O'Reilly logo

Designing Hyper-V Solutions by Saurabh Grover

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 7. Building a Secure Virtualization Environment

Threats and vulnerability are common terms in IT vocabulary and an IT administrator would have a fearful association with these two words. Securing an IT environment has different facets and every facet will have a vulnerability clause. An IT infrastructure or environment is a generic term indicative of a site or collection of sites with a certain user base and set of computers. The site could be a hub or a headquarter hosting a data center for an enterprise or an SME office or just a branch site with a skeleton staff and low end machines to fulfill a business requirement. The present assets at the site serve a purpose, and to ensure they continue to do so, it is imperative that their continuity ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required