Deployment Guide: Unidesk and Hyper- V

Size: px
Start display at page:

Download "Deployment Guide: Unidesk and Hyper- V"

Transcription

1 TECHNICAL WHITE PAPER Deployment Guide: Unidesk and Hyper- V This document provides a high level overview of Unidesk 3.x and Remote Desktop Services. It covers how Unidesk works, an architectural overview of Unidesk and Remote Desktop Services, and what it takes to deploy both.

2 Table of Contents How Unidesk Works Summary of Unidesk Benefits Desktop Provisioning Application Layering Image Management Persistent Personalization Storage Optimization Patch, Repair, Audit Architectural Overview Overview Unidesk Desktops Storage Management Appliance Master CachePoint Appliance Secondary CachePoint Appliances Remote Desktop Services Connection Broker Virtualization Host Web Access Gateway Licensing Deployment Overview Remote Desktop Services Unidesk Unidesk Hyper- V Agent Management Appliance Master CachePoint Secondary CachePoints Broker Agent Directory Junction Operating System Layer Installation Machines Collections Conclusion References Glossary of Unidesk terms Page 2 of 15

3 How Unidesk Works Unidesk is a virtual desktop and application management platform. It works in conjunction with the Hyper-V hypervisor and the Remote Desktop Services broker to deliver desktops to the end users. Unidesk manages both desktops and applications creating a seamless experience for the end user and giving the administrator a single pane of glass to manage both. Unidesk can deliver both personal and pooled desktops through the Remote Desktop Services broker. Unidesk works by virtualizing a Windows desktop s C: drive by breaking it up into a set of layers. Layers are created for the operating system, applications and desktop personalization. Each layer is encapsulated into a separate virtual disk that stores the file system and registry settings for that layer. Layers are then "merged" into a single C: drive using Unidesk s patented technology called Composite Virtualization. Using Composite Virtualization, the registry settings and file systems from each layer added to the desktop are presented as if all the files and registry settings were installed within a single C: drive on the users desktop. When using the desktop the user will see applications appropriately defined within the "C:\program files" directory structure, they will see the registry entries, and they will even see the applications underneath Programs and Features. The Unidesk Solution scales by deploying system in what is called the CacheCloud. The CacheCloud is a grid of virtual appliances that replicate operating system and application layers across an enterprise s virtual infrastructure. The appliances work together to manage the lifecycle of, not only the desktop virtual machines, but also applications. A CacheCloud is made up of the Management and CachePoint Appliances. The Management Appliance controls the solutions business logic and stores all configuration data about the environment. The CachePoints do two things: 1) They do the heavy lifting in the environment by adding and removing layers from the virtual machines and creating the boot images when a desktop is created and edited. 2) They manage the storage and replication of files within the CacheCloud. This includes the copies of layers required for the desktops to boot and operate, such as the operating system layers, any application layers and the personalization layers of all the desktops. Page 3 of 15

4 Each desktop is assigned to a particular CachePoint and therefore managed by that CachePoint. Each CachePoint manages a separate set of layer disks that are used by the desktops that the CachePoint manages. The operating system and applications layers themselves are read-only and are shared across all the desktops managed by the same CachePoint. These are the layers that get replicated across the CacheCloud environment. The personalization layer is the layer on desktops where all the writes go. Since the OS and Application layers are read only, whenever a change is made to a file in an OS or Application layer or whenever a file is written directly to a desktop, it is always placed into the personalization layer. So everything unique about a desktop is stored in the personalization layer disks. Page 4 of 15

5 Summary of Unidesk Capabilities Unidesk makes building and managing desktops extremely simple. Unidesk delivers the following significant capabilities: Desktop Provisioning Unidesk layering technology makes building virtual desktops fast and easy even if your users all require different applications and personal settings. Unidesk uses a simple wizard driven interface that is very much point and click. Each desktop or set of desktops can have their own applications while still using the same operating system layer. Application Layering There s no long list of apps that cannot be packaged with Unidesk. Our next-generation file system and registry virtualization technology starts running at the moment Windows boots, so it can package drivers, Ring 0 apps, apps with global DLL hooks, custom apps, apps that hard-code to C: drive, and anything else you can throw at us. Image Management With Unidesk s advanced layering technology, you can package any application as its own read-only, shareable virtual disk even the ones that are too hard for traditional application virtualization. This means your Windows OS layer can be kept clean. You ll finally have one true golden image that can be used as the basis for all desktops, no matter how many different desktop pools and application combinations you have. Persistent Personalization Unidesk retains all user customizations, including settings that live inside a profile, as well as documents, plug-ins, and applications that live in the Windows file system and registry. When you create a persistent desktop with Unidesk and assign it to a user, all changed settings are naturally captured in the user s local profile. All data and user-installed applications are automatically written to the desktop s Personalization layer, the writable virtual disk that is associated with each VM. When you change any of the underlying OS or Application layers, the Personalization layer remains intact, merging seamlessly with the other layers through the magic of Unidesk Composite Virtualization. Storage Optimization Our approach of virtualizing everything above the hypervisor gives you space savings as a natural side effect. Unidesk stores Windows OS and application layers as read-only virtual disks that are shared by many desktops. Instead of having 100 copies of Windows and 100 copies of Microsoft Office for 100 desktops, you only have one. That s why Unidesk layered VMs use up to 80% less space than full clones. Without a new parent VM for every pool or redo logs that grow endlessly, Unidesk is more efficient than Linked Clones and vdisks, too. Patch, Repair, Audit, Restore Unidesk allows for easy patching and repairing of desktops. Unidesk s ability to version the operating system and application layers allows an administrator to easily roll forward or roll back between versions. Repairing broken applications is extremely simple as well with layering. An administrator simply chooses the reinstall option of an application when editing a desktop and this will reset the application back to its original state without losing the application s user profile personalization. Unidesk also allows for easy auditing of desktops and layers. Administrators can easily see who made changes to a desktop or layer. Page 5 of 15

6 Architectural Overview Overview As shown in the following illustration, the Unidesk system provides the disk (or C: drive) to virtual desktops hosted in a virtual infrastructure. Administrators use the Unidesk management interface to create, manage, update, and report on the desktop virtual machines in the environment. As directed by the administrator, the Unidesk software builds, deletes, and reconfigures virtual desktops. The Management Appliance communicates with the CachePoint Appliances in the environment. The single Master CachePoint Appliance maintains a copy of every Operating System or Application layer in the environment. Each additional CachePoint Appliance manages layers for Unidesk desktops that are associated with that CachePoint. Remote Desktop Services is a set of roles within Windows Server 2012 R2 that allows end users to access a set of virtual machines running on Hyper-V. Users access the environment through a web front end that works with the connection broker to authenticate users and deliver the appropriate desktop to them. Remote Desktop Services can also securely deliver desktops by encrypting the connections with SSL over the internet. Unidesk Unidesk infrastructure consists of a set of Linux virtual appliances to manage both desktops and applications. The administrator does not need to know anything about Linux to manage the environment. The management of the environment is taken care of through the Unidesk Management Console. Desktops In Unidesk, desktops access layers through the Windows storage stack by connecting to them directly on the Hyper-V Host. Desktops are made up of both read-only and writable disks. The operating system and application layers are read- Page 6 of 15

7 only and the disks that make up the personalization layer are writable disks. Then at the core of Unidesk s Composite Virtualization is a Windows filter driver that "merges" all these layers together to form a single C: drive that the operating system and user interact with. In essence, the entire C: is virtualized. Storage In version 3.x, layers are stored as separate.vhdx files. Desktops mount these directly from the storage in a many to one fashion. Unidesk stores content in tiers. There are two tiers of storage that Unidesk uses when creating desktops. First is the Boot Image tier. This is where the virtual machines are created. This includes the virtual machine settings, the boot image and any differencing disks. The boot image is a local disk to the virtual machine. It holds three things within it: Enough of the Windows boot files to start the boot of Windows and load the Composite Virtualization drivers, the page file and a composited registry. The second tier is the CachePoint and layers. This tier contains the CachePoint appliances as well as the Operating System, Application and Personalization layers for the desktops. The virtual machines attach directly to the layers. Management Appliance The Management Appliance is a virtual appliance that coordinates all of the communication in the Unidesk environment. It includes the Management Console and the management infrastructure that controls the workflow of managing virtual desktops. Master CachePoint Appliance A special CachePoint Appliance that manages a master copy of all operating system and application layers and versions of layers in the Unidesk environment. It also manages all of the Installation Machines used to create application layers and layer versions. Secondary CachePoint Appliances A Secondary CachePoint is a virtual appliance that builds and manages a set of desktops. A Secondary CachePoint manages the copies of the operating system, application and personalization layers in use by its desktops. These copies are replicated from the Master to the Secondary. These CachePoints also handle the creation, editing, and deleting of the desktops they manage. For example, when a desktop is edited (say adding a new layer), it is the CachePoint that steps in and does the adding and removing of layers from the virtual desktop. It is also does the boot image creation of the boot disk. No I/O actually goes through the Secondary CachePoints. All disk I/O is direct from the virtual desktop to the disks that make up the layers. Page 7 of 15

8 Remote Desktop Services Remote desktop services uses a number of roles to deploy virtual desktops and grant users access to those virtual desktops. Roles such as the Connection Broker, Virtualization Host, Licensing and others work together to deliver a virtual desktop to the end user. For small environments, many of these roles can be run on a single Windows server but in larger environments, where high-availability is a concern high availability, splitting out the roles across multiple servers is recommended. Connection Broker The Connection Broker role is central to providing desktops to end users. This role is essentially the business logic behind everything else in the environment. It performs functions such as redirecting users to desktops, checking credentials, turning on desktops, Collection creation and others. The Connection Broker can be setup in a highly available configuration with a centralized SQL Server maintaining the information about the environment. Otherwise, the information is local to the Connection Broker server. Virtualization Host The Virtualization Host role is assigned to every Hyper-V server that will be hosting desktops. This is a separate role from the Hyper-V server role. The Virtualization Host is where all virtual machines are stored and run from. Web Access Web Access allows users to access their virtual desktops through a web browser. This is a web server that acts as a frontend interface to the Collections that end users have access too. A user logs in with their domain credentials which will pull up the Collections that they have access to. By clicking on the appropriate Collection, the end user is connected to a desktop in the Collection. Gateway The Gateway role is is used to encrypt the Remote Desktop Protocol. This is typically used when accessing the Remote Desktop Services environment remotely through the Internet but can also be used internally if needed. The Gateway Page 8 of 15

9 server uses a set of certificates to securely route the user connection to the appropriate desktops. It works in conjunction with the Web Access server. Licensing Licensing is critical in a Remote Desktop Services environment. Without a license, the Connection Broker will not route the user to their desktop. This role hands out licenses to either the device or the end user when they access the virtual desktops. Page 9 of 15

10 Deployment Overview Remote Desktop Services Remote Desktop Services is deployed using Server Manager. The roles can be deployed from any server in the environment as long as the administrator has added the appropriate servers to be managed in Server Manager. From within Server Manager, the administrator starts the Remote Desktop Services wizard through the Add Roles and Features. There is a specific option for Remote Desktop Services. This wizard allows the administrator to choose what server or servers will perform which role. Once the wizard is complete, the administrator can add additional roles to servers or add additional servers to the already configured roles. In many cases, some sort of load balancing should be used to provide redundancy for certain roles. Unidesk The Unidesk infrastructure is built using virtual appliances running in a Hyper-V infrastructure. The Unidesk components are deployed in the following order: 1. The Hyper-V agent 2. The Unidesk Management Appliance 3. The Unidesk Master CachePoint 4. Secondary CachePoints (if required) 5. Lastly, the Broker Agent must be deployed to the appropriate broker server. Unidesk Hyper- V Agent The Unidesk Hyper-V agent is required on every Hyper-V server that will be used to host Unidesk desktops. The first step in installing Unidesk requires the install of the agent. The Management Appliances communicates with the Hyper-V agent to send that are used for creating virtual machines, deleting virtual machines etcetera. The Unidesk Installer will install and setup communication with the Management Appliance for the first Hyper-V server you install to. However, the agent must also be installed on other Hyper-V servers. You can run the stand-alone installer from the download directory of Unidesk. When the agent installer is run, it will prompt the administrator for Management Appliance information so it can register successfully. By default, the Hyper-V Agent uses port Management Appliance The second step of the Unidesk installer is to create the Management Appliance. The Management Appliance requires information such as Name Folder Location Virtual Switch Time Zone NTP Servers IP Configuration (DHCP or Static) Once this information is provided, the installer will automatically create the Management Appliance on the Hyper-V host as a virtual machine and apply the above settings. Master CachePoint The Master CachePoint is created next. This is accomplished by using the Unidesk Management Console. First, log into the Management Console using the supplied credentials from the Unidesk Installer. Go to the System Tab and select the Settings and Configuration sub-tab. In the CachePoint Appliance Settings section, the administrator assigns the CachePoint template. From there, the administrator will create the first CachePoint in the environment and that becomes the Master CachePoint. The Create CachePoint wizard will ask for information such as: Page 10 of 15

11 Name of the Appliance Host Boot Image storage CachePoint and Layer storage IP Address information (DHCP or Static) When the information is set, the wizard will create a task in the Management Console and create the Master CachePoint. Secondary CachePoints Unidesk works as a scale-out technology. As you add hosts and storage, you also add CachePoints. CachePoints are typically associated with storage but they are virtual machines and need a host to reside on. As stated in the Hyper-V agent section, as you add more hosts, you need to install the agent. Once the agent is installed, the Create CachePoint wizard will be allowed to see and use the host and storage associated with it. To create a Secondary CachePoint, the same process is used that created the Master CachePoint. The same wizard, Create CachePoint, will now create Secondarie CachePoints, requesting the same information as before. Broker Agent The Broker Agent is required on a broker controller to facilitate communication between the Management Appliance and the broker. This agent is included in the base download of Unidesk. The default port used is The administrator simply runs the installer to install and configure the agent. Once the agent is installed, the administrator then uses the Unidesk Management Console to configure the connection to the broker. This is done in the System tab under Settings and Configuration. Directory Junction To finish configuring the Unidesk environment, you must create a Directory Junction to an Active Directory domain. This allows the Unidesk administrator, when creating Collections and desktops, to specify what user or group is associated with the Collections and desktops. For example, if the administrator creates a Persistent Collection they would specify the users or group of users that would be able to be assigned desktops during the create desktop process. To create a Directory Junction, in the Unidesk Management Console, go to the Users tab and the Directory Service subtab. Then, run the Create Directory Junction wizard to create a read-only connection to the Active Directory domain. Many junctions can be created to different domains and different Organizational Units. Certain information is required when running the wizard: Directory Junction name (can be anything) Server address (can be FQDN of the domain) Port used and whether SSL is required to connect to the domain controllers User account and password used to access the domain (requires read rights to the domain) Distinguished Name: This is either specified as the top level of the domain or specified down to the Organizational Unit level where user accounts and groups are located by using the provided dropdown box. NetBIOS Name of the domain Folder Location: Where in the Unidesk folder hierarchy will this Directory Junction be located. Once the information is filled out, the Junction can be created. Operating System Layer The operating system layer is critical to any Unidesk deployment. It is the basis upon which application layers and desktops are created. The recommended way to create an operating system layer is to create a virtual machine and install Windows onto it. The Windows operating system should follow these best practices: Install Windows straight from ISO. Do not try to reuse an existing image. Page 11 of 15

12 Update the Microsoft Integration Services if the operating system is Windows 7. Update Windows with all available Windows Updates Do not join Windows to a domain Do not run any outside optimizations on Windows Once you have Windows installed, it is time to prepare the Operating System. There is a set of Gold Image tools in the download of Unidesk that will help you to do this. Extract the Gold Image tools to the default location. Use File Explorer to browse to that location and run the Unattend.exe as an administrator. This utility creates the required Unattend.xml file that is used to automate the build process of the desktops. When desktops are built in Unidesk, the Windows minisetup process is invoked and if the Unattend.xml file is not there or properly configured, the setup will stop and ask questions. This utility will prevent that. Once the Unattend.xml is created, it is time to run the Optimize.exe as an administrator. This utility allows you to select and deselect which optimizations to run within Windows. The optimizations are based on best practices collected from a variety of resources. Once you've selected which ones you would like to apply, you save the selections. Next, run the newly created Optimizations.cmd file as an Administrator. This will optimize the base image so that when creating application layers the operating system layer will be in the same state as the desktops when they are created. The last portion of preparing Windows is to run the setup executable so that the Unidesk image prep tools are installed and the virtual machine is registered with the Management Appliance. The executable will be located in the same directory that was extracted earlier. Once this is done, the virtual machine can be shut down. It is now ready for import. To import the operating system of the virtual machine you must use the Unidesk Management Console. Once that is opened go to the Layers tab and select OS Layers. The Create OS Layer will start the process of importing the operating system. The wizard will ask for three mandatory things: Operating system layer name Version Gold Image: The dropdown box will show the name of the virtual machine that you ran the Image Prep tools on earlier when finishing the operating system. The rest of the fields are optional Once you complete the wizard, a task is created to import the operating system from the virtual machine. Installation Machines Installation Machines are used to create and add versions to applications and operating system layers. These are virtual machines specifically set aside for this task. They are also reusable. This means that an Installation Machine is not tied to any specific application or version of application. To create an Installation Machine, in the Management Console, go to System and then select Installation Machines. The Create Installation Machine wizard will create the virtual machines. Simply fill in the required fields and the Installation Machine will be created. Collections Unidesk Collections are groups of virtual desktops in the Unidesk Management Console. When a Collection is created, the administrator can specify whether a Collection is tied to a particular broker or none at all. Persistence and Non- Persistence is also specified when creating a Collection. When tied to a broker, Unidesk Collections become the equivalent of a Remote Desktop Services Collection. When the first set of virtual desktops are created for a particular Collection, Unidesk will automatically create a Remote Desktop Collection with the same name. Entitlements are also selected during the Collection creation. All desktops are created within a Collection. There can be multiple Collections. If the Collection is Persistent then during the desktop creation process the administrator specifies which users are assigned to desktops. The users available to the Page 12 of 15

13 Create Desktop wizard were specified during Collection creation (Entitlements). This is not required for Non-Persistent Desktops. If a desktop is created in a Collection that is tied to a broker, then when the desktop is created, it is automatically assigned to the broker and any user entitlement as well. Conclusion With the infrastructure in place, the administrator can now create application layers and deploy desktops. Using Unidesk and Remote Desktop Services together gives administrators an easy to setup infrastructure and easy, single pane of glass management of desktops and applications. The two together deliver a seamless experience to end users whether the desktops are personal or pooled. Page 13 of 15

14 References Glossary of Unidesk terms The following table provides definitions of terms that are specific to the Unidesk product. Unidesk Term Application Layer Definition A container or layer that includes an application or set of applications that you can assign to a hosted virtual desktop. CacheCloud A grid of virtual appliances that replicate operating system, application, and user workspace layers across an enterprise network. The environment uses the Unidesk Composite Virtualization technology to synthesize the layers into complete, personalized desktops. CachePoint Appliance Desktop A virtual appliance that manages the layers and virtual desktops that you deploy to end users. A hosted virtual machine that is a local composite of the layers assigned to it and a Personalization Layer that contains all specific desktop information including a user's personalized data, settings, and applications. Operating System Layer A container or layer that includes an operating system that you can assign to a hosted virtual desktop. Gold Image A virtual machine configured with an operating system and any desired applications that, when imported into Unidesk, creates the Operating System Layer. Installation Machine A special type of virtual machine that acts as a staging area for the creation of Application Layers as well as versions of Operating System and Application Layers. Management Appliance A virtual appliance that coordinates all of the communication in the Unidesk environment. It includes the Management Console and the management infrastructure that controls the workflow of managing virtual desktops. Management Console The Web-based management console that allows you to manage all of the components in the Unidesk environment. This console is accessed from the Management Appliance. Page 14 of 15

15 Master CachePoint Appliance A special CachePoint Appliance that hosts a copy of all layers and versions of layers in the Unidesk environment. It also manages all of the Installation Machines used to create Operating System Layers and layer versions. Operating System Layer A shared container or layer that includes the Operating System that you can assign to hosted virtual desktops. A desktop is a composite of an Operating System Layer and several Application Layers. Personalization Layer A unique container or layer that stores all of a desktop s specific information including the user's personalized content. Page 15 of 15

Integration Guide: Using Unidesk 3.x with Citrix XenDesktop

Integration Guide: Using Unidesk 3.x with Citrix XenDesktop TECHNICAL WHITE PAPER Integration Guide: Using Unidesk 3.x with Citrix XenDesktop This document provides a high- level overview of the Unidesk product as well as design considerations for deploying Unidesk

More information

Provisioning Server Service Template

Provisioning Server Service Template Provisioning Server Service Template Provisioning Server 7.1 Service Template Technology Preview for System Center - Virtual Machine Manager The Citrix Provisioning Server System Center - Virtual Machine

More information

XenDesktop Service Template

XenDesktop Service Template XenDesktop Service Template XenDesktop 7.1 Service Template Technology Preview for System Center Virtual Machine Manager The Citrix XenDesktop System Center - Virtual Machine Manager (VMM) Service Template

More information

Preparing a Windows 7 Gold Image for Unidesk

Preparing a Windows 7 Gold Image for Unidesk Preparing a Windows 7 Gold Image for Unidesk What is a Unidesk gold image? In Unidesk, a gold image is, essentially, a virtual machine that contains the base operating system and usually, not much more

More information

PHD Virtual Backup for Hyper-V

PHD Virtual Backup for Hyper-V PHD Virtual Backup for Hyper-V version 7.0 Installation & Getting Started Guide Document Release Date: December 18, 2013 www.phdvirtual.com PHDVB v7 for Hyper-V Legal Notices PHD Virtual Backup for Hyper-V

More information

Managing Multi-Hypervisor Environments with vcenter Server

Managing Multi-Hypervisor Environments with vcenter Server Managing Multi-Hypervisor Environments with vcenter Server vcenter Server 5.1 vcenter Multi-Hypervisor Manager 1.0 This document supports the version of each product listed and supports all subsequent

More information

Connection Broker Managing User Connections to Workstations, Blades, VDI, and More. Quick Start with Microsoft Hyper-V

Connection Broker Managing User Connections to Workstations, Blades, VDI, and More. Quick Start with Microsoft Hyper-V Connection Broker Managing User Connections to Workstations, Blades, VDI, and More Quick Start with Microsoft Hyper-V Version 8.1 October 21, 2015 Contacting Leostream Leostream Corporation http://www.leostream.com

More information

Quick Start Guide for VMware and Windows 7

Quick Start Guide for VMware and Windows 7 PROPALMS VDI Version 2.1 Quick Start Guide for VMware and Windows 7 Rev. 1.1 Published: JULY-2011 1999-2011 Propalms Ltd. All rights reserved. The information contained in this document represents the

More information

Installation Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.

Installation Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft. . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Deploy is a trademark owned by Specops Software. All

More information

SA Citrix Virtual Desktop Infrastructure (VDI) Configuration Guide

SA Citrix Virtual Desktop Infrastructure (VDI) Configuration Guide SA Citrix Virtual Desktop Infrastructure (VDI) Configuration Guide Published July 2015 This document covers steps to configure Citrix VDI on Pulse Secure s SA Series SSL VPN platforms. It also covers brief

More information

Storage Sync for Hyper-V. Installation Guide for Microsoft Hyper-V

Storage Sync for Hyper-V. Installation Guide for Microsoft Hyper-V Installation Guide for Microsoft Hyper-V Egnyte Inc. 1890 N. Shoreline Blvd. Mountain View, CA 94043, USA Phone: 877-7EGNYTE (877-734-6983) www.egnyte.com 2013 by Egnyte Inc. All rights reserved. Revised

More information

CITRIX 1Y0-A14 EXAM QUESTIONS & ANSWERS

CITRIX 1Y0-A14 EXAM QUESTIONS & ANSWERS CITRIX 1Y0-A14 EXAM QUESTIONS & ANSWERS Number: 1Y0-A14 Passing Score: 800 Time Limit: 90 min File Version: 42.2 http://www.gratisexam.com/ CITRIX 1Y0-A14 EXAM QUESTIONS & ANSWERS Exam Name: Implementing

More information

uh6 efolder BDR Guide for Veeam Page 1 of 36

uh6 efolder BDR Guide for Veeam Page 1 of 36 efolder BDR for Veeam Hyper-V Continuity Cloud Guide Setup Continuity Cloud Import Backup Copy Job Restore Your VM uh6 efolder BDR Guide for Veeam Page 1 of 36 INTRODUCTION Thank you for choosing the efolder

More information

Installing and Configuring vcenter Multi-Hypervisor Manager

Installing and Configuring vcenter Multi-Hypervisor Manager Installing and Configuring vcenter Multi-Hypervisor Manager vcenter Server 5.1 vcenter Multi-Hypervisor Manager 1.1 This document supports the version of each product listed and supports all subsequent

More information

How to Test Out Backup & Replication 6.5 for Hyper-V

How to Test Out Backup & Replication 6.5 for Hyper-V How to Test Out Backup & Replication 6.5 for Hyper-V Mike Resseler May, 2013 2013 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication

More information

SA Citrix Virtual Desktop Infrastructure (VDI) Configuration Guide

SA Citrix Virtual Desktop Infrastructure (VDI) Configuration Guide SA Citrix Virtual Desktop Infrastructure (VDI) Configuration Guide This document covers steps to configure Citrix VDI on Juniper Network s SA Series SSL VPN platforms. It also covers brief overview of

More information

ReadyRECOVER. Reviewer s Guide. A joint backup solution between NETGEAR ReadyDATA and StorageCraft ShadowProtect

ReadyRECOVER. Reviewer s Guide. A joint backup solution between NETGEAR ReadyDATA and StorageCraft ShadowProtect ReadyRECOVER Reviewer s Guide A joint backup solution between NETGEAR ReadyDATA and StorageCraft ShadowProtect Table of Contents NETGEAR Contact Info... 3 Product Category... 3 Overview... 3 ReadyRECOVER...

More information

VMware vsphere Data Protection Evaluation Guide REVISED APRIL 2015

VMware vsphere Data Protection Evaluation Guide REVISED APRIL 2015 VMware vsphere Data Protection REVISED APRIL 2015 Table of Contents Introduction.... 3 Features and Benefits of vsphere Data Protection... 3 Requirements.... 4 Evaluation Workflow... 5 Overview.... 5 Evaluation

More information

WhatsUp Gold v16.3 Installation and Configuration Guide

WhatsUp Gold v16.3 Installation and Configuration Guide WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard

More information

Thinspace deskcloud. Quick Start Guide

Thinspace deskcloud. Quick Start Guide Thinspace deskcloud Quick Start Guide Version 1.2 Published: SEP-2014 Updated: 16-SEP-2014 2014 Thinspace Technology Ltd. All rights reserved. The information contained in this document represents the

More information

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0 White Paper Enterprise File Serving 2.0 Anywhere, Any Device File Access with IT in Control Like it or not, cloud- based file sharing services have opened up a new world of mobile file access and collaborative

More information

Unitrends Virtual Backup Installation Guide Version 8.0

Unitrends Virtual Backup Installation Guide Version 8.0 Unitrends Virtual Backup Installation Guide Version 8.0 Release June 2014 7 Technology Circle, Suite 100 Columbia, SC 29203 Phone: 803.454.0300 Contents Chapter 1 Getting Started... 1 Version 8 Architecture...

More information

Deploying Remote Desktop Connection Broker with High Availability Step-by-Step Guide

Deploying Remote Desktop Connection Broker with High Availability Step-by-Step Guide Deploying Remote Desktop Connection Broker with High Availability Step-by-Step Guide Microsoft Corporation Published: May 2010 Abstract This guide describes the steps for configuring Remote Desktop Connection

More information

Foglight. Foglight for Virtualization, Free Edition 6.5.2. Installation and Configuration Guide

Foglight. Foglight for Virtualization, Free Edition 6.5.2. Installation and Configuration Guide Foglight Foglight for Virtualization, Free Edition 6.5.2 Installation and Configuration Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright.

More information

Deploying System Center 2012 R2 Configuration Manager

Deploying System Center 2012 R2 Configuration Manager Deploying System Center 2012 R2 Configuration Manager This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT.

More information

Virtual Appliances. Virtual Appliances: Setup Guide for Umbrella on VMWare and Hyper-V. Virtual Appliance Setup Guide for Umbrella Page 1

Virtual Appliances. Virtual Appliances: Setup Guide for Umbrella on VMWare and Hyper-V. Virtual Appliance Setup Guide for Umbrella Page 1 Virtual Appliances Virtual Appliances: Setup Guide for Umbrella on VMWare and Hyper-V Virtual Appliance Setup Guide for Umbrella Page 1 Table of Contents Overview... 3 Prerequisites... 4 Virtualized Server

More information

Citrix XenServer Workload Balancing 6.5.0 Quick Start. Published February 2015 1.0 Edition

Citrix XenServer Workload Balancing 6.5.0 Quick Start. Published February 2015 1.0 Edition Citrix XenServer Workload Balancing 6.5.0 Quick Start Published February 2015 1.0 Edition Citrix XenServer Workload Balancing 6.5.0 Quick Start Copyright 2015 Citrix Systems. Inc. All Rights Reserved.

More information

It should be noted that the installer will delete any existing partitions on your disk in order to install the software required to use BLËSK.

It should be noted that the installer will delete any existing partitions on your disk in order to install the software required to use BLËSK. Installation Guide Introduction... 3 1. Booting from the CD... 4 2. Choose the server type to install... 5 3. Disk formatting and installation... 6 4. Confirmation of disk formatting... 7 5. Program installation...

More information

Synchronizer Installation

Synchronizer Installation Synchronizer Installation Synchronizer Installation Synchronizer Installation This document provides instructions for installing Synchronizer. Synchronizer performs all the administrative tasks for XenClient

More information

Quick Start Guide for Parallels Virtuozzo

Quick Start Guide for Parallels Virtuozzo PROPALMS VDI Version 2.1 Quick Start Guide for Parallels Virtuozzo Rev. 1.1 Published: JULY-2011 1999-2011 Propalms Ltd. All rights reserved. The information contained in this document represents the current

More information

Installing and Configuring vcloud Connector

Installing and Configuring vcloud Connector Installing and Configuring vcloud Connector vcloud Connector 2.7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

Active Directory integration with CloudByte ElastiStor

Active Directory integration with CloudByte ElastiStor Active Directory integration with CloudByte ElastiStor Prerequisite Change the time and the time zone of the Active Directory Server to the VSM time and time zone. Enabling Active Directory at VSM level

More information

Deploying Windows Streaming Media Servers NLB Cluster and metasan

Deploying Windows Streaming Media Servers NLB Cluster and metasan Deploying Windows Streaming Media Servers NLB Cluster and metasan Introduction...................................................... 2 Objectives.......................................................

More information

NETWRIX USER ACTIVITY VIDEO REPORTER

NETWRIX USER ACTIVITY VIDEO REPORTER NETWRIX USER ACTIVITY VIDEO REPORTER ADMINISTRATOR S GUIDE Product Version: 1.0 January 2013. Legal Notice The information in this publication is furnished for information use only, and does not constitute

More information

VELOCITY. Quick Start Guide. Citrix XenServer Hypervisor. Server Mode (Single-Interface Deployment) Before You Begin SUMMARY OF TASKS

VELOCITY. Quick Start Guide. Citrix XenServer Hypervisor. Server Mode (Single-Interface Deployment) Before You Begin SUMMARY OF TASKS If you re not using Citrix XenCenter 6.0, your screens may vary. VELOCITY REPLICATION ACCELERATOR Citrix XenServer Hypervisor Server Mode (Single-Interface Deployment) 2013 Silver Peak Systems, Inc. This

More information

Virtual Web Appliance Setup Guide

Virtual Web Appliance Setup Guide Virtual Web Appliance Setup Guide 2 Sophos Installing a Virtual Appliance Installing a Virtual Appliance This guide describes the procedures for installing a Virtual Web Appliance. If you are installing

More information

WatchGuard Dimension v1.1 Update 1 Release Notes

WatchGuard Dimension v1.1 Update 1 Release Notes WatchGuard Dimension v1.1 Update 1 Release Notes Build Number 442674 Revision Date March 25, 2014 WatchGuard Dimension is the next-generation cloud-ready visibility solution for our Unified Threat Management

More information

XenDesktop Implementation Guide

XenDesktop Implementation Guide Consulting Solutions WHITE PAPER Citrix XenDesktop XenDesktop Implementation Guide Pooled Desktops (Local and Remote) www.citrix.com Contents Contents... 2 Overview... 4 Initial Architecture... 5 Installation

More information

5nine Hyper-V Commander

5nine Hyper-V Commander 5nine Hyper-V Commander 5nine Hyper-V Commander provides a local graphical user interface (GUI), and a Framework to manage Hyper-V R2 server and various functions such as Backup/DR, HA and P2V/V2V. It

More information

WatchGuard Training. Introduction to WatchGuard Dimension

WatchGuard Training. Introduction to WatchGuard Dimension WatchGuard Training Introduction to WatchGuard Dimension Introduction to WatchGuard Dimension What is WatchGuard Dimension? Deploy WatchGuard Dimension Configure WatchGuard Dimension Use WatchGuard Dimension

More information

Required Virtual Interface Maps to... mgmt0. virtual network = mgmt0 wan0. virtual network = wan0 mgmt1. network adapter not connected lan0

Required Virtual Interface Maps to... mgmt0. virtual network = mgmt0 wan0. virtual network = wan0 mgmt1. network adapter not connected lan0 VXOA VIRTUAL APPLIANCES Microsoft Hyper-V Hypervisor Router Mode (Out-of-Path Deployment) 2013 Silver Peak Systems, Inc. Assumptions Windows 2008 server is installed and Hyper-V server is running. This

More information

Virtualizing your Datacenter

Virtualizing your Datacenter Virtualizing your Datacenter with Windows Server 2012 R2 & System Center 2012 R2 Part 2 Hands-On Lab Step-by-Step Guide For the VMs the following credentials: Username: Contoso\Administrator Password:

More information

2XApplication Server XG v10.1

2XApplication Server XG v10.1 2XApplication Server XG v10.1 Introduction 1 URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples herein are

More information

IT-ADVENTURES PLAYGROUND (ISERINK) Remote Setup Guide IOWA STATE UNIVERSITY INFORMATION ASSURANCE CENTER

IT-ADVENTURES PLAYGROUND (ISERINK) Remote Setup Guide IOWA STATE UNIVERSITY INFORMATION ASSURANCE CENTER IT-ADVENTURES PLAYGROUND (ISERINK) Remote Setup Guide IOWA STATE UNIVERSITY INFORMATION ASSURANCE CENTER Spring 2014 Gaining access to your systems Since ISERink runs on a simulated internet provided by

More information

BlackBerry Enterprise Service 10. Version: 10.2. Configuration Guide

BlackBerry Enterprise Service 10. Version: 10.2. Configuration Guide BlackBerry Enterprise Service 10 Version: 10.2 Configuration Guide Published: 2015-02-27 SWD-20150227164548686 Contents 1 Introduction...7 About this guide...8 What is BlackBerry Enterprise Service 10?...9

More information

AUTOMATED DISASTER RECOVERY SOLUTION USING AZURE SITE RECOVERY FOR FILE SHARES HOSTED ON STORSIMPLE

AUTOMATED DISASTER RECOVERY SOLUTION USING AZURE SITE RECOVERY FOR FILE SHARES HOSTED ON STORSIMPLE AUTOMATED DISASTER RECOVERY SOLUTION USING AZURE SITE RECOVERY FOR FILE SHARES HOSTED ON STORSIMPLE Copyright This document is provided "as-is." Information and views expressed in this document, including

More information

MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # 70-643)

MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # 70-643) MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # 70-643) Chapter Four Windows Server 2008 Remote Desktop Services, Part 1 Objectives Describe the Remote Desktop

More information

Load Balancing Microsoft Sharepoint 2010 Load Balancing Microsoft Sharepoint 2013. Deployment Guide

Load Balancing Microsoft Sharepoint 2010 Load Balancing Microsoft Sharepoint 2013. Deployment Guide Load Balancing Microsoft Sharepoint 2010 Load Balancing Microsoft Sharepoint 2013 Deployment Guide rev. 1.4.2 Copyright 2015 Loadbalancer.org, Inc. 1 Table of Contents About this Guide... 3 Appliances

More information

VMware vsphere Data Protection 6.0

VMware vsphere Data Protection 6.0 VMware vsphere Data Protection 6.0 TECHNICAL OVERVIEW REVISED FEBRUARY 2015 Table of Contents Introduction.... 3 Architectural Overview... 4 Deployment and Configuration.... 5 Backup.... 6 Application

More information

NETWRIX EVENT LOG MANAGER

NETWRIX EVENT LOG MANAGER NETWRIX EVENT LOG MANAGER ADMINISTRATOR S GUIDE Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment

More information

Connection Broker Managing User Connections to Workstations, Blades, VDI, and More. Quick Start with Citrix XenDesktop, XenServer & XenApp

Connection Broker Managing User Connections to Workstations, Blades, VDI, and More. Quick Start with Citrix XenDesktop, XenServer & XenApp Connection Broker Managing User Connections to Workstations, Blades, VDI, and More Quick Start with Citrix XenDesktop, XenServer & XenApp Version 8.0 December 9, 2014 Contacting Leostream Leostream Corporation

More information

2XApplication Server XG v10.6

2XApplication Server XG v10.6 2XApplication Server XG v10.6 Introduction 1 URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples herein are

More information

NETWRIX EVENT LOG MANAGER

NETWRIX EVENT LOG MANAGER NETWRIX EVENT LOG MANAGER QUICK-START GUIDE FOR THE ENTERPRISE EDITION Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not

More information

System Administration Training Guide. S100 Installation and Site Management

System Administration Training Guide. S100 Installation and Site Management System Administration Training Guide S100 Installation and Site Management Table of contents System Requirements for Acumatica ERP 4.2... 5 Learning Objects:... 5 Web Browser... 5 Server Software... 5

More information

Team Foundation Server 2013 Installation Guide

Team Foundation Server 2013 Installation Guide Team Foundation Server 2013 Installation Guide Page 1 of 164 Team Foundation Server 2013 Installation Guide Benjamin Day benday@benday.com v1.1.0 May 28, 2014 Team Foundation Server 2013 Installation Guide

More information

Remote Application Server Version 14. Last updated: 06-02-15

Remote Application Server Version 14. Last updated: 06-02-15 Remote Application Server Version 14 Last updated: 06-02-15 Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise

More information

WHITE PAPER Citrix Secure Gateway Startup Guide

WHITE PAPER Citrix Secure Gateway Startup Guide WHITE PAPER Citrix Secure Gateway Startup Guide www.citrix.com Contents Introduction... 2 What you will need... 2 Preparing the environment for Secure Gateway... 2 Installing a CA using Windows Server

More information

13.1 Backup virtual machines running on VMware ESXi / ESX Server

13.1 Backup virtual machines running on VMware ESXi / ESX Server 13 Backup / Restore VMware Virtual Machines Tomahawk Pro This chapter describes how to backup and restore virtual machines running on VMware ESX, ESXi Server or VMware Server 2.0. 13.1 Backup virtual machines

More information

The Definitive Guide to Desktop Layering

The Definitive Guide to Desktop Layering INDUSTRY INSIGHTS The Definitive Guide to Desktop Layering Gartner recently compared four methods of delivering applications in Virtual Desktop Infrastructure (VDI) and found application layering to be

More information

App Orchestration 2.5

App Orchestration 2.5 Configuring NetScaler 10.5 Load Balancing with StoreFront 2.5.2 and NetScaler Gateway for Prepared by: James Richards Last Updated: August 20, 2014 Contents Introduction... 3 Configure the NetScaler load

More information

F-Secure Messaging Security Gateway. Deployment Guide

F-Secure Messaging Security Gateway. Deployment Guide F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4

More information

Virtual Managment Appliance Setup Guide

Virtual Managment Appliance Setup Guide Virtual Managment Appliance Setup Guide 2 Sophos Installing a Virtual Appliance Installing a Virtual Appliance As an alternative to the hardware-based version of the Sophos Web Appliance, you can deploy

More information

MN-700 Base Station Configuration Guide

MN-700 Base Station Configuration Guide MN-700 Base Station Configuration Guide Contents pen the Base Station Management Tool...3 Log ff the Base Station Management Tool...3 Navigate the Base Station Management Tool...4 Current Base Station

More information

Citrix XenServer 6 Administration

Citrix XenServer 6 Administration Citrix XenServer 6 Administration CTX-XS06 DESCRIZIONE: In this Citrix XenServer 6.0 training course, you will gain the foundational knowledge necessary to effectively install, configure, administer, and

More information

App Orchestration 2.0

App Orchestration 2.0 App Orchestration 2.0 Integrated Provisioning Deployment Guide Prepared by: Nicholas Ceballos Commissioning Editor: Linda Belliveau Version: 6.0 Last Updated: December 12, 2013 Page 1 Contents Integrated

More information

Netwrix Auditor. Administrator's Guide. Version: 7.1 10/30/2015

Netwrix Auditor. Administrator's Guide. Version: 7.1 10/30/2015 Netwrix Auditor Administrator's Guide Version: 7.1 10/30/2015 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from Netwrix Corporation

More information

Virtual Dashboard for VMware and Hyper-V

Virtual Dashboard for VMware and Hyper-V Virtual Dashboard for VMware and Hyper-V USER MANUAL Steelgate Technologies, February 2015, all rights reserved. All trademarks are the property of their respective owners. Features and specifications

More information

DocAve 6 Service Pack 1

DocAve 6 Service Pack 1 DocAve 6 Service Pack 1 Installation Guide Revision C Issued September 2012 1 Table of Contents About the Installation Guide... 4 Submitting Documentation Feedback to AvePoint... 4 Before You Begin...

More information

High Availability for Desktop Virtualization

High Availability for Desktop Virtualization WHITE PAPER Citrix XenDesktop High Availability for Desktop Virtualization How to provide a comprehensive, end-to-end highavailability strategy for desktop virtualization. www.citrix.com Contents Contents...

More information

Team Foundation Server 2010, Visual Studio Ultimate 2010, Team Build 2010, & Lab Management Beta 2 Installation Guide

Team Foundation Server 2010, Visual Studio Ultimate 2010, Team Build 2010, & Lab Management Beta 2 Installation Guide Page 1 of 243 Team Foundation Server 2010, Visual Studio Ultimate 2010, Team Build 2010, & Lab Management Beta 2 Installation Guide (This is an alpha version of Benjamin Day Consulting, Inc. s installation

More information

Accops HyWorks v2.5. Quick Start Guide. Last Update: 4/18/2016

Accops HyWorks v2.5. Quick Start Guide. Last Update: 4/18/2016 Accops HyWorks v2.5 Quick Start Guide Last Update: 4/18/2016 2016 Propalms Technologies Pvt. Ltd. All rights reserved. The information contained in this document represents the current view of Propalms

More information

GX-V. Quick Start Guide. Microsoft Hyper-V Hypervisor. Before You Begin SUMMARY OF TASKS. Before You Begin WORKSHEET VIRTUAL GMS SERVER

GX-V. Quick Start Guide. Microsoft Hyper-V Hypervisor. Before You Begin SUMMARY OF TASKS. Before You Begin WORKSHEET VIRTUAL GMS SERVER Quick Start Guide GX-V VIRTUAL GMS SERVER Microsoft Hyper-V Hypervisor 2012 Silver Peak Systems, Inc. Before You Begin Windows 2008 server installed and Hyper-V is running Hyper-V management software is

More information

Step-by-Step Guide to Designing School Labs with VMware View STEP-BY-STEP GUIDE

Step-by-Step Guide to Designing School Labs with VMware View STEP-BY-STEP GUIDE Step-by-Step Guide to Designing School Labs with VMware View STEP-BY-STEP GUIDE Table of Contents Introduction... 3 VMware View 4.5: A Brief Recap.... 3 Starting Point: Defining a Use Case.... 4 Preparing

More information

Cloud Services for Backup Exec. Planning and Deployment Guide

Cloud Services for Backup Exec. Planning and Deployment Guide Cloud Services for Backup Exec Planning and Deployment Guide Chapter 1 Introducing Cloud Services for Backup Exec This chapter includes the following topics: About Cloud Services for Backup Exec Security

More information

Remote Application Server Version 14. Last updated: 25-02-15

Remote Application Server Version 14. Last updated: 25-02-15 Remote Application Server Version 14 Last updated: 25-02-15 Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise

More information

Backup & Disaster Recovery Appliance User Guide

Backup & Disaster Recovery Appliance User Guide Built on the Intel Hybrid Cloud Platform Backup & Disaster Recovery Appliance User Guide Order Number: G68664-001 Rev 1.0 June 22, 2012 Contents Registering the BDR Appliance... 4 Step 1: Register the

More information

Online Backup Client User Manual Linux

Online Backup Client User Manual Linux Online Backup Client User Manual Linux 1. Product Information Product: Online Backup Client for Linux Version: 4.1.7 1.1 System Requirements Operating System Linux (RedHat, SuSE, Debian and Debian based

More information

Barracuda Message Archiver Vx Deployment. Whitepaper

Barracuda Message Archiver Vx Deployment. Whitepaper Barracuda Message Archiver Vx Deployment Whitepaper Document Scope This document provides guidance on designing and deploying Barracuda Message Archiver Vx on VMware vsphere Document Scope, and Microsoft

More information

vtcommander Installing and Starting vtcommander

vtcommander Installing and Starting vtcommander vtcommander vtcommander provides a local graphical user interface (GUI) to manage Hyper-V R2 server. It supports Hyper-V technology on full and core installations of Windows Server 2008 R2 as well as on

More information

Team Foundation Server 2012 Installation Guide

Team Foundation Server 2012 Installation Guide Team Foundation Server 2012 Installation Guide Page 1 of 143 Team Foundation Server 2012 Installation Guide Benjamin Day benday@benday.com v1.0.0 November 15, 2012 Team Foundation Server 2012 Installation

More information

Shavlik Patch for Microsoft System Center

Shavlik Patch for Microsoft System Center Shavlik Patch for Microsoft System Center User s Guide For use with Microsoft System Center Configuration Manager 2012 Copyright and Trademarks Copyright Copyright 2014 Shavlik. All rights reserved. This

More information

User Guide Online Backup

User Guide Online Backup User Guide Online Backup Table of contents Table of contents... 1 Introduction... 2 Adding the Online Backup Service to your Account... 2 Getting Started with the Online Backup Software... 4 Downloading

More information

Virtual Data Centre. User Guide

Virtual Data Centre. User Guide Virtual Data Centre User Guide 2 P age Table of Contents Getting Started with vcloud Director... 8 1. Understanding vcloud Director... 8 2. Log In to the Web Console... 9 3. Using vcloud Director... 10

More information

vcloud Director User's Guide

vcloud Director User's Guide vcloud Director 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of

More information

App Orchestration 2.0

App Orchestration 2.0 App Orchestration 2.0 Configuring NetScaler Load Balancing and NetScaler Gateway for App Orchestration Prepared by: Christian Paez Version: 1.0 Last Updated: December 13, 2013 2013 Citrix Systems, Inc.

More information

VMware Virtual Desktop Manager User Authentication Guide

VMware Virtual Desktop Manager User Authentication Guide Technical Note VMware Virtual Desktop Manager User Authentication Guide VMware Virtual Desktop Manager The purpose of this guide is to provide details of user authentication in VMware Virtual Desktop Manager

More information

System Protection for Hyper-V Whitepaper

System Protection for Hyper-V Whitepaper Whitepaper Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 Hyper-V requirements... 2 Definitions... 3 Considerations... 3 2. About the BackupAssist Hyper-V solution... 4 Advantages... 4

More information

Zerto Virtual Manager Administration Guide

Zerto Virtual Manager Administration Guide Zerto Virtual Manager Administration Guide AWS Environment ZVR-ADVA-4.0U2-01-23-07-15 Copyright 2015, Zerto Ltd. All rights reserved. Information in this document is subject to change without notice and

More information

RSA Authentication Manager 8.1 Virtual Appliance Getting Started

RSA Authentication Manager 8.1 Virtual Appliance Getting Started RSA Authentication Manager 8.1 Virtual Appliance Getting Started Thank you for purchasing RSA Authentication Manager 8.1, the world s leading two-factor authentication solution. This document provides

More information

NovaBACKUP xsp Version 15.0 Upgrade Guide

NovaBACKUP xsp Version 15.0 Upgrade Guide NovaBACKUP xsp Version 15.0 Upgrade Guide NovaStor / November 2013 2013 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject

More information

Citrix Desktop Virtualization Fast Track

Citrix Desktop Virtualization Fast Track Citrix Desktop Virtualization Fast Track Description: Days: 5 Prerequisites: This fast-paced course provides the foundation necessary for students to effectively centralize and manage desktops and applications

More information

NovaBACKUP Virtual Dashboard

NovaBACKUP Virtual Dashboard NovaBACKUP Virtual Dashboard User Manual NovaStor / April 2015 2015 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to

More information

RSA Authentication Manager 8.1 Setup and Configuration Guide. Revision 2

RSA Authentication Manager 8.1 Setup and Configuration Guide. Revision 2 RSA Authentication Manager 8.1 Setup and Configuration Guide Revision 2 Contact Information Go to the RSA corporate website for regional Customer Support telephone and fax numbers: www.emc.com/domains/rsa/index.htm

More information

VMware vsphere Data Protection 5.8 TECHNICAL OVERVIEW REVISED AUGUST 2014

VMware vsphere Data Protection 5.8 TECHNICAL OVERVIEW REVISED AUGUST 2014 VMware vsphere Data Protection 5.8 TECHNICAL OVERVIEW REVISED AUGUST 2014 Table of Contents Introduction.... 3 Features and Benefits of vsphere Data Protection... 3 Additional Features and Benefits of

More information

Introducing ZENworks 11 SP4. Experience Added Value and Improved Capabilities. Article. Article Reprint. www.novell.com. Endpoint Management

Introducing ZENworks 11 SP4. Experience Added Value and Improved Capabilities. Article. Article Reprint. www.novell.com. Endpoint Management Introducing ZENworks 11 SP4 Experience Added Value and Improved Capabilities Article Article Reprint Endpoint Management Endpoint Management Article Introducing ZENworks 11 SP4 Addressing Key Usability

More information

NETFORT LANGUARDIAN INSTALLING LANGUARDIAN ON MICROSOFT HYPER V

NETFORT LANGUARDIAN INSTALLING LANGUARDIAN ON MICROSOFT HYPER V NETFORT LANGUARDIAN INSTALLING LANGUARDIAN ON MICROSOFT HYPER V Instructions apply to installs on Windows Server 2012 R2 Before you begin When deployed in a Hyper V environment, LANGuardian will capture

More information

vsphere Replication for Disaster Recovery to Cloud

vsphere Replication for Disaster Recovery to Cloud vsphere Replication for Disaster Recovery to Cloud vsphere Replication 6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced

More information

Hyper-V Protection. User guide

Hyper-V Protection. User guide Hyper-V Protection User guide Contents 1. Hyper-V overview... 2 Documentation... 2 Licensing... 2 Hyper-V requirements... 2 2. Hyper-V protection features... 3 Windows 2012 R1/R2 Hyper-V support... 3 Custom

More information

PDFDumps. http://www.pdfdumps.com. PDFDumps can solve all your IT exam problems and broaden your knowledge

PDFDumps. http://www.pdfdumps.com. PDFDumps can solve all your IT exam problems and broaden your knowledge PDFDumps http://www.pdfdumps.com PDFDumps can solve all your IT exam problems and broaden your knowledge Exam : 1Y0-A14 Title : Implementing Citrix XenDesktop 3 Vendors : Citrix Version : DEMO NO.1 Which

More information

SafeGuard Enterprise Web Helpdesk. Product version: 6 Document date: February 2012

SafeGuard Enterprise Web Helpdesk. Product version: 6 Document date: February 2012 SafeGuard Enterprise Web Helpdesk Product version: 6 Document date: February 2012 Contents 1 SafeGuard web-based Challenge/Response...3 2 Installation...5 3 Authentication...8 4 Select the Web Helpdesk

More information