Hyper v server 2012 licensing setup

Posted on 2014-07-15
Last Modified: 2014-11-12
Hi Experts

I'm in the process of virtualising 8 desktop PCs running windows xp and 7. I have setup hyper v server 2012 and setup the VMs. I have also setup a server 2012 standard server to manage the hyper v server and to manage backups. I have also setup 2 desktop PCs each PC has a quad output graphics card and VM manager installed. The plan is to have 2 users connecting to the 2 pcs, each pc will then rdp onto 4 VMs each and display the output on each screen. This is all working well, my question is I assume I will need to install remote desktop services on, im guessing the windows server 2012 server, is this required for this type of setup and can you point me in the direction of how to configure it for my setup?
Question by:corecc
    LVL 56

    Expert Comment

    by:Cliff Galiher
    This is what is known as a VDI setup and you must indeed set up RDS as a VDI server and purchase VDI licensing such as VDA or SA. This takes a fair amount of planning and can't easily be covered in an EE question.
    LVL 1

    Author Comment

    I notice when adding the remote desktop services role to the server 2012 server it installs hyper v and iis, do I even need to install remote desktop services on this server? isn't everything that's needed for hyper v to work running on the Hyper v server 2012?
    LVL 18

    Accepted Solution

    Hyper V is separate from Terminal Server.
    You only need RDP license services if your server would be providing RDP services to remote into the 2 PCs you mentioned or better still, connect directly to the VDIs without having to go through the 2 PCs.

    It is not required for your setup - It's another way (though better) of providing remote access to your VMs. This lets you remote directly into the VMs without having to first connect to the 2 PCs
    LVL 1

    Author Closing Comment

    ok, thanks for your help

    Featured Post

    Why You Should Analyze Threat Actor TTPs

    After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

    Join & Write a Comment

    Suggested Solutions

    When we have a dead host and we lose all connections to the ESXi, and we need to find a way to move all VMs from that dead ESXi host.
    The recent Microsoft changes on update philosophy for Windows pre-10 and their impact on existing WSUS implementations.
    In this Micro Tutorial viewers will learn how to restore single file or folder from Bare Metal backup image of their system. Tutorial shows how to restore files and folders from system backup. Often it is not needed to restore entire system when onl…
    This tutorial will walk an individual through the process of installing of Data Protection Manager on a server running Windows Server 2012 R2, including the prerequisites. Microsoft .Net 3.5 is required. To install this feature, go to Server Manager…

    745 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    17 Experts available now in Live!

    Get 1:1 Help Now