With the release of Hyper-V R2, Microsoft made headway in its feature set and capabilities. At first, new features in Hyper-V R2, such as Live Migration and Cluster Shared Volumes, appeased some skeptics of Microsoft's second foray into server virtualization. But Microsoft still struggles to shake criticism of its virtualization platform.
While potentially unfair, one critique is that Hyper-V's underlying code is closely linked to Microsoft's often-attacked Windows OS. A real Hyper-V security issue, however, is that administrators cannot use third-party applications for traffic monitoring and enforcement.
Despite these concerns, however, Hyper-V isn't an insecure virtualization platform per se. Hyper-V benefits from the safeguards built into Windows Server 2008. Microsoft also releases regular patches to resolve known vulnerabilities.
Nevertheless, the burden of Hyper-V security rests largely on IT personnel. Virtualization administrators can harden Hyper-V's defenses in several ways. The resources in this section on Hyper-V security include tips and best practices to secure a virtual environment.
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Windows virtual machine security spotlight
SearchWindowsServer.com's Hyper-V and virtual machine security Technology Spotlight features topics including patch management, security tools, storage risks and managing security risks. Check out the guide for additional details on securing your Hyper-V virtual machines.
Security best practices for Microsoft Hyper-V installations
With various virtualization platforms, the attack surface (the area that systems are prone from attack)increases from multiple physical machines to standalone hosts containing numerous virtual machines. So why can an attack area widen despite your efforts at server consolidation? To prevent this problem, you need to treat each VM as a standalone host and consider the physical servers on which they reside. If that sounds difficult, this tip provides Hyper-V security best practices to alleviate administrator stress in managing and securing virtual machines.
How to improve security in Hyper-V virtual networks
If you think that virtual switches are digital copies of physical switches, you're due for a harsh awakening. In fact, Hyper-V virtual switches lack support for third-party monitoring and network traffic analysis tools. Luckily, there are a few workarounds that mimic the security features of physical servers and switches, and this tip shows you how.