Skip to content

Commit db5bbbc

Browse files
authored
Update block-users-from-running-virtualization-features-on-specific-computers.md
Edit review per CI 6973
1 parent 1e6da4c commit db5bbbc

1 file changed

Lines changed: 18 additions & 17 deletions

File tree

Lines changed: 18 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: How to block users from running Hyper-V and VMware virtual machines on workstation-class computers
3-
description: Describes how to block users from installing Hyper-V or other virtualization software on specified computers.
3+
description: Describes how to block users from installing Hyper-V or other virtualization software on specific computers.
44
ms.date: 08/15/2025
55
manager: dcscontentpm
66
audience: itpro
@@ -11,61 +11,62 @@ ms.custom:
1111
- pcy:WinComm Storage High Avail
1212
---
1313

14-
# How to block users from running Hyper-V and VMware virtual machines on workstation-class computers
14+
# Block users from running Hyper-V and VMware VMs on workstation-class computers
1515

16-
This article provides guidance on how to use Windows PowerShell or Group Policy to block users from running virtualization software, such as Hyper-V and VMware, on workstation-class computers. These procedures apply to scenarios in which you want to prevent such software from running, regardless of a user's administrative rights, on both domain-joined and non-domain-joined computers.
16+
This article provides guidance for how to use Windows PowerShell or Group Policy to block users from running virtualization software, such as Hyper-V and VMware, on workstation-class computers. These procedures apply to scenarios in which you want to prevent virtualization software from running on both domain-joined and non-domain-joined computers, regardless of a user's administrative rights.
1717

1818
*Applies to:* Hyper-V Server 2019
1919

2020
## How to block virtualization services
2121

2222
> [!IMPORTANT]
2323
>
24-
> - Before you make these changes in a production environment, test them in a lab environment. This step helps assure that the changes (especially Group Policy changes) produce the intended results and don't introduce operational issues.
24+
> - Before you make these changes in a production environment, test them in a lab environment. This step helps make sure that the changes (especially Group Policy changes) produce the intended results and don't introduce operational issues.
2525
> - Make sure that you have Administrator permissions on the workstation computers.
2626
2727
### How to block the Hyper-V feature on a single computer
2828

2929
1. On the computer, open an administrative Windows PowerShell window.
30-
1. Run the following cmdlets in sequence:
30+
1. Run the following cmdlets, in sequence:
3131

3232
```powershell
3333
Disable-WindowsOptionalFeature -Online -FeatureName Microsoft-Hyper-V-All
3434
bcdedit /set hypervisorlaunchtype off
3535
```
3636

37-
The first cmdlet removes Hyper-V from the set of available optional features, and the second cmdlet prevents Hyper-V from running.
37+
The first cmdlet removes Hyper-V from the set of available optional features. The second cmdlet prevents Hyper-V from running.
3838

3939
### How to use Group Policy to block Hyper-V services on multiple computers
4040

4141
To configure an appropriate policy, follow these steps:
4242

43-
1. In the Group Policy Management Console (GPMC), navigate to or create a policy object that applies to the affected computers.
44-
1. Right-click the policy, and then select **Edit**. In the Group Policy Editor, select **Computer Configuration** > **Windows Settings** > **Security Settings** > **System Services**.
43+
1. In the Group Policy Management Console (GPMC), navigate to or create a Group Policy Object (GPO) that applies to the affected computers.
44+
1. Right-click the GPO, and then select **Edit**. In the Group Policy Editor, select **Computer Configuration** > **Windows Settings** > **Security Settings** > **System Services**.
4545
1. Configure each service that's related to Hyper-V (for example, Hyper-V Virtual Machine Management). For each of these services, follow these steps:
4646
1. Right-click the service, and then select **Properties**.
47-
1. In the service **Properties** dialog box, select **Define this policy setting**, select **Disabled**, and then select **OK**.
48-
1. To propagate the policy change, restart all of the target computers.
47+
1. In the **Properties** dialog box, select **Define this policy setting**, select **Disabled**, and then select **OK**.
48+
1. To propagate the policy change, restart all the target computers.
4949

5050
For more information about how to use Group Policy, see [Advanced Group Policy Management](/microsoft-desktop-optimization-pack/agpm/).
5151

5252
## How to use Group Policy to block VMware Workstation services
5353

5454
To configure an appropriate policy, follow these steps:
5555

56-
1. In the Group Policy Management Console (GPMC), navigate to or create a policy object that applies to the affected computers.
57-
1. Right-click the policy, and then select **Edit**. In the Group Policy Editor, select **Computer Configuration** > **Policies** > **Windows Settings** > **Security Settings** > **System Services**.
58-
To block users from running VMware Workstation, follow these steps:
56+
1. In the GPMC, navigate to or create a GPO that applies to the affected computers.
57+
1. Right-click the GPO, and then select **Edit**. In the Group Policy Editor, select **Computer Configuration** > **Policies** > **Windows Settings** > **Security Settings** > **System Services**.
5958

60-
1. **Create a new path rule in Software Restriction Policies**:
59+
To block users from running VMware Workstation, follow these steps:
6160

62-
1. Open the Group Policy Management Console (GPMC), and go to **Computer Configuration** > **Policies** > **Policies** > **Windows Settings** > **Software Restriction Policies**.
61+
1. Create a path rule in **Software Restriction Policies**:
6362

63+
1. Open the GPMC, and go to **Computer Configuration** > **Policies** > **Policies** > **Windows Settings** > **Software Restriction Policies**.
6464
1. If there aren't any software restriction policies, right-click **Software Restriction Policies**, and then select **New Software Restriction Policies**.
6565
1. Right-click **Additional Rules**, and then select **New path rule**.
66-
1. In the **Path** box, specify the path to the VMware executable files (for example, type *C:\\Program Files (x86)\\VMware\\*, or type the path to specific .exe files).
66+
1. In the **Path** box, specify the path to the VMware executable files (for example, type *C:\\Program Files (x86)\\VMware\\*, or enter the path to specific .exe files).
6767
1. Select **Security level**, and then select **Disallowed**.
6868
1. Select **OK**.
69-
1. To propagate the policy change, restart all of the target computers.
69+
70+
1. To propagate the policy change, restart all the target computers.
7071

7172
For more information about how to use Group Policy, see [Advanced Group Policy Management](/microsoft-desktop-optimization-pack/agpm/).

0 commit comments

Comments
 (0)