Out of all the potential threats to your virtual machines, over-the-network attacks will be the most probable. However, you'll have to accept some level of risk in order for your guests to be able to provide services to network-based clients. Fortunately, there are a number of methods available for you to mitigate those risks to a manageable level.
In this chapter, we'll discuss the following:
Understanding SSL encryption
Leveraging network hardware
Using the Hyper-V virtual switch's isolation technologies
Employing Hyper-V virtual switch ACLs
Configuring the Windows Firewall
Using management tools remotely
Using Hyper-V with IPsec
Configuring virtual network adapter protections
Securing Hyper-V Replica traffic