Chapter 4. Solutions in this chapter:
- Hard Drive and Network Configurations
- Physical Hardware Access
- Interfacing with the Host
- Solutions Fast Track
- Frequently Asked Questions
This chapter will cover common configuration tasks which apply to many of the previously mentioned scenarios. It will highlight areas where virtualization can provide resources to the security professional that would be difficult or impossible to accomplish using traditional methods.
Many of these configuration options will be specific to the virtual machine implementation chosen, but where possible methods of accomplishing these tasks in the popular implementations will be presented.
Appropriately limiting resource usage by ...