6.0.3

Table Of Contents
Prevent Virtual Disk Shrinking
Nonadministrative users in the guest operating system are able to shrink virtual disks. Shrinking a virtual
disk reclaims the disk's unused space. However, if you shrink a virtual disk repeatedly, the disk can become
unavailable and cause a denial of service. To prevent this, disable the ability to shrink virtual disks.
Prerequisites
n
Turn o the virtual machine.
n
Verify that you have root or administrator privileges on the virtual machine.
Procedure
1 Find the virtual machine in the vSphere Web Client inventory.
a Select a data center, folder, cluster, resource pool, or host.
b Click the Related Objects tab and click Virtual Machines.
2 Right-click the virtual machine and click Edit .
3 Select VM Options.
4 Click Advanced and click Edit .
5 Add or edit the following parameters.
Name Value
isolation.tools.diskWiper.disable
TRUE
isolation.tools.diskShrink.disable
TRUE
6 Click OK.
When you disable this feature, you cannot shrink virtual machine disks when a datastore runs out of space.
Virtual Machine Security Best Practices
Following virtual machine security best practices helps ensure the integrity of your vSphere deployment.
n
General Virtual Machine Protection on page 219
A virtual machine is, in most respects, the equivalent of a physical server. Employ the same security
measures in virtual machines that you do for physical systems.
n
Use Templates to Deploy Virtual Machines on page 219
When you manually install guest operating systems and applications on a virtual machine, you
introduce a risk of misconguration. By using a template to capture a hardened base operating system
image with no applications installed, you can ensure that all virtual machines are created with a
known baseline level of security.
n
Minimize Use of Virtual Machine Console on page 220
The virtual machine console provides the same function for a virtual machine that a monitor on a
physical server provides. Users with access to the virtual machine console have access to virtual
machine power management and removable device connectivity controls, which might allow a
malicious aack on a virtual machine.
vSphere Security
218 VMware, Inc.