Adding and Removing Network Adapters in Windows Server 2016 Hyper-V

Home > Blogs > Windows Server 2016 > Adding and Removing Network Adapters in Windows Server 2016 Hyper-V

Adding and Removing Network Adapters in Windows Server 2016 Hyper-V

Like This Blog 0 Rick Trader
Added by February 27, 2017

Have you ever found yourself in a situation with a production VM where you need to add a new NIC or replace a failed NIC.  Until now just like a physical computer you had to shutdown the VM to add or remove the NIC.

Now in Windows Server 2016 you can hot add and remove a NIC from a running VM.  There a few requirements that must be met.

  • Windows Server 2016 or Windows 10 Hyper-V Host
  • Generation 2 VMs
  • VM Configuration must be upgraded.
  • VM Guest either Windows or Linux operating systems.

Having this capability should make our lives easier as IT Admins when having to add or replace Network Adapters.

Until Next Time, RIDE SAFE!

Rick Trader
Windows Server Instructor – Interface Technical Training
Phoenix, AZ

Videos You May Like

Windows 10 Managing, Deploying and Configuring – December 2, 2015

0 426 1

In this recorded Windows 10 training webinar from December 2, 2015, Windows Server instructor Rick Trader presents the deployment and management of Windows 10 Enterprise and the new Provisioning capability in Windows 10. Learn how to manage Windows 10 deployments using System Center Configuration Manager, Mobile Device Management and Intune. Also included in his presentation … Continue reading Windows 10 Managing, Deploying and Configuring – December 2, 2015

Using WHOAMI.exe to troubleshoot NTFS Permissions in Windows

0 154 0

See our class schedule for complete Windows 7 and Server 2012 Training. Classes are held in Phoenix, AZ and can be attended online from anywhere in the world with RemoteLive™. Instructor: Rick Trader Video Transcript: One of the most common problems you will run into as an IT administrator when working in an enterprise or a … Continue reading Using WHOAMI.exe to troubleshoot NTFS Permissions in Windows

Detailed Forensic Investigation of Malware Infections – April 21, 2015

4 585 5

How does an investigator hunt down and identify unknown malware? In this recording of our IT Security training webinar on April 21, 2015, Security expert Mike Danseglio (CISSP / CEH) performed several malware investigations on infected computers and identify symptoms, find root cause, and follow the leads to determine what’s happening. He demonstrated his preferred … Continue reading Detailed Forensic Investigation of Malware Infections – April 21, 2015

Write a Comment

Share your thoughts...

Please fill out the comment form below to post a reply.