Book Image

Windows Server 2012 Hyper-V: Deploying Hyper-V Enterprise Server Virtualization Platform

By : ZAHIR HUSSAIN SHAH
Book Image

Windows Server 2012 Hyper-V: Deploying Hyper-V Enterprise Server Virtualization Platform

By: ZAHIR HUSSAIN SHAH

Overview of this book

Table of Contents (20 chapters)
Windows Server 2012 Hyper-V: Deploying Hyper-V Enterprise Server Virtualization Platform
Credits
About the Author
About the Reviewers
www.PacktPub.com
Preface
Introduction
SCVMM 2012 New Features and Enhancements
SCVMM Management Console Configuration Settings
Index

Hyper-V and virtualization security pillars


As we understand from the title of the chapter, we will cover both Hyper-V specific and general security best practices and recommendations for securing server systems. Our main goal here will be to understand how we can achieve higher levels of security by implementing both general server security and Hyper-V specific security best practices. Okay, we said general security and Hyper-V level security, but what about the virtual machine-specific security? Well, at the very end of this chapter, we will discuss the security best practices for virtual machines, which will add value to the overall security strategy of Hyper-V virtualized infrastructure.

This virtualization security can also be divided into five major areas, which will ensure a high level of security around our Hyper-V server and the virtual machine running on it. The following are those five major areas of virtualization security:

  • Securing Hyper-V base operating system

  • Securing Hyper-V...