This course explains role-based security as used in VMM and SCOM to group tasks together -- whether it be to have some groups use VMM to build servers in select host groups, or to configure VMM for others to maintain host groups. The course also covers how VMM can interface with alternate virtualization technology.
Objectives:
- Solve performance and resource issues
- Configure delegation of rights
- Create roles and configure authorization rights
- Manage non-Hyper-V-aware virtualization
Topics:
- Solve Performance and Resource Issues
- Configure Delegation of Rights
- Create Roles and Configure Authorization Rights
- Manage Non-Hyper-V-Aware Virtualization
|
Minimum 500MHz Processor; 128 MB RAM; Windows 2000, XP, Vista, 7 or Mac OS X v10.4+; Internet Explorer 7.0+ or Firefox 3.0+ or Chrome 3.0+ or Safari 4.0+. 56K minimum connection; Adobe Flash Player 9.0+ or Windows Media Player 9.0+ for IE users who do not have Adobe Flash Player; JavaScript, popup windows and cookies enabled; Sound card with speakers or headphones strongly recommended.
|
Copyright © 2013. All rights reserved.