Tech: Locking down Virtual PC features for distribution purposes

Ben Armstrong published a very interesting insight on Microsoft Virtual PC interface security, which can be restricted from Windows Registry in case of complex deployments:

The Virtual PC security options are stored in a hexadecimal DWORD called ‘Locks’ under HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Virtual PC\5.0\Security.
The value of the DWORD determines what is restricted. The values are as follows:

  • 0x001 = Disable access to the Virtual PC Options
  • 0x002 = Disable access to virtual machine settings
  • 0x008 = Disable access to the new virtual machine wizard
  • 0x020 = Disable access to the virtual disk wizard

Be sure to read the original article for updated and comments.