Network Architecture
Server security starts with placing the server in the network. There are a few ways you can approach this, depending on how extreme you want your security to be and how usable you need the system to be. You could place your Hyper-V hosts into a totally isolated network, while leaving the virtual machines in their normal VLANs. You need to decide whether your Hyper-V hosts should be in a domain or a workgroup. Should the domain be your normal domain, a new domain in a forest, or a new forest? Maybe you could leave the Hyper-V hosts in your normal production network and treat them as ordinary servers?
Whatever happens, in an enterprise environment a Hyper-V deployment is usually managed by Microsoft System Center. The services ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access