Any best practices and caveats that apply to the encryption of physical machines apply to virtual machine encryption as well. The virtual machine encryption architecture results in some additional recommendations. As you are planning your virtual machine encryption strategy, consider interoperability limitations.

Note:

For information about vSphere Trust Authority interoperability, see vSphere Trust Authority Best Practices, Caveats, and Interoperability.