Encrypting a virtual machine secures it from unauthorized use. To decrypt a virtual machine, users must enter the correct encryption password.
When you encrypt a virtual machine, Workstation Player prompts you for a password. After the virtual machine is encrypted, you must enter this password to open the virtual machine or to remove encryption from it. Workstation Player displays the encrypted virtual machine with a lock icon until you enter the password to open the virtual machine.
- Clicks Edit virtual machine settings or Upgrade Virtual Machine on the virtual machine summary tab
- Double-clicks a virtual device in the Devices list on the virtual machine summary tab
- Selects the virtual machine and selects or from the menu bar
- Clicks or right-clicks on a removable device icon to edit its settings
- Uses a menu to edit the settings for a device
You can choose Remember password to save the password on local password vault which is Windows Credential Manager for Windows and GNOME libsecret library for Linux. Make sure you record the encryption password. Workstation Player does not provide a way to retrieve the passwords if you lose them.
Encryption applies to all snapshots in a virtual machine. If you restore a snapshot in an encrypted virtual machine, the virtual machine remains encrypted whether or not it was encrypted when the snapshot was taken. If you change the password for an encrypted virtual machine, the new password applies to any snapshot you restore, regardless of the password in effect when the snapshot was taken.
- Fast VM Encryption
-
Fast encryption refers to the encryption of a minimal set of VM files as follows:
- Ancillary data files such as snapshot/screenshot/NVRAM files. These are encrypted with the key in the configuration file. List of files encrypted- .nvram, .vmsn, .vmss, .vmem
- Partially encrypted VM configuration file.
- Full VM Encryption
-
Full encryption refers to encryption of all VM files as follows:
- Disk file headers. These are encrypted with the key in the configuration file.
- Disk file data. These are encrypted with the key in the configuration file.
- Ancillary data files such as the snapshot/screenshot/NVRAM files. These are encrypted with the key in the configuration file.
- VM configuration file is encrypted with authentication keys.