1.0

Table Of Contents
7
Installation in Guest Operating Systems __________________________ 207
Special Notes for the Iomega Zip Drive __________________________ 208
Using Serial Ports ______________________________________________ 209
Using a Serial Port on the Host Computer ________________________ 209
Using a File on the Host Computer______________________________ 209
Connecting an Application on the Host to a Virtual Machine _________ 210
Connecting Two Virtual Machines ______________________________ 211
Special Configuration Options for Advanced Users _________________ 212
Using USB Devices in a Virtual Machine ____________________________ 214
Notes on USB Support in VMware ACE___________________________ 214
Enabling and Disabling the USB Controller________________________ 214
Connecting USB Devices _____________________________________ 214
Using USB with a Windows Host________________________________ 215
Replacing USB 2.0 Drivers on a Windows 2000 Host_________________ 215
Installing USB Devices as a Non-Administrator _____________________ 216
Who Has Control over a USB Device? ____________________________ 216
Disconnecting USB Devices from a Virtual Machine _________________ 217
Human Interface Devices _____________________________________ 217
Understanding Policies _______________________________________ 219
Taking Advantage of Policies _____________________________________ 220
Encryption and Authentication Policies_____________________________ 222
Encrypting a Virtual Machine’s Files _____________________________ 222
Determining the Authentication Policy __________________________ 222
Expiration Policies _____________________________________________ 224
Copy Protection Policies ________________________________________ 225
VMware ACE Policies ___________________________________________ 226
Troubleshooting Policies______________________________________ 226
VMware ACE Window Policies _________________________________ 227
Easy Printer Setup Policies ____________________________________ 227
User Preferences Policies______________________________________ 228
Administrator Access Policy ___________________________________ 229
Network Quarantine Policies _____________________________________ 230
Selecting the Type of Network Quarantine________________________ 230
Specifying Access to Networks and Machines _____________________ 232
Allowing Access for Printer, DHCP, DNS and ICMP Traffic _____________ 232
Storing Access Lists for Network Quarantine ______________________ 233