Book Image

Hyper-V Security

Book Image

Hyper-V Security

Overview of this book

Table of Contents (15 chapters)
Hyper-V Security
Credits
About the Authors
About the Reviewers
www.PacktPub.com
Preface
Index

Securing the VMM installation


We've talked about what SCVMM brings to the table as far as assisting us in securing our host environment is concerned, but what about VMM itself? How do we keep VMM secure? Once in place, VMM is intended to be the overarching management tool for your entire virtual infrastructure, so it's critical that it is secured at all times.

Well, the good news is that VMM does a pretty good job on its own of being a fairly secure service. It mostly leverages all the underlying technologies and techniques that have been covered in this book up until this point. However, it still doesn't hurt to say that it's extremely important to ensure that all the standard security best practices are followed. This includes keeping patches up-to-date and limiting who has access to what via the role-based administration features, but what else?

There are a couple of key pieces during the installation of SCVMM that should be noted, which we'll quickly cover here.

Note

As mentioned earlier...