Book Image

Hyper-V Security

By : Eric Siron, Andy Syrewicze
Book Image

Hyper-V Security

By: Eric Siron, Andy Syrewicze

Overview of this book

Hyper-V Security is intended for administrators with a solid working knowledge of Hyper-V Server, Windows Server, and Active Directory. An administrator with a functional environment will be able to use the knowledge and examples present in this book to enhance security.
Table of Contents (10 chapters)
9
Index

Chapter 6. Securing Hyper-V Storage

One of the most vulnerable components of your Hyper-V deployment is its storage. If an attacker is able to gain access to the locations that house your virtual hard disks, compromising their data is fairly simple. While most administrators are well aware of the importance of locking down the access points to live storage, many overlook the necessity of using and securing data redundancy systems as well.

In this chapter, we will focus on the following topics:

  • Configuring NTFS security for virtual machine storage
  • Securing SMB 3.0 shares for virtual machine storage
  • Securing iSCSI connections
  • Using Secure Boot
  • Using BitLocker
  • Using Encrypted Cluster Disks
  • Understanding the role of backup