Chapter 2. Securing the Host
The Hyper-V host is easily the most critical component of your virtual environment. If it is compromised, all the systems in its scope of responsibility are placed at immediate risk. However, the Hyper-V host is, first and foremost, a computer system. Before diving into it as a computer that is running a hypervisor, it must be dealt with just like any other computer system. Of course, as it will run a hypervisor, particular considerations must be taken.
In this chapter, we'll cover the following topics:
- Understanding Hyper-V's architecture
- Choosing a management operating system
- Disabling unnecessary components
- Using the Windows Firewall
- Relying on domain security
- Leveraging Group Policy
- Using security software
- Configuring Windows Update
- Employing remote management tools
- Following general best practices