{"id":370,"date":"2014-10-12T15:17:36","date_gmt":"2014-10-12T19:17:36","guid":{"rendered":"http:\/\/adsecurity.org\/?p=370"},"modified":"2014-10-28T22:20:39","modified_gmt":"2014-10-29T02:20:39","slug":"hyper-v-vm-generation-differences","status":"publish","type":"post","link":"https:\/\/adsecurity.org\/?p=370","title":{"rendered":"Hyper-V VM Generation Differences"},"content":{"rendered":"<p>&nbsp;<\/p>\n<p><a href=\"http:\/\/blogs.technet.com\/b\/tip_of_the_day\/archive\/2014\/10\/02\/tip-of-the-day-generation-2-vms.aspx\">From the Microsoft Tip of the Day Blog:<\/a><\/p>\n<blockquote><p>Generation 2 VMs replace a large number of emulated devices with resource efficient synthetic devices.\u00a0 Here is a list of Generation 1 devices that you will not find in a new Generation 2 VM.<\/p>\n<ul>\n<li>BIOS<\/li>\n<li>COM Ports<\/li>\n<li>DMA Controller<\/li>\n<li>Floppy Controller<\/li>\n<li>i8042 Keyboard Controller<\/li>\n<li>IDE Controller<\/li>\n<li>Legacy NIC<\/li>\n<li>PCI Bus<\/li>\n<li>Programmable Interupt Controller<\/li>\n<li>Programmable Interupt Timer<\/li>\n<li>PS\/2 Keyboard<\/li>\n<li>PS\/2 Mouse<\/li>\n<li>S3 Video<\/li>\n<li>Super I\/O Device<\/li>\n<\/ul>\n<\/blockquote>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; From the Microsoft Tip of the Day Blog: Generation 2 VMs replace a large number of emulated devices with resource efficient synthetic devices.\u00a0 Here is a list of Generation 1 devices that you will not find in a new Generation 2 VM. BIOS COM Ports DMA Controller Floppy Controller i8042 Keyboard Controller IDE Controller &hellip; <\/p>\n<p><a class=\"more-link btn\" href=\"https:\/\/adsecurity.org\/?p=370\">Continue reading<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[182,183],"class_list":["post-370","post","type-post","status-publish","format-standard","hentry","category-technical-reference","tag-hyper-v","tag-hyper-vvmgeneration","item-wrap"],"_links":{"self":[{"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/posts\/370","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/adsecurity.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=370"}],"version-history":[{"count":1,"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/posts\/370\/revisions"}],"predecessor-version":[{"id":371,"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/posts\/370\/revisions\/371"}],"wp:attachment":[{"href":"https:\/\/adsecurity.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=370"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/adsecurity.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=370"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/adsecurity.org\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=370"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}