Securing HYPER-V environment & Best Practices

During monthly ITPro forum in Sri Lanka I’ve discuss the above mention topic. When Virtualization becomes commodity model in IT industry next concern would be security as  usual SmileDuring this presentation I’ve discuss about the importance of properly implementing the HYPER-V server and how we can use the tools and utilities give to secure the environment. HYPER_V architecture has been analyzed in detail level to understand how the components work with each other and where attacks can occur.

During this presentation I’ve highlighted the risk of running the HYPER-V role in a GUI method and the advantage on Server CORE. How to use the AZ Man and other Microsoft security tools to tight the security around the HYPER-V host and protect the guest machines.

View album



View album
View album

You can download the presentation file from here.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.