O'Reilly logo

Windows Server 2016 Hyper-V Cookbook - Second Edition by Leandro Carvalho, Charbel Nemnom, Patrick Lownds

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Configuring Hyper-V auditing

In the previous recipes, you have seen how to protect your physical and virtual servers with Windows Updates, antivirus, access control, and so on. However, a key factor needs to be considered to address security concerns when they happen, to track unsolicited access or unauthorized actions on your system, or to simply monitor when and how the Hyper-V administrators are managing it.

The best way to get these results is by setting an audit. By default, all Hyper-V events are logged in Event Viewer and can be used to diagnose a problem or track what has been done by the other Hyper-V admins.

You can also see all Hyper-V-roles and authorization-rights changes to sensitive virtual machines with Audit File System, which is ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required