Chapter 5: Hyper-V Security

In the first four chapters of this book, we covered a wide variety of topics, including installing Hyper-V, creating virtual machines, and following best practices. Now that we’ve covered the basics and set up a level playing field, let’s dig into the security features of Hyper-V.

Security is a hot-button topic these days, especially when it comes to virtualization. With workload consolidation happening on a major scale after virtualization is deployed, you want to ensure that virtualized workloads are well isolated and that you grant the right access privileges to the right people.

In this chapter, we’ll cover the following:

  • The Hyper-V security model
  • The virtualization machine access security model
  • Working with ...

Get Windows Server® 2008 R2 Hyper-V™: Insiders Guide to Microsoft's Hypervisor now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.