Le guide sécurité jusqu'alors en beta est disponible en téléchargement en cliquant ici.
Au programme :
• Hardening the Hyper-V role. Prescriptive guidance for hardening the Hyper-V role, including several best practices for installing and configuring Hyper-V with a focus on security. These best practices include measures for reducing the attack surface of Hyper-V as well as recommendations for properly configuring secure virtual networks and storage devices.
• Delegating virtual machine management. Prescriptive guidance to help you safely and securely delegate administrative access to virtual machine resources within an organization.
• Protecting virtual machines. Prescriptive guidance for securing virtual machine resources, including best practices and detailed steps for protecting virtual machines by using a combination of file system permissions, encryption, and auditing.
Inscription à :
Publier les commentaires (Atom)
Aucun commentaire:
Enregistrer un commentaire