Book Image

Hyper-V Security

Book Image

Hyper-V Security

Overview of this book

Table of Contents (15 chapters)
Hyper-V Security
Credits
About the Authors
About the Reviewers
www.PacktPub.com
Preface
Index

Summary


This chapter was dedicated to the topic of securing virtual machines from their host. We started with a look at the built-in Hyper-V Administrators group and how it is managed. Next, you learned how to configure PowerShell Remoting for a number of scenarios and how to use it to control access over virtual machines.

The purpose of this chapter was to illustrate how to defend your virtual machines from unauthorized access through the hypervisor. In the next chapter, we'll talk about the feasibility of securing virtual machines from the same context that we would secure physical machines.