O'Reilly logo

Hyper-V Security by Andy Syrewicze, Eric Siron

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 4. Securing Virtual Machines

Until now, we focused on the host and hypervisor. Virtual machines (VMs) run a complete operating system, usually attached to the network, and are presented to the rest of the world in much the same way as a physical machine would be. With the built-in isolation of the guest from its host, it's impossible for the hypervisor to provide multiple intercessions on behalf of the virtual machine. In this chapter, we will talk about the ways in which virtual machines are—and are not—special in terms of security.

In this chapter, you will learn about:

  • Understanding the security environment of virtual machines
  • Leveraging Generation 2 virtual machines
  • Employing anti-malware on a virtual machine
  • Considering intrusion prevention ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required