O'Reilly logo

Designing Hyper-V Solutions by Saurabh Grover

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Protecting the guest machines

We will now move to the center of the Hyper-V universe—the guest machines. The objective of virtualization is to abstract the underlying hardware, setup a pool of resources and then disseminate them between the hosted machines, but then the objective is not just efficient utilization by the VM but also to ensure the VM runs securely and without failure. Securing VMs has two facets. First, set up protection for it as an entity within Hyper-V, and second, protect it as you would do to a normal computer or server. One cannot be undermined for the other, and both aspects need to be considered with equal weight. Some of the security parameters we discussed earlier do assist with the first scenario. In the following sections, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required