封面
版权页
Credits
About the Authors
About the Reviewers
www.PacktPub.com
Support files eBooks discount offers and more
Preface
What this book covers
What you need for this book
Who this book is for
Conventions
Reader feedback
Customer support
Chapter 1. Introducing Hyper-V Security
The importance of Hyper-V security
Basic security concerns
A starting point to security
Hyper-V terminology
Acquiring Hyper-V
Summary
Chapter 2. Securing the Host
Understanding Hyper-V's architecture
Choosing a management operating system
Disabling unnecessary components
Using the Windows Firewall
Relying on domain security
Leveraging Group Policy
Using security software
Configuring Windows Update
Employing remote management tools
Following general best practices
Summary
Chapter 3. Securing Virtual Machines from the Hypervisor
Using the Hyper-V Administrators group
Leveraging PowerShell Remoting
Using custom PowerShell Remoting endpoints
Summary
Chapter 4. Securing Virtual Machines
Understanding the security environment of VMs
Leveraging Generation 2 virtual machines
Employing anti-malware on a virtual machine
Using Group Policy with virtual machines
Limiting exposure with resource limitations
Applying general best practices
Summary
Chapter 5. Securing the Network
Understanding SSL encryption
Leveraging network hardware
Using the virtual switch's isolating technologies
Employing Hyper-V virtual switch ACLs
Configuring the Windows Firewall
Using management tools remotely
Using Hyper-V with IPsec
Configuring virtual network adapter protections
Encrypting cluster communications
Securing Hyper-V Replica traffic
Summary
Chapter 6. Securing Hyper-V Storage
Configuring NTFS security for VM storage
Securing SMB 3.0 shares for VM storage
Securing iSCSI connections
Using Secure Boot
Using BitLocker
Understanding the role of backup
Summary
Chapter 7. Hyper-V Security and System Center VMM
Enhancing Hyper-V host security through VMM
Securing the VMM installation
Network virtualization and multi-tenancy
Providing secure self-service with the Windows Azure Pack
Summary
Chapter 8. Secure Hybrid Cloud Management through App Controller
System requirements
Installing App Controller
App Controller's role-based security model
Summary
Index
更新时间:2021-08-05 16:48:46