Summary
This chapter introduced you to the "whys" of Hyper-V security and provided a brief introduction to the overall risks that almost all security systems face, and discussed generic responses. It also covered Hyper-V terminology and the available installation modes for the hypervisor.
In the next chapter, we'll dive right into Hyper-V security with a look at securing the physical host that runs the hypervisor.