Chapter 7. Molding and Securing the User Environment

If you’re reading this book in order, at this point, your users can use their virtual machines (VMs) or sessions. The servers are set up, the profiles and folder redirection are all configured, and user devices are redirected. The only catch is that now the user work environments are wide open.

Giving users non-secured work environments might be all right. As you’ll learn in this chapter, the rules for security will likely vary with the kind of work environment that you’re supporting. RD Session Host servers ...

Get Windows Server® 2008 R2 Remote Desktop Services Resource Kit now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.