Barney's Blog

Blog archive

Managing Virtual Machine Workflows

Microsoft is trying to make managing virtual machines a little easier through a Web-based portal that can be used by managers overseeing datacenters or by IT pros to provision applications and services. To that end, it has rolled out a new beta version of System Center Virtual Machine Manager Self-Service Portal 2.0 Service Pack 1 (SCVMM 2.0 SP1).

SCVMM 2.0 SP1 may be a mouthful, but it's another tool to automate workflows based on the user's role. Microsoft added a few improvements with the beta, such as greater virtual machine import support and the ability to set expiration dates for virtual machines, among others.

The catch is that the portal is designed to work with Microsoft's System Center Virtual Machine Manager product, if you've paid for it. Microsoft has another virtual machine manager that's free with Hyper-V.

Is your shop using System Center Virtual Machine Manager and the new portal or something else to manage workflows for your virtual machines? Tell Doug about your favorite tools at dbarney@redmondmag.com.
-By Kurt Mackie

Posted by Doug Barney on 03/09/2011 at 1:18 PM


Featured

  • Microsoft Bolsters Windows IoT with NXP and SQL Server Support

    Microsoft's Internet of Things (IoT) product line is continuing to grow, with a few new developments highlighted this week.

  • Tamper Protection Now Available to Microsoft Defender ATP Subscribers

    The Microsoft Defender Advanced Threat Protection (ATP) E5 subscription plan now has an optional "tamper protection" security feature, Microsoft announced on Monday.

  • Exploring OCR, a New Way To Get Data into Excel

    Microsoft recently added a new optical character recognition feature to Excel that lets users import data from a photograph taken from a smartphone. Here's how to use it.

  • Microsoft Authenticator App To Get Real-Time Phishing Protections

    Microsoft is working on adding capabilities to its Microsoft Authenticator app to help defeat security breaches enabled by advanced attack techniques, including phishing and man-in-the-middle methods.

comments powered by Disqus

Office 365 Watch

Sign up for our newsletter.

Terms and Privacy Policy consent

I agree to this site's Privacy Policy.