Chapter 9
Securing, monitoring, and managing a virtual infrastructure
CHAPTER OUTLINE
Server Core installation considerations
Network and domain considerations
Designing your virtual network
Monitoring and other considerations
Working in a virtualized environment does not absolve you of the responsibility of securing the virtual infrastructure. Virtual machines are no less vulnerable to malware, hacking, denial of service, and other attacks than their nonvirtual counterparts. Fortunately, apart from the usual steps taken to secure a nonvirtual infrastructure work in a virtual environment, there are additional steps that ...
Get Microsoft Virtualization now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.