Book Image

Hyper-V Security

Book Image

Hyper-V Security

Overview of this book

Table of Contents (15 chapters)
Hyper-V Security
Credits
About the Authors
About the Reviewers
www.PacktPub.com
Preface
Index

Following general best practices


As mentioned earlier in this chapter, the security steps you are taking here apply primarily to the management operating system. While it does run Hyper-V, it is still a computer system. Therefore, most of the steps that would be taken on a standard Windows Server system apply just as well to a Hyper-V host.

Microsoft baseline security analyzer

As with Group Policy, there are a dizzying array of options, and it's difficult to keep track of them all. In terms of security, Microsoft has provided a tool to help with this as well: Microsoft Baseline Security Analyzer (MBSA). The current version of this tool is available from Microsoft at http://www.microsoft.com/mbsa.

The installation procedure for MBSA is extremely straightforward and won't be outlined here. There are no special prerequisites. You can run the tool from a system other than the one to be scanned, although you'll likely get incomplete results due to firewall issues. You must start MBSA with a user...