ImageVerifierCode 换一换
格式:DOCX , 页数:49 ,大小:850.11KB ,
资源ID:17660137      下载积分:3 金币
快捷下载
登录下载
邮箱/手机:
温馨提示:
快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。 如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝    微信支付   
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【https://www.bdocx.com/down/17660137.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录   QQ登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(部署4HyperV 安全解决方案加速器指南.docx)为本站会员(b****2)主动上传,冰豆网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知冰豆网(发送邮件至service@bdocx.com或直接QQ联系客服),我们立即给予删除!

部署4HyperV 安全解决方案加速器指南.docx

1、部署4HyperV 安全解决方案加速器指南Hyper-V Security GuideVersion 1.0 Published: March 2009For the latest information, please see Copyright 2009 Microsoft Corporation. All rights reserved. Complying with the applicable copyright laws is your responsibility. By using or providing feedback on this documentation, you

2、 agree to the license agreement below.If you are using this documentation solely for non-commercial purposes internally within YOUR company or organization, then this documentation is licensed to you under the Creative Commons Attribution-NonCommercial License. To view a copy of this license, visit

3、http:/creativecommons.org/licenses/by-nc/2.5/ or send a letter to Creative Commons, 543 Howard Street, 5th Floor, San Francisco, California, 94105, USA.This documentation is provided to you for informational purposes only, and is provided to you entirely AS IS. Your use of the documentation cannot b

4、e understood as substituting for customized service and information that might be developed by Microsoft Corporation for a particular user based upon that users particular environment. To the extent permitted by law, MICROSOFT MAKES NO WARRANTY OF ANY KIND, DISCLAIMS ALL EXPRESS, IMPLIED AND STATUTO

5、RY WARRANTIES, AND ASSUMES NO LIABILITY TO YOU FOR ANY DAMAGES OF ANY TYPE IN CONNECTION WITH THESE MATERIALS OR ANY INTELLECTUAL PROPERTY IN THEM. Microsoft may have patents, patent applications, trademarks, or other intellectual property rights covering subject matter within this documentation. Ex

6、cept as provided in a separate agreement from Microsoft, your use of this document does not give you any license to these patents, trademarks or other intellectual property.Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless

7、 otherwise noted, the example companies, organizations, products, domain names, e-mail addresses, logos, people, places and events depicted herein are fictitious. Microsoft, Active Directory, BitLocker, Hyper-V, Windows, Windows Server, and Windows Vista are either registered trademarks or trademark

8、s of Microsoft Corporation in the United States and/or other countries. The names of actual companies and products mentioned herein may be the trademarks of their respective owners.You have no obligation to give Microsoft any suggestions, comments or other feedback (Feedback) relating to the documen

9、tation. However, if you do provide any Feedback to Microsoft then you provide to Microsoft, without charge, the right to use, share and commercialize your Feedback in any way and for any purpose. You also give to third parties, without charge, any patent rights needed for their products, technologie

10、s and services to use or interface with any specific parts of a Microsoft software or service that includes the Feedback. You will not give Feedback that is subject to a license that requires Microsoft to license its software or documentation to third parties because we include your Feedback in them

11、.ContentsOverviewWelcome to the Hyper-V Security Guide. This guide provides instructions and recommendations to help strengthen the security of computers running the Hyper-V role on Windows Server2008.Microsoft engineering teams, consultants, support engineers, partners, and customers have reviewed

12、and approved this prescriptive guidance to make it: Proven. Based on field experience. Authoritative. Offers the best advice available. Accurate. Technically validated and tested. Actionable. Provides the steps to success. Relevant. Addresses real-world security concerns.Microsoft has published secu

13、rity guides for Windows Server 2008 and Windows Server2003. This guide references significant new capabilities and security enhancements in Windows Server2008. The guide was developed and tested with computers running the Hyper-V role on Windows Server2008 that were joined to a domain that uses Acti

14、ve Directory Domain Services (ADDS).As Hyper-V continues to evolve through future releases, you can expect updated versions of this guidance to include more security recommendations. Solution Accelerators are also available to assist you with the deployment and operation of Windows Server2008 as wel

15、l as other Microsoft technologies. For more information about all available accelerators, visit Solution Accelerators on Microsoft TechNet.Who Should Read This GuideThe Hyper-V Security Guide is primarily for IT professionals, security professionals, systems architects, computer engineers, and other

16、 IT consultants who plan application or infrastructure development and deployments of Windows Server2008 for servers in an enterprise environment. The guide is not intended for home users. This guide is for individuals whose jobs may include one or more of the following roles: Security professional.

17、 Individuals in this role focus on how to provide security across computing platforms within an organization. Security professionals require a reliable reference guide that addresses the security needs of all segments of their organizations and also offers proven methods to implement security counte

18、rmeasures. They identify security features and settings, and then provide recommendations on how their customers can most effectively use them in high risk environments. IT operations, help desk, and deployment staff. Individuals in all of these roles troubleshoot security issues as well as applicat

19、ion installation, configuration, usability, and manageability issues. They monitor these types of issues to define measurable security improvements with minimal impact on critical business applications. Individuals in IT operations focus on integrating security and controlling change in the deployme

20、nt process, and deployment personnel focus on administering security updates quickly. Systems architect and planner. Individuals in this role drive the architecture efforts for computer systems in their organizations. Consultant. Individuals in this role are aware of security scenarios that span all

21、 the business levels of an organization. IT consultants from both Microsoft Services and partners take advantage of knowledge transfer tools for enterprise customers and partners.Skills and ReadinessThe following knowledge and skills are required for consultants, operations, help desk and deployment

22、 staff, and security professionals who develop, deploy, and secure server systems running Windows Server2008 in an enterprise organization: MCSE on Microsoft Windows Server2003 or a later certification and two or more years of security-related experience, or equivalent knowledge. Experience using Hy

23、per-V Manager and System Center Virtual Machine Manager 2008 (VMM 2008). Detailed knowledge of the organizations domain and Active Directory environments. Experience in the administration of Group Policy using the Group Policy Management Console (GPMC), which provides a single solution for managing

24、all Group Policyrelated tasks. Experience using management tools including Microsoft Management Console (MMC), Gpupdate, and Gpresult. Experience using the Security Configuration Wizard (SCW). Experience deploying applications and server computers in enterprise environments.Chapter SummariesThis rel

25、ease of the Hyper-V Security Guide consists of this Overview and three chapters that discuss methods and best practices that will help you secure your Hyper-V environment. Brief descriptions follow for each chapter.OverviewThe overview states the purpose and scope of the guide, defines the guide aud

26、ience, and describes the guides structure to help you locate the information that is relevant to you. It also describes the user prerequisites for the guidance.Chapter 1: Hardening Hyper-VThis chapter provides prescriptive guidance for hardening the Hyper-V role. It discusses several best practices

27、for installing and configuring Hyper-V on Windows Server 2008 server with a focus on security. These best practices include measures for reducing the attack surface of a server running Hyper-V and recommendations for properly configuring secure network and storage devices on a server running Hyper-V

28、.Chapter 2: Delegating Virtual Machine ManagementThis chapter discusses several available methods for delegating virtual machine management so that virtual machine administrators only have the minimum permissions they require. It describes common delegation scenarios, and includes detailed steps to

29、guide you through using Authorization Manager (AzMan) and System Center VMM 2008 to separate virtual machine administrators from virtualization host administrators. Chapter 3: Protecting Virtual MachinesThis chapter provides prescriptive guidance for securing virtual machine resources. It discusses

30、best practices and includes detailed steps for protecting virtual machines by using a combination of file system permissions, encryption, and auditing. Also included are resources for hardening and updating the operating system instances running within your virtual machines. Style ConventionsThis gu

31、idance uses the style conventions that are described in the following table.ElementMeaningBold fontSignifies characters typed exactly as shown, including commands, switches, and file names. User interface elements also appear in bold. Italic fontTitles of books and other substantial publications app

32、ear in italic. Placeholders set in italic and angle brackets represent variables. Monospace font Defines code and script samples. Note Alerts the reader to supplementary information. Important Alerts the reader to essential supplementary information. More InformationThe following resources provide additional information about security topics and detailed discussion of the concepts and security prescriptions in this guide on M: Hyper-V P

copyright@ 2008-2022 冰豆网网站版权所有

经营许可证编号:鄂ICP备2022015515号-1