O'Reilly logo

Windows Server 2012 Hyper-V Cookbook by Leandro Carvalho

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 6. Security and Delegation of Control

In this chapter we will cover:

  • Configuring Windows Update for Hyper-V
  • Configuring Cluster-Aware Updating for cluster nodes
  • Delegating control in Hyper-V
  • Configuring Port ACLs
  • Installing and configuring BitLocker for data protection
  • Configuring Hyper-V auditing

Introduction

In general, security is very important in infrastructure, and this applies to virtualization as well. In a highly virtual environment, and also in a private cloud, you must ensure that security is met on all layers. The new Hyper-V version comes with lots of configuration options to allow you to protect your host and virtual machines. The core security areas for virtual environments involve settings and options such as software and hardware ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required