Book Image

Designing Hyper-V Solutions

By : Saurabh Grover, Goran Svetlecic
Book Image

Designing Hyper-V Solutions

By: Saurabh Grover, Goran Svetlecic

Overview of this book

Table of Contents (18 chapters)
Designing Hyper-V Solutions
Credits
About the Author
Acknowledgement
About the Reviewers
www.PacktPub.com
Preface
Index

Protecting the guest machines


We will now move to the center of the Hyper-V universe—the guest machines. The objective of virtualization is to abstract the underlying hardware, setup a pool of resources and then disseminate them between the hosted machines, but then the objective is not just efficient utilization by the VM but also to ensure the VM runs securely and without failure. Securing VMs has two facets. First, set up protection for it as an entity within Hyper-V, and second, protect it as you would do to a normal computer or server. One cannot be undermined for the other, and both aspects need to be considered with equal weight. Some of the security parameters we discussed earlier do assist with the first scenario. In the following sections, we will broadly discuss the security recommendations, and certain best practices should be leveraged religiously.

Secure boot

In Chapter 2, Planning and Deploying Microsoft Hyper-V, you were introduced to Generation 2 (Gen-2) virtual machines,...