- 论坛徽章:
- 0
|
我们做VM,安全性也应该放在首要位置。下面奉上MS官方文档-------HYPERV安全设置,值得收藏。
OverviewThisSolution Accelerator consists of a security guide and an overviewpackaged in a .zip file format. The security guide is a Word documentintended for IT and security professionals. It includes three chaptersthat discuss methods and best practices that will help to secure aHyper-V environment. The overview is a two page description of thesecurity guide and other virtualization Solution Accelerators that areavailable. Brief descriptions follow for each of the chapters in thesecurity guide.
Chapter 1: Hardening Hyper-VThis chapter provides prescriptiveguidance for hardening the Hyper-V role. It discusses several bestpractices for installing and configuring Hyper-V on Windows Server 2008server with a focus on security. These best practices include measuresfor reducing the attack surface of a server running Hyper-V andrecommendations for properly configuring secure network and storagedevices.
Chapter 2: Delegating Virtual Machine ManagementThis chapterdiscusses several available methods for delegating virtual machinemanagement so that virtual machine administrators only have the minimumpermissions they require. It describes common delegation scenarios, andincludes detailed steps to guide you through using AuthorizationManager (AzMan) and System Center Virtual Machine Manager 2008 (VMM200 to separate virtual machine administrators from virtualizationhost administrators.
Chapter 3: Protecting Virtual MachinesThis chapter provides prescriptive guidance for securing virtualmachine resources. It discusses best practices and includes detailedsteps for protecting virtual machines by using a combination of filesystem permissions, encryption, and auditing. Also included areresources for hardening and updating the operating system instancesrunning within your virtual machines.
下载地址
http://www.microsoft.com/downloa ... b3dffdd090#filelist |
|