6.5.1

Table Of Contents
Virtual Machine Locked State
If the virtual machine key or one or more of the virtual disk keys are missing, the virtual machine enters a
locked state. In a locked state, you cannot perform virtual machine operations.
n
When you encrypt both a virtual machine and its disks from the vSphere Web Client, the same key is
used for both.
n
When you perform the encryption using the API, you can use different encryption keys for the virtual
machine and for disks. In that case, if you attempt to power on a virtual machine, and one of the disk
keys is missing, the power on operation fails. If you remove the virtual disk, you can power on the
virtual machine.
See Resolve Missing Key Issues for troubleshooting suggestions.
Key Management Server (KMS)
You can add a KMS to a vCenter Server system only once. You cannot add the KMS twice, for example,
in two different KMS cluster instances.
Virtual Machine Encryption Interoperability
vSphere Virtual Machine Encryption has some limitations regarding devices and features that it can
interoperate with in vSphere 6.5.
You cannot perform certain tasks on an encrypted virtual machine.
n
For most virtual machine encryption operations, the virtual machine must be powered off. You can
clone an encrypted virtual machine and you can perform a shallow recrypt while the virtual machine is
powered on.
n
You cannot suspend or resume an encrypted virtual machine.
n
Snapshot operations have some limitations.
n
You cannot select Capture the virtual machine's memory check box when you create a
snapshot of an encrypted virtual machine.
n
You cannot encrypt a virtual machine that has existing snapshots. Consolidate all existing
snapshots before you perform the encryption.
Certain features do not work with vSphere Virtual Machine Encryption.
n
vSphere Fault Tolerance
n
Cloning is supported conditionally.
n
Full clones are supported. The clone inherits the parent encryption state including keys. You can
re-encrypt full clone to use new keys or decrypt the full clone.
Linked clones are supported and clone inherits the parent encryption state including keys. You
cannot decrypt the linked clone or re-encrypt a linked clone with different keys.
n
vSphere ESXi Dump Collector
vSphere Security
VMware, Inc. 154