Creating and Distributing VMware ACE Packages

Ok, once we are clear about how VMware ACE works, we have a VMware ACE server mounted and we have an instance of a virtual machine created, ready for distribution, and we have configured your policies, In this document, shows how to create packages and how certain policies we've previously configured would affect you. Being able to later distribute these packages to be able to run the virtual machines of it.

Installing VMware Workstation ACE, creating VMs for use with the VMware ACE environment and viewing the policies

Well, once we have the VMware ACE server installed, We can take advantage of it, even if it is not entirely mandatory to have an ACE server, since we can have our virtual machines (Packages/Instances) generated but without a server control. In this document, We show how simple it is, VMware Workstation ACE Edition installation to create these virtual machines, we generate a VM and then we see the directives other possibilities we have about them. Once everything is ok, we could generate the virtual machine packages to install or distribute them, but that is in the following document:HTTP://www.bujarra.com/?p=1908.

Installing and Configuring the VMware ACE Management Server

In this document, we will look at installing the VMware ACE Management Server product. VMware ACE will allow us to have, Distribute virtual machines to our employees in a secure way, since through certain directives or policies we can customize certain properties of the machine. An example to understand it, it is enough to create a VC and if we want a salesperson to take it with the product that we are going to sell inside and we do not want it to be hacked’ We can encrypt your content, capping so that you can't use external drives such as CDs, Hard Drives, net… We can make the virtual machine expire… and all of this can be managed from the VMware ACE Management Server, all this through Virtual Rights Management. Policies can be created from VMware Workstation ACE Edition, as well as virtual machines, This is explained in the following documents: HTTP://www.bujarra.com/?p=1855 and http://www.bujarra.com/?p=1908.