6.0

Table Of Contents
4 If the size limit attribute is not present, you must add it.
a Click Add Row.
b In the Name column, type tools.setInfo.sizeLimit.
c In the Value column, type Number of Bytes.
If the size limit attribute exists, modify it to reflect the appropriate limits.
5 Click OK to close the Configuration Parameters dialog box, and click OK again to close the Virtual
Machine Properties dialog box.
Prevent the Guest Operating System Processes from Sending Configuration
Messages to the Host
You can prevent guests from writing any name-value pairs to the configuration file that are sent to the host.
This is appropriate when guest operating systems must be prevented from modifying configuration
settings.
Prerequisites
Power off the virtual machine.
Procedure
1 In the vSphere Client, select the virtual machine in the inventory panel.
2 On the Summary tab, click Edit Settings.
3 Click Options > Advanced > General, and click Configuration Parameters.
4 Click Add Row and type the following values in the Name and Value columns.
n
In the Name column: isolation.tools.setinfo.disable
n
In the Value column: true
5 Click OK to close the Configuration Parameters dialog box, and click OK again to close the Virtual
Machine Properties dialog box.
Prevent a Virtual Machine User or Process from Disconnecting Devices
Users and processes without root or administrator privileges within virtual machines have the capability to
connect or disconnect devices, such as network adaptors and CD-ROM drives, as well as the ability to
modify device settings. To increase virtual machine security, remove these devices. If you do not want to
permanently remove a device, you can prevent a virtual machine user or process from connecting or
disconnecting the device from within the guest operating system.
Prerequisites
Turn off the virtual machine.
Procedure
1 Log in to a vCenter Server system using the vSphere Client and select the virtual machine.
2 On the Summary tab, click Edit Settings.
3 Select Options > Advanced > General and click Configuration Parameters.
Chapter 6 Securing the Management Interface
VMware, Inc. 65