Book Image

Hyper-V Security

By : Eric Siron, Andy Syrewicze
Book Image

Hyper-V Security

By: Eric Siron, Andy Syrewicze

Overview of this book

Hyper-V Security is intended for administrators with a solid working knowledge of Hyper-V Server, Windows Server, and Active Directory. An administrator with a functional environment will be able to use the knowledge and examples present in this book to enhance security.
Table of Contents (15 chapters)
Hyper-V Security
Credits
About the Authors
About the Reviewers
www.PacktPub.com
Preface
Index

Choosing a management operating system


In Chapter 1, Introducing Hyper-V Security, you were briefly introduced to the various delivery methods for Hyper-V in the Acquiring Hyper-V section. The first decision you must make before going into production is which of these methods you'll choose. This is not a clear choice, as each approach has its own strengths and weaknesses.

Hyper-V Server

In terms of security, the primary strength of Hyper-V Server is that it has a much smaller attack surface than even the smallest Windows Server deployment. This also has a side effect of having the fewest operating system components that could potentially compete with virtual machines for resources. Even though it's highly stripped-down compared to its full-featured counterpart, it does contain all the necessary options for running a Hyper-V environment, such as RemoteFX, the Remote Desktop Virtualization Host, and the ability to participate in a failover cluster.

The limitations that make Hyper-V Server more...