Chapter 5: Hyper-V Security
In the first four chapters of this book, we covered a wide variety of topics, including installing Hyper-V, creating virtual machines, and following best practices. Now that we’ve covered the basics and set up a level playing field, let’s dig into the security features of Hyper-V.
Security is a hot-button topic these days, especially when it comes to virtualization. With workload consolidation happening on a major scale after virtualization is deployed, you want to ensure that virtualized workloads are well isolated and that you grant the right access privileges to the right people.
In this chapter, we’ll cover the following:
- The Hyper-V security model
- The virtualization machine access security model
- Working with ...