官术网_书友最值得收藏!

Chapter 2. Securing the Host

The Hyper-V host is easily the most critical component of your virtual environment. If it is compromised, all the systems in its scope of responsibility are placed at immediate risk. However, the Hyper-V host is, first and foremost, a computer system. Before diving into it as a computer that is running a hypervisor, it must be dealt with just like any other computer system. Of course, as it will run a hypervisor, particular considerations must be taken.

In this chapter, we'll cover the following topics:

  • Understanding Hyper-V's architecture
  • Choosing a management operating system
  • Disabling unnecessary components
  • Using the Windows Firewall
  • Relying on domain security
  • Leveraging Group Policy
  • Using security software
  • Configuring Windows Update
  • Employing remote management tools
  • Following general best practices
主站蜘蛛池模板: 英山县| 福清市| 连州市| 双流县| 房山区| 蒙阴县| 惠水县| 宁河县| 临桂县| 建水县| 申扎县| 昌江| 观塘区| 屯留县| 大连市| 微博| 峨边| 巴青县| 通城县| 德庆县| 甘肃省| 湖南省| 临高县| 徐州市| 榆林市| 如皋市| 雅江县| 龙游县| 安丘市| 兰州市| 亳州市| 屏山县| 阿巴嘎旗| 永平县| 马关县| 威宁| 靖宇县| 昭通市| 太仆寺旗| 林甸县| 武陟县|