Book Image

Hyper-V Security

By : Eric Siron, Andrew Syrewicze
Book Image

Hyper-V Security

By: Eric Siron, Andrew Syrewicze

Overview of this book

Table of Contents (15 chapters)
Hyper-V Security
About the Authors
About the Reviewers

Following general best practices

As mentioned earlier in this chapter, the security steps you are taking here apply primarily to the management operating system. While it does run Hyper-V, it is still a computer system. Therefore, most of the steps that would be taken on a standard Windows Server system apply just as well to a Hyper-V host.

Microsoft baseline security analyzer

As with Group Policy, there are a dizzying array of options, and it's difficult to keep track of them all. In terms of security, Microsoft has provided a tool to help with this as well: Microsoft Baseline Security Analyzer (MBSA). The current version of this tool is available from Microsoft at

The installation procedure for MBSA is extremely straightforward and won't be outlined here. There are no special prerequisites. You can run the tool from a system other than the one to be scanned, although you'll likely get incomplete results due to firewall issues. You must start MBSA with a user...