Chapter 4. Solutions in this chapter:

  • Hard Drive and Network Configurations
  • Physical Hardware Access
  • Interfacing with the Host
  • Summary
  • Solutions Fast Track
  • Frequently Asked Questions

Introduction

This chapter will cover common configuration tasks which apply to many of the previously mentioned scenarios. It will highlight areas where virtualization can provide resources to the security professional that would be difficult or impossible to accomplish using traditional methods.

Many of these configuration options will be specific to the virtual machine implementation chosen, but where possible methods of accomplishing these tasks in the popular implementations will be presented.

Resource Management

Appropriately limiting resource usage by ...

Get Virtualization for Security now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.