The guide focuses on the following areas:
- Hardening the Hyper-V role. Prescriptive guidance for hardening the Hyper-V role, including several best practices for installing and configuring Hyper-V with a focus on security. These best practices include measures for reducing the attack surface of Hyper-V as well as recommendations for properly configuring secure virtual networks and storage devices.
- Delegating virtual machine management. Prescriptive guidance to help you safely and securely delegate administrative access to virtual machine resources within an organization.
- Protecting virtual machines. Prescriptive guidance for securing virtual machine resources, including best practices and detailed steps for protecting virtual machines by using a combination of file system permissions, encryption, and auditing.
- Q. What is Microsoft Enterprise Desktop Virtualization (MED-V)?
- Q. Why isn't virtualization supported for the Exchange Server 2007 Unified Messaging (UM) server role?
- Four for Free: No-Cost Virtualization Tools and Utilities
- More virtualization articles
- Perform a Physical to Virtual (P2V) Migration with SCVMM 2008
- Perform a Virtual to Virtual (V2V) Migration with SCVMM 2008
- Virtual Desktop Infrastructure Introduction
- Virtualization and Hyper-V Architecture Fundamentals
Check out hundreds more useful Q&As like this in John Savill's FAQ for Windows. Also, watch instructional videos made by John at ITTV.net.