Book Image

Designing Hyper-V Solutions

By : Saurabh Grover, Goran Svetlecic
Book Image

Designing Hyper-V Solutions

By: Saurabh Grover, Goran Svetlecic

Overview of this book

Table of Contents (18 chapters)
Designing Hyper-V Solutions
Credits
About the Author
Acknowledgement
About the Reviewers
www.PacktPub.com
Preface
Index

Summary


As we conclude one of the most complex topics and get ready for the next one in line, let's quickly recap as to what you have learnt in the current chapter. Security and threat assessment in IT environment is a tedious process and hence before an infrastructure goes live, a lot of planning and re-planning is worked out to ensure that there are no exposed vulnerabilities. Virtualization is an important facet in today's IT infrastructure and requires a lot of consideration, as with nested infrastructures, the process of securing becomes a bit more complex.

In the first section of the chapter we focused on host and Management operating system protection. We studied various measures and remedies to reduce exposed vulnerabilities, namely employing the server core installation mode for Hyper-V deployments, Windows updates, isolation and securing Hyper-V traffic on clustered and non-clustered hosts, and benefits of using BitLocker encryption for protecting Hyper-V storage.

In the second section...