Using WinPE 2.1 with VMWare virtual machines

 Allgemein, Knowledge Base, VMware  Kommentare deaktiviert für Using WinPE 2.1 with VMWare virtual machines
Apr 292010


Article ID: 40812

Using WinPE 2.1 with VMWare virtual machines

Applies To

• Deployment Solution 6.9


How do I use WinPE* 2.1 with VMware* virtual machines?


You must use Intel E1000 network card emulation instead of AMD pcnet network card emulation. See for instructions.
Excerpts from the link:

The following works for VMware WorkStation 5.5 and 6.0 and VMware Server 1.0+. By make the following alterations, WinPE 2.x will work seamlessly with network drivers.

  1. Make sure VMware is not running. Stop any virtual machines running and close VMware.
  2. Browse to the Virtual machine files and open the .vmx file with your favorite text editor.
  3. Add the following to the <Path to VM> .vmx file:

    ethernet0.virtualDev = „e1000“

    This is right after the ethernet0.present = „TRUE“.

  4. Save the changes.
  5. Start your virtual machine.

Virtual machines with installed operating systems such as Microsoft Windows Vista or Microsoft Windows XP might have an issue with the drivers after this change. Change the network drivers and point to c:\windows\system32 for the drivers. Or download the latest e1000(Intel) driver.

The information contained in the Altiris Knowledgebase is subject to the Terms of Use as outlined at

Reblog this post [with Zemanta]

vSphere 4.0 Hardening Guide Released

 Allgemein, Cloud, Updates, VMware, VMware ESX  Kommentare deaktiviert für vSphere 4.0 Hardening Guide Released
Apr 282010


VMware would like to announce the availability of the final release of the vSphere 4.0 Security Hardening Guide.  This version incorporates the extensive feedback from the VMware community on the previous draft release, which was published in January.  We would like to thank all the people who took the time to go through the draft release and provide their comments.

This guide represents a new approach to providing security guidance from VMware. As compared with the previous VI3 Hardening Guides, the current guide has the following highlights.

  • Structure: this version uses a standardized format, with formally defined sections, templates, and reference codes.  The goal is to increase clarity and reduce ambiguity, make it easier to reference individual guidelines, and most of all, enhance the ability to automate guideline enforcement.
  • Recommendation levels: in following with the formats used by NIST, CIS, and others, this guide categorizes all guidelines into three security levels.  Instead of recommending a single set of guidelines for all environments, this guide encourages more of a risk-based approach, so that individual administrators can decide which guidelines apply to their environment.

Overall, there are more than 100 guidelines, with the following major sections:

The Introduction section describes the scope, structure, recommendation levels, and other aspects of the guide in more detail.  Please read this section first before diving into the rest of the guide, as it provides important context.

Although this version of the guide can be considered as „final“ and appropriate for use in production environments, we recognize that there is always room for improvement.  We will continue to welcome comments and corrections on this guide, and we will publish updated versions of the guide from time to time as feedback is accumulated.  This feedback of course will also be incorporated into the hardening guide for future releases of vSphere.

The vSphere 4.0 Hardening Guide has been posted to the VMware Communities in the „Security and vShield Zones” area, in the Documents tab.  Please provide feedback in the Comments area.

Reblog this post [with Zemanta]

Gartner Says 60 Percent of Virtualized Servers Will Be Less Secure Than the Physical Servers They Replace Through 2012

 Allgemein  Kommentare deaktiviert für Gartner Says 60 Percent of Virtualized Servers Will Be Less Secure Than the Physical Servers They Replace Through 2012
Mrz 172010

Source: Gartner Press Release >>

Gartner Says 60 Percent of Virtualized Servers Will Be Less Secure Than the Physical Servers They Replace Through 2012

Gartner Outlines Six Most Common Virtualization Security Risks and How to Combat Them

STAMFORD, Conn., March 15, 2010 —  

Through 2012, 60 percent of virtualized servers will be less secure than the physical servers they replace, according to Gartner, Inc. Although Gartner expects this figure to fall to 30 percent by the end of 2015, analysts warned that many virtualization deployment projects are being undertaken without involving the information security team in the initial architecture and planning stages.

„Virtualization is not inherently insecure,“ said Neil MacDonald, vice president and Gartner fellow. „However, most virtualized workloads are being deployed insecurely. The latter is a result of the immaturity of tools and processes and the limited training of staff, resellers and consultants.“

Gartner research indicates that at the end of 2009, only 18 percent of enterprise data center workloads that could be virtualized had been virtualized; the number is expected to grow to more than 50 percent by the close of 2012. As more workloads are virtualized, as workloads of different trust levels are combined and as virtualized workloads become more mobile, the security issues associated with virtualization become more critical to address.

Gartner has identified the six most common virtualization security risks together with advice on how each issue might be addressed:

Risk: Information Security Isn’t Initially Involved in the Virtualization Projects

Survey data from Gartner conferences in late 2009 indicates that about 40 percent of virtualization deployment projects were undertaken without involving the information security team in the initial architecture and planning stages. Typically, the operations teams will argue that nothing has really changed — they already have skills and processes to secure workloads, operating systems (OSs) and the hardware underneath. While true, this argument ignores the new layer of software in the form of a hypervisor and virtual machine monitor (VMM) that is introduced when workloads are virtualized.

>> Read full article on

Reblog this post [with Zemanta]

VMware Infrastructure 3: Advanced Technical Design Guide Downloads

 Allgemein, Updates  Kommentare deaktiviert für VMware Infrastructure 3: Advanced Technical Design Guide Downloads
Jul 212009

The book VMware Infrastructure 3 Advanced Technical Design Guide and Advanced Operations Guide“  by Scott Herold, Ron Oglesby and Mike Laverick are available as a free PDF Download.

Download your FREE copy at >>

Much thanks to the authors

I have the book in front of a half year purchased and it´s really great

Reblog this post [with Zemanta]

Get Your VCP 4 Technical Certification for vSphere

 Allgemein, Updates, VMware Partner  Kommentare deaktiviert für Get Your VCP 4 Technical Certification for vSphere
Jun 252009

Via VMware – VMware Partner News >>

Get Your VCP 4 Technical Certification for vSphere

Get a jumpstart on the technical post-sales course requirements for the new VMware Certified Professional (VCP) 4 exam, available in August, for VMware vSphere. Be among the first VMware partners to get training on the industry’s first cloud operating system. The „VMware vSphere: Install, Configure and Manage“ course is now available for registration – if you are upgrading from VMware Infrastructure 3, „VMware vSphere: What’s New“ covers new features and how to perform the upgrade.

Why is the VCP technical training important? VCP certification is one of the requirements to become an Enterprise or Premier partner and these courses teach you how to install, configure and manage VMware products and solutions. This accelerates your service enablement and allows you to expand your products and services portfolio to realize new revenue opportunities.

Login to Partner University for more details.

Reblog this post [with Zemanta]