right-click LON-TEST1, and then click
Settings.
3. In the Settings for LON-TEST1 on LON-SVR1 window, point out the IDE Controller 0, and note the
virtual hard disk is LON-TEST1.vhd.
4. While still in Settings, in the Management section of the console tree, click Checkpoints.
5. In the details pane, note that the checkpoint type selected is Production checkpoints. Explain to the
class that this is the default setting in Windows Server 2016, but you can change it here by selecting
Standard checkpoints. Go over the other items in the window, explaining how you can turn off
checkpoints entirely, or change the location in the file system where the production checkpoints are
kept. Click Cancel when finished explaining.
8. In the VMM console, in the workspace area, in the lower-left corner, click VMs and Services.
9. In the VMs and Services console tree, expand All Hosts, expand London Hosts 1, and then click
LON-SVR1.
10. In the virtual machines details pane, click LON-TEST1, and in the ribbon, click the Power On icon.
11. In the ribbon, with LON-TEST1 still selected, click Create Checkpoint.
12. In the New Checkpoint pop-up dialog box, in the Description text box, type Demonstration of a
running system's checkpoint, and then click Create.
13. In the lower-left corner of the VMM console, click the Jobs workspace.
14. Explain to the students that in the Jobs workspace, they can see when a checkpoint is created. They
can watch the job in real time by clicking the Running node. If the checkpoint is finished, the
Running node will be empty. Point out selecting the History node which displays whether the
checkpoint succeeded or failed. If a failure occurred, they can see what caused it, and ways to
troubleshoot or correct that failure.
15. In the Workspace area, in the lower-left corner, click VMs and Services.
16. In VMs and Services, in the London Hosts 2 host group, click the LON-SVR2 virtual machine.
20. In the New Checkpoint pop-up dialog box, in the Description text box, type Demonstration of a
stopped system's checkpoint, and then click Create. Point out that you can also check the Jobs
workspace for the job status.
4. Right-click the LON-TEST1 virtual machine, and then click Settings. Observe the IDE controller 0
object and note that the virtual hard disk now contains a differencing drive, with a name similar to
this: LON-TEST1_F515D360-79C6-4948-8579-85063A8643FB.avhd.
Change checkpoint to Standard, create a checkpoint, and observer files created
1. In the Settings for LON-TEST1 on LON-SVR1 window, in the Management section of the console
tree, click Checkpoints.
2. In the details pane, select Standard checkpoints, and then click OK.
3. Return to LON-HOST1, and in the VMM console, in the VMs and Services console tree, expand All
Hosts, expand London Hosts 1, and then click LON-SVR1.
4. In the virtual machines details pane, click LON-TEST1, and in the ribbon, click Manage Checkpoints.
5. With the Demonstrate a running system’s checkpoint object created earlier selected, click the
Delete button, and then click Yes in the Virtual Machine Manager window, and then click OK.
6. Wait for the Job Status to show Completed, and then in the ribbon, click Create Checkpoint.
7. In the Description text box, type Demonstration of a Standard running checkpoint, and then click
Create.
8. On LON-HOST1, leave the VMM console, open for the next demonstration.
Creating and managing virtual machines by using Virtual Machine Manager 7-9
Lesson 2
Creating, cloning, and converting virtual machines
Contents:
Question and Answers 11
Resources 11
Demonstration: Creating and placing a new virtual machine 11
Demonstration: Performing virtual machine cloning 13
7-10 Implementing a Software-Defined DataCenter
( ) A service template
( ) A Citrix XenServer
Answer:
Feedback:
Answers 1, 3 and 4 are correct. You can deploy the new virtual machine from an existing .vhd or
.vhdx file (blank or preconfigured), a virtual machine template, or a service template. You
cannot create a virtual machine via P2V in VMM 2016. VMM 2016 no longer supports Citrix
XenServer.
Resources
2. In the VMs and Services console tree, expand All Hosts, expand London Host Group, and then
click LON-HOST1.
4. In the Create Virtual Machine drop-down list box, click Create Virtual Machine.
5. In the Create Virtual Machine Wizard, on the Select Source page, click Create the new virtual
machine with a blank virtual hard disk, and then click Next.
Note: Explain to the class that if you chose the option to use an existing virtual machine,
virtual machine template, or virtual hard disk, then those items would have to exist already.
However, in this demonstration, you are going to make a new virtual machine.
Creating and managing virtual machines by using Virtual Machine Manager 7-11
Tell the students that four blank virtual hard disks pre-exist, created by VMM: a large and small
blank.vhd, and a large and small blank.vhdx.
6. On the Identity page, in the Virtual machine name text box, type Win2016test.
7. In the Description text box, type Test of create virtual machine functionality, and then click Next.
8. On the Configure Hardware page, explain the various options to the students, configure Memory to
be 512 MB, and then click Next.
10. Explain to the students that the option to Deploy the virtual machine to a private cloud is grayed
out, because you have not yet set up private cloud functionality.
11. Point out the bottom option. Explain that if you did not want to start the virtual machine
immediately, you could store it in the library for later use. In this case, the virtual machine is not
assigned to a host. If you wish to start the virtual machine at a future date, you would need to assign
it at that time to a host or cloud. Because you are placing the virtual machine on a host, you will
accept the default Place the virtual machine on a host option.
12. In the Place the virtual machine on a host drop-down list box, click Destination: All Hosts, and
then click Next.
13. On the Select Host page, give VMM a moment to rate the hosts.
14. Point out the graphical star Rating column. The intelligent placement functionality of VMM considers
various factors such as performance, space, and number of virtual machines on each host, to
determine the rating. The stars are colored to show how one host compares to another.
16. Point out to students that on the Configure Settings page you can select the virtual machine path—
that is, the location on the host hard drive where you want the virtual machine files to reside. Explain
to students that you can have multiple paths, and you can pre-populate them so they appear in the
drop-down list box. You can also use the Browse button to browse to any location in which you want
to store the virtual machine files. Accept the defaults on this page, and then click Next.
17. Point out that on the Select Networks page, you can assign your network adapter to a virtual
machine network, virtual switch, port classification, and virtual local area network (VLAN). Explain that
you did not do so at this point because you can address it later. After explaining the settings on this
page, click Next.
18. Discuss the fact that on the Add Properties page, you can specify the behavior that you want the
virtual machine to take when the host machine starts or stops. You can also specify the operating
system that you can install on the virtual machine. The Operating system drop-down list box is
preconfigured by VMM. It includes all Windows operating systems going back to Windows XP, and
many Linux operating systems. Explain that if the operating system choice you are looking for is not
available, you should select the Other category. Note, however, that operating systems not on this list
might not work correctly due to a lack of integration services. After explaining the settings on this
page, click Next.
19. On the Summary page, in the Confirm the settings section, click the View Script button.
20. Show students that this opens Notepad and displays the Windows PowerShell script that is used to
create the virtual machine, and cmdlets and parameters for all the options that you have chosen. Save
the script for documentation purposes, or to recreate the virtual machine again later. You can also
save the script, and by altering a few parameters, use it for a different virtual machine.
21. In Notepad, on the File menu, click Save As.
7-12 Implementing a Software-Defined DataCenter
22. In the Save As pop-up window, name the file CreateDemoVM.ps1, and save it in the Documents
library.
23. In the Save as type: drop-down list box, click All Files (*.), and then click Save.
26. Explain that that if you added the .iso image in the virtual DVD in the Configure Hardware page,
you can have the virtual machine begin to install the operating system as soon as it is created. For the
purposes of this demonstration, you will not do so.
27. Click the Create button. Point out that a job starts, with multiple steps to create the virtual machine,
and a Jobs pop-up window will display.
28. When the last job completes, close the Jobs pop-up window.
29. In the VMM console, in the console tree, under VMs and Services, under All Hosts, and under
London Host Group, click LON-HOST1.
31. Leave the VMM console running for the next demonstration.
2. In the VMs and Services console tree, expand All Hosts, expand London Hosts 2, and then click
LON-SVR2.
3. In the VMs detail pane, click LON-PROD2, and then ensure that the Virtual Machine tab also is
selected.
4. In the ribbon, in the Create drop-down list box, click Clone.
5. In the Create Virtual Machine Wizard, point out to the students that the wizard does not have as
many nodes in its console tree as the wizard that you would use to create a new virtual machine.
6. On the Identity page, point out how you can add a virtual machine name that identifies the virtual
machine to VMM. The name does not have to match the computer name of the virtual machine.
However, using the same name ensures consistent displays in System Center 2016 Operations
Manager.
7. In the Description window, type Clone of the LON-PROD2 virtual machine, and then click Next.
8. Point out that similar to previous versions, the Configure Hardware page has a considerable amount
of options. However, at this time these options are grayed out because they are set from the Default
profile. Explain to the students that they still can change the hardware profile in the drop-down list
box, if any other profiles aside from the Default profile exist. Then click Next.
9. On the Select Destination page, note that you can deploy the cloned virtual machine to a cloud or
host, or you can store it in a library. In this case, you will place it on a host, which is the default
setting.
10. In the Destination drop-down list box, select London Host Group, and then click Next.
11. On the Select Host page, explain how VMM rates the hosts. Select LON-SVR1, and then click Next.
Creating and managing virtual machines by using Virtual Machine Manager 7-13
Note: If any of the host Hyper-V servers, (LON-SVR1, LON-SVR2 or LON-HOST1) fail to
appear in the Select Host page, click All Hosts at the top right dropdown list. This should
refresh the list.
12. Point out to students that because you are making copies of the virtual hard disk and configuration
files, it is best to deploy these copies in a different directory. VMM will choose this directory. In this
demonstration, the wizard opts to put the copies in the default location. However, depending on your
setup, your selection might differ. For this demonstration, accept the VMM selection on the Select
Path page, and then click Next.
13. On the Select Networks page, point out that you can select options that are similar to the options
that were available when you created a new virtual machine. Then click Next.
14. On the Add Properties page, point out that you can set the actions to take when the Hyper-V host
starts, and select the operating system for the cloned virtual machine. Then click Next.
15. On the Summary page, point out the View Script button in the upper-right corner. Explain that
clicking this button will open Notepad, and will present you with Windows PowerShell cmdlets that
are the equivalents of the configurable selections you made in this wizard. Saving these scripts can
help you document your new or cloned virtual machines.
16. In addition, point out the Start the virtual machine after deploying it check box. If you are setting
the cloned virtual machine for immediate functionality, you can select this check box. In this
demonstration, we will not start the virtual machine.
19. While you wait for the cloning job to finish, talk about some of the steps you might take to uniquely
identify the cloned virtual machine.
Note: You will see a “Completed w/Info” warning about hardware changes being ignored.
This is normal behavior, and you may proceed.
20. After the cloned virtual machine is created successfully, close the Jobs window.
21. In the VMM console, return to the VMs and Services console tree. Expand All Hosts, expand
London Hosts 1, and then click LON-SVR1.
22. Point out that the LON-PROD2 virtual machine is now visible. Point out as well that it is not running,
as we did not select that option in the Summary page. The virtual machine Status is Saved State.
23. Right-click the cloned virtual machine, and then click Delete.
24. In the confirmation window, click Yes.
25. Close the VMM console, and sign out of all virtual machines.
26. Do not revert the virtual machines. You will be using them in the next module.
7-14 Implementing a Software-Defined DataCenter
Review Question
Question: Can you add a virtual adapter or make changes to static memory on a running virtual machine
in System Center 2012 R2 Virtual Machine Manager?
Answer: No. Both actions are new features in System Center 2016 Virtual Machine Manager.
Tools
The following list are tools that you need for this module:
• Checkpoint tool. You can find this in the Hyper-V Manager console.
• Sysprep.exe. This is a part of the Windows operating system for Windows Clients and Servers. You can
find this in the Windows\System32\Sysprep directory.
When deploying a clone from the VMM library, Ensure that the destination host has been installed
the host file location cannot be found. as a host in VMM.
Creating and managing virtual machines by using Virtual Machine Manager 7-15
Answer: No. Although it broke the Virtual Machine Viewer connection, it can be instantly
reconnected.
Managing clouds in Microsoft System Center 2016 Virtual Machine Manager 8-1
Module 8
Managing clouds in Microsoft System Center 2016 Virtual
Machine Manager
Contents:
Lesson 1: Introduction to clouds 2
Lesson 2: Creating and managing a cloud 4
Lesson 1
Introduction to clouds
Contents:
Question and Answers 3
Managing clouds in Microsoft System Center 2016 Virtual Machine Manager 8-3
Answer: Answers might vary. However, the responses should cover increased elasticity, pooled
resources, and the direct offering of specific services without the requirements of traditional
datacenter structures.
Question: What is the main difference between on-premises private clouds and hosted private clouds?
How do hosted private clouds differ from hybrid clouds?
Answer: On-premises private clouds are built from components within the organization’s
datacenters. Hosted private clouds are built with components that an external provider outside
the business hosts. Hybrid clouds combine components from both an organization’s datacenter
and an external provider.
8-4 Implementing a Software-Defined DataCenter
Lesson 2
Creating and managing a cloud
Contents:
Question and Answers 5
Resources 5
Demonstration: Creating a cloud 5
Managing clouds in Microsoft System Center 2016 Virtual Machine Manager 8-5
Answer: Chargeback helps application owners to understand exactly which cloud resources they
consume and then adjust that consumption to better reflect their business needs.
Resources
Managing a cloud
4. When the Virtual Machine Manager console displays, maximize the console.
5. In the Virtual Machine Manager console, in the Fabric workspace, click the All Hosts folder.
10. Expand Microsoft Hyper-V Network Adapter – Ethernet and then click Logical network.
11. In the Logical network connectivity pane, select the Management check box.
14. In the Details pane, right-click lon-svr2.adatum.com, and then click Properties
16. In the Hardware pane, scroll to the Network adapters section, and then click the network adapter
corresponding to Microsoft Hyper-V Network Adapter – Ethernet.
17. On the Network adapter details page, ensure that both the Used by management and Available
for placement check boxes are selected.
18. Expand Microsoft Hyper-V Network Adapter – Ethernet , and then click Logical network.
19. In the Logical network connectivity pane, select the Management check box.
22. In the Workspace area, in the lower–left corner, click VMs and Services.
23. In the Virtual Machine Manager console, on the ribbon, click Create Cloud.
24. In the Create Cloud Wizard, on the General page, in the Name box, type DemoCloud. In the
Description box, type Demonstration of creating a Cloud, and then click Next.
25. On the Resources page, in the Select the resources for this cloud section, select the All Hosts
check box.
28. On the Load Balancers page, point out that the only selectable item on this page is Microsoft
Network Load Balancing (NLB). To use it, you must first create NLB IP templates.
If you wanted to use this page to configure any hardware load balancers, you must have already
installed them. However, for the purpose of this demonstration, do not select anything. Click
Next.
29. On the VIP Templates page, click Next. Ensure that you do not select a virtual IP (VIP) template.
30. Note that the Port Classifications page has many classifications that are available to use for the VMs
that you deploy from this private cloud. Select the following check boxes, and then click Next:
o Guest Dynamic IP
o High bandwidth
o Host management
o Low bandwidth
o Medium bandwidth
31. On the Storage page, in the Storage classifications area, select the Local Storage check box, and
then click Next.
32. On the Library page, mention to the students that here is where they can assign read–only shares to
the private cloud. These read-only shares are where administrators can store read–only resources
(such as .iso files) that they want to make available to self–service users. Point out that to assign the
shares, however, one or more library shares must already exist.
33. Next to the Stored VM path area, click Browse. When the Select Destination Folder dialog box
opens, it displays an expandable tree format. Point out to the students the library servers that belong
to the host group. Explain that from this page, you can choose different libraries.
34. Under LON-HOST1.adatum.com, click the Base share, and then click OK.
36. When the Capacity page displays, point out that on this page, you can view the aggregate capacity.
You can also use either all of it or assign a particular capacity for various resource dimensions used by
the cloud. Point out the following areas on this page:
37. Total Capacity. This area shows how much capacity is available.
38. Use Maximum. This area has a check box for each dimension, and each one is selected by default.
This means that by default, the total capacity of each dimension will be used for the cloud. If you
have cleared any of these check boxes in the Assigned Capacity area, you can set lower values for
them. Explore this by sequentially clearing each one to see the changes in the available assigned
capacity values. When you finish demonstrating this, be sure to reselect all of the check boxes.
Managing clouds in Microsoft System Center 2016 Virtual Machine Manager 8-7
39. For the purpose of creating the DemoCloud cloud, clear the Use Maximum check box.
40. In the Memory (GB): Assigned Capacity text box, use the spin button controls to set its value to 8.
41. In the Storage (GB): Assigned Capacity text box, use the spin button controls to set its value to
1000.
42. In the Virtual machines: Assigned Capacity text box, use the spin button controls to set its value to
3, and then click Next.
43. On the Capability Profiles page, point out the profiles (ESX Server and Hyper-V) and the
corresponding check box for each one. If you had any of these types of host servers, you would select
the corresponding check box. Point out that if you were expecting to add any other profile types in
the near future, you could add them at this time. For the purpose of this demonstration, select the
Hyper-V check box, and then click Next.
45. On the Summary page, in the upper-right corner, click View Script.
46. Open Notepad, and then review the Windows PowerShell cmdlets with the class, but do not save the
script.
47. Close Notepad.
49. In the Jobs window, when the Create new Cloud task completes, close this window.
50. In the console tree, under VMs and Services, under the Clouds node, click DemoCloud. On the
ribbon, click the Overview icon. This populates the details pane with information about the cloud.
Much of this information will have no values until you start using the cloud and adding items, such as
VMs and services, to it.
51. Close the Virtual Machine Manager console.
8-8 Implementing a Software-Defined DataCenter
Lesson 3
Creating user roles in VMM
Contents:
Question and Answers 9
Demonstration: Creating and using a user role in VMM 9
Managing clouds in Microsoft System Center 2016 Virtual Machine Manager 8-9
Answer: Most likely, some of the Development users consumed all the allocated memory when
deploying their VMs. You should consider creating member-level quotas to prevent the users
from using more memory than originally intended for their VMs. In addition, you could create a
VM template with the amount of memory per VM that you used for your estimate and restrict
the permissions of the Development users to deploy (only from a template).
2. When the LON-VMM desktop displays, on the taskbar, click the Virtual Machine Manager console
icon.
4. When the Virtual Machine Manager console displays, maximize the console.
5. In the Workspace area, in the lower-left corner, click Settings.
6. In the Settings workspace, click User Roles. Only one user role, which is the Administrator role,
currently exists.
7. Review the various graphical interface elements appearing on the Home tab of the ribbon:
o Create User Role. Clicking this button opens the Create User Role Wizard.
o Create Run As Account. You can use this option to create a Run As account, which allows you to
specify the necessary credentials for specific functions.
o Create Servicing Window. This option provides a method for scheduling servicing outside of
VMM.
o Import Console Add–in. Add-ins from the Virtual Machine Manager console allow customers
and partners to create extensions for the Virtual Machine Manager console. These extensions
perform specific actions or display custom views when clicked.
o Backup. Clicking this button backs up VMM to a Universal Naming Convention share or to a
local path in Microsoft SQL Server.
o PowerShell. Clicking this button opens a Windows PowerShell command window, which
connects to the same VMM server as the console.
o Jobs. Clicking this button opens a window, which displays information about actions taken.
o PRO. Clicking this button opens the Performance and Resource Optimization (PRO) tips
window.
o Delete. Clicking this button deletes the user role that you selected in the User Roles details
pane. This button is grayed out unless a user role has been selected. You cannot select the
Administrator role.
8-10 Implementing a Software-Defined DataCenter
o Properties. Clicking this button opens the Properties dialog box for the user role selected in the
User Roles details pane.
9. In the Create User Role Wizard, on the Name and description page, in the Name box, type
DemoRole. In the Description box, type User role created for demonstration, and then click Next.
10. On the Profile page, point out the four options: Fabric Administrator (Delegated Administrator),
Read–Only Administrator, Tenant Administrator, and Application Administrator (Self–Service
User). For this demonstration, you will use the Fabric Administrator profile. Ensure that the Fabric
Administrator option is selected, and then click Next.
11. While on the Members page, explain that although members can include Active Directory user
accounts or group accounts, it is always preferable to use group accounts, which is a standard
practice in Active Directory management. For the purpose of this demonstration, you will use the IT
Active Directory group. Click Add to open the Select Users, Computers, or Groups dialog box. In
the Enter the object names to select (examples) box, type IT, and then click OK.
12. Verify that ADATUM\IT now displays on the Members page, and then click Next.
13. On the Scope page, in the Scope pane, select the DemoCloud check box, and then click Next.
14. On the Library Servers page, explain that this page is where you specify which library servers this
user role can use. Initially, no library servers display, so you should add them. To add a library server,
click Add. In the Select a library server dialog box, click LON-HOST1.adatum.com, and then click
OK. Verify that LON-HOST1 displays in the Library servers window, and then click Next.
15. On the Run As accounts page, explain that because VMM Administrators and Fabric Administrators
can create Run As accounts, you typically would not add one here. In this case, click Next.
16. On the Summary page, point out that this is the last page of the wizard. Note the View Script
button in the upper-right corner. Clicking it opens Notepad and displays the Windows PowerShell
script with all the cmdlets that perform the task you just specified. Explain that it is always helpful to
view and save these Windows PowerShell scripts, because you can use them to rerun similar tasks
with just a few changes or as documentation for existing objects. Click View Script, and then review
the script with a class. Go over the various cmdlets and what they do (the script has only six lines).
However, do not save the script. Close the Notepad window. On the Summary page, click Finish.
17. When the Jobs pop-up window displays, wait for all the jobs to complete, and then close the window.
18. In the Settings workspace, in the User Roles details pane, verify that you see the DemoRole object.
Click DemoRole, and then on the ribbon, click Properties.
19. In the DemoRole Properties dialog box, show the students how you can select the different nodes in
the console tree and alter the various properties. When you are finished, click Cancel.
20. Close the Virtual Machine Manager console.
Managing clouds in Microsoft System Center 2016 Virtual Machine Manager 8-11
Answer: With a private cloud, you can offer resources to users when they need them and
automate all or some of the virtual machine provisioning. Rather than requiring human
interaction to make a new set of virtual machines available for users, a new resource can be
allocated from a private cloud’s predefined resource pool.
Question: What aspects should you consider before you delete a private cloud?
Answer: Before you delete a private cloud, you must ensure that no objects exist that reference
the private cloud. These objects can include services, service deployment configurations, user
roles, and deployed or stored VMs.
Question: You need to allow non-IT users to make their own virtual machines, but you want to restrict
the amount of computing resources that the users will be able to consume. What would be the
appropriate user role profile to use, and what specific settings should you apply?
Answer: You should use the Application Administrator profile and ensure that on the Quotas for
the CloudName cloud page, you clear the Maximum selection for the Virtual Machines rows.
Tools
• Use the Create Cloud Wizard to create a private cloud in VMM 2016
• Use the Create User Roles Wizard to create collections of users that can be assigned permissions to
all or some private clouds. You can also select permission for what can be done by the user role on
resources in that private cloud.
A user cannot create a VM in a specific cloud. • Make sure that the user belongs to a user role
assigned to that cloud.
• Make sure that the quotas for that cloud have not
been exceeded.
• Make sure that the user role has the permissions
to create a VM.
You cannot delete a cloud because it has s that On the General page of the virtual machine
you want to keep. properties, use the Cloud drop-down list box to
select None – not associated.
You have set the quotas for a particular cloud, Check the user role’s quotas properties for that cloud,
and the self-service users have consumed them and adjust them accordingly.
all, but need to use more. You have added a
new host, but they still cannot create more
virtual machines.
8-12 Implementing a Software-Defined DataCenter
Answer: The attempt failed because on the Quotas for the ResCloud cloud page, in the
Member level quotas section, you cleared the Use Maximum column check box in the Virtual
Machines row and then changed the Assigned Quota column to 1. By doing this, you were
allowed to create up to the quota of one VM.
Question: For Dawn and Cai, why were the objects, that were available to select either very different or
missing entirely in the Virtual Machine Manager console?
Answer: This was because Dawn and Cai were assigned the user role of Application
Administrator. The functionality available from the Virtual Machine Manager console always
depends on the user role’s permissions. Items in the user interface are automatically removed if
the current user does not have the permissions to run the corresponding actions.
Managing services in Virtual Machine Manager 9-1
Module 9
Managing services in Virtual Machine Manager
Contents:
Lesson 1: Overview of services in VMM 2
Lesson 1
Overview of services in VMM
Contents:
Question and Answers 3
Resources 3
Managing services in Virtual Machine Manager 9-3
( ) Having to wait for the physical host to start before you can start the virtual machine.
( ) The need to carefully attend to resource allocation to ensure you’re properly utilizing your virtual
resources when they’re needed.
Answer:
( ) Having to wait for the physical host to start before you can start the virtual machine.
(√) The need to carefully attend to resource allocation to ensure you’re properly utilizing your
virtual resources when they’re needed.
Resources
Additional Reading: For more information about these common scenarios, refer to
Common Scenarios for Services in VMM: https://aka.ms/iujamj
9-4 Implementing a Software-Defined DataCenter
Lesson 2
Creating and managing services in VMM
Contents:
Question and Answers 5
Demonstration: Working with Service Designer 5
Demonstration: Deploying a service 8
Demonstration: Scaling out and updating a service 8
Managing services in Virtual Machine Manager 9-5
Steps
Answer:
Steps
3. In the VMM console, on the lower-left corner, click the Library workspace.
4. On the ribbon, on the Home tab, click the Create Service Template icon.
9-6 Implementing a Software-Defined DataCenter
5. In the New Service Template dialog box, review the various configurable items with the class. Point
out the View Script button. Explain how you can use this to save a script of the various Windows
PowerShell cmdlets that would perform the same actions as this user interface. Point out the different
patterns in the Patterns section. Show students how, as you click each pattern, the Description line
gives a brief explanation of the pattern’s functionality.
6. In the New Service Template dialog box, in the Name field, type Demo Service Template. In the
Release section, type 1. In the Patterns section, click the Single Machine icon, and then click OK.
7. In the Virtual Machine Manager Service Template Designer console, note the name that you
selected, Demo Service Template. It should be part of the overall name, as this is what you are
currently designing.
8. Point out the Designer canvas area. Explain to students that this is the console’s central part and that
it has various blocks that connect to each other. Point out the text that appears dimmed with a large
down arrow. This provides advice on how you can drag and drop various virtual machine templates
into the designer, either in the blank canvas area itself to make a new tier, or onto the existing
template to replace its tier.
9. Note the box labeled Single Tier. Point out the red circle with an exclamation mark on it, click the
red mark, and then observe the text below that explains why it has this warning. There is no virtual
hard disk or virtual machine network present in the template. You can make one by changing the
properties of the Single Tier virtual machine. To do this, right-click the Single Tier virtual machine
name, and then click Properties.
10. When the Single Tier properties dialog box opens, explain to students that this is where you make
changes to the Single Tier hardware configuration. Go through the various pages in the properties as
follows:
a. General. Use this page to set the name and description, and prevent the virtual machine from
migrating automatically. Additionally, use this page to allow the scaling out of a single tier, and
to create and set the tier’s availability. In the Name: box, type DemoServiceVM.
b. Select the This machine tier can be scaled out option, and then in the Maximum instance
count, type 3.
c. Hardware Configuration. Use this page to set the various hardware configurations that you
typically set for a new virtual machine in the VMM console, including:
i. In the Compatibility section, select the Hyper-V check box.
ii. In the console tree, in the General section, directly under Bus Configuration, click IDE
Devices.
iii. Click the green plus sign named New, and then click Disk.
iv. In the Virtual Hard Disk details area, click Browse.
v. In the Select a virtual hard disk pop-up window, click Base17C-WS16-1607.vhd and then
click OK.
Note: If more than one Base17C-WS16-1607.vhd is in the window, select the one
with the Operating System column listed as Windows Server 2016, or, if both unknown,
chose the .vhd from the LON-SVR3 Library.
vi. Select Create a differencing disk using the specified disk as the parent.
vii. In the Hardware Configuration console tree, scroll down, and in the Network Adapters
section, click Network Adapter 1: Not connected.
Managing services in Virtual Machine Manager 9-7
viii. In the Network Adapter 1 details pane, click the Connected to a VM network option, and
then click Browse.
ix. In the Select a VM Network dialog box, click Management, and then click OK.
d. OS Configuration. In the Operating system drop-down list, click Windows Server 2016
Datacenter. Point out the other items that you can select, including the name of the computer,
the local administrator password, the product key, and a time zone. Note the Roles and
Features area, in which you can add roles and features that can run on a computer running
Windows Server. Also, explain that you can join a domain and appear in a workgroup. Point out
the Scripts area, where you can provide Answer File and even Run Once commands.
g. Select Specify the password of the local administrator account radio button
k. Custom Properties. You can use this page to add various custom properties. Click the Manage
Custom Properties button, and show the various configurable items in the pop-up window.
Click Cancel when done.
l. Settings. You can use this page to specify the number of points to apply towards an owner’s
virtual machine quota, when a virtual machine is assigned to a self-service user.
m. Dependencies. Because this is a default template, note that it displays No dependencies found.
o. Finally, note the View Script button in the lower left. Point out the usefulness of keeping
Windows PowerShell scripts to document the settings. At the bottom of the Single Tier
Properties dialog box, click OK.
11. In the Virtual Machine Manager Service Template Designer console, note that the Management
block has an arrow connected to the NIC 1 box, and the arrow is crossing over the DemoServiceVM
box. Move the Management box and slide it straight down so it is alongside and parallel to the NIC
1 box so that the arrow is not crossing over the DemoServiceVM box.
12. Do not close any windows, but end the demonstration at this point. Inform the students that you will
continue deploying the service in a subsequent demonstration.
9-8 Implementing a Software-Defined DataCenter
2. In the Select name and destination pop-up window, in the Name text box, type Demo Service, and
in the Destination option, select the All hosts drop-down item, and then click OK.
3. In the Deploy Service – Demo Service console, if a pink shaded area appears in the middle of the
screen with a message that it could not find a host, click Refresh Preview on the ribbon. This should
clear the error.
4. Note that placement ratings dictate to which host it selects to deploy. In this case, the selected host is
lon-svr1.adatum.com.
Note: Depending on the overall configuration of resources among the various Hyper-V
hosts, a different Hyper-V host might be selected. If so, change step 8 below to the host name
that appears above in step 4.
6. In the Deploy service dialog box, point out the View Script button, and then click Deploy.
7. When the Jobs window appears, point out that you can see the Create Service Instance job is
running. Note that this step takes approximately 30 minutes.
8. On 20745A-LON-SVR1, open the Hyper-V Manager console, where you should see the virtual
machine name listed as LON-DEMO01. After verifying this, close the Hyper-V Manager on LON-
SVR1.
9. On LON-HOST1, close the Jobs window, but leave the VMM console open for the next
demonstration.
2. Select the London Hosts 1 host group to which you deployed the service.
5. On the Service tab of the ribbon, click the Scale Out icon. This opens the Scale Out Tier Wizard.
6. On the Select Tier page, the Tier details section shows the number of virtual machines currently
deployed, and the minimum and maximum tier sizes.
7. On the Select Tier page, click the Tier drop-down list box, and note that only the DemoServiceVM
tier is available, and then click Next.
8. On the Specify Virtual Machine Identity page, do not enter a name for the new virtual machine
that you are creating, and then click Next.
9. On the Select host page, ensure lon-svr1.adatum.com. is selected, and then click Next.
10. On the Configure Settings page, click Identity Information in the settings tree, and in the
Computer name text box, type LON-SCALE01, and then click Next.
Managing services in Virtual Machine Manager 9-9
13. The Jobs window opens and shows the Create virtual machine task. Because this can take several
minutes, do not wait, but move on to the lab. Right-click Create virtual machine, and then click
Cancel. In the Virtual machine manager window, click Yes.
14. In the Virtual Machine Manager console, in the VMs and Services workspace, click All Hosts.
15. Ensure that VMs is selected in the ribbon, and then power off the following virtual machines:
o LON-DEMO01
Note: The script might report errors. This is a known issue and does not affect the
demonstration. You may proceed to the next step.
21. Close all open windows. Do not revert any virtual machines.
9-10 Implementing a Software-Defined DataCenter
By enabling automatic scale-out, you can manage application peak loads easily by adding more virtual
machines to run an application as load increases.
Review Question
Question: In VMM, what is an upgrade domain?
Answer: An upgrade domain is an object that allows you to minimize service interruptions when
you perform an in-place update of a tier.
Service template fails to create virtual machine Ensure the proper destination is set. Destinations
and results in a 12700 error. are always listed alphabetically, so in the case of
the lab, the first destination that is selected is
DevCloud.
Managing services in Virtual Machine Manager 9-11
Answer: It had not been assigned a virtual hard disk or a network adapter. Once that was done,
the warning went away.
Question: What must you do to update or modify a service template?
Answer: You must create a new release with a greater number. Completed releases are read only.
Monitoring a virtualization infrastructure by using System Center Operations Manager 10-1
Module 10
Monitoring a virtualization infrastructure by using System
Center Operations Manager
Contents:
Lesson 1: Operations Manager architecture and security 2
Lesson 2: Using Operations Manager for monitoring and reporting 5
Lesson 1
Operations Manager architecture and security
Contents:
Question and Answers 3
Resources 3
Demonstration: Using the Operations Manager console 3
Demonstration: Deploying the Operations Manager agent 4
Monitoring a virtualization infrastructure by using System Center Operations Manager 10-3
( ) Administrator
( ) Operator
( ) Advanced Operator
( ) Author
( ) Application Monitoring Operator
Answer:
( ) Administrator
( ) Operator
( ) Author
( ) Application Monitoring Operator
Feedback:
Advanced Operator grants the permissions required to access and resolve alerts, access views,
and run tasks. It also allows users to create overrides of rules and monitors. Although the
Administrator profile would allow you to perform the same actions, this option violates the
principle of least privilege.
Resources
2. In the Operations Manager console, review the Monitoring Overview page. Point out the States
and Alerts section, and then explain the Required Configurations Tasks.
3. In the monitoring navigation pane on the left side of the screen, click Active Alerts, and then click
any alert. Review the Alert Details section at the bottom of the screen, and then review the alert
actions and tasks in the Tasks pane on the right side.
4. Right-click an alert, review the options that display, and then click Properties.
5. In the Alert Properties dialog box, click some of the Alert Property tabs, and then discuss the page
content.
6. Click Cancel to close the Alert Properties dialog box.
10-4 Implementing a Software-Defined DataCenter
7. Click the Authoring workspace, and then mention to the students that this is where they can create
their own customized management packs. Remind students that management packs can include
components such as discoveries, tasks, knowledge, Run As profiles, reports monitors, rules, and
groups.
8. Click the Reporting workspace. Explain that this is where they can review and schedule reports, which
are often included in management packs.
9. Click the Administration workspace. Explain that this is where they can run discoveries, deploy
agents, create notifications, import management packs, and configure security and accounts.
10. Click My Workspace. Explain that this is where they can customize and save their console settings,
including commonly used views and searches.
3. In the Computer and Device Management Wizard, on the Discovery Type page, ensure that
Windows computers is selected, and then click Next.
4. On the Auto or Advanced page, click Advanced Discovery, and then click Next.
5. On the Discovery Method page, click Browse for, or type-in computer names. In the Computer
names text box, type LON-HOST1.adatum.com, and then click Next.
6. On the Administrator Account page, click Discover.
7. On the Select Objects to Manage page, click LON-HOST1.adatum.com, and then click Next.
Lesson 2
Using Operations Manager for monitoring and
reporting
Contents:
Question and Answers 6
Demonstration: Configuring notifications 6
10-6 Implementing a Software-Defined DataCenter
( ) Monitors
( ) Attributes
( ) Object discoveries
( ) Notifications
( ) Rules
Answer:
(√) Monitors
(√) Attributes
( ) Notifications
(√) Rules
Feedback:
You can create overrides for:
• Monitors
• Attributes
• Object discoveries
• Rules
You cannot create overrides for notifications.
3. In the Tasks pane, click New, and then click Email (SMTP).
4. In the E-mail Notification Channel window, on the Description page, click Next to accept the
default channel name and description.
6. In the Add SMTP Server window, enter the following information, and then click OK:
o SMTP server (FQDN): smtp.adatum.com
o Port number: 25
8. On the Format page, click Finish to accept the default message format.
4. On the Schedule page, click Always send notifications, and then click Next.
7. On the Channel page, in the Channel Type text box, click E-mail (SMTP).
8. In the Delivery address for the selected channel text box, type [email protected], and
then click Next.
9. On the Schedule page, click Always send notifications, and then click Finish.
10. In the Notification Subscriber Wizard, click Finish, and then click Close.
3. In the Notification Subscription Wizard, on the Description page, in the Subscription name text
box, type Windows Server 2012 notifications, and then click Next.
4. On the Criteria page, in the Conditions box, select the raised by any instance in a specific group
check box.
5. In the Criteria description box, click specific.
6. In the Group Search window, in the Filter by text box, type 2012, and then click Search.
7. Click Windows Server 2012 Computer Group, click Add, and then click OK.
8. On the Criteria page, click Next.
14. On the Channels page, click Delay sending notifications if conditions remain unchanged for
longer than (in minutes), type 10, and then click Next.
15. On the Summary page, click Finish, and then click Close.
Lesson 3
Integrating Operations Manager with VMM and DPM
Contents:
Question and Answers 9
Demonstration: Integrating Operations Manager with VMM 9
Monitoring a virtualization infrastructure by using System Center Operations Manager 10-9
( ) DPM Admin
( ) DPM Tier-1 Support
Answer:
( ) DPM Admin
The DPM Tier-1 Support role allows users to see alerts and job information. It also allows users to
perform simple tasks such as rerunning a backup job.
4. On the Select features to install page, select the Operations console check box, and then click
Next.
5. On the Select installation location page, click Next.
6. On the Proceed with Setup page, note that all the prerequisites have passed, and then click Next.
7. On the Please read the license terms page, review the license, click I have read, understood and
agree with the license terms, and then click Next.
9. On the Microsoft Update page, click Off, and then click Next.
11. Clear the Start the Operations Manager console when the wizard closes check box, and then click
Close.
2. In the VMM console, click the Settings workspace. In the navigation pane, click System Center
Settings, right-click Operations Manager Server, and then click Properties.
3. In the Add Operations Manager Wizard, on the Introduction page, read the requirements for
integration, and then click Next.
4. On the Connection to Operations Manager page, in the Server name text box, type LON-
OM.adatum.com. Review the options, do not change the defaults, and then click Next.
5. On the Connection to VMM page, in the User name text box, type adatum\scservice. In the
Password text box, type Pa55w.rd, and then click Next.
7. In the Jobs window, click New Operations Manager connection, and then wait for the job to
complete. This might take five minutes or more.
8. When the job completes, close the Jobs window.
Monitoring a virtualization infrastructure by using System Center Operations Manager 10-11
Review Question
Question: What method would you choose to deploy Operations Manager agents in your environment?
Answer: After integrating VMM with Operations Manager, the following reports are available:
1. Capacity Utilization
3. Host Utilization
4. Host Utilization Growth
5. Power Savings
6. SAN Usage Forecasting
7. Virtual Machine Allocation
9. Virtualization Candidates
Question: What do you have to install on the VMM server before configuring the integration with
Operations Manager?
Module 11
Implementing and managing Hyper-V Replica and Azure
Site Recovery
Contents:
Lesson 1: Implementing and managing Hyper-V Replica 2
Lesson 2: Implementing and managing Azure Site Recovery 8
Lesson 1
Implementing and managing Hyper-V Replica
Contents:
Question and Answers 3
Resources 5
Demonstration: Enabling virtual machine replication 5
Demonstration: Performing a planned failover with Hyper-V Replica 6
Implementing and managing Hyper-V Replica and Azure Site Recovery 11-3
Answer: No, you can use Hyper-V Replica to replicate any virtual machine, regardless of whether
it has integration services installed or not. However, some features such as Failover TCP/IP
settings are applied to a replicated virtual machine only if it has integration services installed.
Answer: If you assume that the hosting provider is not part of the same Active Directory forest,
then the replica Hyper-V host can authenticate the primary Hyper-V host by using a digital
certificate.
Question: How can you limit the primary Hyper-V hosts to access only virtual machines that originate
from the same company?
Answer: When you configure a Hyper-V host as a replica, you can specify the trust group. If you
do so, the Hyper-V host will be able to access only virtual machines that originate from the same
trust group.
Question: What is the reason that the initial Hyper-V Replica health is in the warning state even when you
configure virtual machine replication between Hyper-V hosts on the same network?
Answer: When you configure virtual machine replication, the initial state of the virtual machine
must be replicated, and this takes some time even when both the Hyper-V hosts are on the same
network. During that time, the Hyper-V Replica health state is in the Warning state. After the
initial synchronization finishes, the replication health state changes to Normal.
11-4 Implementing a Software-Defined DataCenter
Answer: While the primary virtual machine is running, you can perform only test failover. If there
is no network connectivity between the primary and replica sites, you also can perform failover.
However, you should not perform unplanned failover unless it is extremely necessary, such as
when a disaster has occurred at the primary site.
Answer: You can perform planned failover when both the Hyper-V hosts—at the primary site
and at the recovery site—are available, and planned failover is performed without any data loss.
When this is not possible, for example if the primary site is no longer available because of a
disaster, you can perform failover, which means unplanned failover. After failover, you will be
able to use a replicated virtual machine, but changes that were performed at the primary site and
were not yet replicated will be lost.
Question: Where can you configure when resynchronization will occur if it is needed?
Answer: You can configure resynchronization settings on the primary virtual machine that is
being replicated by Hyper-V Replica. You cannot configure or view configured resynchronization
settings on the replicated virtual machine. In a production environment, resynchronization should
be scheduled for off-peak usage times.
Answer: No. Hyper-V can replicate a virtual machine to a single target. If you want to extend
Hyper-V replication, you can do that only on a virtual machine that is already replicating on a
target Hyper-V host.
Question: Can you use a replication frequency of 30 seconds when you are extending Hyper-V
replication?
Answer: No. When you are extending Hyper-V replication, you can select only a replication
frequency of 5 minutes or 15 minutes. The replication interval cannot be shorter than the
replication interval used when replicating a virtual machine from the primary to a secondary
Hyper-V host.
Implementing and managing Hyper-V Replica and Azure Site Recovery 11-5
Resources
Additional Reading: For more information, refer to Set up Hyper-V Replica at:
https://aka.ms/j13kh9
Additional Reading: For more information, refer to Interpreting Replication Health – Part
1 at: https://aka.ms/fferdg
3. In LON-REPL Settings, in the navigation pane, point out that the Management section has six
settings, that Replication is not one of them, and then click OK.
6. On the Specify Replica Server page, in the Replica server text box, type LON-SVR2, and then click
Next.
7. On the Specify Connection Parameters page, point out that Use Kerberos authentication (HTTP)
is selected, that Compress the data that is transmitted over the network is enabled, and then click
Next.
8. On the Choose Replication VHDs page, point out that the LON-REPL.vhd virtual hard disk is
selected, and then click Next.
9. On the Configure Replication Frequency page, in the drop-down list box, click 30 seconds, and
then click Next.
10. On the Configure Additional Recovery Points page, explain the available options, and then click
Next.
11. On the Choose initial Replication Method page, point out that both the Send initial copy over
the network and the Start replication immediately options are selected, and then click Next.
12. In Enable Replication for LON-REPL, on the Completing the Enable Replication Wizard page,
click Finish.
13. Switch to LON-SVR2.
11-6 Implementing a Software-Defined DataCenter
15. Confirm that LON-REPL is one of the virtual machines on LON-SVR2, and that it is in the Off state.
16. In Hyper-V Manager, right-click LON-REPL, click Replication, and then click View Replication
Health.
17. In Replication Health for “LON-REPL”, review Replication Health. Point out that initial replication
might not yet have completed, and Replication Health is in the Warning state.
20. In LON-REPL Settings, in the navigation pane on the left, expand Network Adapter. Point out that
two new nodes, Failover TCP/IP and Test Failover now display. Explain when and why those options
are used.
21. In LON-REPL Settings, in the navigation pane, point out that there are seven settings in the
Management section, including Replication, which was not present before, and then click OK.
22. In Hyper-V Manager, right-click LON-REPL, click Replication, and then click View Replication
Health.
23. In Replication Health for “LON-REPL”, review Replication Health. Explain that after initial
replication finishes, Replication Health will be set to Normal.
3. On LON-REPL, right-click the desktop, click New, click Folder, type Current State, and then press
Enter.
4. On LON-SVR1, in Hyper-V Manager, right-click LON-REPL, click Replication, and then click Planned
Failover.
5. In Planned Failover, point out that Start the Replica virtual machine after failover is selected, and
then click Fail Over.
6. When the Planned Failover error displays, explain that this is because the virtual machine is not
prepared for a planned failover.
7. Click Close, and then click Cancel.
8. In Hyper-V Manager, right-click LON-REPL, click Shut Down, and then click Shut Down again.
9. In Hyper-V Manager, right-click LON-REPL, click Replication, and then click Planned Failover.
10. In Planned Failover, point out that Start the replica virtual machine after failover is selected, and
then click Fail Over.
12. In Hyper-V Manager, in the navigation pane, click LON-SVR2. Point out that LON-REPL is in the
Running state, and then double-click LON-REPL.
13. Sign in to LON-REPL as Administrator with the password Pa55w.rd.
Implementing and managing Hyper-V Replica and Azure Site Recovery 11-7
14. On LON-REPL, point out that a folder named Current State displays on the desktop. Explain that
with planned failover, all changes from the primary virtual machine are replicated.
15. Right-click the desktop, click New, click Folder, type Planned Failover, and then press Enter.
16. On LON-SVR2, in Hyper-V Manager, right-click LON-REPL, click Replication, and then click Reverse
Replication.
17. In the Reverse Replication Wizard for LON-REPL, click Next five times, and then click Finish.
18. In Hyper-V Manager, right-click LON-REPL, click Shut Down, and then click Shut Down again.
19. In Hyper-V Manager, point out that LON-REPL is in the Off state.
20. Right-click LON-REPL, click Replication, and then click Planned Failover.
21. In the Planned Failover dialog box, confirm that Start the replica virtual machine after failover is
selected, and then click Fail Over.
22. In Hyper-V Manager, in the navigation pane, click LON-SVR1. Point out that the LON-REPL state is
Running.
23. In Hyper-V Manager, double-click LON-REPL. Point out that the Virtual Machine Connection to
LON-REPL opens.
Lesson 2
Implementing and managing Azure Site Recovery
Contents:
Question and Answers 9
Resources 10
Demonstration: Registering VMM with Azure Site Recovery 10
Demonstration: Configuring Azure Site Recovery replication 12
Implementing and managing Hyper-V Replica and Azure Site Recovery 11-9
Answer: No, you cannot use Azure Site Recovery to manage replication between two Hyper-V
hosts. You can use Azure Site Recovery to manage virtual machine replication from a Hyper-V
host to Azure, or between two clouds that are managed by VMM.
Question: Is Azure Site Recovery used only as a disaster recovery solution?
Answer: No. Although administrators often use Azure Site Recovery as a disaster recovery
solution, you also can use it in several other scenarios, such as migrating workloads to Azure,
cloud bursting, DevTest, and analytics and reporting.
When VMM is registered with Azure Site Recovery and the Azure Site Recovery replication policy is
associated with the cloud, you can use the VMM console to configure Azure Site Recovery
protection for virtual machines that are deployed to a VMM cloud.
Question: Which VMM object can you use as a source and as a target when configuring the Azure Site
Recovery replication policy?
Answer: You can control which virtual machines will be replicated from a protected cloud when
you register VMM with Azure Site Recovery. However, to configure Azure Site Recovery
replication, virtual machines must be deployed to a VMM cloud. You then use the cloud as a
source and target object when configuring Azure Site Recovery protection.
Answer: Yes, you can have multiple replication policies in the same Recovery services vault.
However, only a single replication policy can be associated with each VMM cloud.
Question: How many virtual machine groups can you define in a single recovery plan?
Answer: In a single recovery plan, you can define up to seven virtual machine groups. Each
virtual machine group can include multiple virtual machines that fail over between the source
and target locations as a single unit.
Answer: The Azure Site Recovery policy controls and orchestrates Azure Site Recovery, including
the order in which virtual machines will start during failover, and additional tasks that should be
performed during failover.
Question: Is there any downtime during a planned Azure Site Recovery failover?
11-10 Implementing a Software-Defined DataCenter
Answer: Yes. During a planned Azure Site Recovery failover, virtual machines are shut down on
the primary location, and become available again only after they start on the secondary location.
You cannot connect to virtual machines from the time they are turned off on the primary
location, until they are started on the secondary location. This represents downtime.
Resources
Additional Reading: For more information, refer to What workloads can you protect with
Azure Site Recovery? at: https://aka.ms/f73vqb
Additional Reading: This course covers only how you can integrate Azure Site Recovery
with VMM, and use it for providing disaster recovery for VMM clouds in onsite datacenters. For
more information on Azure Site Recovery, refer to What is Site Recovery? at:
https://aka.ms/lwzmwb
Additional Reading: For additional information on the Azure Site Recovery prerequisites
and how to prepare for them, refer to Prepare for Azure Site Recovery deployment at:
https://aka.ms/q6kuru
Additional Reading: For additional information on creating recovery plans in Azure Site
Recovery, refer to Create recovery plans, at: https://aka.ms/c87d65
Additional Reading: For additional information on using Azure automation runbooks with
recovery plans, refer to Add Azure automation runbooks to recovery plans, at:
https://aka.ms/nbt9vy
Additional Reading: For additional information on performing failover by using Azure Site
Recovery, refer to Failover in Site Recovery, at: https://aka.ms/khd8ho
3. In the Settings pane, click Microsoft Azure Site Recovery, and in the details pane, point out that
VMM server is not registered with the Azure Site Recovery service.
4. In LON-VMM, on the taskbar, click the Microsoft Internet Explorer icon.
5. In the Internet Explorer Address bar, type http://portal.azure.com, and then press Enter.
Implementing and managing Hyper-V Replica and Azure Site Recovery 11-11
6. On the Microsoft Azure page, sign in with your Microsoft account that you created in the first
module. If your account is not listed, click Use another account, and then sign in with your
credentials.
7. On the Dashboard page, in the Hub vertical menu on the left, click More services. In the Filter text
box, type recovery, and then click Recovery Services vaults.
8. In the Recovery Services vaults blade, click Add. Provide following values, and then click Create:
o Name: RecoveryVault1
11. In the Protection goal blade, select the following values, and then click OK:
o Where do you want to replicate your machines to: To recovery site
o Are your machines virtualized: Yes, with Hyper-V
o Are you using System Center VMM to manage your Hyper-V hosts: Yes
o Are you managing the recovery site with another System Center VMM: No, same System Center
VMM manages both sites
13. In Add Server blade, click Download, which is the third bullet point:
14. Download the installer for the Microsoft Azure Site Recovery provider.
15. In Do you want to run or save AzureSiteRecoveryProvider.exe notification, click the down arrow
near the Save button, and then click Save as. Navigate to the C:\VMs folder, and then click Save.
16. In the Add Server blade, click Download, which is the fourth bullet point:
18. In the notification area, click the down arrow near the Save button, and then click Save as. Verify that
the location points to the C:\VMs folder, and then click Save.
21. In the Open File – Security Warning dialog box, click Run, and then click OK.
22. In the Azure Site Recovery Provider Setup (VMM server) Wizard, on the Microsoft Update page,
click the Off option, and then click Next.
11-12 Implementing a Software-Defined DataCenter
23. On the Provider Installation page, click Install, click Register, and then click OK.
24. In Microsoft Azure Site Recovery Registration Wizard, on the Vault Settings page, click Browse.
Navigate to C:\VMs, click the file whose name starts with RecoveryVault1, click Open, and then click
Next.
25. On the Proxy Settings page, verify that the Connect directly to Azure Site Recovery without a
proxy server option is selected, and then click Next.
26. On the Registration page, click Browse. Navigate to C:\VMs, click OK, click Next, click Register,
and then click Finish.
27. On LON-HOST1, in the Virtual Machine Manager console, in the Settings workspace, point out
that the VMM server is registered with the Azure Site Recovery service.
2. In the VMs and Services pane, expand All Hosts, expand HG2, and then click lon-svr2. In the details
pane, point out that LON-INF1, LON-INF2, and LON-INF3 display.
3. Right-click LON-INF3. Point out that the Manage Protection option is visible, but you cannot select
it. Explain that this is because the Azure Site Recovery replication policy is not associated with the
cloud.
4. In the VMs and Services pane, expand HG1, and then click lon-svr1.
5. In the details pane, point out that LON-INF1, LON-INF2 and LON-INF3 virtual machines are not
present on lon-svr1.
6. In the VMs and Services pane, click Cloud1 and point out that it does not include any virtual
machine.
7. In the VMs and Services pane, click Cloud2, and point out that it includes three virtual machines.
8. On LON-VMM, in Internet Explorer, in the Azure Portal, verify that the Site Recovery, Prepare
infrastructure, and Prepare source blades are open.
9. In the Prepare source blade, select the following values, and then click OK:
o System Center VMM: LON-VMM.Adatum.com
o Cloud: Cloud2
10. In the Target blade, in the Cloud drop-down list box, select Cloud1, and then click OK.
12. In the Create and associate policy blade, specify the following settings (leave all other settings with
the default values), and then click OK:
o Name: ReplicationPolicy1
13. After the replication policy is created and associated, in the Replication policy blade, click OK.
14. In the Capacity planning blade, in the Have you completed capacity planning drop-down list box,
select Yes, I have done it, and then click OK.
Implementing and managing Hyper-V Replica and Azure Site Recovery 11-13
17. In the Source blade, verify that LON-VMM.Adatum.com is selected as Source location, and that
Cloud2 is selected as Cloud, and then click OK.
18. In the Select virtual machines blade, click LON-INF1, click LON-INF2, and then click OK.
25. In the details pane, right click LON-INF3, and then click Manage Protection.
26. In the LON-INF3 Properties dialog box, select Enable Microsoft Azure Site Recovery protection
for this virtual machine. Point out that the Replication frequency drop-down list box includes only
the 30 seconds option. Explain that this is because this setting was configured in the Azure Site
Recovery replication policy, and then click OK.
27. In the VMs and Services pane, click lon-svr1.
28. In the details pane, verify that LON-INF3 now displays, and explain that this is because it is replicated
by Azure Site Recovery.
29. On LON-SVR1, in Hyper-V Manager, in the navigation pane, verify that LON-SVR1 is selected.
30. In the details pane, right-click LON-INF1, and point out that the Replication option now is available.
Explain that this shows that LON-INF1 is now replicating by using Hyper-V Replica.
31. On LON-HOST1, in the VMM console, in the VMs and Services pane, click Cloud2.
32. In the details pane, right-click LON-INF3, and point out that you now can select the Manage
Protection option. Explain that this is because LON-INF is deployed to the cloud, and the Azure Site
Recovery replication policy is associated with the cloud.
11-14 Implementing a Software-Defined DataCenter
Review Questions
Question: What would be the most probable reason that Replication Health is not in the Normal state
after you enable replication for a virtual machine?
Answer: After you enable replication for a virtual machine, replica is not yet synchronized with
the primary virtual machine. Therefore, Replication Health will be in the Warning state, and not in
the Normal state. However, there also could be other reasons for the Warning state, for example,
if you pause replication.
Question: What is the difference between Hyper-V Replica failover and Azure Site Recovery failover?
Answer: Hyper-V Replica failover is a manual process, which is performed on each virtual
machine. Azure Site Recovery failover is an automated and orchestrated process, which can fail
over multiple virtual machines simultaneously. Only with Azure Site Recovery failover can you
control the order in which virtual machines will be started at a secondary location, and trigger
additional tasks during failover.
Question: Can you replicate Linux virtual machines by using Hyper-V Replica?
Answer: Hyper-V Replica is hardware and operating system–agnostic feature. You can use it with
any operating system that can be installed on a Hyper-V virtual machine. Because you can install
Linux in Hyper-V virtual machines, you also can use Hyper-V Replica with Linux virtual machines.
Ensure sufficient funds are available for As Azure is subscription based, ensure that you
running Azure Site Recovery. have sufficient funds to perform the recovery
actions needed. Some billing models assign credits,
which can be backed by an Enterprise Agreement
or a credit card to ensure funds do not run out.
Implementing and managing Hyper-V Replica and Azure Site Recovery 11-15
Answer: Test failover does not affect virtual machine availability, and you can perform it
regardless of the state of the primary virtual machine. You can perform planned failover only if
the primary virtual machine is turned off, which causes some virtual machine downtime. In both
cases, Failover TCP/IP configuration is used for replica virtual machines.
Question: Can you use Azure Site Recovery to protect a virtual machine that is running on a VMM-
managed Hyper-V host?
Answer: You can protect a virtual machine by using Azure Site Recovery only if it is deployed to
a VMM cloud. If the virtual machine is not deployed to a VMM cloud, you cannot protect it by
using Azure Site Recovery.
Protecting a virtualization infrastructure by using Data Protection Manager 12-1
Module 12
Protecting a virtualization infrastructure by using Data
Protection Manager
Contents:
Lesson 1: Overview of backup and restore options for VMs 2
Lesson 2: Configuring and managing DPM for virtualization
infrastructure protection 5
Module Review and Takeaways 13
Lab Review Questions and Answers 14
12-2 Implementing a Software-Defined DataCenter
Lesson 1
Overview of backup and restore options for VMs
Contents:
Question and Answers 3
Resources 4
Protecting a virtualization infrastructure by using Data Protection Manager 12-3
Answer: It depends, but generally the answer is no. Copying a large amount of data takes a long
time and during that time files might change. If that happens, copied data will not be identical to
the data at the moment when the copy operation started. Some files might also be open
exclusively, which means that they will not be copied.
Question: Which VSS component initiates creation of the snapshot and creates a backup based on that
snapshot? Which Windows Server feature acts as the VSS requestor?
Answer: The VSS component that initiates creation of the snapshot and creates backup based on
the snapshot is called the VSS requestor. The Windows Server Backup feature acts as VSS
requestor.
Answer: No. For a host level backup, a backup application must be running in the VM, which is
not possible if the VM is turned off. You can include such a VM only in a host level backup.
Question: Where are stored VMM encryption keys? Can the VMM management server access information
in the VMM database without the encryption keys?
Answer: Information in the VMM database is encrypted and the VMM management server
cannot decrypt and access that information without VMM encryption keys. Encryption keys are
stored either locally on the VMM management server or in the AD DS if you select the
Distributed Key Management option during VMM installation.
Question: Do you need to install a DPM agent in a VM if you need to create a backup of the VM by using
DPM?
12-4 Implementing a Software-Defined DataCenter
Answer: It depends on the backup type that you want to perform. If you want to perform a
guest level backup, then you must install the DPM agent in the VM. If you want to perform a host
level backup, then you must install the DPM agent on the Hyper-V host, but you do not need to
install it in the VM.
Answer: DPM and Azure Backup Server work similar and have very similar features. The main
difference between them is that DPM supports tape libraries and can use them for storing long-
term backups, while Azure Backup Server does not support tape libraries. The second difference
is that DPM does not require an Azure subscription, while Azure Backup Server does not work
without an active Azure subscription.
Question: Do you need to purchase Azure Backup Server if you want to use it?
Answer: No, you do not need to purchase Azure Backup Server. You can download Azure
Backup Server from the Azure portal and use it for storing your backups in Azure. Azure Backup
Server is free, but you need to pay for an Azure subscription and for the storage space that you
use in Azure.
Resources
Additional Reading: For more information, refer to Volume Shadow Copy Service:
https://aka.ms/gtn832
Additional Reading: For more information, refer to Back Up and Restore Virtual Machine
Manager: https://aka.ms/tpgw05
Additional Reading: System Center 2016 DPM provides dramatically faster backups and
storage savings when it is installed on Windows Server 2016. In such a configuration, DPM 2016
uses Modern Backup Storage, which benefits from ReFS block cloning and RCT. For more
information, refer to What's new in DPM in System Center 2016: https://aka.ms/c10cs6
Additional Reading: For more information, refer to Data Protection Manager:
https://aka.ms/n8m7n3
Additional Reading: For information, refer to What can DPM back up?:
https://aka.ms/h5dzi8
Additional Reading: For more information, refer to Preparing to back up workloads using
Azure Backup Server: https://aka.ms/vobw84
Protecting a virtualization infrastructure by using Data Protection Manager 12-5
Lesson 2
Configuring and managing DPM for virtualization
infrastructure protection
Contents:
Question and Answers 6
Resources 8
Demonstration: Creating a storage pool and deploying DPM protection agents 9
Demonstration: Creating and configuring a protection group 10
Demonstration: Recovering a VM 11
12-6 Implementing a Software-Defined DataCenter
DPM components
Question: How can you manage multiple DPM servers at the same time from the central location?
Answer: DPM includes a management console that you can use for managing a single DPM
server. If you need to manage multiple DPM servers from the central location, you should install
Central console. Central console must be installed on Operations Manager server; it cannot be
installed on DPM server.
Question: How can you protect the DPM server?
Answer: If you need to protect the DPM server, you should implement a secondary DPM server
in your environment. A secondary DPM server is the same as the primary DPM server, with the
exception that you use it to provide protection for the primary DPM servers.
Answer: Protection groups define storage pools, retention settings, and data sources that need
protecting. All data sources in the same protection group share storage allocation, replication
creation methods, and settings for on-the-wire compression.
Answer: For file-based data sources, you can have up to 64 recovery points. If you want to keep
your backups for more time, then you should configure long-time protection by using tapes or
online protection.
Answer: A storage pool can use block storage on DAS and SAN. iSCSI disk is block storage that is
available on SAN, so you can add an iSCSI disk to a storage pool.
Question: Can you add volume on a dynamic disk to the DPM storage pool?
Answer: No, you can only add volumes from basic disks to a DPM storage pool. If a volume is on
a dynamic disk, it cannot be added to the storage pool.
Answer: Yes. The same DPM server can use different protection methods for protecting different
types of data, as protection methods are configured per protection group. This means that you
can use D2D for protecting data in one protection group and D2D2T for protecting data in
another protection group.
Question: What must you do in DPM before you can use the D2D protection method?
Answer: To use the D2D protection method in DPM, the DPM server must have sufficient
storage, which means that you must add disks to the storage pool. You must also deploy DPM
protection agents and configure a protection group before servers will be protected.
Protecting a virtualization infrastructure by using Data Protection Manager 12-7
Answer: You would probably install the DPM protection agent automatically by using the DPM
Administrator Console whenever possible. However, if this is not possible—for example if you
need to install the DPM protection agent on a server that is behind a firewall that blocks traffic or
if you encounter a network- or permission-related issues—you would install the DPM protection
agent manually and then connect it to the DPM server.
Question: Do you need to install different DPM protection agents for protecting the Hyper-V host and
for protecting SQL Server?
Answer: No, you need to install the same DPM protection agent regardless on the workload that
it should protect. A single DPM protection agent can protect any workload that can be backed
up by DPM.
Question: Can you configure data sources in a protection group with online protection, while other data
sources in the same protection group do not have online protection?
Answer: Data protection settings are set per protection group and it is the same for all data
sources in the same protection group.
Answer: If the VMM management server runs on a failover cluster, it must be configured with
the Distributed Key Management option. This means that the encryption key is stored in AD DS
and you must include one of the domain controllers in your backup plan to protect the
encryption key.
Question: The Linux VM runs on your virtualization infrastructure. Where must you install a DPM
protection agent to protect the VM?
Answer: You cannot install a DPM protection agent in a Linux VM, as the DPM protection agent
can be installed only on a Windows operating system. However, you can install a DPM protection
agent on the Hyper-V host on which a Linux VM runs and then include the VM in the host level
backup.
Recovering VMs
Question: Which three VM recovery options are available in DPM?
Answer: When you are recovering a VM in DPM, you have the following three options available:
recover data to the original instance, recover as a VM to any host, and copy to a network folder.
If you have type library in DPM, then you can also select a copy to tape option.
12-8 Implementing a Software-Defined DataCenter
Question: You use a DPM server to create a host based backup of the VM named VM1. VM1 includes the
folder named Data, which contains several documents. Do you need to recover a whole VM1 before you
can access documents in folder Data1?
Answer: No. You can use DPM to perform item level recovery, which enables you to recover files
and folders from VM1, without recovering the whole VM first.
Question: Can you use item level recovery to recover files from a shielded VM?
Answer: Content of a shielded VM is encrypted. Because of this, you cannot use item level
recovery to recover individual files; you can only recover the entire shielded VM.
Answer: Before you can configure online protection in DPM, you must install the Azure Backup
Agent on the DPM server and register the DPM server with the Azure Recovery Services vault.
Question: What must you create in Azure and what must you do on the DPM server before you can
register the DPM server with Azure?
Answer: The first step is to create the Recovery Services vault in Azure. From the vault, you can
download backup credentials and the Azure Backup Agent, which must be installed on the DPM
server. During installation, you should point to the backup credentials, and after the installation
the DPM server will be registered with the vault.
Resources
Additional Reading: For more information, refer to How does DPM work: https://aka.ms/bsdtkw
Additional Reading: For more information, refer to New DPM2010 Storage Calculator links
(Sep-2010): https://aka.ms/p4bml5
Additional Reading: For more information, refer to Add Storage to DPM 2016:
https://aka.ms/tns1dm
Additional Reading: For more information, refer to Get ready to deploy DPM servers:
https://aka.ms/qeroyz
Additional Reading: For more information, refer to Data Protection Manager Agent
Network Troubleshooting: https://aka.ms/vp4r9n
Protecting a virtualization infrastructure by using Data Protection Manager 12-9
7. In the PHYSICAL DISKS section, click TASKS, and then click New Storage Pool.
8. In New Storage Pool Wizard, on the Before you begin page, click Next.
9. On Specify a storage pool name and subsystem page, in the Name text box, type Pool1, and then
click Next.
10. On the Select physical disk for the storage pool page, verify that Msft Virtual Disk (LON-DPM) is
selected, click Next, click Create, and then click Close.
12. In the VIRTUAL DISKS section, click TASKS, click New Virtual Disk, and then click OK.
13. In the New Virtual Disk Wizard, on the Before you begin page, click Next.
14. On the Specify the virtual disk name page, in Name text box, type VDisk1, and then click Next two
times.
15. On the Select the storage layout, in Layout section, click Simple, and then click Next.
16. On the Specify the provisioning type page, select Thin, and then click Next.
17. On the Specify the size of the virtual disk page, in the Specify size text box, enter 1, select TB from
the drop-down list box, click Next, click Create, clear the Create a volume when this wizard closes
option, and then click Close.
12-10 Implementing a Software-Defined DataCenter
19. In Disk Management, on Disk 3, right-click the Unallocated space, click New Simple Volume, click
Next four times, and then click Finish.
20. In Disk Management, verify that New Volume on Disk 1 and on Disk 3 are formatted with NTFS.
21. On the desktop, double-click Microsoft System Center 2016 Data Protection Manager.
22. In the System Center 2016 DPM Administrator Console, click the Management workspace.
23. In the navigation pane, click Disk Storage, and then on the ribbon click Add.
24. In the Add Disk Storage window, in the Available volumes list, point out that volumes D:\ and F:\
are shown.
25. Press and hold the Ctrl key, in Available volumes section, click D:\, click F:\, release the Ctrl key,
click Add, point out the note, click Yes, and then click OK.
26. Point out that D:\ and F:\ appear in the details pane under DPM Storage Pool Volumes and Folders.
27. In the System Center 2016 DPM Administrator Console, in the navigation pane, click Agents, and
then on the ribbon click Install.
28. In the Protection Agent Installation Wizard, on the Select agent deployment method page, select
Install agents option, and then click Next.
29. On the Select computers page, press and hold the Ctrl key, select LON-SVR1 and LON-SVR2,
release the Ctrl key, click Add, and then click Next.
30. On the Enter credentials page, enter the following information, and then click Next:
o User name: Administrator
o Password: Pa55w.rd
o Domain: Adatum.com
31. On the Choose Restart Method page, select the Yes. Restart the selected computers after installing
the protection agent (if required) option, and then click Next.
32. On the Summary page, click Install. After installation is successful, click Close.
33. In System Center 2016 Data Protection Manager, in the details pane, point out that LON-SVR1
and LON-SVR2 are listed as unprotected computers with protection agents installed.
3. In the Create New Protection Group Wizard, on the Welcome to the New Protection Group Wizard
page, click Next.
4. On the Select protection group type page, point out that the Servers option is selected, mention
that DPM can also protect clients, and then click Next.
5. On the Select Group Members page, in the Available members pane, expand LON-SVR2, expand
HyperV, and then select the LON-PROD2 check box.
6. Expand All Shares, expand All Volumes, expand System Protection, and then explain that DPM can
protect all data sources.
Protecting a virtualization infrastructure by using Data Protection Manager 12-11
7. Expand LON-SVR1, expand HyperV, select the LON-PROD1 check box, and then click Next.
8. On the Select data protection method page, in the Protection group name field, type Hyper-V VMs,
and then click Next.
Note: Point out that you cannot select online protection and long-term tape protection,
and explain why you cannot select them.
9. On the Specify Short-Term Goals page, verify that Retention range is set to 5 days, and then click
Next.
10. On the Review Disk Storage Allocation page, discuss the allocation information, and then click
Next.
Note: Explain how changes are replicated from protected servers to DPM.
12. On the Consistency check options page, explain when and why DPM uses consistency checks, and
then click Next.
13. On the Summary page, click Create Group. After the group has been created, click Close.
14. In the details pane, point out that the Hyper-V VMs protection group is shown and that it contains
the LON-PROD1 and LON-PROD2 VMs.
Demonstration: Recovering a VM
Demonstration Steps
1. On LON-SVR1, on the taskbar, click Start and then click Server Manager. In Server Manager, click
Tools and then click Hyper-V Manager.
2. In Hyper-V Manager, in the navigation pane, point out that LON-SVR1 is selected. In the details
pane, point out that the LON-PROD2 VM is not present.
4. In the Browse pane, expand LON-SVR2, expand All Protected Hyper-V Data, and then click All
Protected Hyper-V Data.
5. In the Path pane in the lower part of the console, click LON-PROD2, and then on the ribbon click
Recover. The Recovery Wizard opens.
6. In the Recovery Wizard, on the Review Recovery Selection page, click Next.
7. On the Select Recovery Type page, select the Recover as virtual machine to any host option, and then
click Next.
8. On the Specify Destination page, click Browse, expand LON-SVR1, expand Volumes, click D:\, click
OK, and then click Next.
9. On the Specify Recovery Options page, point out the Network bandwidth usage throttling
option, explain why you would use it, and then click Next.
12. On LON-DPM, in the DPM Administrator Console, in the Recovery workspace, in the Browse pane,
expand LON-SVR1, and click All Protected Hyper-V Data.
13. In the Path pane in lower part of the console, double-click LON-PROD1.
14. In the Path pane, double-click D:\LON-PROD1\Virtual Hard Disks\LON-PROD1.vhd.
16. In the Path pane, click the EFI folder, and then on the ribbon click Recover.
17. In the Recovery Wizard, on the Review Recovery Selection page, click Next.
18. On the Select Recovery Type page, point out that the only single option, Copy to a network
folder, is available and selected, and then click Next.
19. On the Specify Destination page, click Browse, extend LON-SVR1, extend Volumes, click D:\, click
OK, and then click Next.
23. In File Explorer, in the navigation pane, click Allfiles (D:). In the details pane, point out most
recently modified folder that has GUID in its name, and then double-click the folder.
24. In the details pane, verify that the EFI folder is shown. Explain that this folder was recovered from VM
virtual hard disk by using item level recovery.
Protecting a virtualization infrastructure by using Data Protection Manager 12-13
Answer: No. You can create one protection group to protect both Hyper-V VMs and SQL Server
databases. However, separating these types of applications into separate protection groups
allows you to configure different schedules and protection settings for each type of protected
data.
Question: Compliancy standards require that your organization backups are stored offsite. Which DPM
protection methods can you use to achieve this goal?
Answer: You can use different DPM protection methods to achieve this goal. For example, you
can use D2D2T to create a copy of the protected data first on the DPM disk and then an
additional backup copy on tape, which can be stored offsite. You could also use D2D2D, where
your primary DPM server would be protected by a secondary DPM server. One of the possible
options is also to implement D2D2C protection, where data is stored on the DPM server, and in
the cloud, for example in Azure.
Question: Can you use DPM to protect data on a computer running Windows 10? Can you use DPM to
protect data on a Linux computer?
Answer: You can install the DPM protection agent on Windows 10, which means that the
computer running Windows 10 can be protected by the DPM server. You cannot install the DPM
protection agent on Linux, but if Linux is running in a VM on the Hyper-V host, you can use a
host-based backup to protect Linux VM.
12-14 Implementing a Software-Defined DataCenter
Answer: Windows Firewall on both servers was blocking the DPM server and prevented you from
installing DPM protection agents. When we added the rule to allow communication initiated by
the DPM server, we could install the agents by using the DPM Administrator Console.
Question: Can you install DPM protection agents on those servers by using manual installation?
Answer: Yes, you can install DPM protection agents manually. Manual installation is initiated on
the server and as part of the installation, the DPM protection agent configures Windows Firewall
to allow communication with DPM server.
Question: Can you configure online protection for a protection group if the DPM server is not registered
in the Azure Recovery Services vault?
Answer: No. To configure online protection, the Azure Backup Agent must be installed on the
DPM server and after that, you must register the DPM server in the Azure Recovery Services vault.