2 Table of Contents What Is VMware Horizon FLEX?... 3 Terminology for Horizon FLEX Key Benefits of Horizon FLEX... 4 Deploying Horizon FLEX Tested Host Operating Systems for Horizon FLEX Tested Guest Operating Systems for Horizon FLEX Network Specifications for Horizon FLEX... 5 Administrative Functions in the Horizon FLEX Policy Server... 6 Restricted Virtual Machine Policies General Settings in Add Virtual Machine Policy Window General Restrictions in Add Virtual Machine Policy Window End User Messages in Add Virtual Machine Policy Window Server Settings in Add Virtual Machine Policy Window Device Control in the New Policy Window Setting Remote Lock or Wipe Basic Administrator and User Workflows for Horizon FLEX Administrator Workflow User Workflow Use Cases Bring Your Own PC Temporary or Contract Workers Disconnected Workers Regional Office Workers Development and Training Summary Author and Contributors Additional Resources WHITE PAPER / 2
3 What Is VMware Horizon FLEX? Traditionally, IT administrators have protected corporate data and applications and controlled costs by providing workers with company-issued, Windows-based laptops or desktops and by defining how and from where workers could access corporate applications and data. However, the evolving workforce of today puts new demands on IT administrators. Road warriors must be productive when disconnected from the corporate network. More and more users demand Macs, even in organizations where Windows is the corporate computing standard. In addition, many companies are moving a significant percentage of their workforce from permanent to temporary or contract roles, eliminating traditional IT controls over corporate applications and data. VMware Horizon FLEX is a policy-based, containerized desktop solution that allows IT administrators to create, secure, and manage local desktops to meet the needs of workers with their own computers, road warriors, and Mac users in the enterprise. End users work within a restricted virtual machine on their endpoints and can be either connected or disconnected from the enterprise network. Horizon FLEX is a combination of existing VMware products, with additional beneficial features. Horizon FLEX is composed of VMware Fusion Pro, VMware Player Pro, VMware Mirage for Horizon FLEX, and the new Horizon FLEX Policy Server. The Horizon FLEX Client is composed of Fusion Pro and Player Pro. Figure 1: Horizon FLEX Package With the Horizon FLEX package, administrators can create multiple restricted virtual machines (Horizon FLEX virtual machines) and entitle them to a variety of end users. The Horizon FLEX solution complements existing VMware virtual desktop infrastructure (VDI) environments by allowing administrators to cater to both online and offline user requirements. Because the Horizon FLEX virtual machine is stored locally, corporate applications are accessible to the user even when offline. With the Horizon FLEX virtual machine, IT can resolve the challenges presented by the intermittent network disconnection of bring-your-own-pc (BYOPC) and mobile users, while continuing to provide VDI desktops to other users. WHITE PAPER / 3
4 Terminology for Horizon FLEX The following terminology is used throughout this brief. Horizon FLEX Client Combination of Fusion Pro and Player Pro on the endpoint. The user connects to the Horizon FLEX Policy Server with the Horizon FLEX Client. One license key is used for both Fusion Pro and Player Pro. Fusion Pro Fusion Pro enables a user to connect to a restricted virtual machine from a Mac endpoint. In addition, the administrator creates a restricted virtual machine with Fusion Pro. Note: You can also use VMware Workstation to create a Horizon FLEX virtual machine, but it is not included in the current Horizon FLEX bundle. Player Pro Player Pro enables a user to connect to a restricted virtual machine from a Windows endpoint. Mirage for Horizon FLEX The standard Mirage server that provides optional image management. The layering technology allows administrators to easily manage, back up, and patch virtual machine desktops. Horizon FLEX Policy Server Handles the restricted virtual machine functionality. The administrator applies policies with the Horizon FLEX Policy Server. Restricted virtual machine The administrator creates a restricted virtual machine with Fusion Pro. The user downloads this restricted virtual machine to a physical machine. Horizon FLEX virtual machine or source virtual machine Other terms for the restricted virtual machine. Host The physical computer on which the Horizon FLEX Client is installed. Guest OS The operating system installed on the restricted virtual machine. Guest content The applications and user data and settings installed on the restricted virtual machine. Entitlement The assignment of restricted virtual machines to users. The administrator entitles Active Directory users and groups through the Horizon FLEX Policy Server. Users can access their entitled virtual machines from their Horizon FLEX Clients. Key Benefits of Horizon FLEX Using Horizon FLEX, administrators can Embrace Macs in the enterprise Enable offline productivity by providing users with corporate desktops that run locally on Windows or Mac endpoints Retain control of corporate applications and data by using policies to control USB device access, and copying and pasting Easily manage and maintain virtual machines using a centralized console Accommodate temporary workers and contractors with policy-based desktop expiration dates and remote lock Remote lock is one of the exciting features that Horizon FLEX introduces. Remote lock allows administrators to instantly lock out a virtual machine and make it inaccessible to the user. This feature is useful in a scenario in which a user s contract expires prematurely. WHITE PAPER / 4
5 Deploying Horizon FLEX To access the restricted virtual machine, the user must first install the Horizon FLEX Client (Fusion Pro or Player Pro) on a Mac or Windows endpoint. The user can then launch the Horizon FLEX Client to connect to the Horizon FLEX Policy Server and download the restricted virtual machine. The administrator can mass-deploy the Horizon FLEX Client to Mac or Windows endpoints with standard package deployment tools, such as Apple Remote Desktop JAMF Casper Suite Microsoft System Center 2012 Configuration Manager Note: You can include a restricted virtual machine as part of the deployment package. Tested Host Operating Systems for Horizon FLEX VMware has verified the following host operating systems as compatible with the Horizon FLEX Clients: Windows 7, Windows 8.x, Windows Server 2012, Windows Server 2012 R2 Mac OS X 10.9, Mac OS X Additional operating systems as supported by Fusion Pro and Workstation Player may be used but have not been tested at this time. Tested Guest Operating Systems for Horizon FLEX VMware has verified the following guest operating systems as compatible with the Horizon FLEX Clients: Windows XP, Windows 7 (all versions, including 32-bit and 64-bit), Windows 8 (all versions) Ubuntu Mac OS X 10.9, Mac OS X Additional operating systems as supported by Fusion Pro and Workstation Player may be used but have not been tested at this time. Network Specifications for Horizon FLEX The Horizon FLEX solution allows users to run corporate applications even when disconnected from the network. Virtual desktops are stored locally for a complete desktop experience that does not require a network connection. A network connection between the Horizon FLEX Policy Server and the Horizon FLEX Client is required only in the following scenarios: For the initial download of the FLEX virtual machine To receive virtual machine restriction and policy updates Note: You can also manage and update guest content if you use Mirage for Horizon FLEX. Users must connect to the network to receive updates to guest content. The administrator specifies a download location (URL) for the Horizon FLEX virtual machine. The Horizon FLEX Policy Server must be accessible via HTTPS to the Horizon FLEX Client for the end user to download the virtual machine. After the user powers on the virtual machine and logs in, the user can access the virtual machine offline. WHITE PAPER / 5
6 The administrator can also specify the number of days that the virtual machine can run without connecting to the Horizon FLEX Policy Server. When the time period is reached, the virtual machine is not usable. When the user regains access to the network, updates to the guest OS or virtual machine policies are applied. Figure 2: Horizon FLEX Policy Server for Central Management of Desktops Administrative Functions in the Horizon FLEX Policy Server You can manage and control containerized desktops with the Horizon FLEX Policy Server. After the Horizon FLEX license has been applied to Mirage for Horizon FLEX, the Horizon FLEX Policy Server is activated. Administrators can perform a myriad of tasks, including Manage an inventory of restricted virtual machines Browse a list of users and groups in the Active Directory service Entitle users and groups to one or more restricted desktops Specify virtual machine policies for a given entitlement Prevent user access to restricted virtual machines with remote lock Examine virtual machine details and status at any given point in time Restricted Virtual Machine Policies The administrator can define a specific set of policies for a Horizon FLEX virtual machine from the Horizon FLEX Policy Server Web management user interface. WHITE PAPER / 6
7 Figure 3 shows the Add Virtual Machine Policy window and the various policy and restriction settings. Details of these policies follow. Figure 3: Add Virtual Machine Policy Window in the Horizon FLEX Policy Server General Settings in Add Virtual Machine Policy Window General Settings include setting a Name and Description for the virtual machine policy. General Restrictions in Add Virtual Machine Policy Window General Restrictions apply to all users entitled to a virtual machine. Field explanations follow. Expiration date You can configure the virtual machine to expire at a specific date and time. Folder Sharing You can specify whether the guest can share folders with the host File copy operations You can control copy-and-paste and drag-and-drop functionality between the host and the virtual machine. Passphrase You can choose whether to require the user to change the power-on password whenever moving or copying a restricted machine. You can also replace the admin supplied encryption passphrase with the user s AD credentials. Single Instance - You can restrict the user from copying the guest OS WHITE PAPER / 7
8 End User Messages in Add Virtual Machine Policy Window In End User Messages, the administrator can choose to do the following: Display an expiration message to the user when the virtual machine expires Display a warning message to the user before the virtual machine expires Set the number of days before expiration that the warning message is shown Server Settings in Add Virtual Machine Policy Window Server settings apply to the Horizon FLEX Policy Server. Field explanations follow. Restrictions management server Specify the URL and port number for the Horizon FLEX Policy Server. Server contact frequency You can specify how frequently in minutes, hours, or days the Horizon FLEX Client must check the Horizon FLEX Policy Server for policy updates. The virtual machine always attempts to contact the Horizon FLEX Policy Server at the specified time, but policy updates are retrieved only when the user is online. If this time is exceeded, the virtual machine uses the last retrieved policy set. Maximum time the VM can be used without server contact You can specify how long the virtual machine is allowed to run without contacting the Horizon FLEX Policy Server. This period must be greater than the server contact frequency. If this time is exceeded, the user receives a warning message, and the virtual machine becomes inaccessible. When the virtual machine can contact the Horizon FLEX Policy Server, the virtual machine again becomes accessible. The administrator does not need to reactivate the virtual machine. WHITE PAPER / 8
9 Device Control in the New Policy Window On this screen you can control how the guest OS interacts with USB devices connected to the host machine. Global Use Of Device - You can control whether all USBs are allowed or disallowed. Additionally you can specify specific permissions for certain classes of USB device. Specified USB device - You have the ability to ban all USB devices except those brands certified by your corporation. Setting Remote Lock or Wipe The administrator can prevent user access to a Horizon FLEX virtual machine with the Lockout feature. Alternatively, for extra security the virtual machine can be remotely wiped from the user s machine. Figure 4 shows the Lockout and Wipe buttons that are available from the Virtual Machines tab on the Horizon FLEX Policy Server Web management user interface. Figure 4: Lockout & Wipe features in the Horizon FLEX Policy Server The administrator logs in to the Horizon FLEX Policy Server Web management user interface to lockout or remotely wipe a restricted virtual machine. Procedure to Lockout or Wipe Restricted Virtual Machine 1. Log in to the Horizon FLEX Policy Server Web management user interface. 2. Click the Virtual Machines tab. 3. Select a restricted virtual machine. 4. Click Lockout or Wipe. 5. Click OK to confirm the operation. If you re using Lockout then the status of this virtual machine changes to Pending Lockout. Upon next contact with the Horizon FLEX Policy Server, the virtual machine is locked out and the status changes to Locked Out. The same process if followed if you re remotely wiping a virtual machine. WHITE PAPER / 9
10 Basic Administrator and User Workflows for Horizon FLEX Horizon FLEX allows administrators to centrally manage and maintain restricted virtual machines while users access these virtual machines locally. Details of basic administrator and user workflows follow. Administrator Workflow The administrator prepares a restricted virtual machine for the user, as outlined in Figure 5. Figure 5: Administrator Workflow WHITE PAPER / 10
11 User Workflow The user can access the restricted virtual machine as illustrated in Figure 6. Figure 6: User Workflow WHITE PAPER / 11
12 Use Cases Horizon FLEX solves a broad number of enterprise use cases: Bring Your Own PC (BYOPC) Supports employees using their own computer for work, or those employees assigned a Mac at work even though a Windows computer is standard issue. Temporary or contract workers Enables temporary or contract workers to access the applications and data they need while protecting corporate data, especially if users have their own computers and might not always work onsite. Disconnected workers Supports employees who are not always connected to the corporate network, for example, road-warrior sales reps, or consultants or employees working from home. Regional office workers Supports workers in regional offices who need to exchange confidential information with the home office using a standard set of corporate applications. Development and training Supports development, testing, and training efforts that require an isolated environment that is hardware- and operating-system agnostic. Bring Your Own PC IT administrators are forced to support a heterogeneous environment with the recent BYOPC revolution. IT can no longer define the rules when it comes to hardware type or how users access the corporate network. Employees want flexibility to choose their own personal machine, and many of these are Macs. In an effort to reduce costs, companies might not want to provide laptops to new employees. Supporting different user machines presents challenges in terms of security and data protection. CHALLENGE User support Employees want flexibility to use their own computers for work, and more and more of these computers are Macs. IT administrators are forced to support multiple user environments (Windows and Macs), and companies do not have time or budget to up-skill Windows IT staff. Security risk Personal machines pose security risks. Granting access to the corporate network allows users to access corporate applications and potentially capture sensitive data. SOLUTION Users can run a standardized, corporate Windows desktop on their own Mac or Windows machines, eliminating the need to provide support for Mac OS X. From a centralized server, IT can manage and maintain the Horizon FLEX Windows virtual machine without impacting the native OS on the endpoint. IT administrators can create restricted and encrypted virtual machines, reducing security concerns. The virtual machine is locked down and can be set to expire when the contract expires, protecting corporate applications and data. Copy-and-paste functions can also be restricted, along with USB access. Temporary or Contract Workers Increasingly, many companies employ temporary and contract workers. These workers often have their own laptops and work from home, making it difficult for IT administrators to maintain security. CHALLENGE Data access Granting corporate access to contractors poses security risks if users launch corporate applications from their personal computers. After a contract has expired, the applications remain on the user s machine, allowing them to capture sensitive data. SOLUTION IT administrators can create restricted and encrypted machines, reducing security concerns. The desktop is locked down and can be set to expire at a predefined date and time, thus protecting corporate applications and data. As an increased security measure, the Horizon FLEX virtual machine can be poison-pilled at any time. Copy-andpaste functions can be restricted, along with USB access. If the contract is renewed, administrators can also renew the virtual machine, saving time and effort. WHITE PAPER / 12
13 Disconnected Workers Some companies have a large mobile workforce. Workers who travel frequently, like sales representatives and consultants, are often unable to get secure network access to corporate data and applications. In some organizations, managing an ever-growing client list can also pose issues. CHALLENGE Remote and offline workers Road warriors are unable to get secure network access to corporate data and applications needed for client appointments. Isolate and safeguard client data Over time, adding clients and files increases file management complexity for users and makes it harder to find the appropriate file for a client when needed. SOLUTION Road warriors have a local desktop, allowing them to leverage corporate data and applications even when offline, turning downtime into productive time. When the user is back online, updates to policies or the Horizon FLEX virtual machine are applied. IT can provide consultants with one or more Horizon FLEX virtual machines per physical machine. Consultants can allot one virtual machine to each client, making it easier to isolate, manage, maintain, and locate client files and applications. Regional Office Workers Regional offices, dealerships, and franchises might need to create and submit confidential reports, like revenue or inventory, to other regional offices or to the central office. These regional offices might also need a way to maintain reports locally. IT staff might not be available in every branch to ensure that security policies are enforced. CHALLENGE Regular reports with confidential data Regional offices need to send regular confidential reports to the head office while maintaining consistency across all branches. However, a regional office might not have IT staff onsite to support or reinforce security best practices, exposing the organization to potential risk. SOLUTION IT can provide each regional office with a restricted, encrypted desktop that contains the applications needed to provide the head office with required reports. Horizon FLEX includes policies that can be applied to a local virtual machine to secure those reports, including restrictions on USB device access and copying and pasting. Development and Training Development, testing, and training efforts often require an isolated environment that is hardware- and operating-system agnostic. Providing a consistent training environment presents a challenge as more schools adopt a BYOPC approach. In addition, developers and testers might require a Linux environment but still need access to Windows-based productivity tools. CHALLENGE Isolated environment Companies providing large- scale training, universities and schools, and developers and testers all need an isolated environment in which to perform their tasks. More and more of these users prefer to use Macs, but still require Windows-only applications. SOLUTION Horizon FLEX can deliver preconfigured applications, tailored for a specific class in an isolated, locked-down virtual machine. Users have the flexibility of running this restricted virtual machine on their own machine or on one provided for them. Engineers can use native Windows tools and applications on a machine of their choice. WHITE PAPER / 13
14 Summary VMware Horizon FLEX is a containerized desktop solution that allows businesses to accommodate emerging modes of working, such as BYOPC, temporary or contract workers, and disconnected users. Organizations can deploy and control standardized Windows virtual machine desktops to groups of employees, a challenge that has been difficult or costly to address. IT can now give Mac users, contractors, and disconnected workers access to a secure corporate desktop in a cost-effective package without sacrificing security and corporate compliance. IT administrators can create, secure, and manage restricted virtual machines from a centralized location, while users run their virtual machines locally. Horizon FLEX complements and extends an existing VDI environment, allowing flexibility for a broad spectrum of users. The VMware Horizon FLEX solution offers you Secure delivery of a Windows virtual machine desktop on any Mac or Windows computer, managed from a single solution Horizon FLEX Policy Server to enforce corporate compliance Management of virtual machines from a centralized server without impacting the host OS on the endpoint Robust security features and granular control with restricted and encrypted virtual machines Desktops that can be used with or without a network connection Virtual machine expiration dates and remote lock Author and Contributors Gina Daly, Technical Writer in End-User Computing Technical Marketing, VMware, wrote this paper. Contributors to this document include Surendra Gupte, Staff Engineer, Personal Desktops, End-User Computing, VMware Nicolas Rochard, Director, Product Marketing, End-User Computing, VMware Kristina De Nike, Product Line Manager, End-User Computing, VMware Andy Morris, Snr Product Line Marketing Manager, End-User Computing, VMware Additional Resources For more information, see the Horizon FLEX product Web page. WHITE PAPER / 14
15 VMware, Inc Hillview Avenue Palo Alto CA USA Tel Fax Copyright 2015 VMware, Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws. VMware products are covered by one or more patents listed at VMware is a registered trademark or trademark of VMware, Inc. in the United States and/or other jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies. Item No: VMW8371-WP-HORZN-FLEX-1.5-USLET /15
Technical Note VMware Virtual Desktop Manager User Authentication Guide VMware Virtual Desktop Manager The purpose of this guide is to provide details of user authentication in VMware Virtual Desktop Manager
Horizon FLEX 1.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this
Horizon FLEX 1.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this
Horizon FLEX 1.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this
Installing and Configuring vcenter Multi-Hypervisor Manager vcenter Server 5.1 vcenter Multi-Hypervisor Manager 1.1 This document supports the version of each product listed and supports all subsequent
Installing and Configuring vcenter Support Assistant vcenter Support Assistant 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced
VMWARE TECHNICAL NOTE VMware ACE Integration with Active Directory This document explains how to set up Active Directory to use with VMware ACE. This document contains the following topics: About Active
How to Migrate Citrix XenApp to VMware Horizon 6 TECHNICAL WHITE PAPER Table of Contents Introduction... 3 Horizon and XenApp Components Comparison.... 4 Preparing for the Migration.... 5 Three Approaches
VMWARE TECHNICAL NOTE VMware ACE Managing Remote Access This technical note explains how to use VMware ACE to manage remote access through VPN to a corporate network. This document contains the following
ThinPrint GPO Configuration for Location-Based Printing I N F O R M AT I O N G U I D E Table of Contents Summary................................................................... 3 Environment................................................................
Technical Note Migrating a Windows PC to Run in VMware Fusion VMware Fusion 2.0 This technical note describes the process for migrating an existing Windows PC to run as a virtual machine with VMware Fusion
VMware vcenter.ga September 25, 2013 GA Last updated: September 24, 2013 Check for additions and updates to these release notes. RELEASE NOTES What s in the Release Notes The release notes cover the following
C H E A T S H E E T Enterprise Desktop Solutions: What is VMware View? VMware View 4.5 is the leading desktop virtualization solution, built for delivering desktops as a managed service from the platform
TECH BRIEF Desktop Transformation: A Landscape Transformed Over the past quarter of a century, we have witnessed two revolutions that have profoundly changed the way companies around the globe do business,
ESXi 4.1 Embedded vcenter Server 4.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent
Setting up VMware ESXi for 2X VirtualDesktopServer Manual URL: www.2x.com E-mail: email@example.com Information in this document is subject to change without notice. Companies, names, and data used in examples
Reconfiguration of VMware vcenter Update Manager Update 1 vcenter Update Manager 4.1 This document supports the version of each product listed and supports all subsequent versions until the document is
Configuring Single Sign-on from the VMware Identity Manager Service to Dropbox VMware Identity Manager SEPTEMBER 2015 V1 Configuring Single Sign-On from VMware Identity Manager to Dropbox Table of Contents
Mirage 5.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,
Configuring Single Sign-On from the VMware Identity Manager Service to Office 365 VMware Identity Manager JULY 2015 V1 Table of Contents Overview... 2 Passive and Active Authentication Profiles... 2 Adding
Introduction to VMware EVO: RAIL White Paper Table of Contents Introducing VMware EVO: RAIL.... 3 Hardware.................................................................... 4 Appliance...............................................................
Configuring Single Sign-on from the VMware Identity Manager Service to WebEx VMware Identity Manager SEPTEMBER 2015 V 2 Configuring Single Sign-On from VMware Identity Manager to WebEx Table of Contents
PROPALMS VDI Version 2.1 Quick Start Guide for Parallels Virtuozzo Rev. 1.1 Published: JULY-2011 1999-2011 Propalms Ltd. All rights reserved. The information contained in this document represents the current
Fast and Effective Migration from Novell to Windows Active Directory with VMware Mirage WHITE PAPER Introduction This paper describes how GANTECH, a systems integrator specializing in virtualization, used
Windows Agent Deployment on VMware Horizon Mirage Desktop EventTracker Publication Date: Mar 7, 2014 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract This document describes
VMware vcenter Log Insight Getting Started Guide vcenter Log Insight 1.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by
Implementing Federal Personal Identity Verification for VMware View By Bryan Salek, Federal Desktop Systems Engineer, VMware Technical WHITE PAPER Introduction This guide explains how to implement authentication
Introducing Virtual Desktop Infrastructure in Propalms TSE 6.0 1. Introduction: Propalms TSE 6.0 introduces the Virtual Desktop Infrastructure that lets you harness the power of virtualization technology.
Desktops in the Cloud Your Silver Bullet for Windows XP End of Life WHITE PAPER Table of Contents Executive Summary...3 Incremental Desktop Migration...3 Use Cases for DaaS...3 Desktop Migration Options:
White Paper Enterprise File Serving 2.0 Anywhere, Any Device File Access with IT in Control Like it or not, cloud- based file sharing services have opened up a new world of mobile file access and collaborative
VMWARE TECHNICAL NOTE VMware ACE Best Practices for Setting Up VMware ACE This technical note explains how to set up VMware ACE Manager and most efficiently manage your VMware ACE projects. Note: The guidelines
vcenter Operations Manager for Horizon Supplement vcenter Operations Manager for Horizon 1.6 This document supports the version of each product listed and supports all subsequent versions until the document
Release Notes Cloud Attached Storage 5.0 March 2015 2015 Cloud Attached Storage 5.0 Release Notes 1 1 Release Contents Copyright 2009-2015 CTERA Networks Ltd. All rights reserved. No part of this document
VMware AlwaysOn Point of Care Desktop with Indigo Identityware software for with Roaming Desktops Indigo Identityware provides clinical users fast and secure access to their VMware desktop through a fluid,
Browser Appliance Getting Started Guide The Browser Appliance is a free virtual machine (available from the VMware Technology Network at www.vmware.com/vmtn/vm) that allows you to browse the Internet securely
VMware View 4 with PCoIP I N F O R M AT I O N G U I D E Table of Contents VMware View 4 with PCoIP................................................... 3 About This Guide........................................................
User Manual User Manual Version 126.96.36.199 I Endpoint Protector Virtual Appliance User Manual Table of Contents 1. Endpoint Protector Virtual Appliance Formats1 1.1. Available Formats of the Virtual Appliance...
Getting Started with VMware Fusion VMware Fusion for Mac OS X 2008 2012 EN-000933-00 2 Getting Started with VMware Fusion You can find the most up-to-date technical documentation on the VMware Web site
The BYOD Opportunity Say Yes to Device Diversity and Enable New Ways to Drive Productivity WHITE PAPER Table of Contents Abstract.... 3 Introduction.... 3 A New Approach to BYOD... 3 Positive Results....
How to Create a Simple Content Management Solution with Joomla! in a vcloud Environment A VMware Cloud Evaluation Reference Document Contents About Cloud Computing Cloud computing is an approach to computing
LogMeIn Hamachi Getting Started Guide Contents What Is LogMeIn Hamachi?...3 Who Should Use LogMeIn Hamachi?...3 The LogMeIn Hamachi Client...4 About the Relationship Between the Client and Your LogMeIn
Why Choose VMware vsphere for Desktop Virtualization? WHITE PAPER Table of Contents Thin, Legacy-Free, Purpose-Built Hypervisor.... 3 More Secure with Smaller Footprint.... 4 Less Downtime Caused by Patches...
How to Use a LAMP Stack on vcloud for Optimal PHP Application Performance A VMware Cloud Evaluation Reference Document Contents About Cloud Computing Cloud computing is an approach to computing that pools
APPLICATION NOTE Centralized Mac Home Directories with ExtremeZ-IP Published: July 2009 Abstract Organizations wanting to integrate Mac OS X systems into their Windows-based enterprise network will most
Migrating to vcloud Automation Center 6.1 vcloud Automation Center 6.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a
PANO MANAGER CONNECTOR FOR SCVMM& HYPER-V Version 6.0.8 Published: DEC-2013 Updated: 24 MAR 2014 2005-2014 Propalms Ltd. All rights reserved. The information contained in this document represents the current
Making it easy to deploy, integrate and manage Macs, iphones and ipads in a Windows environment. Centralized Mac Home Directories On Windows Servers: Using Windows To Serve The Mac 2011 ENTERPRISE DEVICE
Connection Broker Managing User Connections to Workstations, Blades, VDI, and More Quick Start with Microsoft Hyper-V Version 8.1 October 21, 2015 Contacting Leostream Leostream Corporation http://www.leostream.com
VMware vsphere 5.0 Evaluation Guide Auto Deploy TECHNICAL WHITE PAPER Table of Contents About This Guide.... 4 System Requirements... 4 Hardware Requirements.... 4 Servers.... 4 Storage.... 4 Networking....
W H I T E P A P E R Best Practices for Building Virtual Appliances Table of Contents Objectives.................................................................................. 3 Design Principles...........................................................................
VMware vsphere Data Protection REVISED APRIL 2015 Table of Contents Introduction.... 3 Features and Benefits of vsphere Data Protection... 3 Requirements.... 4 Evaluation Workflow... 5 Overview.... 5 Evaluation
Host Access Management and Security Server Evaluation Guide Host Access Management and Security Server Evaluation Guide 12.2 Copyrights and Notices Copyright 2015 Attachmate Corporation. All rights reserved.
Debunking the Top 10 Cloud-Hosted Desktop Myths Page 1 Summary Desktops as a Service (DaaS) is the delivery of a virtual desktop offered as a hosted service by a service provider. DaaS has the potential
How VMware Mirage Complements and Extends Microsoft System Center Configuration Manager TECHNICAL WHITE PAPER Table of Contents. Introduction... 3 Intended Audience.... 3 What Is VMware Mirage?... 3 What
Wie bediene ich meine BYOD oder Mobile Zielgruppe? Martin Rohde Common trends Bring Your Own PC Road Warriors Contract workers My work force is on the road all the time. My executives want to use Macs.
How to Create an Enterprise Content Management Solution Based on Alfresco in a vcloud Environment A VMware Cloud Evaluation Reference Document Contents About Cloud Computing Cloud computing is an approach
Setting up Citrix XenServer for 2X VirtualDesktopServer Manual URL: www.2x.com E-mail: firstname.lastname@example.org Information in this document is subject to change without notice. Companies, names, and data used in examples
Request Manager Installation and Configuration Guide vcloud Request Manager 1.0.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced
User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner
VMware User Environment Manager Deployed in 60 Minutes or Less Author: Dale Carter Senior Solution Architect VMware Technology Consulting Services April 2015 Table of Contents 1. VMware User Environment
Reconfiguring VMware vsphere Update Manager vsphere Update Manager 6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a
How to Create a Flexible CRM Solution Based on SugarCRM in a vcloud Environment A VMware Cloud Evaluation Reference Document Contents About Cloud Computing Cloud computing is an approach to computing that
Technical Note ACE Management Server Deployment Guide VMware ACE 2.0 This technical note provides guidelines for the deployment of VMware ACE Management Servers, including capacity planning and best practices.
Citrix Introduction and FAQs Introduction to Citrix... 2 Why should I use this?... 2 What about Support?... 2 What browser should I use?... 2 Known Issues... 2 System Requirements for Windows-based computers...
Getting Started with VMware Fusion VMware Fusion for Mac OS X 2 Getting Started with VMware Fusion Getting Started with VMware Fusion Item: EN-000189-00 You can find the most up-to-date technical documentation
Radia Cloud For the Windows operating systems Software Version: 9.10 User Guide Document Release Date: June 2014 Software Release Date: June 2014 Legal Notices Warranty The only warranties for products
A Guide to New Features in Propalms OneGate 4.0 Propalms Ltd. Published April 2013 Overview This document covers the new features, enhancements and changes introduced in Propalms OneGate 4.0 Server (previously
Polycom CMA System Upgrade Guide 5.0 May 2010 3725-77606-001C Trademark Information Polycom, the Polycom Triangles logo, and the names and marks associated with Polycom s products are trademarks and/or
Technical Note Scalability Tuning vcenter Operations Manager for View 1.0 Scalability Overview The scalability of vcenter Operations Manager for View 1.0 was tested and verified to support 4000 concurrent
Implementation Considerations for VMware App Volumes in a Citrix XenApp Environment WHITE PAPER Table of Contents Introduction... 3 What Is App Volumes and How Does It Work?..................................
Getting Started with Database Provisioning VMware vfabric Data Director 2.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced
Smart Card Certificate Authentication with VMware View 4.5 and Above WHITE PAPER Table of Contents.... About This Paper.... 3 Introduction... 3 Smart Card Overview.... 3 Getting Started... 4 Authenticating
SOLUTION BRIEF VMware Solutions for Small and Midsize Business Protect Your Business, Simplify and Save on IT, and Empower Your Employees AT A GLANCE VMware is a leader in virtualization and cloud infrastructure
Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings
Reducing the Complexity of Virtualization for Small and Midsized Businesses Deploying an SMB-Specific SaaS Solution to Simplify Virtualization and Increase IT Productivity WHITE PAPER Executive Summary
VMware vsphere with Operations Management and VMware vsphere Licensing, Pricing and Packaging WHITE PAPER Table of Contents Executive Summary.... 3 VMware vsphere with Operations Management Overview....
Getting Started with VMware Fusion VMware Fusion for Mac OS X EN-000371-00 2 Getting Started with VMware Fusion You can find the most up-to-date technical documentation on the VMware Web site at: http://www.vmware.com/products/fusion/support.html
Zimbra Connector for Microsoft Outlook User Guide ZCO 7.2 April 2012 Legal Notices Copyright 2005-2012 VMware, Inc. All rights reserved. This product is protected by U.S. and international copyright and
What s New in VMware vsphere 5.1 VMware vsphere 5.1 TECHNICAL MARKETING DOCUMENTATION V 1.0/UPDATED JULY 2012 Table of Contents Introduction... 3 Key Components... 3 vcenter Single Sign-On Server.... 3
Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology 30406_VT_Brochure.indd 1 6/20/06 4:01:14 PM Preface Intel has developed a series of unique Solution Recipes designed
SOC 1 Control Objectives/Activities Matrix goes to great lengths to ensure the security and availability of vcloud Air services. In this effort, we have undergone a variety of industry standard audits,