-Use PowerShell to create a list of all your virtual machines(VM) including name and IP address without logging or going to networking tab.
-Enable router guard and DHCP guard options to avoid unauthorized networking accesses. You can do it using VM libraries, PowerShell or Set-VMNetworkAdapter cmdlet.
The growth and improper use of domain administrator accounts is one of the major security threats to systems in Windows Active Directory (AD) domains.
In order to avoid potential issues arising from these troubles, here’s an article about restricting the use of domain admin accounts to domain controllers in Windows Server 2012 R2 domains by enabling support for additional Kerberos features.
The author also explains how to create a new authentication policy and silo. You can have a look at the tutorial here
According to our followers, the most interesting topics added to our blog during last weeks are: the main differences among three of the most popular hypervisors (Hyper-V, ESXi & XenServer); UDS Enterprise & oVirt integration and the possibility of using any connection protocol with UDS Enterprise.
Find below the link to the top 3 articles in our blog in case you missed them:
UDS Enterprise fully integrates with Microsoft Hyper-V (version 3 onwards).
UDS Enterprise components are offered in Virtual Appliance format and they are hosted on the Hyper-V platform on which the virtual desktops are going to be deployed.
The integration process is very easy, you can check it reading this presentation:
Desktop virtualization in Call Center environments, the suitability of Windows virtual desktops regarding the type of user and the availability of the first version of Citrix XenServer Dundee have been the most read topics in our blog for the last two weeks.
We have collected the links to these articles so that you keep up to date with the most interesting topics according to our followers:
To offer the best experiences, we use technologies such as cookies to store and/or access device information. Consent to these technologies will allow us to process data such as browsing behavior or unique identifications on this site. Not consenting or withdrawing consent may negatively affect certain features and functions.
Functional
Always active
The storage or technical access is strictly necessary for the legitimate purpose of allowing the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication through an electronic communications network.
Preferencias
El almacenamiento o acceso técnico es necesario para la finalidad legítima de almacenar preferencias no solicitadas por el abonado o usuario.
Statistics
Storage or technical access that is used exclusively for anonymous statistical purposes.El almacenamiento o acceso técnico que se utiliza exclusivamente con fines estadísticos anónimos. Sin un requerimiento, el cumplimiento voluntario por parte de tu Proveedor de servicios de Internet, o los registros adicionales de un tercero, la información almacenada o recuperada sólo para este propósito no se puede utilizar para identificarte.
Marketing
Storage or technical access is necessary to create user profiles to deliver advertising, or to track the user across one or multiple websites for similar marketing purposes.