Security Guide for Hyper-V in Windows Server 2012

By Andrei Ungureanu - Last updated: Friday, June 13, 2014 - Save & Share - Leave a Comment

Pentru cei ce se “lupta” cu Hyper-V, iata ca a aparut si un Security Guide. Nu-i cine stie ce dar merge trecut asa rapid prin el.

Chapter Summaries

This release of the Hyper-V Security Guide consists of this Overview and chapters that discuss methods and best practices that will help you secure your Hyper-V environment. Brief descriptions follow for each chapter.

Chapter 1: Overview

This chapter provides necessary prerequisite information on Hyper-V to set the groundwork for subsequent material. In addition to the architecture of Hyper-V it also covers the administrator taxonomy in Hyper-V.

Chapter 2: Hardening the Hyper-V host

This chapter focuses on hardening servers that run the Hyper-V role of Windows Server 2012, in both Full and Server Core installations. It contains security best practice recommendations to help protect against unauthorized access and resource tampering.

Chapter 3: Roles & Delegation

This chapter covers details on delegation of access to resources. Additionally, it includes guidance on effective delegation of administrative roles to ensure security.

Chapter 4: Protecting Virtual Machines

This chapter provides prescriptive guidance for securing virtual machine resources. It discusses best practices and includes detailed steps for protecting virtual machines by using a combination of file system permissions, encryption, and auditing. Also included are resources for hardening and updating the operating system instances running within your virtual machines.

Chapter 5: Best Practices Checklist

The chapter covers recommended best practices that help enhance the security of a Hyper-V deployment.

Posted in Security, Virtualization, Windows Server • Tags: , Top Of Page

Write a comment