Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword or section
Like this
1Activity

Table Of Contents

Overview
Who Should Read This Guide
Skills and Readiness
Chapter Summaries
Style Conventions
Support and Feedback
Acknowledgements
Chapter 1: Hardening Hyper-V
Attack Surface
Server Role Security Configuration
Management Operating System Security
Default Installation Recommendations
Host Network Configuration
Securing Dedicated Storage Devices
Security Setting Recommendations
Virtual Machine Security
More Information
Chapter 2: Delegating Virtual Machine
Using Tools to Delegate Access
Delegating Access with Authorization
Delegated Administrator Role
Self Service Portal
Chapter 3: Protecting Virtual Machines
Methods for Protecting VMs
Hardening the Virtual Machine Operating System and Applications
Firewall and Antivirus Requirements
Group Policy Considerations
Using Encryption to Protect Virtual Machine
Maintaining Virtual Machines
Management Operating System Configuration
Virtual Machine Configuration
0 of .
Results for:
No results containing your search query
P. 1
Hyper-V Security Guide

Hyper-V Security Guide

Ratings: (0)|Views: 223 |Likes:
Published by amilaabeysinghe

More info:

Published by: amilaabeysinghe on Feb 09, 2011
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as DOCX, PDF, TXT or read online from Scribd
See more
See less

11/14/2011

pdf

text

original

You're Reading a Free Preview
Pages 5 to 41 are not shown in this preview.

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->