- Hyper-V Security
- Eric Siron Andy Syrewicze
- 128字
- 2021-08-05 16:48:32
Chapter 2. Securing the Host
The Hyper-V host is easily the most critical component of your virtual environment. If it is compromised, all the systems in its scope of responsibility are placed at immediate risk. However, the Hyper-V host is, first and foremost, a computer system. Before diving into it as a computer that is running a hypervisor, it must be dealt with just like any other computer system. Of course, as it will run a hypervisor, particular considerations must be taken.
In this chapter, we'll cover the following topics:
- Understanding Hyper-V's architecture
- Choosing a management operating system
- Disabling unnecessary components
- Using the Windows Firewall
- Relying on domain security
- Leveraging Group Policy
- Using security software
- Configuring Windows Update
- Employing remote management tools
- Following general best practices
推薦閱讀
- Mastering Mesos
- Internet接入·網(wǎng)絡(luò)安全
- 人工免疫算法改進(jìn)及其應(yīng)用
- 走入IBM小型機(jī)世界
- Mastering VMware vSphere 6.5
- 輕松學(xué)PHP
- Hands-On Machine Learning with TensorFlow.js
- Zabbix Network Monitoring(Second Edition)
- 人工智能與人工生命
- Spark大數(shù)據(jù)技術(shù)與應(yīng)用
- CompTIA Linux+ Certification Guide
- JavaScript典型應(yīng)用與最佳實(shí)踐
- PVCBOT機(jī)器人控制技術(shù)入門
- 基于ARM9的小型機(jī)器人制作
- 筆記本電腦電路分析與故障診斷