Skip to content

Commit bfb788b

Browse files
committed
Acrolinx fixes & TOC update
1 parent 34c8f4e commit bfb788b

2 files changed

Lines changed: 4 additions & 2 deletions

File tree

support/windows-server/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2754,6 +2754,8 @@ items:
27542754
items:
27552755
- name: Antivirus exclusions for Hyper-V hosts
27562756
href: ./virtualization/antivirus-exclusions-for-hyper-v-hosts.md
2757+
- name: Block users from running Hyper-V and VMware virtual machines on workstation-class computers
2758+
href: ./virtualization/block-users-from-running-virtualization-features-on-specific-computers.md
27572759
- name: Issues when starting VM or installing Hyper-V
27582760
href: ./virtualization/bios-update-for-hyper-v.md
27592761
- name: Run programs on non-Microsoft hardware virtualization software

support/windows-server/virtualization/block-users-from-running-virtualization-features-on-specific-computers.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.custom:
1313

1414
# How to block users from running Hyper-V and VMware virtual machines on workstation-class computers
1515

16-
This article provides guidance on how to use Windows PowerShell or Group Policy to block users from running virtualization software, such as Hyper-V and VMware, on workstation-class computers. These procedures apply to scenarios in which the you want to prevent such software from running, regardless of a user's administrative rights, on both domain-joined and non-domain-joined computers.
16+
This article provides guidance on how to use Windows PowerShell or Group Policy to block users from running virtualization software, such as Hyper-V and VMware, on workstation-class computers. These procedures apply to scenarios in which you want to prevent such software from running, regardless of a user's administrative rights, on both domain-joined and non-domain-joined computers.
1717

1818
*Applies to:* Hyper-V Server 2019
1919

@@ -63,7 +63,7 @@ To block users from running VMware Workstation, follow these steps:
6363

6464
1. If there aren't any software restriction policies, right-click **Software Restriction Policies**, and then select **New Software Restriction Policies**.
6565
1. Right-click **Additional Rules**, and then select **New path rule**.
66-
1. In the **Path** box, pecify the path to the VMware executable files (for example, type *C:\\Program Files (x86)\\VMware\\*, or type the path to specific .exe files).
66+
1. In the **Path** box, specify the path to the VMware executable files (for example, type *C:\\Program Files (x86)\\VMware\\*, or type the path to specific .exe files).
6767
1. Select **Security level**, and then select **Disallowed**.
6868
1. Select **OK**.
6969
1. To propagate the policy change, restart all of the target computers.

0 commit comments

Comments
 (0)