6.5.1

Table Of Contents
Storage Policy Best Practices
Do not modify the VM Encryption sample storage policy. Instead, clone the policy and edit the clone.
Note No automated way of returning VM Encryption Policy to its original settings exists.
See the vSphere Storage documentation for details customizing storage policies.
Virtual Machine Encryption Caveats
Review Virtual Machine Encryption caveats to avoid problems later.
To understand which devices and features cannot be used with Virtual Machine Encryption, see Virtual
Machine Encryption Interoperability.
Limitations
Consider the following caveats when you plan your virtual machine encryption strategy.
n
When you clone an encrypted virtual machine or perform a Storage vMotion operation, you can
attempt to change the disk format. Such conversions do not always succeed. For example, if you
clone a virtual machine and attempt to change the disk format from lazy-zeroed thick format to thin
format, the virtual machine disk keeps the lazy-zeroed thick format.
n
You cannot encrypt a virtual machine and its disks by using the Edit Settings menu. You have to
change the storage policy instead. You can perform other encryption tasks such as encrypting an
unencrypted disk of an encrypted virtual machine, by using the Edit Settings menu or changing the
storage policy. See Encrypt an Existing Virtual Machine or Virtual Disk.
n
When you detach a disk from a virtual machine, the storage policy information for the virtual disk is
not retained.
n
If the virtual disk is encrypted, you must explicitly set the storage policy to VM Encryption Policy
or to a storage policy that includes encryption.
n
If the virtual disk is not encrypted, you can change the storage policy when you add the disk to a
virtual machine.
See Virtual Disk Encryption for details.
n
Decrypt core dumps before moving a virtual machine to a different cluster.
The vCenter Server does not store KMS keys but only tracks the key IDs. As a result, vCenter Server
does not store the ESXi host key persistently.
Under certain circumstances, for example, when you move the ESXi host to a different cluster and
reboot the host, vCenter Server assigns a new host key to the host. You cannot decrypt any existing
core dumps with the new host key.
n
OVF Export is not supported for an encrypted virtual machine.
vSphere Security
VMware, Inc. 153