Virtualization Security Survival Guide

Virtualization Security Survival Guide

We encourage you to enhance this guide by identifying missing areas (scenarios, features, lifecycle...), provide links to and write descriptions of existing content, and providing new content where there are gaps. Join the community!

Introduction

Virtualization security is a very important topic, mainly in this movement to cloud computing where virtualization is highly utilized. Microsoft virtualization platform is based on Hyper-V and the goal of this article is to bring general recommendations regarding virtualization security that are applicable for Microsoft Hyper-V.

Planning Virtualization Security

While planning for virtualization security you should take in consideration the general guidance around Hyper-V Security as well as the best practices for virtualization. Below you can find more information about those.

Hardening Hyper-V

Hardening a Hyper-V Server is one important step towards securing the overall virtualization platform. The official Hyper-V Hardening process is described in the Hyper-V Security Guide.

Other Related Content

Additional articles and presentations from Microsoft, MVPs or vendors can be added in this section:



 

 
Leave a Comment
  • Please add 6 and 7 and type the answer here:
  • Post
Wiki - Revision Comment List(Revision Comment)
Sort by: Published Date | Most Recent | Most Useful
Comments
Page 1 of 1 (1 items)
Wikis - Comment List
Sort by: Published Date | Most Recent | Most Useful
Posting comments is temporarily disabled until 10:00am PST on Saturday, December 14th. Thank you for your patience.
Comments
Page 1 of 1 (2 items)