1.0

Table Of Contents
CHAPTER 1 Introduction and System Requirements
11
specific images for PCs. Ensure compliance with IT policies while maintaining end user
freedom.
Key Features of VMware ACE
Manageability
Design once, deploy anywhere. Create standardized hardware-independent PC
environments and deploy them to any PC throughout the extended enterprise.
Virtual Rights Management interface. Control VMware ACE lifecycle, security
settings, network settings, system configuration and user interface capabilities.
Security
Rules-based network access. Identify and quarantine unauthorized or out-of-
date VMware ACE environments. Enable access to the network once the VMware
ACE environment complies with IT policies.
Tamper-resistant computing environment. Protect the entire VMware ACE
environment, including data and system configuration, with seamless
encryption.
Copy protected computing environment. Prevent end users from copying
enterprise information.
Usability
Customizable interface. Customize the behavior and look and feel for end users.
Flexible computing environment. End users can revert to a previous state within
seconds and can work online or when disconnected from the enterprise
network.
The VMware ACE Software
As an administrator, you install VMware ACE Manager and use it to create virtual
machines and package them for distribution to your end users. It allows you to set
policies to ensure that your end users have a computing environment that meets your
organizations security requirements.
VMware ACE Manager creates packages that include VMware ACE, the application
your end users use to run the virtual machine. VMware ACE is simple to use and
automatically runs the virtual machine you have configured.