官术网_书友最值得收藏!

Chapter 2. Securing the Host

The Hyper-V host is easily the most critical component of your virtual environment. If it is compromised, all the systems in its scope of responsibility are placed at immediate risk. However, the Hyper-V host is, first and foremost, a computer system. Before diving into it as a computer that is running a hypervisor, it must be dealt with just like any other computer system. Of course, as it will run a hypervisor, particular considerations must be taken.

In this chapter, we'll cover the following topics:

  • Understanding Hyper-V's architecture
  • Choosing a management operating system
  • Disabling unnecessary components
  • Using the Windows Firewall
  • Relying on domain security
  • Leveraging Group Policy
  • Using security software
  • Configuring Windows Update
  • Employing remote management tools
  • Following general best practices
主站蜘蛛池模板: 株洲县| 九龙县| 闽清县| 习水县| 迁西县| 宁城县| 涿鹿县| 佳木斯市| 从化市| 囊谦县| 大埔区| 乐都县| 清丰县| 四子王旗| 富源县| 广宁县| 鞍山市| 澄江县| 长泰县| 龙胜| 榆林市| 彰武县| 营山县| 扎兰屯市| 泸溪县| 弋阳县| 云安县| 西乌珠穆沁旗| 汤原县| 云浮市| 惠水县| 岳普湖县| 安阳县| 新田县| 垫江县| 哈巴河县| 闻喜县| 秀山| 木里| 胶州市| 上虞市|