Book Image

Hyper-V Security

By : Eric Siron, Andy Syrewicze
Book Image

Hyper-V Security

By: Eric Siron, Andy Syrewicze

Overview of this book

Hyper-V Security is intended for administrators with a solid working knowledge of Hyper-V Server, Windows Server, and Active Directory. An administrator with a functional environment will be able to use the knowledge and examples present in this book to enhance security.
Table of Contents (10 chapters)
9
Index

Chapter 5. Securing the Network

Out of all the potential threats to your virtual machines, over-the-network attacks will be the most probable. However, you'll have to accept some level of risk in order for your guests to be able to provide services to network-based clients. Fortunately, there are a number of methods available for you to mitigate those risks to a manageable level.

In this chapter, we'll discuss the following:

  • Understanding SSL encryption
  • Leveraging network hardware
  • Using the Hyper-V virtual switch's isolation technologies
  • Employing Hyper-V virtual switch ACLs
  • Configuring the Windows Firewall
  • Using management tools remotely
  • Using Hyper-V with IPsec
  • Configuring virtual network adapter protections
  • Securing Hyper-V Replica traffic