官术网_书友最值得收藏!

Chapter 2. Securing the Host

The Hyper-V host is easily the most critical component of your virtual environment. If it is compromised, all the systems in its scope of responsibility are placed at immediate risk. However, the Hyper-V host is, first and foremost, a computer system. Before diving into it as a computer that is running a hypervisor, it must be dealt with just like any other computer system. Of course, as it will run a hypervisor, particular considerations must be taken.

In this chapter, we'll cover the following topics:

  • Understanding Hyper-V's architecture
  • Choosing a management operating system
  • Disabling unnecessary components
  • Using the Windows Firewall
  • Relying on domain security
  • Leveraging Group Policy
  • Using security software
  • Configuring Windows Update
  • Employing remote management tools
  • Following general best practices
主站蜘蛛池模板: 固镇县| 兰西县| 贺州市| 砚山县| 察哈| 娱乐| 曲水县| 嘉义县| 邮箱| 定西市| 色达县| 炎陵县| 金溪县| 集贤县| 娱乐| 永昌县| 钟山县| 漾濞| 惠东县| 始兴县| 确山县| 高邮市| 彭州市| 海盐县| 兴文县| 海门市| 梓潼县| 饶阳县| 连平县| 耿马| 汕头市| 定西市| 禄劝| 黄山市| 临泉县| 武夷山市| 高雄县| 乐安县| 苍山县| 长垣县| 临澧县|