O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

VMware View Security Essentials

Book Description

The vital elements of securing your View environment are the subject of this user-friendly guide. From a theoretical overview to practical instructions, it’s the ideal tutorial for beginners and an essential reference source for the more experienced.

  • Discover how to correctly implement View connection, security, and transfer servers
  • Understand all the firewall rules and the basics of multi-layered security
  • Secure all your connections between client and desktop

In Detail

Most people associate security with network security and focus on firewalls and network monitoring. However, there is more to security than that. Security starts with the establishment of a stable environment, protecting this environment not only from intrusion, but also from malicious intent. It is about tracking the issue and recovering from it. These elements of security are what this book aims to address.

VMware View Security Essentials addresses the topic of security in the corporate environment in a new way. It starts with the underlying virtual infrastructure and then delves into securing your base, your connection, and your client. This is not only a “how-to” book, but is also a book that explains the background and the insights of View security for the experienced professional's desktop virtualization.

This book takes you through the four major View security areas. Each area deals with all the aspects of security and explains the background as well as laying out simple-to-follow recipes to implement a higher security standard.

We start at the Virtualization base and work our way through the various View server types. We will then dive into the problems and issues of securing a connection before we address the security of the desktop itself. We conclude with a look into the backing up of our View installation and preparing for disaster recovery.

Table of Contents

  1. VMware View Security Essentials
    1. Table of Contents
    2. VMware View Security Essentials
    3. Credits
    4. About the Author
    5. About the Reviewers
    6. www.PacktPub.com
      1. Support files, eBooks, discount offers and more
        1. Why Subscribe?
        2. Free Access for Packt account holders
        3. Instant Updates on New Packt Books
    7. Preface
      1. What this book covers
      2. What you need for this book
      3. Who this book is for
      4. Conventions
      5. Reader feedback
      6. Customer support
        1. Errata
        2. Piracy
        3. Questions
    8. 1. Introduction to View
      1. VMware View definitions
      2. Summary
    9. 2. Securing Your Base
      1. vSphere considerations
        1. VMware High Availability (HA)
        2. Fault Tolerance (FT)
        3. DRS and resource pools
      2. Capacity planning
      3. Basic View hardening
        1. vSphere hardening
        2. Operating system (OS) hardening
        3. User accounts
        4. A View Administrator Console user
        5. Services
      4. Logging
        1. The Event Database
        2. Logfiles
        3. VMware support logs
      5. SSL certificates
        1. Creating a Certificate Authority (CA) and obtaining a certificate
          1. Creating a CA on AD
          2. Creating a certificate
          3. Importing a certificate
          4. Retrofit vSphere
          5. The View Composer
            1. Installer
            2. Retrofit
          6. The View Connection Server
      6. Creating a redundant View Connection Server
        1. Usage of a replica server
        2. Installation of a replica server
        3. Creating a load balanced View Connection Server
        4. A configuration example with vCloud Network and Security (vCNS or vShield)
      7. Summary
    10. 3. Securing the Connection
      1. View connections
      2. A View DMZ
      3. View Security Server
        1. Setup
        2. Load balancing
        3. General connection settings
      4. Desktop connection
        1. A quick look at TCP and UDP
        2. Remote Desktop Protocol (RDP)
        3. PCoverIP (PCoIP)
        4. RDP and PCoIP – direct comparison
        5. Setting up PCoIP Secure Gateway
        6. HTTP(s) secure tunnel
        7. USB redirection
        8. Multimedia redirect (MMR)
      5. View Transfer Server
        1. Setup
      6. Server connection
        1. View connect and security firewall rules
      7. Summary
    11. 4. Securing the Client
      1. Client software
        1. View Client
        2. View Agent
      2. Local Mode
      3. Global settings
      4. View desktop pools
        1. The Settings tab
        2. The Inventory tab
        3. The Sessions tab
        4. The Entitlements tab
        5. The Events tab
        6. The Policies tab
      5. Working with ADM templates
        1. Importing View ADM templates
        2. View Agent settings
        3. View Client settings
        4. Working with USB devices
        5. View Persona management
      6. Example setup
      7. Summary
    12. 5. Backup and Recovery
      1. Backup and recovery
      2. The vSphere environment
        1. VMware View Servers
        2. Basic infrastructure
          1. Desktop pools and linked cloning
          2. Documenting – the ultimate backup
          3. Backup timing
      3. Patching the View environment
        1. View server
        2. View desktops
      4. Summary
    13. Index