Summary
This chapter was dedicated to the topic of securing virtual machines from their host. We started with a look at the built-in Hyper-V Administrators group and how it is managed. Next, you learned how to configure PowerShell Remoting for a number of scenarios and how to use it to control access over virtual machines.
The purpose of this chapter was to illustrate how to defend your virtual machines from unauthorized access through the hypervisor. In the next chapter, we'll talk about the feasibility of securing virtual machines from the same context that we would secure physical machines.