11.0

Table Of Contents
n The host is exclusively in control of the pairing process and collecting or displaying PIN numbers. The
guest may scan for devices, and initiate a connection with any device. If pairing is required, the
pairing dialog box appears on the host, not in the guest. From the guest's perspective, the device
appears to pair without having needed a PIN.
n Any vendor-specific capabilities on the host's Bluetooth radio are not passed through to the guest. For
example, some radios provide a vendor-specific command to change their BDADDR. These
commands do not appear in the guest. The guest sees a generic VMware-brand radio.
n The virtual Bluetooth controller itself is not part of snapshots. During snapshots, it is disconnected
and reconnected. Any ongoing connections with Bluetooth devices are terminated at the time of a
snapshot.
Procedure
1 Select Window > Virtual Machine Library.
2 Select a virtual machine in the Virtual Machine Library window and click Settings.
3 Under Removable Devices in the Settings window, click USB & Bluetooth.
4 Select the Share Bluetooth devices with the virtual machine check box.
The virtual Bluetooth radio appears in the guest. You might see notifications from the guest OS that
new hardware was detected. No action is required because the driver is automatically installed.
5 Use the guest's Bluetooth interface to search for nearby devices to pair with. Devices appear in the
list as they are detected.
6 Select the device you want to connect with and select to connect to it.
7 Pair the device with the host.
If you have not paired this device with this host before, you are prompted to do so now. The host may
ask you for a PIN, or may display a PIN to be entered on the device.
After the device pairs, the device is now available in the guest.
Configuring a Trusted Platform Module Device
You can add a virtual cryptoprocessor that uses Trusted Platform Module (TPM) technology to an
encrypted virtual machine. Afterward, you can remove the cryptoprocessor from the virtual machine.
TPM technology provides hardware-based, security-related functions. A TPM cryptoprocessor carries out
cryptographic operations. Fusion supports TPM version 2.0.
Create a Virtual Trusted Platform Module Device
For increased security, you can add a virtual cryptoprocessor that is equipped with Trusted Platform
Module (TPM) technology to an encrypted virtual machine.
Prerequisites
n Create a virtual machine with a minimum hardware version of 14 that uses the UEFI firmware type.
Using VMware Fusion
VMware, Inc. 157