Windows virtual machine security spotlight
SearchWindowsServer.com's Hyper-V and virtual machine security Technology Spotlight features topics including patch management, security tools, storage risks and managing security risks. Check out the guide for additional details on securing your Hyper-V virtual machines.
Security best practices for Microsoft Hyper-V installations
With various virtualization platforms, the attack surface (the area that systems are prone from attack)increases from multiple physical machines to standalone hosts containing numerous virtual machines. So why can an attack area widen despite your efforts at server consolidation? To prevent this problem, you need to treat each VM as a standalone host and consider the physical servers on which they reside. If that sounds difficult, this tip provides Hyper-V security best practices to alleviate administrator stress in managing and securing virtual machines.
How to improve security in Hyper-V virtual networks
If you think that virtual switches are digital copies of physical switches, you're due for a harsh awakening. In fact, Hyper-V virtual switches lack support for third-party monitoring and network traffic analysis tools. Luckily, there are a few workarounds that mimic the security features of physical servers and switches, and this tip shows you how.