Adding and Removing Network Adapters in Windows Server 2016 Hyper-V

Home > Blogs > Windows Server 2016 > Adding and Removing Network Adapters in Windows Server 2016 Hyper-V

Adding and Removing Network Adapters in Windows Server 2016 Hyper-V

Like This Blog 0 Rick Trader
Added by February 27, 2017

Have you ever found yourself in a situation with a production VM where you need to add a new NIC or replace a failed NIC.  Until now just like a physical computer you had to shutdown the VM to add or remove the NIC.

Now in Windows Server 2016 you can hot add and remove a NIC from a running VM.  There a few requirements that must be met.

  • Windows Server 2016 or Windows 10 Hyper-V Host
  • Generation 2 VMs
  • VM Configuration must be upgraded.
  • VM Guest either Windows or Linux operating systems.

Having this capability should make our lives easier as IT Admins when having to add or replace Network Adapters.

Until Next Time, RIDE SAFE!

Rick Trader
Windows Server Instructor – Interface Technical Training
Phoenix, AZ

Videos You May Like

Creating Users and Managing Passwords in Microsoft Office 365

0 648 3

In this Office 365 training video, instructor Spike Xavier demonstrates how to create users and manage passwords in Office 365.   For instructor-led Office 365 training classes, see our course schedulle: Spike Xavier SharePoint Instructor – Interface Technical Training Phoenix, AZ 20347: Enabling and Managing Office 365    

Windows 10 Managing, Deploying and Configuring – December 2, 2015

0 434 1

In this recorded Windows 10 training webinar from December 2, 2015, Windows Server instructor Rick Trader presents the deployment and management of Windows 10 Enterprise and the new Provisioning capability in Windows 10. Learn how to manage Windows 10 deployments using System Center Configuration Manager, Mobile Device Management and Intune. Also included in his presentation … Continue reading Windows 10 Managing, Deploying and Configuring – December 2, 2015

Detailed Forensic Investigation of Malware Infections – April 21, 2015

4 609 5

How does an investigator hunt down and identify unknown malware? In this recording of our IT Security training webinar on April 21, 2015, Security expert Mike Danseglio (CISSP / CEH) performed several malware investigations on infected computers and identify symptoms, find root cause, and follow the leads to determine what’s happening. He demonstrated his preferred … Continue reading Detailed Forensic Investigation of Malware Infections – April 21, 2015

Write a Comment

Share your thoughts...

Please fill out the comment form below to post a reply.