Hyper-V Security Guide

いまさらながら、後で読むためのメモ。

Overview
Who Should Read This Guide
Skills and Readiness
Chapter Summaries
Style Conventions
More Information
Support and Feedback
Acknowledgements

Chapter 1: Hardening Hyper-V
Attack Surface
Server Role Security Configuration
Management Operating System Security
Default Installation Recommendations
Host Network Configuration
Securing Dedicated Storage Devices
Security Setting Recommendations
Virtual Machine Security
Virtual Machine Configuration
More Information

Chapter 2: Delegating Virtual Machine Management
Using Tools to Delegate Access
Delegating Access with Authorization Manager
System Center Virtual Machine Manager 2008
Delegated Administrator Role
Self Service Portal
More Information

Chapter 3: Protecting Virtual Machines
Methods for Protecting VMs
Hardening the Virtual Machine Operating System and Applications
Firewall and Antivirus Requirements
Group Policy Considerations
Using File System Security to Protect Virtual Machine Resources
Using Encryption to Protect Virtual Machine Resources
Using Auditing to Track Access to Virtual Machine Resources
Maintaining Virtual Machines
Hyper-V Security Best Practice Checklist
Management Operating System Configuration
Virtual Machine Configuration
More Information