6.7

Table Of Contents
Procedure
1 Connect to vCenter Server by using either the vSphere Client (HTML5-based client) or the
vSphere Web Client.
2 Select an object in the inventory that is a valid parent object of a virtual machine, for example, an
ESXi host or a cluster.
3 To create a clone of an encrypted machine, right-click the virtual machine, and follow the prompts.
Option Action
Select a name and folder Specify a name and target location for the clone.
Select a compute resource Specify an object for which you have privileges to create encrypted virtual
machines. See Prerequisites and Required Privileges for Encryption Tasks.
Select storage Make a selection in the Select virtual disk format menu and select a datastore.
You cannot change the storage policy as part of the clone operation.
Select clone options Select clone options, as discussed in the vSphere Virtual Machine Administration
documentation.
Ready to complete Review the information and click Finish.
4 (Optional) Change the keys for the cloned virtual machine.
By default, the cloned virtual machine is created with the same keys as its parent. Best practice is to
change the cloned virtual machine's keys to ensure that multiple virtual machines do not have the
same keys.
a Power off the VM.
b Perform a recrypt of the clone using the API. See vSphere Web Services SDK Programming
Guide.
To use a different DEK and KEK, perform a deep recrypt of the cloned virtual machine. To use a
different KEK, perform a shallow recrypt of the cloned virtual machine. You can perform a shallow
recrypt operation while the VM is powered on, unless the VM has snapshots present.
Encrypt an Existing Virtual Machine or Virtual Disk
You can encrypt an existing virtual machine or virtual disk by changing its storage policy. You can encrypt
virtual disks only for encrypted virtual machines.
This task describes how to encrypt an existing virtual machine or virtual disk using either the
vSphere Client (HTML5-based client) or the vSphere Web Client.
Prerequisites
n
Establish a trusted connection with the KMS and select a default KMS.
n
Create an encryption storage policy, or use the bundled sample, VM Encryption Policy.
n
Ensure that the virtual machine is powered off.
vSphere Security
VMware, Inc. 166