Ben Armstrong published a very interesting insight on Microsoft Virtual PC interface security, which can be restricted from Windows Registry in case of complex deployments:
The Virtual PC security options are stored in a hexadecimal DWORD called ‘Locks’ under HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Virtual PC\5.0\Security.
The value of the DWORD determines what is restricted. The values are as follows:
- 0x001 = Disable access to the Virtual PC Options
- 0x002 = Disable access to virtual machine settings
- 0x008 = Disable access to the new virtual machine wizard
- 0x020 = Disable access to the virtual disk wizard
Be sure to read the original article for updated and comments.