Virtual Hard Disk

Information Centers: A Concentration of Information Security Risk

Carl S. Young , in Information Security Science, 2016

Compromise of the Virtual Hard Drive and Virtual Files

Concrete thefts of information assets tin indeed occur in virtual environments. A VM can be encapsulated into a single virtual hard disk (VHD) file. A VHD is a deejay epitome file format for storing the consummate contents of a difficult drive. The disk prototype/VMs replicate an existing hard drive and include all data and structural elements. It can be stored anywhere that the physical host tin can access so it is easily transportable such as on a USB flash retentiveness device.

An attacker could access a VHD file without entering the data center. He or she could exercise so by accessing the devices in the host data store. Attackers can access the host with a "Secure Copy" plan through client direction utilities. Such admission would allow an intruder to scan data stores and download files. x

It is critical to protect VHD files every bit part of the information security strategy. Such protection requires three elements:

limiting access to the host data stores where the VMs reside;

implementing access logging to know when a breach occurs;

physically isolating the storage network so that only the storage devices and hosts have access.

Read full affiliate

URL:

https://www.sciencedirect.com/science/commodity/pii/B9780128096437000152

Securing, monitoring, and managing a virtual infrastructure

Thomas Olzak , ... James Sabovik , in Microsoft Virtualization, 2010

Securing the virtual machines

Hyper-V is designed to exist used primarily with Windows servers and SUSE Enterprise Linux. Because these systems are presented to the network exactly as they would be if installed on physical hardware, you lot will want to accept the typical precautions when securing them, keeping in mind their concluding function. With Hyper-V, information technology is much more viable to have a single instance host a single function, which makes securing the example much easier. With a single function to business organization yourself with, it is much easier to restrict outbound services, for instance, to only those necessary for minimal function and the unmarried service that virtual machine provides. The considerations discussed higher up when dealing with the host instance agree true with the invitee instances every bit well, including antimalware, updates, and then forth.

In that location are steps you can have to further secure the virtual machine configuration files and virtual difficult disk files. By default, the motorcar configuration files are kept in %programdata% | Microsoft | Windows | Hyper-V | directory. These files are very minor, and normally the default location is acceptable. If you choose to movement them, be sure that the System business relationship and the Administrators grouping both have Full Command over the directory and files. Other groups should be allowed only the admission required for their function, that is, the service account used for backups, and so forth. Virtual hard drive (VHD) files can vary greatly in size, every bit they contain the virtual machine OS and information. These are kept past default in the %users% ∣ Public ∣ Documents ∣Hyper-V∣ Virtual Hard Disks directory. These files you will almost likely want to move, and further secure. Yous tin can supply a new location for these files in the Hyper-V manager. The rights listed in Table 9.one will need to be applied to the directory containing the VHD files.

Table 9.1. VHD File Rights

Names Permissions Apply to
Administrators Full control This folder, subfolder, and files
System
Creator owner Total control Subfolder and files but
Interactive Create files/write information This folder, subfolder, and files
Service Create folders/suspend information
Batch Delete
Delete subfolders and files
Read attributes
Read extended attributes
Read permissions
Write attributes
Write extended attributes

Note

Tabular array 9.1 lists the default permissions on the default binder for the VHD files. Table 9.two lists the rights that are required for running the virtual machines and their VHDs. If you were to relocate the default folders you would need to set these rights on those folders.

Table 9.ii. Default Permissions on the Default Folder for the VHD Files

Location Account NTFS rights Utilize to
Configuration location Administrators Full control This folder, subfolders, and files
Arrangement Total command This folder, subfolders, and files
VM hard disks location Administrators Full control This folder, subfolders, and files
Arrangement Total command This folder, subfolders, and files
Creator owner Full control Subfolders and files only

Bitlocker drive encryption

Windows Encrypted File Arrangement, or EFS, was a popular method in previous Microsoft virtualization strategies for encrypting the virtual bulldoze files. With Hyper-V, this is no longer supported for VHD files.

Instead, nosotros recommend placing these files on a separate drive from the management OS, and using Bitlocker to encrypt them, as discussed in Affiliate 3. This will provide an boosted layer of protection for the information within the virtual machines, with less touch on their performance than if data encryption were performed within the virtual machine. You may also wish to move any Virtual Floppy Disk (VFD) and ISO files to this location, especially if they are used to boot the virtual Bone.

Syskey.exe

Syskey is a utility that can be used to encrypt Windows account data, including the SAM on Domain Controllers. On virtual machines, syskey can be challenging to enable in a fashion that actually preserves security; storing the central either on the virtual drive itself, or on a virtual kicking floppy, only results in an epitome that can be taken elsewhere to be cracked at leisure, while a boot countersign tin make automated direction and update tools more challenging to use. In addition, a syskey-encrypted SAM is non significantly more than difficult for password crackers to manage, as nigh of them simply obtain the necessary system files to decrypt the SAM at the aforementioned time, or apply other tools to reset the Ambassador password entirely. While syskey does add together an boosted layer of protection to your passwords, the added difficulty for management makes the trade off debatable.

Windows Firewall

Windows Firewall is a stateful firewall that comes installed with virtually modern versions of Windows past default. On Windows 2008 Server machines, the firewall is enabled by default, blocking many of the ports that cause so much trouble in otherwise unprotected Windows systems. On virtual servers, the Windows Firewall ensures that only the services necessary for the chosen function are exposed (the firewall will automatically configure itself for new server roles, for instance, and when certain server applications are installed). As members of your domain, the Windows Firewall of your virtual servers can be managed remotely, or through Grouping Policy.

Auditing

Auditing your server logs is an important style to ensure that nothing has gone awry with your systems. Windows Server 2008 supports outcome subscriptions, assuasive you to send the log files of your virtual servers to a central location for monitoring and management.

Note

Your log management server or awarding may require SNMP to be enabled. The procedure for this is no different for a virtualized server than for a host-based one.

Yous may find it useful, for instance, to have the outcome subscriptions of your virtual servers to exist sent to the reckoner you employ for managing your Hyper-5 installation. The logs are besides available through the typical remote management options.

Disk and file access can exist audited every bit usual with Windows servers, likewise; virtualization does not crave you to change your methods there.

Virtualizing your servers does not crave you to make significant changes to your auditing strategy. The ability to create separate private networks between virtual servers, yet, opens up new opportunities to obtain audit data without impacting the throughput of bandwidth-intensive applications.

Read full chapter

URL:

https://www.sciencedirect.com/scientific discipline/article/pii/B9781597494311000096

Installing Windows Server 2008 and Hyper-5

Thomas Olzak , ... James Sabovik , in Microsoft Virtualization, 2010

Bitlocker and Hyper-V

BitLocker works with the Trusted Platform Module (TPM) chip in supported systems to encrypt the data partitions of your hard drives. A Virtual Difficult Disk (VHD) or virtual car configuration tin be placed on a BitLocker encrypted segmentation to permit the data independent on the VHD to benefit from this security too—regardless of the guest operating system. This allows you to extend the protection of BitLocker to incompatible and legacy Windows operating systems. Once BitLocker is enabled on your host system, and the drives prepared and encrypted, the only step required is creation of the virtual devices on the encrypted bulldoze.

Read full chapter

URL:

https://www.sciencedirect.com/science/article/pii/B9781597494311000035

Managing Hyper-V

Thomas Olzak , ... James Sabovik , in Microsoft Virtualization, 2010

Configuring Hyper-5 options

Clicking the Hyper-5 Settings link on the correct pane of the Manager (see Figure four.6) brings up the Hyper-5 Settings window:

▪ Figure iv.6. Launching the Hyper-5 Settings Wizard.

You can set ii options for the server itself and five for each user connecting to the virtual machines (see Effigy 4.7):

▪ Figure 4.7. Hyper-5 Settings Wizards.

The Virtual Hard Disks and Virtual Machines options allow you to set up a path for the virtual difficult disk files and virtual machine files, respectively.

The Keyboard user option determines when Windows primal combinations (such equally ALT + TAB) pass through the virtual machine.

The Mouse Release Primal option lets you set which keys you must press to accept the mouse pointer out of the virtual motorcar window in the Virtual Machine Connectedness awarding. Note that if you lot have the virtual machine drivers installed on the virtual auto (in other words, you are running an "aware Os"), you will not need to use the central combination to release the mouse—it will operate on whichever desktop it is currently hovering over. If you have not installed the virtual machine drivers, Chapter 7 walks you lot through the process.

The User Credentials check box determines if yous use the currently logged on user to log in to the virtual machine also, in a "pass-thru" arrangement. With this box checked, you volition non demand to log in to the virtual car when it starts up; it volition utilize the credentials y'all used to log in to the management system. Unchecked, you lot will need to log in to the virtual machine once it is upwards and running.

Delete Saved Credentials does just what is advertized: it deletes whatever saved user log-ons you lot take in the virtual machine. Cached user log-ons are vulnerable to being captured by attackers—remember, but because the machine is virtual, it does non mean that it is secure! This option makes it easy for you to remove any and all cached log-ons that may be residing on the virtual auto.

Finally, the Reset Bank check Boxes option reverses all the piece of work yous did to ensure the abrasive pop-up windows practise not pester you anymore. Clicking the Reset button will allow you lot to once more meet the warning messages before confirming sure deportment.

The adjacent option nosotros explore is the Edit Deejay choice. Figure 4.viii shows you where this option is located. Selecting this launches the Edit Virtual Hd Wizard.

▪ Effigy four.8. Launching the Edit Deejay Wizard.

Warning

Simply run the Edit Virtual Difficult Disk Wizard on virtual disks that are not currently in apply.

one.

Afterward the typical introductory screen, you are asked to locate the virtual hard disk image, which is a .vhd file. (Of course, yous demand to have a .vhd file before you can edit information technology; Affiliate seven walks you through the process of creating a Virtual Machine.

2.

Browse to the .vhd file you lot wish to alter, equally shown in Figure 4.6 and select Next (Figure four.9).

▪ Figure four.ix. Outset the Edit Disk Wizard.

3.

Figure four.10 shows yous the three available deportment:

The Meaty option allows you lot to compress a dynamic disk by removing whatever blank space that might exist from deleting files within the virtual machine.

Note

The differences between a dynamic disk and stock-still disk are substantially that a dynamic deejay starts at a particular minimum size and grows as the amount of information on the virtual automobile grows. A stock-still disk begins at a particular size and stays there. The third type of disk is called differencing, and is used to create a re-create of an existing deejay. The differenced disk and then records the changes made to the original disk, instead of the original being changed. Chapter seven goes into much greater detail on the advantages and disadvantages of each.

The Convert option allows yous to modify the virtual disk from a fixed to a dynamic disk, or vice versa. Information technology does this past copying the contents of the current .vhd file to a new one of the type you wish to convert to. This means you will need plenty free deejay space to incorporate both the former .vhd file and the new ane on the physical bulldoze. Once the conversion is completed, the old file is removed.

The Expand option is primarily useful for fixed disks and allows you to expand the maximum size of the virtual disk.

▪ Effigy 4.10. Edit Disk options.

If you take a differencing disk attached as well, you lot have two more options available to you in this magician: Merge, which takes the changes recorded on the differencing disk and writes them to the parent disk; and reconnect, which is but available if the parent disk cannot automatically be found. The reconnect office will prompt you for the new location of the parent deejay.

4.

Once yous select your action, click Next. For the Convert option, yous are asked for the location of the new disk; for Reconnect you lot will be asked to locate the parent disk. Click Finish and gear up the wizard to work. You will see a progress bar, as seen in Figure 4.xi.

▪ Figure iv.xi. Edit Virtual Disk Wizard goes to work.

Another function available to you lot in the Hyper-V Management console is the Inspect Disk option equally seen in Effigy iv.12. The Inspect Disk pick prompts you to locate the .vhd file you wish to inspect. It then connects to the disk and displays the properties in a window similar to Figure iv.13.

▪ Figure 4.12. Audit Disk.

▪ Figure 4.13. Virtual Disk properties.

Type, location, name, size, and max size are listed (run into Effigy 4.13).

The next two Management console options, Cease Service and Remove Server, are shown in Figure 4.14.

▪ Figure 4.14. Hyper-V services.

Stop Service will end the Hyper-5 services on the host auto, turning off whatsoever running virtual machines and disabling the virtual network connections.

Remove server takes the currently selected server off the list of servers bachelor to manage in the Hyper-V Management panel.

Read full chapter

URL:

https://www.sciencedirect.com/scientific discipline/article/pii/B9781597494311000047

Building a Penetration Testing Lab

James Wide , Andrew Bindner , in Hacking with Kali, 2014

VirtualBox

Pros

Bachelor for Windows, Linux, Mac, Solaris, and FreeBSD.

Functions are available to clone VMs (saves time).

Supports more virtual hard disk file types. This is particularly handy when running downloaded and prebuild VMs.

Cons

VMs are isolated from each other unless port forwarding is enabled on the host.

Does non support advanced virtualization needed for Xen, XenServer, vSphere, or other types of hypervisors.

If the VM crashes, there is a higher likelihood that the entire VM will become corrupted.

This guide is specifically for Oracle's VirtualBox version four.2.16 installed on Microsoft Windows 7 Professional person. The decision was fabricated to employ VirtualBox instead of VMWare Player because there are more resources available on the Internet to help if problems ascend; nevertheless, information technology does crave a little actress setup. Call back, the best analysis is your analysis when choosing a virtualization system. There has been a long time over which is the all-time, ultimately choosing ane virtualization system over another is a personal preference. Also, different antivirus programs, both tin be installed to facilitate diverse needs, and then information technology is possible to install VirtualBox and VMWare Player on the same estimator. All of the links and references used throughout this guide were available at the time of writing. Be aware that versions, download locations, and information may alter over time.

Read full chapter

URL:

https://www.sciencedirect.com/science/article/pii/B9780124077492000057

Managing the Windows 7 Desktop Environment

Jorge Orchilles , in Microsoft Windows vii Ambassador's Reference, 2010

Virtual Hard Deejay

The Virtual Hard disk or VHD format is basically a hard drive that actually exists as a file. VHDs are generally used with virtual machines. Just, they can also be used with concrete machines. VHDs have the .vhd file extension.

Create VHD

VHDs can be created in the Deejay Direction MMC snap-in.

To create a VHD, practise the following:

ane.

Right-click the Disk Management MMC snap-in and select Create VHD. Every bit seen in Figure 5.37 , the Create and Adhere Virtual Hard disk drive window will announced.

2.

Specify a location for the difficult deejay file.

3.

Specify a size for the VHD.

4.

Cull whether you want to create a dynamically expanding VHD or a fixed-size VHD.

5.

Click OK. The VHD is created.

FIGURE 5.37. Create and Adhere Virtual Hd Window

Apply VHD

Earlier a VHD can exist used by a system, it must be attached to the system. VHDs that y'all create on a system, like in the previous example, are automatically attached. Simply, you must manually adhere other VHDs to your system.

To adhere a VHD to a system, practise the following:

i.

Right-click the Deejay Management MMC snap-in and select Attach VHD . The Attach Virtual Difficult Deejay window will announced.

ii.

Specify the location of the VHD y'all would like to use.

3.

Specify whether you would like the VHD to exist mounted as read-just or not.

4.

Click OK. The VHD will be attached to your organization.

Once VHDs are attached to your system, they announced in the Disk Management snap-in, just like any other disk. If the VHD is new, it volition have to be initialized. After the disk is initialized and Online, yous can create a volume on the deejay. The disk is then ready for employ.

Read total chapter

URL:

https://world wide web.sciencedirect.com/science/article/pii/B978159749561500005X

Fundamental Configuration of the Citrix Provisioning Server

Gareth R. James , in Citrix XenDesktop Implementation, 2010

SCVMM

1.

Open SCVMM.

ii.

On the right-hand pane – select New virtual auto (come across Figure 7.72).

Figure seven.72. Virtual machine manager.

three.

Alter the radio push button to Create the new virtual auto with a bare virtual hard disk drive and click Next (see Effigy 7.73).

Figure seven.73. Select source.

Give your VM a proper name in the virtual car name field, and click Side by side (see Figure 7.74).

Figure 7.74. Virtual car identity.

4.

Select BIOS and move "PXE Boot" to the top (see Effigy 7.75).

Effigy vii.75. Configure hardware – BIOS.

5.

Check the Network Adapter – make sure it is "Emulated" and not "Synthetic."

6.

Select the Hard Disk nether Jitney Configuration, and click Remove (see Effigy 7.76).

Figure 7.76. Configure hardware – bus configuration.

seven.

Click Next.

8.

Click Next (encounter Figure 7.77).

Figure 7.77. Select destination.

9.

Click Next (see Figure 7.78).

Figure 7.78. Select host.

10.

Click Adjacent (come across Effigy 7.79).

Effigy 7.79. Select path.

11.

Select the network adapter from the drop-down list and click Side by side (see Figure 7.80).

Figure 7.80. Select networks.

By default no adapter is connected, and so this needs to be changed.

12.

Click Side by side (see Figure 7.81).

Figure 7.81. Additional properties.

xiii.

Click Create (run across Figure 7.82).

Effigy 7.82. Summary.

You will get a warning, which you tin can ignore (see Figure 7.83).

Figure 7.83. Warning – virtual hard disks.

14.

Right-click on your VM and select Properties | Hardware Configuration | Network Adapter (see Effigy vii.84).

Figure 7.84. Network adapter.

15.

Alter the Ethernet (MAC) address to Static, and click Generate to generate a MAC address.

16.

Click OK.

Tip

Copy the MAC address to a text file and so you can utilise information technology later on provisioning server.

17.

Repeat the process to create a 2nd diskless virtual desktop.

Read full chapter

URL:

https://www.sciencedirect.com/science/article/pii/B9781597495820000075

Configuring Windows Server Hyper-V and Virtual Machines

Tony Piltzecker , Brien Posey , in The All-time Damn Windows Server 2008 Volume Period (Second Edition), 2008

Virtual Hard Disks

When dealing with virtual machines, virtual storage plays a large role in reaping the benefits of virtualization. A virtual machine relies on virtual hard disks much in the same way a physical car would rely on a physical hard disk. Because of this it is critical to empathize and master the creation and configuration of virtual hard disks.

Hyper-V allows you to designate and connect Virtual Hard Disks (VHD) to the virtual machines that you create. The virtual hard disk drive (VHD) format is a block-based format that stores the contents of a virtual automobile. VHDs use the *.vhd file that simulates the properties of a physical hard drive. Virtual hard disks can be created during the VM creation using Hyper-V Director. VHDs tin can besides be customized and created prior to the cosmos of the virtual machine. To do this Hyper-Five offers the New Virtual Hard disk drive wizard equally shown in Figure ten.3. This is a magician that allows you a smashing deal of configuration options to create the platonic virtual hard disk drive for your requirements.

Here is an overview of the functions available to yous with the New Virtual Hard Disk Sorcerer:

Earlier You Brainstorm This page of the sorcerer explains the purpose of the magician. From this pane you lot can create a default virtual hard deejay without working through the rest of the wizard. Past clicking Finish on this page, the wizard will create a dynamically expanding virtual hard disk drive with a storage capacity of 127 gigabytes by default.

Choose Disk Blazon From this page you can choose 1 of the 3 types of virtual hd that yous would like to create based on the functionality you lot crave.

Dynamically expanding virtual hard disks provide storage capacity every bit needed to shop data. The size of the.*.vhd file is small when initially created and expands as information is added. The size does not shrink automatically, however, when data is deleted. In order to decrease the *.vhd file size you must meaty the deejay after data is deleted by using the Edit Virtual Hard disk drive Wizard.

Fixed virtual hard disks provide storage via a size-specified *.vhd file when the deejay is created initially. The size of the *.vhd file remains fixed regardless of the amount of data stored. In order to change the size of this blazon of disc you must use the Edit Virtual Hard disk drive Sorcerer to increase the size of the virtual difficult disc.

Differencing virtual hard disks provide storage to enable you lot to make changes to a parent virtual difficult disk without altering that deejay. The size of the *.vhd file for a differencing deejay grows as changes are stored to the deejay.

Specify Name and Location This page is used to provide a proper noun and location for your new virtual difficult disk. You lot can also specify a shared location if y'all plan to cluster the virtual hard disk to a virtual machine.

Configure Disk This page allows yous to adjust the configuration of the VHD based on the type of deejay y'all selected in the Choose Disk Type window.

For fixed and dynamically expanding virtual hard disks, yous take the pick to copy the contents of an available physical disk.

For a differencing disk, you can specify the location of the disk y'all want to employ as the parent virtual hard disk drive.

Completing the New Virtual Hard Deejay Magician This folio gives you lot the all the configuration details that you selected from all the previous pages. The new virtual hard disk is created when you lot click Finish. This process tin take a considerable amount of time depending on the configuration options yous cull for your virtual hard disk drive.

The New Virtual Hard Disk Sorcerer can be an invaluable resources creating as well as backing up virtual machines. Once a virtual machine is created by the New Virtual Difficult Disk Wizard you lot can use the Edit Virtual Hard Deejay wizard to make adjustments to information technology. This wizard has a number of options including Compact, Catechumen, Aggrandize, Merge, and Reconnect, based on the type of VHD yous have created.

Here is a summation of each of these functions:

Compact This function applies only to dynamically expanding virtual hard disks and differencing virtual hard disks. It reduces the size of the .*.vhd file by removing blank space left from where data was deleted.

Convert This function converts a dynamically expanding virtual hard deejay to a fixed virtual hard disk or vice versa.

Expand This function increases the total storage capacity of a dynamically expanding virtual hard disk or a fixed virtual hard disk.

Merge This feature applies just to differencing disks and merges the parent partitioning with the differencing deejay for back up purposes.

Reconnect This function applies to differencing disks merely. It allows you to choose a differencing deejay to reconnect to. This page will appear automatically when the parent virtual hard disk cannot be located.

Now that we take a ameliorate understanding of how to create and configure virtual hard disks nosotros are ready to motility on to the creation of virtual machines with the Hyper-Five role.

Read full affiliate

URL:

https://www.sciencedirect.com/science/article/pii/B9781597492737000100

Investigating Dead Virtual Environments

Diane Barrett , Gregory Kipper , in Virtualization and Forensics, 2010

Microsoft

Microsoft'south virtual products, only like VMware'southward products, take other files associated with the virtual motorcar where the VHD format is used. The files and their descriptions are as follows: the virtual machine configuration (.vmc) file, the virtual hard disk (.vhd) file, any virtual machine saved-state (.vsv) files, and virtual machine undo disk (.vud) files associated with the virtual auto. The saved-state and disengage disk files are stored in the aforementioned binder as the .vmc file. If you lot salvage the state of a virtual machine instead of shutting it down, all information from the virtual motorcar's memory is stored in a saved-state file (.vsv file) instead of in a .vhd file. Microsoft recommends that you either restore the virtual machine or discard the changes and and then shut down the virtual machine earlier moving or copying a .vhd file.

Versions prior to Microsoft Virtual Server 2005 supported splitting of disk images, if the disk paradigm grew larger than the maximum supported file size on the host file organization.

Some file systems, such as the FAT32 file system, have a 4 GB limit on file size. If the difficult deejay epitome expands to more than 4 GB, Microsoft Virtual PC 2004 and previous versions volition split up the hd image into another file. The split files are stored in the same directory as the master difficult disk image. They just accept raw data, no headers or footers except for the last 1, which has a footer stored at the end of the file. The first file in the split disk image has an extension of .vhd. The subsequent split files use a number convention similar to an EnCase image, so they would prove equally .v01, .v02, and then on. The maximum number of split files that tin can be nowadays is 64, and the size of the split file cannot be altered.

Read full chapter

URL:

https://world wide web.sciencedirect.com/science/article/pii/B9781597495578000059

Portable Virtualization, Emulators, and Appliances

Diane Barrett , Gregory Kipper , in Virtualization and Forensics, 2010

Microsoft

Microsoft provides a total suite of technologies to enable an integrated, end-to-finish virtualized infrastructure. Microsoft's solution includes servers, desktops, and applications virtual auto direction and virtualization dispatch every bit described in Chapter 2, "Server Virtualization," and Affiliate 3, "Desktop Virtualization." According to Microsoft's Web site, its emphasis on virtualization technologies is rooted in creating what is called a Dynamic Information technology environment. Microsoft uses the VHD file format for its virtual appliances. Nosotros will be discussing dynamic VHD in Chapter five, "Investigating Dead Virtual Environments." The Microsoft VHD file format specifies a virtual car hard disk that can reside on a native host file organisation encapsulated within a single file. This is at present a standard format used past Virtual PC 2007, Virtual Server 2005 R2, and Hyper-Five. Microsoft plans to use this format for hereafter versions of Microsoft Windows Server with hypervisor-based virtualization technology.

Microsoft'southward Web site offers a VHD Examination Drive Program, which provides software vendors with a place to distribute preconfigured applications within Windows Server-based virtual machines to their customers. This gives Microsoft partners a way to offer their prospective and electric current customers more than choices and flexibility for evaluating application software and makes it easier to appraise complex solutions through the distribution of preconfigured virtual machines. These preconfigured virtual machines currently run on Virtual Server 2005 R2 or Hyper-Five Arrangement Centre Virtual Machine, as shown in Figure 4.12. If the plan is successful, the offerings are sure to expand.

Figure 4.12. Microsoft'due south Test Drive Program

Manager tin can also be used to manage all the virtual machines in an environs. Across that, the VHD format is broadly applicative. Since June 2005, Microsoft has made the VHD Image Format Specification available to third parties under a royalty-gratuitous license, and as noted earlier, MojoPac has partnered with Microsoft to leverage their engineering science. Microsoft offers preconfigured VHDs that can exist downloaded and evaluated similar to the virtual appliance market of VMware. Figure 4.13 shows the readily available VHD images.

Effigy 4.13. Microsoft VHD Images

Notwithstanding, the images that are offered are a scrap unlike than those offered by VMware's Appliance Market place. Microsoft currently simply offers VHDs that are evaluation copies due to licensing.

Read full chapter

URL:

https://www.sciencedirect.com/scientific discipline/article/pii/B9781597495578000047