Chapter 9

Securing, monitoring, and managing a virtual infrastructure

CHAPTER OUTLINE

Securing the Hyper-V Host

Server Core installation considerations

Network and domain considerations

Securing the virtual machines

Bitlocker drive encryption

Syskey.exe

Windows Firewall

Auditing

Designing your virtual network

Monitoring and other considerations

Summary

Working in a virtualized environment does not absolve you of the responsibility of securing the virtual infrastructure. Virtual machines are no less vulnerable to malware, hacking, denial of service, and other attacks than their nonvirtual counterparts. Fortunately, apart from the usual steps taken to secure a nonvirtual infrastructure work in a virtual environment, there are additional steps that ...

Get Microsoft Virtualization now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.