Please enable JavaScript.
Coggle requires JavaScript to display documents.
M5 - Lesson 1: Overview of Hyper-V (New VM Features in Server 2016…
M5 - Lesson 1: Overview of Hyper-V
Supported Guest OS
Windows Server 2008 with Service Pack 2 (SP2) or later server operating systems.
Windows Vista with SP2 or later client operating systems.
Linux editions: CentOS, Red Hat Enterprise Linux, Debian, Oracle Linux, SUSE, and Ubuntu.
FreeBSD.
New in Server 2016
Host resource protection:
Prevents a virtual machine from monopolizing all of the resources on a Hyper-V host.
Hyper-V Manager Improvements:
Improves manageability of Hyper-V hosts by allowing for alternate credentials when connecting to a Hyper-V host.
Nested virtualization:
Allows you to enable the Hyper-V server role in a virtual machine running Windows Server 2016.
Rolling Hyper-V cluster upgrade:
Allows you to upgrade a Windows Server 2012 R2 Hyper-V cluster to Windows Server 2016 by adding nodes to an existing cluster.
Shielded virtual machines:
Secures virtual machines from Hyper-V host administrators. The entire virtual machine is encrypted and is accessible only to the administrators of that virtual machine.
Start order priority:
Improves Hyper-V host and virtual machine performance after restarts by identifying a specific startup order for virtual machines.
New VM Features in Server 2016
Discrete device assignment:
Allows virtual machines to directly access peripheral component interconnect express (PCIe) devices in the Hyper-V host.
Hot add or remove for network adapters and memory
Integration services delivered through Windows Update
Key storage drive:
Allows Generation 1 virtual machines to store BitLocker Drive Encryption keys. This is an alternative to the virtual Trusted Platform Module (TPM) available in Generation 2 virtual machines.
Linux Secure Boot
Memory and processor capacity improvements:
Allows for higher performing virtual machines. A single virtual machine now supports up to 12 terabytes (TB) of memory and 240 virtual processors.
Production checkpoints:
Improves the functionality of checkpoints by ensuring that applications are in a consistent state when the checkpoint is created.