6.7

Table Of Contents
2 Select an object in the inventory that is a valid parent object of a virtual machine, for example, an
ESXi host or a cluster.
3 Create the virtual machine.
n
vSphere Client: Right-click the object and select New Virtual Machine.
n
vSphere Web Client: Right-click the object, select New Virtual Machine > New Virtual Machine.
4 Follow the prompts to create an encrypted virtual machine.
Option Action
Select a creation type Create a new virtual machine.
Select a name and folder Specify a unique name and target location for the virtual machine.
Select a compute resource Specify an object for which you have privileges to create encrypted virtual
machines. See Prerequisites and Required Privileges for Encryption Tasks.
Select storage vSphere Client: Select the Encrypt this virtual machine check box. Virtual
machine storage policies are filtered to those that include encryption. Select a VM
storage policy (the bundled sample is VM Encryption Policy), and select a
compatible datastore.
vSphere Web Client: Select a VM storage policy with encryption (the bundled
sample is VM Encryption Policy). Select a compatible datastore.
Select compatibility Select the compatibility. You can migrate an encrypted virtual machine only to
hosts with compatibility ESXi 6.5 and later.
Select a guest OS Select a guest OS that you plan to install on the virtual machine later.
Customize hardware Customize the hardware, for example, by changing disk size or CPU.
vSphere Client: (Optional) Select the VM Options tab, and open Encryption.
Choose which disks to exclude from encryption. When you deselect a disk, only
the VM Home and any other selected disks are encrypted.
Any New Hard disk that you add is encrypted. You can change the storage policy
for individual hard disks later.
Ready to complete Review the information and click Finish.
Clone an Encrypted Virtual Machine
When you clone an encrypted virtual machine, the clone is encrypted with the same keys. To change
keys for the clone, power off the VM and perform a recrypt of the clone using the API. See vSphere Web
Services SDK Programming Guide.
Prerequisites
n
Establish a trusted connection with the KMS and select a default KMS.
n
Create an encryption storage policy, or use the bundled sample, VM Encryption Policy.
n
Required privileges:
n
Cryptographic operations.Clone
n
If the host encryption mode is not Enabled, you also must have Cryptographic
operations.Register host privileges.
vSphere Security
VMware, Inc. 165