Hyper-V from Windows Server 2008 to Windows Server 2012, to Windows Server 2016, facilitates both private and public cloud advancements and leading market positions.
The introduction to Hyper-V, which was earlier translated by Windows Server 2016, has now been seen in the TP.
650) this.width=650; "title=" HV2016_VM "style=" border-left-0px; border-right-width:0px; Background-image:none; border-bottom-width:0px; padding-top:0px; padding-left:0px; padding-right:0px; border-top-width:0px "border=" 0 "alt=" HV2016_VM "src=" http://s3.51cto.com/wyfs02/M00/88/58/ Wkiol1fyltgijk6vaacclokksa8466.png "width=" "height=" 286 "/> 650" this.width=650 "title=" HV2016_VM "style=" border-left-0px; border-right-width:0px; Background-image:none; border-bottom-width:0px; padding-top:0px; padding-left:0px; padding-right:0px; border-top-width:0px "border=" 0 "alt=" HV2016_VM "src=" http://s3.51cto.com/wyfs02/M02/88/58/ Wkiol1fyltlr7p1yaacjlryrg2w299.png "width=" height= "286"/>
Add new hardware, have not seen legacy Network adapter, did the integration. While booting supports UEFI, it supports more features and provides better security.
650) this.width=650; "title=" HV2016_VM "style=" border-left-0px; border-right-width:0px; Background-image:none; border-bottom-width:0px; padding-top:0px; padding-left:0px; padding-right:0px; border-top-width:0px "border=" 0 "alt=" HV2016_VM "src=" http://s3.51cto.com/wyfs02/M01/88/5C/ Wkiom1fyltwh2zunaadhjjfu23g959.png "width=" "height=" 286 "/> 650" this.width=650; "title=" HV2016_VM "style=" border-left-0px; border-right-width:0px; Background-image:none; border-bottom-width:0px; padding-top:0px; padding-left:0px; padding-right:0px; border-top-width:0px "border=" 0 "alt=" HV2016_VM "src=" http://s3.51cto.com/wyfs02/M01/88/58/ Wkiol1fyltbwbavyaacvg0s-xlm706.png "width=" height= "286"/>
In order to protect virtual machines in a multitenant or hosted cloud, public cloud, and other scenarios, Hyper-V supports secure boot (available for Windows, Linux-capable), and Trusted Platform Compute module TPM. Due to well-known reasons, TPM is severely restricted domestically, and many azure services such as IoT Hub are also required and supported for TPM, and Microsoft is planning TPM 2.0 in the hope of reaching agreement.
To prevent virtual machines from being exported or migrated to places where there is a security risk, you can use the TPM to encrypt the state and migration traffic of the virtual machine. And you can do this further by enabling the Protect virtual machine.
There are some differences between protecting virtual machines and virtual machine protection with the TPM:
Ability |
Two-generation virtual machine encryption support |
second generation virtual machines be protected |
Secure Boot |
Supported, configurable |
Support, forcing |
VTPM |
Supported, configurable |
Support, forcing |
Encrypt VM State and live migration traffic |
Supported, configurable |
Support, forcing |
Integration components |
Configurable by Fabric admin |
Certain Integration components blocked (e.g. data exchange, PowerShell Direct) |
Virtual Machine Connection (Console), HID device (e.g. mouse keyboard) |
Open, cannot be closed |
Off, can open |
Serial |
Support |
Off, can open |
Debugger Debugging Virtual Machine process |
Support |
Off, can open |
Refer specifically to "shielded VMs and guarded Fabric Deployment guide for Windows Server tp5_8_19.docx"
650) this.width=650; "title=" HV2016_VM "style=" border-left-0px; border-right-width:0px; Background-image:none; border-bottom-width:0px; padding-top:0px; padding-left:0px; padding-right:0px; border-top-width:0px "border=" 0 "alt=" HV2016_VM "src=" http://s3.51cto.com/wyfs02/M01/88/58/ Wkiol1fyltjxnqeiaaczrvgrubk415.png "width=" "height=" 286 "/> 650" this.width=650; "title=" HV2016_VM "style=" border-left-0px; border-right-width:0px; Background-image:none; border-bottom-width:0px; padding-top:0px; padding-left:0px; padding-right:0px; border-top-width:0px "border=" 0 "alt=" HV2016_VM "src=" http://s3.51cto.com/wyfs02/M02/88/5C/ Wkiom1fyltmhyko9aab6vdlzhoy924.png "width=" height= "286"/>
On the processor side, virtual machines are supported to migrate between heterogeneous CPU physical hosts, enabling the use of NUMA architectures to group Vcpus and memory on the virtualization layer, and to associate with sockets for better performance.
650) this.width=650; "title=" HV Shield "style=" border-left-0px; border-right-width:0px; Background-image:none; border-bottom-width:0px; padding-top:0px; padding-left:0px; padding-right:0px; border-top-width:0px "border=" 0 "alt=" HV Shield "src=" http://s3.51cto.com/wyfs02/M02/88/58/ Wkiol1fyltmzuqusaacv-bni7p0412.png "width=" 296 "height=" 288 "/> 650" this.width=650; "title=" HV2016_VM "style=" border-left-0px; border-right-width:0px; Background-image:none; border-bottom-width:0px; padding-top:0px; padding-left:0px; padding-right:0px; border-top-width:0px "border=" 0 "alt=" HV2016_VM "src=" http://s3.51cto.com/wyfs02/M00/88/58/ Wkiol1fyltvhlgpyaadkmky49y8044.png "width=" height= "286"/>
To use the Aegis virtual machine (haha, shielded protected virtual machine), you need to enable the Bitlocker,ad DS command line tool to enhance the system functions such as storage.
Previously mentioned production checkpoints (similar to snapshots), you can take advantage of backup technology to retain data only without retaining application information. More new features to be released after further study.
Sip some new features of Windows Server 2016--hyper-v