Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
This guide is designed to provide you with guidance, instructions, and recommendations to help you elevate the security of virtualized Microsoft® Windows Server® 2008 environments to address your business-critical needs.
The Hyper-V Security Guide focuses on three key areas and provides the following information:
• Hardening the Hyper-V role. Prescriptive guidance for hardening the Hyper-V role, including several best practices for installing and configuring Hyper-V with a focus on security. These best practices include measures for reducing the attack surface of Hyper-V as well as recommendations for properly configuring secure virtual networks and storage devices.
• Delegating virtual machine management. Prescriptive guidance to help you safely and securely delegate administrative access to virtual machine resources within an organization.
• Protecting virtual machines. Prescriptive guidance for securing virtual machine resources, including best practices and detailed steps for protecting virtual machines by using a combination of file system permissions, encryption, and auditing.
Next steps
• Get all the details about the guide by visiting the Hyper-V Security Page on Microsoft TechNet.
• Download the Hyper-V Security Guide
Enjoy!
Chris Samson
Senior Hosting Technology Specialist
Microsoft
Comments
- Anonymous
April 03, 2009
PingBack from http://www.anith.com/?p=26228