Hyper-V Implementation Challenges and Solutions Report

Verified

Added on  2023/03/30

|5
|929
|171
Report
AI Summary
This report analyzes the challenges associated with implementing and auditing Microsoft Hyper-V in an IT infrastructure. It highlights issues related to architecture, configuration, and software, emphasizing the importance of addressing security vulnerabilities and network segmentation to prevent attacks. The report discusses the need for regular updates, proper virtual machine lockdown, and protection of the host layer. It also addresses the importance of skilled audit teams, the adoption of new technologies, and the implementation of security models. Furthermore, it outlines the challenges faced during configuration and the need for standardized templates. The report concludes by emphasizing the critical role of skilled auditors in navigating these challenges and ensuring the effective use of Hyper-V in the IT environment. It also provides references to support the findings and recommendations.
Document Page
Running head: - MICROSOFT HYPER-V
USE OF MICROSOFT HYPER-V
Name of the Student
Name of the University
Author’s Note
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1MICROSOFT HYPER-V
Hyper-V is a platform that is used for virtualisation. With the help of the platform,
the administrator can perform their work at a faster rate and with ease. With the help of the
Microsoft Hyper-V, the administrators can use the hardware in a better way. The hardware is
used well as the virtualisation is performed. With the help of the virtualisation, the physical
server can be easily used by the different operating systems simultaneously. The Hyper-V is
one of the better tool used by the developers in improving the information technology
infrastructure (Fayyad-Kazan, Perneel & Timmerman, 2013). The Microsoft Hyper-V can be
used for the testing of the software.
There are various challenges that the auditor faces while implementing the different
and new technologies in the information technology structure. The challenges are divided
into different categories. The challenges are related to the architecture, configuration and
software. The different layers present in the architecture of the hardware are more vulnerable
to face attacks by hackers. Various agents can harm the virtual platform. However, the
auditors need to maintain the layers. The solution to the challenges is that the security
features need to be updated regularly (Sheikh, 2016). The IT employees need to monitor all
the implemented virtual machine. When several networks are connected within a single
connection, it is easy for the attackers to attack. To avoid such a situation, the segmentation
of the network helps in preventing hackers from attacking. The physical layer of the device is
also improved.
The second risk is related to the challenges of the software. One of the important
software present in the infrastructure of information technology is related to Hyper-V. All the
risks and threats are interrelated. The auditing team need to maintain the platform of the
virtual machine to avoid the risk related to the IT infrastructure (Djenna & Batouche, 2014).
There are certain methods by which the faced challenges can be resolved. The failure related
Document Page
2MICROSOFT HYPER-V
to a single point must be avoided. All the related software of the Hypervisor must be updated
regularly. The virtual machine must be lockdown properly so that no other people can access
the software associated with the Hyper-V (Polenov et al., 2016). The host layer of the system
must be protected as it is more vulnerable to attacks by the attackers. The audit team must be
trusted by the organization ad any change can affect the entire system operation. The
challenge is also related to improving the level of technology which is used. It is also related
to the finding of different sets of people with different skills. The skills must be unique and
related to emerging technologies. The related advisor of the infrastructure must be trusted so
that the change can be beneficial for the organization. Certain security models will help in the
protection of the Hyper-V, which is implemented by the audit team in the IT infrastructure.
The organisation where the hardware has replaced the need to implement certain policies for
the development and improvement of the infrastructure.
There are also challenges faced by the audit team at the time of configuration. The
new technologies can be implemented easily by the audit team in the system, but the main
issue is faced at the time of the configuration. The integrity level of the Hyper-V must be
maintained. All the configuration details and the related audit must be controlled (Finn et al.,
2013). The different events operating with the use of the Microsoft Hyper-v must be checked
and monitored so that the audit team faces fewer challenges. The issue is faced by the audit
team when it lacks sufficient function required for the installation of the technologies. The
challenge is faced by the audit team when the implementation is not associated with any
templates. However, to avoid such challenges, the template must be followed by the audit
team at the time of implementation of the Hyper-V and newer technologies. Generally, the
challenges are faced by the audit team due to different reasons. The lack of skill to implement
new technology is one of the major challenges faced by the internal audit team (Elsayed &
Abdelbaki, 2013). The audits are generally done in three different steps. The process, product
Document Page
3MICROSOFT HYPER-V
and the system audit. The industry lacks skill auditor. The audit team lack people knowing
emerging and new technologies. However, it can be concluded that there are different
challenges which are faced by the internal audit team in the implementation of the newer
technologies in the IT infrastructure.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4MICROSOFT HYPER-V
References
Djenna, A., & Batouche, M. (2014, June). Security problems in cloud infrastructure. In The
2014 International Symposium on Networks, Computers and Communications (pp. 1-
6). IEEE.
Elsayed, A., & Abdelbaki, N. (2013, November). Performance evaluation and comparison of
the top market virtualization hypervisors. In 2013 8th International Conference on
Computer Engineering & Systems (ICCES) (pp. 45-50). IEEE.
Fayyad-Kazan, H., Perneel, L., & Timmerman, M. (2013). Benchmarking the performance of
Microsoft Hyper-V server, VMware ESXi and Xen hypervisors. Journal of Emerging
Trends in Computing and Information Sciences, 4(12), 922-933.
Finn, A., Lownds, P., Luescher, M., & Flynn, D. (2013). Windows server 2012 hyper-v
installation and configuration guide. John Wiley & Sons.
Polenov, M., Kostyuk, A., Muntyan, E., Guzik, V., & Lukyanov, V. (2016, April).
Application of virtualization technology for implementing smart house control
systems. In Computer Science On-line Conference (pp. 329-339). Springer, Cham.
Sheikh, H. (2016). HPE Hyper Converged.
chevron_up_icon
1 out of 5
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]