Chapter 4. Solutions in this chapter:

  • Hard Drive and Network Configurations
  • Physical Hardware Access
  • Interfacing with the Host
  • Summary
  • Solutions Fast Track
  • Frequently Asked Questions

Introduction

This chapter will cover common configuration tasks which apply to many of the previously mentioned scenarios. It will highlight areas where virtualization can provide resources to the security professional that would be difficult or impossible to accomplish using traditional methods.

Many of these configuration options will be specific to the virtual machine implementation chosen, but where possible methods of accomplishing these tasks in the popular implementations will be presented.

Resource Management

Appropriately limiting resource usage by ...

Get Virtualization for Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.