O'Reilly logo

Windows Server® 2008 Hyper-V™ Resource Kit by Janique Carbone Robert Larson and Microsoft Windows Virtualization Team

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Summary

To properly secure access to Hyper-V resources, it is critical to understand the components that need protection. You must provide access rights to Hyper-V and virtual machine resources through a combination of authorization policy and NTFS permissions. In all cases, identify the management roles needed in your environment, create role definitions and role assignments in Authorization Manager, create corresponding security groups, place the appropriate members in the groups, and assign these groups to the appropriate roles. Virtual machine folder hierarchies should be clearly defined and secured based on the virtual machine management requirements in your environment. It is important to review and apply security best practices to secure ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required