Security considerations when updating settings from a remote system
This networking mode works without any additional setup and is sufficient for many purposes.
If bridged networking is used, the VM acts like a computer inside the same network as the host, see Section6.5, “Bridged Networking”.
Enabling the clipboard in Bidirectional mode enables the guest to read and write the host clipboard.
The Host to Guest mode and the Guest to Host mode limit the access to one direction.
In this case, the guest has the same network access as the host and a firewall might be necessary to protect other computers on the subnet from a potential malicious guest as well as to protect the guest from a direct access from other computers.
In some cases it is worth considering using a forwarding rule for a specific port in NAT mode instead of using bridged networking.
The installation must be done with system privileges.
All Oracle VM Virtual Box binaries should be executed as a regular user and never as a privileged user.
The guest is part of a private subnet belonging to this VM and the guest IP is not visible from the outside.
The VMM provides emulated physical resources and devices to the guest which are accessed by the guest operating system to perform the required tasks.
The VM settings control the resources provided to the guest, for example the amount of guest memory or the number of guest processors and the enabled features for that guest.
The Oracle VM Virtual Box Extension Pack provides additional features and must be downloaded and installed separately, see Section1.6, “Installing Oracle VM Virtual Box and Extension Packs”.
As for the base package, the SHA256 checksum of the extension pack should be verified.