O'Reilly logo

Microsoft Virtualization by Robert M Keefer, Jason Boomer, James Sabovik, Thomas Olzak

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 9

Securing, monitoring, and managing a virtual infrastructure

CHAPTER OUTLINE

Securing the Hyper-V Host

Server Core installation considerations

Network and domain considerations

Securing the virtual machines

Bitlocker drive encryption

Syskey.exe

Windows Firewall

Auditing

Designing your virtual network

Monitoring and other considerations

Summary

Working in a virtualized environment does not absolve you of the responsibility of securing the virtual infrastructure. Virtual machines are no less vulnerable to malware, hacking, denial of service, and other attacks than their nonvirtual counterparts. Fortunately, apart from the usual steps taken to secure a nonvirtual infrastructure work in a virtual environment, there are additional steps that ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required