- Hyper-V Security
- Eric Siron Andy Syrewicze
- 128字
- 2021-08-05 16:48:32
Chapter 2. Securing the Host
The Hyper-V host is easily the most critical component of your virtual environment. If it is compromised, all the systems in its scope of responsibility are placed at immediate risk. However, the Hyper-V host is, first and foremost, a computer system. Before diving into it as a computer that is running a hypervisor, it must be dealt with just like any other computer system. Of course, as it will run a hypervisor, particular considerations must be taken.
In this chapter, we'll cover the following topics:
- Understanding Hyper-V's architecture
- Choosing a management operating system
- Disabling unnecessary components
- Using the Windows Firewall
- Relying on domain security
- Leveraging Group Policy
- Using security software
- Configuring Windows Update
- Employing remote management tools
- Following general best practices
推薦閱讀
- 構建高質量的C#代碼
- 計算機應用
- Dreamweaver CS3+Flash CS3+Fireworks CS3創意網站構建實例詳解
- Getting Started with Clickteam Fusion
- 手把手教你玩轉RPA:基于UiPath和Blue Prism
- Visual C# 2008開發技術實例詳解
- VMware Performance and Capacity Management(Second Edition)
- 工業機器人工程應用虛擬仿真教程:MotoSim EG-VRC
- 自主研拋機器人技術
- PostgreSQL Administration Essentials
- 機器人編程實戰
- C語言開發技術詳解
- 數據通信與計算機網絡
- 大數據驅動的設備健康預測及維護決策優化
- 基于神經網絡的監督和半監督學習方法與遙感圖像智能解譯