Leostream Corporation leostream.com Share this Whitepaper!
|
|
- Osborne Wells
- 8 years ago
- Views:
Transcription
1
2 Introduction... 3 Advantages of Providing Remote Access to Personal PC... 4 Disadvantages of Typical Remote Access Solutions in a Corporate Environment... 5 Why Use Leostream for Remote Access... 5 Using the Leostream Connection Broker as a Corporate Remote Access Solution... 7 About Connection Brokers... 7 Introduction to the Leostream Connection Broker... 7 How Leostream Supports Users on the WAN and LAN... 7 Step-by-Step Guide to Configuring the Leostream Connection Broker... 8 Step 1: Setup a relationship between user and their desktop... 8 Step 2: Register Your Active Directory Server with the Connection Broker... 8 Step 3: Inventorying Your Computers...10 Step 4: Build a User Policy...11 Step 5: Assign the Policy to Users...12 Advanced Scenarios Supported by Leostream...13 Location-Awareness...13 Leostream Agent Features...13 Release Plan Idle-Time Actions...14 Summary...14
3 Virtual Desktop Infrastructures (VDI) provide large corporations with one method for giving users anywhere access to desktop and data. But, in some environments and for some users, VDI is not a viable option. In these organizations, instead of building out VDI, IT invests time and money purchasing, configuring, and maintaining individual desktop hardware for each user in the organization, in addition to handling conference room machines, loaner laptops, etc. Even though each employee is issued a laptop or desktop, however, that machine is not by the employee s side 24/7. To provide anywhere access to a dedicated physical machine, organizations turn to remote access solutions. Typical remote access solutions are designed for individuals, not enterprises, making them difficult to configure and manage in a corporate environment. The typical remote access solution requires individual configuration for each end user and are difficult to control by IT. Instead, Leostream proposes taking a VDI approach to remote access. By using the Leostream Connection Broker to provide remote access to physical desktops, enterprises can reap the benefits of remote access while securing their desktops and data using the benefits inherit in VDI.
4 Constant Leostream >
5 Why provide remote access in the first place? Remote access solutions pay for themselves by making employees productive even when they are away from their physical machines. When you provide a remote access solution for your employees, you: Increase employee productivity: An employee can work on their corporate machine from anywhere, allowing them to be productive when they are traveling, in the coffee shop, or with a few minutes to spare in anyplace with internet connectivity. Provide emergency access to resources: During unexpected absences, due to weather, illness, or any other cause, employees can access their corporate machine and remain productive. Typical remote access solutions were designed with the consumer in mind. In a corporate environment, these solutions can be: Difficult for IT to manage: Remote access solutions designed for small scale require constant maintenance by IT as employees join and leave the organization. Invasive: Some remote access solutions require specialized software be installed on the user s corporate machine. Software installation adds tasks to an already full IT schedule, plus organizations may have strict guidelines on what software can be installed on corporate machines. Expensive: Typical remote access solutions are sold as a service, requiring monthly fees per desktop. In a large organization, the monthly cost can grow quite large. Leostream provides the advantages of typical remote access solutions and, by taking a VDI approach to the solution, solves the disadvantages. The Leostream Connection Broker is designed to manage user-to-desktop assignments and connections in largescale enterprise environments. Whether the organization has virtual or physical desktops, the comprehensive Leostream management concepts enable Leostream to provide: Simple configuration: IT configures pools and policies once using the Leostream Administrator Web interface and then never needs to reconfigure the system to support new users and desktops
6 Automatic user provisioning: Connection Broker policies are automatically applied to new users; IT never needs to add or remove users manually Wake-on-LAN: Leostream can automatically power up physical desktops using Wake-on-LAN commands, giving users remote access even if they turned their machine off Integration with corporate systems: Leostream authenticates users against standard corporate authentication servers, such as Microsoft Active Directory Detailed logging: The Leostream Administrator Web interface provides up-to-date information about who is remotely logging into their desktop Lower cost: Leostream is sold as a perpetual per-user license with a low annual support fee
7 A connection broker lies at the heart of any hosted desktop deployment, whether the resources are hosted in a datacenter or simply on the user s desk. A connection broker consists of a set of rules that determine which desktop a user has access to, based on the user s identity and their location. Using a connection broker designed for VDI provides control and security that dedicated remote access solutions do not. For example, a connection broker allows IT to maintain control over the environment by monitoring and performing actions on the user s session, such as disconnecting the user after their session is idle. Unlike dedicated remote access solutions, a connection broker ties into additional pieces of an organization s infrastructure, including authentication servers, load balancers, SSL VPNs, etc. Using a connection broker, users authenticate against Active Directory to obtain remote access to their desktop. Plus, they get a secure connection from home by logging in via an SSL VPN. Leostream was founded in 2002 to provide a management platform for complex, largescale, privately hosted VDI. The flagship Leostream Connection Broker has evolved into the most flexible and powerful Connection Broker on the market. Using the Connection Broker Administrator Web interface, administrators build policies and plans that define what resources a user has access to and how those resources are managed, based on who the user is and their location. Enterprises often need to treat remote access connections differently when the user connects from within the corporate firewall versus outside of it. When users are connecting on the LAN, often IT relaxes security constraints. When connecting over the WAN, security becomes a bigger issue. The Leostream Connection Broker provides a number of tools that allow IT to tailor the user s session based on if the connection is over the LAN or WAN, including: Location awareness: IT can change the end-user experience based on where the user logs in. Location awareness allows IT to, for example, secure the system by blocking local drive redirection when the user logs in from off campus. SSL VPN integration: Many large enterprises have existing SSL VPN solutions. When on the LAN, users can typically connect directly to their desktop. To get a secure connection over the WAN, users can log into Leostream via the corporate SSL VPN.
8 Display protocol support: Leostream supports over ten display protocols. Enterprises can choose which display protocol best supports the user s current location. Over the LAN, administrators can allow users to connect to their desktops using a protocol that requires more bandwidth, while over the WAN they may want to restrict the user to a less bandwidth-intense display protocol. The Connection Broker Administrator Web interface contains a wealth of configuration options. When it comes to providing remote access, however, the Leostream Connection Broker is extremely easy to set up. The following procedure describes the five simple steps to configure Leostream for remote access. All Connection Broker options not mentioned in the following procedure are assumed to be left at their default value. The end of the chapter describes advanced scenarios that can be supported with further configuration. Note, the Leostream Connection Broker is a virtual appliance that is easily installed in any major hypervisor, such as those from VMware, Citrix, or Microsoft. The following procedure assumes you have already installed the Connection Broker. Many organizations have a corporate standard for how desktops are named and configured in Active Directory. To provide remote access, identify an AD attribute of the desktop that can be used to link that desktop to the user. For example, does the user s desktop have a name that equals their username? If you do not have a desktop attribute that you can link the user, consider using the computer s managedby attribute, as shown in the following figure. Simply configure each computer so it is managed by the user it belongs to.
9 The Connection Broker uses your Active Directory server to inventory your computers and authentication your users. To add your Active Directory authentication server to your Connection Broker 1. Go to the > Users > Authentication Servers tab. 2. Click Add Authentication Server, as shown in the following figure. 3. In the Authentication Server name edit field, enter a friendly name 4. In the Domain Name edit field, enter your actual domain name. 5. In the Hostname or IP address edit field in the Connection Settings section, shown in the following figure, enter the hostname or IP address of your Active Directory authentication server. 6. In the Search Settings section, shown in the following figure, enter the username and password for an administrator account that has read rights to the user and computer records in Active Directory. Leostream never writes to your Active Directory, so you can use an account with limited permissions.
10 7. In the Sub-tree: Starting point for user search field, enter the fully qualified path in LDAP format to the lowest point on the authentication server tree from which you want the Connection Broker to search for users. For simplicity, you can start at the top of the Active Directory tree, for example: DC=YOUR_DOMAIN,DC=com 8. Click Save. Now that the Connection Broker can connect to your Active Directory server, you can create a center that inventories the computer records in Active Directory. Leostream defines a center as an external system that the Connection Broker uses to learn about desktops. To add an Active Directory center: 1. Go to the > Resources > Centers page. 2. Click the Add Center link. 3. Select Active Directory from the Type drop-down menu. 4. Enter a friendly name for the center in the Name edit field. 5. Make sure the Active Directory authentication server you created in step 2 is selected in the Authentication Server drop-down menu. 6. Click Save. After you create your Active Directory center, go to the > Resources > Desktops page. This page lists the computer records the Connection Broker imported from the Active Directory tree, for example: When you finish your setup and users start logging in, the User column displays the user s login name when they are remotely connected to their desktop. The Connection Broker automatically places all imported desktops into a default All Desktops pool. More complicated environments can create customized pools using Leostream s flexible pool definitions. For simple remote access, you can use the default All Desktops pool and, therefore, go straight to defining policies.
11 The Leostream Connection Broker defines a policy as a set of rules that determine how desktops are managed for a user, including: what specific desktops are offered, what display protocol is used to connect to those desktops, how long the user is assigned to a resource, what USB devices the user can access in their remote desktop, and more. Policies use a subset of rules called plans. A plan (Protocol, Power Control, and Release) is a set of behaviors that are applied to desktops in a pool. Plans provide IT with event-based control over the user s session, for example to perform actions when the user disconnects or logs out of their remote session. The Leostream Connection Broker comes with default Protocol, Power Control, and Release plans that work just fine for remote access. These default plans connect the user to their desktop using RDP and keep the user assigned to the desktop for as long as they are logged in. The Connection Broker provides a Default policy that assigns one desktop from the All Desktops pool. For remote access, modify the Default policy to ensure that the desktop offered by the policy is the desktop that belongs to the user based on the contents of the computer records managedby field, as follows. 1. Go to the > Users > Policies page 2. Click the Edit link next to the Default policy 3. Scroll down to the When User Logs into Connection Broker header in the Desktop Assignments from the Pool All Desktops section. 4. Select Yes, regardless of Leostream Agent status from the Offer running desktops drop-down menu, shown in the following figure. You must select this option unless you plan to deploy the optional Leostream Agent on your users desktops.
12 5. Scroll down to the Pool Filter header in the Desktop Assignments from the Pool All Desktops section. 6. Configure the pool filter as shown in the following figure, which indicates the Connection Broker should look for a computer that has an AD managedby field that contains the user s AD distinguishedname. 7. Scroll down to the bottom of the form and click Save. Lastly, you must ensure that the policy defined in step 4 is assigned to your users when they log into Leostream. Policy assignment is done based on the user s Active Directory group membership, for example: 1. Go to the > Users > Assignments tab. 2. Click the Edit link associated with your Active Directory authentication server from step In the Assigning User Role and Policy section, select Domain Users from the Group drop-down menu, as shown in the following figure. With this configuration, any domain user who logs into the Connection Broker is offered the Default policy and, hence, their desktop. 4. Click Save. Leostream makes it easy to test that your Connection Broker is configured correctly by allowing you to simulate a user login. To test your Connection Broker setup: 1. Go to the > Users > Users page 2. Click the Test Login link at the top of the page.
13 3. In the User name field, enter the username for a user who will use the system. 4. Click Run Test The bottom of the test results shows that the user will be offered their desktop when they log in. Users can now start logging into Leostream to access their desktops! You do not need to manually add users to the Connection Broker; they are automatically added the first time they log in. When a user logs into the Connection Broker, Leostream gathers information about the user s client device, such as the IP address, MAC address, manufacturer, etc. You can use that information to create Connection Broker locations. Locations are groups of clients that can be, but do not need to be, geographically co-located. Typically, you group clients that should be provided with similar experiences, for example, all the thin clients on the third floor must provide access to the printers on the third floor. Locations ultimately serve two purposes: 1. Allowing you to assign location-based plans, such as printer plans that attach printers to the remote desktop based on where the user is sitting 2. Allowing you to change the user s policy in order to, for example, log the user in via an SSL VPN, restrict USB device redirection, or even prevent access to a desktop based on where the user is sitting The Leostream Agent is a small, optional service that can be installed on the user s computer. When installed, the Leostream Agent provides additional control and end-user experience, including: Distinguishing logout from disconnect events and passing that information to the Connection Broker Rebooting the user s computer Providing the drivers needed for the Leostream USB redirection feature, which allows you to lock down USB devices Setting registry keys
14 Attaching printers based on the user s client location Monitoring user idle time, as described in the next section Connection Broker Release Plans allow you to control the life cycle of the user s session. One of the most useful Release Plan features is the ability to monitor user idle time and automatically lock, disconnect, or logout the user s session. For example, the following figure shows how to configure a Release Plan to lock the user s desktop after 5 minutes of user idle time, disconnect the desktop after 15 minutes, and logout the desktop after 30 minutes. After 30 minutes of idle time, the Release Plan instructs the Leostream Agent on the desktop to monitor the desktop s CPU level and report when the CPU level falls below 5% for 10 minutes. At that point, the Connection Broker performs the logout action. Consumer-focused remote access solutions are suitable in small environments. Larger organizations, however, require additional flexibility, easier administration, more scalability, and extra security. The Leostream Connection Broker has been providing those features in VDI environments for over 10 years. This whitepaper aimed to show how, in five easy steps, you can get those benefits in a corporate remote access solution, as well.
15 Contact Leostream >
Connection Broker Managing User Connections to Workstations, Blades, VDI, and More. Quick Start with Microsoft Hyper-V
Connection Broker Managing User Connections to Workstations, Blades, VDI, and More Quick Start with Microsoft Hyper-V Version 8.1 October 21, 2015 Contacting Leostream Leostream Corporation http://www.leostream.com
More informationTransitioning to Leostream from HP SAM
Transitioning to Leostream from HP SAM Overview This document aims to ease your transition from HP SAM to the Leostream Connection Broker. We want to assure you that the path is not fraught with peril.
More informationConnection Broker Managing User Connections to Workstations, Blades, VDI, and More. Quick Start with Citrix XenDesktop, XenServer & XenApp
Connection Broker Managing User Connections to Workstations, Blades, VDI, and More Quick Start with Citrix XenDesktop, XenServer & XenApp Version 8.0 December 9, 2014 Contacting Leostream Leostream Corporation
More informationConfiguring Color Access on the WorkCentre 7120 Using Microsoft Active Directory Customer Tip
Configuring Color Access on the WorkCentre 7120 Using Microsoft Active Directory Customer Tip October 21, 2010 Overview This document describes how to limit access to color copying and printing on the
More informationConnection Broker Managing User Connections to Workstations and Blades, OpenStack Clouds, VDI, and More
Connection Broker Managing User Connections to Workstations and Blades, OpenStack Clouds, VDI, and More Leostream Connect Administrator s Guide and End User s Manual Version 3.5 / 3.1 January 14, 2016
More informationOutgoing VDI Gateways:
` Outgoing VDI Gateways: Creating a Unified Outgoing Virtual Desktop Infrastructure with Windows Server 2008 R2 and ObserveIT Daniel Petri January 2010 Copyright 2010 ObserveIT Ltd. 2 Table of Contents
More informationConnection Broker Managing User Connections to Workstations and Blades, OpenStack Clouds, VDI, and more. Leostream Agent Administrator s Guide
Connection Broker Managing User Connections to Workstations and Blades, OpenStack Clouds, VDI, and more Leostream Agent Administrator s Guide Version 6.0 / 4.0 January 14, 2016 Contacting Leostream Leostream
More informationActive Directory Integration
January 11, 2011 Author: Audience: SWAT Team Evaluator Product: Cymphonix Network Composer EX Series, XLi OS version 9 Active Directory Integration The following steps will guide you through the process
More informationExternal Authentication with Citrix Secure Gateway - Presentation server Authenticating Users Using SecurAccess Server by SecurEnvoy
External Authentication with Citrix Secure Gateway - Presentation server Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210
More informationHow A Connection Broker Simplifies Hosted Desktop Environments
How A Connection Broker Simplifies Hosted Desktop Environments 5 Reasons Why an Independent Connection Broker is the Way to Go A Publication by Leostream Corporation Introduction When moving resources
More informationVirtual Desktop Infrastructure
Virtual Desktop Infrastructure Thomas Huber Regional SE Manager EMEA Eastern Region thuber@vmware.com New Product Announcements at VMworld Infrastructure Optimization Management & Automation Distributed
More informationMicrosoft Terminal Server and Citrix Presentation Server Deployment Environments
Microsoft Terminal Server and Citrix Presentation Server Deployment Environments Understanding the use of Act! in a Terminal Server or Citrix Presentation Server environment Table of Contents Introduction...
More informationCustomer Tips. Configuring Color Access on the WorkCentre 7328/7335/7345 using Windows Active Directory. for the user. Overview
Xerox Multifunction Devices Customer Tips February 13, 2008 This document applies to the stated Xerox products. It is assumed that your device is equipped with the appropriate option(s) to support the
More informationHow To Set Up A Macintosh With A Cds And Cds On A Pc Or Macbook With A Domain Name On A Macbook (For A Pc) For A Domain Account (For An Ipad) For Free
Setting Up a Macintosh For Use In The Medical Center The purpose of this document is to provide some assistance and direction to the users of Macintosh computers in The Medical Center network environment.
More informationEnterprise Solution for Remote Desktop Services... 2. System Administration... 3. Server Management... 4. Server Management (Continued)...
CONTENTS Enterprise Solution for Remote Desktop Services... 2 System Administration... 3 Server Management... 4 Server Management (Continued)... 5 Application Management... 6 Application Management (Continued)...
More informationTechnical White Paper BlackBerry Enterprise Server
Technical White Paper BlackBerry Enterprise Server BlackBerry Enterprise Edition for Microsoft Exchange For GPRS Networks Research In Motion 1999-2001, Research In Motion Limited. All Rights Reserved Table
More informationConnection Broker Managing User Connections to Workstations, Blades, VDI, and more. Administrator s Guide
Connection Broker Managing User Connections to Workstations, Blades, VDI, and more Administrator s Guide Version 8.1 October 21, 2015 Contacting Leostream Leostream Corporation http://www.leostream.com
More informationTest Case 3 Active Directory Integration
April 12, 2010 Author: Audience: Joe Lowry and SWAT Team Evaluator Test Case 3 Active Directory Integration The following steps will guide you through the process of directory integration. The goal of
More informationQuick Start Guide for Parallels Virtuozzo
PROPALMS VDI Version 2.1 Quick Start Guide for Parallels Virtuozzo Rev. 1.1 Published: JULY-2011 1999-2011 Propalms Ltd. All rights reserved. The information contained in this document represents the current
More informationConnection Broker Managing User Connections to Workstations, Blades, VDI, and more. Security Review
Connection Broker Managing User Connections to Workstations, Blades, VDI, and more Security Review Version 8.1 October 21, 2015 Contacting Leostream Leostream Corporation http://www.leostream.com 465 Waverley
More informationQuick Start Guide for VMware and Windows 7
PROPALMS VDI Version 2.1 Quick Start Guide for VMware and Windows 7 Rev. 1.1 Published: JULY-2011 1999-2011 Propalms Ltd. All rights reserved. The information contained in this document represents the
More information3. What are the primary business drivers behind the virtualization assessment effort?
1 Overview 1. Who are the key desktop and application stakeholders within your organization? What areas of responsibility do each cover (workflows, coverage, 24/7 staff members are good to identify at
More informationSA Citrix Virtual Desktop Infrastructure (VDI) Configuration Guide
SA Citrix Virtual Desktop Infrastructure (VDI) Configuration Guide Published July 2015 This document covers steps to configure Citrix VDI on Pulse Secure s SA Series SSL VPN platforms. It also covers brief
More informationContents. Overview. The notes in this document are written for Windows 7 though the steps are fairly similar in earlier versions of Windows.
Using Remote Desktop By Christopher A. Leonti Information Technology Support Specialist College of Ag / Montana Ag Experiment Station Montana State University-Bozeman http://ag.montana.edu/infotech Contents
More informationSetting Up Scan to SMB on TaskALFA series MFP s.
Setting Up Scan to SMB on TaskALFA series MFP s. There are three steps necessary to set up a new Scan to SMB function button on the TaskALFA series color MFP. 1. A folder must be created on the PC and
More informationWatchGuard Mobile User VPN Guide
WatchGuard Mobile User VPN Guide Mobile User VPN establishes a secure connection between an unsecured remote host and a protected network over an unsecured network using Internet Protocol Security (IPSec).
More informationSSL VPN Setup for Windows
SSL VPN Setup for Windows SSL VPN allows you to connect from off campus to access campus resources such as Outlook email client, file sharing and remote desktop. These instructions will guide you through
More informationPropalms TSE Deployment Guide
Propalms TSE Deployment Guide Version 7.0 Propalms Ltd. Published October 2013 Overview This guide provides instructions for deploying Propalms TSE in a production environment running Windows Server 2003,
More informationDeployment Guide for Citrix XenDesktop
Deployment Guide for Citrix XenDesktop Securing and Accelerating Citrix XenDesktop with Palo Alto Networks Next-Generation Firewall and Citrix NetScaler Joint Solution Table of Contents 1. Overview...
More informationConnection Broker Managing User Connections to Workstations and Blades, OpenStack Clouds, VDI, and More. Glossary
Connection Broker Managing User Connections to Workstations and Blades, OpenStack Clouds, VDI, and More Glossary Versions 8.1 January 14, 2016 Contacting Leostream Leostream Corporation 465 Waverley Oaks
More informationConnection Broker Managing User Connections to Workstations and Blades, OpenStack Clouds, VDI, and more. Security Review
Connection Broker Managing User Connections to Workstations and Blades, OpenStack Clouds, VDI, and more Security Review Version 8.1 March 31, 2016 Contacting Leostream Leostream Corporation http://www.leostream.com
More informationSA Citrix Virtual Desktop Infrastructure (VDI) Configuration Guide
SA Citrix Virtual Desktop Infrastructure (VDI) Configuration Guide This document covers steps to configure Citrix VDI on Juniper Network s SA Series SSL VPN platforms. It also covers brief overview of
More informationHow To Integrate Watchguard Xtm With Secur Access With Watchguard And Safepower 2Factor Authentication On A Watchguard 2T (V2) On A 2Tv 2Tm (V1.2) With A 2F
External Authentication with Watchguard XTM Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210 Parkview Arlington Business Park
More informationRemote Application Server Version 14. Last updated: 06-02-15
Remote Application Server Version 14 Last updated: 06-02-15 Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise
More informationDEPLOYMENT GUIDE. Deploying the BIG-IP LTM v9.x with Microsoft Windows Server 2008 Terminal Services
DEPLOYMENT GUIDE Deploying the BIG-IP LTM v9.x with Microsoft Windows Server 2008 Terminal Services Deploying the BIG-IP LTM system and Microsoft Windows Server 2008 Terminal Services Welcome to the BIG-IP
More informationManufacturing Representative SSL VDM Login User s Guide
June 12 2008 Ver. 1.5 KEMET Corporation Manufacturing Representative SSL VDM Login User s Guide This document is a guide to assist a Manufacturing Representative (MFG REP) to connect and login to the SSL
More informationWinConnect Server ES User Manual
THINSOFT PTE LTD 23 Tai Seng Drive, #06-00, Singapore 535224, Fax (65) 6289-7308 www.thinsoftinc.com WinConnect Server ES User Manual Document Version 1.0 1 WinConnect Server ES User Manual Copyright 2007
More informationAccessing SSL VPN with Mac OS X
Accessing SSL VPN with Mac OS X Requirements -Safari Web Browser -Network Connect link -Windows Remote Desktop for Mac -IP address and login information of PC on Mount Auburn s network -ITS username and
More information2X ApplicationServer & LoadBalancer & VirtualDesktopServer Manual
2X ApplicationServer & LoadBalancer & VirtualDesktopServer Manual 2X VirtualDesktopServer Contents 1 2X VirtualDesktopServer Contents 2 URL: www.2x.com E-mail: info@2x.com Information in this document
More informationDEPLOYMENT GUIDE DEPLOYING THE BIG-IP LTM SYSTEM WITH MICROSOFT WINDOWS SERVER 2008 TERMINAL SERVICES
DEPLOYMENT GUIDE DEPLOYING THE BIG-IP LTM SYSTEM WITH MICROSOFT WINDOWS SERVER 2008 TERMINAL SERVICES Deploying the BIG-IP LTM system and Microsoft Windows Server 2008 Terminal Services Welcome to the
More informationRemote Application Server Version 14. Last updated: 25-02-15
Remote Application Server Version 14 Last updated: 25-02-15 Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise
More informationAccops HyWorks v2.5. Quick Start Guide. Last Update: 4/18/2016
Accops HyWorks v2.5 Quick Start Guide Last Update: 4/18/2016 2016 Propalms Technologies Pvt. Ltd. All rights reserved. The information contained in this document represents the current view of Propalms
More informationTraining module 2 Installing VMware View
Training module 2 Installing VMware View In this second module we ll install VMware View for an End User Computing environment. We ll install all necessary parts such as VMware View Connection Server and
More informationExternal Authentication with Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy
External Authentication with Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210 Parkview Arlington
More informationSafe Haven User Guide
Safe Haven User Guide Date: October 2015 Version: 2.1 21/10/15 Health Informatics Centre Safe Haven VDI 1 Contents Safe Haven VDI... 3 Introduction... 3 Key Features and Benefits... 3 VDI Portal... 3 VMware
More information2X ApplicationServer & LoadBalancer Manual
2X ApplicationServer & LoadBalancer Manual 2X ApplicationServer & LoadBalancer Contents 1 URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies,
More informationDell SonicWALL and SecurEnvoy Integration Guide. Authenticating Users Using SecurAccess Server by SecurEnvoy
Dell SonicWALL and SecurEnvoy Integration Guide Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 Merlin House Brunel Road Theale
More informationHow to Setup PPTP VPN Between a Windows PPTP Client and the DIR-130.
Note: DIR-130 FW: 1.21 How to Setup PPTP VPN Between a Windows PPTP Client and the DIR-130. This setup example uses the following network settings: D-Link Technical Support PPTP VPN Between Windows PPTP
More informationContents Overview of RD Web Access... 2. What is RD Web Access?... 2 What are the benefits of RD Web Access versus thin client?...
Purpose & Scope The purpose of this document is to provide business advantages, system administrat installation, and end-user access procedures f the use of Remote Desktop (RD) Web Access f Instrument
More informationRemote Access. Connecting to your computer from home
Remote Access Connecting to your computer from home IT Desktop Support Client and Research Services October 2009 2 Contents Overview 3 Windows 4 Setup 4 Remote Desktop 4 From work 4 From home 4 Installing
More informationSonicWALL SRA Virtual Appliance Getting Started Guide
COMPREHENSIVE INTERNET SECURITY SonicWALL Secure Remote Access Appliances SonicWALL SRA Virtual Appliance Getting Started Guide SonicWALL SRA Virtual Appliance5.0 Getting Started Guide This Getting Started
More informationConnection Broker Managing User Connections to Workstations, Blades, VDI, and More. Screen Management for Multiple Displays
Connection Broker Managing User Connections to Workstations, Blades, VDI, and More Screen Management for Multiple Displays Version 8.0 December 9, 2014 Contacting Leostream Leostream Corporation 465 Waverley
More informationVMware Virtual Desktop Infrastructure (VDI) - The Best Strategy for Managing Desktop Environments Mike Coleman, VMware (mcoleman@vmware.
VMware Virtual Desktop Infrastructure (VDI) - The Best Strategy for Managing Desktop Environments Mike Coleman, VMware (mcoleman@vmware.com) Copyright 2008 EMC Corporation. All rights reserved. Agenda
More informationHow do I use Citrix Staff Remote Desktop
How do I use Citrix Staff Remote Desktop September 2014 Initial Log On In order to login into the new Citrix system, you need to go to the following web address. https://remotets.tees.ac.uk/ Be sure to
More informationSetting up VPN and Remote Desktop for Home Use
Setting up VPN and Remote Desktop for Home Use Contents I. Prepare Your Work Computer... 1 II. Prepare Your Home Computer... 2 III. Run the VPN Client... 3-4 IV. Remote Connect to Your Work Computer...
More informationVMware Identity Manager Administration
VMware Identity Manager Administration VMware Identity Manager 2.4 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
More informationWhat is the Barracuda SSL VPN Server Agent?
The standard communication model for outgoing calls is for the appliance to simply make a direct connection to the destination host. This paradigm does not suit all business needs. The Barracuda SSL VPN
More informationDeploying Remote Desktop Connection Broker with High Availability Step-by-Step Guide
Deploying Remote Desktop Connection Broker with High Availability Step-by-Step Guide Microsoft Corporation Published: May 2010 Abstract This guide describes the steps for configuring Remote Desktop Connection
More informationConfiguring the Cisco ISA500 for Active Directory/LDAP and RADIUS Authentication
Configuring the Cisco ISA500 for Active Directory/LDAP and RADIUS Authentication This application note describes how to authenticate users on a Cisco ISA500 Series security appliance. It includes these
More informationWhatsUp Gold v16.3 Installation and Configuration Guide
WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard
More informationAirStation VPN Setup Guide WZR-RS-G54
AirStation VPN Setup Guide WZR-RS-G54 WZR-RS-G54 Introduction The WZR-RS-G54 s VPN services allows users to securely access their home or office network from anywhere in the world. All services available
More informationExternal Authentication with Windows 2003 Server with Routing and Remote Access service Authenticating Users Using SecurAccess Server by SecurEnvoy
External Authentication with Windows 2003 Server with Routing and Remote Access service Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845
More informationInstalling and Configuring vcloud Connector
Installing and Configuring vcloud Connector vcloud Connector 2.7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
More informationHow to remotely access your Virtual Desktop from outside the college using VMware View Client. How to guide
How to remotely access your Virtual Desktop from outside the college using VMware View Client How to guide Author: ICT Services Version: 1.0 Date: November 2015 Contents What is the VMware View Client?...
More informationHow To Install Ru-Vpn On A Pc Or Macbook Or Ipad (For Macbook) With A Microsoft Macbook (For Pc) With An Ipad Or Ipa (For A Macbook). Pc (For An
RU-VPN Installation Instructions (Windows Vista and Windows 7) An RU-VPN id allows authorized users to access Ryerson s Administrative Systems via the internet. RU-VPN utilizes a digital certificate that
More informationNETASQ SSO Agent Installation and deployment
NETASQ SSO Agent Installation and deployment Document version: 1.3 Reference: naentno_sso_agent Page 1 / 20 Copyright NETASQ 2013 General information 3 Principle 3 Requirements 3 Active Directory user
More informationInstalling the VMware Horizon View Client to Access Hoag Virtual Desktops
Installing the VMware Horizon View Client to Access Hoag Virtual Desktops Hoag IT Department For questions or further assistance, please contact the Service Desk: 949-764-8600, option 2 1 Table of Contents
More informationCITRIX 1Y0-A17 EXAM QUESTIONS & ANSWERS
CITRIX 1Y0-A17 EXAM QUESTIONS & ANSWERS Number: 1Y0-A17 Passing Score: 800 Time Limit: 120 min File Version: 38.7 http://www.gratisexam.com/ CITRIX 1Y0-A17 EXAM QUESTIONS & ANSWERS Exam Name: Implementing
More informationUser Management Guide
AlienVault Unified Security Management (USM) 4.x-5.x User Management Guide USM v4.x-5.x User Management Guide, rev 1 Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,
More informationSSL VPN Support Guide
P a g e 1 SSL VPN Support Guide Revision date: 5/4/10 P a g e 2 Table of Contents Before calling the Support Desk..pg 3 What the Support Desk can assist users with. pg 4 Instructions for PC users (Internet
More informationContents. Platform Compatibility. Directory Connector SonicWALL Directory Services Connector 3.1.7
Directory Connector SonicWALL Directory Services Connector 3.1.7 Contents Platform Compatibility... 1 New Features... 2 Known Issues... 3 Resolved Issues... 4 Overview... 7 About SonicWALL Single Sign-On
More informationVMware Virtual Desktop Manager User Authentication Guide
Technical Note VMware Virtual Desktop Manager User Authentication Guide VMware Virtual Desktop Manager The purpose of this guide is to provide details of user authentication in VMware Virtual Desktop Manager
More informationComodo Endpoint Security Manager SME Software Version 2.1
Comodo Endpoint Security Manager SME Software Version 2.1 Quick Start Guide Guide Version 2.1.111114 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Endpoint Security Manager - SME Quick
More informationIGEL Linux and Microsoft Remote Desktop Connection Broker 2012 R2
Whitepaper IGEL Linux and Microsoft Remote Desktop Connection Broker 2012 R2 Version 1.00 Blog: blog.cloud-client.info Website: www.cloud-client.info This document can be distributed / used free of charge
More informationActive Directory integration with CloudByte ElastiStor
Active Directory integration with CloudByte ElastiStor Prerequisite Change the time and the time zone of the Active Directory Server to the VSM time and time zone. Enabling Active Directory at VSM level
More informationAccessing the Media General SSL VPN
Launching Applications and Mapping Drives Remote Desktop Outlook Launching Web Applications Full Access VPN Note: To access the Media General VPN, anti-virus software must be installed and running on your
More informationVirtual Owl. Guide for Windows. University Information Technology Services. Training, Outreach, Learning Technologies & Video Production
Virtual Owl Guide for Windows University Information Technology Services Training, Outreach, Learning Technologies & Video Production Copyright 2015 KSU Division of University Information Technology Services
More informationConnecting to the FILTER Virtual Private Network (VPN)
Create FILTER VPN Connection Filter s VPN allows computers at remote locations (e.g. home, hotels, Starbucks?) to connect directly and securely to FILTER s corporate network. Computers connected by VPNs
More informationUpgrading User-ID. Tech Note PAN-OS 4.1. 2011, Palo Alto Networks, Inc.
Upgrading User-ID Tech Note PAN-OS 4.1 Revision B 2011, Palo Alto Networks, Inc. Overview PAN-OS 4.1 introduces significant improvements in the User-ID feature by adding support for multiple user directories,
More informationConnecting to the Remote Desktop Service
Connecting to the Remote Desktop Service What is the Remote Desktop Service? Connecting to a University of Greenwich Remote Desktop allows you to work securely on documents and files held on the University's
More informationGuideline for setting up a functional VPN
Guideline for setting up a functional VPN Why do I want a VPN? VPN by definition creates a private, trusted network across an untrusted medium. It allows you to connect offices and people from around the
More informationMicrosoft XP Professional Remote Desktop Connection
Microsoft XP Professional Remote Desktop Connection With Remote Desktop, you get full, secure access to your work computer via an Internet or network connection. For example, you can connect to your office
More informationContent Filtering Client Policy & Reporting Administrator s Guide
Content Filtering Client Policy & Reporting Administrator s Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION
More informationCloudvue Remote Desktop Client GUI User Guide
Cloudvue Remote Desktop Client GUI User Guide I. To connect to a Windows server - After power up, the login screen will be displayed. A. Auto Search/User Defined Use Auto Search to find available Windows
More informationGetting Started with VMware Horizon View (Remote Access)
Getting Started with VMware Horizon View (Remote Access) In an effort to improve remote access and provide a familiar desktop experience at home, we are transitioning away from Citrix and implementing
More informationAn additional website URL has been added to the districts website address making this gateway easy to access and bookmark for future use.
Veribest ISD Virtual Desktop Integration Installing vworkstation for Remote (Home) Use Section 1: Installing the vworkstation Gateway The convenience of home access to your school district desktop is going
More informationApple Mac VPN Service Setting up Remote Desktop
Apple Mac VPN Service Setting up Remote Desktop After you have successfully connected via the VPN client to the University network you will then need to make the connection to your machine. To do this
More informationDraytek Vigor 2820/2830 Configuration. A guide for Exa Resellers and IT Contractors
Draytek Vigor 2820/2830 Configuration A guide for Exa Resellers and IT Contractors Contents About this guide...3 Vigor Router Configuration (ADSL)...4 Vigor Router Configuration (FTTC)...4 Vigor Router
More informationF re Alarm Network etwo (FAN) T rou rou h Virt Vi ual u Private Network etwo (VPN) Dr. Dr Sa S mir H. Abdull--Ja J u a wad
Fire Alarm Network (FAN) Through Virtual Private Network (VPN) By Dr. Samir H. Abdul-Jauwad Director General (Acting) Environment, Health and Safety Department July 07, 2013 1 Outline Introduction of Virtual
More informationUsing TS-ACCESS for Remote Desktop Access
Using TS-ACCESS for Remote Desktop Access Introduction TS-ACCESS is a remote desktop access feature available to CUA faculty and staff who need to access administrative systems or other computing resources
More informationViking VPN Guide Mac OSX RDP Usage
Viking VPN Guide Mac OSX RDP Usage Table Of Contents 1 : What is RDP 2 : Enabling RDP on your Office PC 3 : Installing the RDP client on your Home Mac 4 : Connecting to your Office PC from your Home Mac
More informationCitrix XenApp Manager 1.0. Administrator s Guide. For Windows 8/RT. Published 10 December 2012. Edition 1.0.1
Citrix XenApp Manager 1.0 For Windows 8/RT Administrator s Guide Published 10 December 2012 Edition 1.0.1 Citrix XenApp Manager for Windows 8/RT Administrator s Guide Copyright 2012 Citrix Systems. Inc.
More information800-782-3762 www.stbernard.com. Active Directory 2008 Implementation. Version 6.410
800-782-3762 www.stbernard.com Active Directory 2008 Implementation Version 6.410 Contents 1 INTRODUCTION...2 1.1 Scope... 2 1.2 Definition of Terms... 2 2 SERVER CONFIGURATION...3 2.1 Supported Deployment
More information1. Installation Overview
Quick Install Guide 1. Installation Overview Thank you for selecting Bitdefender Business Solutions to protect your business. This document enables you to quickly get started with the installation of Bitdefender
More informationInstalling and Configuring vcloud Connector
Installing and Configuring vcloud Connector vcloud Connector 2.0.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
More informationThinPoint Quick Start Guide
ThinPoint Quick Start Guide 2 ThinPoint Quick Start Guide Table of Contents Part 1 Introduction 3 Part 2 ThinPoint Windows Host Installation 3 1 Compatibility... list 3 2 Pre-requisites... 3 3 Installation...
More informationWindows and MAC User Handbook Remote and Secure Connection Version 1.01 09/19/2013. User Handbook
Windows and MAC User Handbook How to Connect Your PC or MAC Remotely and Securely to Your U.S. Department of Commerce Account Developed for You by the Office of IT Services (OITS)/IT Service Desk *** For
More informationipad or iphone with Junos Pulse and Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy
ipad or iphone with Junos Pulse and Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210 Parkview Arlington
More informationMaximize your Remote Desktop Services
Maximize your Remote Desktop Services White paper Parallels An Overview of Remote Desktop Services Virtualization has added new issues to information technology. Today, businesses look not only at optimizing
More informationVirtual Appliance Setup Guide
The Virtual Appliance includes the same powerful technology and simple Web based user interface found on the Barracuda Web Application Firewall hardware appliance. It is designed for easy deployment on
More information