Consider the question triangle 'what am I good at?', 'what do I love to do?' and 'what do I get paid for?'.
The less software you are using, the more you're focussing on how the components work, how they interact and what data is processed.
You start asking questions about defaults and begin customizing your system.
The well-known CIA triad refers to Confidentiality, Integrity and Availability.
On Windows host and guest, consider hardening guides such as
- https://ncp.nist.gov/checklist/629
- https://www.cyber.gov.au/sites/default/files/2023-03/PROTECT%20-%20Hardening%20Microsoft%20Windows%2010%20version%2021H1%20Workstations%20%28October%202021%29.pdf
Consider that a standard Windows 10 setup comes with Microsoft Edge which is known to share by-default more data about users' behavior than necessary. Enable hidden Windows features by using the ViVeTool and consider removing Microsoft Edge.
In addition, the VMware OS Optimization Tool https://docs.vmware.com/en/VMware-Horizon/2303-and-later/optimization-guide/GUID-E077FBCF-E492-4580-8325-56E77CF8115C.html#GUID-E077FBCF-E492-4580-8325-56E77CF8115C is for VMware Horizon environments, but it helps to get familiar with how to control common options. You might compare the feature list with other tools e.g. https://github.com/HotCakeX/Harden-Windows-Security, https://github.com/hardentools/hardentools, https://github.com/0x6d69636b/windows_hardening.
Also, see latest docs of Microsoft Defender AV processes and services https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/microsoft-defender-antivirus-windows?view=o365-worldwide
Workstation APIs allows interacting with the VMware hypervisor and virtual machines. This can be by using the rest api, vmrun utility or using the ui. These features are built-in. Workstation has no built-in monitoring ui of what interacts with the hypervisor and with the VMs. To collect Workstation diagnostic information, see https://kb.vmware.com/s/article/1346.
'D:\Virtual Machines' added as Onedrive folder might attract your interest because of potential conflicts between Workstation services and Onedrive services.
The setup depicted shows that the VMs are eligible to share data using cd/dvd, usb and network.
Explore your sweet spot at the intersection of the question triangle. Becoming an information security professional, a devops engineer, data scientist, business IT advocate - all is possible given your scenario.