An administrator wants to leverage the processor-specific technology that uses a security extension for securing virtual machines (VMs). This will allow user-level code to define private regions of memory called enclaves that are protected from external access.
What does the administrator need to configure to enable VMs to use this technology?
diegof1
Highly Voted 2 years, 2 months agoMikeLowry
Most Recent 2 years, 4 months ago