As we conclude one of the most complex topics and get ready for the next one in line, let's quickly recap as to what you have learnt in the current chapter. Security and threat assessment in IT environment is a tedious process and hence before an infrastructure goes live, a lot of planning and re-planning is worked out to ensure that there are no exposed vulnerabilities. Virtualization is an important facet in today's IT infrastructure and requires a lot of consideration, as with nested infrastructures, the process of securing becomes a bit more complex.
In the first section of the chapter we focused on host and Management operating system protection. We studied various measures and remedies to reduce exposed vulnerabilities, namely employing the server core installation mode for Hyper-V deployments, Windows updates, isolation and securing Hyper-V traffic on clustered and non-clustered hosts, and benefits of using BitLocker encryption for protecting Hyper-V storage.
In the second section...