Hyper-V Security Guide
いまさらながら、後で読むためのメモ。
Overview Who Should Read This Guide Skills and Readiness Chapter Summaries Style Conventions More Information Support and Feedback Acknowledgements Chapter 1: Hardening Hyper-V Attack Surface Server Role Security Configuration Management Operating System Security Default Installation Recommendations Host Network Configuration Securing Dedicated Storage Devices Security Setting Recommendations Virtual Machine Security Virtual Machine Configuration More Information Chapter 2: Delegating Virtual Machine Management Using Tools to Delegate Access Delegating Access with Authorization Manager System Center Virtual Machine Manager 2008 Delegated Administrator Role Self Service Portal More Information Chapter 3: Protecting Virtual Machines Methods for Protecting VMs Hardening the Virtual Machine Operating System and Applications Firewall and Antivirus Requirements Group Policy Considerations Using File System Security to Protect Virtual Machine Resources Using Encryption to Protect Virtual Machine Resources Using Auditing to Track Access to Virtual Machine Resources Maintaining Virtual Machines Hyper-V Security Best Practice Checklist Management Operating System Configuration Virtual Machine Configuration More Information