Book Image

Hyper-V Security

By : Eric Siron, Andrew Syrewicze
Book Image

Hyper-V Security

By: Eric Siron, Andrew Syrewicze

Overview of this book

Table of Contents (15 chapters)
Hyper-V Security
About the Authors
About the Reviewers


This chapter was dedicated to the topic of securing virtual machines from their host. We started with a look at the built-in Hyper-V Administrators group and how it is managed. Next, you learned how to configure PowerShell Remoting for a number of scenarios and how to use it to control access over virtual machines.

The purpose of this chapter was to illustrate how to defend your virtual machines from unauthorized access through the hypervisor. In the next chapter, we'll talk about the feasibility of securing virtual machines from the same context that we would secure physical machines.