O'Reilly logo

Hyper-V Security by Andy Syrewicze, Eric Siron

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 6. Securing Hyper-V Storage

One of the most vulnerable components of your Hyper-V deployment is its storage. If an attacker is able to gain access to the locations that house your virtual hard disks, compromising their data is fairly simple. While most administrators are well aware of the importance of locking down the access points to live storage, many overlook the necessity of using and securing data redundancy systems as well.

In this chapter, we will focus on the following topics:

  • Configuring NTFS security for virtual machine storage
  • Securing SMB 3.0 shares for virtual machine storage
  • Securing iSCSI connections
  • Using Secure Boot
  • Using BitLocker
  • Using Encrypted Cluster Disks
  • Understanding the role of backup

Configuring NTFS security for VM ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required