Securing HYPER-V environment & Best Practices

During monthly ITPro forum in Sri Lanka I’ve discuss the above mention topic. When Virtualization becomes commodity model in IT industry next concern would be security as  usual SmileDuring this presentation I’ve discuss about the importance of properly implementing the HYPER-V server and how we can use the tools and utilities give to secure the environment. HYPER_V architecture has been analyzed in detail level to understand how the components work with each other and where attacks can occur.

During this presentation I’ve highlighted the risk of running the HYPER-V role in a GUI method and the advantage on Server CORE. How to use the AZ Man and other Microsoft security tools to tight the security around the HYPER-V host and protect the guest machines.

View album

ITPro-June2011

VIEW SLIDE SHOW
DOWNLOAD ALL

View album
View album

You can download the presentation file from here.

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s