Примеры использования The hypervisor на Английском языке и их переводы на Русский язык
{-}
-
Official
-
Colloquial
Host- server on which the hypervisor is installed.
Virtualization cluster operation is managed by the hypervisor.
Attacks on the hypervisor from the physical network;
Of the main limitations, of course,this is overhead for the hypervisor.
Attacks on the hypervisor from the virtual machine;
Люди также переводят
You can specify one orseveral virtual networks available on the hypervisor.
The hypervisor provides isolation between different virtual machines.
Check the system date on the SVM by means of the hypervisor tools.
On the hypervisor, enable the virtual machine being used as a virtual machine template.
Ensure that the ADMIN$ shared network resource is enabled on the hypervisor.
After it is deployed on the hypervisor, the SVM forwards the following tags to Kaspersky Security Center.
A license is required for each occupied motherboard socket as reported by the hypervisor API.
On the hypervisor, turn on the protected virtual machine being used as a temporary protected virtual machine template.
Kaspersky Security starts protecting virtual machines on the hypervisor according to the policy settings.
Selecting the SVM image At this step, select the file of the SVM image for deployment on the hypervisor.
Zones containing records about the SVM and the hypervisor on which the SVM is deployed are integrated with Active Directory.
At this step,the wizard displays all of the previously entered settings required for deploying the SVM on the hypervisor.
Once you apply the right settings, you will be able to ping the hypervisor to check and see if everything has been set up correctly.
Specify the hypervisor on which the SVM should run in the Possible Owners field in the cluster role properties of each SVM.
Specify the account to be used by the SVM to connect to the hypervisor or the virtual infrastructure administration server.
The hypervisor allocates resources of a physical server for each virtual machine and enables guest operating systems' interrupts handling.
If you want to use the network time protocol(Network Time Protocol),it is recommended to disable time synchronization at the hypervisor level.
When the SVM on the hypervisor on which the protected virtual machine is running becomes available, Light Agent connects to this SVM.
This principle works for any virtual environment; regardless of the hypervisor you are running(VMware, Hyper-V or whatever): backup is king!
The hypervisor handles the interrupts to the processor, and redirects them to the respective partition using a logical Synthetic Interrupt Controller SynIC.
In addition, the package provides the Xen PTI stage 1 mitigation which is built-in and enabled by default on Intel systems, butcan be disabled with xpti=false' on the hypervisor command line.
If an error occurs on the hypervisor during the SVM deployment process,the wizard rolls back the changes on this hypervisor. .
After startup, an SVM deployed in shared storage is run on the hypervisor within the Citrix XenServer hypervisor pool with the most resources and/ or the least load.