How to connect/remote Hyper-V Server using Server Manager from another Windows Server and view Task Scheduler

How to connect/remote Hyper-V Server using Server Manager from another Windows Server and view Task Scheduler

First we have to enable communication between the two servers.

Connect to your Hyper-V Server and open powershell. Type the following two commands:

				
					Enable-PSRemoting

Enable-WSManCredSSP -Role server
				
			

From your Windows Server that will remotely manage your Hyper-V start a powershell and type the following commands. Replace the name in quotes with your Hyper-V Server name.

				
					Set-Item WSMan:\localhost\Client\TrustedHosts -Value "Replace with your Hyper-V Name"

Enable-WSManCredSSP -Role client -DelegateComputer "Replace with your Hyper-V Name"
				
			

 

From your Windows Server start the Server Manager, add the Server as usual and select.

How-to-connect-remote-to-a-Hyper-V-Server-using-Server-Manager-from-another-Windows-Server-and-view-Task-Scheduler

 

Right click over the Server and click “Manage As…”

How-to-connect-remote-to-a-Hyper-V-Server-using-Server-Manager-from-another-Windows-Server-and-view-Task-Scheduler

 

Type your Hyper-V’s credentials

How-to-connect-remote-to-a-Hyper-V-Server-using-Server-Manager-from-another-Windows-Server-and-view-Task-Scheduler

 

Start Computer Management on the remote Hyper-V Server.

How-to-connect-remote-to-a-Hyper-V-Server-using-Server-Manager-from-another-Windows-Server-and-view-Task-Scheduler

 

You are now able to View/Edit Task Schedules on the remote Hyper-V Server

How-to-connect-remote-to-a-Hyper-V-Server-using-Server-Manager-from-another-Windows-Server-and-view-Task-Scheduler

latest posts

Unveiling Hidden Dangers: The Perils of UPnP and Protecting Your Digital Homestead – Apple Time Capsule

The Dangers of Default Settings: A Narrative on UPnP and Data Vulnerability During one of my routine client visits, I encountered a situation that underscored the criticality of cybersecurity in...

Ransomware attacks in 2022 – Protection Measures

The majority of ransomware attacks in 2022 began with the exploitation of public-facing applications, data retrieval from compromised user accounts, and malicious emails, a new report by Kaspersky reveals.According to...

GPT-3 vs GPT-4 improvements, differences, thoughts and examples

GPT-4 builds upon the success of its predecessor, GPT-3, by offering several improvements in various aspects. While both models are based on the Transformer architecture, GPT-4 has several advancements over...

Ransomware severs 1,000 ships from on-shore servers

A Norwegian company specializing in maritime risk management faced a ransomware attack on January 7th 2023 that caused its ShipManager software to go offline, resulting in 1,000 ships losing their...

OTHER PRODUCTS