万本电子书0元读

万本电子书0元读

顶部广告

Hyper-V Security电子书

售       价:¥

5人正在读 | 0人评论 9.8

作       者:Eric Siron

出  版  社:Packt Publishing

出版时间:2014-12-26

字       数:100.7万

所属分类: 进口书 > 外文原版书 > 电脑/网络

温馨提示:数字商品不支持退换货,不提供源文件,不支持导出打印

为你推荐

  • 读书简介
  • 目录
  • 累计评论(0条)
  • 读书简介
  • 目录
  • 累计评论(0条)
Hyper-V Security is intended for administrators with a solid working knowledge of Hyper-V Server, Windows Server, and Active Directory. An administrator with a functional environment will be able to use the knowledge and examples present in this book to enhance security.
目录展开

Hyper-V Security

Table of Contents

Hyper-V Security

Credits

About the Authors

About the Reviewers

www.PacktPub.com

Support files, eBooks, discount offers, and more

Why subscribe?

Free access for Packt account holders

Instant updates on new Packt books

Preface

What this book covers

What you need for this book

Who this book is for

Conventions

Reader feedback

Customer support

Downloading the example code

Errata

Piracy

Questions

1. Introducing Hyper-V Security

The importance of Hyper-V security

Your clients expect it

Your stakeholders expect it

Your employees and volunteers expect it

Experience has taught us that security is important

Weak points aren't always obvious

The costs of repair exceeds the costs of prevention

Basic security concerns

Attack motivations

Untargeted attacks

Targeted attacks

The computing device

The network

Data-processing points

Data storage

People

A starting point to security

Hyper-V terminology

Acquiring Hyper-V

Hyper-V Server

Windows Server

Client Hyper-V

Summary

2. Securing the Host

Understanding Hyper-V's architecture

Choosing a management operating system

Hyper-V Server

Windows Server – full GUI installation

Windows Server – Core installation

Windows Server – Minimal Server Interface installation

Switching between Windows Server modes

Practical guidance to chose a deployment

Disabling unnecessary components

Using the Windows Firewall

Relying on domain security

Leveraging Group Policy

Exporting SCM baselines

Importing a policy into Group Policy Management Console

Applying SCM baselines to Local Group Policy

Enabling LocalGPO in Windows and Hyper-V Server 2012 R2

Using security software

Configuring Windows Update

Manual patching

Fully automated patching

Staggered patching

Guinea pig systems

Employing remote management tools

Following general best practices

Microsoft baseline security analyzer

Hyper-V Best Practices Analyzer

Running the Hyper-V BPA from Server Manager

Running the Hyper-V BPA from PowerShell

Other practices

Summary

3. Securing Virtual Machines from the Hypervisor

Using the Hyper-V Administrators group

Using Group Policy to control Hyper-V Administrators

Powers of Hyper-V Administrators

Leveraging PowerShell Remoting

Configuring PowerShell Remoting and its basic usage

Workgroup and inter-domain PowerShell Remoting

Certificate-based PowerShell Remoting

Configuring the Host SSL certificate

Configuring the Remote System

TrustedHosts-based PowerShell Remoting

Choosing between SSL and TrustedHosts

Example – PowerShell Remoting with Invoke-Command

Using custom PowerShell Remoting endpoints

Practical custom PowerShell Remoting endpoints

Summary

4. Securing Virtual Machines

Understanding the security environment of VMs

Process isolation

Memory isolation

Hard disk isolation

Network isolation

Other hardware

Practical approaches to isolation security

Leveraging Generation 2 virtual machines

Employing anti-malware on a virtual machine

Considering intrusion prevention and detection strategies

Using Group Policy with virtual machines

Limiting exposure with resource limitations

Virtual processor limits

Memory limits

Hard drive I/O limits

Virtual network limits

Applying general best practices

Summary

5. Securing the Network

Understanding SSL encryption

Leveraging network hardware

Hardware firewalls

Using the virtual switch's isolating technologies

Multiple switch types

Virtual LAN

Using PowerShell to control VLANs on virtual adapters

Private VLAN

Using PowerShell to configure private VLANs

Network virtualization

Employing Hyper-V virtual switch ACLs

Using basic port ACLs

Using extended port ACLs

Practical ACL usage

Configuring the Windows Firewall

Using management tools remotely

Enabling Remote Desktop

Enabling other remote management tools

Remote access for non-domain-joined machines

Using Hyper-V with IPsec

Configuring virtual network adapter protections

MAC address settings

DHCP guard

Router guard

Port mirroring

Setting Hyper-V protections using Powershell

Encrypting cluster communications

Securing Hyper-V Replica traffic

Summary

6. Securing Hyper-V Storage

Configuring NTFS security for VM storage

Securing SMB 3.0 shares for VM storage

Administrative and hidden shares

Securing iSCSI connections

Physical and logical isolation

iSCSI security options

Using Secure Boot

Using BitLocker

Understanding the role of backup

Summary

7. Hyper-V Security and System Center VMM

Enhancing Hyper-V host security through VMM

The user role group descriptions

Run as accounts

Securing the VMM installation

VMM library shares

Anything else?

Network virtualization and multi-tenancy

Providing secure self-service with the Windows Azure Pack

DOS and DDOS attacks

Summary

8. Secure Hybrid Cloud Management through App Controller

System requirements

Installing App Controller

Connecting clouds to App Controller

App Controller's role-based security model

Summary

Index

累计评论(0条) 0个书友正在讨论这本书 发表评论

发表评论

发表评论,分享你的想法吧!

买过这本书的人还买过

读了这本书的人还在读

回顶部