Vsphere Virtual Machine Administration

Total Page:16

File Type:pdf, Size:1020Kb

Vsphere Virtual Machine Administration vSphere Virtual Machine Administration 02 APR 2020 VMware vSphere 7.0 VMware ESXi 7.0 vCenter Server 7.0 vSphere Virtual Machine Administration You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ VMware, Inc. 3401 Hillview Ave. Palo Alto, CA 94304 www.vmware.com © Copyright 2009-2020 VMware, Inc. All rights reserved. Copyright and trademark information. VMware, Inc. 2 Contents About vSphere Virtual Machine Administration 10 1 Updated Information 11 2 Introduction to VMware vSphere Virtual Machines 12 Virtual Machine Files 12 Virtual Machines and the Virtual Infrastructure 13 Virtual Machine Lifecycle 14 Virtual Machine Components 14 Virtual Machine Hardware Available to vSphere Virtual Machines 16 Virtual Machine Options 18 The vSphere Client 19 Where to Go From Here 20 3 Deploying Virtual Machines 21 Create a Virtual Machine with the New Virtual Machine Wizard 22 Clone a Virtual Machine to a Template 25 Deploy a Virtual Machine from a Template 28 Clone an Existing Virtual Machine 32 Cloning a Virtual Machine with Instant Clone 37 Clone a Template to a Template 37 Convert a Template to a Virtual Machine 40 4 Deploying OVF and OVA Templates 42 OVF and OVA File Formats and Templates 42 Deploy an OVF or OVA Template 43 Export an OVF Template 45 Browse VMware Virtual Appliance Marketplace 46 5 Using Content Libraries 47 Hierarchical Inheritance of Permissions for Content Libraries 48 Content Library Administrator Role 50 Create a Library 50 Edit a Content Library 52 Configure Advanced Content Library Settings 54 Managing a Publisher Local Library 55 Create a Subscription for a Local Library 57 Publish the Contents of a Library to a Subscriber 58 VMware, Inc. 3 vSphere Virtual Machine Administration Publish a Single Template to a Subscription 59 Delete a Subscription 60 Managing a Subscribed Library 60 Synchronize a Subscribed Content Library 62 Synchronize a Library Item in a Subscribed Library 63 Populating Libraries with Content 64 Import Items to a Content Library 64 Clone a vApp to a Template in a Content Library 65 Clone a Virtual Machine or a Virtual Machine Template to a Template in a Content Library 66 Clone Library Items from One Library to Another Library 67 Working with Items in a Library 68 Update a Content Library Item 68 Export an Item from a Content Library to Your Local Computer 69 Clone Library Items from One Library to Another Library 70 Edit a Content Library Item 70 Delete a Content Library Item 71 Creating Virtual Machines and vApps from Templates in a Content Library 72 Deploy a Virtual Machine from an OVF Template in a Content Library 72 Deploy a Virtual Machine from a VM Template in a Content Library 75 Create New vApp From a Template in a Content Library 79 Managing VM Templates 79 Templates in Content Libraries 80 Check Out a Virtual Machine from a Template 82 Check In a Virtual Machine to a Template 83 Discard a Checked Out Virtual Machine 84 Revert to a Previous Version of a Template 85 Delete a Previous Version of a VM Template 86 6 Configuring Virtual Machine Hardware 87 Virtual Machine Compatibility 87 Set the Default Compatibility for Virtual Machine Creation 89 Schedule a Compatibility Upgrade for a Single Virtual Machine 90 Change the Default Virtual Machine Compatibility Setting 91 Hardware Features Available with Virtual Machine Compatibility Settings 92 Virtual CPU Configuration 97 Virtual CPU Limitations 98 Configuring Multicore Virtual CPUs 98 Enable CPU Hot Add 99 Change the Number of Virtual CPUs 100 Allocate CPU Resources in the VMware Host Client 101 Change CPU Identification Mask Settings 102 VMware, Inc. 4 vSphere Virtual Machine Administration Expose VMware Hardware Assisted Virtualization 103 Enable Virtual CPU Performance Counters 103 Configure Processor Scheduling Affinity 104 Change CPU/MMU Virtualization Settings 105 Virtual Memory Configuration 106 Change the Memory Configuration 106 Allocate Memory Resources 107 Change Memory Hot Add Settings 108 Managing Persistent Memory 109 Virtual Disk Configuration 112 About Virtual Disk Provisioning Policies 112 Large Capacity Virtual Disk Conditions and Limitations 113 Change the Virtual Disk Configuration 114 Use Disk Shares to Prioritize Virtual Machines 115 Determine the Virtual Disk Format and Convert a Virtual Disk from the Thin Provision Format to a Thick Provision Format 116 Add a Hard Disk to a Virtual Machine 116 SCSI, SATA, and NVMe Storage Controller Conditions, Limitations, and Compatibility 122 Add a SATA Controller 125 Add a SCSI Controller to a Virtual Machine 126 Add a Paravirtualized SCSI Adapter 127 Add an NVMe Controller 127 Change the SCSI Controller Configuration 128 Virtual Machine Network Configuration 129 Network Adapter Basics 129 Network Adapters and Legacy Virtual Machines 131 Change the Virtual Machine Network Adapter Configuration 132 Add a Network Adapter to a Virtual Machine 133 Parallel and Serial Port Configuration 134 Other Virtual Machine Device Configuration 142 Change the CD/DVD Drive Configuration 142 Add or Modify a Virtual Machine CD or DVD Drive 146 Add a PCI Device to a Virtual Machine 147 Configuring 3D Graphics 150 Using a Virtual Watchdog Timer 154 Add a Precision Clock Device to a Virtual Machine 155 Securing Virtual Machines with Intel Software Guard Extensions 156 Enable vSGX on a Virtual Machine 156 Remove vSGX from a Virtual Machine 158 USB Configuration from an ESXi Host to a Virtual Machine 158 USB Autoconnect Feature 160 vSphere Features Available with USB Passthrough 161 VMware, Inc. 5 vSphere Virtual Machine Administration Configuring USB Devices for vMotion 161 Avoiding Data Loss with USB Devices 162 Connecting USB Devices to an ESXi Host 162 Add USB Devices to an ESXi Host 163 Add a USB Controller to a Virtual Machine 164 Add USB Devices from an ESXi Host to a Virtual Machine 166 Remove USB Devices That Are Connected Through an ESXi Host 167 Remove USB Devices from an ESXi Host 167 USB Configuration from a Client Computer to a Virtual Machine 168 Connecting USB Devices to a Client Computer 169 Connect a USB Device to a Client Computer 170 Add a USB Controller to a Virtual Machine 171 Add USB Devices from a Client Computer to a Virtual Machine 172 Remove USB Devices That Are Connected Through a Client Computer 173 Remove a USB Controller from a Virtual Machine 174 Add a Shared Smart Card Reader to Virtual Machines 175 Securing Virtual Machines with Virtual Trusted Platform Module 176 Enable Virtual Trusted Platform Module for an Existing Virtual Machine 177 Remove Virtual Trusted Platform Module from a Virtual Machine 178 7 Configuring Virtual Machine Options 179 Virtual Machine Options Overview 179 General Virtual Machine Options 180 Change the Virtual Machine Name 180 View the Virtual Machine Configuration and Working File Location 181 Change the Configured Guest Operating System 181 Configuring User Mappings on Guest Operating Systems 182 View Existing SSO User Mappings 182 Add SSO users to Guest Operating Systems 183 Remove SSO Users from Guest Operating Systems 183 VMware Remote Console Options 183 Change the Virtual Machine Console Options for Remote Users 184 Configure Virtual Machine Encryption Options 184 Encrypt an Existing Virtual Machine or Virtual Disk 184 Decrypt an Encrypted Virtual Machine or Virtual Disk 185 Clone an Encrypted Virtual Machine 186 Virtual Machine Power Management Options 188 Manage Power Management Settings for a Virtual Machine 188 Configuring VMware Tools Options 189 Configure the Virtual Machine Power States 189 Virtualization Based Security 190 VMware, Inc. 6 vSphere Virtual Machine Administration Enable Virtualization-based Security on an Existing Virtual Machine 191 Enable Virtualization-based Security on the Guest Operating System 191 Disable Virtualization-based Security 192 Identify VBS-Enabled Virtual Machines 193 Configuring Virtual Machine Boot Options 193 Enable or Disable UEFI Secure Boot for a Virtual Machine 193 Delay the Boot Sequence 195 Configuring Virtual Machine Advanced Options 195 Disable Virtual Machine Acceleration 195 Enable Virtual Machine Logging 196 Configure Virtual Machine Debugging and Statistics 196 Change the Swap File Location 197 Edit Configuration File Parameters 197 Configure Fibre Channel NPIV Settings 198 8 Managing Multi-Tiered Applications with vSphere vApp 200 Create a vApp 201 Perform vApp Power Operations 202 Create or Add an Object to a vApp 203 Clone a vApp 204 Edit vApp Notes 204 Configure vApp Properties 205 Edit vApp Settings 206 Configure vApp CPU and Memory Resources 206 Configure vApp IP Allocation Policy 207 Configure vApp Startup and Shutdown Options 209 Configure vApp Product Properties 209 View vApp License Agreements 210 Add a Network Protocol Profile 210 Assign a Port Group or Network to a Network Protocol Profile 213 Use a Network Protocol Profile to Allocate IP Addresses to a Virtual Machine or vApp 214 Virtual Machine vApp Options 215 Enable vApp Options for a Virtual Machine 215 Edit Application Properties and OVF Deployment Options for a Virtual Machine 216 OVF Authoring Options for a Virtual Machine 216 9 Monitoring Solutions with the vCenter Solutions Manager 221 View Solutions 221 vSphere ESX Agent Manager 222 Monitoring Agent Health Status 222 Resolve Agency Issues 223 VMware, Inc. 7 vSphere Virtual Machine Administration 10 Managing Virtual Machines 225 Installing a Guest Operating System 225 Using PXE with Virtual Machines 226 Install a Guest Operating System from Media 226 Upload ISO Image Installation Media for a Guest
Recommended publications
  • Interrupts and Exceptions CPU Modes and Address Spaces Dual-Mode Of
    CPU Modes and Address Spaces There are two processor (CPU) modes of operation: • Kernel (Supervisor) Mode and • User Mode The processor is in Kernel Mode when CPU mode bit in Status Interrupts and Exceptions register is set to zero. The processor enters Kernel Mode at power-up, or as result of an interrupt, exception, or error. The processor leaves Kernel Mode and enters User Mode when the CPU mode bit is set to one (by some instruction). Memory address space is divided in two ranges (simplified): • User address space – addresses in the range [0 – 7FFFFFFF16] Studying Assignment: A.7 • Kernel address space Reading Assignment: 3.1-3.2, A.10 – addresses in the range [8000000016 – FFFFFFFF16] g. babic Presentation B 28 g. babic 29 Dual-Mode of CPU Operation MIPS Privilege Instructions • CPU mode bit indicates the current CPU mode: 0 (=kernel) With CPU in User Mode, the program in execution has access or 1 (=user). only to the CPU and FPU registers, while when CPU operates • When an interrupt occurs, CPU hardware switches to the in Kernel Mode, the program has access to the full capabilities kernel mode. of processor including CP0 registers. • Switching to user mode (from kernel mode) done by setting CPU mode bit (by an instruction). Privileged instructions can not be executed when the Exception/Interrupt processor is in User mode, they can be executed only when the processor is in Kernel mode. kernel user Examples of MIPS privileged instructions: Set user mode • any instruction that accesses Kernel address space • all instructions that access any of CP0 registers, e.g.
    [Show full text]
  • Vmware Vsphere the Leader in Virtualized Infrastructure and Your First Step to Application Modernization
    DATASHEET VMware vSphere The leader in virtualized infrastructure and your first step to application modernization AT A GLANCE Why VMware vSphere®? VMware vSphere® is the industry vSphere 7 is the biggest release of vSphere in over a decade. With the latest release, VMware W leading compute virtualization platform. E ® vSphereN vSp withher eVMware 7 wit hTanzu Tan™z enablesu millions of IT administrators across the globe to get started with Kubernetes workloads within an hour1. vSphere 7 has been rearchitected with Modernize the 70 million+ workloads running on vSphere native Kubernetes for application modernization. Developers can’t afford infrastructure that slows them down – I P A businesses rely on developers to rapidly s e Run tim e S e rvice s Infra stru cture S e rvice s t develop and deploy applications to e n Developer r Tanzu Kubernetes Grid Network Storage accelerate digital transformation. On the e vCenter b Service Service Service Server u other hand, IT teams are challenged to K deliver modern infrastructure that Intrinsic Security & Lifecycle Management supports modern container-based application development, including the IT Admin Compute Networking Storage services and tools to build new applications. Deliver Developer- Align Dev Ops and Simplify cloud FIGURE 1: VMware revSpheready infra withstru cTanzuture 2 IT Teams operations Using vSphere 7, customers and ® partners can now deliver a developer- vSphere 7 has beenConfid erearchitectedntial │ ©2020 VMware, Inc. with native Kubernetes to enable IT Admins to use vCenter Server11 ready infrastructure, scale without to operate Kubernetes clusters through namespaces. VMware vSphere with Tanzu allows IT Admins to operate with their existing skillset and deliver a self-service access to infrastructure for the Dev compromise and simplify operations.
    [Show full text]
  • Survey on Virtualization with Xen Hypervisor
    International Journal of Engineering Research & Technology (IJERT) ISSN: 2278-0181 Vol. 1 Issue 8, October - 2012 Survey On Virtualization With Xen Hypervisor Mr.Tejas P.Bhatt*1, Asst.Prof.Pinal.J.Patel#2 * C.S.E. Department, Government College of Engineering, Gandhinagar Gujarat Technology University, Gujarat, India. # C.S.E. Department, Government College of Engineering, Gandhinagar Gujarat Technology University, Gujarat, India Abstract In the cloud computing, there is one virtual machine that need them. For this reason, cloud computing has also can created and put it out on the physical machine with been described as "on-demand computing." The Internet providing the ideas using the hypervisors. So the is utilized as a vehicle but it is not the cloud. Google, Amazon, eBay, etc utilize cloud technologies to provide virtualization technology has limit security capabilities in services via the Internet. The cloud technologies are an order to secure wide area environment such as the cloud. operating technology built on a vast number of computers While consolidating physical to virtual machines using that provide a service [1]. Google as a best example of Xen hypervisor, we want to be able to deploy and manage cloud computing. What happens when you type and virtual machines in the same way we manage and deploy search something on Google? Have you ever thought physical machines. For operators and support people about this? Does your PC go through all that information, there should be no difference between virtual and sorts it out for you and display all the relevant results? IJERTNo, it doesn’t. Otherwise, you would wait much longer physical installations Therefore, the development of a for a simple results page to display.
    [Show full text]
  • Vcenter Server and Host Management
    vCenter Server and Host Management 02 APR 2020 Modified on 13 AUG 2020 VMware vSphere 7.0 VMware ESXi 7.0 vCenter Server 7.0 vCenter Server and Host Management You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ VMware, Inc. 3401 Hillview Ave. Palo Alto, CA 94304 www.vmware.com © Copyright 2009-2020 VMware, Inc. All rights reserved. Copyright and trademark information. VMware, Inc. 2 Contents About VMware vCenter Server and Host Management 9 Updated Information 10 1 vSphere Concepts and Features 11 Virtualization Basics 11 Physical Topology of vSphere Data Center 12 vSphere Software Components 13 Client Interfaces for vSphere 16 vSphere Managed Inventory Objects 16 Optional vCenter Server Components 18 vCenter Server Plug-Ins 19 2 Using the vSphere Client 21 Log In to vCenter Server by Using the vSphere Client 22 Use the vSphere Client Navigator 23 Manage Client Plug-Ins 23 Monitor Client Plugins 24 Install the VMware Enhanced Authentication Plug-in 24 Refresh Data 25 Searching the Inventory 25 Perform a Quick Search 26 Save, Run, Rename, and Delete a Search 26 Sort the vSphere Client Inventory 27 Drag Objects 28 Export Lists 28 Attach File to Service Request 29 Keyboard Shortcuts 29 Inventory Keyboard Shortcuts 29 Provide Feedback with the vSphere Client 30 Start, Stop, and Restart Services 30 3 Using Enhanced Linked Mode 32 4 Configuring Hosts in vCenter Server 33 Host Configuration 33 Configure the Boot Device on an ESXi Host 33 Configure Agent VM Settings 34 VMware, Inc. 3 vCenter
    [Show full text]
  • RTA-OSEK Binding Manual: TMS470/TI
    RTA-OSEK Binding Manual: TMS470/TI Contact Details ETAS Group www.etasgroup.com Germany USA ETAS GmbH ETAS Inc. Borsigstraße 14 3021 Miller Road 70469 Stuttgart Ann Arbor, MI 48103 Tel.:+49 (711) 8 96 61-102 Tel.: +1 (888) ETAS INC Fax:+49 (711) 8 96 61-106 Fax: +1 (734) 997-94 49 www.etas.de www.etasinc.com Japan France ETAS K.K. ETAS S.A.S. Queen's Tower C-17F, 1, place des États-Unis 2-3-5, Minatomirai, Nishi-ku, SILIC 307 Yokohama, Kanagawa 94588 Rungis Cedex 220-6217 Japan Tel.: +33 (1) 56 70 00 50 Tel.: +81 (45) 222-0900 Fax: +33 (1) 56 70 00 51 Fax: +81 (45) 222-0956 www.etas.fr www.etas.co.jp Korea Great Britain ETAS Korea Co. Ltd. ETAS UK Ltd. 4F, 705 Bldg. 70-5 Studio 3, Waterside Court Yangjae-dong, Seocho-gu Third Avenue, Centrum 100 Seoul 137-889, Korea Burton-upon-Trent Tel.: +82 (2) 57 47-016 Staffordshire DE14 2WQ Fax: +82 (2) 57 47-120 Tel.: +44 (0) 1283 - 54 65 12 www.etas.co.kr Fax: +44 (0) 1283 - 54 87 67 www.etas-uk.net Copyright Notice © 2001 - 2007 LiveDevices Ltd. All rights reserved. Version: M00088-001 No part of this document may be reproduced without the prior written consent of LiveDevices Ltd. The software described in this document is furnished under a license and may only be used or copied in accordance with the terms of such a license. Disclaimer The information in this document is subject to change without notice and does not represent a commitment on any part of LiveDevices.
    [Show full text]
  • Bringing Virtualization to the X86 Architecture with the Original Vmware Workstation
    12 Bringing Virtualization to the x86 Architecture with the Original VMware Workstation EDOUARD BUGNION, Stanford University SCOTT DEVINE, VMware Inc. MENDEL ROSENBLUM, Stanford University JEREMY SUGERMAN, Talaria Technologies, Inc. EDWARD Y. WANG, Cumulus Networks, Inc. This article describes the historical context, technical challenges, and main implementation techniques used by VMware Workstation to bring virtualization to the x86 architecture in 1999. Although virtual machine monitors (VMMs) had been around for decades, they were traditionally designed as part of monolithic, single-vendor architectures with explicit support for virtualization. In contrast, the x86 architecture lacked virtualization support, and the industry around it had disaggregated into an ecosystem, with different ven- dors controlling the computers, CPUs, peripherals, operating systems, and applications, none of them asking for virtualization. We chose to build our solution independently of these vendors. As a result, VMware Workstation had to deal with new challenges associated with (i) the lack of virtual- ization support in the x86 architecture, (ii) the daunting complexity of the architecture itself, (iii) the need to support a broad combination of peripherals, and (iv) the need to offer a simple user experience within existing environments. These new challenges led us to a novel combination of well-known virtualization techniques, techniques from other domains, and new techniques. VMware Workstation combined a hosted architecture with a VMM. The hosted architecture enabled a simple user experience and offered broad hardware compatibility. Rather than exposing I/O diversity to the virtual machines, VMware Workstation also relied on software emulation of I/O devices. The VMM combined a trap-and-emulate direct execution engine with a system-level dynamic binary translator to ef- ficiently virtualize the x86 architecture and support most commodity operating systems.
    [Show full text]
  • Draft NISTIR 8221
    Withdrawn Draft Warning Notice The attached draft document has been withdrawn, and is provided solely for historical purposes. It has been superseded by the document identified below. Withdrawal Date June 5, 2019 Original Release Date September 21, 2018 Superseding Document Status Final Series/Number NISTIR 8221 Title A Methodology for Enabling Forensic Analysis Using Hypervisor Vulnerabilities Data Publication Date June 2019 DOI https://doi.org/10.6028/NIST.IR.8221 CSRC URL https://csrc.nist.gov/publications/detail/nistir/8221/final Additional Information 1 Draft NISTIR 8221 2 3 A Methodology for Determining 4 Forensic Data Requirements for 5 Detecting Hypervisor Attacks 6 7 8 Ramaswamy Chandramouli 9 Anoop Singhal 10 Duminda Wijesekera 11 Changwei Liu 12 13 14 Draft NISTIR 8221 15 16 A Methodology for Determining 17 Forensic Data Requirements for 18 Detecting Hypervisor Attacks 19 20 Ramaswamy Chandramouli 21 Anoop Singhal 22 Duminda Wijesekera 23 Changwei Liu 24 Computer Security Division 25 Information Technology Laboratory 26 27 28 29 30 31 32 33 34 35 36 September 2018 37 38 39 40 41 U.S. Department of Commerce 42 Wilbur L. Ross, Jr., Secretary 43 44 National Institute of Standards and Technology 45 Walter Copan, NIST Director and Under Secretary of Commerce for Standards and Technology 46 47 National Institute of Standards and Technology Internal Report 8221 48 27 pages (September 2018) 49 50 51 Certain commercial entities, equipment, or materials may be identified in this document in order to describe an 52 experimental procedure or concept adequately. Such identification is not intended to imply recommendation or 53 endorsement by NIST, nor is it intended to imply that the entities, materials, or equipment are necessarily the best 54 available for the purpose.
    [Show full text]
  • Architecting a Vmware Vsphere Compute Platform for Vmware Cloud Providers
    VMware vCloud® Architecture Toolkit™ for Service Providers Architecting a VMware vSphere® Compute Platform for VMware Cloud Providers™ Version 2.9 January 2018 Martin Hosken Architecting a VMware vSphere Compute Platform for VMware Cloud Providers © 2018 VMware, Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws. This product is covered by one or more patents listed at http://www.vmware.com/download/patents.html. VMware is a registered trademark or trademark of VMware, Inc. in the United States and/or other jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies. VMware, Inc. 3401 Hillview Ave Palo Alto, CA 94304 www.vmware.com 2 | VMware vCloud® Architecture Toolkit™ for Service Providers Architecting a VMware vSphere Compute Platform for VMware Cloud Providers Contents Overview ................................................................................................. 9 Scope ...................................................................................................... 9 Use Case Scenario ............................................................................... 10 3.1 Service Definition – Virtual Data Center Service .............................................................. 10 3.2 Service Definition – Hosted Private Cloud Service ........................................................... 12 3.3 Integrated Service Overview – Conceptual Design .........................................................
    [Show full text]
  • Deploying Avaya IP Office Servers As Virtual Machines
    IP Office™ Platform 11.0 Deploying Avaya IP Office Servers as Virtual Machines 15-601011 Issue 06j - (Monday, October 12, 2020) 5.3 Adding a Certific..a...t.e.. .t.o.. .t.h...e.. .B...r.o..w...s...e..r................................... 67 Contents 5.3.1 Addin.g.. .a... .C...e..r.t.i.f.i.c..a...t.e.. .t.o.. .F...i.r.e..f.o...x.................................. 67 5.3.2 Addin.g.. .a... .C...e..r.t.i.f.i.c..a...t.e.. .t.o.. .E...x..p..l.o..r..e..r............................... 67 1. IP Office Linux Server Virtualization 5.3.3 Addin.g.. .a... .C...e..r.t.i.f.i.c..a...t.e.. .t.o.. .C...h...r.o..m....e................................ 67 1.1 Profiling ..................................................................... 5 5.3.4 Addin.g.. .a... .C...e..r.t.i.f.i.c..a...t.e.. .t.o.. .E...d..g...e..................................... 68 1.1.1 Primar.y. .S...e..r..v.e...r./.S...e..c..o..n...d..a..r..y. .S...e..r..v.e...r............................. 6 5.3.5 Addin.g.. .a... .C...e..r.t.i.f.i.c..a...t.e.. .t.o.. .S...a..f.a...r.i................................... 68 1.1.2 Expans..i.o..n... .S..y..s..t.e...m... .(..L..)................................................. 6 5.4 IP Office Initial C..o...n..f.i.g..u...r.a..t.i.o...n............................................... 69 1.1.3 one-X P...o..r.t.a...l. .S..e...r.v..e..r.....................................................
    [Show full text]
  • Vmware Workstation Pro 16.0 Using Vmware Workstation Pro
    Using VMware Workstation Pro VMware Workstation Pro 16.0 Using VMware Workstation Pro You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ VMware, Inc. 3401 Hillview Ave. Palo Alto, CA 94304 www.vmware.com © Copyright 2020 VMware, Inc. All rights reserved. Copyright and trademark information. VMware, Inc. 2 Contents Using VMware Workstation Pro 14 1 Introduction and System Requirements 15 Host System Requirements for Workstation Pro 15 Processor Requirements for Host Systems 15 Supported Host Operating Systems 16 Memory Requirements for Host Systems 16 Display Requirements for Host Systems 16 Disk Drive Requirements for Host Systems 17 Local Area Networking Requirements for Host Systems 18 ALSA Requirements 18 Virtual Machine Features and Specifications 18 Supported Guest Operating Systems 18 Virtual Machine Processor Support 18 Virtual Machine Chipset and BIOS Support 19 Virtual Machine Memory Allocation 19 Virtual Machine Graphics and Keyboard Support 19 Virtual Machine IDE Drive Support 19 Virtual Machine SCSI Device Support 20 Virtual Machine Floppy Drive Support 20 Virtual Machine Serial and Parallel Port Support 20 Virtual Machine USB Port Support 20 Virtual Machine Mouse and Drawing Tablet Support 21 Virtual Machine Ethernet Card Support 21 Virtual Machine Networking Support 21 Virtual Machine Sound Support 21 2 Installing and Using Workstation Pro 23 Obtaining the Workstation Pro Software and License Key 23 Trial Version Expiration Date Warnings 24 Installing Workstation Pro with Other VMware Products 24 Reinstalling Workstation Pro When Upgrading a Windows Host Operating System 24 Installing the Integrated Virtual Debuggers for Eclipse 25 Installing Workstation Pro 25 Install Workstation Pro on a Windows Host 26 Run an Unattended Workstation Pro Installation on a Windows Host 26 Install Workstation Pro on a Linux Host 28 Upgrading Workstation Pro 31 VMware, Inc.
    [Show full text]
  • IBM Z/VM – Frequently Asked Questions
    IBM Z August 2020 IBM z/VM Frequently Asked Questions for z/VM 7.2, z/VM 7.1 and z/VM 6.4 Worldwide LUQ12358-USEN-14 1 Table of Contents _Toc45360441 General Questions ........................................................................................................................................... 3 IBM z/VM Support for IBM z15 and IBM LinuxONE III ................................................................................ 10 Technical Questions - IBM z/VM 7.2, z/VM 7.1, and z/VM 6.4 .................................................................... 11 Efficiency and Scalability ............................................................................................................................... 21 System Ease of Use ....................................................................................................................................... 23 Hardware Currency ........................................................................................................................................ 25 Installation, Migration, and Serviceability .................................................................................................... 27 Statements of Direction from Announcements ............................................................................................ 28 Resources ...................................................................................................................................................... 31 2 General Questions What is IBM Z® and IBM® LinuxONE virtualization
    [Show full text]
  • Efficiently Protecting Virtualized Desktop Infrastructures Against
    Efficiently Protecting Virtualized Desktop Infrastructures Against Malware Performance Comparison between Traditional- and Centralized Antivirus Arris Huijgen University of Twente Graduation Committee University of Twente Dr. Pascal van Eck Radboud University Nijmegen Dr.ir. Erik Poll Deloitte Coen Steenbeek, MSc Henri Hambartsumyan, MSc June 18, 2013 Executive Summary The cloud is getting increasingly popular and also desktops are migrated to the cloud which are called Hosted Virtual Desktops (HVDs). Because virtualization makes hard- ware resources very flexible, it is often used to build a cloud platform. These desktops also need to be protected against malware. Virtualization software provider VMware added capabilities to its corporate product to provide antivirus protection from outside the Virtual Machine (VM) using its vShield module. Several antivirus vendors including Trend Micro developed antivirus software making use of this module. Because no comparisons have been done yet between traditional antivirus and antivirus software making making use of virtualization, research has been conducted compar- ing Trend Micro's traditional antivirus software Worry-Free Business Security (WFBS) with its vShield-compatible antivirus software called Deep Security (DS). This research showed that despite self-protection measures it is relatively easy to disable or remove the DS antivirus software inside the HVD without being detected. Moreover, it turned out that in this small environment simulating 10 HVDs, the performance of WFBS is much better compared to DS while DS also used much more resources. This is a remark- able result as DS is specifically aimed for virtualized environments and can therefore be expected to perform better than the traditional WFBS antivirus software.
    [Show full text]