Book Image

Hyper-V Security

Book Image

Hyper-V Security

Overview of this book

Table of Contents (15 chapters)
Hyper-V Security
Credits
About the Authors
About the Reviewers
www.PacktPub.com
Preface
Index

Summary


In this chapter, we focused on guest security, both at the virtual machine level and as standard operating systems. We started with an explanation of the way that Hyper-V naturally separates virtual machines into their own environments. Next, we saw the enhanced security option of Secure Boot available to Generation 2 virtual machines. After that, we talked about anti-malware and intrusion detection/prevention software. We also covered how to design Group Policies that only apply to Hyper-V guests. We then talked about the ways to limit resource utilization of a virtual machine so that its maximum impact is reduced. We concluded by listing some generic security best practices to apply to virtual machines.

In the next chapter, we'll look at ways to secure the networking layer in a Hyper-V environment.