Sign in
    Don't miss our limited-time Cyber Monday deals. Shop now.

    Don't miss our limited-time Cyber Monday deals.

    Hyper-V Security Guide

    This Solution Accelerator provides instructions and recommendations to help strengthen the security of computers running the Hyper-V role on Windows Server® 2008. It covers three core topics: hardening Hyper-V, delegating virtual machine management, and protecting virtual machines.
    • Note:There are multiple files available for this download.Once you click on the "Download" button, you will be prompted to select the files you need.


      File Name:

      Hyper-V Security

      Release Notes.rtf

      Date Published:


      File Size:

      1.1 MB

      252 KB

        This Solution Accelerator consists of a security guide and an overview packaged in a .zip file format. The security guide is a Word document intended for IT and security professionals. It includes three chapters that discuss methods and best practices that will help to secure a Hyper-V environment. The overview is a two page description of the security guide and other virtualization Solution Accelerators that are available. Brief descriptions follow for each of the chapters in the security guide.

        Chapter 1: Hardening Hyper-V This chapter provides prescriptive guidance for hardening the Hyper-V role. It discusses several best practices for installing and configuring Hyper-V on Windows Server 2008 server with a focus on security. These best practices include measures for reducing the attack surface of a server running Hyper-V and recommendations for properly configuring secure network and storage devices.

        Chapter 2: Delegating Virtual Machine Management This chapter discusses several available methods for delegating virtual machine management so that virtual machine administrators only have the minimum permissions they require. It describes common delegation scenarios, and includes detailed steps to guide you through using Authorization Manager (AzMan) and System Center Virtual Machine Manager 2008 (VMM 2008) to separate virtual machine administrators from virtualization host administrators.

        Chapter 3: Protecting Virtual Machines This chapter provides prescriptive guidance for securing virtual machine resources. It discusses best practices and includes detailed steps for protecting virtual machines by using a combination of file system permissions, encryption, and auditing. Also included are resources for hardening and updating the operating system instances running within your virtual machines.

        To view this accelerator online at TechNet click here.

        Send questions or feedback to us directly at
    • Supported Operating System

      Windows Vista, Windows XP

        • Click the Download button next to one of the files listed below to start the download.
        • Do one of the following:

          • To start the .zip file extraction immediately, click Open or Run this program from its current location. Then extract the files to your preferred location on your computer.
          • To save the download to your preferred location on your computer for .zip file extraction at a later time, click Save or Save this program to disk.
      • Solution Accelerators are free, scenario-based guides and automations designed to help IT Professionals who are proactively planning, deploying, and operating IT systems using Microsoft products and technologies. Solution Accelerator scenarios focus on security and compliance, management and infrastructure, and communication and collaboration.

        Get the Solution Accelerator Notifications Newsletter

        Subscribe to the Solution Accelerator Notifications newsletter so that you can stay informed about new Solution Accelerator releases and updates. The newsletter covers such areas of interest as

        • Communication & Collaboration
        • Security, Data Protection, & Recovery
        • Deployment
        • Operations & Management

        You may also receive invitations to participate in accelerator development via beta programs and customer surveys. Solution Accelerator Notifications is currently available in English only.

        If you’ve used a Solution Accelerator within your organization, please share your experience with us by completing this short survey (less than ten minutes long).