Security Protection – Harry Waldron MVP Rotating Header Image

Microsoft Hyper-V Security recommendations

Below are key resources for improving Hyper-V security 

Simple Security Recommendations When Using Hyper-V http://technet.microsoft.com/en-us/security/hh535714

QUOTE: Microsoft has a few articles on TechNet that outline some of the key aspects of a secure deployment of the Hyper-V virtualization technology, a feature of Windows Server 2008 R2.

Microsoft Hyper-V Security Best Practices http://technet.microsoft.com/en-us/library/dd283088(WS.10).aspx

— Use a Server Core installation of Windows Server 2008 for the management operating system.
— Do not run any applications in the management operating system—run all applications on virtual machines.
— Use the security level of your virtual machines to determine the security level of your management operating system.
— Do not give virtual machine administrators permissions on the management operating system.
— Ensure that virtual machines are fully updated before they are deployed in a production environment.
— Ensure integration services are installed on virtual machines.
— Use a dedicated network adapter for the management operating system of the virtualization server.
— Use BitLocker Drive Encryption to help protect resources.

Additional Recommendations

Comments are closed.