Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

How Hyper-V is used

2025-01-16 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Servers >

Share

Shulou(Shulou.com)05/31 Report--

This article is about how Hyper-V is used. The editor thinks it is very practical, so share it with you as a reference and follow the editor to have a look.

The use effect of Hyper-V role in Windows Server 2008 system is very obvious. The installation of Hyper-V in Windows Server 2008 is relatively simple, just follow the clue to find it. However, for Hyper-V to really work, we still need to do a series of configurations on Windows Server 2008 before we can manage it remotely.

Here are the brief steps to configure the remote administration Hyper-V role on a server with WIndows Server 2008 fully installed:

1. Enable firewall rules for Windows Management Instrumentation. At the elevated command prompt, type:

Netsh advfirewall firewall set rule group= "Windows Management

Instrumentation (WMI) "new enable=yes

If the following message is returned, "4 rules have been updated. Success." Indicates that the command was executed successfully.

Note that to check whether the command was executed successfully, you can view the results in the Advanced Security Windows Firewall. To do this, click start, click Control Panel, switch to Classic view (if you are not using that view), click Administrative tools, and then click Advanced Security Windows Firewall. Select the inbound or outbound rule and sort by the Group column. Three inbound rules and one outbound rule should be enabled for Windows Management Instrumentation.

Click start, click start search, and then type azman.msc. When prompted to confirm the action, click continue. The Authorization Manager Microsoft Management console (MMC) snap-in opens.

In the navigation pane, right-click Authorization Manager, and then click Open Authorization Store. Make sure XML File is selected. Browse to the% system drive%\ Program Data\ Microsoft\ Windows\ Hyper-V folder, select InitialStore.xml, click Open, and then click OK.

It should be noted that by default, the program data folder is a hidden folder. If the folder is not visible, type:

\ ProgramData\ Microsoft\ Windows\ Hyper-V\

Initalstore.xml

In the navigation pane, click Hyper-V Services, and then click role assignment. Right-click administrators, point to assign users and groups, and then point to from Windows and Active Directory. In the Select user, computer, or Group dialog box, type the domain name and user name of the user account, and then click OK.

5. Close Authorization Manager.

6. The next step is to add remote users to the Distributed COM Users group to provide them with access. Click start, point to Administrative tools, and then click computer Management. If user account Control is enabled, click continue. Component Services opens.

Expand Local users and groups, and then click groups. Right-click Distributed COM Users, and then click add to Group.

8. In the Distributed COM Users Properties dialog box, click add.

9. In the Select user, computer, or Group dialog box, type the user name, and then click OK.

Click OK again to close the Distributed COM Users Properties dialog box. Turn off component Services.

The remaining steps will provide remote users with the WMI permissions they need to access two namespaces: the CIMV2 namespace and the virtualized namespace. Click start, click Administrative tools, and then click computer Management.

In the navigation pane, click Services and applications, right-click WMI controls, and then click Properties.

Click the Security tab, click Root, and then click CIMV2. Under the list of namespaces, click Security.

In the "ROOT\ CIMV2 Security" dialog box, check to see if the appropriate users are listed. Otherwise, click add. In the Select user, computer, or Group dialog box, type the user name, and then click OK.

On the Security tab, select the user name. Under the permissions of, click Advanced. On the permissions tab, verify that the desired user is selected, and then click Edit. In the permission entries for CIMV2 dialog box, follow these instructions to modify three settings:

For applicable objects, select this namespace and subnamespace.

In the permissions list, in the allow column, select the remote enable check box.

Under the permissions list, select the apply these permissions only to objects and / or containers in this container check box.

Click OK in each dialog box until you return to the WMI Control Properties dialog box.

17. Next, repeat the steps to virtualize the namespace. Scroll down if necessary until you see the virtualization namespace. Click Virtualization. Under the list of namespaces, click Security.

In the "ROOT\ virtualization Security" dialog box, check to see if the appropriate users are listed. Otherwise, click add. In the Select user, computer, or Group dialog box, type the user name, and then click OK.

On the Security tab, select the user name. Under the permissions of, click Advanced. On the permissions tab, verify that the desired user is selected, and then click Edit. In the Virtualized permission entries dialog box, modify three settings as follows:

For applicable objects, select this namespace and subnamespace.

In the permissions list, in the allow column, select the remote enable check box.

Under the permissions list, select the apply these permissions only to objects and / or containers in this container check box.

Click OK in each dialog box, and then close computer Management.

Restart the server to apply changes to the authorization policy.

After the above configuration, it is convenient to manage the Hyper-V server remotely with Windows Server 2008.

Thank you for reading! This is the end of the article on "how Hyper-V is used". I hope the above content can be of some help to you, so that you can learn more knowledge. if you think the article is good, you can share it for more people to see!

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Servers

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report