This document discusses configuring user roles and the VMM self-service portal. It covers creating user roles in VMM 2008 R2, installing and configuring the self-service portal, and considerations for implementing it. A demonstration shows how to create a user role and configure access to the portal. The goal is to allow specific groups like a research department to deploy and manage their own virtual machines.
This is a presentation for Volley library for android.It is developed by google .You will learn how to use it and types of request that is supported by it.You will know about priorities of request and how to set tag for Get request for example and how to cancel it.Besides that you will learn how to set time out and configure RetryPolicy for tour request.Finally you will learn about Error Handling for Volley
The document discusses the Membership API in .NET, which provides functionality for user authentication and authorization. It notes that Membership has been part of ASP.NET since the beginning and is provider-based so it can be configured to work with different data stores. It also discusses how Membership can be used not only in web applications but also in desktop applications, web services, and AJAX applications with some additional configuration.
CloudStack-UI at the JAX London СonferenceOlga Nikienko
On 11th of October at the JAX conference the Bitworks team has introduced the CloudStack-UI product. Our development team leader Ilya Zolotukhin performed at the Cloud And Modern Infrastructure track.
In this quality assurance training, you will learn Selenium - WebDriver. Topics covered in this session are:
• Test Strategy and Planning
• Test Strategy Document
• Test Planning
• Test Estimation Techniques
For more information, visit this link: https://www.mindsmapped.com/courses/quality-assurance/software-testing-training-beginners-and-intermediate-level/
This document provides an overview and introduction to the webOS platform. It discusses the webOS architecture including application architecture using stages and scenes. It covers building a basic "Destroy World" app using the command line tools. It also discusses the webOS emulator, advanced APIs like camera, storage and accelerometer access. Finally it discusses submitting apps to the webOS app catalog and a promotion for hot new apps.
Sahi is an open source automation tool for testing web applications that was started in 2005. It uses an easy to use recorder to create tests with no need for XPaths or waits. Sahi scripts can work with AJAX, Web 2.0 technologies, and agile methodologies. The tool supports version control, refactoring, and continuous integration.
This is a lightning presentation given by Gorkey Vemulapalli to our team introducing the basics of Palm's new WebOS platform being used on the Palm Pre device.
This is a presentation for Volley library for android.It is developed by google .You will learn how to use it and types of request that is supported by it.You will know about priorities of request and how to set tag for Get request for example and how to cancel it.Besides that you will learn how to set time out and configure RetryPolicy for tour request.Finally you will learn about Error Handling for Volley
The document discusses the Membership API in .NET, which provides functionality for user authentication and authorization. It notes that Membership has been part of ASP.NET since the beginning and is provider-based so it can be configured to work with different data stores. It also discusses how Membership can be used not only in web applications but also in desktop applications, web services, and AJAX applications with some additional configuration.
CloudStack-UI at the JAX London СonferenceOlga Nikienko
On 11th of October at the JAX conference the Bitworks team has introduced the CloudStack-UI product. Our development team leader Ilya Zolotukhin performed at the Cloud And Modern Infrastructure track.
In this quality assurance training, you will learn Selenium - WebDriver. Topics covered in this session are:
• Test Strategy and Planning
• Test Strategy Document
• Test Planning
• Test Estimation Techniques
For more information, visit this link: https://www.mindsmapped.com/courses/quality-assurance/software-testing-training-beginners-and-intermediate-level/
This document provides an overview and introduction to the webOS platform. It discusses the webOS architecture including application architecture using stages and scenes. It covers building a basic "Destroy World" app using the command line tools. It also discusses the webOS emulator, advanced APIs like camera, storage and accelerometer access. Finally it discusses submitting apps to the webOS app catalog and a promotion for hot new apps.
Sahi is an open source automation tool for testing web applications that was started in 2005. It uses an easy to use recorder to create tests with no need for XPaths or waits. Sahi scripts can work with AJAX, Web 2.0 technologies, and agile methodologies. The tool supports version control, refactoring, and continuous integration.
This is a lightning presentation given by Gorkey Vemulapalli to our team introducing the basics of Palm's new WebOS platform being used on the Palm Pre device.
The document introduces the concept of a Web Operating System (WebOS) which aims to provide common services like input/output, communication, storage, and resource management for applications distributed across a wide area network like the Internet. It discusses how WebOS would allow discovery of remote resources, execution of processes remotely, and provide a global namespace and file system for distributed applications in a secure manner. Examples of potential WebOS applications like an Internet chat application are also presented.
Sahi is a web automation tool that has been in use since 2005. It allows testers to automate tests across browsers and operating systems using simple scripts. Key features include cross-browser recording and playback, automatic waits to prevent test failures, and APIs that identify web objects in a robust way without relying on element IDs or XPaths. Sahi also enables faster testing through features like parallel test execution and integrated reporting.
Authentication and Authorization in Asp.NetShivanand Arur
This presentation gives a little information about Why Security is important, then moving towards understanding about Authentication and Authorization and its various ways
1. Forms Authentication
2. Windows Authentication
3. Passport Authentication
PhantomJS is a headless WebKit scriptable with JavaScript API that allows testing and automating web pages without requiring a browser to be displayed. It renders pages and outputs the results, supporting many test frameworks. PhantomJS can capture screenshots, monitor network performance, and automate tasks like testing, page scraping, and generating images/charts from websites. It works across platforms and provides a fast, native implementation of web standards without emulation.
The document discusses various web security topics such as SQL injection, cross-site scripting (XSS), cross-site request forgery (CSRF), and parameter tampering. It provides examples of these vulnerabilities and methods to prevent them, including input validation, output encoding, anti-forgery tokens, and limiting exposed functionality. The document is intended as an educational guide on common web security issues and best practices.
RequireJS is an asynchronous script loader that supports organizing JavaScript code into modular files and dependencies. It allows parallel downloading of scripts and lazy loading of modules. RequireJS uses AMD to define modules so that modules and dependencies can be loaded asynchronously in any order but executed correctly. It differs from Sprockets in that RequireJS supports asynchronous loading while Sprockets concatenates files.
This document discusses monitoring and reporting virtualization using System Center Virtual Machine Manager (VMM) 2008 R2 and System Center Operations Manager. It covers viewing and managing job status in VMM, integrating Operations Manager with VMM to enable reporting and monitoring capabilities, and configuring performance and resource optimization (PRO) in VMM using Operations Manager data. A lab is included to practice configuring the integration between VMM and Operations Manager and validating PRO configuration.
This document discusses creating and managing virtual machines using System Center Virtual Machine Manager 2008 R2. It covers creating new VMs, converting physical servers to VMs, converting and migrating existing VMs, and cloning VMs. Demonstrations show how to create and place new VMs, deploy VMs from a library, perform conversions between VM formats, and migrate VMs between hosts and storage.
This document provides an overview and summary of a training module on evaluating and planning for virtualization using Microsoft technologies. It covers evaluating current environments for virtualization suitability, planning server virtualization with Hyper-V, and managing virtual environments with System Center products. Key topics include virtualization challenges, modes, server and desktop virtualization, and planning storage, networks and availability for virtual machines.
This document provides an overview and instructions for integrating Microsoft System Center Virtual Machine Manager 2008 R2 with Hyper-V R2. It discusses planning the VMM implementation, installing the VMM server and console, and managing hosts and host groups. Key topics covered include system requirements, new features in VMM 2008 R2, considerations for planning the VMM database and library, installing VMM components, and adding and configuring host groups.
This document provides an overview of backup and restore strategies for virtual machines using various Microsoft technologies. It discusses options for backing up virtual machines and the VMM database using Windows Server Backup, and implementing Data Protection Manager 2007 SP1 to back up the Hyper-V infrastructure. The document includes demonstrations of backing up and restoring virtual machines, the VMM database, and using DPM 2007 SP1 for virtual machine backups.
This document discusses implementing high availability for server virtualization. It covers failover clustering options with Hyper-V, including requirements, implementation, and demonstrations. It also covers implementing high availability with Virtual Machine Manager (VMM) 2008 R2, including planning, host cluster configuration, and a demonstration of clustering in VMM. A lab exercise provides instructions for installing and configuring failover clustering, live migration, and host clustering in VMM.
This document provides an overview and lessons on creating and configuring virtual hard disks and virtual machines in Hyper-V. It covers storage options for virtual machines, different types of virtual disks, virtual machine components, demonstrations on creating VMs and snapshots, and guidelines for planning and designing VMs for applications like SQL Server and Exchange Server.
This document provides an overview of installing and configuring the Hyper-V R2 server role. It discusses installing Hyper-V on Windows Server 2008, configuring virtual networks, and considerations for virtual network types and VLAN configurations. Hands-on demonstrations are provided for installing Hyper-V, configuring user settings, virtual networks, and VLAN support.
This document discusses maintaining software updates for offline virtual machines using the Offline Virtual Machine Servicing Tool. It provides an overview of the tool, how it works, and infrastructure requirements. It also covers configuring WSUS and the tool, creating and running servicing jobs, and includes demonstrations of key tasks.
This document provides an overview of managing virtual machines using Virtual Machine Manager 2008. It discusses creating and managing checkpoints for virtual machines. The first lesson covers tasks for operating and managing VMs like starting, stopping, pausing, saving state. It also discusses deploying, migrating, and storing VMs. The second lesson explains what a VM checkpoint is and considerations for using them. It includes demonstrations of creating, managing, and restoring checkpoints. The lab exercises guide learners through operating a VM, modifying properties, and managing checkpoints using VMM 2008.
This document provides an overview of implementing Remote Desktop Services (RDS) role services including the Remote Desktop Session Host, Remote Desktop Connection Broker, and Remote Desktop Virtualization Host roles. It covers planning, installing, and configuring these roles to provide users remote access to session-based desktops, applications, and virtual desktops from centralized servers. The document also includes demonstrations of configuring these roles and a lab exercise to implement RDS in a scenario.
This document provides an overview of configuring and managing the VMM library. It discusses the VMM library server and resources, hardware and guest operating system profiles, virtual machine templates, and high availability options. Demonstrations are provided on adding library servers and shares, creating profiles and templates, and configuring failover clustering for high availability of the library server.
If you want to see and learn the future of service delivery and automation, you should definitively join this session to see how you can leverage new technology like network virtualization with GRE (NVGRE) and self-service deployment of complex workloads with Windows Azure Pack. Automation is key to maximize your investment in Windows Server and System Center, which Windows Azure Pack is all about. This session is tailored at service providers, enterprises and for the general public who wants to learn more about the future of cloud computing
This document discusses securing Microsoft Exchange Server 2010. It covers configuring role-based access control (RBAC) to define permissions for administrators and users. It also discusses securing server roles and internet access. Demonstrations show how to configure custom RBAC role groups, the Threat Management Gateway for Outlook Web App, and a lab exercise for securing an Exchange deployment.
CTU June 2011 - Microsoft System Center Virtual Machine Manager 2012Spiffy
The document discusses Microsoft System Center Virtual Machine Manager 2012. It summarizes the key features and capabilities of SCVMM 2012 including fabric management, deployment and upgrade processes, dynamic optimization, private clouds, self-service user roles, and integration with public clouds like Windows Azure. The presentation includes demonstrations of building and delegating private clouds with SCVMM 2012.
The document introduces the concept of a Web Operating System (WebOS) which aims to provide common services like input/output, communication, storage, and resource management for applications distributed across a wide area network like the Internet. It discusses how WebOS would allow discovery of remote resources, execution of processes remotely, and provide a global namespace and file system for distributed applications in a secure manner. Examples of potential WebOS applications like an Internet chat application are also presented.
Sahi is a web automation tool that has been in use since 2005. It allows testers to automate tests across browsers and operating systems using simple scripts. Key features include cross-browser recording and playback, automatic waits to prevent test failures, and APIs that identify web objects in a robust way without relying on element IDs or XPaths. Sahi also enables faster testing through features like parallel test execution and integrated reporting.
Authentication and Authorization in Asp.NetShivanand Arur
This presentation gives a little information about Why Security is important, then moving towards understanding about Authentication and Authorization and its various ways
1. Forms Authentication
2. Windows Authentication
3. Passport Authentication
PhantomJS is a headless WebKit scriptable with JavaScript API that allows testing and automating web pages without requiring a browser to be displayed. It renders pages and outputs the results, supporting many test frameworks. PhantomJS can capture screenshots, monitor network performance, and automate tasks like testing, page scraping, and generating images/charts from websites. It works across platforms and provides a fast, native implementation of web standards without emulation.
The document discusses various web security topics such as SQL injection, cross-site scripting (XSS), cross-site request forgery (CSRF), and parameter tampering. It provides examples of these vulnerabilities and methods to prevent them, including input validation, output encoding, anti-forgery tokens, and limiting exposed functionality. The document is intended as an educational guide on common web security issues and best practices.
RequireJS is an asynchronous script loader that supports organizing JavaScript code into modular files and dependencies. It allows parallel downloading of scripts and lazy loading of modules. RequireJS uses AMD to define modules so that modules and dependencies can be loaded asynchronously in any order but executed correctly. It differs from Sprockets in that RequireJS supports asynchronous loading while Sprockets concatenates files.
This document discusses monitoring and reporting virtualization using System Center Virtual Machine Manager (VMM) 2008 R2 and System Center Operations Manager. It covers viewing and managing job status in VMM, integrating Operations Manager with VMM to enable reporting and monitoring capabilities, and configuring performance and resource optimization (PRO) in VMM using Operations Manager data. A lab is included to practice configuring the integration between VMM and Operations Manager and validating PRO configuration.
This document discusses creating and managing virtual machines using System Center Virtual Machine Manager 2008 R2. It covers creating new VMs, converting physical servers to VMs, converting and migrating existing VMs, and cloning VMs. Demonstrations show how to create and place new VMs, deploy VMs from a library, perform conversions between VM formats, and migrate VMs between hosts and storage.
This document provides an overview and summary of a training module on evaluating and planning for virtualization using Microsoft technologies. It covers evaluating current environments for virtualization suitability, planning server virtualization with Hyper-V, and managing virtual environments with System Center products. Key topics include virtualization challenges, modes, server and desktop virtualization, and planning storage, networks and availability for virtual machines.
This document provides an overview and instructions for integrating Microsoft System Center Virtual Machine Manager 2008 R2 with Hyper-V R2. It discusses planning the VMM implementation, installing the VMM server and console, and managing hosts and host groups. Key topics covered include system requirements, new features in VMM 2008 R2, considerations for planning the VMM database and library, installing VMM components, and adding and configuring host groups.
This document provides an overview of backup and restore strategies for virtual machines using various Microsoft technologies. It discusses options for backing up virtual machines and the VMM database using Windows Server Backup, and implementing Data Protection Manager 2007 SP1 to back up the Hyper-V infrastructure. The document includes demonstrations of backing up and restoring virtual machines, the VMM database, and using DPM 2007 SP1 for virtual machine backups.
This document discusses implementing high availability for server virtualization. It covers failover clustering options with Hyper-V, including requirements, implementation, and demonstrations. It also covers implementing high availability with Virtual Machine Manager (VMM) 2008 R2, including planning, host cluster configuration, and a demonstration of clustering in VMM. A lab exercise provides instructions for installing and configuring failover clustering, live migration, and host clustering in VMM.
This document provides an overview and lessons on creating and configuring virtual hard disks and virtual machines in Hyper-V. It covers storage options for virtual machines, different types of virtual disks, virtual machine components, demonstrations on creating VMs and snapshots, and guidelines for planning and designing VMs for applications like SQL Server and Exchange Server.
This document provides an overview of installing and configuring the Hyper-V R2 server role. It discusses installing Hyper-V on Windows Server 2008, configuring virtual networks, and considerations for virtual network types and VLAN configurations. Hands-on demonstrations are provided for installing Hyper-V, configuring user settings, virtual networks, and VLAN support.
This document discusses maintaining software updates for offline virtual machines using the Offline Virtual Machine Servicing Tool. It provides an overview of the tool, how it works, and infrastructure requirements. It also covers configuring WSUS and the tool, creating and running servicing jobs, and includes demonstrations of key tasks.
This document provides an overview of managing virtual machines using Virtual Machine Manager 2008. It discusses creating and managing checkpoints for virtual machines. The first lesson covers tasks for operating and managing VMs like starting, stopping, pausing, saving state. It also discusses deploying, migrating, and storing VMs. The second lesson explains what a VM checkpoint is and considerations for using them. It includes demonstrations of creating, managing, and restoring checkpoints. The lab exercises guide learners through operating a VM, modifying properties, and managing checkpoints using VMM 2008.
This document provides an overview of implementing Remote Desktop Services (RDS) role services including the Remote Desktop Session Host, Remote Desktop Connection Broker, and Remote Desktop Virtualization Host roles. It covers planning, installing, and configuring these roles to provide users remote access to session-based desktops, applications, and virtual desktops from centralized servers. The document also includes demonstrations of configuring these roles and a lab exercise to implement RDS in a scenario.
This document provides an overview of configuring and managing the VMM library. It discusses the VMM library server and resources, hardware and guest operating system profiles, virtual machine templates, and high availability options. Demonstrations are provided on adding library servers and shares, creating profiles and templates, and configuring failover clustering for high availability of the library server.
If you want to see and learn the future of service delivery and automation, you should definitively join this session to see how you can leverage new technology like network virtualization with GRE (NVGRE) and self-service deployment of complex workloads with Windows Azure Pack. Automation is key to maximize your investment in Windows Server and System Center, which Windows Azure Pack is all about. This session is tailored at service providers, enterprises and for the general public who wants to learn more about the future of cloud computing
This document discusses securing Microsoft Exchange Server 2010. It covers configuring role-based access control (RBAC) to define permissions for administrators and users. It also discusses securing server roles and internet access. Demonstrations show how to configure custom RBAC role groups, the Threat Management Gateway for Outlook Web App, and a lab exercise for securing an Exchange deployment.
CTU June 2011 - Microsoft System Center Virtual Machine Manager 2012Spiffy
The document discusses Microsoft System Center Virtual Machine Manager 2012. It summarizes the key features and capabilities of SCVMM 2012 including fabric management, deployment and upgrade processes, dynamic optimization, private clouds, self-service user roles, and integration with public clouds like Windows Azure. The presentation includes demonstrations of building and delegating private clouds with SCVMM 2012.
SIM204-What's Coming in Virtual Machine Manager 2012?Lai Yoong Seng
In this session, we (Raymond Chou (SCOM MVP) & Lai Yoong Seng (VM MVP) provided an overview of the new features in System Center Virtual Machine Manager 2012 which included new architecture of VMM 2012 and 4 pillar of management:- deployment, fabric, cloud and services management at Microsoft Tech-Ed New Zealand 2011 (Auckland).
This document discusses Microsoft's Private Cloud Solution using System Center Virtual Machine Manager Self Service Portal 2.0 (SSP 2.0). It demonstrates SSP 2.0 in 4 scenarios: 1) configuring data center resources and integrating with VMM, 2) onboarding business units and requesting infrastructure, 3) approving requests and provisioning infrastructure, and 4) self-service virtual machine provisioning. It also discusses SSP 2.0's logical architecture, portal configuration, self-service features, dashboard reporting, and utilization chargeback capabilities. The presentation aims to provide an overview of building private IaaS clouds with SSP 2.0.
Managing VMware with PowerShell - VMworld 2008Carter Shanklin
This is the slide deck I used during my talk "Managing VMware with PowerShell" at VMworld 2008. Some video snippets of the presentation are also available at http://communities.vmware.com/thread/169066
This document is a slide deck presentation about using Windows PowerShell and Windows Management Instrumentation (WMI) to inventory network clients. The presentation introduces PowerShell and WMI, explores how to use WMI locally and remotely to retrieve device information, and demonstrates building a flexible WMI tool in PowerShell in a step-by-step manner. The presentation is copyrighted material from Concentrated Technology, LLC that can be used freely within organizations and provides links to additional resources on their website.
The document discusses Rohit Yadav and his work with Apache CloudStack. It provides an agenda for understanding CloudStack internals, including getting started as a user or developer, a guided tour of the codebase, common development patterns, and deep dives into key areas like system VMs, networking implementation, and plugins. The document outlines ways to join the CloudStack community and how to contribute code through GitHub pull requests.
This document discusses the architecture and key features of System Center Virtual Machine Manager (VMM) 2012. It covers the 4 pillars of management in VMM 2012: Deployment, Fabric, Cloud, and Services. Demos are provided on features like high availability VMM deployment, bare metal provisioning, network and storage management, update management, private cloud management, and services management. The objectives are to understand VMM 2012's architecture and key features, and resources are provided to download and learn more about VMM 2012.
Operations and Security at Cloud Scale with Amazon EC2 System Manager - AWS S...Amazon Web Services
Whether you are a traditional enterprise exploring migrating workloads to the cloud or are already “all-in” on AWS, performing common tasks of inventory collection, OS patch management, and image creation at scale is increasingly complicated in hybrid infrastructure environments. Amazon EC2 Systems Manager allows you to perform automated configuration and ongoing management of your hybrid environment systems at scale. This session provides an overview of key EC2 Systems Manager capabilities that help you define and track system configurations, prevent drift, and maintain software compliance of your EC2 and on-premises configurations. We will also discuss common use cases for EC2 Systems Manager and give you a demonstration of a hybrid-cloud management scenario.
Automating Windows Server 2008 R2 Administration with Windows PowerShellalexandair
This sessions is intended for anyone who has to manage Windows Server 2008 R2. Windows Server 2008 R2 provide the automation platform and set of solutions that empower the administrators to optimize their server management experience. Windows PowerShell v2 and its built-in modules allow you to automate nearly any task for managing Windows Server. Be efficient, don't waste your time clicking through the GUIs, learn how to use Windows PowerShell, and move from repeated tasks to automated tasks.
VMworld 2013: vSphere UI Platform Best Practices: Putting the Web Client SDK ...VMworld
This document discusses best practices for developing extensions for the vSphere Web Client using the SDK. It provides an overview of the Web Client architecture and extensibility framework, including extension points, templates, filtering and packaging. The SDK 5.5 changes are covered, such as new features, compatibility and the roadmap for transitioning to an HTML5 platform. Demo code is presented and challenges encountered by plugin developers are discussed.
The document describes security concepts in WebSphere Application Server including authentication, which verifies a user's identity, authorization, which determines what resources a user can access, and single sign-on, which allows a user to access multiple systems without re-authenticating after the initial login; it also discusses how WebSphere implements security through features like global security configuration, LDAP user registries, and a security wizard to set up initial security settings.
The document discusses new features and configuration tips for Lotus Connections 3.0. Key points include:
- New features like subcommunities, mobile enhancements, social analytics, and improved user lifecycle management.
- Configuration is done through the user interface, wsadmin command line tool, or WebSphere console. Wsadmin uses XML files that must be checked in and out.
- Installation tips stress reading documentation carefully, meeting system requirements, optimizing disk speed, and planning server architecture and profiles.
- Future sections discuss a reporting tool and additional capabilities.
Microsoft System Center Virtual Machine Manager 2008 R2 provides centralized management of virtual machines running on Hyper-V, Virtual Server, and VMware ESX/ESXi hypervisors. It allows administrators to provision and deploy virtual machines, perform conversions between physical and virtual machines, and optimize resource utilization across virtualized hosts. The latest release adds enhanced VMware management capabilities and more flexible delegation of administrative tasks through self-service portals and PowerShell scripting.
The document discusses improvements to Windows Server 2008 management tools, including Server Manager, Event Viewer, and PowerShell. Server Manager provides a unified interface for server configuration and management. Event Viewer allows for improved event logging, organization, and searching. PowerShell introduces a new interactive shell and scripting language that provides over 130 commands and allows for automation of server administration tasks.
The document discusses improvements to Windows Server 2008 management tools, including Server Manager, Event Viewer, and PowerShell. Server Manager provides a unified interface for server configuration and management. Event Viewer allows for improved event logging, organization, and searching. PowerShell introduces a powerful new scripting language and interactive shell based on .NET. It provides over 130 new commands and allows for automation of server administration tasks.
Open Mic to discuss the new features related to Portal and Web Content Management introduced in version 8.5. We will be covering changes related to themes,
mobile, social integration and WCM changes related to syndication and rich media aspects of the new release.
CTU June 2011 - Hybrid Cloud Management with Microsoft System Center - ConceroSpiffy
System Center "Concero" is a new hybrid cloud management tool that allows users to manage virtual machines and services across multiple private and public clouds from a single portal. It provides self-service capabilities, visibility and control over applications in hybrid clouds, and enables deployment and management of services in both Microsoft's Virtual Machine Manager private clouds and the Microsoft Azure public cloud. Key features include cloud registration, service and VM deployment, operations management, upgrades, a shared library, and job history reporting.
Configuration Manager 2007 focused on systems management and found user management challenging, while Configuration Manager 2012 embraces user-centric scenarios with a state-based design and full application lifecycle model. Configuration Manager 2012 also understands relationships between user systems and provides a management solution tailored for applications. It allows creating primary sites for scale and optimization of content distribution, inventory, and agent status across locations. Role-based administration provides data segmentation and configurable client agent settings so users only see necessary data.
Configurando Private Cloud con System Center 2012Juanchi_43
This document discusses how System Center provides an integrated platform for managing applications, services, and infrastructure across physical, virtual, and cloud environments. It allows for:
1) Standardizing application deployment using templates to ensure consistent configurations.
2) Creating cloud abstractions that allow managing infrastructure from Microsoft, VMware, and Citrix in a unified way.
3) Providing flexibility through delegation and control by allowing administrators to delegate self-service access and control resource utilization.
This document provides an overview of extending remote desktop services outside an organization using Remote Desktop Gateway (RD Gateway) and Remote Desktop Web Access (RD Web Access). It discusses configuring the RD Gateway to enable secure remote access to internal resources over the internet. It also covers installing and configuring RD Web Access to enable launching remote apps and desktops from a web interface. The document includes demonstrations of configuring these technologies.
This document provides an overview and agenda for a course on implementing and managing Microsoft server virtualization. It outlines the course objectives, schedule, modules, and labs. The course will cover topics such as planning virtualization, installing Hyper-V, creating and managing virtual machines, high availability, backup and recovery, and desktop virtualization using Remote Desktop Services. Students will gain hands-on experience working with Hyper-V and Virtual Machine Manager in labs modeling a virtualized server environment.
The document discusses modules 9 and 10 of a Microsoft Jump Start course on virtualization for VMware professionals. The modules cover virtual desktop infrastructure (VDI) architecture in two parts. They explain how VDI moves the operating system, applications, and data from the physical desktop to the data center, allowing users to access their desktops remotely through protocols like Remote Desktop.
020811 Introduction To Virtualization 279337Juanchi_43
Este documento proporciona una introducción a la virtualización de VMware. Explica las principales razones por las que los clientes eligen VMware, como la reducción de costos y riesgos. Describe las funciones clave de la arquitectura de VMware, incluida la partición, el aislamiento y el encapsulamiento de sistemas operativos y aplicaciones en máquinas virtuales portátiles. También cubre la instalación y configuración, y los próximos pasos de actualización a vSphere.
El documento describe el Marco de Operaciones de Microsoft (MOF), el cual provee guías para lograr alta disponibilidad, confiabilidad y soporte técnico en plataformas Microsoft. MOF se basa en modelos de procesos, equipos y riesgos, dividiendo las operaciones en personas, procesos y tecnología. El modelo de procesos consta de cuatro fases (Cambios, Funcionamiento, Soporte, Optimización) mientras que el modelo de equipo organiza roles funcionales. MOF busca administrar riesgos de forma proactiva a
El documento describe los diferentes procesos involucrados en la gestión de servicios de TI, incluyendo la gestión de incidentes, problemas, cambios, configuraciones, servicios, nivel de servicio y seguridad. Explica los roles y responsabilidades en la gestión de configuraciones y diagramas para representar las relaciones entre componentes de infraestructura.
Presentation: 75 minutes Lab: 60 minutes After completing this module, students will be able to: Configure user roles. Install and configure the VMM Self-Service Portal. Required materials To teach this module, you need the Microsoft® Office PowerPoint® file 10215A_08.ppt. Important: It is recommended that you use PowerPoint 2002 or a later version to display the slides for this course. If you use PowerPoint Viewer or an earlier version of PowerPoint, all the features of the slides might not be displayed correctly. Preparation tasks To prepare for this module: Read all of the materials for this module. Practice performing the demonstrations and the lab exercises. Detailed steps for the demonstrations are provided in the course companion CD. Work through the Module Review and Takeaways section, and determine how you will use this section to reinforce student learning and promote knowledge transfer to on-the-job performance. Make sure that students are aware that there are additional information and resources for the module on the Course Companion CD.
Briefly present the module’s content. Start a short discussion about strategies that students have used so far for virtual machine backups or backups in general. Emphasize that Windows Server ® 2008 R2 and System Center Virtual Machine Manager 2008 R2 (VMM) have some built-in tools that you can use to back up virtual machines, but with somewhat limited functionality. However, System Center Data Protection Manager (DPM) 2007 Service Pack 1 (SP1) is a product that provides full-featured backup and restore for Hyper-V™-based virtual machines. Ask the students if they use Data Protection Manager 2007 , or if they have experience with some third-party backup tools.
Present the lesson’s content. Tell students that this lesson discusses some general concepts about strategies for backing up and restoring virtual machines . Emphasize that you can back up virtual machines by using the same procedure as physical computers. However, virtual machines are different from physical computers since they are mostly contained in one file—the virtual hard disk VHD . Also, point out that the VMM has some backup capabilities that allow you to perform backup of the VMM database, and to restore it from backup.
As you introduce this module and lesson, ask students why their organizations are exploring virtualization. Ask them what the most urgent requirements are that are driving the implementation of virtualization. Also ask them to describe what types of virtualization their organizations are implementing or considering. Almost all organizations are looking at some type of virtualization, so use this topic to gain more understanding of the benefits that your students are expecting to gain from virtualization.
Stress that permissions filter down from upper level containers to the objects in the containers. The one exception to this is when you configure self-service user roles with permission to a host group. Users in the self-service user role will have access only to the virtual machines to which they have been granted access, not all virtual machines in the host group. Consider opening the VMM console and showing the items where you can delegate permissions.
Spend most of the time on the delegated administrator user role. Larger organizations will use this role frequently because it allows administrative privileges, but to a set scope only, such as only to the objects associated with that user. If students are interested in the detailed permission assigned to each user role, show them the tables on the student CD.
Stress the differences between creating a self-service user role and a delegated administrator user role. When you change from one type of role to the other on the wizard’s first page, the configuration options change. Also point out that there is no option to restrict which types of tasks a delegated administrator can perform if they are granted permission to a host group. For example, you cannot assign this level of permission to a host group, and then block administrators from creating virtual machines or modifying host properties in the host group. You can restrict these types of permissions only with self-service user groups.
Stress the differences between creating a self-service user role and a delegated administrator user role. When you change from one type of role to the other on the wizard’s first page, the configuration options change. Also point out that there is no option to restrict which types of tasks a delegated administrator can perform if they are granted permission to a host group. For example, you cannot assign this level of permission to a host group, and then block administrators from creating virtual machines or modifying host properties in the host group. You can restrict these types of permissions only with self-service user groups. Demonstration Steps: Open the Virtual Machine Manager On NYC-HOST1, open the Virtual Machine Manager. Access the User Roles tab In the left pane, click Administration , and then click User Roles . Add the IT group to the Administrator user role 1.In the center pane, right-click Administrator , and then click Properties . 2.On the Members tab, click Add . 3.In the Select Users, Computers, or Groups box, type IT , and then click Check Names . 4.Click OK twice. Create a new user role named ContosoAdmins with delegated permissions to the Contoso host group and to all library servers 1.Right-click in the User Roles pane, and then click New user role . 2.In the User Role Name box, enter ContosoAdmins . 3.From the User role profile drop down menu, select Delegated Administrator . 4.Click Next . 5.On the Add Members page, click Add . 6.In the Select Users, Computers, or Groups box, type VMMAdmins , and then click Check Names . 7.Click OK , and then click Next . 8.On the Select Scope page, select the Contoso check box, and the All Libraries check box, and then click Next . 9.Click Create .
Question : What are the differences between the three user role profiles? Answer : The administrator role is able to perform all actions in the VMM Administrator Console. Members of this user role can create new Delegated Administrator and Self-Service user roles. Only members of the Administrator user role can add additional members. The Delegated administrator is able to perform most actions in the VMM Administrator Console, but only within the role’s defined scope. Members of this user role can create new Delegated Administrator and Self-Service user roles, but cannot modify VMM settings. The Self-Service User is Able to use the VMM Self-Service Portal to perform tasks on their virtual machines as defined in the user role. Members of this user role cannot create new user roles. Question : How will you use the delegated administrator user role in your organization? Answer : Answers will vary. Many organizations may not use the role at all. Large organizations that have multiple locations or business groups managing Hyper-V environments may use this role to delegate the management of Hyper-V hosts or virtual machines based on the distributed administration model.
Give students a few minutes to read the scenario, and then ask the discussion questions. Question : What steps will you need to take to ensure that the delegated permissions of this scenario can be met? Answer : Ensure each set of administrators for each location are in an Active Directory® Domain Services (AD DS) group. Create a host group for each of the branch offices. Create a delegated administrator user role for each office, and assign the Active Directory administrative group for each office to the role. Assign permissions for the role to just the local host group. Create a delegated administrator user role and assign the Active Directory group for the server administration team at the head office to the user role. Assign permissions for the role to all host groups and libraries. Add the three senior server administrators to the Administrator user role in VMM. Question : Why would delegated administration be the best role to which to add the remote administrators? Answer : Delegated administrative privileges allow them to administer their remote offices without being able to compromise security at other remote offices.
Mention that when self-service users create a virtual machine, they are granted owner permission to the object. However, this does not mean that other users in the self-service user role or other self-service user roles will be able to use the virtual machine. If a user is creating a virtual machine that will be shared by all members of a self-service user role, the Active Directory account associated with the user role must be assigned as the owner of the virtual machine.
Discuss the options for installing the Self-Service Portal on a server that is running another Web site on the default port. You can configure an alternate port number for the existing Web site, configure the Self-Service Portal to use a different port number, or configure host headers for the Self-Service Portal. Another option for configuring the Self-Service Portal is to implement Secure Sockets Layer (SSL). When you install VMM on a server, a self-signed certificate is created on the server. You can use that certificate to enable SSL on the Portal Web site, or install another certificate from an internal or public Certification Authority (CA).
Demonstration steps: Install the Self-Service Portal prerequisites 1.On NYC-HOST1 , open Server Manager , and then click Roles . 2.Click Add Role . 3.Select the Web Server (IIS) check box. 4.Click Next twice. 5 . On the Select Role Services page, select the ASP.NET check box, and then click Add Required Role Services . 6. Select the following check boxes: Windows Authentication IIS 6 Metabase Compatibility IIS 6 WMI Compatibility 7.Click Next , and then click Install . 8.When the installer completes, click Close . 9.Close Server Manager. Install the Self-Service Portal 1.Open Windows Explorer, and then browse to E:\\Program Files\\Microsoft Learning\\10215\\Labfiles\\SCVMMSetup . 2.Start the SCVMM Installer by double-clicking setup.exe . 3.Under SETUP , click VMM Self-Service Portal . 4.Click I accept the terms of the agreement . 5.On the Microsoft Update page, click I don’t want to use Microsoft Update , and then click Next . 6.On the Prerequisites Check page, click Next . 7.On the Installation Location page, click Next . 8.On the Web Server Settings page, change the Port Number to 88 , and then click Next . 9.Click Install . When the installation finishes, clear the Check for the latest Virtual Machine Manager updates check box, and then click Close .
Review the Web server configuration 1.Open Internet Information Services (IIS) Manager . 2.Expand LON-SRV3 (CONTOSO\\administrator) . 3.Expand Sites , and then click Microsoft System Center Virtual Machine Manager 2008 R2 Self-Service Portal (x64) . This is the Web site that is created when you install the Self-Service Portal Web site. 4.In the Actions pane, click Bindings . 5.Click http , and then click Edit . You can use the Edit Site Binding dialog box to configure the port number that the site uses and to configure the host header. Click Cancel . 6.In the Site Bindings dialog box, click Add . 7.Click https in the Type drop-down list box. 8.In the SSL Certificate list, click SCVMM_CERTIFICATE_KEY_CONTAINERLON-SRV3.Contoso.com , and then click OK . This certificate is the self-signed certificate that was configured when you installed VMM on the server. 9.Click Yes , and then click Close . Close IIS Manager. Question : Why should you consider using a certificate other than the self-signed certificate to secure the portal site? Answer : Clients will not trust the self-signed certificate, so VMM will prompt users with certificate warnings every time they access the site. By using a trusted certificate, you can avoid the warning.
Demonstration steps: Create a Self-Service user role for IT users 1.On NYC-HOST1 , in the SCVMM Admin Console, click the Administration tab on the bottom left. 2.From the Administration menu, click User Roles . 3.Right-click in the User Roles pane, and then click New user role . 4.In the User Role Name box, enter IT Admins . 5.From the User role profile drop down menu, select Self-Service User . 6.Click Next . 7.On the Add Members page, click Add . 8.In the Select Users, Computers, or Groups box, type IT , and then click Check Names . 9.Click OK , and then click Next . 10.On the Select Scope page, click Contoso , and then click Next . 11.On the Virtual Machine Permissions page, verify that All actions is selected, and then click Next . 12.On the Virtual Machine Creation Settings page, select the Allow users to create new virtual machines check box. 13.Click Add , and then click the Win2008R2Core template. Click OK . 14.Check the Set quota for deployed virtual machines check box. 15.In the Maximum quota points allowed for the user role field, type 20 . 16.Select the Share quota across user role members check box, and then click Next . 17.On the Library Share page, select the Allow users to store virtual machines in a library check box, and then click Next . 18.On the Summary page, click Create . Configure a virtual machine template 1.In the SCVMM Admin Console, in the left pane, click Library . 2.In the center pane, right-click the Win2008R2Core template, and then click Properties . 3.On the Settings tab, change the Quota Points value to 2 . Click OK .
Test access to the Self-Service Portal 1.On NYC-HOST1, open Microsoft Internet Explorer®, and then connect to https://NYC-HOST1:88 . 2.Click Continue to this web site (not recommended) . 3. In the Domain\\username field, type Contoso\\Charlotte . In the Password field, type Pa$$w0rd , and then click Log On . 4.On the Computers tab, in the right pane, under Create , click New Computer . 5.Click Continue to this web site (not recommended) . 6.Under Creation Source , verify that only Win2008SRV is available. 7. Under System Configuration , fill in the following information: Name: IT-SVR1 Computer name: IT-SVR1 Admin password: Pa$$W0rd Confirm password: Pa$$W0rd Product Key: TGBRW-66R6T-R6RFC-6F2T9-W844X 8. Click Create . Creating the virtual machine will take several minutes. You can track the progress in the Jobs view in the Virtual Machine Manager console.
Talk about what would be required to implement SSL, depending on where the VMM Self-Service Portal faces (internal facing/external facing). Talk about host headers, and why limiting your system to a single host header and not enabling listening for greatly improves security.
Stress that the most important question when planning that Self-Service Portal is likely to be whether users can create their virtual machine. Show how almost all of the other questions related to the design of the Self-Service Portal will depend on the answer to this question. Be sure to talk about quota points and the importance. Also mention the difference between individual quota points and group based quota points (a simple tick box). Get the students discussing the differences they might have in their environments when it comes to users and tasks they might need to do on a daily basis.
Exercise 1: Planning for the Hyper-V Server Role In this exercise, you will determine the most appropriate Hyper-V implementation based on organizational requirements and scenarios. Estimated time to complete the exercise: 15 minutes Exercise 2: Assessing the Computing Environment by Using the MAP Toolkit In this exercise, you will: Configure the Microsoft Assessment and Planning Solution Accelerator: Create an inventory database. Run the report wizard to create appropriate reports related to virtualization. Analyze the inventory and assessment reports: Analyze the generated reports, and answer questions related to the results. Note: The lab exercise answer keys are provided on the Course Companion CD. To access the answer key, click the link located at the bottom of the relevant lab exercise page.
Use the questions on the slide to guide the debriefing after students have completed the lab exercises. Lab Review Questions Question : Why did Dylan’s account not have access to any virtual machines the first time the user logged in to the Self-Service Portal? Answer . The user had not been assigned as the owner of any virtual machines, either through direct configuration for the user account or through group membership. Question : How many virtual machines will members of the Research Admins user role be able to create? Answer : They will be able to create 10 virtual machines. The only available template has a quota value of 2, and the user role has been assigned a total quota of 20.
Review Questions Point the students to the appropriate section in the course so that they are able to answer the questions presented in this section. 1.What are the three user role components? How do they relate to each other? Answer: profile, scope and membership. The profile lists the actions that can be performed by the user role, the scope lists the objects that can be managed, and the membership indentifies who can perform the tasks. 2.What are the three role types in VMM? Answer: Administrator role, Delegated Administrator Role, and Self-Service User Role 3.Can you install the Self-Service Portal on Windows Server Core? Answer: No, you cannot install the Self-Service Portal on Windows Server Core. Real-World Issues and Scenarios Question : Your user account is a member of a delegated administrator group that has permission to all host groups in the VMM deployment. However, when you try to access the Self-Service Portal site to troubleshoot a user issue, you do not have access to the site. What do you need to do to access the site? Answer: Your account must be added to a Self-Service user role because, by default, the Administrator and Delegated Administrator roles do not have access to the Self-Service Portal . Question: Your organization has a main office and a branch office. You have deployed two Hyper-V servers in the branch office. You need to ensure that the network utilization between the main office and branch office is minimized when users in the branch office create new virtual machines. What should you do? Answer: You will need to configure the VMM library server in the branch office, and then ensure that the virtual machine templates required for the branch office are stored in the local library. Then ensure that the Self-Service users in the branch office can use only the local library server.