Virtualization Technology News and Information
New Microsoft Hyper-V Security Guide Released

This Solution Accelerator provides instructions and recommendations to help strengthen the security of computers running the Hyper-V role on Windows Server 2008.  The security guide is a Word document intended for IT and security professionals. It includes three chapters that discuss methods and best practices that will help to secure a Hyper-V environment. The overview is a two page description of the security guide and other virtualization Solution Accelerators that are available. Brief descriptions follow for each of the chapters in the security guide.  

The Hyper-V Security Guide includes the following content:

  • Overview. The overview states the purpose and scope of the guide, defines the guide audience, and describes its structure to help you locate the information that is relevant to you. It also describes the user prerequisites for the guidance.
  • Chapter 1: Hardening Hyper-V. This chapter provides prescriptive guidance for hardening the Hyper-V role, including several best practices for installing and configuring Hyper-V with a focus on security. These best practices include measures for reducing the attack surface of Hyper-V as well as recommendations for properly configuring secure virtual networks and storage devices.
  • Chapter 2: Delegating virtual machine management. This chapter discusses methods for delegating virtual machine management so that virtual machine administrators only have the minimum permissions they require. It describes common delegation scenarios, and includes detailed steps to guide you through using Authorization Manager (AzMan) and System Center Virtual Machine Manager 2008 (VMM 2008) to separate virtual machine administrators from virtualization host administrators.
  • Chapter 3: Protecting virtual machines. This chapter provides prescriptive guidance for securing virtual machine resources. It includes best practices and detailed steps for protecting virtual machines by using a combination of file system permissions, encryption, and auditing.

To read more about the guide, click here.

To download the guide, click here.

Published Wednesday, April 01, 2009 6:15 AM by David Marshall
Topics about Computers » New Microsoft Hyper-V Security Guide Released - (Author's Link) - April 1, 2009 9:29 AM
To post a comment, you must be a registered user. Registration is free and easy! Sign up now!
<April 2009>