{"id":9092,"date":"2008-06-25T09:57:00","date_gmt":"1999-11-29T20:00:00","guid":{"rendered":"https:\/\/aidanfinn.com\/?p=9092"},"modified":"2008-06-25T09:57:00","modified_gmt":"1999-11-29T20:00:00","slug":"hyper-v-and-bitlocker","status":"publish","type":"post","link":"https:\/\/aidanfinn.com\/?p=9092","title":{"rendered":"Hyper-V and BitLocker"},"content":{"rendered":"<p>It&#8217;s been discussed quite a lot (and still some plead ignorance or stupidity) but if you have sensitive information on a computer (laptop, desktop or server) then you should encrypt the disk.\u00a0 Guess what?\u00a0 This applies to VM&#8217;s too!<\/p>\n<p>VM&#8217;s are mobile.\u00a0 The are very mobile.\u00a0 To steal a VM and all of it&#8217;s data, all you have to do is copy the virtual disk file.\u00a0 It doesn&#8217;t matter if you&#8217;re talking about VMware or Hyper-V.\u00a0 Sure ESX is a <em>little<\/em> trickier because the VM is on a less common file system but a determined thief won&#8217;t let that stop them.<\/p>\n<p>You need to consider encrypting the contents of that virtual disk.\u00a0 Windows Server 2008 includes BitLocker and that can encrypt the entire file system for you.\u00a0 Microsoft allegedly <a href=\"http:\/\/www.microsoft.com\/downloads\/details.aspx?familyid=2c3c0615-baf4-4a9c-b613-3fda14e84545&amp;displaylang=en&amp;tm\">published<\/a> a document on how you could use BitLocker with Hyper-V but the download link appears to be dead.\u00a0 I&#8217;m hoping they&#8217;ll rectify that.<\/p>\n<p>Once you encrypt that VM, it doesn&#8217;t matter how mobile it is.\u00a0 The contents of the virtual disk are protected and you&#8217;re safe.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>It&#8217;s been discussed quite a lot (and still some plead ignorance or stupidity) but if you have sensitive information on a computer (laptop, desktop or server) then you should encrypt the disk.\u00a0 Guess what?\u00a0 This applies to VM&#8217;s too! VM&#8217;s are mobile.\u00a0 The are very mobile.\u00a0 To steal a VM and all of it&#8217;s data, &hellip; <a href=\"https:\/\/aidanfinn.com\/?p=9092\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Hyper-V and BitLocker&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-9092","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"aioseo_notices":[],"jetpack_featured_media_url":"","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/aidanfinn.com\/index.php?rest_route=\/wp\/v2\/posts\/9092","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/aidanfinn.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/aidanfinn.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/aidanfinn.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/aidanfinn.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=9092"}],"version-history":[{"count":0,"href":"https:\/\/aidanfinn.com\/index.php?rest_route=\/wp\/v2\/posts\/9092\/revisions"}],"wp:attachment":[{"href":"https:\/\/aidanfinn.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=9092"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/aidanfinn.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=9092"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/aidanfinn.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=9092"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}