Eric's Technical Outlet

Learning the hard way so you don't have to

New Book on Hyper-V Security

My second book is now available for purchase. Its name is Hyper-V Security. It’s a short-form book with only eight chapters. The first six are related to the host, the hypervisor, and the guests. The final two chapters were written by Andrew Syrewicze and cover security in System Center Virtual Machine Manager.

The book is available directly from the publisher. You can also purchase it from resellers such as Amazon.

This book has very little level 100 material. To get the most out of it, you’ll need a functioning Hyper-V deployment.

Chapter 1 is the introductory chapter. Its purpose is to set forth the scope of security in a Hyper-V environment. Since securing your deployment will involve time and potentially money, it also has a few pointers to help you frame the discussion for others.

Chapter 2 discusses securing a Hyper-V host from the perspective of the management operating system. It includes direction on using Group Policy and successfully employing antivirus solutions.

Chapter 3 covers securing Hyper-V’s virtual machines as hypervisor objects. The highlight of this chapter is the very thorough coverage of configuring certificate-based connections for PowerShell Remoting. I’ve never found a decent walkthrough anywhere that really takes you through all the various possible scenarios, so I wrote one for this book. It works with disjoined hosts, such as those in a perimeter network or in a management domain. After that, it demonstrates building your own custom PowerShell Remoting endpoints so you can effectively replace AzMan in your environment with highly restricted and granular control.

Chapter 4 is something of a mirror to Chapter 2 except that it deals with the guest operating systems.

Chapter 5 is an in-depth examination of the security components of the network, with special emphasis on the Hyper-V virtual switch. Some of this chapter is theoretical, as it explains the isolation technologies built in to Hyper-V. There is practical guidance as well, with a major feature being an explanation of leveraging Hyper-V’s switch ACLs.

Chapter 6 focuses on locking down Hyper-V’s storage locations.

Chapters 7 and 8 are Andrew’s and I don’t know them as well. Chapter 7 is about locking down VMM and using it to lock down hosts. Chapter 8 involves App Controller security.


One response to “New Book on Hyper-V Security

  1. danieltclarke January 4, 2015 at 9:08 pm

    Reblogged this on daniel clarke and commented:
    If your interested in securing your Hyper-V hypervisor then check out a new book by Eric Siron


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.

%d bloggers like this: