Skip to content

Commit f79332c

Browse files
committed
Update hyper-v-virtual-machine-input-migration-integration.md
1 parent 573f769 commit f79332c

1 file changed

Lines changed: 24 additions & 23 deletions

File tree

support/windows-server/virtualization/hyper-v-virtual-machine-input-migration-integration.md

Lines changed: 24 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -50,29 +50,30 @@ This article provides a comprehensive guide to troubleshoot common issues encoun
5050

5151
### Resolution: Input and device integration issues
5252

53-
#### A. Mouse or keyboard issues in guest VMs
53+
#### Mouse or keyboard issues in guest VMs
5454

55-
- For inverted mouse input in Linux guest VMs on Windows 11, version 24H2, revert the host OS to Windows 11, version 23H2 until a permanent fix is available.
56-
- To resolve Enhanced Session Mode input loss in Windows 11 VMs, follow these steps:
55+
For inverted mouse input in Linux guest VMs on Windows 11, version 24H2, revert the host OS to Windows 11, version 23H2 until a permanent fix is available.
5756

58-
1. Open **Hyper-V Manager**.
59-
2. Navigate to **Hyper-V Settings** > **Enhanced Session Mode Policy**.
60-
3. Uncheck **Allow enhanced session mode** to disable the feature.
61-
4. Test input functionality in standard session mode.
57+
To resolve Enhanced Session Mode input loss in Windows 11 VMs, follow these steps:
6258

63-
#### B. USB or GPU passthrough after VMware migration
59+
1. Open **Hyper-V Manager**.
60+
2. Navigate to **Hyper-V Settings** > **Enhanced Session Mode Policy**.
61+
3. Uncheck **Allow enhanced session mode** to disable the feature.
62+
4. Test input functionality in standard session mode.
63+
64+
#### USB or GPU passthrough after VMware migration
6465

6566
- USB devices:
6667

6768
- Use Remote Desktop USB redirection or Enhanced Session Mode for supported OSs.
6869
- Alternatively, configure a network USB solution as Hyper-V doesn't natively support direct USB passthrough.
6970

70-
- GPU assignment: Use Discrete Device Assignment (DDA):
71+
- GPU assignment:
7172

72-
- Follow guidance from [Deploying graphics devices using DDA](/windows-server/virtualization/hyper-v/deploy/deploying-graphics-devices-using-dda#configure-the-vm-for-dda).
73+
- Follow guidance from [Deploying graphics devices using Discrete Device Assignment (DDA)](/windows-server/virtualization/hyper-v/deploy/deploying-graphics-devices-using-dda#configure-the-vm-for-dda).
7374
- Confirm hardware, drivers, and VM configuration support for DDA.
7475

75-
#### C. Uninstalling VMware tools
76+
#### Uninstalling VMware tools
7677

7778
Use PowerShell scripts, like **Uninstall-VMwareTools.ps1** from GitHub, to forcibly remove VMware tools and associated services after migration.
7879

@@ -85,7 +86,7 @@ Use PowerShell scripts, like **Uninstall-VMwareTools.ps1** from GitHub, to forci
8586

8687
### Resolution: Migration and cluster issues
8788

88-
#### A. TPM/shielded VM migration failures
89+
#### TPM/shielded VM migration failures
8990

9091
1. On the source node, list shielded VM certificates by using the following command:
9192

@@ -106,13 +107,13 @@ Use PowerShell scripts, like **Uninstall-VMwareTools.ps1** from GitHub, to forci
106107
bashcertutil -importPFX "Shielded VM Local Certificates" c:\cert-VMEncryption.pfxcertutil -importPFX "Shielded VM Local Certificates" c:\cert-VMSigning.pfx
107108
```
108109

109-
#### B. VLAN/network connectivity
110+
#### VLAN/network connectivity
110111

111112
- Configure physical switch ports as trunk ports to allow all VLANs.
112113
- Replace legacy LBFO (Load Balancing and Failover) teams with Switch Embedded Teaming (SET) for physical NICs.
113114
- Assign VLAN IDs and verify connectivity for each physical interface.
114115

115-
#### C. VM configuration version
116+
#### VM configuration version
116117

117118
Update the VM configuration by using the following cmdlet:
118119

@@ -122,7 +123,7 @@ Update-VMVersion -Name <VMName>
122123

123124
After the updating, test live migration. If issues persist, shut down the VM, perform a quick migration, and then restart.
124125

125-
#### D. Cluster/heartbeat-related reboots
126+
#### Cluster/heartbeat-related reboots
126127

127128
If VMs are rebooted due to heartbeat failures, follow these steps:
128129

@@ -160,15 +161,15 @@ If VMs are rebooted due to heartbeat failures, follow these steps:
160161

161162
## Cause 4: Application-level and third-party integration
162163

163-
- Monitoring/agent crashes: Third-party monitoring or agent software (such as SCVMM or Zenoss) might fail due to changes in Hyper-V or Windows Server. These failures often occur without a direct impact unless associated with failed operations.
164+
Monitoring/agent crashes: Third-party monitoring or agent software (such as SCVMM or Zenoss) might fail due to changes in Hyper-V or Windows Server. These failures often occur without a direct impact unless associated with failed operations.
164165

165166
### Resolution: Application-level and third-party integration issues
166167

167-
- If monitoring or agent integration fails:
168+
If monitoring or agent integration fails:
168169

169-
- Verify WMI and WINRM configurations on hosts.
170-
- Review application logs for authentication errors, such as GSS challenge failures.
171-
- If Hyper-V and WMI are functional, escalate to the third-party vendor for further support.
170+
- Verify WMI and WINRM configurations on hosts.
171+
- Review application logs for authentication errors, such as GSS challenge failures.
172+
- If Hyper-V and WMI are functional, escalate to the third-party vendor for further support.
172173

173174
## General remediation and prevention
174175

@@ -177,9 +178,9 @@ If VMs are rebooted due to heartbeat failures, follow these steps:
177178
- Maintain up-to-date documentation of VM configurations, certificates, and network settings.
178179
- For security vulnerabilities, ensure correct revocation policies and registry settings by using the following command:
179180

180-
```console
181-
bashSet-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\DeviceGuard" -Name EnableVirtualizationBasedSecurity -Value 0 -Type DWordRestart-Computer
182-
```
181+
```console
182+
bashSet-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\DeviceGuard" -Name EnableVirtualizationBasedSecurity -Value 0 -Type DWordRestart-Computer
183+
```
183184

184185
## Data collection
185186

0 commit comments

Comments
 (0)