This chapter introduced you to a number of concepts related to securing a Hyper-V host. First, we talked about the scope of security in Hyper-V and explained that the management operating system is secured much like any other computer. Next, we discussed the available choices of the management operating system and how they impact security. We followed that up with a discussion on disabling components that aren't necessary for running Hyper-V. Then, we briefly visited the subject of the Windows Firewall. Next, we examined the benefits of Active Directory membership for Hyper-V hosts, which led directly into a discussion of Group Policy and how it can be easily leveraged for Hyper-V hosts. We talked about using third-party security software, such as anti-malware and intrusion-detection programs. We also discussed how to use Windows Update to keep Microsoft software up to date. Afterwards, we touched on using remote tools instead of connecting directly to the host console. We wrapped...

Hyper-V Security
By :

Hyper-V Security
By:
Overview of this book
Table of Contents (15 chapters)
Hyper-V Security
Credits
About the Authors
About the Reviewers
www.PacktPub.com
Preface
Introducing Hyper-V Security
Securing the Host
Securing Virtual Machines from the Hypervisor
Securing Virtual Machines
Securing the Network
Securing Hyper-V Storage
Hyper-V Security and System Center VMM
Secure Hybrid Cloud Management through App Controller
Index
Customer Reviews