Archive for March, 2009

Get on the Bus!

March 26, 2009 Leave a comment
( from Ken Rosen )

For those of you in the U.S. (and for your students in the U.S.), here’s a great opportunity to get to TechEd and have a fun, unique experience along the way:

My team is hitting the road, hoping to meet up with those of you along our route!

Are you proud of your MCP/MCT status? Do you want to win a free trip to Tech·Ed 2009?

Enter the Microsoft Learning Get on the Bus contest and you could display your pride and attend Tech·Ed for free!

We are seeking six MCT/MCPs passionate about Microsoft certification to join us on the Career Express bus. MCPs who attend the events in Atlanta, Philadelphia, Kansas City, Denver, Phoenix, and Las Vegas will have the chance to compete to win a seat on the bus and a free trip to Tech·Ed 2009 in Los Angeles with the Microsoft Learning Community team.

Get on the Bus winners join the Career Express in their city and accompany the Microsoft Learning crew as we stop to visit with the Microsoft Learning community along the way. We will blog, Twitter, video blog, and have a great time! If you can’t join the trip, then come out and meet us along the route!

Want to join us? Register here:

More info here:

Hope to see you along the way!


Note from me:

I am a MCT and I would like to say that this is really a great idea and I could list at least 4 reasons for the MCT’s to join:
– share their experience about certifications and about teaching Microsoft courses with Microsoft staff, Microsoft CPLS, other’s MCT’s, Students;
– Learn about how to improve their certifications;
– Have fun along the trip;
– Teched

I expect that this promo could be extended to others countries.

Edvaldo Alessandro Cardoso
MCT | MVP : Virtual Machine
blog pt-BR :
blog en-AU:

Categories: Microsoft

SCVMM R2 : New Features

March 25, 2009 Leave a comment

New features in R2 include:

·         Support for Live Migration: With Windows 2008 R2 adding support for Live migration, it’s now added as a new migration option in VMM R2. Live migration requires the source and destination host to be part of a failover cluster and that the VM is on a shared storage.  Live migration means that there is no user perceived downtime;  since the VM’s memory pages are being transferred, the hosts’ processors need to be the same (manufacturer and processor architecture). Our competition claims that Vmotion doesn’t require clustering but this only works for planned downtime and not for unplanned downtime. By combining Live migration and clustering, Hyper-V addresses both planned and unplanned downtime.

·         Multiple VMs per LUN:  VMM 2008 didn’t allow placing multiple VMs per LUN even though Hyper-V allowed it and the reason was that the LUN ownership was on a per host basis. This meant that migrating any VM on that shared LUN would result in all other VMs being migrated as well which can result in a confusing user experience (I’ve blogged about this at length).  With CSV (Clustered Shared Volumes) in Windows 2008 R2, a single LUN is accessible by all hosts within a cluster. This enables a VM that’s on a shared LUN to be migrated without affecting other VMs on that LUN. As a result, with VMM R2, we’ll allow multiple VMs to be placed on the same LUN if CSV is enabled on the cluster.

·         SAN related enhancements:  We’ve done a number of SAN related enhancements in VMM R2.

o   SAN migration in and out of clusters: With VMM R2, you can migrate a VM from one cluster to another or from a standalone host into a cluster or vice versa. Especially useful when you are deploying a VM from a test cluster to a production one.

o   Multiple LUNs per single iSCSI target: VMM 2008 supported only initiator-based iSCSI target connection, which allows only one LUN per iSCSI target. VMM 2008 R2 adds support for masking-based target connections, which allows multiple LUNs per iSCSI target and expands VMM support for iSCSI SAN providers. This implies that we have better support for iSCSI products from Network Appliance and EMC for example.

·         Network related enhancements:

o   Network Optimization

§  Win2k8 R2 supports 2 types of network optimizations: VMQ & Chimney

§  During VM creation you can enable/disable network optimization

§  If enabled, VMM will configure the VM to use VMQ or Chimney, if available on the host

§  During placement, VMM R2 detects and shows availability of Network optimization on the host

o   Some workloads such as Network load balancers need to be able to spoof MACs: There’s a new setting that allows admin to enable/Disable MAC spoofing on a per VM basis

o   Ability to reuse port groups defined in VMWare VirtualCenter

§  In VMM 2008, port groups were always created even if the admin had already created them on the host.

§  In VMM R2, the admin is allowed to pick an available port group that’s already defined.

·         Maintenance mode

o   For servicing a host, VMM R2 allows host to be put in maintenance mode: When you do this,  all VMs on that host that are running are live migrated off the host to avoid downtime.

§  Admin can choose to save state VMs if host is not part of a cluster

o   During placement, a Host that’s in maintenance mode gets zero star ratings. This also p-prevents PRO from picking this host when migrating VMs.

o   Maintenance mode is supported for Hyper-V, VS and VMWare ESX hosts

·         Support for Disjoint domains:  When a host has different FQDN in AD and DNS, it’s said to be in a disjoint domain. For example: server name is foo and FQDN in AD is and FQDN in DNS is  For Kerberos authentication to work, SPN needs to be created for DNS Name

o   VMM 2008 required custom SPN to be manually configured in AD

o   VMM 2008 R2 automatically creates custom SPN for DNS name. (AD needs to be configured to give permissions to VMM for SPN read/write permissions)

As  you can see, there are a number of enhancements we’ve introduced in R2 along with fixing some important issues reported by customers and partners. We are not done yet! In addition to responding to more feedback from beta testers, there are a few more features in the pipeline for post Beta so stay tuned.

Download the beta here and keep the feedback rolling in!

Categories: Virtualization

Get Internet Explorer 8 NOW

March 20, 2009 Leave a comment


Microsoft released the Internet Explorer  8.   Get it at


Some new features in Internet Explorer 8 include:

·         Accelerators. Accelerators give people easy access to the online services they care about most from any page they visit and allow users to browse faster by eliminating most of the clicks required to access desired content and services.

·         Web Slices. With Web Slices, people can see the information they want to see most often without going away from the page they are on. Appearing in the Favorite bar, users can identify Web Slices with updates when in bold and they can see a rich Web Slice visualization of their content with access back to the source Web page.

·         Instant Search Box. The enhanced Instant Search Box in Internet Explorer 8 is more helpful, making it easier for people to find content of interest and increasing the relevancy of search results. As users type a search term, they can see real-time search suggestions, including images and rich text, from their chosen search provider.

·         Smart Address Bar. Provides matches as the user types across History and Favorites searching against all parts of the URL string (and the page title) instead of just the beginning. Allows mistyped entries to be removed from the Address Bar.

·         Enhanced Tabbed Browsing.  Tabs are grouped and color-coded so people can quickly discern which are related. It is easy to group or ungroup tabs or reopen closed tabs.

·         Performance improvements. We’ve reduced the time that people must wait when starting the browser, opening a “new tab” and loading a page.

·         SmartScreen Filter. Built upon the Microsoft Phishing Filter, the SmartScreen Filter helps protect against a broader set of phishing threats and helps protect from sites that attempt to download malicious software. The SmartScreen Filter is now easier to use with enhanced user interface and warning messages to reduce users’ click-through to confirmed sites.

·         Domain Highlighting. Internet Explorer 8 highlights the domain name of the URL string in the Address Bar in bold text, making it easier for people to tell which site they are on and aid them in identifying phishing sites and other deceptive sites. The domain name is in black, standing out from other characters in the URL, which are gray.

·         Cross-Site Scripting filter. Helps protect users and systems from attacks that can lead to information disclosure, cookie stealing, account/identity theft or otherwise masquerading as the user without permission.

  • InPrivate. InPrivate helps to protect people’s data and privacy from being retained locally on the PC they are using. This protects against third parties who might be in a position to track their online activities.  The consumer has the ability to use either of the features (InPrivate Browsing or InPrivate Filtering) independently.
    • InPrivate Browsing. When activated, InPrivate Browsing helps ensure that History, temporary Internet files and cookies are not recorded on a PC after browsing. When in InPrivate Browsing, toolbars and extensions are automatically disabled and browsing History is automatically deleted when the browser is closed.
    • InPrivate Filtering. InPrivate Filtering helps protect privacy by enabling the consumer to block content coming from third parties that are in a position to track and aggregate their online behavior. Users are provided with notice, choice and control of which third parties to allow and which ones to block.

For a comprehensive look at the features in Internet Explorer 8, please see the fact sheet available here:


Windows 7 beta includes a pre-release candidate version of Internet Explorer 8 that is specifically optimized for Windows 7.  Windows 7 enables unique features and functionality in Internet Explorer 8 including Windows Touch and Jump Lists which require additional product tests to ensure we are providing the best Windows experience for our customers. We will continue to update the version of Internet Explorer 8 running on Windows 7 as the development cycles of Windows 7 progress.

Categories: Microsoft

Hyper-V Remote management tools packages

March 20, 2009 Leave a comment

The Hyper-V management tools are available separately to allow remote management of a server running Hyper-V. Packages are available to install the tools on Windows Vista with Service Pack 1 (SP1) and on 32-bit editions of Windows Server 2008. The following download packages are available:

· For 64-bit editions of Windows Vista with SP1, see

· For 32-bit editions of Windows Vista with SP1, see

· For 32-bit editions of Windows Server 2008, see


The remote management tools update package for the 32-bit editions of Windows Server 2008 is a permanent package. Once you install the update package, you cannot remove it.

For instructions about installing the tools, see Install and Configure Hyper-V Tools for Remote Administration.

Categories: Uncategorized

Antivirus and Hyper-V : Things you need to do before

March 20, 2009 Leave a comment

Antivirus and Hyper-V (or: Why can’t I start my virtual machine?)

A little while ago our support team put together this KB article in response to a problem that a lot of people have been reporting.  Basically, what is happening is that users are having problems starting virtual machines after they install antivirus software in the management operating system.  The root cause of the problem is that a number of these programs monitor file access in a way that interferes with Hyper-V’s attempts to open virtual machine files.  If you see this problem – you have two options:

  1. Don’t install antivirus.  Now – before you choke on your coffee or get your pitch-forks – listen to me for a moment.  If you are running a server core configuration, or a full server configuration, and you have nothing running in the management operating system other than Hyper-V, and you do not have people logging in and browsing the web in the management partition, etc… Then you do not really need to have antivirus software installed as there is limited risk of a virus.
  2. Install antivirus and set up the following exclusions (most antivirus programs allow you to exclude specific directories, files and processes from scanning to help deal with issues such as these):
    • Default virtual machine configuration directory (Normally this is C:ProgramDataMicrosoftWindowsHyper-V)
    • Custom virtual machine configuration directories
    • Default virtual hard disk directory (Normally this is C:UsersPublicDocumentsHyper-VVirtual Hard Disks)
    • Custom virtual hard disk directories
    • Snapshot directories
    • Vmms.exe
    • Vmwp.exe

Then everything should be just fine.

Published Tuesday, March 17, 2009 3:05 PM by Virtual PC Guy

Categories: Virtualization

Hyper-V Storage considerations for Backup Strategy

March 20, 2009 5 comments

As you plan your backup strategy, consider the compatibility between the storage and backup solutions:

·      Virtual hard disks. These offer the best compatibility and can be stored on many types of physical media. For more information about the types of storage you can use with Hyper-V, see Hardware Considerations.

·      Physical disks that are directly attached to a virtual machine. These disks cannot be backed up by the Hyper-V VSS writer. As a result, this type of disk will not be included in any backup performed by a backup program that uses the Hyper-V VSS writer. In this situation, you would need to use some other process to back up the physical disk, such as running a backup application within the guest operating system.

·      iSCSI-based storage. This storage is supported for backup by the Hyper-V VSS writer when the storage is connected through the management operating system and the storage is used for virtual hard disks.

·      Storage accessed from a virtual machine by using an Internet SCSI (iSCSI) initiator within the guest operating system. This storage will not be included in a backup of the physical computer. In this scenario, you must use another process to back up the data from the iSCSI-based storage before you perform a full server backup. For example, you could run a backup of the data on the iSCSI storage from a backup application running in the guest operating system.

For more information about deploying storage for Hyper-V, see Implementing Disks and Storage.

Categories: Uncategorized

Hyper-V Planning and Deployment Guide

March 20, 2009 Leave a comment
Microsoft Updated the Hyper-V Planning and Deployment Guide

Significant additions for this release include details on planning for:

  • Security
  • Authorization policy
  • Backup / recovery
  • Advanced networking options

Categories: Virtualization