Chapter 2. Secure a Virtualization Infrastructure

Matt works as a datacenter fabric engineer for Contoso, a premier datacenter service provider located in the southeast United States. Matt is a disgruntled employee who plans to resign from his position next week after performing some activities he’s planned for the past several months.

First, Matt logs into a rack-mounted Hyper-V host that contains virtual machines owned by a local health care firm. He targets a virtual domain controller, stops the VM, and copies its VHD to Matt’s trusty USB thumb drive. He figures, correctly, that the health care firm has several domain controllers and won’t notice this virtual DC being offline for one hour.

Second, Matt copies the VHD to his personal laptop, ...

Get Exam Ref 70-744 Securing Windows Server 2016 now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.