O'Reilly logo

Hyper-V Security by Andy Syrewicze, Eric Siron

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Securing Hyper-V Replica traffic

Hyper-V Replica functions by periodically transmitting changes in the live virtual machine's hard disk files to its replica machine over the network. Hyper-V Replica offers three security mechanisms to protect this communication. These are all available from the host's Replica Configuration tab. Access it by opening Hyper-V Manager and then right-click on the host and choose Hyper-V Settings. The following screenshot will be used as a reference point for the server configuration discussion:

Securing Hyper-V Replica traffic

The first group is Authentication and ports, where we find our first two options. The first is Use Kerberos (HTTP). When this ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required