Summary
In this chapter we covered different aspects of securing Hyper-V server and virtual machines running on it. This chapter was a bit different from the other chapters; we started discussing Hyper-V straightaway and ended with discussing Hyper-V functionality and solutions to get it done as per our needs. In this chapter we also saw how we should maintain high security to ensure that all the features and solutions that we saw in the previous chapters are implemented with high availability using the security provided by Windows Server and Hyper-V.
To summarize the topics we covered in this chapter, let's get an overview from the beginning. First, we discussed the physical hypervisor (Hyper-V) level security and learned how we can maintain the base operating system security to make sure that the attack surface is minimized for any potential security threat. Then we completed the best practice section for the base operating system and moved to the discussion of security best practices to...