- Hyper-V Security
- Eric Siron Andy Syrewicze
- 128字
- 2021-08-05 16:48:32
Chapter 2. Securing the Host
The Hyper-V host is easily the most critical component of your virtual environment. If it is compromised, all the systems in its scope of responsibility are placed at immediate risk. However, the Hyper-V host is, first and foremost, a computer system. Before diving into it as a computer that is running a hypervisor, it must be dealt with just like any other computer system. Of course, as it will run a hypervisor, particular considerations must be taken.
In this chapter, we'll cover the following topics:
- Understanding Hyper-V's architecture
- Choosing a management operating system
- Disabling unnecessary components
- Using the Windows Firewall
- Relying on domain security
- Leveraging Group Policy
- Using security software
- Configuring Windows Update
- Employing remote management tools
- Following general best practices
推薦閱讀
- Big Data Analytics with Hadoop 3
- 虛擬儀器設(shè)計測控應(yīng)用典型實例
- 我的J2EE成功之路
- Getting Started with Clickteam Fusion
- 傳感器技術(shù)實驗教程
- Learning Apache Cassandra(Second Edition)
- 視覺檢測技術(shù)及智能計算
- Docker High Performance(Second Edition)
- Deep Reinforcement Learning Hands-On
- 從零開始學(xué)C++
- 多媒體制作與應(yīng)用
- Applied Data Visualization with R and ggplot2
- 從零開始學(xué)Java Web開發(fā)
- 從零開始學(xué)JavaScript
- 簡明學(xué)中文版Photoshop