This guide is designed to provide you with guidance, instructions, and recommendations to help you elevate the security of virtualized Microsoft® Windows Server® 2008 environments to address your business-critical needs.
The Hyper-V Security Guide focuses on three key areas and provides the following information:
• Hardening the Hyper-V role. Prescriptive guidance for hardening the Hyper-V role, including several best practices for installing and configuring Hyper-V with a focus on security. These best practices include measures for reducing the attack surface of Hyper-V as well as recommendations for properly configuring secure virtual networks and storage devices.
• Delegating virtual machine management. Prescriptive guidance to help you safely and securely delegate administrative access to virtual machine resources within an organization.
• Protecting virtual machines. Prescriptive guidance for securing virtual machine resources, including best practices and detailed steps for protecting virtual machines by using a combination of file system permissions, encryption, and auditing.
• Get all the details about the guide by visiting the Hyper-V Security Page on Microsoft TechNet.
Senior Hosting Technology Specialist