Leostream Corporation leostream.com Share this Whitepaper!

Size: px
Start display at page:

Download "Leostream Corporation leostream.com help@leostream.com Share this Whitepaper!"

Transcription

1

2 Introduction... 3 Advantages of Providing Remote Access to Personal PC... 4 Disadvantages of Typical Remote Access Solutions in a Corporate Environment... 5 Why Use Leostream for Remote Access... 5 Using the Leostream Connection Broker as a Corporate Remote Access Solution... 7 About Connection Brokers... 7 Introduction to the Leostream Connection Broker... 7 How Leostream Supports Users on the WAN and LAN... 7 Step-by-Step Guide to Configuring the Leostream Connection Broker... 8 Step 1: Setup a relationship between user and their desktop... 8 Step 2: Register Your Active Directory Server with the Connection Broker... 8 Step 3: Inventorying Your Computers...10 Step 4: Build a User Policy...11 Step 5: Assign the Policy to Users...12 Advanced Scenarios Supported by Leostream...13 Location-Awareness...13 Leostream Agent Features...13 Release Plan Idle-Time Actions...14 Summary...14

3 Virtual Desktop Infrastructures (VDI) provide large corporations with one method for giving users anywhere access to desktop and data. But, in some environments and for some users, VDI is not a viable option. In these organizations, instead of building out VDI, IT invests time and money purchasing, configuring, and maintaining individual desktop hardware for each user in the organization, in addition to handling conference room machines, loaner laptops, etc. Even though each employee is issued a laptop or desktop, however, that machine is not by the employee s side 24/7. To provide anywhere access to a dedicated physical machine, organizations turn to remote access solutions. Typical remote access solutions are designed for individuals, not enterprises, making them difficult to configure and manage in a corporate environment. The typical remote access solution requires individual configuration for each end user and are difficult to control by IT. Instead, Leostream proposes taking a VDI approach to remote access. By using the Leostream Connection Broker to provide remote access to physical desktops, enterprises can reap the benefits of remote access while securing their desktops and data using the benefits inherit in VDI.

4 Constant Leostream >

5 Why provide remote access in the first place? Remote access solutions pay for themselves by making employees productive even when they are away from their physical machines. When you provide a remote access solution for your employees, you: Increase employee productivity: An employee can work on their corporate machine from anywhere, allowing them to be productive when they are traveling, in the coffee shop, or with a few minutes to spare in anyplace with internet connectivity. Provide emergency access to resources: During unexpected absences, due to weather, illness, or any other cause, employees can access their corporate machine and remain productive. Typical remote access solutions were designed with the consumer in mind. In a corporate environment, these solutions can be: Difficult for IT to manage: Remote access solutions designed for small scale require constant maintenance by IT as employees join and leave the organization. Invasive: Some remote access solutions require specialized software be installed on the user s corporate machine. Software installation adds tasks to an already full IT schedule, plus organizations may have strict guidelines on what software can be installed on corporate machines. Expensive: Typical remote access solutions are sold as a service, requiring monthly fees per desktop. In a large organization, the monthly cost can grow quite large. Leostream provides the advantages of typical remote access solutions and, by taking a VDI approach to the solution, solves the disadvantages. The Leostream Connection Broker is designed to manage user-to-desktop assignments and connections in largescale enterprise environments. Whether the organization has virtual or physical desktops, the comprehensive Leostream management concepts enable Leostream to provide: Simple configuration: IT configures pools and policies once using the Leostream Administrator Web interface and then never needs to reconfigure the system to support new users and desktops

6 Automatic user provisioning: Connection Broker policies are automatically applied to new users; IT never needs to add or remove users manually Wake-on-LAN: Leostream can automatically power up physical desktops using Wake-on-LAN commands, giving users remote access even if they turned their machine off Integration with corporate systems: Leostream authenticates users against standard corporate authentication servers, such as Microsoft Active Directory Detailed logging: The Leostream Administrator Web interface provides up-to-date information about who is remotely logging into their desktop Lower cost: Leostream is sold as a perpetual per-user license with a low annual support fee

7 A connection broker lies at the heart of any hosted desktop deployment, whether the resources are hosted in a datacenter or simply on the user s desk. A connection broker consists of a set of rules that determine which desktop a user has access to, based on the user s identity and their location. Using a connection broker designed for VDI provides control and security that dedicated remote access solutions do not. For example, a connection broker allows IT to maintain control over the environment by monitoring and performing actions on the user s session, such as disconnecting the user after their session is idle. Unlike dedicated remote access solutions, a connection broker ties into additional pieces of an organization s infrastructure, including authentication servers, load balancers, SSL VPNs, etc. Using a connection broker, users authenticate against Active Directory to obtain remote access to their desktop. Plus, they get a secure connection from home by logging in via an SSL VPN. Leostream was founded in 2002 to provide a management platform for complex, largescale, privately hosted VDI. The flagship Leostream Connection Broker has evolved into the most flexible and powerful Connection Broker on the market. Using the Connection Broker Administrator Web interface, administrators build policies and plans that define what resources a user has access to and how those resources are managed, based on who the user is and their location. Enterprises often need to treat remote access connections differently when the user connects from within the corporate firewall versus outside of it. When users are connecting on the LAN, often IT relaxes security constraints. When connecting over the WAN, security becomes a bigger issue. The Leostream Connection Broker provides a number of tools that allow IT to tailor the user s session based on if the connection is over the LAN or WAN, including: Location awareness: IT can change the end-user experience based on where the user logs in. Location awareness allows IT to, for example, secure the system by blocking local drive redirection when the user logs in from off campus. SSL VPN integration: Many large enterprises have existing SSL VPN solutions. When on the LAN, users can typically connect directly to their desktop. To get a secure connection over the WAN, users can log into Leostream via the corporate SSL VPN.

8 Display protocol support: Leostream supports over ten display protocols. Enterprises can choose which display protocol best supports the user s current location. Over the LAN, administrators can allow users to connect to their desktops using a protocol that requires more bandwidth, while over the WAN they may want to restrict the user to a less bandwidth-intense display protocol. The Connection Broker Administrator Web interface contains a wealth of configuration options. When it comes to providing remote access, however, the Leostream Connection Broker is extremely easy to set up. The following procedure describes the five simple steps to configure Leostream for remote access. All Connection Broker options not mentioned in the following procedure are assumed to be left at their default value. The end of the chapter describes advanced scenarios that can be supported with further configuration. Note, the Leostream Connection Broker is a virtual appliance that is easily installed in any major hypervisor, such as those from VMware, Citrix, or Microsoft. The following procedure assumes you have already installed the Connection Broker. Many organizations have a corporate standard for how desktops are named and configured in Active Directory. To provide remote access, identify an AD attribute of the desktop that can be used to link that desktop to the user. For example, does the user s desktop have a name that equals their username? If you do not have a desktop attribute that you can link the user, consider using the computer s managedby attribute, as shown in the following figure. Simply configure each computer so it is managed by the user it belongs to.

9 The Connection Broker uses your Active Directory server to inventory your computers and authentication your users. To add your Active Directory authentication server to your Connection Broker 1. Go to the > Users > Authentication Servers tab. 2. Click Add Authentication Server, as shown in the following figure. 3. In the Authentication Server name edit field, enter a friendly name 4. In the Domain Name edit field, enter your actual domain name. 5. In the Hostname or IP address edit field in the Connection Settings section, shown in the following figure, enter the hostname or IP address of your Active Directory authentication server. 6. In the Search Settings section, shown in the following figure, enter the username and password for an administrator account that has read rights to the user and computer records in Active Directory. Leostream never writes to your Active Directory, so you can use an account with limited permissions.

10 7. In the Sub-tree: Starting point for user search field, enter the fully qualified path in LDAP format to the lowest point on the authentication server tree from which you want the Connection Broker to search for users. For simplicity, you can start at the top of the Active Directory tree, for example: DC=YOUR_DOMAIN,DC=com 8. Click Save. Now that the Connection Broker can connect to your Active Directory server, you can create a center that inventories the computer records in Active Directory. Leostream defines a center as an external system that the Connection Broker uses to learn about desktops. To add an Active Directory center: 1. Go to the > Resources > Centers page. 2. Click the Add Center link. 3. Select Active Directory from the Type drop-down menu. 4. Enter a friendly name for the center in the Name edit field. 5. Make sure the Active Directory authentication server you created in step 2 is selected in the Authentication Server drop-down menu. 6. Click Save. After you create your Active Directory center, go to the > Resources > Desktops page. This page lists the computer records the Connection Broker imported from the Active Directory tree, for example: When you finish your setup and users start logging in, the User column displays the user s login name when they are remotely connected to their desktop. The Connection Broker automatically places all imported desktops into a default All Desktops pool. More complicated environments can create customized pools using Leostream s flexible pool definitions. For simple remote access, you can use the default All Desktops pool and, therefore, go straight to defining policies.

11 The Leostream Connection Broker defines a policy as a set of rules that determine how desktops are managed for a user, including: what specific desktops are offered, what display protocol is used to connect to those desktops, how long the user is assigned to a resource, what USB devices the user can access in their remote desktop, and more. Policies use a subset of rules called plans. A plan (Protocol, Power Control, and Release) is a set of behaviors that are applied to desktops in a pool. Plans provide IT with event-based control over the user s session, for example to perform actions when the user disconnects or logs out of their remote session. The Leostream Connection Broker comes with default Protocol, Power Control, and Release plans that work just fine for remote access. These default plans connect the user to their desktop using RDP and keep the user assigned to the desktop for as long as they are logged in. The Connection Broker provides a Default policy that assigns one desktop from the All Desktops pool. For remote access, modify the Default policy to ensure that the desktop offered by the policy is the desktop that belongs to the user based on the contents of the computer records managedby field, as follows. 1. Go to the > Users > Policies page 2. Click the Edit link next to the Default policy 3. Scroll down to the When User Logs into Connection Broker header in the Desktop Assignments from the Pool All Desktops section. 4. Select Yes, regardless of Leostream Agent status from the Offer running desktops drop-down menu, shown in the following figure. You must select this option unless you plan to deploy the optional Leostream Agent on your users desktops.

12 5. Scroll down to the Pool Filter header in the Desktop Assignments from the Pool All Desktops section. 6. Configure the pool filter as shown in the following figure, which indicates the Connection Broker should look for a computer that has an AD managedby field that contains the user s AD distinguishedname. 7. Scroll down to the bottom of the form and click Save. Lastly, you must ensure that the policy defined in step 4 is assigned to your users when they log into Leostream. Policy assignment is done based on the user s Active Directory group membership, for example: 1. Go to the > Users > Assignments tab. 2. Click the Edit link associated with your Active Directory authentication server from step In the Assigning User Role and Policy section, select Domain Users from the Group drop-down menu, as shown in the following figure. With this configuration, any domain user who logs into the Connection Broker is offered the Default policy and, hence, their desktop. 4. Click Save. Leostream makes it easy to test that your Connection Broker is configured correctly by allowing you to simulate a user login. To test your Connection Broker setup: 1. Go to the > Users > Users page 2. Click the Test Login link at the top of the page.

13 3. In the User name field, enter the username for a user who will use the system. 4. Click Run Test The bottom of the test results shows that the user will be offered their desktop when they log in. Users can now start logging into Leostream to access their desktops! You do not need to manually add users to the Connection Broker; they are automatically added the first time they log in. When a user logs into the Connection Broker, Leostream gathers information about the user s client device, such as the IP address, MAC address, manufacturer, etc. You can use that information to create Connection Broker locations. Locations are groups of clients that can be, but do not need to be, geographically co-located. Typically, you group clients that should be provided with similar experiences, for example, all the thin clients on the third floor must provide access to the printers on the third floor. Locations ultimately serve two purposes: 1. Allowing you to assign location-based plans, such as printer plans that attach printers to the remote desktop based on where the user is sitting 2. Allowing you to change the user s policy in order to, for example, log the user in via an SSL VPN, restrict USB device redirection, or even prevent access to a desktop based on where the user is sitting The Leostream Agent is a small, optional service that can be installed on the user s computer. When installed, the Leostream Agent provides additional control and end-user experience, including: Distinguishing logout from disconnect events and passing that information to the Connection Broker Rebooting the user s computer Providing the drivers needed for the Leostream USB redirection feature, which allows you to lock down USB devices Setting registry keys

14 Attaching printers based on the user s client location Monitoring user idle time, as described in the next section Connection Broker Release Plans allow you to control the life cycle of the user s session. One of the most useful Release Plan features is the ability to monitor user idle time and automatically lock, disconnect, or logout the user s session. For example, the following figure shows how to configure a Release Plan to lock the user s desktop after 5 minutes of user idle time, disconnect the desktop after 15 minutes, and logout the desktop after 30 minutes. After 30 minutes of idle time, the Release Plan instructs the Leostream Agent on the desktop to monitor the desktop s CPU level and report when the CPU level falls below 5% for 10 minutes. At that point, the Connection Broker performs the logout action. Consumer-focused remote access solutions are suitable in small environments. Larger organizations, however, require additional flexibility, easier administration, more scalability, and extra security. The Leostream Connection Broker has been providing those features in VDI environments for over 10 years. This whitepaper aimed to show how, in five easy steps, you can get those benefits in a corporate remote access solution, as well.

15 Contact Leostream >

Connection Broker Managing User Connections to Workstations, Blades, VDI, and More. Quick Start with Microsoft Hyper-V

Connection Broker Managing User Connections to Workstations, Blades, VDI, and More. Quick Start with Microsoft Hyper-V Connection Broker Managing User Connections to Workstations, Blades, VDI, and More Quick Start with Microsoft Hyper-V Version 8.1 October 21, 2015 Contacting Leostream Leostream Corporation http://www.leostream.com

More information

Transitioning to Leostream from HP SAM

Transitioning to Leostream from HP SAM Transitioning to Leostream from HP SAM Overview This document aims to ease your transition from HP SAM to the Leostream Connection Broker. We want to assure you that the path is not fraught with peril.

More information

Connection Broker Managing User Connections to Workstations, Blades, VDI, and More. Quick Start with Citrix XenDesktop, XenServer & XenApp

Connection Broker Managing User Connections to Workstations, Blades, VDI, and More. Quick Start with Citrix XenDesktop, XenServer & XenApp Connection Broker Managing User Connections to Workstations, Blades, VDI, and More Quick Start with Citrix XenDesktop, XenServer & XenApp Version 8.0 December 9, 2014 Contacting Leostream Leostream Corporation

More information

Configuring Color Access on the WorkCentre 7120 Using Microsoft Active Directory Customer Tip

Configuring Color Access on the WorkCentre 7120 Using Microsoft Active Directory Customer Tip Configuring Color Access on the WorkCentre 7120 Using Microsoft Active Directory Customer Tip October 21, 2010 Overview This document describes how to limit access to color copying and printing on the

More information

Connection Broker Managing User Connections to Workstations and Blades, OpenStack Clouds, VDI, and More

Connection Broker Managing User Connections to Workstations and Blades, OpenStack Clouds, VDI, and More Connection Broker Managing User Connections to Workstations and Blades, OpenStack Clouds, VDI, and More Leostream Connect Administrator s Guide and End User s Manual Version 3.5 / 3.1 January 14, 2016

More information

Outgoing VDI Gateways:

Outgoing VDI Gateways: ` Outgoing VDI Gateways: Creating a Unified Outgoing Virtual Desktop Infrastructure with Windows Server 2008 R2 and ObserveIT Daniel Petri January 2010 Copyright 2010 ObserveIT Ltd. 2 Table of Contents

More information

Connection Broker Managing User Connections to Workstations and Blades, OpenStack Clouds, VDI, and more. Leostream Agent Administrator s Guide

Connection Broker Managing User Connections to Workstations and Blades, OpenStack Clouds, VDI, and more. Leostream Agent Administrator s Guide Connection Broker Managing User Connections to Workstations and Blades, OpenStack Clouds, VDI, and more Leostream Agent Administrator s Guide Version 6.0 / 4.0 January 14, 2016 Contacting Leostream Leostream

More information

Active Directory Integration

Active Directory Integration January 11, 2011 Author: Audience: SWAT Team Evaluator Product: Cymphonix Network Composer EX Series, XLi OS version 9 Active Directory Integration The following steps will guide you through the process

More information

External Authentication with Citrix Secure Gateway - Presentation server Authenticating Users Using SecurAccess Server by SecurEnvoy

External Authentication with Citrix Secure Gateway - Presentation server Authenticating Users Using SecurAccess Server by SecurEnvoy External Authentication with Citrix Secure Gateway - Presentation server Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210

More information

How A Connection Broker Simplifies Hosted Desktop Environments

How A Connection Broker Simplifies Hosted Desktop Environments How A Connection Broker Simplifies Hosted Desktop Environments 5 Reasons Why an Independent Connection Broker is the Way to Go A Publication by Leostream Corporation Introduction When moving resources

More information

Virtual Desktop Infrastructure

Virtual Desktop Infrastructure Virtual Desktop Infrastructure Thomas Huber Regional SE Manager EMEA Eastern Region thuber@vmware.com New Product Announcements at VMworld Infrastructure Optimization Management & Automation Distributed

More information

Microsoft Terminal Server and Citrix Presentation Server Deployment Environments

Microsoft Terminal Server and Citrix Presentation Server Deployment Environments Microsoft Terminal Server and Citrix Presentation Server Deployment Environments Understanding the use of Act! in a Terminal Server or Citrix Presentation Server environment Table of Contents Introduction...

More information

Customer Tips. Configuring Color Access on the WorkCentre 7328/7335/7345 using Windows Active Directory. for the user. Overview

Customer Tips. Configuring Color Access on the WorkCentre 7328/7335/7345 using Windows Active Directory. for the user. Overview Xerox Multifunction Devices Customer Tips February 13, 2008 This document applies to the stated Xerox products. It is assumed that your device is equipped with the appropriate option(s) to support the

More information

How To Set Up A Macintosh With A Cds And Cds On A Pc Or Macbook With A Domain Name On A Macbook (For A Pc) For A Domain Account (For An Ipad) For Free

How To Set Up A Macintosh With A Cds And Cds On A Pc Or Macbook With A Domain Name On A Macbook (For A Pc) For A Domain Account (For An Ipad) For Free Setting Up a Macintosh For Use In The Medical Center The purpose of this document is to provide some assistance and direction to the users of Macintosh computers in The Medical Center network environment.

More information

Enterprise Solution for Remote Desktop Services... 2. System Administration... 3. Server Management... 4. Server Management (Continued)...

Enterprise Solution for Remote Desktop Services... 2. System Administration... 3. Server Management... 4. Server Management (Continued)... CONTENTS Enterprise Solution for Remote Desktop Services... 2 System Administration... 3 Server Management... 4 Server Management (Continued)... 5 Application Management... 6 Application Management (Continued)...

More information

Technical White Paper BlackBerry Enterprise Server

Technical White Paper BlackBerry Enterprise Server Technical White Paper BlackBerry Enterprise Server BlackBerry Enterprise Edition for Microsoft Exchange For GPRS Networks Research In Motion 1999-2001, Research In Motion Limited. All Rights Reserved Table

More information

Connection Broker Managing User Connections to Workstations, Blades, VDI, and more. Administrator s Guide

Connection Broker Managing User Connections to Workstations, Blades, VDI, and more. Administrator s Guide Connection Broker Managing User Connections to Workstations, Blades, VDI, and more Administrator s Guide Version 8.1 October 21, 2015 Contacting Leostream Leostream Corporation http://www.leostream.com

More information

Test Case 3 Active Directory Integration

Test Case 3 Active Directory Integration April 12, 2010 Author: Audience: Joe Lowry and SWAT Team Evaluator Test Case 3 Active Directory Integration The following steps will guide you through the process of directory integration. The goal of

More information

Quick Start Guide for Parallels Virtuozzo

Quick Start Guide for Parallels Virtuozzo PROPALMS VDI Version 2.1 Quick Start Guide for Parallels Virtuozzo Rev. 1.1 Published: JULY-2011 1999-2011 Propalms Ltd. All rights reserved. The information contained in this document represents the current

More information

Connection Broker Managing User Connections to Workstations, Blades, VDI, and more. Security Review

Connection Broker Managing User Connections to Workstations, Blades, VDI, and more. Security Review Connection Broker Managing User Connections to Workstations, Blades, VDI, and more Security Review Version 8.1 October 21, 2015 Contacting Leostream Leostream Corporation http://www.leostream.com 465 Waverley

More information

Quick Start Guide for VMware and Windows 7

Quick Start Guide for VMware and Windows 7 PROPALMS VDI Version 2.1 Quick Start Guide for VMware and Windows 7 Rev. 1.1 Published: JULY-2011 1999-2011 Propalms Ltd. All rights reserved. The information contained in this document represents the

More information

3. What are the primary business drivers behind the virtualization assessment effort?

3. What are the primary business drivers behind the virtualization assessment effort? 1 Overview 1. Who are the key desktop and application stakeholders within your organization? What areas of responsibility do each cover (workflows, coverage, 24/7 staff members are good to identify at

More information

SA Citrix Virtual Desktop Infrastructure (VDI) Configuration Guide

SA Citrix Virtual Desktop Infrastructure (VDI) Configuration Guide SA Citrix Virtual Desktop Infrastructure (VDI) Configuration Guide Published July 2015 This document covers steps to configure Citrix VDI on Pulse Secure s SA Series SSL VPN platforms. It also covers brief

More information

Contents. Overview. The notes in this document are written for Windows 7 though the steps are fairly similar in earlier versions of Windows.

Contents. Overview. The notes in this document are written for Windows 7 though the steps are fairly similar in earlier versions of Windows. Using Remote Desktop By Christopher A. Leonti Information Technology Support Specialist College of Ag / Montana Ag Experiment Station Montana State University-Bozeman http://ag.montana.edu/infotech Contents

More information

Setting Up Scan to SMB on TaskALFA series MFP s.

Setting Up Scan to SMB on TaskALFA series MFP s. Setting Up Scan to SMB on TaskALFA series MFP s. There are three steps necessary to set up a new Scan to SMB function button on the TaskALFA series color MFP. 1. A folder must be created on the PC and

More information

WatchGuard Mobile User VPN Guide

WatchGuard Mobile User VPN Guide WatchGuard Mobile User VPN Guide Mobile User VPN establishes a secure connection between an unsecured remote host and a protected network over an unsecured network using Internet Protocol Security (IPSec).

More information

SSL VPN Setup for Windows

SSL VPN Setup for Windows SSL VPN Setup for Windows SSL VPN allows you to connect from off campus to access campus resources such as Outlook email client, file sharing and remote desktop. These instructions will guide you through

More information

Propalms TSE Deployment Guide

Propalms TSE Deployment Guide Propalms TSE Deployment Guide Version 7.0 Propalms Ltd. Published October 2013 Overview This guide provides instructions for deploying Propalms TSE in a production environment running Windows Server 2003,

More information

Deployment Guide for Citrix XenDesktop

Deployment Guide for Citrix XenDesktop Deployment Guide for Citrix XenDesktop Securing and Accelerating Citrix XenDesktop with Palo Alto Networks Next-Generation Firewall and Citrix NetScaler Joint Solution Table of Contents 1. Overview...

More information

Connection Broker Managing User Connections to Workstations and Blades, OpenStack Clouds, VDI, and More. Glossary

Connection Broker Managing User Connections to Workstations and Blades, OpenStack Clouds, VDI, and More. Glossary Connection Broker Managing User Connections to Workstations and Blades, OpenStack Clouds, VDI, and More Glossary Versions 8.1 January 14, 2016 Contacting Leostream Leostream Corporation 465 Waverley Oaks

More information

Connection Broker Managing User Connections to Workstations and Blades, OpenStack Clouds, VDI, and more. Security Review

Connection Broker Managing User Connections to Workstations and Blades, OpenStack Clouds, VDI, and more. Security Review Connection Broker Managing User Connections to Workstations and Blades, OpenStack Clouds, VDI, and more Security Review Version 8.1 March 31, 2016 Contacting Leostream Leostream Corporation http://www.leostream.com

More information

SA Citrix Virtual Desktop Infrastructure (VDI) Configuration Guide

SA Citrix Virtual Desktop Infrastructure (VDI) Configuration Guide SA Citrix Virtual Desktop Infrastructure (VDI) Configuration Guide This document covers steps to configure Citrix VDI on Juniper Network s SA Series SSL VPN platforms. It also covers brief overview of

More information

How To Integrate Watchguard Xtm With Secur Access With Watchguard And Safepower 2Factor Authentication On A Watchguard 2T (V2) On A 2Tv 2Tm (V1.2) With A 2F

How To Integrate Watchguard Xtm With Secur Access With Watchguard And Safepower 2Factor Authentication On A Watchguard 2T (V2) On A 2Tv 2Tm (V1.2) With A 2F External Authentication with Watchguard XTM Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210 Parkview Arlington Business Park

More information

Remote Application Server Version 14. Last updated: 06-02-15

Remote Application Server Version 14. Last updated: 06-02-15 Remote Application Server Version 14 Last updated: 06-02-15 Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise

More information

DEPLOYMENT GUIDE. Deploying the BIG-IP LTM v9.x with Microsoft Windows Server 2008 Terminal Services

DEPLOYMENT GUIDE. Deploying the BIG-IP LTM v9.x with Microsoft Windows Server 2008 Terminal Services DEPLOYMENT GUIDE Deploying the BIG-IP LTM v9.x with Microsoft Windows Server 2008 Terminal Services Deploying the BIG-IP LTM system and Microsoft Windows Server 2008 Terminal Services Welcome to the BIG-IP

More information

Manufacturing Representative SSL VDM Login User s Guide

Manufacturing Representative SSL VDM Login User s Guide June 12 2008 Ver. 1.5 KEMET Corporation Manufacturing Representative SSL VDM Login User s Guide This document is a guide to assist a Manufacturing Representative (MFG REP) to connect and login to the SSL

More information

WinConnect Server ES User Manual

WinConnect Server ES User Manual THINSOFT PTE LTD 23 Tai Seng Drive, #06-00, Singapore 535224, Fax (65) 6289-7308 www.thinsoftinc.com WinConnect Server ES User Manual Document Version 1.0 1 WinConnect Server ES User Manual Copyright 2007

More information

Accessing SSL VPN with Mac OS X

Accessing SSL VPN with Mac OS X Accessing SSL VPN with Mac OS X Requirements -Safari Web Browser -Network Connect link -Windows Remote Desktop for Mac -IP address and login information of PC on Mount Auburn s network -ITS username and

More information

2X ApplicationServer & LoadBalancer & VirtualDesktopServer Manual

2X ApplicationServer & LoadBalancer & VirtualDesktopServer Manual 2X ApplicationServer & LoadBalancer & VirtualDesktopServer Manual 2X VirtualDesktopServer Contents 1 2X VirtualDesktopServer Contents 2 URL: www.2x.com E-mail: info@2x.com Information in this document

More information

DEPLOYMENT GUIDE DEPLOYING THE BIG-IP LTM SYSTEM WITH MICROSOFT WINDOWS SERVER 2008 TERMINAL SERVICES

DEPLOYMENT GUIDE DEPLOYING THE BIG-IP LTM SYSTEM WITH MICROSOFT WINDOWS SERVER 2008 TERMINAL SERVICES DEPLOYMENT GUIDE DEPLOYING THE BIG-IP LTM SYSTEM WITH MICROSOFT WINDOWS SERVER 2008 TERMINAL SERVICES Deploying the BIG-IP LTM system and Microsoft Windows Server 2008 Terminal Services Welcome to the

More information

Remote Application Server Version 14. Last updated: 25-02-15

Remote Application Server Version 14. Last updated: 25-02-15 Remote Application Server Version 14 Last updated: 25-02-15 Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise

More information

Accops HyWorks v2.5. Quick Start Guide. Last Update: 4/18/2016

Accops HyWorks v2.5. Quick Start Guide. Last Update: 4/18/2016 Accops HyWorks v2.5 Quick Start Guide Last Update: 4/18/2016 2016 Propalms Technologies Pvt. Ltd. All rights reserved. The information contained in this document represents the current view of Propalms

More information

Training module 2 Installing VMware View

Training module 2 Installing VMware View Training module 2 Installing VMware View In this second module we ll install VMware View for an End User Computing environment. We ll install all necessary parts such as VMware View Connection Server and

More information

External Authentication with Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy

External Authentication with Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy External Authentication with Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210 Parkview Arlington

More information

Safe Haven User Guide

Safe Haven User Guide Safe Haven User Guide Date: October 2015 Version: 2.1 21/10/15 Health Informatics Centre Safe Haven VDI 1 Contents Safe Haven VDI... 3 Introduction... 3 Key Features and Benefits... 3 VDI Portal... 3 VMware

More information

2X ApplicationServer & LoadBalancer Manual

2X ApplicationServer & LoadBalancer Manual 2X ApplicationServer & LoadBalancer Manual 2X ApplicationServer & LoadBalancer Contents 1 URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies,

More information

Dell SonicWALL and SecurEnvoy Integration Guide. Authenticating Users Using SecurAccess Server by SecurEnvoy

Dell SonicWALL and SecurEnvoy Integration Guide. Authenticating Users Using SecurAccess Server by SecurEnvoy Dell SonicWALL and SecurEnvoy Integration Guide Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 Merlin House Brunel Road Theale

More information

How to Setup PPTP VPN Between a Windows PPTP Client and the DIR-130.

How to Setup PPTP VPN Between a Windows PPTP Client and the DIR-130. Note: DIR-130 FW: 1.21 How to Setup PPTP VPN Between a Windows PPTP Client and the DIR-130. This setup example uses the following network settings: D-Link Technical Support PPTP VPN Between Windows PPTP

More information

Contents Overview of RD Web Access... 2. What is RD Web Access?... 2 What are the benefits of RD Web Access versus thin client?...

Contents Overview of RD Web Access... 2. What is RD Web Access?... 2 What are the benefits of RD Web Access versus thin client?... Purpose & Scope The purpose of this document is to provide business advantages, system administrat installation, and end-user access procedures f the use of Remote Desktop (RD) Web Access f Instrument

More information

Remote Access. Connecting to your computer from home

Remote Access. Connecting to your computer from home Remote Access Connecting to your computer from home IT Desktop Support Client and Research Services October 2009 2 Contents Overview 3 Windows 4 Setup 4 Remote Desktop 4 From work 4 From home 4 Installing

More information

SonicWALL SRA Virtual Appliance Getting Started Guide

SonicWALL SRA Virtual Appliance Getting Started Guide COMPREHENSIVE INTERNET SECURITY SonicWALL Secure Remote Access Appliances SonicWALL SRA Virtual Appliance Getting Started Guide SonicWALL SRA Virtual Appliance5.0 Getting Started Guide This Getting Started

More information

Connection Broker Managing User Connections to Workstations, Blades, VDI, and More. Screen Management for Multiple Displays

Connection Broker Managing User Connections to Workstations, Blades, VDI, and More. Screen Management for Multiple Displays Connection Broker Managing User Connections to Workstations, Blades, VDI, and More Screen Management for Multiple Displays Version 8.0 December 9, 2014 Contacting Leostream Leostream Corporation 465 Waverley

More information

VMware Virtual Desktop Infrastructure (VDI) - The Best Strategy for Managing Desktop Environments Mike Coleman, VMware (mcoleman@vmware.

VMware Virtual Desktop Infrastructure (VDI) - The Best Strategy for Managing Desktop Environments Mike Coleman, VMware (mcoleman@vmware. VMware Virtual Desktop Infrastructure (VDI) - The Best Strategy for Managing Desktop Environments Mike Coleman, VMware (mcoleman@vmware.com) Copyright 2008 EMC Corporation. All rights reserved. Agenda

More information

How do I use Citrix Staff Remote Desktop

How do I use Citrix Staff Remote Desktop How do I use Citrix Staff Remote Desktop September 2014 Initial Log On In order to login into the new Citrix system, you need to go to the following web address. https://remotets.tees.ac.uk/ Be sure to

More information

Setting up VPN and Remote Desktop for Home Use

Setting up VPN and Remote Desktop for Home Use Setting up VPN and Remote Desktop for Home Use Contents I. Prepare Your Work Computer... 1 II. Prepare Your Home Computer... 2 III. Run the VPN Client... 3-4 IV. Remote Connect to Your Work Computer...

More information

VMware Identity Manager Administration

VMware Identity Manager Administration VMware Identity Manager Administration VMware Identity Manager 2.4 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

What is the Barracuda SSL VPN Server Agent?

What is the Barracuda SSL VPN Server Agent? The standard communication model for outgoing calls is for the appliance to simply make a direct connection to the destination host. This paradigm does not suit all business needs. The Barracuda SSL VPN

More information

Deploying Remote Desktop Connection Broker with High Availability Step-by-Step Guide

Deploying Remote Desktop Connection Broker with High Availability Step-by-Step Guide Deploying Remote Desktop Connection Broker with High Availability Step-by-Step Guide Microsoft Corporation Published: May 2010 Abstract This guide describes the steps for configuring Remote Desktop Connection

More information

Configuring the Cisco ISA500 for Active Directory/LDAP and RADIUS Authentication

Configuring the Cisco ISA500 for Active Directory/LDAP and RADIUS Authentication Configuring the Cisco ISA500 for Active Directory/LDAP and RADIUS Authentication This application note describes how to authenticate users on a Cisco ISA500 Series security appliance. It includes these

More information

WhatsUp Gold v16.3 Installation and Configuration Guide

WhatsUp Gold v16.3 Installation and Configuration Guide WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard

More information

AirStation VPN Setup Guide WZR-RS-G54

AirStation VPN Setup Guide WZR-RS-G54 AirStation VPN Setup Guide WZR-RS-G54 WZR-RS-G54 Introduction The WZR-RS-G54 s VPN services allows users to securely access their home or office network from anywhere in the world. All services available

More information

External Authentication with Windows 2003 Server with Routing and Remote Access service Authenticating Users Using SecurAccess Server by SecurEnvoy

External Authentication with Windows 2003 Server with Routing and Remote Access service Authenticating Users Using SecurAccess Server by SecurEnvoy External Authentication with Windows 2003 Server with Routing and Remote Access service Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845

More information

Installing and Configuring vcloud Connector

Installing and Configuring vcloud Connector Installing and Configuring vcloud Connector vcloud Connector 2.7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

How to remotely access your Virtual Desktop from outside the college using VMware View Client. How to guide

How to remotely access your Virtual Desktop from outside the college using VMware View Client. How to guide How to remotely access your Virtual Desktop from outside the college using VMware View Client How to guide Author: ICT Services Version: 1.0 Date: November 2015 Contents What is the VMware View Client?...

More information

How To Install Ru-Vpn On A Pc Or Macbook Or Ipad (For Macbook) With A Microsoft Macbook (For Pc) With An Ipad Or Ipa (For A Macbook). Pc (For An

How To Install Ru-Vpn On A Pc Or Macbook Or Ipad (For Macbook) With A Microsoft Macbook (For Pc) With An Ipad Or Ipa (For A Macbook). Pc (For An RU-VPN Installation Instructions (Windows Vista and Windows 7) An RU-VPN id allows authorized users to access Ryerson s Administrative Systems via the internet. RU-VPN utilizes a digital certificate that

More information

NETASQ SSO Agent Installation and deployment

NETASQ SSO Agent Installation and deployment NETASQ SSO Agent Installation and deployment Document version: 1.3 Reference: naentno_sso_agent Page 1 / 20 Copyright NETASQ 2013 General information 3 Principle 3 Requirements 3 Active Directory user

More information

Installing the VMware Horizon View Client to Access Hoag Virtual Desktops

Installing the VMware Horizon View Client to Access Hoag Virtual Desktops Installing the VMware Horizon View Client to Access Hoag Virtual Desktops Hoag IT Department For questions or further assistance, please contact the Service Desk: 949-764-8600, option 2 1 Table of Contents

More information

CITRIX 1Y0-A17 EXAM QUESTIONS & ANSWERS

CITRIX 1Y0-A17 EXAM QUESTIONS & ANSWERS CITRIX 1Y0-A17 EXAM QUESTIONS & ANSWERS Number: 1Y0-A17 Passing Score: 800 Time Limit: 120 min File Version: 38.7 http://www.gratisexam.com/ CITRIX 1Y0-A17 EXAM QUESTIONS & ANSWERS Exam Name: Implementing

More information

User Management Guide

User Management Guide AlienVault Unified Security Management (USM) 4.x-5.x User Management Guide USM v4.x-5.x User Management Guide, rev 1 Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,

More information

SSL VPN Support Guide

SSL VPN Support Guide P a g e 1 SSL VPN Support Guide Revision date: 5/4/10 P a g e 2 Table of Contents Before calling the Support Desk..pg 3 What the Support Desk can assist users with. pg 4 Instructions for PC users (Internet

More information

Contents. Platform Compatibility. Directory Connector SonicWALL Directory Services Connector 3.1.7

Contents. Platform Compatibility. Directory Connector SonicWALL Directory Services Connector 3.1.7 Directory Connector SonicWALL Directory Services Connector 3.1.7 Contents Platform Compatibility... 1 New Features... 2 Known Issues... 3 Resolved Issues... 4 Overview... 7 About SonicWALL Single Sign-On

More information

VMware Virtual Desktop Manager User Authentication Guide

VMware Virtual Desktop Manager User Authentication Guide Technical Note VMware Virtual Desktop Manager User Authentication Guide VMware Virtual Desktop Manager The purpose of this guide is to provide details of user authentication in VMware Virtual Desktop Manager

More information

Comodo Endpoint Security Manager SME Software Version 2.1

Comodo Endpoint Security Manager SME Software Version 2.1 Comodo Endpoint Security Manager SME Software Version 2.1 Quick Start Guide Guide Version 2.1.111114 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Endpoint Security Manager - SME Quick

More information

IGEL Linux and Microsoft Remote Desktop Connection Broker 2012 R2

IGEL Linux and Microsoft Remote Desktop Connection Broker 2012 R2 Whitepaper IGEL Linux and Microsoft Remote Desktop Connection Broker 2012 R2 Version 1.00 Blog: blog.cloud-client.info Website: www.cloud-client.info This document can be distributed / used free of charge

More information

Active Directory integration with CloudByte ElastiStor

Active Directory integration with CloudByte ElastiStor Active Directory integration with CloudByte ElastiStor Prerequisite Change the time and the time zone of the Active Directory Server to the VSM time and time zone. Enabling Active Directory at VSM level

More information

Accessing the Media General SSL VPN

Accessing the Media General SSL VPN Launching Applications and Mapping Drives Remote Desktop Outlook Launching Web Applications Full Access VPN Note: To access the Media General VPN, anti-virus software must be installed and running on your

More information

Virtual Owl. Guide for Windows. University Information Technology Services. Training, Outreach, Learning Technologies & Video Production

Virtual Owl. Guide for Windows. University Information Technology Services. Training, Outreach, Learning Technologies & Video Production Virtual Owl Guide for Windows University Information Technology Services Training, Outreach, Learning Technologies & Video Production Copyright 2015 KSU Division of University Information Technology Services

More information

Connecting to the FILTER Virtual Private Network (VPN)

Connecting to the FILTER Virtual Private Network (VPN) Create FILTER VPN Connection Filter s VPN allows computers at remote locations (e.g. home, hotels, Starbucks?) to connect directly and securely to FILTER s corporate network. Computers connected by VPNs

More information

Upgrading User-ID. Tech Note PAN-OS 4.1. 2011, Palo Alto Networks, Inc.

Upgrading User-ID. Tech Note PAN-OS 4.1. 2011, Palo Alto Networks, Inc. Upgrading User-ID Tech Note PAN-OS 4.1 Revision B 2011, Palo Alto Networks, Inc. Overview PAN-OS 4.1 introduces significant improvements in the User-ID feature by adding support for multiple user directories,

More information

Connecting to the Remote Desktop Service

Connecting to the Remote Desktop Service Connecting to the Remote Desktop Service What is the Remote Desktop Service? Connecting to a University of Greenwich Remote Desktop allows you to work securely on documents and files held on the University's

More information

Guideline for setting up a functional VPN

Guideline for setting up a functional VPN Guideline for setting up a functional VPN Why do I want a VPN? VPN by definition creates a private, trusted network across an untrusted medium. It allows you to connect offices and people from around the

More information

Microsoft XP Professional Remote Desktop Connection

Microsoft XP Professional Remote Desktop Connection Microsoft XP Professional Remote Desktop Connection With Remote Desktop, you get full, secure access to your work computer via an Internet or network connection. For example, you can connect to your office

More information

Content Filtering Client Policy & Reporting Administrator s Guide

Content Filtering Client Policy & Reporting Administrator s Guide Content Filtering Client Policy & Reporting Administrator s Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION

More information

Cloudvue Remote Desktop Client GUI User Guide

Cloudvue Remote Desktop Client GUI User Guide Cloudvue Remote Desktop Client GUI User Guide I. To connect to a Windows server - After power up, the login screen will be displayed. A. Auto Search/User Defined Use Auto Search to find available Windows

More information

Getting Started with VMware Horizon View (Remote Access)

Getting Started with VMware Horizon View (Remote Access) Getting Started with VMware Horizon View (Remote Access) In an effort to improve remote access and provide a familiar desktop experience at home, we are transitioning away from Citrix and implementing

More information

An additional website URL has been added to the districts website address making this gateway easy to access and bookmark for future use.

An additional website URL has been added to the districts website address making this gateway easy to access and bookmark for future use. Veribest ISD Virtual Desktop Integration Installing vworkstation for Remote (Home) Use Section 1: Installing the vworkstation Gateway The convenience of home access to your school district desktop is going

More information

Apple Mac VPN Service Setting up Remote Desktop

Apple Mac VPN Service Setting up Remote Desktop Apple Mac VPN Service Setting up Remote Desktop After you have successfully connected via the VPN client to the University network you will then need to make the connection to your machine. To do this

More information

Draytek Vigor 2820/2830 Configuration. A guide for Exa Resellers and IT Contractors

Draytek Vigor 2820/2830 Configuration. A guide for Exa Resellers and IT Contractors Draytek Vigor 2820/2830 Configuration A guide for Exa Resellers and IT Contractors Contents About this guide...3 Vigor Router Configuration (ADSL)...4 Vigor Router Configuration (FTTC)...4 Vigor Router

More information

F re Alarm Network etwo (FAN) T rou rou h Virt Vi ual u Private Network etwo (VPN) Dr. Dr Sa S mir H. Abdull--Ja J u a wad

F re Alarm Network etwo (FAN) T rou rou h Virt Vi ual u Private Network etwo (VPN) Dr. Dr Sa S mir H. Abdull--Ja J u a wad Fire Alarm Network (FAN) Through Virtual Private Network (VPN) By Dr. Samir H. Abdul-Jauwad Director General (Acting) Environment, Health and Safety Department July 07, 2013 1 Outline Introduction of Virtual

More information

Using TS-ACCESS for Remote Desktop Access

Using TS-ACCESS for Remote Desktop Access Using TS-ACCESS for Remote Desktop Access Introduction TS-ACCESS is a remote desktop access feature available to CUA faculty and staff who need to access administrative systems or other computing resources

More information

Viking VPN Guide Mac OSX RDP Usage

Viking VPN Guide Mac OSX RDP Usage Viking VPN Guide Mac OSX RDP Usage Table Of Contents 1 : What is RDP 2 : Enabling RDP on your Office PC 3 : Installing the RDP client on your Home Mac 4 : Connecting to your Office PC from your Home Mac

More information

Citrix XenApp Manager 1.0. Administrator s Guide. For Windows 8/RT. Published 10 December 2012. Edition 1.0.1

Citrix XenApp Manager 1.0. Administrator s Guide. For Windows 8/RT. Published 10 December 2012. Edition 1.0.1 Citrix XenApp Manager 1.0 For Windows 8/RT Administrator s Guide Published 10 December 2012 Edition 1.0.1 Citrix XenApp Manager for Windows 8/RT Administrator s Guide Copyright 2012 Citrix Systems. Inc.

More information

800-782-3762 www.stbernard.com. Active Directory 2008 Implementation. Version 6.410

800-782-3762 www.stbernard.com. Active Directory 2008 Implementation. Version 6.410 800-782-3762 www.stbernard.com Active Directory 2008 Implementation Version 6.410 Contents 1 INTRODUCTION...2 1.1 Scope... 2 1.2 Definition of Terms... 2 2 SERVER CONFIGURATION...3 2.1 Supported Deployment

More information

1. Installation Overview

1. Installation Overview Quick Install Guide 1. Installation Overview Thank you for selecting Bitdefender Business Solutions to protect your business. This document enables you to quickly get started with the installation of Bitdefender

More information

Installing and Configuring vcloud Connector

Installing and Configuring vcloud Connector Installing and Configuring vcloud Connector vcloud Connector 2.0.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

ThinPoint Quick Start Guide

ThinPoint Quick Start Guide ThinPoint Quick Start Guide 2 ThinPoint Quick Start Guide Table of Contents Part 1 Introduction 3 Part 2 ThinPoint Windows Host Installation 3 1 Compatibility... list 3 2 Pre-requisites... 3 3 Installation...

More information

Windows and MAC User Handbook Remote and Secure Connection Version 1.01 09/19/2013. User Handbook

Windows and MAC User Handbook Remote and Secure Connection Version 1.01 09/19/2013. User Handbook Windows and MAC User Handbook How to Connect Your PC or MAC Remotely and Securely to Your U.S. Department of Commerce Account Developed for You by the Office of IT Services (OITS)/IT Service Desk *** For

More information

ipad or iphone with Junos Pulse and Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy

ipad or iphone with Junos Pulse and Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy ipad or iphone with Junos Pulse and Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210 Parkview Arlington

More information

Maximize your Remote Desktop Services

Maximize your Remote Desktop Services Maximize your Remote Desktop Services White paper Parallels An Overview of Remote Desktop Services Virtualization has added new issues to information technology. Today, businesses look not only at optimizing

More information

Virtual Appliance Setup Guide

Virtual Appliance Setup Guide The Virtual Appliance includes the same powerful technology and simple Web based user interface found on the Barracuda Web Application Firewall hardware appliance. It is designed for easy deployment on

More information