Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Windows Server 2012 Hyper-V: Deploying Hyper-V Enterprise Server Virtualization Platform

You're reading from   Windows Server 2012 Hyper-V: Deploying Hyper-V Enterprise Server Virtualization Platform Get to grips with Windows Server 2012 Hyper-V the easy way. This comprehensive tutorial takes you through every step of planning, designing, and implementing Hyper V with clear instructions and screenshots. The only guide you need.

Arrow left icon
Product type Paperback
Published in Mar 2013
Publisher
ISBN-13 9781849688345
Length 410 pages
Edition Edition
Tools
Concepts
Arrow right icon
Author (1):
Arrow left icon
ZAHIR HUSSAIN SHAH ZAHIR HUSSAIN SHAH
Author Profile Icon ZAHIR HUSSAIN SHAH
ZAHIR HUSSAIN SHAH
Arrow right icon
View More author details
Toc

Table of Contents (20) Chapters Close

Windows Server 2012 Hyper-V: Deploying Hyper-V Enterprise Server Virtualization Platform
Credits
About the Author
About the Reviewers
www.PacktPub.com
Preface
Introduction
1. Getting to Know Microsoft Hyper-V FREE CHAPTER 2. Planning, Designing, and Implementing Microsoft Hyper-V 3. Setting Up Hyper-V Replication 4. Understanding Hyper-V Networking 5. A New World of Hyper-V Automation with PowerShell 6. Insight into Hyper-V Storage 7. Managing Hyper-V with System Center Virtual Machine Manager 8. Building Hyper-V High Availability and Virtual Machine Mobility 9. Hyper-V Security Hardening – Best Practices 10. Performing Hyper-V Backup and Recovery SCVMM 2012 New Features and Enhancements
SCVMM Management Console Configuration Settings
Index

Hyper-V and virtualization security pillars


As we understand from the title of the chapter, we will cover both Hyper-V specific and general security best practices and recommendations for securing server systems. Our main goal here will be to understand how we can achieve higher levels of security by implementing both general server security and Hyper-V specific security best practices. Okay, we said general security and Hyper-V level security, but what about the virtual machine-specific security? Well, at the very end of this chapter, we will discuss the security best practices for virtual machines, which will add value to the overall security strategy of Hyper-V virtualized infrastructure.

This virtualization security can also be divided into five major areas, which will ensure a high level of security around our Hyper-V server and the virtual machine running on it. The following are those five major areas of virtualization security:

  • Securing Hyper-V base operating system

  • Securing Hyper-V...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at €18.99/month. Cancel anytime