Jump to content

Recommended Posts

  • FPCH Admin
Posted

Overview

 

This Solution Accelerator consists of a security guide and an overview packaged in a .zip file format. The security guide is a Word document intended for IT and security professionals. It includes three chapters that discuss methods and best practices that will help to secure a Hyper-V environment. The overview is a two page description of the security guide and other virtualization Solution Accelerators that are available. Brief descriptions follow for each of the chapters in the security guide.

 

Chapter 1: Hardening Hyper-VThis chapter provides prescriptive guidance for hardening the Hyper-V role. It discusses several best practices for installing and configuring Hyper-V on Windows Server 2008 server with a focus on security. These best practices include measures for reducing the attack surface of a server running Hyper-V and recommendations for properly configuring secure network and storage devices.

 

Chapter 2: Delegating Virtual Machine ManagementThis chapter discusses several available methods for delegating virtual machine management so that virtual machine administrators only have the minimum permissions they require. It describes common delegation scenarios, and includes detailed steps to guide you through using Authorization Manager (AzMan) and System Center Virtual Machine Manager 2008 (VMM 2008) to separate virtual machine administrators from virtualization host administrators.

 

Chapter 3: Protecting Virtual Machines This chapter provides prescriptive guidance for securing virtual machine resources. It discusses best practices and includes detailed steps for protecting virtual machines by using a combination of file system permissions, encryption, and auditing. Also included are resources for hardening and updating the operating system instances running within your virtual machines.

 

To view this accelerator online at TechNet click here.

 

System Requirements

 

 

  • Supported Operating Systems: Windows Vista Windows XP

 

 

 

Instructions

 

 

  • Click the Download button next to one of the files listed below to start the download.
  • Do one of the following:
    • To start the .zip file extraction immediately, click Open or Run this program from its current location. Then extract the files to your preferred location on your computer.
    • To save the download to your preferred location on your computer for .zip file extraction at a later time, click Save or Save this program to disk.

     

Download: Hyper-V Security Guide

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

×
×
  • Create New...