<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: TPM without encrypting VDKs in VMware Workstation Pro Discussions</title>
    <link>https://communities.vmware.com/t5/VMware-Workstation-Pro/TPM-without-encrypting-VDKs/m-p/2870617#M171518</link>
    <description>&lt;P&gt;Yes, break the link between access control encryption and TPM.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Having this requirement is REALLY BAD.&amp;nbsp;&amp;nbsp;&amp;nbsp; 1st in order to remove disks you need to DECRYPT.&amp;nbsp;&amp;nbsp;&amp;nbsp; 2nd VMDK encrypted files DO NOT COMPRESS.&amp;nbsp;&amp;nbsp;&amp;nbsp; If you saved space before by archiving a VMDK with compression it is pointless.&amp;nbsp;&amp;nbsp;&amp;nbsp; It will use roughly the same amount of space.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The TPM / Access Control encryption may be a show stopper.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 07 Oct 2021 00:27:06 GMT</pubDate>
    <dc:creator>kasper</dc:creator>
    <dc:date>2021-10-07T00:27:06Z</dc:date>
    <item>
      <title>TPM without encrypting VDKs</title>
      <link>https://communities.vmware.com/t5/VMware-Workstation-Pro/TPM-without-encrypting-VDKs/m-p/2869730#M171452</link>
      <description>&lt;P&gt;How can I create a VM with a TPM but without encrypting the virtual disk files?&lt;/P&gt;</description>
      <pubDate>Fri, 01 Oct 2021 10:40:06 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/VMware-Workstation-Pro/TPM-without-encrypting-VDKs/m-p/2869730#M171452</guid>
      <dc:creator>OwenBurnett</dc:creator>
      <dc:date>2021-10-01T10:40:06Z</dc:date>
    </item>
    <item>
      <title>Re: TPM without encrypting VDKs</title>
      <link>https://communities.vmware.com/t5/VMware-Workstation-Pro/TPM-without-encrypting-VDKs/m-p/2869744#M171456</link>
      <description>&lt;P&gt;Searching this forum, according to the product manager, at this moment you cannot.&amp;nbsp; But they are working on it.&lt;/P&gt;</description>
      <pubDate>Fri, 01 Oct 2021 11:57:40 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/VMware-Workstation-Pro/TPM-without-encrypting-VDKs/m-p/2869744#M171456</guid>
      <dc:creator>RDPetruska</dc:creator>
      <dc:date>2021-10-01T11:57:40Z</dc:date>
    </item>
    <item>
      <title>Re: TPM without encrypting VDKs</title>
      <link>https://communities.vmware.com/t5/VMware-Workstation-Pro/TPM-without-encrypting-VDKs/m-p/2869792#M171466</link>
      <description>&lt;P&gt;Thanks, I don't see what there is to work on, its just a line or two or lock out code to remove, but its still a positive answer so it will probably happen &lt;img class="lia-deferred-image lia-image-emoji" src="https://communities.vmware.com/html/@175698D61412968B624AD0FDF51E2E6D/emoticons/1f604.png" alt=":grinning_face_with_smiling_eyes:" title=":grinning_face_with_smiling_eyes:" /&gt;&lt;/P&gt;&lt;P&gt;Hence eagerly awaiting the next build!&lt;/P&gt;</description>
      <pubDate>Fri, 01 Oct 2021 15:00:26 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/VMware-Workstation-Pro/TPM-without-encrypting-VDKs/m-p/2869792#M171466</guid>
      <dc:creator>OwenBurnett</dc:creator>
      <dc:date>2021-10-01T15:00:26Z</dc:date>
    </item>
    <item>
      <title>Re: TPM without encrypting VDKs</title>
      <link>https://communities.vmware.com/t5/VMware-Workstation-Pro/TPM-without-encrypting-VDKs/m-p/2869899#M171472</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://communities.vmware.com/t5/user/viewprofilepage/user-id/484783"&gt;@OwenBurnett&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;
&lt;P&gt;Thanks, I don't see what there is to work on, its just a line or two or lock out code to remove,&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;Umm.. no. Sadly it isn't that simple.&lt;BR /&gt;In theory, yes they could do that, but it isn't really an option.&lt;/P&gt;
&lt;P&gt;Besides being a "crypto processor" the TPM is also used to store secrets.&lt;BR /&gt;If those secrets are no longer encrypted then the safety that this TPM module is supposed to provide is no longer true.&lt;BR /&gt;&lt;BR /&gt;This is one of those reasons on why the VM had to be encrypted for you to be able to add a TPM device.&lt;BR /&gt;As a result, it will require some real engineering on VMware's behalf in order to be able to remove the encrypt "the whole VM" part. &lt;/P&gt;
&lt;P&gt;Perhaps they can get away with only encrypting the .vmx, or maybe there will be a small encrypted disk (like the UEFI disk that you'll with proxmox for example)&lt;/P&gt;
&lt;P&gt;--&lt;BR /&gt;Wil&lt;/P&gt;</description>
      <pubDate>Sat, 02 Oct 2021 21:01:46 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/VMware-Workstation-Pro/TPM-without-encrypting-VDKs/m-p/2869899#M171472</guid>
      <dc:creator>wila</dc:creator>
      <dc:date>2021-10-02T21:01:46Z</dc:date>
    </item>
    <item>
      <title>Re: TPM without encrypting VDKs</title>
      <link>https://communities.vmware.com/t5/VMware-Workstation-Pro/TPM-without-encrypting-VDKs/m-p/2870241#M171496</link>
      <description>&lt;P&gt;you are right if one wants the TPM not just for teh purpose of runnign windows 11 and don't caring for its security aspects.&lt;/P&gt;&lt;P&gt;If one wants it secure its a bit more work as new logic to only encrypt the TPM file but nothing else is needed.&lt;/P&gt;&lt;P&gt;for my use case having my host HDD's encrypted i would really just want a unsecure fake tpm to make windows 11 happy and never use it anyways, i dont need pin or face or fingerprint unlock in a VM LOL&lt;/P&gt;</description>
      <pubDate>Tue, 05 Oct 2021 11:53:46 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/VMware-Workstation-Pro/TPM-without-encrypting-VDKs/m-p/2870241#M171496</guid>
      <dc:creator>OwenBurnett</dc:creator>
      <dc:date>2021-10-05T11:53:46Z</dc:date>
    </item>
    <item>
      <title>Re: TPM without encrypting VDKs</title>
      <link>https://communities.vmware.com/t5/VMware-Workstation-Pro/TPM-without-encrypting-VDKs/m-p/2870271#M171498</link>
      <description>&lt;P&gt;That may very well be the case for you.&amp;nbsp; And even for a majority of VMware users.&amp;nbsp; However, VMware creates Enterprise-class software which numerous businesses use daily - and need to maintain high quality for their support of MS operating systems.&amp;nbsp; They are not going to throw together a half-baked component just so home users can get around MS's new requirements.&lt;/P&gt;</description>
      <pubDate>Tue, 05 Oct 2021 13:32:53 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/VMware-Workstation-Pro/TPM-without-encrypting-VDKs/m-p/2870271#M171498</guid>
      <dc:creator>RDPetruska</dc:creator>
      <dc:date>2021-10-05T13:32:53Z</dc:date>
    </item>
    <item>
      <title>Re: TPM without encrypting VDKs</title>
      <link>https://communities.vmware.com/t5/VMware-Workstation-Pro/TPM-without-encrypting-VDKs/m-p/2870376#M171505</link>
      <description>&lt;P&gt;I'm guessing the underlying requirement here is for Windows 11 to be able to run. &amp;nbsp;&lt;/P&gt;&lt;P&gt;Am I right in saying that in this use case, the vTPM is required to ensure that Windows itself can encrypt itself, thus actually resulting in two levels of encryption. &amp;nbsp;This isn't just a problem for home users, but also business/enterprise and government use cases also, double encryption will cause significant performance overhead with large fleets.&lt;/P&gt;&lt;P&gt;Given this, wouldn't it make sense to have an option to turn off VMware level encryption, where the vTPM is actually used to facilitate OS level encryption.&lt;/P&gt;</description>
      <pubDate>Tue, 05 Oct 2021 22:33:37 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/VMware-Workstation-Pro/TPM-without-encrypting-VDKs/m-p/2870376#M171505</guid>
      <dc:creator>ozsmacd</dc:creator>
      <dc:date>2021-10-05T22:33:37Z</dc:date>
    </item>
    <item>
      <title>Re: TPM without encrypting VDKs</title>
      <link>https://communities.vmware.com/t5/VMware-Workstation-Pro/TPM-without-encrypting-VDKs/m-p/2870588#M171517</link>
      <description>&lt;DIV class="lia-quilt-column-alley lia-quilt-column-alley-left"&gt;&lt;DIV class="lia-message-author-with-avatar"&gt;&lt;P&gt;&lt;SPAN class="UserName lia-user-name lia-user-rank-Contributor lia-component-message-view-widget-author-username"&gt;&lt;a href="https://communities.vmware.com/t5/user/viewprofilepage/user-id/408287"&gt;@ozsmacd&lt;/a&gt;&lt;/SPAN&gt;&lt;SPAN class="UserName lia-user-name lia-user-rank-Contributor lia-component-message-view-widget-author-username"&gt;Actually it can be even worse,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="UserName lia-user-name lia-user-rank-Contributor lia-component-message-view-widget-author-username"&gt;you have your host system Encrypted which contains an encrypted VM which guest OS is also encrypted.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="UserName lia-user-name lia-user-rank-Contributor lia-component-message-view-widget-author-username"&gt;So 3 layers of encryption. LOL&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="UserName lia-user-name lia-user-rank-Contributor lia-component-message-view-widget-author-username"&gt;talking about busyness software it was IMHO a design failure to begin with to bundle virtual disk encryption with TPM encryption.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="UserName lia-user-name lia-user-rank-Contributor lia-component-message-view-widget-author-username"&gt;usually you use a TPM in a machine to encrypt the disk so by design the way VMWare does it most often results in unnececery double encryption.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="UserName lia-user-name lia-user-rank-Contributor lia-component-message-view-widget-author-username"&gt;Also its not a measure of Enterprise-class software to prevent users from configuring their software as they need to, including fringe edge cases.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="UserName lia-user-name lia-user-rank-Contributor lia-component-message-view-widget-author-username"&gt;VMWare should from the get go allow the users to choose what to encrypt and if the user want to use an unencrypted TPM.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Wed, 06 Oct 2021 20:45:47 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/VMware-Workstation-Pro/TPM-without-encrypting-VDKs/m-p/2870588#M171517</guid>
      <dc:creator>OwenBurnett</dc:creator>
      <dc:date>2021-10-06T20:45:47Z</dc:date>
    </item>
    <item>
      <title>Re: TPM without encrypting VDKs</title>
      <link>https://communities.vmware.com/t5/VMware-Workstation-Pro/TPM-without-encrypting-VDKs/m-p/2870617#M171518</link>
      <description>&lt;P&gt;Yes, break the link between access control encryption and TPM.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Having this requirement is REALLY BAD.&amp;nbsp;&amp;nbsp;&amp;nbsp; 1st in order to remove disks you need to DECRYPT.&amp;nbsp;&amp;nbsp;&amp;nbsp; 2nd VMDK encrypted files DO NOT COMPRESS.&amp;nbsp;&amp;nbsp;&amp;nbsp; If you saved space before by archiving a VMDK with compression it is pointless.&amp;nbsp;&amp;nbsp;&amp;nbsp; It will use roughly the same amount of space.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The TPM / Access Control encryption may be a show stopper.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 07 Oct 2021 00:27:06 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/VMware-Workstation-Pro/TPM-without-encrypting-VDKs/m-p/2870617#M171518</guid>
      <dc:creator>kasper</dc:creator>
      <dc:date>2021-10-07T00:27:06Z</dc:date>
    </item>
    <item>
      <title>Re: TPM without encrypting VDKs</title>
      <link>https://communities.vmware.com/t5/VMware-Workstation-Pro/TPM-without-encrypting-VDKs/m-p/2870618#M171519</link>
      <description>&lt;P&gt;It looks like Hyper-V can supply TPM without encrypting the disk?&lt;/P&gt;&lt;P&gt;Why not just encrypt the VMX file or create some silly encrypted file for TPM?&lt;/P&gt;</description>
      <pubDate>Thu, 07 Oct 2021 00:30:29 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/VMware-Workstation-Pro/TPM-without-encrypting-VDKs/m-p/2870618#M171519</guid>
      <dc:creator>kasper</dc:creator>
      <dc:date>2021-10-07T00:30:29Z</dc:date>
    </item>
    <item>
      <title>Re: TPM without encrypting VDKs</title>
      <link>https://communities.vmware.com/t5/VMware-Workstation-Pro/TPM-without-encrypting-VDKs/m-p/2870629#M171520</link>
      <description>&lt;P&gt;I've been considering HyperV for a while now, have to say this might make the decision to move a bit simpler.&lt;/P&gt;&lt;P&gt;Free, does enough, will always be aligned with Microsoft's product release schedule (HyperV has formal support f Windows 11, VMware workstation does not).&lt;/P&gt;&lt;P&gt;As to the future of SharedVMs (ie VMs that auto start) in VMware, this is also a major concern. &amp;nbsp;I have been PM posts about the why they want to get rid of it, and that another approach may be used to deliver the product. &amp;nbsp;However it still shows as depreciated in the GUI and you have to wonder if it will go away again without reasonable consulting in v17?&lt;/P&gt;</description>
      <pubDate>Thu, 07 Oct 2021 01:42:09 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/VMware-Workstation-Pro/TPM-without-encrypting-VDKs/m-p/2870629#M171520</guid>
      <dc:creator>ozsmacd</dc:creator>
      <dc:date>2021-10-07T01:42:09Z</dc:date>
    </item>
    <item>
      <title>Re: TPM without encrypting VDKs</title>
      <link>https://communities.vmware.com/t5/VMware-Workstation-Pro/TPM-without-encrypting-VDKs/m-p/2870706#M171523</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://communities.vmware.com/t5/user/viewprofilepage/user-id/408287"&gt;@ozsmacd&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;
&lt;P&gt;As to the future of SharedVMs (ie VMs that auto start) in VMware, this is also a major concern. &amp;nbsp;I have been PM posts about the why they want to get rid of it, and that another approach may be used to deliver the product. &amp;nbsp;However it still shows as depreciated in the GUI and you have to wonder if it will go away again without reasonable consulting in v17?&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;V17 is a while away as V16 will be getting an extension on its life cycle. (see bottom paragraph at &lt;A href="https://blogs.vmware.com/teamfusion/2021/09/fusion-for-m1-public-tech-preview-now-available.html" target="_blank"&gt;https://blogs.vmware.com/teamfusion/2021/09/fusion-for-m1-public-tech-preview-now-available.html&lt;/A&gt; ) &lt;BR /&gt;As Michael says they are working on a reworked shared VM feature. I am confident that they will come up with a solution.&lt;BR /&gt;if in the meantime you are unsure or need an alternative solution then there's also my &lt;A href="https://vimarun.com" target="_self"&gt;vimarun&lt;/A&gt; product which handles auto start as well as auto shutdown.&lt;BR /&gt;&lt;BR /&gt;They are also working on a solution for releasing the virtual machine encryption requirement for adding a TPM device. &lt;BR /&gt;VMware sometimes moves a bit slow resolving these type of issues, but they do deliver. &lt;BR /&gt;Give them some time.&lt;/P&gt;
&lt;P&gt;--&lt;BR /&gt;Wil&lt;/P&gt;</description>
      <pubDate>Thu, 07 Oct 2021 10:02:19 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/VMware-Workstation-Pro/TPM-without-encrypting-VDKs/m-p/2870706#M171523</guid>
      <dc:creator>wila</dc:creator>
      <dc:date>2021-10-07T10:02:19Z</dc:date>
    </item>
    <item>
      <title>Re: TPM without encrypting VDKs</title>
      <link>https://communities.vmware.com/t5/VMware-Workstation-Pro/TPM-without-encrypting-VDKs/m-p/2870911#M171533</link>
      <description>&lt;P&gt;Hmm... if the TPM situation doesn't get resolved soon I may indeed need to look into hyper V although I don't like it as I want my VM's to work on windows and linux alike.&lt;/P&gt;</description>
      <pubDate>Fri, 08 Oct 2021 08:32:29 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/VMware-Workstation-Pro/TPM-without-encrypting-VDKs/m-p/2870911#M171533</guid>
      <dc:creator>OwenBurnett</dc:creator>
      <dc:date>2021-10-08T08:32:29Z</dc:date>
    </item>
    <item>
      <title>Re: TPM without encrypting VDKs</title>
      <link>https://communities.vmware.com/t5/VMware-Workstation-Pro/TPM-without-encrypting-VDKs/m-p/2886591#M173356</link>
      <description>&lt;P&gt;Add this to vmx:&lt;/P&gt;&lt;P&gt;managedvm.autoAddVTPM="software"&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Start VM (it'll start and add the virtual TPM, and then shutdown).&lt;/LI&gt;&lt;LI&gt;Start VM again.&amp;nbsp;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Win11 pro installed from OEM ISO without issue.&lt;/P&gt;</description>
      <pubDate>Wed, 05 Jan 2022 16:57:19 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/VMware-Workstation-Pro/TPM-without-encrypting-VDKs/m-p/2886591#M173356</guid>
      <dc:creator>braindead</dc:creator>
      <dc:date>2022-01-05T16:57:19Z</dc:date>
    </item>
    <item>
      <title>Re: TPM without encrypting VDKs</title>
      <link>https://communities.vmware.com/t5/VMware-Workstation-Pro/TPM-without-encrypting-VDKs/m-p/2886592#M173357</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://communities.vmware.com/t5/user/viewprofilepage/user-id/222593"&gt;@braindead&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;
&lt;P&gt;Add this to vmx:&lt;/P&gt;
&lt;P&gt;managedvm.autoAddVTPM="software"&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Start VM (it'll start and add the virtual TPM, and then shutdown).&lt;/LI&gt;
&lt;LI&gt;Start VM again.&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Win11 pro installed from OEM ISO without issue.&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;That's an experimental feature and it does work. &lt;BR /&gt;However.. there's a reason it is labeled experimental and you should also read the following article before blindly following these steps.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.vimalin.com/blog/what-you-should-know-about-vmwares-experimental-vtpm/" target="_blank"&gt;https://www.vimalin.com/blog/what-you-should-know-about-vmwares-experimental-vtpm/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;--&lt;BR /&gt;Wil&lt;/P&gt;</description>
      <pubDate>Wed, 05 Jan 2022 17:00:00 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/VMware-Workstation-Pro/TPM-without-encrypting-VDKs/m-p/2886592#M173357</guid>
      <dc:creator>wila</dc:creator>
      <dc:date>2022-01-05T17:00:00Z</dc:date>
    </item>
    <item>
      <title>Re: TPM without encrypting VDKs</title>
      <link>https://communities.vmware.com/t5/VMware-Workstation-Pro/TPM-without-encrypting-VDKs/m-p/2886683#M173380</link>
      <description>&lt;P&gt;It gets better.&amp;nbsp;&amp;nbsp;&amp;nbsp; You can now take this 'guest' image and apply it to a physical host that has issues supporting TPM.&lt;/P&gt;&lt;P&gt;And it should/has worked for me.&amp;nbsp;&amp;nbsp;&amp;nbsp; However some MS update may come up and break it.&lt;/P&gt;&lt;P&gt;Interesting short term fix with long term consequences.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 05 Jan 2022 23:09:42 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/VMware-Workstation-Pro/TPM-without-encrypting-VDKs/m-p/2886683#M173380</guid>
      <dc:creator>kasper</dc:creator>
      <dc:date>2022-01-05T23:09:42Z</dc:date>
    </item>
  </channel>
</rss>

