Book Image

Hyper-V Security

Book Image

Hyper-V Security

Overview of this book

Table of Contents (15 chapters)
Hyper-V Security
Credits
About the Authors
About the Reviewers
www.PacktPub.com
Preface
Index

Summary


This chapter introduced you to a number of concepts related to securing a Hyper-V host. First, we talked about the scope of security in Hyper-V and explained that the management operating system is secured much like any other computer. Next, we discussed the available choices of the management operating system and how they impact security. We followed that up with a discussion on disabling components that aren't necessary for running Hyper-V. Then, we briefly visited the subject of the Windows Firewall. Next, we examined the benefits of Active Directory membership for Hyper-V hosts, which led directly into a discussion of Group Policy and how it can be easily leveraged for Hyper-V hosts. We talked about using third-party security software, such as anti-malware and intrusion-detection programs. We also discussed how to use Windows Update to keep Microsoft software up to date. Afterwards, we touched on using remote tools instead of connecting directly to the host console. We wrapped...