Microsoft Press mcts training kit 70 - 648 server virtualization phần 8

, hiệu suất có thể rất nghèo, trừ khi bạn chạy đĩa Differencing trên cọc nhanh nhất bạn có thể truy cập. Tuy nhiên, bởi vì mối quan hệ mẹ-con, Differencing đĩa Nhấp vào Thêm, loại Thư viện, và nhấn Check Names và sau đó OK. Nhấn để tạo ra các vai trò mới. | The challenge is to identify how security must differ when running virtual infrastructures. Virtual service offerings VSOs will run all of the networked services your end users interact with. Therefore the traditional security measures you undertake when building and designing these services still apply. The fact that users interact with virtual machines instead of physical machines does not change the need for tight security at all levels in this infrastructure. What does change is how you secure resource pools. By their very nature resource pools are not designed to interact with users. They are nothing more than host servers that run a virtualization engine. Because of this they are dealt with by administrators and technicians only. An end user running Microsoft Office Outlook will never have any interaction with the resource pool itself. Instead the end user will interact with a number of different virtual machines running Active Directory Domain Services Microsoft Exchange and perhaps a collaboration engine such as Microsoft Office SharePoint Server. Because all of these machines are virtual users and host or physical servers have no direct interaction see Figure 8-1 . Administrators Technicians FIGURE 8-1 The natural segregation of resource pools and virtual service offerings Securing Hosts and Virtual Machines CHAPTER 8 433 This segregation of the two environments is what forms the key to the protection of your resource pool and the VMs it runs. This is the focus of this chapter. Exam objective in this chapter Manage and optimize Hyper-V Server. Before You Begin To complete this chapter you must have Experience with Windows Server 2003 and or Windows Server 2008 security implementations. Access to a setup as described in the Introduction. In this case you need to access host servers as well as virtual machines running domain controller services and SCVMM and an administrative workstation. 434 CHAPTER 8 Securing Hosts and Virtual Machines Lesson 1 Securing .

Không thể tạo bản xem trước, hãy bấm tải xuống
TỪ KHÓA LIÊN QUAN
TÀI LIỆU MỚI ĐĂNG
11    65    2    24-05-2024
474    1    1    24-05-2024
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.