WilliamLam.com

  • About
    • About
    • Privacy
  • VMware Cloud Foundation
  • VKS
  • Homelab
    • Hardware Options
    • Hardware Reviews
    • Lab Deployment Scripts
    • Nested Virtualization
    • Homelab Podcasts
  • VMware Nostalgia
  • Apple
You are here: Home / Workstation / Quick Tip - Virtualized Intel VT-x/EPT or AMD-V/RVI is not supported on this platform for VMware Workstation

Quick Tip - Virtualized Intel VT-x/EPT or AMD-V/RVI is not supported on this platform for VMware Workstation

12.17.2024 by William Lam // 2 Comments

In both Microsoft Windows 10 and 11, Virtualization Based Security (VBS) is enabled by default and this capability uses Hyper-V under the hood, which is a form of Nested Virtualization. If you are using VMware Workstation and you attempt to power on a Nested ESXi VM, you probably will see one of the following error messages based on the CPU vendor:

  • Virtualized Intel VT-x/EPT is not supported on this platform 
  • Virtualized AMD-V/RVI is not supported on this platform 

While VMware Workstation has been enhanced to co-exists with Hyper-V through a new Host VBS Mode introduced in VMware Workstation 17.x:

Workstation Pro uses a set of newly introduced Windows 10 features (Windows Hypervisor Platform) that permits the use of VT/AMD-V features, which enables Workstation Pro and Hyper-V to coexist. And because VBS is built on Hyper-V, Windows hosts with VBS enabled can now power on VM in Workstation Pro successfully

This are few limitations as mentioned in the VMware Workstation documentation.

With that said, if you do need to run Nested ESXi under VMware Workstation, you just need to disable Windows VBS, assuming you have administrative privileges on your system.

Step 1 - Go to your Device security and under Core isolation, toggle off the Memory integrity as shown in the screenshot below.

Step 2 - Reboot for the change to go into effect

Step 3 - To confirm VBS is actually disabled, open up the Microsoft System Information and look for the Virtualization-based security entry and ensure that it says Not enabled. Awhile back, I had heard from a colleague that corporate managed devices, may automatically re-enable that setting and this would be a way to confirm that the setting is actually on or off.

Step 4 - As you can see from the screenshot below, I now have my Nested ESXi 6.0 Update 3 successfully powered on running on latest VMware Workstation 17.6.2 on Windows 11 22H2.


While the incompatibly between VMware Workstation and VBS is not ideal for Nested Virtualization use cases under VMware Workstation, this is something the Workstation team is looking to improve in the future.

More from my site

  • Heads Up - Performance Impact with VMware Workstation on Windows 11 with Intel Hybrid CPUs
  • vSphere 8.0 Update 1c resolves Windows VBS performance & Hyper-V Generation 2 Nested VM running on AMD CPU
  • Will Intel’s VMCS Shadowing Feature Benefit VMware’s Nested Virtualization?
  • ESXi on GMKtec EVO-X1 with AMD Ryzen AI Pro 300 Series (formally Strix Point)
  • Quick Tip - Updating Intel ixgben driver enables Multi-gigabit (2.5gbE / 5GbE) selection in ESXi

Categories // Workstation Tags // AMD, Intel, VBS, workstation

Comments

  1. *protectedChristoph says

    12/17/2024 at 8:17 pm

    Hi,
    setting up a Witness Appliance for 2-Node vSAN scenarios, i had to manually do the 2 following additional steps to make it work:
    1) bcdedit /set hypervisorlaunchtype off
    2) Disable "Turn On Virtualization Based Security" from gpedit.msc > Computer Configuration > Administrative Templates > System > Device Guard

    Only disabling the core isolation/Memory Integrity via the Settings App did not do the trick for me.
    i have been running Windows11 24H2 on HP and Dell Workstations ...

    i did follow this conversation:
    https://gns3.com/virtualized-intel-vt-x-ept-is-not-supported-on-this-platform

    would be great if witness functionality is available without the need for a virtualized esxi system one day.

    Reply
  2. *protectedThomas says

    01/11/2025 at 11:41 am

    Looks like, if you are using login with fingerprint sensor on WIN11-24H2 you have to setup another registry key for "Windows Hello".

    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\DeviceGuard\Scenarios\WindowsHello]
    Enabled = 0

    https://community.broadcom.com/vmware-cloud-foundation/discussion/windows-11-24h2-hsot-how-to-disable-virtual-based-security

    Important:
    If you follow all steps in this thread like me, you must have your Bitlocker recovery key available to unlock your system drive after setting change!!! Paper...

    Group policy mentioned by Christoph is not valid for Windows 11, if I trust the description of the policy.

    Reply

Leave a Reply to ThomasCancel reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Search

Thank Author

Author

William is Distinguished Platform Engineering Architect in the VMware Cloud Foundation (VCF) Division at Broadcom. His primary focus is helping customers and partners build, run and operate a modern Private Cloud using the VMware Cloud Foundation (VCF) platform.

Connect

  • Bluesky
  • Email
  • GitHub
  • LinkedIn
  • Mastodon
  • Reddit
  • RSS
  • Twitter
  • Vimeo

Recent

  • Automating the vSAN Data Migration Pre-check using vSAN API 06/04/2025
  • VCF 9.0 Hardware Considerations 05/30/2025
  • VMware Flings is now available in Free Downloads of Broadcom Support Portal (BSP) 05/19/2025
  • VMUG Connect 2025 - Minimal VMware Cloud Foundation (VCF) 5.x in a Box  05/15/2025
  • Programmatically accessing the Broadcom Compatibility Guide (BCG) 05/06/2025

Advertisment

Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy

Copyright WilliamLam.com © 2025

 

Loading Comments...