Chapter 7. Molding and Securing the User Environment

If you’re reading this book in order, at this point, your users can use their virtual machines (VMs) or sessions. The servers are set up, the profiles and folder redirection are all configured, and user devices are redirected. The only catch is that now the user work environments are wide open.

Giving users non-secured work environments might be all right. As you’ll learn in this chapter, the rules for security will likely vary with the kind of work environment that you’re supporting. RD Session Host servers ...

Get Windows Server® 2008 R2 Remote Desktop Services Resource Kit now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.