Below are key resources for improving Hyper-V security
Simple Security Recommendations When Using Hyper-V
QUOTE: Microsoft has a few articles on TechNet that outline some of the key aspects of a secure deployment of the Hyper-V virtualization technology, a feature of Windows Server 2008 R2.
Microsoft Hyper-V Security Best Practices
— Use a Server Core installation of Windows Server 2008 for the management operating system.
— Do not run any applications in the management operating system—run all applications on virtual machines.
— Use the security level of your virtual machines to determine the security level of your management operating system.
— Do not give virtual machine administrators permissions on the management operating system.
— Ensure that virtual machines are fully updated before they are deployed in a production environment.
— Ensure integration services are installed on virtual machines.
— Use a dedicated network adapter for the management operating system of the virtualization server.
— Use BitLocker Drive Encryption to help protect resources.