Explaining the Hyper-V authorization model, part six

Hyper-V uses a role based authorisation model for access checks. This series of articles takes a look at the model; defines the available primitives; and walks through a couple of examples. (Oops, a post I meant to publish back in October last year, only just realized I didn’t make it live!) Quick links: Part1; Part…

1

Avoiding UAC prompt starting Hyper-V Manager

An interesting question was posed to me a couple of days back about why when starting Hyper-V Manager, you get a UAC prompt, yet you don’t with most other Microsoft Administrative MMCs. You should note that the workaround in here only applies to Windows 7/Windows Server 2008 R2, and is not a supported workaround. This…

3

Announcing NVSPBind

  A quick post to announce the availability of a new utility written by a colleague of mine in the Hyper-V team, Keith Mange. NVSPBind (Network Virtual Service Provider Bind) overcomes a shortfall that many people hit in server core installations of Windows Server 2008, Windows Server 2008 R2 and Microsoft Hyper-V Server. In a…

29

Explaining the Hyper-V authorization model, part five

Hyper-V uses a role based authorisation model for access checks. This series of articles takes a look at the model; defines the available primitives; and walks through a couple of examples. (I actually wrote most of this many months ago – only finally found the time to post it up!). Quick links: Part1; Part 2;…

1

Explaining the Hyper-V authorization model, part four

Hyper-V uses a role based authorisation model for access checks. This series of articles takes a look at the model; defines the available primitives; and walks through a couple of examples. (I actually wrote most of this series many months ago – only finally found the time to post it up!). Quick links: Part1; Part…

0

Explaining the Hyper-V authorization model, part three

Hyper-V uses a role based authorisation model for access checks. This series of articles takes a look at the model; defines the available primitives; and walks through a couple of examples. (I actually wrote most of this series many months ago – only finally found the time to post it up!). Quick links: Part1; Part…

3

Explaining the Hyper-V authorization model, part two

Hyper-V uses a role based authorisation model for access checks. This series of articles takes a look at the model; defines the available primitives; and walks through a couple of examples. (I actually wrote most of this series many months ago – only finally found the time to post it up!). Quick links: Part1; Part…

4

Explaining the Hyper-V authorization model, part one

Hyper-V uses a role based authorisation model for access checks. This series of articles takes a look at the model; defines the available primitives; and walks through a couple of examples. (I actually wrote most of this series many months ago – only finally found the time to post it up!). Quick links: Part1; Part…

8

Hyper-V: How to remove disabled virtual network adapters from the parent partition

In May, I mentioned that we introduced a checkbox in the Hyper-V UI for Windows 7 and Windows Server 2008 R2 which determines whether a virtual NIC is created in the parent partition for External Virtual Networks. (To get a better understanding of Hyper-V networking and what this means, take a look at this article.)…

9

Hyper-V Resolving Event ID 4096

Over the break I’ve been taking over Christmas, one of my goals was to move the remainder of my Virtual Server “production” VMs across to Hyper-V. But when nearing completion, I noticed that Server Manager was reporting a role error: Looking at the detail of the event logs, it was Event ID 4096 from Hyper-V-Config…

11