Chapter 12: Security
Place and secure your Hyper-V host servers You have a number of options in how you place Hyper-V host servers in your network. Each option will affect your ability to cluster the host servers, manage them, and provide access to services such as VDI and self-service provisioning.
Master It You work in an organization with mission-critical security requirements. The IT security team has demanded that you maximize the security of several applications and the entire infrastructure that they run on. Those virtual machines must be fault tolerant. The remaining applications servers can run at normal network security levels. How will you design the Hyper-V host servers?
Solution The mission-critical applications need to be place ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access