Securing the Hyper-V Server
Your    Hyper-V servers are running the majority    of  your    server  operating   system
instances   and potentially your    desktops    if  you’re  using   VDI solutions.  While   an
administrator   on  a   Hyper-V server  cannot  bypass  the regular logon   to  an  operating
system  in  a   virtual machine,    if  you have    access  to  the Hyper-V server, then    you have
access  to  the virtual machine storage.    The storage could   then    be  mounted,    and the
content could   be  accessed.
The normal security best practices for servers should apply:
Ensure  that    servers are physically  secure.
Ensure  that    the firewall    is  enabled.
Patch   servers.
Run malware protection  (with   the required    exclusions  configured).
Restrict    who is  an  administrator   (and    by  extension,  domain  administrators  should
be  limited as  well).
Run Server  Core    on  Hyper-V servers.
Do  not run other   applications    or  browse  the Web on  Hyper-V servers.    Running
Server  Core    will    help    stop    this.
Use BitLocker   to  encrypt volumes containing  virtual machines;   it  can also    be  used
on  Cluster Shared  Volumes.
Make    sure    administrators  are well    trained and understand  their   actions.
Use Group   Policy  to  ensure  that    policies    are set as  required.
Have    a   monitoring  solution    in  place,  and ensure  that    security    logs    are checked to
detect  any attack  attempts.The best    Microsoft   resource    to  help    with    security    is  the Microsoft   Security
Compliance  Manager,    which   is  available   at  the following   location:
http://www.microsoft.com/en-us/download/details.aspx?id=16776
It  is  a   large   download    at  over    100MB,  but it  provides    not only    documentation   to  help
secure  your    entire  environment but also    tools   and templates   to  ensure  security.
