O'Reilly logo

Windows Server® 2008 R2 Hyper-V™: Insiders Guide to Microsoft's Hypervisor by Mike Sterling, John Kelbley

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 5: Hyper-V Security

In the first four chapters of this book, we covered a wide variety of topics, including installing Hyper-V, creating virtual machines, and following best practices. Now that we’ve covered the basics and set up a level playing field, let’s dig into the security features of Hyper-V.

Security is a hot-button topic these days, especially when it comes to virtualization. With workload consolidation happening on a major scale after virtualization is deployed, you want to ensure that virtualized workloads are well isolated and that you grant the right access privileges to the right people.

In this chapter, we’ll cover the following:

  • The Hyper-V security model
  • The virtualization machine access security model
  • Working with ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required