Hyper-V is a platform used for virtualization, allowing administrators to work faster and more efficiently. It improves IT infrastructure and enables simultaneous use of different operating systems. Learn about challenges, solutions, auditing, and configuration.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: - MICROSOFT HYPER-V USE OF MICROSOFT HYPER-V Name of the Student Name of the University Author’s Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1MICROSOFT HYPER-V Hyper-V is a platform that is used for virtualisation. With the help of the platform, the administrator can perform their work at a faster rate and with ease. With the help of the Microsoft Hyper-V, the administrators can use the hardware in a better way. The hardware is used well as the virtualisation is performed. With the help of the virtualisation, the physical server can be easily used by the different operating systems simultaneously. The Hyper-V is one of the better tool used by the developers in improving the information technology infrastructure (Fayyad-Kazan, Perneel & Timmerman, 2013). The Microsoft Hyper-V can be used for the testing of the software. There are various challenges that the auditor faces while implementing the different and new technologies in the information technology structure. The challenges are divided into different categories. The challenges are related to the architecture, configuration and software. The different layers present in the architecture of the hardware are more vulnerable to face attacks by hackers. Various agents can harm the virtual platform. However, the auditors need to maintain the layers. The solution to the challenges is that the security features need to be updated regularly (Sheikh, 2016). The IT employees need to monitor all the implemented virtual machine. When several networks are connected within a single connection, it is easy for the attackers to attack. To avoid such a situation, the segmentation of the network helps in preventing hackers from attacking. The physical layer of the device is also improved. The second risk is related to the challenges of the software. One of the important software present in the infrastructure of information technology is related to Hyper-V. All the risks and threats are interrelated. The auditing team need to maintain the platform of the virtual machine to avoid the risk related to the IT infrastructure (Djenna & Batouche, 2014). There are certain methods by which the faced challenges can be resolved. The failure related
2MICROSOFT HYPER-V to a single point must be avoided. All the related software of the Hypervisor must be updated regularly. The virtual machine must be lockdown properly so that no other people can access the software associated with the Hyper-V (Polenov et al., 2016). The host layer of the system must be protected as it is more vulnerable to attacks by the attackers. The audit team must be trusted by the organization ad any change can affect the entire system operation. The challenge is also related to improving the level of technology which is used. It is also related to the finding of different sets of people with different skills. The skills must be unique and related to emerging technologies. The related advisor of the infrastructure must be trusted so that the change can be beneficial for the organization. Certain security models will help in the protection of the Hyper-V, which is implemented by the audit team in the IT infrastructure. The organisation where the hardware has replaced the need to implement certain policies for the development and improvement of the infrastructure. There are also challenges faced by the audit team at the time of configuration. The new technologies can be implemented easily by the audit team in the system, but the main issue is faced at the time of the configuration. The integrity level of the Hyper-V must be maintained. All the configuration details and the related audit must be controlled (Finn et al., 2013). The different events operating with the use of the Microsoft Hyper-v must be checked and monitored so that the audit team faces fewer challenges. The issue is faced by the audit team when it lacks sufficient function required for the installation of the technologies. The challenge is faced by the audit team when the implementation is not associated with any templates. However, to avoid such challenges, the template must be followed by the audit team at the time of implementation of the Hyper-V and newer technologies. Generally, the challenges are faced by the audit team due to different reasons. The lack of skill to implement new technology is one of the major challenges faced by the internal audit team (Elsayed & Abdelbaki, 2013). The audits are generally done in three different steps. The process, product
3MICROSOFT HYPER-V and the system audit. The industry lacks skill auditor. The audit team lack people knowing emerging and new technologies. However, it can be concluded that there are different challenges which are faced by the internal audit team in the implementation of the newer technologies in the IT infrastructure.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4MICROSOFT HYPER-V References Djenna, A., & Batouche, M. (2014, June). Security problems in cloud infrastructure.InThe 2014 International Symposium on Networks, Computers and Communications(pp. 1- 6). IEEE. Elsayed, A., & Abdelbaki, N. (2013, November). Performance evaluation and comparison of the top market virtualization hypervisors. In2013 8th International Conference on Computer Engineering & Systems (ICCES)(pp. 45-50). IEEE. Fayyad-Kazan, H., Perneel, L., & Timmerman, M. (2013). Benchmarking the performance of Microsoft Hyper-V server, VMwareESXi and Xen hypervisors.Journal of Emerging Trends in Computing and Information Sciences,4(12), 922-933. Finn, A., Lownds, P., Luescher, M., & Flynn, D. (2013).Windows server 2012 hyper-v installation and configuration guide. John Wiley & Sons. Polenov,M.,Kostyuk,A.,Muntyan,E.,Guzik,V.,&Lukyanov,V.(2016,April). Applicationofvirtualizationtechnologyforimplementingsmarthousecontrol systems. InComputer Science On-line Conference(pp. 329-339). Springer, Cham. Sheikh, H. (2016). HPE Hyper Converged.