Encrypting a virtual machine secures it from unauthorized use. To decrypt a virtual machine, users must enter the correct encryption password.

When you encrypt a virtual machine, Workstation Player prompts you for a password. After the virtual machine is encrypted, you must enter this password to open the virtual machine or to remove encryption from it. Workstation Player displays the encrypted virtual machine with a lock icon until you enter the password to open the virtual machine.

You can choose Remember password to save the password on local password vault which is Windows Credential Manager for Windows and GNOME libsecret library for Linux. Make sure you record the encryption password. Workstation Player does not provide a way to retrieve the passwords if you lose them.

Important: Make sure you record the encryption password and the restrictions password. Workstation Player does not provide a way to retrieve these passwords if you lose them.

Encryption applies to all snapshots in a virtual machine. If you restore a snapshot in an encrypted virtual machine, the virtual machine remains encrypted whether or not it was encrypted when the snapshot was taken. If you change the password for an encrypted virtual machine, the new password applies to any snapshot you restore, regardless of the password in effect when the snapshot was taken.

There are two types of encryptions available. You can choose from the following two types of encryptions:
Fast VM Encryption
Fast encryption refers to the encryption of a minimal set of VM files as follows:
  • Ancillary data files such as snapshot/screenshot/NVRAM files. These are encrypted with the key in the configuration file. List of files encrypted- .nvram, .vmsn, .vmss, .vmem
  • Partially encrypted VM configuration file.
Full VM Encryption
Full encryption refers to encryption of all VM files as follows:
  • Disk file headers. These are encrypted with the key in the configuration file.
  • Disk file data. These are encrypted with the key in the configuration file.
  • Ancillary data files such as the snapshot/screenshot/NVRAM files. These are encrypted with the key in the configuration file.
  • VM configuration file is encrypted with authentication keys.