During monthly ITPro forum in Sri Lanka I’ve discuss the above mention topic. When Virtualization becomes commodity model in IT industry next concern would be security as usual During this presentation I’ve discuss about the importance of properly implementing the HYPER-V server and how we can use the tools and utilities give to secure the environment. HYPER_V architecture has been analyzed in detail level to understand how the components work with each other and where attacks can occur.
During this presentation I’ve highlighted the risk of running the HYPER-V role in a GUI method and the advantage on Server CORE. How to use the AZ Man and other Microsoft security tools to tight the security around the HYPER-V host and protect the guest machines.
You can download the presentation file from here.