Professional Documents
Culture Documents
3
Administration Guide
©2017 Dell Inc.
ALL RIGHTS RESERVED.
This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a
software license or nondisclosure agreement. This software may be used or copied only in accordance with the terms of the
applicable agreement. No part of this guide may be reproduced or transmitted in any form or by any means, electronic or
mechanical, including photocopying and recording for any purpose other than the purchaser’s personal use without the written
permission of Dell Inc.
The information in this document is provided in connection with Dell products. No license, express or implied, by estoppel or
otherwise, to any intellectual property right is granted by this document or in connection with the sale of Dell products. EXCEPT
AS SET FORTH IN THE TERMS AND CONDITIONS AS SPECIFIED IN THE LICENSE AGREEMENT FOR THIS PRODUCT, DELL ASSUMES NO
LIABILITY WHATSOEVER AND DISCLAIMS ANY EXPRESS, IMPLIED OR STATUTORY WARRANTY RELATING TO ITS PRODUCTS
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR
NON-INFRINGEMENT. IN NO EVENT SHALL DELL BE LIABLE FOR ANY DIRECT, INDIRECT, CONSEQUENTIAL, PUNITIVE, SPECIAL OR
INCIDENTAL DAMAGES (INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF PROFITS, BUSINESS INTERRUPTION OR LOSS
OF INFORMATION) ARISING OUT OF THE USE OR INABILITY TO USE THIS DOCUMENT, EVEN IF DELL HAS BEEN ADVISED OF THE
POSSIBILITY OF SUCH DAMAGES. Dell makes no representations or warranties with respect to the accuracy or completeness of
the contents of this document and reserves the right to make changes to specifications and product descriptions at any time
without notice. Dell does not make any commitment to update the information contained in this document.
If you have any questions regarding your potential use of this material, contact:
Dell Inc.
Attn: LEGAL Dept.
One Dell Way
Round Rock, TX 78682
Refer to our web site (www.dell.com) for regional and international office information.
Patents
This product is protected by U.S. Patent #: 8,255,984, 8,453,145, 8,560,593, 8,966,112, 9,032,403, 9,054,913, 9,077,583,
9,197,644, 9,311,375, 9,444,808.
Trademarks
Dell, the Dell logo, and Wyse vWorkspace are trademarks of Dell Inc. Other trademarks and trade names may be used in this
document to refer to either the entities claiming the marks and names or their products. Dell disclaims any proprietary interest
in the marks and names of others.
Administration Guide
Updated - February 2017
Software Version - 8.6.3
1
Introduction to Workspace
Virtualization
• About vWorkspace
• vWorkspace virtualization
• vWorkspace resources
• Benefits of vWorkspace
• Key features of vWorkspace
• Infrastructure components
• Infrastructure extensions
• User profile management
• Web Access
• Secure Access service
• License type
• License models
About vWorkspace
Workspace virtualization is a concept in which the desktop environment of a computer is separated from the
physical computer and hosted as a virtual workspace on multiple environments, such as a Virtual Desktop
Infrastructure (VDI), terminal servers, and/or blade PCs running in a data center.
Workspace virtualization helps group and deliver a list of applications or desktops together as a single complete
virtual workspace. It isolates and centralizes an entire computing workspace.
Virtual workspaces can be published and made available to users from a virtual infrastructure comprising
hypervisors, terminal servers, and/or blade PCs. A virtual workspace contains applications, settings, and user-
specific information and can be accessed from most access devices.
Workspace virtualization allows you to maintain a user’s productivity applications from a data center, while
having the flexibility to host these applications on multiple platforms.
vWorkspace virtualization
vWorkspace is a workspace virtualization solution that helps organizations to use the most economical
combinations of virtualization technologies and achieve increased workspace virtualization success.
vWorkspace supports a wide range of technologies and features that help organizations deploy and manage
workspace virtualization projects. vWorkspace also helps leverage existing investments and reduces the cost of
application delivery. This module provides a brief overview of vWorkspace.
With vWorkspace, you can build, implement, and manage a scalable on-demand virtual infrastructure. You can
seamlessly blend multiple virtualization techniques in your infrastructure and achieve lower average cost for
virtual workspace delivery.
vWorkspace helps you deliver full-featured virtual workspaces from a centralized infrastructure that consists of
virtual and physical computers and provision new users quickly. You can provide users with a single, secure
vWorkspace 8.6.3
3
Administration Guide
access point to the vWorkspace-enabled infrastructure through the built-in Secure Access service. vWorkspace
also supports various third-party SSL and VPN appliances to facilitate secure access.
vWorkspace provides a single, graphical console that helps you manage your virtual infrastructure and perform
administrative tasks.
vWorkspace resources
The vWorkspace home page is found at:
http://www.dell.com/us/business/p/dell-software-vworkspace/pdf.
The following resources are available from the vWorkspace web site.
• Software downloads. Select the Download link and log in. Downloadable files include the vWorkspace
product, hotfixes, prerequisites, and documentation.
• Support. Select the Support link to be redirected to the Support Portal web site, where you can
download the latest releases, documentation, and patches; enter new support cases and manage
existing cases using the Case Management option, and search the knowledge base.
• Community. Select the Community link, or use the following URL:
http://en.community.dell.com/techcenter/virtualization/vworkspace
• Third party licenses. View descriptions of third party licenses.
vWorkspace independence
Most organizations use a mix of virtualization technologies and platforms for different categories of users:
knowledge workers, task workers, or power users.
vWorkspace provides several levels of independence that help organizations deliver virtual workspaces.
vWorkspace supports multiple storage optimization options, virtualization platforms, desktop and application
delivery types, display protocols, and access devices. You can mix and match or change technology providers
based on your requirements.
For example, you can choose the storage optimization technologies from companies such as Microsoft and
VMware. You can mix and match desktop and application delivery types from multiple virtualization platforms,
such as Microsoft Hyper-V, Parallels Virtuozzo, and VMware ESX hypervisors. With vWorkspace, you can change
the platform as required. You can also leverage your existing infrastructure investments and blend them with
new investments.
You can deliver virtual workspaces on VDI, Remote Desktop Session Host (RDSH), and blade PCs from a single,
integrated product and use application streaming to ensure optimized management experience. You can also
configure the right computing resource for users based on their needs or job role—for example, full desktop,
seamless windowed applications, or client- and server-directed content.
vWorkspace supports multiple display protocols to ensure optimal user experience. It also supports operating
systems, such as Windows, Macintosh, Linux, and Java, and thin clients from manufacturers such as HP, Wyse,
IGEL, and 10zig.
vWorkspace 8.6.3
4
Administration Guide
Figure 1. Virtualization technologies and platforms used with vWorkspace
Platform management
vWorkspace delivers a management platform that consolidates multiple techniques and technologies.
vWorkspace delivers simplicity to the organization comprised of one user access point, one management
console, excellent user and administrator experience, and the lowest cost for virtual desktop and application
delivery.
vWorkspace delivers five levels of independence, enabling organizations to deliver desktops and applications
with the most cost-effective combination of virtualization technologies for the needs of each user
classification.
• Storage Management
• Virtualization Platforms
• Desktop Application and Delivery Type
• Delivery
• Access Devices
Benefits of vWorkspace
vWorkspace provides several benefits, such as simplified management, improved security and business
continuity, increased workforce productivity, and optimized user experience.
Simplified management
vWorkspace provides a single, graphical management console to perform configuration, management, and
administrative tasks. From this interface, you can configure and manage virtual workspaces across VDI, RDSH,
and blade PC environments. You do not need to switch screens to manage multiple environments. The
Management Console includes wizards that provide step-by-step instructions to perform complex installations.
vWorkspace automates certain administrative tasks, such as provisioning of desktops, resource pooling, and load
balancing.
vWorkspace 8.6.3
5
Administration Guide
Improved security and business continuity
vWorkspace provides security features such as two-factor authentication, built-in Secure Access service, and
delegation of administrator privileges. vWorkspace helps ensure business continuity by providing high system
availability with features such as fault tolerance, rapid recovery, and simple desktop re-provisioning.
Increased workforce productivity
With vWorkspace, you can provide flexible, location- and platform-independent access to your users by
delivering virtual workspaces from multiple virtualization platforms.
Optimized user experience
vWorkspace supports a host of protocols such as Remote Desktop Protocol (RDP), and TCX. Performance
optimizations ensure that the performance of virtual workspaces is as good as or even better than physical
desktops.
Infrastructure components
A vWorkspace farm is a collection of vWorkspace servers and desktop operating systems. The environment
infrastructure consists of databases, the connection broker, the Terminal Server role, the Management Console
role, the data collector service, and the vWorkspace Connectors. Vendor integration is also an important
component of the infrastructure.
vWorkspace infrastructure components that are installed as roles are the prime installable components of
vWorkspace. Each role has a set of features and responsibilities that support the end user’s virtual workspace.
vWorkspace environment databases
vWorkspace includes two types of environment database; Management and Reporting. The Management
database stores all environment-related configurations, data, and activities, and the Reporting database
maintains historical data.
Management database
The Management database performs administrative functions. The Management database stores the information
relevant to a vWorkspace environment, such as configuration data, administrative tasks and results, and
information regarding client connections to virtual desktops and RDSH environments. Each vWorkspace
environment has one Management database associated with it. You can use the data in the Management
database for real-time reporting.
Reporting database
vWorkspace 8.6.3
6
Administration Guide
A Reporting database maintains the history of all activities in the environment. Configuring the Reporting
database is not mandatory.
When an activity occurs in the environment, such as the creation of a virtual computer or user login, the details
of the activity are stored in the Management database. If you enable reporting, SQL Triggers populate the
information written in the Management database to the Reporting database. If you disable reporting, historical
data will not be added to the Reporting database. However, you can still generate real-time reports from the
management database. The Reporting database is useful in troubleshooting scenarios where you need historical
data to find the root cause of a problem. You should configure the reporting database at an initial size of 4 GB
with 10% growth rate.
Connection broker
Helps users connect to their virtual desktops, applications, and other hosted resource sessions. The user’s
connecting device sends a request to the connection broker for connectivity to the virtual environment. The
connection broker processes the request by searching for available desktops, and then redirects the user to the
available managed desktop or application.
The connection broker integrates with different virtualization platforms and supports multiple virtualization
servers simultaneously within a single environment to provision and customize new virtual workspaces. You can
configure multiple connection brokers in a single environment.
The connection broker also performs a variety of management tasks. It validates user names, monitors the
activities of the virtual desktops assigned to the users and sets the status as active or inactive, and
communicates with the data collector service running inside each managed desktop. In case of a logoff or
session reset action, the connection broker marks the virtual desktop as available or logged off.
Terminal server role
A set of executables, dynamic link libraries, and device drivers that provides features and management
functionality for RDSH deployments in a vWorkspace environment.
Management Console
An integrated graphical interface that helps you perform various management and administrative functions. You
can install the Management Console on any workstation or laptop.
The Management Console allows you to configure and manage desktops and applications across multiple
environments in your virtual infrastructure. You do not need to switch screens to manage multiple
environments. The Management Console simplifies management by including various automation tools and step-
by-step instructions for performing any configuration task.
You can launch multiple instances of the Management Console. However, changes made simultaneously by
different administrators can cause configuration conflicts.
Data collector service
A Windows service that you install on RDSH servers, virtual desktops, and blade PCs in a vWorkspace
environment. You also need to install the server component of this service on the connection broker. The data
collector service running on a managed desktop sends a heartbeat signal to the connection broker and
communicates the login status of the managed desktop. In case of an RDSH server, it also communicates
whether the managed desktop can accept additional connections.
vWorkspace Connectors
A vWorkspace Connector allows you to access virtual workspaces from a client device. vWorkspace provides
Connectors for the following platforms:
• Windows Connector. Allows users to access virtual desktops and managed applications from Windows
computers, laptops, and thin client terminals.
vWorkspace has an intuitive Windows application that helps users to view a list of authorized desktops and
applications. vWorkspace Web Access allows users to retrieve a list of available applications or desktops through
a web browser.
The vWorkspace Connector for Windows is available in three client packages. VASCLIENT32, which includes
vWorkspace Connector for Windows and the Web Access component, VASCLIENT32T, which includes only the
Web Access component, and VASCLIENT32TS, which includes a silent installation for Web Access.
vWorkspace 8.6.3
7
Administration Guide
• Linux Connector. Allows users to access virtual desktops from a Linux-based client. It supports Red Hat
Enterprise Linux Desktop.
• Mac OS X Connector. Users can access their virtual desktops from a Mac-based client.
• Java Connector. A platform-independent Connector that works in conjunction with the Web Access
component.
• iOS Connector. Allows users to connect to virtual desktops from an iOS device. It has a built-in support
for VPN connections.
• Android Connector. Allows users to connect to virtual desktops from an Android device.
Vendor integration
vWorkspace integrates with several vendor platforms and technologies. You can choose those that best meet
your requirements and configure your virtual infrastructure. Some of the key vendor technologies that you can
integrate with vWorkspace include remote desktop services, such as RD Session Host and RD Connection Broker,
Hyper-V/SCVMM, RemoteApp, App-V, Virtuozzo, FlexClone, and display protocols, such as RDP.
Infrastructure extensions
vWorkspace includes various infrastructure extensions, such as Virtual Desktop Extensions, RDP enhancements,
user profile management, Web access, Secure Access service, and performance optimizations. These extensions
simplify deployment and management of workspace virtualization environments and also help you deliver
virtual workspaces optimized for individual users.
Virtual Desktop Extensions (VDE)
Virtual Desktop Extensions (previously called Pntools) are a set of executables, dynamic link libraries, and
device drivers that provide features and management functionality for managed computers in a vWorkspace
infrastructure. You can install these extensions from the Management Console on virtual as well as physical
computers managed through a computer group.
RDP enhancements
RDP is a protocol used for invoking remote sessions to RDSH or managed computers. vWorkspace provides
various high-performance RDP enhancements over remote desktop software.
Application, desktop, and content publishing
Application, desktop, and content publishing provides users with the familiar experience of local computing,
and enables them to operate from any location or device over any network. This feature also helps you publish
individual applications, full desktops, or specific content, such as URLs, on the user’s screen.
Seamless windows
Seamless windows allow users to launch the published applications seamlessly. An application is displayed on a
remote computer or server to the user’s desktop as if the application is running locally on the user’s desktop.
Session sharing
The session sharing feature enables users to launch multiple applications with seamless windows within the
same RDP session and prevents multiple Microsoft or vWorkspace licenses from being consumed by a single user.
Load balancing
The load balancing feature of vWorkspace helps the computer system, network, or disk subsystem to evenly
distribute the data and processing across available resources. You can enable load balancing so that users are
directed to the least busy RDS host or Hyper-V hypervisor.
Desktop integration
With vWorkspace, you can add shortcuts on a user's desktop and the Start menu by using the vWorkspace
Connector for Windows in Desktop Integrated mode. vWorkspace Connector for Windows helps users receive a
list of authorized desktops and applications.
Pass-through authentication
vWorkspace 8.6.3
8
Administration Guide
When you enable the pass-through authentication feature, a user’s locally cached domain credentials or the
Kerberos ticket are re-used and the user is not prompted for credentials when connecting to a terminal server
or a remote desktop. The locally cached domain credentials are automatically forwarded to the connection
broker when the user logs on to the vWorkspace infrastructure.
Performance optimizations
The performance optimizations provide performance enhancements over remote desktop software. The
performance optimizations augment RDP by using virtual channels to enhance the user’s experience.
• WAN acceleration. Is designed for latent networks. This feature not only provides faster RDP screen
responses, but also improves performance of all other optimizations.
• Enhanced Audio. Allows users to use audio devices and applications for voice-over IP (VOIP)
communications and collaboration
• USB Redirection. Provides universal support for all USB devices.
• Universal Printing. Provides a universal print driver.
• Multi Monitor. Supports multiple monitors with different resolutions.
• Graphics Acceleration. Adds compression to RDP and reduces bandwidth consumption.
Web Access
Web Access is a web application that acts as a web-based portal to a vWorkspace environment. It allows users to
retrieve the list of available applications and desktops from their web browser. There are no custom settings
required to access this portal. Users just need to specify the address of the Web Access server in the browser
and log on for authentication. After successful authentication, their published desktops and applications are
displayed in the web browser.
You can also use this web-based portal for centralized administration. The management interface helps you
configure Web Access to work with multiple vWorkspace environments and authenticate users to all configured
environments in the same Active Directory domain. It also facilitates configuration of rule-based client settings,
access methods, and pass-through authentication.
vWorkspace 8.6.3
9
Administration Guide
Secure Access service
The vWorkspace Secure Access service is an SSL gateway that simplifies the deployment of applications over the
Internet. It prevents direct access to internal vWorkspace resources of an organization.
You can access published applications through the vWorkspace Web Access client and start these applications
over SSL connections. With Secure Access service, traversal of the firewall and proxy server is seamless, so you
don't need to compromise firewall security.
Secure Access service can provide proxy connections to vWorkspace components such as RDP sessions, the Web
Access client, and connection brokers.
License type
vWorkspace is available with one type of license: Premier Edition. This edition includes WSM, vWorkspace
Monitoring and Diagnostics, which monitors vWorkspace VDI and Remote Desktop Session Host (RDSH)
implementations, and provides IT with real-time and historical data.
License models
vWorkspace supports four licensing models: Concurrent users, Per access device, Per named user and
Subscription.
Concurrent users. A user count is associated with each license. This count indicates the maximum number of
users that can connect simultaneously and use the respective services.
Per access device. An access device is a device that is used to access applications and desktops published by
vWorkspace. Software licensed by this type, which is registered to a specific device (such as node-locked), can
be transferred only to a device other than one on which it was initially installed if (a) the new device replaces
the original device and is used for the same purpose as the replaced Device, or (b) Dell provides written
consent.
Per named user. A named user is an individual who is specifically authorized to use the software. Software
licensed by this license type may be used by one user on an individual computer, on a network storage device,
or in a virtualized or shared environment.
Subscription. Pay for the licenses monthly based on the number of connected users in a month.
vWorkspace 8.6.3
10
Administration Guide
2
Installing vWorkspace
• Installation overview
• Installation prerequisites
• About the Simple installation
• Advanced installation
• Post installation
• Upgrading vWorkspace
Installation overview
There are two ways to install vWorkspace: Simple installation and an Advanced installation. A Simple
installation installs a preset list of roles while an Advanced installation provides a choice of roles to install.
Installation prerequisites
This section describes the setup that must be complete before starting the installation of vWorkspace.
vWorkspace 8.6.3
11
Administration Guide
Prerequisites for installing vWorkspace Monitoring and
Diagnostics
If you are using the Simple Installation to install the Monitoring and Diagnostics role, ensure that your computer
has at least 6GB of memory. If you do not have the required amount of memory, a message appears:
This computer does not have the required minimum amount of memory (6GB) to install Simple Mode
with the Monitoring and Diagnostics role.
Do you wish to continue the installation without the Monitoring and Diagnostics role?
Clicking Yes continues the installation without installing the Monitoring and Diagnostics role. Clicking No cancels
the installation.
If you are using the Advanced installation method, the Monitoring and Diagnostics role cannot be installed on
the Connection Broker. It must be installed on its own machine.
The following are recommended and supported configurations for the Secure Access service:
• Should be placed in a DMZ network or a protected internal network.
• Can be installed on either a physical or virtual computer.
vWorkspace 8.6.3
12
Administration Guide
• Can be used with or without Web Access.
• Can be used in conjunction with third-party load balancing appliances.
CAUTION:The Secure Access service should not be installed on a Session Host. The only
exception would be for proof of concept purposes.
vWorkspace 8.6.3
13
Administration Guide
The Simple installation installs Microsoft SQL Server Express 2014 with the following set values:
Table 2. Values for a Simple installation
Management Database
Value
Configuration field
SQL Server Name <computername>\vWorkspace
NOTE: <computername> is the computer that
vWorkspace is being installed on.
SA User Name sa
SA Password Password1
Database Name vWorkspace_Database
vWorkspace Login Name pnadmin
vWorkspace Login Password Password1
vWorkspace 8.6.3
14
Administration Guide
Figure 3. Installation prerequisites
vWorkspace 8.6.3
15
Administration Guide
10 On the Information window, click Yes to continue the Simple install.
11 On the Ready to Install the Program window, click Install.
The vWorkspace components are installed in addition to Microsoft SQL Express 2014, which can take
several minutes. The Microsoft SQL Express 2014 setup windows are displayed during the installation.
TIP: When the Monitoring and Diagnostics role starts to install, do not cancel the
installation until it is finished. Doing so could cause the configuration to be
incomplete.
Advanced installation
The Advanced installation allows you to specify the vWorkspace components that you want to install. This type
of installation is recommended for advanced users, larger Proof of Concept or production environments.
vWorkspace 8.6.3
16
Administration Guide
Figure 7. Installation prerequisites
vWorkspace 8.6.3
17
Administration Guide
Figure 10. Custom Setup window
10 On the Custom Setup window, select the roles and options that you want to install on this computer.
a Click on an icon in the list of roles to change how a role or feature is installed. Choose one of the
following for each role:
• This feature will be installed on the local hard drive.
• This feature, and all subfeatures, will be installed on the local hard drive.
• This feature will not be available.
Role Description
Connection Broker Role Facilitates Workspace deployment and performs most of the
management functions in vWorkspace. The Management Console role
is installed with this role.
Management Console Role Installs the vWorkspace Management Console to the target computer.
Web Access Role Enables browser-based enterprise access to desktops and applications
published in vWorkspace.
Terminal Server/RD Session Host Installs on top of the native Windows Terminal Server/RD Session Host
Role role and turns vWorkspace into an enterprise platform. The
Management Console role is installed with this role.
User Profile Management Storage Manages the efficient and secure storage of vWorkspace-managed
Role user profiles. The Management Console role is installed with this role.
Secure Access Role Provides SSL-encrypted access to vWorkspace desktops and
applications, enabling secure access over any network.
Universal Print Server Role Enables driver-free, optimized and managed universal printing for
network printers. The Management Console role is installed with this
role.
Remote Site Relay Role Extends the benefits of the vWorkspace Universal Print Server to
other locations, over other networks.
Password Reset Role Securely allows users to remotely change or reset expired passwords
using a vWorkspace Connector or vWorkspace Web Access.
vWorkspace 8.6.3
18
Administration Guide
Table 3. Roles and Features
Role Description
Monitoring and Diagnostics Role Provides complete enterprise monitoring and diagnostics for
vWorkspace deployments ranging from hypervisor monitoring to user
experience monitoring. The Management Console role is installed
with this role.
NOTE: When you select the Monitoring and Diagnostics Role, there
will be additional steps to install the Foglight Management Server. See
Monitoring and Diagnostics Role on page 21.
Monitoring and Diagnostics Agent Monitoring and Diagnostics uses agents to monitor vWorkspace. Agent
Manager Role Manager is a process that hosts the agent that monitors components.
It provides a centralized communications link between the
Management Server and the agents.
NOTE: When you select the Monitoring and Diagnostics Agent Manager
Role, there will be additional steps to install the Foglight Agent
Manager. See the Monitoring and Diagnostics Agent Manager role on
page 22.
WSM Role Delivers and manages desktops and applications from a central
location. All applications run locally on the cloud desktop. When a
user’s session is over, all data is stored in the data center. See
Prerequisites for WSM integration on page 13.
b The Install to field shows the location where vWorkspace will be installed. If you want to change
the default installation folder location, click Change and select a Destination folder.
c Click Next to display the Management Database Setup window.
vWorkspace 8.6.3
19
Administration Guide
Figure 11. Management Database Setup window
11 On the Management Database Setup window, select one of the options. Then click Next to display the
Management Database Configuration window.
Table 4. Management Database Setup options
NOTE: If you are installing just the Secure Access service role or the Web Access role, the Management
Database Configuration window is not displayed.
vWorkspace 8.6.3
20
Administration Guide
Figure 12. Management Database Configuration
12 On the Management Database Configuration window, complete the necessary information and click Next.
The installer installs the features that were selected. If you chose to install Microsoft SQL Server
Express, that is also installed.
13 On the InstallShield Wizard Completed window, click Finish.
14 If you are prompted to restart the computer, click Yes.
2 Select Yes to automatically discover the vWorkspace environment. If you select No, you must log in to
Monitoring and Diagnostics through a browser and run the discovery process manually.
vWorkspace 8.6.3
21
Administration Guide
Figure 14. Installshield Wizard prompt
6 When the Monitoring and Diagnostics installation process completed, click Done.
7 When the vWorkspace Installer finishes, click Finish.
NOTE: If you chose Auto Discovery, depending on the size of your vWorkspace environment the discovery
process can take from few minutes to a few hours. Do not interrupt the discovery process after it has
started since this can produce unexpected results.
vWorkspace 8.6.3
22
Administration Guide
To install the Monitoring and Diagnostics Agent Manager role
NOTE: Before installation, ensure that the Foglight Management Server is installed.
1 After selecting the Monitoring and Diagnostics Agent Manager role in the vWorkspace installation, the
Agent Manager Info window is displayed. Enter the credentials of the Foglight Management Server.
Field Description
Foglight Server Name The machine where the Monitoring and Diagnostics server is
installed.
Foglight HTTP Port Number HTTP port number to which the Monitoring and Diagnostics
server is listening.
Foglight HTTPS Port Number HTTPS port number to which the Monitoring and Diagnostics
server is listening.
Foglight User Password The default user password is foglight.
Foglight Lockbox Password The default Lockbox password is foglight.
Number of Agent Manager Number of remote agent manager instances you want to
Instances install.
NOTE: If the Agent Manager instances are already installed
on the server then the number of agent managers is
incremented by this amount.
2 The Agent Manager installation continues. Click Finish when the installation is complete.
Scripted installation
vWorkspace supports scripted installations. Setup.exe can be executed with switches that provide answers to
the dialog box prompts of a vWorkspace installation. This section outlines the commands and switches used to
perform a scripted (silent) installation.
setup.exe /s /v”/qn ADDLOCAL=<Role Codes> <Database Options>”
Role Codes
Table 6. Switches and commands used to perform a scripted installation
vWorkspace 8.6.3
23
Administration Guide
2 Requires the Management Console role to be installed.
3 Must be installed on items that require a database connection, such as a print server.
TIP: To specify more than one role code, delimit role codes with commas without
spaces. For instance, to specify the connection broker and management console
roles, use the following syntax:
ADDLOCAL=Core,CB,MC,WACommon
Additional switches
REBOOT=\"ReallySuppress\"
Ensure that the following software prerequisites are met prior to starting the scripted installation:
• Microsoft .NET Framework 4.5 Service Pack 1
• Microsoft Windows Installer 4.5
• J2SE Runtime Environment 7.0 Update 55 (Only when the Connection Broker role is selected)
vWorkspace 8.6.3
24
Administration Guide
SQLLOGINACCOUNT=\"pnadmin\"
SQLLOGINPASSWORD=\"Password1\""
To install the Management Console and Connection Broker roles, and create a new database
setup.exe /s /v"/qn ADDLOCAL=Core,CB,MC,WACommon DBOPTION=2
SQLSERVERNAME=\"<servername\instancename"
DATASOURCENAME=\"vWorkspace Database\" SAUSERNAME=\"sa\"
SAPASSWORD=\"Password1\"
DATABASENAME=\"vWorkspace_Database\"
SQLLOGINACCOUNT=\"pnadmin\"
SQLLOGINPASSWORD=\"Password1\""
Post installation
After you complete the installation of vWorkspace, you might need to perform additional tasks before you begin
the configuration process.
• Installing vWorkspace Connectors
• Enabling vWorkspace reporting
vWorkspace 8.6.3
25
Administration Guide
To upgrade the vWorkspace Connector for Windows
1 From the Windows desktop: The user clicks the vWorkspace icon.
From Web Access: The user opens a Web browser and enters the vWorkspace website provided by the
administrator.
2 At the Login prompt, the user enters credentials. vWorkspace verifies whether the Connector is
installed.
3 If an earlier, unsupported version is installed, the user is prompted to install the current version. Clicking
Install installs the current version of the Connector. Clicking Continue opens the older version.
NOTE: If the user selects Continue, vWorkspace does not prompt to upgrade again within a 24-hour period
unless the user clears the browser cookies.
The Continue button is displayed only if the Require a valid Connector before continuing option is not
selected from Connector Management | Installation | Connector Properties |Requirements.
vWorkspace 8.6.3
26
Administration Guide
Select this option if the client computer is joined to the domain and you want to reuse the user domain
credentials on the client computer to authenticate with the vWorkspace-enabled desktop infrastructure
without having to retype.
This option is only for computers that do not support Kerberos.
8 On the Shortcut Options window, select the desired shortcuts, and click Next.
This window is available only if you are installing a client option that includes vWorkspace Connector for
Windows.
9 On the Ready to Install the Program window, click Install to begin the installation.
10 When the InstallShield wizard has completed, click Finish.
You might be prompted to restart your system after the installation of the vWorkspace Connector has
completed.
See Using the vWorkspace Connector for Windows on page 176 for more information about using the
vWorkspace Connector for Windows.
VASCLIENT32
As an InstallShield package, vasclient.exe can accept a number of command line arguments. Command line
options that require a parameter must be specified with no spaces between the option and its parameter.
If you run a normal installation using vasclient32.exe, InstallShield extracts and then executes the included
vasclient32.msi package. The file, msiexec.exe, begins the installation and queries the user four times.
The installation prompts the user to install For All Users or Just Myself, to Enable Single Sign-On or not, to To
Launch in Desktop Integrated Mode or not, and to Place a shortcut on the Desktop or not.
These four user dialog boxes are represented by MSIEXEC switches of:
• ALLUSERS=\"1\" or ALLUSERS=\"\"
• ENABLESSO=\"1\" or ENABLESSO=\"\"
• STARTUPSHORTCUT=\"1\" or STARTUPSHORTCUT=\"\"
• DESKTOPSHORTCUT=\"1\" or DESKTOPSHORTCUT=\"\"
• \"1\" is Yes.
• \"\" is No (Null).
The InstallShield switch to pass parameters to msiexec is the /v switch. There can be no spaces between the /v
switch and its parameters so that the command will look initially like this following.
vasclient32.exe /v"<options>"
The <options> are the msiexec parameters. For msiexec, the /q option is used to set the user interface level
along with any of the following flags.
Table 8. MSIEXEC silent or Near silent switches
Option
/q No user interface.
/qn No user interface.
/qn+ No user interface. A dialog box appears at the end of the
installation.
vWorkspace 8.6.3
27
Administration Guide
Table 8. MSIEXEC silent or Near silent switches
Option
/qb Basic user interface.
/qb+ Basic user interface. A dialog box appears at the end of the
installation. If you cancel the
installation, a dialog box is not
displayed.
/qb- Basic user interface. No dialog box boxes appear.
/qr Reduced user interface.
If you want to hide the initial vWorkspace splash screen, add the /s option and the installation displays only the
installation progress bar dialog box.
To silently install the vasclient32.exe, issue the setup instruction:
vasclient32.exe /s /v"ENABLESSO=\"\" ALLUSERS=\"1\" /qn"
The /s suppresses the splash screen. The /v passes everything within the quotes to msiexec. The msiexec /qn
switch provides a no dialog box, silent install.
If you want the progress dialog boxes shown for user feedback so that they know something is happening, issue
the following command.
vasclient32.exe /s /v"ENABLESSO=\"\"ALLUSERS=\"1\" /qr"
The /s suppresses the splash screen. The /v passes everything within the quotes to msiexec. The/qr switch
shows a reduced user interface with only the progress bar dialog box.
vWorkspace supports both Virtual Desktops and Seamless Window Application Publishing.
TIP: Use vWorkspace 8.0 or later to publish applications to ThinOS devices.
vWorkspace 8.6.3
28
Administration Guide
user to the virtual environment and to obtain the list of published virtual desktops or applications available to
the authenticated user.
There are two configuration methods: The DHCP method (recommended for production environments), and the
Manual configuration method (used for easier deployment and testing).
DHCP Server Configuration
You should set the DHCP server’s option tags 161 and 188 to the IP address or addresses of the Connection
Broker(s) or Web Access site using the following syntax:
<protocol>://<iplist>:<port>
protocol: HTTP or HTTPS. This parameter is optional. If omitted, http is automatically assumed.
iplist: list of IP addresses or FQDN corresponding to the Connection Brokers. The specified addresses must be
separated by commas or semi-columns.
port: the TCP port that the Connection Broker(s) is/are configured to listen on. This parameter is optional. If
omitted, ports 80 (HTTP) and 443 (HTTPS) are automatically assumed.
Examples:
Please note that option tag 161 is used to specify the servers from which the WTOS firmware updates can be
downloaded to the thin client, while option tag 188 is used to specify the VDI brokers. Since the Connection
Brokers are capable of fulfilling both functions, option tags 161 and 188 may be configured identically.
The Connection Broker can be configured to accept HTTP and HTTPS requests simultaneously. To configure the
Connection Broker's HTTP and HTTPS ports, follow these steps:
1 In the vWorkspace Management Console, right-click on Locations. Select Properties. Select one or both
protocol options (HTTP and/or HTTPS) and specify the corresponding TCP port numbers. If IIS is installed
on the same server, be sure to select non-conflicting TCP ports.
2 For HTTPS support, a server certificate is needed for each Connection Broker. The certificate can be
issued by an internal CA or an external one. Once the certificate has been installed onto the Connection
Broker, expand the Connection Brokers node in the Management Console and right click the
corresponding Connection Broker whose certificate you just installed. Under vWorkspace Broker Settings
vWorkspace 8.6.3
29
Administration Guide
select Certificate and then click Select Server Certificate. Finally, select the desired certificate from
the list. Repeat this for all of your Connections Brokers that will communicate via HTTP and HTTPS
In environments entailing multiple subnets, it is possible to specify unique WNOS.INI and RDP.INI files on a per
subnet basis. This is accomplished by making use of DHCP option tag 162 to specify a unique subnet identifier
per subnet. For example, given SUBNET1 and SUBNET2, the DHCP option tags for these two subnets would be
configured as follows:
SUBNET1:
161: http://<iplist>:<port>
162: subnet1
188: http://<iplist>:<port>/subnet1/wyse
In this case, WNOS.INI and RDP.INI are stored on the Connection Broker under:
Manual configuration
If you do not have access to a DHCP server or if you do not want to make changes to your DHCP servers you can
use the manual configuration method by powering on your thin client and manually entering the required
changes.
vWorkspace 8.6.3
30
Administration Guide
Before starting the configuration, upgrade your device firmware to the latest available version. Contact
customer support to obtain the latest firmware for your device.
1 Configure the File Server setting. The vWorkspace connection broker natively provides file server
support for your ThinOS thin clients, so you do not need to set up an additional FTP or HTTP server in
your environment.
If you already have a file server in your current environment, you can skip this step.
a Click on the desktop area and select Administration from the menu, then click Central
Configuration. The Central Configuration window appears.
b In the File Servers/Path field, enter your connection broker server name or address in the format:
"http://broker_name:8080/"
c Leave the User Name and Password with the default values. The vWorkspace connection broker
server accepts anonymous requests.
d Click OK. Reboot the device, if prompted.
2 Configure the connection broker server setting by specifying the vWorkspace connection broker servers
available in your environment.
a Click on the desktop area and select Administration from the menu, then click Remote
Connections. The Remote Connections window appears.
b Under the Select Broker tab, select Dell vWorkspace. If you are using an older version of ThinOS
that does not include the Dell vWorkspace option, select Other.
c In the Broker Server field, enter your connection broker server name or address in the format:
"http://broker_name:8080/"
d Click OK. Reboot the device, if prompted to.
After configuring the Dell Wyse ThinOS thin client, you need to configure the vWorkspace connection brokers.
Please refer to the WYSE Administrators Guide for detailed information on how to customize wnos.ini.
On each Connection Broker, under the installation directory of vWorkspace there is a directory named WYSE. In
this directory, there is a file called wtos_sample_files.zip, extract it to the WYSE directory, after extracting you
should have the following:
C:\Program Files (x86)\Quest Software\vWorkspace\WYSE\WNOS
C:\Program Files (x86)\Quest Software\vWorkspace\WYSE\WNOS\bitmap
C:\Program Files (x86)\Quest Software\vWorkspace\WYSE\WNOS\cacerts
C:\Program Files (x86)\Quest Software\vWorkspace\WYSE\WNOS\ini
vWorkspace 8.6.3
31
Administration Guide
C:\Program Files (x86)\Quest Software\vWorkspace\WYSE\WNOS\bitmap
Dell_WhiteonBlue.png
Dellform.jpg
C:\Program Files (x86)\Quest Software\vWorkspace\WYSE\WNOS\ini
JoeUser.ini
WNOS.INI
This file, which contains various WYSE commands and parameters, is sent from the Connection Broker to the
thin client upon device boot-up. Please refer to the WYSE Administrators Guide for detailed information on how
to customize wnos.ini.
Please note that the bitmap directory created is used to store optional bitmap files (i.e., corporate logo to be
displayed on the thin client) referenced in wnos.ini.
RDP.INI
RDP.INI is used to specify additional RDP connect parameters to be appended to the RDP connect commands in
{username}.ini. If RDP.INI exists under the WNOS directory, the Connection Broker will automatically append the
contents of this file to the RDP connect commands. For a list of valid RDP connect parameters, please refer to
the WYSE Administrators Guide.
{USERNAME}.INI
Upon successful user authentication, the Connection Broker dynamically generates a user-specific configuration
file named {username}.ini (i.e., peggy.ini, john.ini) and sends it to the thin client. This file is generated
entirely in memory and contains a list of RDP connection strings referencing the user’s authorized published
desktops.
Optionally, additional parameters can be automatically appended to the dynamically generated
{username}.ini. This is accomplished by manually creating a per-user configuration file, also named
{username}.ini, under the ini directory. Please refer to the WYSE Administrators Guide for the list of optional
parameters that can be specified in {username}.ini.
The following takes place upon authenticating a given user: if a custom {username}.ini exists in the ini
directory, the Connection Broker will merge its contents into the dynamically generated {username}.ini. The
final {username}.ini sent to the client contains the list of authorized RDP connections, as well as the
parameters specified in the custom {username}.ini.
To create the required file and directory structure
1 Open the file named wnos.ini with a text editor, such as Notepad.
2 Replace the values, BROKER_NAME, with your vWorkspace connection broker server name or address.
3 Replace the Language value with your keyboard specifications.
4 Replace the DomainList value with your active directory windows domain.
5 To automatically log off the Thin Client device when a user logs off or disconnects from a virtual
desktop, include the value named "AutosignOff=Yes"
6 Make additional customizations to the wnos.ini or save your changes. The wnos.ini file provides the
minimum settings required.
7 Open the rdp.ini to configure the AutoConnect value.
a To automatically connect users to a virtual desktop after authentication to the connection broker,
set this value to 1.
b To provide users with an icon representing the virtual desktop in order to connect, leave the
default value of 0.
8 To customize the ThinOS desktop background image and login window by navigating to the "bitmap"
directory under the WNOS folder and replacing the files with the following file specifications:
a Desktop Background: File name Dellback.jpg 1024 x 768 pixels
vWorkspace 8.6.3
32
Administration Guide
b Login Window Logo: File name DellForm.jpg 352 x 80 pixels
Updating the WYSE Thin OS Firmware
In order to update the thin clients with the latest WTOS firmware, obtain the latest WTOS firmware file for the
model of the WTOS device, and store it the WNOS directory. Upon rebooting the thin clients, the firmware will
be automatically updated if necessary. Please note that option tag 161 must already be configured as discussed
above for the firmware update process to work.
Please note that the Connection Broker only supports HTTP-based firmware updates, and therefore does not
respond to FTP-based update requests. In order to update existing thin clients running older WTOS firmware, an
FTP server is required. For this purpose, it would be possible to install the Microsoft FTP service on the
Connection Broker(s). Please note that newer WTOS firmware releases do support HTTP based upgrades, thus
obviating the need for an FTP server in order to perform future firmware updates.
vWorkspace 8.6.3
33
Administration Guide
6 Click Finish to display the confirmation dialog box.
7 Click Yes, and then click Finish on the Credentials window to complete the process.
Upgrading vWorkspace
This section outlines the recommended procedures for upgrading your vWorkspace environment to the current
version.
Upgrade prerequisites
Before upgrading vWorkspace, ensure that you have done the following:
• Refer to the vWorkspace System Requirements for supported platform updates. For a summary,
see Windows version compatibility matrix by role on page 34.
• Fully back up the existing vWorkspace database and reporting database.
• Create a snapshot of the virtual environment, excluding VDI Machines.
• Download the current version of vWorkspace and all current hotfixes.
Win 7 2008 R2
Win 8 Win 2003 2012 R2
Feature
Win 8.1 R2 2016
Win 10
Connection Brokers NO NO YES
Management Console YES NO YES
Terminal Server/RDSH NO NO YES
User Profile Management NO NO YES
Storage Server
Universal Printing NO YES YES
Remote Site Relay Server NO NO YES
Secure Access service NO NO YES
Web Access NO NO YES
Reporting NO NO YES
Monitoring and Diagnostics NO NO YES
vWorkspace 8.6.3
34
Administration Guide
Table 9. Windows operating systems supported by vWorkspace
Win 7 2008 R2
Win 8 Win 2003 2012 R2
Feature
Win 8.1 R2 2016
Win 10
Monitoring and Diagnostics NO NO YES
Agent Manager
Password Reset NO NO YES
Broker Helper Service NO NO YES
Virtual Desktop Extensions for YES NO YES
VDI
Connector for Windows YES NO YES
Upgrade phases
In many cases, upgrading a large vWorkspace environment cannot be done in a short time period. You can break
the upgrade process into two phases. The first phase includes all critical components that must be updated at
once. The second phase includes all other components that can be updated over an extended period of time.
Upgrade phase 1
The following components must be upgraded in Phase 1. Connection brokers must be upgraded first. The first
connection broker to be upgraded updates the current vWorkspace database schema. All other upgrade
combinations require a database schema update. The other roles (if applicable to your environment) can be
upgraded in any order after the connection broker role, but must be completed in phase 1.
• Connection Broker Role
• Management Console Role
• Monitoring and Diagnostics Role
• Monitoring and Diagnostics Agent Manager Role
• MetaProfile Storage Server Role
• Broker Helper Service for SCVMM
Things to consider:
• After the Connection Brokers are upgraded, Web Access sites continue to operate, but you cannot make
configuration changes to Web Access sites in the Management Console until the Web Access server is
upgraded.
• After the Connection Brokers are upgraded, the Management Console on the Connection Broker can be
used to manage the environment. Management Consoles installed on other computers cannot be used
until they are also upgraded.
• After the Connection Broker is upgraded, initialize the Hyper-V virtualization hosts that are managed
directly in vWorkspace. To initialize a Hyper-V host, in the Management Console go to the Locations |
Location | Virtualization Hosts | Hyper-V node, right click on a Hyper-V host and select Initialize. The
initialization process upgrades the Hyper-V Catalyst Components. After initialization has completed, the
Catalyst field for the Hyper-V host will indicate the version of the Hyper-V Catalyst Components. If
properly upgraded, the field will report a version later than or equal to the version reported in the
Management Console status bar. Upgrading the Hyper-V Catalyst Components flushes the HyperCache on
the host. It is important to reboot at least one of the virtual machines on the host soon after the upgrade
to populate the HyperCache.
vWorkspace 8.6.3
35
Administration Guide
Upgrade phase 2
The following components can be upgraded after phase 1 in any order.
• Secure Access service Role
• Web Access Role
• vWorkspace Java Connector (updated on the Web Access server)
• vWorkspace Connectors (for Windows, Mac, iOS, Android and Linux)
• TS/RDSH Role
• Virtual Desktop Extensions for VDI Computers
• Universal Print Server Role
• Remote Site Relay Role
• Password Reset Role
Things to consider:
• You should not enable Forced Broker Authentication (FBA) until all vWorkspace Connectors are upgraded
to a version that supports FBA. Refer to Features that are compatible with vWorkspace Connectors to see
the minimum vWorkspace Connector versions that support FBA. FBA can be enabled after the install from
the Secure Access service control panel.
• Saved PIT files that point directly to an RDP server through the Secure Access service are not supported
with FBA. Saved PIT files that reference a published application or desktop will work with FBA.
• vWorkspace users can continue using an older version of the vWorkspace Connector. It is recommended
that the vWorkspace Connector and Server components (RDSH/VDI) be on the same version as some
features may not work as expected with a newer version of the server. For most functionality, the
vWorkspace Connector continues to operate normally. Some features of the Connector may not work as
expected on older versions. Refer to Features that are compatible with vWorkspace Connectors for more
details.
Connector feature Windows Mac OS X2 Java Linux iOS2 Android Thinshell1 HTML5
Connector YES YES N/A YES YES YES N/A
Management
Auto-Configuration YES YES N/A YES YES YES N/A
Connection YES YES YES YES YES YES YES YES
Brokering
vWorkspace 8.6.3
36
Administration Guide
Table 10. Features that are compatible with vWorkspace Connectors
Connector feature Windows Mac OS X2 Java Linux iOS2 Android Thinshell1 HTML5
Universal Print YES YES YES YES YES YES YES NO
(Network Printers)
Universal USB YES NO NO YES NO NO YES NO
TS/RDSH YES NO NO NO NO NO YES NO
USB Redirection
Reconnect on YES YES YES YES YES YES YES NO
Disconnected
Session
RemoteFX Remote YES NO NO NO NO NO NO NO
Audio
Microsoft Multi YES NO NO NO NO
Monitor
Microsoft YES YES NO NO NO NO NO NO
RemoteApp
Microsoft YES YES NO YES YES YES NO NO
RemoteFX
RemoteFX Media YES NO NO NO NO NO NO NO
Streaming
Seamless Windows YES NO NO NO NO NO NO NO
Web Access YES YES YES YES YES YES YES YES
Desktop Size YES YES YES YES YES YES YES NO
Color Depth YES YES YES YES YES YES YES NO
Connection Bar YES YES YES YES YES NO
Full Screen YES YES YES YES YES
Disk Drives YES YES YES YES NO NO YES NO
Printing (native YES YES YES YES NO NO YES NO
RDP)
Clipboard YES YES YES YES NO NO YES YES
Serial Ports YES YES NO YES NO NO YES NO
Kerberos/Network YES YES NO YES YES YES YES NO
Level
Authentication
Smart Card/CAC YES NO NO YES NO NO YES NO
Support
Pass-through YES NO NO NO NO NO YES NO
Authentication
Secure Access YES YES YES YES YES YES YES YES
service Support
Two-factor YES YES YES YES YES YES YES NO
Authentication *
Enhanced On- N/A N/A N/A N/A YES N/A NO
Screen Mouse
Enhanced N/A N/A N/A N/A YES YES N/A NO
Keyboard
Email log files N/A N/A N/A N/A YES YES N/A NO
Direct RDP N/A N/A N/A N/A YES YES N/A NO
Connection
vWorkspace 8.6.3
37
Administration Guide
Table 10. Features that are compatible with vWorkspace Connectors
Connector feature Windows Mac OS X2 Java Linux iOS2 Android Thinshell1 HTML5
Native gesture N/A N/A N/A N/A YES YES N/A NO
support
RemoteFX N/A N/A N/A N/A YES YES N/A NO
MultiTouch
2.The Mac OS X and Linux Connectors achieve universal printing by using the MS Publisher
print driver on the Windows Remote Desktop to create a postscript print stream that is
redirected to the local printers.
1. The Management Console role is installed by default with this role but cannot be used to manage the
environment. The environment must be managed on a server that has been fully upgraded.
2.Secure Access service in vWorkspace 7.6 introduced a higher mode of security called Connection Broker
Authentication. Static PIT files (saved PIT) cannot be used to connect to vWorkspace sessions through a
Secure Access service if you enable Forced Broker Authentication on the Secure Access service.
3. Web Access continues to run but cannot be configured by the Management Console until the Web Access
role is upgraded.
vWorkspace 8.6.3
38
Administration Guide
Upgrade the vWorkspace roles
Use the following procedure to upgrade the vWorkspace roles on each computer in your vWorkspace
environment. The vWorkspace installer automatically update the components associated with the vWorkspace
role installed on the computer.
vWorkspace 8.6.3
39
Administration Guide
Figure 16. Previous Version Detected window
3 Click Upgrade.
vWorkspace 8.6.3
40
Administration Guide
Figure 18. Current Database Configuration window
9 On the Current Database Configuration window, select Keep the existing database configuration and
click Next.
10 On the Database Schema Upgrade window, click Next.
11 On the Installing vWorkspace window, wait until the installation finishes and click Finish.
vWorkspace 8.6.3
41
Administration Guide
3
The Management Console
vWorkspace 8.6.3
42
Administration Guide
As you progress through the Quick Start Wizard, the information entered on each form is validated. Information
is saved and can be used in future setups.
TIP: Items that are check marked in the Quick Start Wizard are set as global
items. Upon logoff, the profile is deleted and only the checked items are
retained. Keep this in mind if you are importing desktops with a local profile
that you want to retain.
vWorkspace 8.6.3
43
Administration Guide
To set up an RDSH environment
1 From the Quick Start Wizard, select the type of environment you want to configure.
2 Add a Connection Broker.
3 Specify a Remote Desktop Sessions Host.
4 Create Managed Applications.
5 Set up optional user settings such as Managed User Profiles, Printers, and Connection Policies.
6 Finish from the wizard.
vWorkspace 8.6.3
44
Administration Guide
Figure 19. The Management Console interface
Menu Bar Navigation Pane
Information /Detail Pane
Toolbar
Object
Nodes
vWorkspace 8.6.3
45
Administration Guide
• Administration
• Licensing
• Database configuration
vWorkspace 8.6.3
46
Administration Guide
3 Select the Desktops tab in the information pane and right-click on the computer. Select Remote Control
| Remote Assistance.
This option is unavailable for inactive sessions.
4 In the Remote Control dialog box, set the key command that you want to use when you want to end the
remote session.
5 Click OK. The session is displayed.
6 Use the key command when you want to exit the session.
vWorkspace 8.6.3
47
Administration Guide
2 Highlight the session host or computer group to which the computer belongs.
3 Select the Desktops tab in the information pane and right-click on the computer.
4 Select Remote Control | VMware Connect.
5 Log into the desktop when prompted.
6 Perform the necessary administrative tasks on the user’s desktop.
7 Close the remote desktop when finished.
Administration
Until an administrator account is added, any user with administrator privileges will have full access rights to the
Management Console. It ensures that the current Microsoft Windows user is also a local Microsoft Windows
administrator.
The first administrator defined in the system is automatically is defined as a system administrator, and the last
administrator to be removed from the system must be a system administrator. This prevents inadvertent
lockouts.
A system administrator can modify permissions for any user or group. Non-system administrators cannot set
their own permissions or the permissions of a group to which they belong.
When you assign a user as an administrator, you can assign one of the three initial permissions: Allow All, Deny
All, or Copy From Existing. These permissions can be changed later.
The permissions structure is hierarchical and follows a parent-child relationship model. Child objects inherit
permissions from the parent if the permissions for the child object are not set explicitly.
An administrator can be assigned conflicting permissions. This happens if an administrator belongs to more than
one group and the groups have been assigned conflicting allow/deny permissions for the same object. The
resolution of these conflicts is governed by the Settings page of the vWorkspace Administration dialog box. You
can choose whether to allow or deny the permission when a conflict occurs.
Permission check boxes may be one of the following. The gray checkmarks indicate that the permission is
inherited from its parent if set. Permissions that are disabled for an administrator cannot be modified by that
administrator.
Table 12. Permissions check boxes
vWorkspace 8.6.3
48
Administration Guide
3 On the Administrators step, click Add User/Group.
4 On the Administrator Wizard window, click Next.
5 On the User/Group Name step:
a Select User or Group, and then enter Domain\User or Domain\Group.
Use the ellipsis button to assist in selecting users or groups.
b Select the check box to indicate that this user or group is a system administrator.
(If no other system administrators are defined, then this check box is required, and will be selected by
default.)
c On the Select Users step, click OK.
6 On the User/Group Name step, click Finish.
7 From the login prompt, log in as the new system administrator.
The new administrator is displayed in the Administrators step. The Settings and Permissions for the
system administrator are set by default and cannot be changed.
8 Click OK to close the window.
To remove an administrator
1 Open the vWorkspace Management Console.
vWorkspace 8.6.3
49
Administration Guide
2 Select File | Administration.
3 Highlight the user or group name from the list.
4 Click Remove.
5 On the Confirmation step, select Yes.
6 Click OK to close the window and save your changes.
Licensing
vWorkspace can be licensed per named user, per access device, per concurrent user and on a subscription basis
(from Dell service provider channel partners).
There are two types of vWorkspace licenses available:
• vWorkspace Premier Edition. Supports both VDI and RDSH integration with vWorkspace. You can use this
edition to deliver published desktops and applications with seamless windows from any Microsoft
Windows operating system hosted on remote session hosts, a hypervisor, such as Hyper-V, or ESX.
The Premier edition also includes Wyse Streaming Manager (WSM). This provides Server and Client
operating system image streaming and application layering. It also includes vWorkspace Monitoring and
Diagnostics.
• vWorkspace Desktop Edition. Supports only VDI and blade PC deployments with vWorkspace. You can
use this edition to deliver published desktops and applications with seamless windows from any Microsoft
Windows operating system hosted on a hypervisor, such as Hyper-V, or ESX. With this edition, you cannot
configure and deploy RDSH environments.
To add licenses
When you launch the Management Console for the first time, the Licensing window appears if there are no
references to licensing in the vWorkspace database. If your vWorkspace database has references to licenses, you
can manage your licenses from the Management Console.
The process is the same for both a Simple or Advanced vWorkspace installation.
1 Open the vWorkspace Management Console.
2 From the File menu, select Licensing.
3 Select the Licenses option.
4 Click the Add License button.
5 Browse to the location of your Licenses ASC file.
6 Select the file and click Open.
7 On the message window stating the license has been added, click OK.
8 Click Close.
To view licenses
The Licenses window also allows you to view current licenses.
1 Open the vWorkspace Management Console.
2 From the File menu, select Licensing to display the Licensing window.
3 Select the Licenses option.
4 Click the tabs to view the licenses. Importing a license file will replace any already imported license of
the same type (Premier or Desktop). If you want to import both a Premier and Desktop license you can
use the Licensing page, which allows up to two ASC files to be added.
• License 1 and License 2.View licenses that have been acquired from the Licensing Management
System (LMS). Licenses retrieved from LMS are ASC files. All new licenses are received in this file
format. The Licensing page allows up to two ASC files to be added.
vWorkspace 8.6.3
50
Administration Guide
• Other Licenses. View existing licenses that have been previously acquired from the vWorkspace
web site.
• User limits. Specify a maximum number of concurrent users that can be set by vWorkspace
environment.
5 To view licenses for the current user sessions:
a Click the User Sessions option in the left pane.
b Click the User Sessions button. The Current User Sessions window is displayed.
c Click Close to return to the Licensing window.
6 Click Close to exit the Licensing window.
Database configuration
The vWorkspace database is configured during installation, but you can define additional database connections
at any time. When the Management Console is started, it looks to the Windows Registry for a pointer to a
System Data Source Name (DSN) and uses the settings contained in the DSN to connect to the vWorkspace
database.
The Configure vWorkspace Database window opens when the Management Console is started and a DSN has not
been defined, or if the data in the DSN is invalid.
6 On the Credentials window, enter an existing SQL administrator login for the specified server and a new
vWorkspace SQL login.
7 Click Finish.
vWorkspace 8.6.3
51
Administration Guide
2 Select File | Database Configuration.
3 On the Configure vWorkspace Database step, click Database Configuration.
4 On the Action step, click Connect to an existing vWorkspace database, and then click Next.
5 On the Database Information step, specify the following parameters, and then click Next.
Table 14. Database Information fields
6 On the Credentials step, enter the existing vWorkspace SQL login name and password, and click Finish.
Actions menu
The options available from the Actions menu depend on the item selected in the navigation pane of the
Management Console. Some of the items include:
• Show/Hide Advanced RDSH Tools. Showing the Advanced RDSH Tools will display additional nodes
for the environment: Performance Optimization, Virtual IP and File & Registry Redirection.
• Properties. Opens the Properties window for the selected node.
Help menu
The Help menu provides you with additional resources that you can access while using the Management Console.
• vWorkspace Community
• Search vWorkspace Knowledge base
• Contact Dell Support
• vWorkspace Home Page
• vWorkspace Blog
• Find vWorkspace Hotfixes
• vWorkspace Documentation
• Monitoring and Diagnostics Documentation
• Software improvement program
• About
vWorkspace 8.6.3
52
Administration Guide
Managing a vWorkspace environment
The navigation pane of the Management Console contains a tree structure that organizes the multiple
management tools. Each node of the tree addresses a different management need of the virtual workspace.
The table below provides an overview of the vWorkspace object notes. Refer to the following sections for
detailed information about using these to maintain the vWorkspace environments.
Table 15. vWorkspace object nodes
Node Description
Environment (Farm) name Represents the entire vWorkspace infrastructure.
Locations Organize groups of users based on geographical locations,
within a vWorkspace infrastructure.
Targets Set the criteria for which vWorkspace Resource is applied
and when it is applied to a remote session. Once targets are
defined in the vWorkspace database, they can be used in
Access Control Lists associated with various vWorkspace
Resource objects.
Managed Applications Enable Graphics Acceleration globally for managed and
unmanaged applications, set custom properties, and set
permissions for users for all managed applications.
Connector Management Centrally create and manage the configuration of all of your
vWorkspace Connectors.
User Environment Management Contains the list of items that can be assigned to clients
using Client Assignment.
A toolbar option, Toggle Client Assignment List Display,
allows the client assignment to be displayed at the bottom of
the window, the right-side of the window, or not at all.
User Profile Management User Profiles are used to define storage servers, assign
compression levels, define silos, and assign permissions to
users so that they can be allowed to or denied access to
adding, modifying, or deleting Virtual User Profiles.
Packaged Applications Identify Microsoft Application Virtualization (App-V) servers
and their hosted application packages, and MSI packages.
Performance Optimization Configure CPU Utilization and Virtual Memory Optimization
(Displays only if Show Advanced policies, and to view the results of these policies.
RDSH Tools is enabled from the
Actions menu).
Virtual IP (Displays only if Show Provide special configuration options for applications running
Advanced RDSH Tools is enabled in a multi-user environment that require unique IP addresses
from the Actions menu). for identification.
File & Registry Redirection Provides mechanisms that allow applications to work
(Displays only if Show Advanced properly in a multi-user environment.
RDSH Tools is enabled from the
Actions menu).
Load Balancing Configure load balancing when published applications are
hosted on multiple RD Session Hosts. A load balance can be
assigned to either the published application or the RD
Session Hosts.
Web Access Define and manage Web Access web sites. The configuration
for Web Access web sites is stored in the Management
Console.
vWorkspace 8.6.3
53
Administration Guide
Table 15. vWorkspace object nodes
Node Description
Monitoring and Diagnostics Links to vWorkspace Monitoring and Diagnostics. After
entering the URL and credentials, the Monitoring and
Diagnostics console opens, which allows you to generate
detailed reports.
Reporting Allows you to generate reports about various aspects of your
virtual desktops environment.
3 Select Reporting Database, and specify the Reporting Database values. The following settings can be
defined on the Reporting Database step.
Table 17. Reporting Database fields
Field name Description
Data Expiration (days) The age at which reporting data is
automatically purged.
Purge Interval (hours) How often expired data is purged.
vWorkspace 8.6.3
54
Administration Guide
The following settings can be defined on the Managed Domains step.
Table 18. Managed Domains fields
vWorkspace 8.6.3
55
Administration Guide
Table 19. Authentication fields
Managing locations
The Locations node represents a group of one or more data centers and the desktops within those data centers.
Administrators define Connection Brokers, Session Hosts, Virtualization Hosts, and desktops for each defined
location. Multiple locations can be defined and are typically configured for delegation of administration
purposes.
vWorkspace 8.6.3
56
Administration Guide
Locations can be used to group items based upon location or for other management purposes such as
departmental organization and delegated administration.
To add a location
Connection Brokers and Session Hosts can be defined when adding a location.
1 Open the vWorkspace Management Console.
Right-click on the Locations node, and select New Location to start the New location wizard.
2 On the Welcome step of the New Location wizard, click Next.
3 On the Location Name step, enter the name for the location, and then click Next.
This is the name that will be displayed in the vWorkspace Management Console.
4 On the Add Servers step, add Connection Brokers to this location:
a Click Add Connection Broker.
b On the Server Wizard, click Next.
c On the Server Name step, enter the name or IP address of the server, and then click Next. Use the
ellipsis button if you want to browse for the server.
d On the Server Role step, specify the roles for the server, and then click Next.
This new server may perform more than one role, such as a vWorkspace Connection Broker and
Microsoft Remote Desktop Connection Broker (RD Broker).
e On the Certificate step, you can optionally specify or view the certificate that is to be used on
this server. Then click Next.
f On the Logging step, select the check box if you want to enable trace logging on this server, and
then click Next.
Typically, logging is only used when assisted by Technical Support.
g If you selected the Microsoft Remote Desktop Connection Broker (RD Broker) option on the Server
Role step, complete the next two steps. Otherwise, skip to Step j to specify Permissions for this
server.
h On the Administrative Account step, specify an administrative account and password for the RD
Broker, and then click Next.
i On the Logging step, select the check box if publishing and resource plug-in logging is to be
enabled on this server, and then click Next.
Typically, logging is only used when assisted by technical support.
j On the Permissions step, specify permissions for this server, and then click Finish.
Before assigning permissions, you must first add users or groups using the New Administrator wizard from
File| Administration.
vWorkspace 8.6.3
57
Administration Guide
k On the Add Servers step, click Next to advance to the next step. Or, proceed to the next step to
add session hosts.
5 On the Add Servers step, add a session host to this location:
a Click Add Session Host.
b On the Welcome step of the Server wizard, click Next.
c On the Server name step, enter the name or IP address of the server, and then click Next. Use the
ellipsis button if you want to browse for the server.
d On the Server Role step, select Session Host, and then click Next.
e On the Folder step, specify the folder for this Session Host, if appropriate. Click New Folder to
create a new folder. Click Next when done.
Folders are for organization and display; it does not change the operation of the servers.
f On the Load Balancing step, you can optionally specify the load balancing rule, and then click
Next.
g On the Session Auto-Logoff step, select the setting for session auto-logoff, and then click Next.
h On the Connectivity step, specify an Alternate IP Address, and then click Next.
i On the Experience Optimization step, specify the performance optimizations options to be
enabled on this server, and then click Next.
j On the Enhanced Audio step, specify whether Enhanced Audio is to be enabled or disabled on this
server, and then click Next.
k On the Virtual IP step, specify the virtual IP settings and then click Next.
l On the Permissions step, specify any permissions for this server and then click Finish to return to
the New Location step.
Before assigning permissions, add users or groups using the New Administrator wizard located at File|
Administration.
6 Click Next to display the Virtualization Hosts step, where you can associate Datacenters, hosts, nodes,
host groups, or clusters to this location by using the Add Entities option.
If you choose to not assign them at this time, click Next. Virtualization Hosts can be added later by right-
clicking on the specific location, and then selecting the Properties option and completing the
information in the Virtualization Hosts section.
See To add Virtualization Server connections on page 128 for more information about adding
virtualization hosts.
7 On the Administrative Account step, you can optionally select Specify default administrative account
and enter an account and password if you want to specify a default administrative account for new
computer groups that are created in this location. Click Next.
8 Use the Permissions step to assign permissions to users or groups.
Users and groups must be added using the New Administrator wizard. See To add a system administrator
on page 48 for more information.
9 Click Finish to save the new location.
To delete a location
Locations can only be deleted after Connection Brokers, Session Hosts, Desktops, and Virtualization Hosts
associated with the location are deleted.
1 Open the vWorkspace Management Console.
2 In the navigation pane, right-click on the location that is to be deleted.
3 Select Delete Location.
4 On the confirmation message, click Yes.
vWorkspace 8.6.3
58
Administration Guide
To edit location properties
Location properties are defined for Connection Brokers, Session Hosts, Virtualization Hosts, and Other Settings.
Location properties are the same for all the locations within an environment.
1 Right click the Locations node and select Properties.
2 On the Locations properties step, modify the properties of the location as necessary. See the following
table for a description of each.
Table 22. Locations properties
vWorkspace 8.6.3
59
Administration Guide
Table 22. Locations properties
Locations Property Description
HyperCache Enable vWorkspace HyperCache. Enable this feature to improve
performance and reduce IOPS requirements for the Hyper-V host.
Total cache size (MB) sets the default cache size for a parent VHD,
and can be overridden for individual parent VHDs.
VDI boot cache size. Specify a percentage of the total cache of the
boot cache to optimize VDI performance at boot time.
NOTE: If you specify a percentage that is not recommended for the
values you entered, a warning button is displayed. Click the warning
button to see the recommended percentage.
Cache lifetime. Sets the amount of time before unused data is purged
from the VDI and RDSH templates.
NOTE: Disabling HyperCache and changing the cache size can be done
on a per Hyper-V-host-basis from the Properties window of a Hyper-V
host in the Management Console.
HyperDeploy Approximate bandwidth usage. Select an approximate bandwidth to
be used by HyperDeploy when copying parent VHDs to local hosts.
Enabled HyperDeploy advanced storage optimization. Select this
option to allow vWorkspace to optimize the way virtual computer files
associated with vWorkspace-provisioned virtual desktops are stored.
Diff disk storage optimizations Select a setting for overcommitting differencing disk storage.
MAC address management Allow vWorkspace to manage virtual computer MAC addresses.
Select this option to generate and assign MAC addresses for Hyper-V
virtual computers.
Base address. Specify the base MAC address to use as the starting
point for new computers.
Auto-size settings Limit the number of new computers per auto-size iteration. Select
this option to specify the maximum number of computers that
vWorkspace creates in a single iteration of auto-sizing a group.
Number of computers. Select the appropriate number of computers.
Other settings
Computer timing settings Heartbeat interval. Specifies how often the Data Collector Service on
managed computers sends status information to the Connection
Broker.
Offline count. Specifies the number of missed heartbeats before a
managed computer is considered offline.
Offline retry. Specifies how often the Connection Broker attempts to
contact an offline managed computer.
Inactivity timeout. Specifies how long a managed computer is logged
off before it is considered inactive and automatically placed into a
Suspend state.
Logon attempts. Specifies now many bad logon attempts are allowed
before the virtual desktop is placed into a failed-logon state.
Sysprep period. Specifies how long the system waits during the
system preparation operation before attempting to initialize the
computer.
Host Timing Settings Heartbeat interval. The frequency hosts send status information to
the Connection Broker.
Offline count. Number of missed heartbeats before a host is
considered offline by the Connection Broker.
Offline retry. How often the Connection Broker attempts to contact
an offline host.
vWorkspace 8.6.3
60
Administration Guide
Table 22. Locations properties
vWorkspace 8.6.3
61
Administration Guide
This option allows users to move between stations without disconnecting their session. The setting would be
useful in a health care environment.
When enabled, the vWorkspace Connection Broker looks for both active and disconnected sessions when a user
issues a launch request.
This enforces one user session per farm, and allows a user to roam, being able to return to their active session
from any terminal. The default setting is 0.
HKLM\SOFTWARE\Provision Networks\Common\Load and License Manager
SessionRoamingMode REG_DWORD (0=disabled 1=enabled)
Deferred Authentication
An optional mode to retrieve applications and desktops through vWorkspace Connector for Windows
and Web Access, even by users whose passwords have expired or need to be changed.
vWorkspace 8.6.3
62
Administration Guide
7 On the Server Role step, specify the role or roles for the server, and then click Next.
A server can perform more than one role; for example, a vWorkspace Connection Broker and Microsoft
Remote Desktop Connection Broker (RD Broker).
8 If you selected the vWorkspace Connection Broker role on the Server Roles step, then on the Certificate
step, specify or view the certificate that is to be used on this server, and then click Next.
9 On the Logging step, select the check box if trace logging is to be enabled on this server and then click
Next.
Typically, logging is used only when assisted by Technical Support.
10 If you selected Microsoft Remote Desktop Connection Broker (RD Broker), complete the next two steps. If
not, then continue to Step 13 to specify permissions for this server.
11 On the Administrative Account step, specify an administrative account and password for the RD Broker,
and then click Next.
12 On the Logging step, select the check box if publishing and resource plug-in logging is to be enabled on
this server, and then click Next.
Typically, logging is only used as assisted by Technical Support.
13 On the Permission step, specify any permissions for this server, and then click Finish.
In order to assign permissions, you must first add users or groups using the New Administrator wizard
located at File| Administration.
vWorkspace 8.6.3
63
Administration Guide
To add session hosts
1 From the Management Console, navigate to Locations | Session Hosts | Management.
2 Right-click on Management, and then select New Session Host.
3 In the Add Session Host step, select <New Server> and click OK.
4 On the Welcome step of the Server wizard, click Next.
5 On the Server Name step, enter the server name (NetBIOS), and then click Next. Use the ellipsis button
to browse for the server.
The text box is limited to 15 characters, the maximum allowed in NetBIOS naming conventions.
6 On the Server Role step, specify the Session Host, and then click Next.
7 On the Folder step, specify the folder for this Session Host. Click New Folder to create a new folder.
Click Next when complete.
Folders are for organization and display; it does not change the operation of the servers.
8 On the Load Balancing step, accept the default load balancing rule or select to specify a custom load
balancing rule, and then click Next.
Additional custom load balancing rules can be created from the Load Balancing node of the vWorkspace
Management Console.
9 Click Next to inherit the global exception list for Session Auto-logoff.
Or select Specify the exclusion list to create an exclusion list specific to this Session Host, and then
click Next.
TIP: The default processes that are part of exclusion list are: alg.exe, csrss.exe,
ctfmon.exe, dwm.exe, getflash.exe, ie4uinit.exe, userinit.exe,
pndmhelper.exe, pngdiagt.exe, pngdilic.exe, pnlteagt.exe, pnsenapp.exe,
pnssosvr.exe, pnstart.exe, proquota.exe, rdpclip.exe, rdpinit.exe,
rdpshell.exe, servermanagerlauncher.exe, sftdcc.exe, splwow64.exe,
svchost.exe, taskeng.exe, taskhost.exe, VMwareTray.exe, VMwareUser.exe,
winlogon.exe, wisptis.exe, wmiprvse.exe, wscntfy.exe, wuauclt.exe,
PNMicSessionRedir.exe, tlsbln.exe, taskhostex.exe, rundll32.exe,
PNFMMRRouter.exe.
10 On the Connectivity step, complete the following information, and then click Next.
Table 23. Connectivity fields
11 On the Performance Optimization step, specify the performance optimizations options that are to be
enabled on this server, and then click Next.
12 On the Experience Optimization step, specify the experience optimization settings for this server, and
then click Next.
For more information about WAN Acceleration, see the Experience Optimizations on page 215.
13 On the Licensing step, specify licenses, and then click Next.
14 On the Permissions step, specify any permissions for this server, and then click Finish.
You must first add users or groups using the New Administrator wizard located at File| Administration.
vWorkspace 8.6.3
64
Administration Guide
To set up session host properties
When Session Hosts have been added, you can set properties to apply to all servers in the vWorkspace
environment that have the Session Host role.
1 Under the location (Locations | <location>) in which you want to add the permission, right-click on the
Session Hosts node, and then select Properties.
2 On the Session Host Properties step, highlight the user or group, and then change the Permissions to
Allow or Deny.
For more information about permissions, see Administration on page 48.
3 Click Apply to save your changes, and then OK to close the step.
vWorkspace 8.6.3
65
Administration Guide
Table 24. User information
Idle time The amount of time no activity has occurred between
the client and the Session host.
Logon time The date and time the session was logged on.
2 To connect to a specific Session Host: From the Management node, double-click on a Session Host object.
3 To connect to all Session Hosts: Double-click on each Session Host object.
4 To issue a command to a Session Host: Right-click a server session. Administrators can perform the
following actions:
Table 25. Administrator actions
vWorkspace 8.6.3
66
Administration Guide
The following information can be viewed:
Table 26. Session hosts information
7 Right click on a user session. You can perform the following actions:
Table 27. Administrator action
vWorkspace 8.6.3
67
Administration Guide
Table 27. Administrator action
Reset An administrator can reset a session, which ends
the session in a non-graceful way.
NOTE: All unsaved data is lost.
The session with Session Name of RDP-TCP and
Session ID 65536 is the Session Host’s RDP
listening port. The only administrative action
allowed is Reset.
Log off An administrator can gracefully log a user off
from a Session Host session. The user is
prompted to save any unsaved data.
vWorkspace 8.6.3
68
Administration Guide
b Click the Session Hosts node.
c Click the Processes tab.
The following information can be viewed:
Table 29. Session hosts processes information
5 Right click a user process from the list. Administrators can perform the following actions:
Table 30. Administrator actions for processes
vWorkspace 8.6.3
69
Administration Guide
The following information can be viewed:
Table 31. Applications information
The Virtual Desktop Extensions & MSI packages node can be used to deploy MSI packages that have been defined
within the Packaged Applications node of the Management Console.
vWorkspace 8.6.3
70
Administration Guide
Table 32. Attributes of a session host computer group
For more information on Computer Groups see Setting up computer groups for a location.
vWorkspace 8.6.3
71
Administration Guide
Managed session hosts
A Session Host that is a a member of a computer group is considered a Managed Session Host. The following
table details the properties of a available on a managed session host.
Table 33. Managed session host information
vWorkspace 8.6.3
72
Administration Guide
To provision a session host
Use the following steps to configure a template that is used to create virtual computer within a Session Host
computer group.
1 Join the server to the domain you are using if you are using Instant Provisioning.
2 Create a Windows Server with the TS/RDSH role enabled.
3 Install vWorkspace using the Advanced installer option, and select the TS/RDSH role.
In the Installation wizard, Management Database Setup step, select Do nothing at this time. Do not join
this vWorkspace installation to an environment.
4 Install the Instant Provisioning components to the template.
The Instant Provisioning components are located in the vWorkspace download in a folder named
Template Tools. Make sure you select the correct version (x86 or x64).
When Session Host managed computers are deployed from this template, they are initialized in a manner
similar to the initialization of virtual desktops. The difference is that the Session Host initialization
process knows this is an RDSH and automatically provides the RDSH with the correct database
information.
vWorkspace 8.6.3
73
Administration Guide
See To initialize a computer for more information.
• Virtual Desktop Extensions (PNTools). Set of executables, dynamic link libraries, and device drivers
that provide features and management functionality for managed computers in a vWorkspace
infrastructure. Virtual Desktop Extensions can be installed on all computers, virtual or physical, which
are being managed using the Desktops node.
See Virtual Desktop Extensions (VDE) for more information.
• Publish managed desktops and applications. Managed desktops must be published before users can
connect to their assigned applications or managed computer. Once published, icons representing the
managed desktop appear in the application set of the Connector or Web Access client, allowing the user
to click on an icon to initiate the program.
See Publish a managed desktop and Publish managed applications for more information.
• Power management. Managed computers are considered to be power-managed computers if the power
state can be changed automatically by the Connection Broker, or manually by an administrator using the
Management Console.
See Power management for more information.
vWorkspace 8.6.3
74
Administration Guide
Table 34. Computer group properties
vWorkspace 8.6.3
75
Administration Guide
Table 34. Computer group properties
vWorkspace 8.6.3
76
Administration Guide
Table 34. Computer group properties
vWorkspace 8.6.3
77
Administration Guide
To add a computer group
The settings presented differ based upon the system type, such as VMware or Microsoft SCVMM. Review the
previous table to view which property applies to which type.
TIP: Virtualization servers and virtualization hosts must be added prior to adding
computer groups. See the Virtualization Platform Integration chapter for more
information on the set up of virtualization servers and hosts.
vWorkspace 8.6.3
78
Administration Guide
If the criteria is not found a message box displays stating [criteria] not found.
vWorkspace 8.6.3
79
Administration Guide
To arrange Information Pane column order and sort order
Columns are grouped and ordered according to computer group type. In the Column Options window, the
Grouped check box indicates if the selected column is part of a group and its order is determined by its position
in the Selected Columns pane, with the top column on the far left of the Information pane.
1 To arrange columns in the Information pane, click and hold down the mouse button in the column
heading, and drag the column to the desired location.
2 To sort information within a column, click the column heading to toggle the ascending or descending
arrowhead, or right-click in the column heading and select Sort Ascending or Sort Descending from the
drop-down context menu.
To resize columns
1 Right-click in a column heading and select Size Column to Fit from the drop-down context menu to fit a
column to its contents.
2 Right-click in a column heading and select Auto Size All Columns to Fit to automatically fit all the
columns in the Information pane to their contents.
To add columns
1 Open the vWorkspace Management Console.
2 Navigate to and select a computer group.
3 Select the Desktops tab.
4 Right-click within a column heading.
5 Select Column Options in the context menu.
6 In the Column Options window, use the right arrow to move columns from the Available Columns pane to
the Selected Columns pane, or the left arrow to move columns back to the Available columns pane.
7 In the Selected Columns pane, highlight a column name and click the up or down arrows to adjust its
position. Click OK.
8 To display all the available columns, right-click in an information pane column heading and choose Show
All Columns from the drop-down context menu.
Task automation
The Task automation property of a managed computer group provides the ability to schedule execution of a
vWorkspace supported operation on a vWorkspace managed virtual or physical computer or Session host is
available through the Automated Task Wizard. Some of the scheduled tasks include:
• Power management.
• Deletion of virtual computers, including the ability to delete computers that have been inactive for a
specified number of days.
• Installation of MSI packages.
• Installation and update of Virtual Desktop Extensions.
• Program and script execution.
vWorkspace 8.6.3
80
Administration Guide
5 On the Welcome step, click Next.
6 Enter a Name for the task, and then click Next.
7 On the Task step, select the task from the list, and then click Next.
8 On the Task Parameters step, complete the information, and then click Next.
The fields on the Task Parameters step change based upon the type of task that is selected.
9 Complete the information on the Schedule step, and then click Finish.
vWorkspace 8.6.3
81
Administration Guide
Table 36. Administrative account step
Table 38. Client assignment (see Temporary Client Assignment for more details)
vWorkspace 8.6.3
82
Administration Guide
Table 38. Client assignment (see Temporary Client Assignment for more details)
vWorkspace 8.6.3
83
Administration Guide
Table 41. Power savings (SCVMM and Hyper-V)
Power Savings Feature Update
In 8.6.2, we added the capability to globally configure the action to take when power savings is enabled. Now
the power savings feature can alternatively be configured to power off or shutdown the guest. This setting is
configured in the vWorkspace database as specified below:
Table: DmSettings
SectionKey: BrokerSetting
ValueKey: PowerSavingAction
IntValue: 4,5 or 11 (Power Off, Suspend (default) or Shutdown Guest)
vWorkspace 8.6.3
84
Administration Guide
If this record does not already exist in the DmSettings table, the system will default to 5 (Suspend). If the
record doesn’t exist, use this SQL statement to add the record:
DECLARE @RecordGUID uniqueidentifier;
SET @RecordGUID = NEWID();
INSERT INTO DmSettings
(SectionKey
,ValueKey
,CharValue
,IntValue
,ImageValue
,DateTimeValue
,RecordGUID)
VALUES
('BrokerSetting'
,'PowerSavingAction'
,NULL
,5
,NULL
,NULL
,'{'+CONVERT(varchar(38), @RecordGUID)+'}')
GO
If this record already exists, just modify the IntValue field as necessary. A connection broker restart is not necessary for this
setting to take effect.
vWorkspace 8.6.3
85
Administration Guide
Table 45. Configuration (Hyper-V and SCVMM system type)
vWorkspace 8.6.3
86
Administration Guide
Table 48. Optimizations
vWorkspace 8.6.3
87
Administration Guide
• Windows 7, 8.1 and 10, Windows Server 2008, Windows Server 2008 R2, Windows Server 2012 and
Windows Server 2016(unattend.xml)
You can also import an existing sysprep.inf or unattend.xml file, and then make additional customizations to the
file through the Operating System Customizations wizard.
vWorkspace 8.6.3
88
Administration Guide
Table 51. Sysprep execution modes
SCVMM n/a INF, XML n/a
VMware INF, XML INF, XML INF
Parallels n/a n/a INF, XML
INF = Windows XP and Windows Server 2003
XML = Windows 7, 8.1 and 10, Windows Server 2008/R2, 2012 and 2016
vWorkspace 8.6.3
89
Administration Guide
3 Install PNtools.
4 Point your template to the KMS server.
5 Make a copy of the Base Template Image vhd(x) file before performing the Sysprep /Generalize
/Shutdown operation.
6 Perform Sysprep, import or update the vWorkspace template. All the new provisioning and re-
provisioning will be done from this template now.
7 When the base image needs to be updated, the copied base template image file will be used and another
copy of this file will be made before performing the Sysprep. This way rearm limitation can be worked
around.
The following sections provide examples of how to prepare the template for KMS to work with vWorkspace. Your
specific needs may differ. Refer to Microsoft Key Management Services documentation for more information.
The following methods are outlined described:
• Using the Existing Template Method
• Using a New Template Method
vWorkspace 8.6.3
90
Administration Guide
Microsoft KMS licensing verifies that the computer has been activated. All provisioned computers use the same
CMID as the template, so the KMS server returns information that the computer is active and does not need a
license.
Use the following procedure to enable the computer to be licensable, allowing the KMS server to generate a
valid license.
On your template that has been joined to a domain, perform the following steps:
1 Verify that Instant Provisioning is installed.
2 Verify that Virtual Desktop Extensions is installed.
3 Verify that you have the KMS Client Setup Key installed as the key when you created the template.
4 Generalize the template. From an elevated command prompt, run the following command:
Sysprep /generalize
This removes the computer from the Domain and removes any KMS information that may be on the
computer.
5 Add the computer back into the domain.
6 When you restart the template, add the KMS server information back into the template. This can be
done using the following command in an elevated command prompt:
SLMGR-skms <KMS server>
7 Copy and paste the following script into Notepad and save it as EnableSPPSVC.vbs in the following
location:
C:\Program Files(x86)\Quest Software\Instant Provisioning\VBScripts\
Option Explicit
On Error Resume Next
Public Sub StartApplication(App, WindowStyle)
dim aShell
set aShell= CreateObject("WScript.Shell")
aShell.Run App,WindowStyle
set ashell=nothing
end sub
StartApplication "%SYSTEMROOT%\system32\sc.exe config sppsvc start=delayed-auto",0
on error goto 0
8 Close the template.
9 Re-import the template into the Management Console for the new changes to take effect.
vWorkspace 8.6.3
91
Administration Guide
This removes the computer and any KMS information from the Domain.
5 Add the computer back into the domain.
6 When you restart the template, add the KMS server information back into the template.This can be done
using the following command in an elevated command prompt.
SLMGR-skms <KMS server>
7 Install Instant Provisioning.
8 Install the version of Virtual Desktop Extensions appropriate for the template.
9 Copy and paste the following script into Notepad and save it as EnableSPPSVC.vbs in the following
location:
C:\Program Files(x86)\Quest Software\Instant Provisioning\VBScripts\
Option Explicit
On Error Resume Next
Public Sub StartApplication(App, WindowStyle)
dim aShell
set aShell= CreateObject("WScript.Shell")
aShell.Run App,WindowStyle
set ashell=nothing
end sub
StartApplication "%SYSTEMROOT%\system32\sc.exe config sppsvc start= delayed-auto",0
on error goto 0
10 Shut down the template.
11 Import the template into the Management Console.
vWorkspace 8.6.3
92
Administration Guide
12 On the Administrator Password step, enter the Password for the administrator account for the desktops
created in this group, and then click Next.
13 On the Domain or Workgroup step, the select Domain or Work group where the computers are to be
added, click Next.
If you select Domain, specify a user account that has permission to add a computer to the domain.
14 On the Active Directory Path step, enter the Active Directory Organization Unit Path to which the
computers are to be added, and then click Next.
15 Enter the path to the folder where the installation files are located, and then click Next.
If you do not want a folder specified, delete the default value in the Path field.
This is an optional step. The default is c:\sysprep\i386.
16 On the Regional Settings step, select one of the options, and then click Next:
• Use the default regional settings for the Windows version you are installing.
• Specify the regional settings. Select a default value for the language.
17 On the Languages step, select the language in which the users can view the content, and then click
Next.
18 Use the Run Once step to configure Windows to automatically run a command the first time a user logs
on.
a Enter the command in the Command box, and click Add.
b Use the green arrows to define the commands order.
c Click Next when you are finished.
19 Enter an Identification String, which is written to the registry of the computer to assist in determining
what customization object was used to customize a computer. Click Next.
20 On the Custom Entries step, alter the customization entries. This is an optional step. Click Next to
proceed to the next step.
21 On the Summary step, review your entries and do one of the following:
• Click Back to make changes.
• Click Finish to create the desktops.
• Click Cancel to exit without saving the settings or creating the desktops.
22 Complete the Add Computers wizard.
To create operating system customizations for Win7 and 8/Windows Server2008/ Windows
Server 2008 R2, and Windows Server 2012
1 On the Add Computers wizard, Customize Operating System setting, select the New icon (green plus
sign).
2 On the Welcome to the Operating System Customizations Wizard window click Next.
3 On the Name step, enter a Name for this operating system customization, and then click Next.
4 On the Platform step, select the Platform type for this customization, and then click Next.
5 On the Import step, click Select file and browse to the location of your answer file template if you want
to use an existing unattend.xml file.
a Click Edit to use Notepad or a shell application to edit the file.
b If you have modified the file outside of vWorkspace or have used the Edit option to modify the
file, click Re-import to reimport the file.
c Click Next to continue.
vWorkspace 8.6.3
93
Administration Guide
This is an optional step, and is used if you have an existing unattend.xml file that you want to use in the
Sysprep process.
6 Select the operating system and the processor architecture for this customization, and then click Next.
7 On the Registration step, enter the Windows registration information of Owner and Organization, and
then click Next.
8 On the Time Zone step, select a Time Zone that is to be used when configuring Windows, and then click
Next.
9 On the Product Key step, select one of the following, and then click Next.
• Select Specify a product key and then select Specify a single product key. Enter the specified
product key.
The entered product key replaces the Product key value and elements in the unattend.xml file if
you have imported an existing unattend.xml file.
• Select Specify a product key and then select Retrieve product keys from a text file. Enter the
file or browse to its location.
• Unselect Specify a product key.
The Product key values and elements that are specified in the imported unattend.xml file (if you
have imported an existing unattend.xml file) will be used in the operating system customization
process.
If there are no Product key values or elements specified in the unattend.xml file, a message is
displayed warning that the operating system customization might fail.
The need for a product license key is based upon Microsoft’s license scheme for their products.
10 On the Customizations Type step, select one of the options: and then click Next.
• Instant
• Microsoft Sysprep
• Direct Sysprep
11 On the Domain or Workgroup step select Domain or Workgroup to identify how the desktops will
participate in the network, and then click Next.
If you select Domain, you must enter a user account that has permission to add a computer to the
domain.
12 On the Active Directory Path step, specify the Active Directory Organization Unit path into which the
computers are to be added, and then click Next.
13 On the Local Account step, specify a local administrator account if you are using Microsoft Windows 7, or
Microsoft Server 2008, and then click Next.
14 On the Firewall step, enable or disable the firewall for the public profile, domain profile, and private
profile, and then click Next.
15 On the Regional Settings step, specify the regional settings and then click Next.
16 On the Run Once step, configure Windows to automatically run a command the first time a user logs on.
a Enter the command in the Command box, and click Add.
b Use the green arrows to define the commands order.
c Click Next when you are finished.
17 On the Identification String step, enter an Identification String, which is written to the registry of the
computer to assist in determining what Sysprep object was used to customize a computer.
18 Click Finish to complete the Operating System Customizations wizard.
19 Complete the Add Computers wizard.
vWorkspace 8.6.3
94
Administration Guide
Optimizing a virtual computer
The vWorkspace Desktop Optimizer allows you to apply optimizations to virtual computers. You can use the
Desktop Optimizer to disable Windows services that are not essential for your environment, improving
performance.
The Desktop Optimizer is an option that can be installed with Instant Provisioning tools.
2 If you want to filter the list of optimization settings, click the Select heading and choose one of the
following filtering options:
• By Impact. Choose between Low, Medium and High. The higher the impact, the more beneficial
the optimization is for your VDI environment (scalability).
• By Category. Optimizations can be sorted by area they have the most effect on. Categories are:
Storage, User Experience and CPU/Memory.
3 Enable or disable the Optimization Settings.
When you click on an item from the list, the following information is shown for the selected item:
• Description. A description of the selected optimization.
• Justification. A reason why you might want to apply the selected optimization.
• Impact. The level that your VDI environment (scalability) is impacted.
• Category. The category that the selected optimization can be sorted by.
4 Click Run to apply the optimizations. There is no undo for this operation.
5 Click Save to save the current configuration. The configuration is stored in an XML file that is in the same
directory as the vWorkspace Desktop Optimizer EXE file.
6 If you want to export the current configuration to an XML file, click Export.
7 Click Exit.
vWorkspace 8.6.3
95
Administration Guide
To install Userinit chaining on a new instance on windows
Before PnTools installation:
HKLM\Software\WindowsNT\CurrentVersion\Winlogon - value: UserInit.exe (this is the Windows default)
After PNTools installation
HKLM\Software\WindowsNT\CurrentVersion\Winlogon - value: PnShell.exe
HKLM\Software\Wow6432Node\Provision Networks\Provision-IT\UserInit (this key is added during installation) -
value: UserInit.exe (this value is what was in the WinLogon key)
To install Userinit chaining on a system on which Userinit has already been modified by a third
party application
Before PnTools installation
HKLM\Software\WindowsNT\CurrentVersion\Winlogon - value: LWL.exe (arbitrary value)
After PNTools installation
HKLM\Software\WindowsNT\CurrentVersion\Winlogon - value: PnShell.exe
HKLM\Software\Wow6432Node\Provision Networks\Provision-IT\UserInit (this key is added during installation) -
value: LWL.exe (this value is what was in the WinLogon key)
vWorkspace 8.6.3
96
Administration Guide
To View tasks for managed computers
1 Open the vWorkspace Management Console.
2 Navigate to the computer group to which the computer belongs (Location | Location | Session Host or
Desktops), and highlight the computer group.
3 Select the Computers tab in the information pane, and then highlight the computer.
4 Click Toggle Lower Pane on the toolbar of the information pane.
This enables the lower pane with three tabs: Summary, Tasks, and Log.
5 Select the Tasks tab to view tasks performed on the selected computer. Use the Actions menu and
toolbar of the tasks pane to refresh information or cancel tasks.
Initializing a computer
When a managed computer (virtual or physical) is added to a computer group, the vWorkspace Data Collector
Service must be installed to allow the managed computer to communicate properly with vWorkspace
Connection Brokers.
This process is accomplished using the Initialize Computer task, which is initiated and executed by the
Connection Broker.
Initialization triggers
The following events can trigger the Initialize Computer task:
• Successful clone operation
• Add/Import desktops
• Missed heartbeats
To initialize a computer
1 The Connection Broker checks for the IP address of the computer to be initialized by querying the
Virtualization Host. For other/physical system type computers, it checks for the issuing DNS or NetBIOS
name resolution queries.
2 After the IP address of the target computer has been retrieved, the Connection Broker attempts to
connect to the Data Collector service on that computer using TCP port 5203. If successful, it queries for
the version of the Data Collector service.
3 If the Connection Broker is unable to connect to the Data Collector service, or if the version of the Data
Collector service on the target computer is older than that running on the Connection Broker, the
Connection Broker attempts to install the newer version of the service by remotely connecting to the
Windows Service Control Manager and system drive of the target managed computer.
It then stops the Data Collector service if it is running and copies the newer version of PNDCSVC.exe to
the Windows\System32 folder. After the file has been copied, the Connection Broker issues a remote
command to start the Data Collector service.
vWorkspace 8.6.3
97
Administration Guide
4 When the Data Collector service is started on the target computer, the Connection Broker again attempts
to contact the Data Collector service on TCP port 5203. If the connection is successful, the Connection
Broker passes the following to the Data Collector service:
• List of all available Connection Brokers.
• Informs the Data Collector service to use TCP port 5201 when initiating connections to a
Connection Broker.
• Request that subsequent connections be encrypted, and provides the public key to use for SSL
encryption, if configured.
• Configured heartbeat interval (the interval at which the Data Collector service will send status
updates to the Connection Brokers).
• Information about the License Mode for the vWorkspace infrastructure.
• Assigned Unique Computer ID for the computer.
When an Initialize Computer task is unsuccessful, the Connection Broker considers the desktop unusable and
marks it offline, making it unavailable to users. Some common causes of a failure include:
• Firewalls are blocking the communications between the Connection Broker and the managed
computer.
• Name resolution issues.
• Insufficient privileges held on the managed computer. You need to be able to connect to the
administrator file shares and have the privilege to create a service on the managed computer.
The privilege is set in the Properties of the computer group, in Computer Administrative
Account.
vWorkspace 8.6.3
98
Administration Guide
• Use PNTools | Install/Update from the context menu of a specific managed computer group or managed
computer on the vWorkspace Management Console.
• To define a package for VDE, use the vWorkspace Management Console, Packaged Applications node,
MSI Packages option. See MSI Packages for more information.
• Use the Automated Tasks option. See Task automation for more information.
• Manually install Virtual Desktop Extensions.msi into the virtual computer template.
Defining targets
Use the Targets node on the vWorkspace Management Console to define the list of accounts and definitions that
are used in target assignments for a resource. vWorkspace uses targets to assign resources such as managed
applications, and connection policies to users connected to a virtual workspace.
A user can belong to more than one target definition. Target assignments are cumulative (users receive the
assignments of all of the target definitions they are members of, except when a conflict exists).
In the case of a conflict, the client with the highest priority takes precedence. Target types at the top of the list
have higher priority than those lower in the list. The settings Yes, No, and Defer to End User have priority over
Undefined. You can modify priority by using the green Move Up or Move Down options from the toolbar, or from
the context menu of the target name.
vWorkspace 8.6.3
99
Administration Guide
b From the Domain list, select the Windows domain.
c In the Display section, select Organizational Units, Users, or both.
d In the Filter field, enter a specific or partial name. You can also enter an asterisk (*) as a wild
card.
e Click Refresh. The system displays a list of organizational units or users in the bottom pane.
f Select one or more of the items, and then click OK.
vWorkspace 8.6.3
100
Administration Guide
b In the Display section, select Organizational Units, Computers/Client Names, or both.
c In the Filter field, enter a specific or partial name. You can also enter an asterisk (*) as a wild
card.
d Click Refresh. The system displays a list of organization units or groups in the bottom pane.
e Select one or more of the items.
5 Click OK.
Advanced targets
Advanced Targets allow you to create target groupings based on logical criteria. You can granularly limit the
scope of a resource assignment. Multiple conditions can be combined into a single target that is assigned to a
resource such as a printer, a connection policy or a managed application. A condition is defined by providing a
target field, a function, and a value.
Additional conditions can be created. Logical operators AND and OR can be applied between each condition.
Conditions can also be grouped. Within each group a logical operator can be applied, and separate logical
operators can be applied between multiple condition groups or between single conditions and condition groups.
vWorkspace 8.6.3
101
Administration Guide
8 Click Finish.
Table 52. Advanced target condition fields
Functions Description
Is Equal to Returns true if the target field is equal to the
specified value.
Is Not Equal to Returns true if the target field is not equal to the
specified value.
Is Greater Than Returns true if the target field is greater than the
specified value.
Is Greater Than or Equal to Returns true if the target field is greater than or
equal to the specified value.
vWorkspace 8.6.3
102
Administration Guide
Table 53. Advanced targets functions
Functions Description
Is Less Than Returns true if the target field is less than the
specified value.
Is Less Than or Equal to Returns true if the target field is less than or equal
to the specified value.
Matches Pattern Returns true if the target field matches the
specified wildcard pattern value. Use an asterisk (*)
to match zero or more characters, use a question
mark (?) for single characters, and use [a-z] for
character ranges.
Does Not Match Pattern Returns true if the target field does not match the
specified wildcard pattern value.
Is in the List Returns true if the target field matches at least one
item in the specified list of values.
Is Not in the List Returns true if the target field does not match any
items in the specified list of values.
Is in the Range Returns true if the target field is between the
specified from/to values (inclusive).
Is Not in the Range Returns true if the target field is not between the
specified from/to values.
Is Required Enforces the Target Field parameter.
Managed applications
Before an application can be published and accessed by users, it first must be installed on the hosting computer.
In a vWorkspace infrastructure, the hosting computer can be any of the following:
• Microsoft RD Session Hosts
• Managed Computers
• Virtual Applications
From the Managed Applications node, you can enable Graphics Acceleration globally for managed and
unmanaged applications, set custom properties, and set permissions for users for all managed applications.
For more information, see Managed Applications on page 160.
vWorkspace 8.6.3
103
Administration Guide
• Connector management configuration
• Setting Connection Policies for Connectors
• Deploying Connector updates
vWorkspace 8.6.3
104
Administration Guide
Connector management configuration
You can use the Connector Management Configuration node to create one or more client configurations. After
creating a configuration, you can assign the configuration to targets.
vWorkspace 8.6.3
105
Administration Guide
Connector Configuration properties
Table 54. General
vWorkspace 8.6.3
106
Administration Guide
Table 56. Firewall/proxy traversal
vWorkspace 8.6.3
107
Administration Guide
Table 57. Authentication
vWorkspace 8.6.3
108
Administration Guide
Table 59. Local resources
vWorkspace 8.6.3
109
Administration Guide
Table 60. Experience
vWorkspace 8.6.3
110
Administration Guide
Table 61. Password Management
vWorkspace 8.6.3
111
Administration Guide
Table 64. Target Assignments
To modify a configuration
1 From the Management Console, open the Connector Management node.
2 Click Configuration | Configuration Properties. The Connector Configuration Properties is displayed.
3 Modify the fields as necessary (see Connector Configuration properties on page 106).
4 Click OK.
To delete a configuration
1 From the Management Console, open the Connector Management node, and click Configuration.
2 Select the configuration that you want to delete.
3 Click Delete.
4 Click OK.
Unassigning targets
1 From the Management Console, open the Connector Management node, and click Configuration.
2 Select the configuration that you want to add a target to.
3 Click Unassign Targets.
vWorkspace 8.6.3
112
Administration Guide
4 Select the target that you want to unassign from the configuration.
5 Click OK.
The order that your targets appear in the management console affect the order in which the policies are
applied. The top-most targets that are assigned a policy with a Yes, No, or Defer setting take precedent. In this
scenario, users that are members of DomainUsersGroup but not DomainAdminsGroup will be forced to use
clipboard (ClipboardPolicy:Clipboard=Yes) and not permitted to use USB (ClipboardPolicy:USB=No). On the other
hand, users that are members of both DomainAdminsGroup and DomainUsersGroup will be forced to use
clipboard (ClipboardPolicy:Clipboard:Yes) and permitted (but not required) to use USB (USBPolicy:USB:Defer).
Administrators are still forced to use Clipboard since that setting is Undefined in the USBPolicy.
NOTE: Connection policies take effect after the first login to an environment, since the policy information
is sent to the end users' devices after authentication.
vWorkspace 8.6.3
113
Administration Guide
d Select the added target from the Select Targets step, and then click OK.
e Click Next.
9 On the Permissions step, enter the appropriate permissions.
10 Click Finish.
Policy-based configuration
The simplest way to initially deploy and configure native Connectors that support policy-based configuration is
to direct your end users to a Web Access site. The site automatically detects, installs and configures the users’
devices, based on the Connector Management settings in the Management Console.
After a native Connector is installed and configured, users can launch the native Connector without going
through a Web Access site. The Connector will automatically check for updates to its configuration and new
versions of the application, based on the Connector Management settings.
See Installing vWorkspace Connectors on page 25 for information about how users install and upgrade the
vWorkspace Connector for Windows.
Legacy Connectors
vWorkspace Connectors previous to version 8.5 that do not support auto-detection and policy-based
configuration can still benefit from centrally-managed Connector configurations. Any configuration managed in
the Management Console can be accessed directly from the connection brokers or through Web Access sites.
Your legacy Connectors can use these direct links to download configurations.
To access the configurations from legacy Connectors, your environment must be configured to not require
authentication for configuration requests. This can be set on the Farm Properties dialog in the Management
Console (Authentication | Connection Configuration).
vWorkspace 8.6.3
114
Administration Guide
Creating a DNS service record for email address-based
discovery
Email address-based discovery makes it easy for users to discover and log into an environment. If you want to
enable email address-based discovery for the Connector configuration login process, create the following DNS
service record for the vWorkspace environment.
vWorkspace 8.6.3
115
Administration Guide
Table 67. User Environment Management options
Application layering
An Application Layer is a virtual hard disk that contains the components that are present for an application. See
the Dell Wyse vWorkspace WSM Administrator’s Guide for detailed information about application layering.
vWorkspace 8.6.3
116
Administration Guide
b Import the WSM layers into vWorkspace and assign application layers to users and desktops. The
series of steps below come from the vWorkspace.WebApi.demo.PS1, which is located in the
vWorkspace ZIP file's WSM folder. For simplicity, copy this file to the server that is used to install
the vWorkspace WebAPI (step 1b).
# ::::::::::::::::::::::::::::::::::::::::::::::::::
# Step 1: Every new PowerShell session setup
# ::::::::::::::::::::::::::::::::::::::::::::::::::
# This line should point to the location of the vWorkspace.WebApi.psd1 file
# This is installed with the WSM Web API components
Import-Module "C:\Program Files (x86)\Wyse vWorkspace WebAPI\vWorkspace.WebApi"
# Running the cmdlet above without specifying the -Administrator parameter will prompt the user for a
credential
# To specify credentials programatically, see the example below
# The credential specified must be a pre-defined vWorkspace administrator
# $adminCreds = New-Object System.Management.Automation.PSCredential("domain\username", (ConvertTo-
SecureString "password" -AsPlainText -Force))
# Connect-DVWFarm -WebApiAddress "http://webApiServer:4500/api/farm/FarmAlias" -Administrator
$adminCreds
# ::::::::::::::::::::::::::::::::::::::::::::::::::
# Step 2: First time setup
# ::::::::::::::::::::::::::::::::::::::::::::::::::
# This lets you review the WSM servers already in your vWorkspace farm
Get-DVWServer -WSM
# If there is no WSM Core server defined, the line below (New-DVWServer) will let you put one in
# This will only need to be done once ever per farm
# New-DVWServer -Name "wsm-core-server" -AlternateIpAddress "10.4.167.70" -Type "WSMCore"
# This lets you review the settings that allow the vWorkspace api to contact the WSM api
# If they need adjustment (or don't yet exist), the line below (Set-DVWSetting) will let you set them
# This will only need to be done once ever per farm
Get-DVWSetting
vWorkspace 8.6.3
117
Administration Guide
# Set-DVWWetting -WSMAPIPort 8082 -WSMUseSSL $false
# ::::::::::::::::::::::::::::::::::::::::::::::::::
# Step 3: Synchronization
# ::::::::::::::::::::::::::::::::::::::::::::::::::
# This synchronizes the WSM servers and then WSM applications
Sync-DVWWSMServer
Sync-DVWWSMApplication
# This lets you review the WSM application layers present in the farm
Get-DVWWSMApplication
# ::::::::::::::::::::::::::::::::::::::::::::::::::
# Step 4: Publish a WSM Application to a desktop group
# ::::::::::::::::::::::::::::::::::::::::::::::::::
# This lets you review the desktop groups present in the farm
Get-DVWDesktopGroup
# This publishes our application to our desktop group
Publish-DVWWSMApplicationToDesktopGroup -GroupName "WSM01" -WSMApplicationName "firefox"
# This lets us review what we just did by listing off all WSM applications published to our desktop group
Get-DVWWSMApplication -GroupName "WSM01"
# ::::::::::::::::::::::::::::::::::::::::::::::::::
# Step 5: Assign a WSM Application to a target
# ::::::::::::::::::::::::::::::::::::::::::::::::::
# This lets you review the targets present in the farm
Get-DVWTarget
# This assigns our application to our target
Publish-DVWWSMApplicationToTarget -WSMApplicationName "firefox" -TargetName "Domain\Domain Users"
# This lets us review what we just did by listing off all WSM applications assigned to our target
Get-DVWWSMApplication -TargetName "Domain\Domain Users"
TIP: You can manually edit the psd1 file that is installed with the web api powershell wrapper to view
hidden cmdlets.
If application layers are configured for particular users and desktop groups, the application layer will be
dynamically applied when the user logs into the VDI desktop and later removed on logoff.
vWorkspace 8.6.3
118
Administration Guide
Packaged Applications
The Packaged Applications node allows administrators to identify Microsoft Application Virtualization (App-V)
servers, their hosted application packages, and MSI Packages.
Microsoft App-V
Microsoft Application Virtualization (App-V) allows you to stream applications to client computers without
installing the applications directly on those computers. This simplifies tasks such as managing multiple versions
of applications and updating application packages.
You can import, update, and publish App-V applications from the App-V node on the Management Console
5 On the Credentials step, enter the appropriate credentials for the new App-V server, and then click
Next.
Table 69. Credentials fields
vWorkspace 8.6.3
119
Administration Guide
6 Specify any permissions that are to be used with this App-V server, and then click Finish.
vWorkspace 8.6.3
120
Administration Guide
11 On the vWorkspace Folders step, select one or more applications, and then click Folder(s) to define the
folders in which the application or applications selected should be assigned. Click Manage Folders to
add or change the folders listed.
Applications with a launch location of client may only be assigned to vWorkspace client folders.
12 On the Load Balance step, click Select All or the specific applications by using Ctrl + left-click to specify
the applications for load balancing. Click the Load Balance Wizard to choose the load balancing rule
evaluator for the selected applications.
If you do not want to use load balancing, click Next.
13 On the Desktop Integrations Settings step, specify the location of the shortcuts on the vWorkspace client
host when using the vWorkspace Connector for Windows in desktop integrated mode by doing the
following:
a Select specific applications, or use the Select All button.
b Click Desktop Integration.
c Select one or more of the options, Desktop, Start Menu, Start Menu/Programs, and click OK.
d Click Next or OK on the Desktop Integration Settings step.
14 Review the selections on the Summary step and click Back to make changes or click Finish.
MSI Packages
The MSI Packages node is used to define MSI packages that can be deployed, as well as used in the Task
Automation feature.
vWorkspace 8.6.3
121
Administration Guide
3 From the Welcome step on the MSI Package Wizard, click Next.
4 On the MSI Package Name step, enter a Name for the MSI package, and then click Next.
This is the name that is displayed in the vWorkspace Management Console.
5 On the Source File step, enter the MSI source file or click the ellipsis to browse, and then click Next.
6 On the Run Location step, do one of the following, and then click Next.
• Execute the MSI file directly from the source location.
• Copy the MSI file to each computer before executing.
• Enter the full path and file name of the destination file in the Destination file field.
7 On the Credentials step, enter the credentials necessary to access the source MSI file, and then click
Next.
8 On the Parameters step, complete the following information, and then click Next.
Table 70. Parameters fields
9 On the Timeout Period step, do one of the following, and then click Next.
• Select the option Select the timeout value, and then specify the Timeout after value by using
the list.
• Select the option, Execute the MSI operation and Continue.
10 On the Permissions step, specify MSI Package permissions, and then click Finish.
Load Balancing
The Load Balancing node is used to create and manage rules used in the load balancing process for Session
Hosts, Microsoft Hyper-V computer groups, and Microsoft SCVMM computer groups.
See Load balancing on page 247 for more information.
Web Access
The Web Access node is used to define and manage vWorkspace Web Access web sites. Web Access is a web
application for vWorkspace environments that enable users to retrieve their list of allowed applications and
desktops using a web browser.
See Using Web Access on page 198 for more information.
vWorkspace 8.6.3
122
Administration Guide
Monitoring and Diagnostics
The Foglight® solution simplifies application performance monitoring and reduces the skills and effort required
to manage applications, the user experience, and the supporting infrastructure.
Monitoring and Diagnostics monitors vWorkspace-hosted VDI and Remote Desktop Session Host (RDSH)
implementations providing you with real-time and historical data.
vWorkspace 8.6.3
123
Administration Guide
Figure 23. Example of diagnostic information
Table 71. Accessing specific diagnostic information from the vWorkspace Management Console
Access Monitoring and Diagnostics
Navigation
information for...
A specific user File | Current User Sessions | Right click on the user | Select
Monitoring and Diagnostics.
A specific user from a session host Locations | Open a location | Session Hosts | Management | Click on a
terminal server in the left pane | Select a user in the right pane |
Select Monitoring and Diagnostics.
A specific connection broker Locations | Open a location | Connection Brokers | Click on a
connection broker | Select Monitoring and Diagnostics.
A managed terminal server Locations | Open a location | Session Hosts | Management | Click on a
terminal server | Select Monitoring and Diagnostics.
A provisioned terminal server Locations | Open a location | Session Hosts | Provisioning | Click on a
terminal server | Select Monitoring and Diagnostics.
A selected desktop group Locations | Open a location | Desktops | Select a desktop group |
Right click on the Desktops tab | Click the desktop group | Select
Monitoring and Diagnostics.
A Hyper-V environment Locations | Open a location | Virtualization Hosts | Click on the
Hyper-V node | Monitoring and Diagnostics.
A specific Hyper-V server Location | Open a location | Virtualization Hosts| Hyper-V | Click on
the individual hyper-V server | Monitoring and Diagnostics.
A VMware environment Locations | Open a location | Virtualization Hosts | Click on the
VMware node | Select Monitoring and Diagnostics.
A specific VMware datacenter Location | Select a location | Virtualization Hosts| VMware | Click on
the individual VMware datacenter | Select Monitoring and
Diagnostics.
vWorkspace 8.6.3
124
Administration Guide
Table 71. Accessing specific diagnostic information from the vWorkspace Management Console
Access Monitoring and Diagnostics
Navigation
information for...
A specific Web Access server Web Access | Right click on the website | Select Monitoring and
Diagnostics.
The print server for a specific User Environment Management| Printers | Click on a printer | Select
printer Monitoring and Diagnostics.
A managed application Managed Applications | Right click on the managed application in the
right pane | Select Monitoring and Diagnostics.
vWorkspace 8.6.3
125
Administration Guide
4
Virtualization Platform Integration
vWorkspace 8.6.3
127
Administration Guide
The following information is included on the Management Servers window.
Table 72. Management Servers fields
vWorkspace 8.6.3
128
Administration Guide
5 On the Server & Credentials window, specify the settings, and then click Next.
Table 74. Server & Credentials fields
6 On the Other Settings window, specify the settings, and then click Finish.
The options on the Other Settings window are based upon the supported features of the System Type
selected, so some options may be unavailable.
Table 75. Other Settings fields
vWorkspace 8.6.3
129
Administration Guide
Table 75. Other Settings fields
Power Off Specify the number of virtual computer
power off commands that can be sent to
the virtualization server from the
Connection Broker at one time.
Suspend Specify the number of guest operation
system suspend commands that can be sent
to the virtualization server from the
Connection Broker at one time.
Resume Specify the number of guest operation
system resume commands that can be sent
to the virtualization server from the
Connection Broker at one time.
Reset Specify the number of guest operation
system reset commands that can be sent to
the virtualization server from the
Connection Broker at one time.
Delete Specify the number of delete virtual
computer operations that can be sent to the
virtualization server from the Connection
Broker at one time.
Clone Specify the number of clone virtual
computer operations that can be sent to the
virtualization server from the Connection
Broker at one time.
NOTE: This option does not apply to
Microsoft Hyper-V.
Connection timeout Specify the amount of time that the
Connection Broker waits for a response from
the virtualization server.
Default option is 30 Seconds.
For medium to large production
environments where the virtualization
server is busy, you may need to set the
Connection Timeout to two or three
minutes.
NOTE: A Connection Timeout error does not
necessarily mean that the task requested by
the Connection Broker has failed. It may be
that the virtualization server is too busy to
report the successful completion of the
operation in a timely manner.
vWorkspace 8.6.3
130
Administration Guide
7 On the Credentials window, enter the credentials for this network storage server, and then click Finish.
The Use Default Credentials option can be used if you have specified credentials on the Default
Credentials window.
Virtualization hosts
After a virtualization management server is defined, Virtualization Hosts must be added to support cloning
operations and the creation of computer groups. Virtualization hosts are the server platforms in which virtual
computers reside. The following types of hosts can be added:
• Defining Microsoft Hyper-V hosts
• Defining SCVMM, VMware, or Parallels slave nodes
• Defining Parallels independent hosts
For Hyper-V hosts and Parallels Virtuozzo independent nodes, vWorkspace communicates directly with the
virtualization host. Therefore, no additional management servers need to be defined when using these types of
hosts.
vWorkspace 8.6.3
131
Administration Guide
• Select Override parent settings, select one of the following options, and then click Next.
• Use the default load balancing rule.
• Click View to see the default load balancing rule.
• Specify a custom load balancing rule.
Three load balancing rules are included with the vWorkspace installation. For more
information on the rules or how to create them see Load balancing.
10 On the Other Settings window, complete the settings and then click Finish.
Performing too many operations at once causes the virtualization host to perform poorly. The default
value for all concurrent operations is five. For Hyper-V hosts, the settings can be inherited from the
parent Hyper-V node.
1 From the Management Console, ensure that the Hyper-V host is initialized.
2 From the vWorkspace Connection Broker, copy the script file to the target host from the following
location on the system drive:
\Program Files (x86)\Quest Software\vWorkspace\HyperV Catalyst\SetHvAdministratorCredentials.ps1
3 Set up necessary credentials to access UNC shares. These credentials must be in the credential store for
the local system account and not the account of the active user (the data collector service runs as a
local system).
a Download psexec.exe from live.sysinterals.com.
vWorkspace 8.6.3
132
Administration Guide
VMware Datacenters are groupings of ESX or ESXi hosts and must be imported as objects in the vWorkspace
database, just as SCVMM Host groups or Hyper-V hosts, before creating VMware type computer groups.
Parallels Virtuozzo slave nodes must be added to enable the creation of Parallels type computer groups.
vWorkspace 8.6.3
133
Administration Guide
Too many operations at once causes the virtualization host to perform poorly. The default value for all
concurrent operations is 5.
About HyperCache
HyperCache provides read Input/Output Operations Per Second (IOPS) savings and improves virtual desktop
performance through selective RAM caching of parent VHDs. This is achieved through the following:
• Reads requests to the parent VHD are directed to the parent VHD cache.
• Requests data that is not in cache is obtained from disk and then copied into the parent VHD cache.
• Provides a faster virtual desktop experience as child virtual machines requesting the same data find it in
the parent VHD cache.
• Requests are processed until the parent VHD cache is full. The default size is 800 MB, but can be changed
through the Hyper-V virtualization host property.
vWorkspace 8.6.3
134
Administration Guide
HyperCache usage considerations with Clustered Shared Volumes (CSV) on Windows Server 2008/R2
CSV must be in redirected access mode and must remain so while HyperCache is caching the MasterVHD. If the
CSV is placed in direct access mode, the Hyper-V host will continue to function normally, but the VDI virtual
machines using the HyperCached MasterVHD may terminate abnormally.
Both MasterVHD/Template VHD and differencing VHDs can be placed on CSV.
HyperCache usage considerations with Clustered Shared Volumes (CSV) on Windows Server 2012.
HyperCache can be used in Windows Server 2012 with MasterVHDs on CSV. The CSV can be in any operational
mode; direct access mode or redirected access mode. CSV can transition from one access mode to another and
HyperCache will continue to work normally.
With CSV, one of the nodes is designated as the CSV owner node. While HyperCache is operational, CSV
ownership can transition from one node to another, and HyperCache will continue to work normally.
Both MasterVHD/Template VHD and differencing VHDs can be placed on CSV.
About HyperDeploy
HyperDeploy manages parent VHD deployment to relevant Hyper-V hosts and enables instant cloning of Hyper-V
virtual computers. HyperDeploy uses the following techniques to minimize the time used to deploy a virtual
computer.
• Smart copying that only copies to the Hyper-V hosts the parent VHD data that is needed.
• Instant provisioning allows the child VHDs to be cloned while the parent VHD is still being copied to the
Hyper-V host.
• Copy status is displayed on the Parent VHDs tab to allow for monitoring of the progress and completion.
HyperDeploy is a core component and requires no configuration.
HyperDeploy usage considerations with Clustered Shared Volumes (CSV) on Windows Server 2008/R2
CSV must be in Redirected Access mode and must remain so while HyperDeploy is deploying and copying the
MasterVHD. After HyperDeploy is done copying, the CSV can be placed into Direct Access Mode, but HyperCache
cannot operate with CSV in Direct Access Mode.
Both Master VHD/Template VHD and differencing VHDs can be placed on CSV.
HyperDeploy usage considerations with Clustered Shared Volumes (CSV) on Windows Server 2012
HyperDeploy can be used in Windows Server 2012 with Master VHDs on CSV and the CSV can be in any
operational mode, Direct Access mode or Redirected Access mode. CSV can transition from one access mode to
another and HyperDeploy will continue to work normally.
With CSV, one of the nodes is designated as the CSV owner node. While HyperDeploy is operational, CSV
ownership can transition from one node to another, and HyperDeploy will continue to work normally.
Both Master VHD/Template VHD and differencing VHDs can be placed on CSV.
vWorkspace 8.6.3
135
Administration Guide
• Remove. Removes the host from the Management Console that causes the Data Collector and
Hyper-V Catalyst components to uninstall.
• vWorkspace Monitoring and Diagnostics. Displays diagnostic information about the Hyper-V host.
• Properties. Controls settings for the Hyper-V host.
• Initialize. Checks and, if needed, updates the Data Collector and Hyper-V Catalyst components
on the Hyper-V Host.
3 Click OK.
vWorkspace 8.6.3
136
Administration Guide
Performing desktop cloud maintenance
The Desktop Cloud Maintenance settings are used to maintain your desktop clouds.
5 On the Template window, select the template that is to be used to create virtual computer clones, and
click Next.
• Update. Checks for newer versions of the existing templates.
• Import. Imports new templates from the Hyper-V hosts. This launches the Import Templates
wizard.
• Remove. Removes the highlighted template from the list.
6 On the Host Options window, select one of the options, and click Next:
• All Hosts. New virtual computers created in the computer group to be distributed across all
Hyper-V virtualization hosts defined for the location.
• Selected Hosts. New virtual computers created in the computer group to be distributed across
selected hosts only.
7 On the Hosts window, select the Hyper-V hosts where the virtual computers are to be distributed, and
click Next.
vWorkspace 8.6.3
137
Administration Guide
If All Hosts is selected in the previous window, the option to select a host will be unavailable.
• Click Distribution to set the distribution logic for the clone operation.
• Click Add Hosts to launch the Hyper-V Host Wizard.
8 On the Naming Conventions window, select the method for assigning a computer name to the new
desktop computers in Source, then click Next.
If Specify the base name is selected, do the following:
a Enter the text string in the Base Name field.
b Select a value from the Start values at and Increment values by fields.
c Select Re-use the names of deleted desktops, if appropriate.
If Specify a text file containing names is selected, do the following:
a Enter the path and file name of the text file containing the list of computer names in the Names
File field.
b Enter a text string that is prepended to the beginning of computer names in the Prefix field, if
appropriate.
c Enter a text string that is appended to the end of computer names in the Suffix field, if
appropriate.
9 On the Customize Operating System window, do one of the following, and then click Next:
• To use the operating system customization tools, select Specify operating system
customizations. The computers in this group are powered on after they are created.
• To create a new customization, select a customization from the list, or click New. See Operating
system customizations for more information.
• To not use Microsoft System Preparation tools, select Do not specify operating system
customizations. The desktops in this group are not powered on after they are created.
10 On the Configure Hardware window, set up the Video Adapter, Memory, Network Adapter and High
Availability settings.
a Click the Video Adapter tab, and do one of the following:
• To use the template, select Use template settings.
• To use the standard adapter, select Standard video adapter.
• To use the Microsoft RemoteFX 3D video adapter, select Microsoft RemoteFX 3D video
adapter. Select a value for maximum number of monitors from the Maximum number of
monitors, and select a value for Maximum monitor resolution.
b Click the Memory tab, and do one of the following:
• To use the template, select Use template settings.
• To use static memory, select Static memory. Select a value for virtual computer memory
from the Virtual computer memory field.
• To use Dynamic memory, select Dynamic memory. Select a value for startup memory from
the Startup memory field, select a value for maximum memory from the Maximum
memory field, and select a value for memory buffer percentage from the Memory buffer
(%) field.
c Click the Memory Priority tab, perform one of the following, and then click Next:
• To use the template, select Use template settings.
• To allocate dynamic memory resources, select one of the following options: High,
Medium, Low, or Custom. If Custom is selected, select a value for memory priority in the
Custom field.
d Click the Network Adapter tab, do one of the following, and then click Next:
vWorkspace 8.6.3
138
Administration Guide
• To use the template settings for the virtual network name, select Use template settings.
To specify a network name select Specify network name, and type the appropriate name in
the Network Name input field.
• To use the virtual LAN identification from the settings of the template, select Use
Template settings under Virtual LAN Identification. Select Disable VLAN ID to disable the
use of VLANS for the cloned virtual computers in this operation.
• To enable a custom virtual LAN identification, select Enable VLAN ID and type the
appropriate VLAN ID number in the VLAN ID field. Supported values 1- 4094.
e Click the High Availability tab. Select this option if you want to create a clustered virtual
machine that can be failed over to a different server in a fail-over cluster.
• the Hyper-V host being used to create the virtual machine must be in a failover cluster.
• The virtual hard disk (VHD) for the clustered virtual machine must be on a clustered disk.
NOTE: To provision to a cluster for failover, the target template and placement volumes must be
on Cluster Shared Volumes (CSVs). FailOverClustering Powershell cmdlets must be installed on the
system. Any changes to Hyper-V volumes on a host in a cluster will be applied to all hosts in the
cluster.
NOTE: To use Microsoft RemoterFX vGPU and dynamic memory, your Hyper-V environment must
meet specific requirements. For more information about these requirements, see your Hyper-V
documentation.
11 On the Options window, select either Now or At a specific time, and enter a date and time. Then click
Next.
12 On the Finish window, review and confirm the information, and do one of the following:
• Click Back to make changes.
• Click Finish to create the desktops.
• Click Cancel to exit without saving the settings or creating the desktops.
Red text is displayed to remind administrators not to create more virtual computers than their
infrastructure is designed to support.
vWorkspace 8.6.3
139
Administration Guide
Microsoft SCVMM integration
vWorkspace is integrated with Microsoft System Center Virtual computer Manager (SCVMM) to provide
management functionality to Hyper-V virtual computers. The following Microsoft SCVMM integrated features are
available in vWorkspace:
• Import Host Groups from SCVMM.
• Manage virtual computer power states.
• Use SCVMM Intelligent Placement to automate desktop and server provisioning using templates.
• Customize guest Microsoft Windows operating system.
• Distribute managed desktops across multiple storage locations.
• Import existing computers from SCVMM to an existing computer group.
• Managed computers that are members of SCVMM enabled Host Groups are considered to be power
managed computers. This means that the power state can be changed, either automatically by the
Connection Broker or manually by an administrator, using the vWorkspace Management Console.
• vWorkspace Broker Helper Service needs to be installed on the Microsoft SCVMM server.
vWorkspace 8.6.3
140
Administration Guide
2 In the Automated Task Wizard, name the new task, then select Reprovision from the Task list. Set the
task parameters in the Task Parameters window, then set the schedule and finish. Apply the task in the
Automated Task Wizard. For more information, see To schedule tasks using the Automated Task Wizard.
3 When the Reprovision Computers option is selected, the Reprovision Computer window opens. The
options on this window allow you to set the action to be performed by clone type. You can also select for
reprovisioning to occur once users have logged off.
The Clone Types, which represent the type of clones for virtual computers of the selected desktop
group, are:
• Standard Clones
• Differencing Disks Clones
The Reprovisioning Using options are:
• Existing Parent VHD. This option reprovisions the computer using the stated virtual hard
disk.
• New Parent VHD. This option reprovisions the computer using a different virtual hard disk
than the one used to create the clone.
• Do Not Reprovision. This option does not reprovision the computer.
4 On the Clone Method window, select Standard as the clone method that is to be used when adding
computers to this group, and then click Next.
5 On the Host Groups & Clusters window, select a Microsoft SCVMM server and the host group or cluster, as
appropriate. Click Next.
6 On the Template window, select a template from the list, and then click Next. If there are no templates
listed, or to update the list, click Import.
7 On the Naming Conventions window, select the method for assigning a computer name to the new
desktop computers.
If Specify the base name is selected, do the following:
a In the Base Name field, enter the text string.
vWorkspace 8.6.3
141
Administration Guide
b From the Start values at and Increment values by fields, select a value.
c Select Re-use the names of deleted desktops, if appropriate.
If Specify a text file containing names is selected, do the following:
a In the Names File field, enter the path and file name of the text file containing the list of
computer names.
b In the Prefix field, enter a text string that is prepended to the beginning of computer names.
c In the Suffix field, enter a text string that is appended to the end of computer names.
8 Click Next.
9 On the Customize Operating System window, do one of the following, and then click Next:
• To use the operating system customization tools, select Specify operating system
customizations. The computers in this group are powered on after they are created.
• Select a customization from the list, or click New to create a new customization. See Operating
system customizations for more information.
• To not use Microsoft System Preparation tools, select Do not specify operating system
customizations. The desktops in this group are not powered on after they are created.
10 On the Configure Hardware window:
a Click the Video Adapter tab, and do one of the following:
• To use the template, select Use template settings.
• To use the standard adapter, select Standard video adapter.
• To use the Microsoft RemoteFX 3D video adapter, select Microsoft RemoteFX 3D video
adapter. Select a value for maximum number of monitors from the Maximum number of
monitors field and select a value for Maximum monitor resolution from the Maximum
monitor resolution field.
b Click the Memory Priority tab, perform one of the following, and then click Next:
• To use the template, select Use template settings.
• To allocate dynamic memory resources, select one of the High, Medium, Low, or Custom
buttons. If Custom is selected, select a value for memory priority in the Custom field.
c Click the Memory tab, and do one of the following. Click Next when completed.
• To use the template, select Use template settings.
• To use static memory, select Static memory. Select a value for virtual computer memory
from the Virtual computer memory field.
• To use Dynamic memory, select Dynamic memory. Select a value for startup memory from
the Startup memory field, select a value for maximum memory from the Maximum
memory field, and select a value for memory buffer percentage from the Memory buffer
(%) field.
d Click the Memory Priority tab, perform one of the following, and then click Next:
• To use the template, select Use template settings.
• To allocate dynamic memory resources, select one of the following options: High,
Medium, Low, or Custom. If Custom is selected, select a value for memory priority in the
Custom field.
e Click the Network Adapter tab, do one of the following, and then click Next:
• To use the template settings for the virtual network name, select Use template settings.
To specify a network name select Specify network name, and type the appropriate name in
the Network Name input field.
vWorkspace 8.6.3
142
Administration Guide
• To use the VLAN ID from the settings of the template, select Use Template settings under
Virtual LAN Identification. Select Disable VLAN ID to disable the use of VLANS for the
cloned virtual computers in this operation.
• To enable a custom VLAN ID, select Enable VLAN ID and type the appropriate VLAN ID
number in the VLAN ID field. Supported values 1- 4094.
11 On the Options window, select either Now or At a specific time (and enter a date and time), and then
click Next.
12 On the Finish window, review and confirm the information, and do one of the following:
• Click Back to make changes.
• Click Finish to create the desktops.
• Click Cancel to exit without saving the settings or creating the desktops.
Red text is displayed to remind administrators not to create more virtual computers than their
infrastructure is designed to support.
vWorkspace 8.6.3
143
Administration Guide
a Enter the text string in the Base Name field.
b Select a value from the Start values at and Increment values by fields.
c Select Re-use the names of deleted desktops.
If Specify a text file containing names is selected, do the following:
a Enter the path and file name of the text file containing the list of computer names in the Names
File field.
b In the Prefix field, enter a text string that is prepended to the beginning of computer names.
c In the Suffix field, enter a text string that is appended to the end of computer names.
9 Click Next.
10 On the Customize Operating System window, do one of the following, and then click Next:
• To use the operating system customization tools, select Specify operating system
customizations. The computers in this group are powered on after they are created.
• To create a new customization, click New, or select a customization from the list. See Operating
system customizations for more information.
• To not use Microsoft System Preparation tools, select Do not specify operating system
customizations. The desktops in this group are not powered on after they are created.
11 On the Configure Hardware window:
a Click the Video Adapter tab, and do one of the following:
• To use the template, select Use template settings.
• To use the standard adapter, select Standard video adapter.
• To use the Microsoft RemoteFX 3D video adapter, select Microsoft RemoteFX 3D video
adapter. Select a value for maximum number of monitors from the Maximum number of
monitors field and select a value for Maximum monitor resolution from the Maximum
monitor resolution field.
b Click the Memory tab, and do one of the following:
• To use the template, select Use template settings.
• To use static memory, select Static memory. Select a value for virtual computer memory
from the Virtual computer memory field.
• To use Dynamic memory, select Dynamic memory. Select a value for startup memory from
the Startup memory field, select a value for maximum memory from the Maximum
memory field, and select a value for memory buffer percentage from the Memory buffer
(%) field.
c Click the Memory Priority tab, perform one of the following, and then click Next:
• To use the template, select Use template settings.
• To allocate dynamic memory resources, select one of the following options: High,
Medium, Low, or Custom. If Custom is selected, select a value for memory priority in the
Custom field.
d Click the Network Adapter tab, do one of the following, and then click Next:
• To use the template settings for the virtual network name, select Use template settings.
To specify a network name select Specify network name, and type the appropriate name in
the Network Name input field.
• To use the VLAN ID from the settings of the template, select Use Template settings under
Virtual LAN Identification. Select Disable VLAN ID to disable the use of VLANS for the
cloned virtual computers in this operation.
• To enable a custom VLAN ID, select Enable VLAN ID and type the appropriate VLAN ID
number in the VLAN ID field. Supported values 1- 4094.
vWorkspace 8.6.3
144
Administration Guide
12 On the Options window, select either Now or At a specific time (and enter a date and time), and then
click Next.
13 On the Finish window, review and confirm the information, and do one of the following:
• Click Back to make changes.
• Click Finish to create the desktops.
• Click Cancel to exit without saving the settings or creating the desktops.
Red text is displayed to remind administrators not to create more virtual computers than their
infrastructure is designed to support.
To reconfigure computers
1 Navigate to the desktop that is to be configured.
1 Highlight the desktop, right-click and select Reconfigure Computers.
2 On the Video Adapter tab, do the following:
a Enable Reconfigure Video adapter.
b Select either the Standard video adapter or the Microsoft Remote FX3D video adapter option.
If you selected Microsoft RemoteFX 3D video adapter, you must also set a Maximum number of monitors
and a Maximum monitor resolution.
3 On the Reconfigure Computers window, Memory tab, do the following:
• Enable Reconfigure memory.
• Select one of the following:
Static memory. If you selected this option, set a value for the Virtual computer memory.
Dynamic memory. If you selected this option, set values for Startup memory, Maximum memory, and
Memory buffer (%).
4 On the Reconfigure Computers window, Memory Priority tab, do the following:
a Enable Reconfigure memory priority.
b Select either High, Medium, Low, or Custom values to further define memory priority.
5 On the Network Adapter tab, do one of the following, and then click OK.
• Select Reconfigure networking.
• Enter a name in the Network Name field.
• Select Disable VLAN ID to disable the use of VLAN for the cloned virtual computers in this
operation.
To enable a custom VLAN ID, select Enable VLAN ID and type the appropriate VLAN ID number in the
VLAN ID field. Supported values 1- 4094.
vWorkspace 8.6.3
145
Administration Guide
Administrators can add the registry entry so that computers in a missing state can be deleted. All missing
computers are deleted regardless of the computer’s host, either Hyper-V or SCVMM.
If you want missing computers to be deleted, add the following registry entry on the computer that runs the
Broker Helper Service:
HKLM\Software\Provision Networks\BrokerHelper
RemoveMissingVMs
REG_DWORD 0=off(default) 1=on
The broker helper service checks for missing records every three minutes, and removes any that are found. The
SCVMM console must be re-started to refresh the list of computers.
Using PNAZURESETUP.exe
To set up vWorkspace to communicate with Azure
1 Run pnazuresetup.exe on a connection broker. This is located on the connection broker in the following
folder:
C:\Windows\SysWOW64
2 When you run the program, you are prompted to enter your Azure account. The specified account is
checked to ensure that it is an Azure organizational account. For more information on creating and using
an Azure organization account, refer to:
https://azure.microsoft.com/en-us/documentation/articles/sign-up-organization/
3 After the account is verified, you are prompted to select the subscription you want to use.
4 If there is more than one service associated with the selected subscription, you are prompted to select
the server you want to use.
5 Click Finish to complete the setup. You can then import Azure virtual machines into vWorkspace.
vWorkspace 8.6.3
146
Administration Guide
3 Initialize vWorkspace. vWorkspace must be successfully initialized before power management is possible.
4 Ensure that the administrative credentials specified for the group are capable of logging into the
administrative share (C$) on the virtual machine.
vWorkspace 8.6.3
147
Administration Guide
VMware linked clone setup
VMware linked clone desktops can be deployed to any datastore. Performance of provisioned linked clones
might be increased when using a different datastore than the datastore where the parent virtual computer is
hosted. It is important to note that the datastores are not validated from the vCenter servers, therefore
administrators must be sure that each host has access to that shared datastore.
See To add computers using the VMware Linked Clone method for more information on using the Add Computers
wizard to create VMware Linked Clones.
Reprovisioning computers
The vWorkspace Management Console Reprovision Computers option, allows for VMware clones to be
reprovisioned based on administrator settings.
7 Click OK.
vWorkspace 8.6.3
148
Administration Guide
Disk persistence and memory
VMware virtual computers can be configured for disk persistence and memory from the vWorkspace
Management Console. Disk persistence and memory are configurable for individual computers, as well as
computer groups. There are three virtual disk modes available:
• Persistent
• Independent and Persistent
• Independent and Nonpersistent
vWorkspace 8.6.3
149
Administration Guide
5 Change the Disk Configuration for the virtual computer back to Independent and Nonpersistent.
Computer groups
Computer groups are containers of desktops that can be managed together. The following computer groups
properties are associated with VMware vCenter Server.
VMware customizations, available from the Managed Computer Group Wizard, enable administrators to specify
items such as where new computers are stored and how they are named. The following customization settings
can be specified for each managed computer group that belongs to a VMware type data center.
Table 77. VMware Customization settings
vWorkspace 8.6.3
150
Administration Guide
Table 77. VMware Customization settings
vWorkspace 8.6.3
151
Administration Guide
• In the Suffix field enter a text string that is appended to the end of computer names, if
appropriate.
8 Click Next.
9 On the Customize Operating System window, do one of the following, and then click Next:
• To use Microsoft System Preparation tools, select Specify operating system customizations. The
computers in this group are powered on after they are created.
• Select a customization from the list, or click New to create a new customization. See To create
operating system customizations for Windows XP/2003 or To create operating system
customizations for Win7 and 8/Windows Server2008/ Windows Server 2008 R2, and Windows
Server 2012 for more information.
• To not use Microsoft System Preparation tools, select Do not specify operating system
customizations. The desktops in this group are not powered on after they are created.
10 On the Configure Hardware window, select the check box to reconfigure the computer’s memory and disk
persistence after the cloning, if appropriate, then do the following:
a Select Reconfigure Memory, and move the slider or enter a number to adjust for the memory
value.
b Select the Virtual Disks tab, select Reconfigure Virtual Disks, and then select First disk only or
All disks. Select the Disk Mode, and set it to one of the following:
• Persistent
• Independent and Persistent
• Independent and Nonpersistent
11 On the Options window, select either Now or At a specific time (and enter a date and time), and then
click Next.
12 On the Finish window, review and confirm the information, and do one of the following:
• Click Back to make changes.
• Click Finish to create the desktops.
• Click Cancel to exit without saving the settings or creating the desktops.
Red text reminds administrators to not create more virtual computers than their infrastructure is
designed to support.
vWorkspace 8.6.3
152
Administration Guide
• Import parent virtual computers.
• Remove orphaned parent virtual computers.
b On the Inventory window, select one or more virtual computers that are to be imported or
updated, and then click Finish.
c On the Parent Virtual computer window, highlight the parent virtual computer that you just
imported, and then click Next.
7 On the Snapshot window, select the appropriate snapshot, and then click Next.
8 On the Folder window, select a folder in which the new computers will be placed, and click Next. If the
list is empty, or to update the list, click Import.
9 On the Resource Pools/Datastores window, select one or more resource pools and datastores. This is
where the virtual computer disk files are to be stored. If the list is empty, or to update the list, click
Import.
You are not limited to using the datastore of the parent virtual computer. Using a different datastore
than the parent virtual computer might increase provisioning performance.
a To change the distribution method, click the Distribution button on the toolbar above the list of
datastores. Complete the information on the Datastore Distribution Method window.
b Click Next.
10 On the Naming Conventions window, select the method for assigning a computer name to the new
desktop computers in Source.
If Specify the base name is selected, do the following:
a In the Base Name field enter the text string.
b Select a value from the Start values at and Increment values by fields.
c Select Re-use the names of deleted computers, if appropriate.
If Specify a text file containing names is selected, do the following:
a In the Names File field, enter the path and file name of the text file containing the list of
computer names.
b In the Prefix field, enter a text string that is prepended to the beginning of computer names, if
appropriate.
c In the Suffix field, enter a text string that is appended to the end of computer names, if
appropriate.
11 Click Next.
12 On the Customize Operating System window, do one of the following, and then click Next:
• To use Microsoft System Preparation tools, select Specify operating system customizations. The
computers in this group are powered on after they are created.
• Select a customization from the list, or click New to create a new customization. See To create
operating system customizations for Windows XP/2003 or To create operating system
customizations for Win7 and 8/Windows Server2008/ Windows Server 2008 R2, and Windows
Server 2012 for more information.
• To not use Microsoft System Preparation tools, select Do not specify operating system
customizations. The desktops in this group are not powered on after they are created.
13 Select the check box to reconfigure the computer’s memory and disk persistence after the cloning on the
Configure Hardware window, then do the following:
a Select Reconfigure Memory, and move the slider or enter a number to adjust for the memory
value.
b Select the Virtual Disks tab, and select Reconfigure Virtual Disks, and select First disk only or
All disks. Select the Disk Mode, and set it to one of the following:
vWorkspace 8.6.3
153
Administration Guide
• Persistent
• Independent and Persistent
• Independent and Nonpersistent
14 On the Options window, select either Now or At a specific time (and enter a date and time), and then
click Next.
15 On the Finish window, review and confirm the information, and do one of the following:
• Click Back to make changes.
• Click Finish to create the desktops.
• Click Cancel to exit without saving the settings or creating the desktops.
Red text is displayed as a reminder to administrators not to create more virtual computers than their
infrastructure is designed to support.
vWorkspace 8.6.3
154
Administration Guide
a On the Finish window of the Computer Group wizard, select the Create new desktops from a
master template.
b From the vWorkspace Management Console, select the computer group. Right-click on the
managed computer group and select Add Computers.
2 On the Welcome to the Add Computers Wizard window, click Next.
3 On the Number of Computers to Create window, Enter the number of computers to create field, type a
number, and then click Next.
4 Select a template from the list on the Template window, and click Next. If there are no templates listed
or to update the list, click Import.
5 Select one or more Virtuozzo network devices from the Nodes/Network Devices window. This is where
the computers should be created. If the list is empty or to update the list, click Import.
a To change the distribution method, click Distribution on the toolbar above the list of datastores.
Complete the information on the Datastore Distribution Method window.
b Click Next.
6 On the Naming Conventions window, select the method for assigning a computer name to the new
desktop computers.
If Specify the base name is selected, do the following:
a Type the text string in the Base Name field.
b Select a value from the Start values at and Increment values by fields.
c Select Re-use the names of deleted desktops, if appropriate.
If Specify a text file containing names is selected, do the following:
a In the Names File field, type the path and file name of the text file containing the list of
computer names.
b In the Prefix field, enter a text string that is prepended to the beginning of computer names, if
appropriate.
c In the Suffix field enter a text string that is appended to the end of computer names, if
appropriate.
7 Click Next.
8 On the Customize Operating System window, do one of the following, and then click Next:
• To use Microsoft System Preparation tools, select Specify operating system customizations. The
computers in this group are powered on after they are created.
• Select a customization from the list, or click New to create a new customization.
CAUTION:It is important that you make sure your operating system customization
configuration is accurate and works on a computer that is visible to you. If the
customization information is incorrect, you may have a computer that requires
user input, but you will have no way of connecting to it.
• To not use Microsoft System Preparation tools, select Do not specify operating system
customizations. The desktops in this group are not powered on after they are created.
9 On the Options window, select either Now or At a specified time (and enter a date and time), and then
click Next.
10 On the Finish window, review and confirm the information, and do one of the following:
• Click Back to make changes.
• Click Finish to create the desktops.
• Click Cancel to exit without saving the settings or creating the desktops.
vWorkspace 8.6.3
155
Administration Guide
Red text is displayed as a reminder to administrators not to create more virtual computers than their
infrastructure is designed to support.
RemoteApp support
RemoteApp support for Hyper-V virtual desktops and RD Session Host enables the publishing of individual
applications using Microsoft's RemoteApp technology on access devices.
vWorkspace 8.6.3
156
Administration Guide
Table 78. Import/Re-sync computers options
Option Description
Options
Import computers into group If selected, virtual computers that have previously
[managed_desktop_group_ name] been imported into other managed computer
groups in the vWorkspace data center are
prevented from being imported into the current
managed desktop group.
Remove orphaned desktops If selected, managed desktop computers are
removed from the selected managed desktop
group if they no longer exist in the VMware
VirtualCenter inventory.
Inventory
Folders/computers This displays a list of folders and virtual computers
available in the VMware VirtualCenter data center
inventory.
Expand the nodes to view the computers.
Microsoft Hyper-V inventory This control displays a list of folders and virtual
computers available in the Microsoft Hyper-V data
center inventory.
Expand the nodes to view the computers.
Nodes This displays a list of folders and virtual computers
available in the Parallels Virtuozzo Host inventory.
Expand the nodes to view the computers.
View:new If selected, displays a list of virtual computers that
have not yet been imported into the managed
desktop group.
View:existing If selected, displays a list of virtual computers that
have previously been imported into the managed
desktop group.
Finish If selected, the chosen virtual computers are
imported into the current managed desktop group
as managed desktop computers.
The To initialize a computer task is automatically
started for each desktop computer successfully
imported.
Cancel If selected, the Import/Re-sync selections are
discarded, and the window is closed.
Monitoring operations
You can monitor an operation by using the middle and bottom panes of the vWorkspace Management Console.
The middle pane on the vWorkspace Management Console displays the overall progress. You can use Refresh to
update the view. The bottom pane on the vWorkspace Management Console uses the Tasks tab to display the
status of the tasks to complete the process, and a Log tab to display more detailed status information.
vWorkspace 8.6.3
157
Administration Guide
To cancel a task, select it from the list of tasks and choose Cancel from the Actions menu, or right-click on the
task and select Cancel.
NOTE: <Choose>PNTools is a required component for managed computers in the
vWorkspace infrastructure. If you did not install <Choose>PNTools as part of
the template for the new desktops, it needs to be installed.
vWorkspace 8.6.3
158
Administration Guide
5
5
Managing the Virtual Workspace
Power management
Managed computer power states can be changed, either automatically by the Connection Broker
or manually by an administrator using the vWorkspace Management Console.
vWorkspace Connection Brokers periodically query their configured virtualization entity servers
for the current power state of managed computers running as virtual computers.
vWorkspace Connection Brokers can also submit commands to change the power state of a
virtual computer. For example, when a user attempts to connect to a managed computer running
as a virtual computer and that virtual computer is powered off, the Connection Broker
automatically sends a command to power on the computer. After the virtual computer is
powered on and the operating system has loaded, the user is then connected to the desktop and
logged on.
vWorkspace 8.6.3
Administration Guide
The power states and virtualization entities that can be manipulated with vWorkspace are as
follows.
Table 79. Power states
vWorkspace 8.6.3
Administration Guide
Two-factor authentication
Two-factor authentication can be enabled in both the vWorkspace Management Console and Web
Access. You can set up two-factor authentication in any vWorkspace Connector.
The examples in this section use Quest Defender.
Field Description
Enable RADIUS Enables the RADIUS dialog box.
Server name or IP address Name or IP address of a RADIUS server.
Port Listening port of the RADIUS server.
Secret key Shared password used to communicate with
RADIUS server.
Timeout Enter amount of time that a connection is not
authenticated before a session times out.
Authentication type Select between encrypted (CHAP - Challenge-
Handshake Authentication Protocol) and
unencrypted (PAP - Password Authentication
Protocol).
Password layout Controls the order the AD and OTP passwords
are entered by the user.
One-time password length Informs the Connection Broker of the length of
the OTP.
Require all users to be two-factor Overrides all other vWorkspace policies.
authenticated NOTE: Do not enable this option if the Use
Separate OTP field is selected on the Two
factor authentication window of the Web
Access site properties.
vWorkspace 8.6.3
Administration Guide
3 Select Two-Factor Authentication, and complete the information on the window (the
fields that are displayed on this form vary depending whether you select the Secure
Computing PremierAccess or RADIUS options).
• If you select Secure Computing PremierAccess, enter the location for the
PremierAccess configuration file.
• If you select RADIUS, enter the RADIUS settings.
Field Description
Enable two-factor Check this box to enable two-
authentication factor authentication for all
applications.
Secure computing Select this button to display the
PremierAccess authentication options for Secure
Computing PremierAccess.
RADIUS Select this button to display the
authentication options for RADIUS.
File The location for the
PremierAccess connection
configuration file.
Field Description
Enable two-factor Check this box to enable two-
authentication factor authentication for all
applications.
Secure computing Select this button to display the
PremierAccess authentication options for Secure
Computing PremierAccess.
RADIUS Select this button to display the
RADIUS options.
Servers Add the RADIUS servers that you
want to use for authentication.
If more than one is identified,
Web Access will enforce load
balancing by randomly choosing
the next available server.
Port Listening port of the RADIUS
server.
Secret key Shared password used to
communicate with the RADIUS
server.
Use separate OTP field Allows Radius Authentication to
use a separate Active Directory
password field and passcode field.
NOTE: If you have two-factor
authentication enabled on both
the vWorkspace Management
Console and on Web Access, you
must have an advanced target set
up.
vWorkspace 8.6.3
Administration Guide
Table 82. Two-factor Authentication fields for RADIUS
Field Description
Authentication type Select between encrypted (CHAP -
Challenge-Handshake
Authentication Protocol) and
unencrypted (PAP - Password
Authentication Protocol).
Password structure Controls the order the AD and OTP
passwords are entered by the user.
OTP length Inform the Web Access server of
the length of the OTP (one-time
password).
Managed Applications
From the Managed Applications node, you can enable graphics acceleration globally for managed
and unmanaged applications, set custom properties, and set permissions for users for all
managed applications.
Before an application can be published and accessed by users, it must be installed on the hosting
computer. In a vWorkspace infrastructure, the hosting computer can be any of the following:
• Microsoft RD Session Host applications
• Managed Computer applications
• Virtualized Applications
vWorkspace 8.6.3
Administration Guide
• Users should not be logged on to the system when installing applications.
• Review documentation for issues that might exist when installing and using an application
with Remote Desktop Services. Some applications have special procedures or command
line switches that must be used for installation on Remote Desktop Services.
• Restrictions such as support for the full feature set or license restrictions may be
applicable when used on Session Hosts.
• Applications such as Computer Aided Design or scientific modeling and analysis programs
may not be good candidates for Session Host based deployments. These types of
applications place an increased demand on the physical resources of a computer.
When provisioning a new session host into an existing folder of session hosts, managed
applications that have been published to all of the other session hosts in the folder are
automatically added to the new session host.
Virtualized Applications
Many application deployment solutions simplify and accelerate the process of deploying line-of-
business applications to the user desktop. These same tools are ideal for use in a vWorkspace-
enabled desktop infrastructure.
vWorkspace 8.6.3
Administration Guide
3 From the Graphics Acceleration window, select the default graphics acceleration setting.
4 Select the image quality for graphics accelerated applications.
5 Click OK.
You can set graphics acceleration for individual managed applications.
1 Open the Management Console.
2 Right click on the Managed Applications node
3 In the Managed Applications window, right click a managed application, and select
Properties.
4 Select the Graphics Acceleration option.
5 From the Graphics Acceleration window, specify the graphics acceleration setting.
6 Click OK.
Permissions
Managed Applications properties is used by administrators to allow or deny actions for
activities within the vWorkspace Management Console. For more information on Permissions, see
To add a system administrator on page 49.
vWorkspace 8.6.3
Administration Guide
To start new applications for a Session Host
1 Open the vWorkspace Management Console.
2 Expand Locations and then the location name where the Session Host is located.
3 Highlight the Session Hosts node.
4 Select either Management or Provisioning.
5 Select the Applications tab in the information pane.
6 Select New Applications from either the toolbar or by the context menu which can be
accessed by right-clicking in a blank area of the information pane.
Field Description
Name Specify a friendly name for the application.
Published application friendly names are limited to 150
characters. If any names are longer than 150 characters,
they get truncated, and any duplicates are suffixed with a
numeric value to ensure uniqueness.
Custom Properties Enter the names of the custom properties you want to assign
to the managed applications. These names appear in the
column headers in the applications view, which can assist
with searching and sorting.
4 On the Application Type window, select the type of application, and then click Next.
5 On the Publishing window, select Session Hosts and select the servers on which to publish
the application for a specified location, and then select Next.
vWorkspace 8.6.3
Administration Guide
6 On the Defaults window, complete the following information and then click Next:
Table 84. Defaults fields
Field Description
Select App-V Application If the application to be published is a virtualized application
package stored on an App-V server, click Select App-V
Application.
Path Enter a path, or select the ellipsis to browse.
Arguments Enter any arguments that you want to have passed to the
application when started.
%Connector_ARGS% needs to be added as an argument if you
want to use this managed application to assign a file type
association in Desktop Integrated mode. See vWorkspace
Connector for Windows actions menu options for more
information.
Working Dir If the application requires a working directory, type its path
7 On the Server Specific window, enter server-specific program specifications. Click Next.
8 On the Display Name window, enter a Display Name if you want the name that is
displayed to the user to be different than what is in the Name box on the Application
Name window. Click Next.
9 On the Icon window, select an icon for the application, and then click Next.
10 On the Window window, specify the following settings, and then click Next.
Table 85. Window fields
Field Description
Initial window state Specify the initial window state for this application.
Specify seamless window mode Specify the seamless window mode to use for this
application:
Use vWorkspace seamless window mode. When end users
have seamless windows enabled, the vWorkspace seamless
window technology is used for this application.
Force off. Does not allow seamless window mode to be used
for this application.
Use Microsoft seamless window mode. When end users
have seamless windows enabled, the native Microsoft
seamless windows technology is used for this application.
11 On the Desktop Integration window, select the appropriate option (Desktop, Start Menu,
Start Menu \Programs) for clients using vWorkspace Connector for Windows in desktop
integrated mode, and then click Next.
12 On the Graphics Acceleration window, select the appropriate option, and then click Next.
The Use Default option refers to the default Graphics Acceleration option setting on the
Managed Applications Properties window. See To enable Graphics Acceleration for
applications on page 161 for more information.
13 On the Enable/Disable window, select Enabled or Disabled, and then click Next.
NOTE: If you select Disabled, the application is not displayed in client application lists.
14 On the Load Balancing window, complete the settings, and then click Next.
NOTE: The Enable this application to share on active session option must not be selected if you are
using Web Access with published applications where multiple users use the same computer, such as a kiosk
or other semipublic user.
vWorkspace 8.6.3
Administration Guide
15 On the Virtual-IP window, specify the Virtual-IP settings for this application, and then
click Next.
16 On the Target Assignment window, assign this application to targets, and then click Next.
17 On the Permissions window, set the Permissions for this application, and then click
Finish.
vWorkspace 8.6.3
Administration Guide
8 On the Publishing window, select the Managed Computer Group option, and then select
the managed computer group from your location on which to publish the application.
Click Next.
9 On the Display Name window, enter a Display Name if you want the name that is
displayed to the user to be different than what is in the Name box on the Application
Name window. Click Next.
10 On the Icon window, select an icon for the application, and then click Next.
11 Select the appropriate option (Desktop, Start Menu, Start Menu \Programs) for clients
using vWorkspace Connector for Windows in desktop integrated mode on the Desktop
Integration window, and then click Next.
12 Select the appropriate option on the Graphics Acceleration window, and then click Next.
The Use Default option refers to the default Graphics Acceleration option setting defined
in the Managed Applications Properties.
13 Select Enabled or Disabled to specify if this application is displayed on the client
application list.
14 Use the Target Assignment window to assign this application to targets, and then click
Next.
15 Set Permissions on the Permissions window, and then click Finish.
To publish an application
1 Open the vWorkspace Management Console.
2 Expand the Desktops node for the required location.
3 Navigate to the computer group where the desktop is to be published.
4 Start New Application by selecting the New Application icon from the toolbar or
Actions | New Applications.
5 Click Next on the Welcome window of the Managed Application Wizard.
6 On the Application Name window, do the following:
a Specify a friendly name for the application in the Name box, and then click Next.
Published application friendly names are limited to 150 characters. If any names are
longer than 150 characters, they get truncated, and any duplicates are suffixed with a
numeric value to ensure uniqueness.
The following characters cannot be used in application names that are to be published for
Web Access: <, >, /,\, *, y ’.
b Enter the names of the custom properties you want to assign to the managed
applications. These names appear in the column headers in the applications view,
which can assist with searching and sorting.
7 On the Application Type window, select the type of application, Program, and then click
Next.
8 On the Publishing window, select Managed Computer Group, and then select the
managed computer group from your location on which to publish the application. Click
Next.
9 Complete the following information on the Defaults window, and then click Next:
vWorkspace 8.6.3
Administration Guide
a If the application to be published is a virtualized application package stored on an
App-V server, click Select App-V Application.
b Enter a Path, or select the ellipsis to browse.
c Enter any arguments that you want to have passed to the application when started
in the Arguments box.
d If the application requires a working directory, type its path in the Working Dir
box.
10 On the Display Name window, enter a Display Name if you want the name that is
displayed to the user to be different than what is in the Name box on the Application
Name window. Click Next.
11 On the Icon window, select an icon for the application, and then click Next.
12 On the Startup window, specify the application window state when started, and then
click Next.
13 Select the appropriate option (Desktop, Start Menu, Start Menu \Programs) for clients
using the vWorkspace Connector for Windows in desktop integrated mode on the Desktop
Integration window, and then click Next.
14 Select the appropriate option on the Graphics Acceleration window, and then click Next.
The Use Default option refers to the default Graphics Acceleration option setting of
Managed Applications Properties.
15 Select Enabled or Disabled to specify if this application is displayed on the client
application list.
16 Select Target Assignments to specify the targets that are to have access to this
application and assign this application to them, and then click Next.
17 Set permissions on the Permissions window, and then click Finish.
Publish content
Traditionally in Windows networks, users have relied on network drive mappings, browsing, or
corporate Web sites to get information. As networks grow in size and complexity, these methods
have become less efficient.
Web based resources that are not located on the corporate network can require users to
remember numerous and sometimes long URLs, or to know how to build efficient and effective
search queries. Published content provides an easier way for users to access the information
they need. When an administrator publishes content, the complete path to the resource is
specified and is associated with an icon. This path can be in Universal Naming Convention (UNC)
format or web based formats, such as http, https, ftp, ldap. The icon representing the content is
passed down to the vWorkspace Client in the same manner as application and desktop icons.
To access the content, the user simply clicks on the icon. The content path is passed to an
application, based on Windows file type associations, capable of opening that type of content.
For example, content using a UNC path would be opened with Windows Explorer, while content
using http would be opened with Internet Explorer. The administrator has the option of
specifying whether the application used resides on the client device or on a remote device.
TIP: If you want users to have multiple sessions to the same server, the Restrict
each user to one session setting at the following path must be set to No.
Administrative Tools | Terminal Services Configuration | Server Settings
vWorkspace 8.6.3
Administration Guide
• Type. Select Content on the Application Type window of the Managed Application
Wizard, and then select where the content is to be published (Server or Client).
• Publishing. Select Session Host(s) if you want the content to be opened with an
application installed on an RD Session Host, and then select which RD Session Host to use.
Select Managed Computer Group if you want the content to be opened with an
application installed on the client device. When this is chosen, the Server-Specific and
Load Balancing windows are unavailable as they do not apply to desktops.
• Path. Enter the path to the content on the Defaults window. A UNC path can be either to
a shared folder or a file within a shared folder.
NOTE: Share, NTFS, and web permissions all apply when users try to access the
content. Therefore, even though clients are listed in the published content’s
access control list, the client may still be denied access because of other
permissions.
vWorkspace 8.6.3
Administration Guide
6 Click on the Published Applications icon from the navigation pane toolbar or the
information pane toolbar, or select Actions | Publish Applications. A list of published
resources is presented.
7 Select each published resource you want to add to the server. To select a published
resource, select the box to the left of the application.
8 Click Apply to make the changes without closing the window, or click OK to make the
changes and close the window.
vWorkspace 8.6.3
Administration Guide
To modify published applications from User Environment Management
1 Open the vWorkspace Management Console.
2 Expand the User Environment Management node, and then click on the Managed
Applications node.
3 Highlight the published resource to be modified, and then select Properties from the
context menu, or select the Properties icon from the information pane.
4 On the Managed Application Properties window, navigate through the various tabs to
make the changes, as appropriate.
5 Click Apply to make the changes without closing the window, or click OK to make the
changes and to close the window.
vWorkspace 8.6.3
Administration Guide
• Frees up bandwidth.
Disadvantages:
• If you have Linux or Mac OS X clients, you will need to create separate virtual machine
and terminal server pools so IE is not redirected. This is because IE is not available to
those operating systems.
• If the user is connected externally and no VPN is connected, the user will not be able to
connect to local resources (such as intranets).
When you enable IE Redirection from the virtual computer to the end point, embedded URLs are
intercepted on the virtual computer and sent to the end point. The user's locally installed
browser is then used to access the URL. Users cannot disable this feature.
For example, users may frequently access web and multimedia URLs they encounter when
running an email program published on a server. If you do not enable IE Redirection from the
virtual computer to the end point, users open these URLs with IE present on servers running
vWorkspace redirection-enabled servers.
You must install Virtual Desktop Extensions (PNTools) and the following server side registry
entries need to be set.
To register:
• HKEY_CLASSES_ROOT\HTTP\shell\open\command
"(Default)" (REG_SZ) = ""C:\Program Files\Quest Software\ PNTools\IE
Redirection\iexplore.exe" %1"
• HKEY_CLASSES_ROOT\HTTPS\shell\open\command
"(Default)" (REG_SZ) = ""C:\Program Files\Quest Software\ PNTools\IE
Redirection\iexplore.exe" %1"
For a x64 bit system, the registry entry should be set as follows:
• HKEY_CLASSES_ROOT\HTTP\shell\open\command
"(Default)" (REG_SZ) = ""C:\Program Files(x86)\Quest Software\ PNTools\IE
Redirection\iexplore.exe" %1"
• HKEY_CLASSES_ROOT\HTTPS\shell\open\command
"(Default)" (REG_SZ) = ""C:\Program Files(x86)\Quest Software\ PNTools\IE
Redirection\iexplore.exe" %1"
For a computer where Windows is installed on a drive other than C:, the registry entry should be
set with the appropriate drive designation as follows (for example, if the drive designation is D):
• HKEY_CLASSES_ROOT\HTTP\shell\open\command
"(Default)" (REG_SZ) = ""D:\Program Files\Quest Software\ PNTools\IE
Redirection\iexplore.exe" %1"
• HKEY_CLASSES_ROOT\HTTPS\shell\open\command
"(Default)" (REG_SZ) = ""D:\Program Files\Quest Software\ PNTools\IE
Redirection\iexplore.exe" %1"
To unregister:
• HKEY_CLASSES_ROOT\HTTP\shell\open\command
"(Default)" (REG_SZ) = ""C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome"
• HKEY_CLASSES_ROOT\HTTPS\shell\open\command
"(Default)" (REG_SZ) = ""C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome"
Resetting Internet Explorer as the default browser
If the computer has another web browser installed and one of them is set as default, reset
Internet Explorer as the default web browser by doing the following:
vWorkspace 8.6.3
Administration Guide
1 Go to Control Panel |Default Programs |Set Default Programs.
2 Click on Internet Explorer on the left and click Set as Default on the right bottom area.
3 Set the following registry keys to enable IE Redirection:
HKEY_CLASSES_ROOT\IE.HTTP\shell\open\command"(Default)" (REG_SZ) ="C:\Program
Files\Quest Software\vWorkspace\IE Redirection\iexplore.exe" %1
HKEY_CLASSES_ROOT\IE.HTTPS\shell\open\command"(Default)" (REG_SZ) ="C:\Program
Files\Quest Software\vWorkspace\IE Redirection\iexplore.exe" %1
For a x64 bit system, the registry entry should be set as follows:
HKEY_CLASSES_ROOT\IE.HTTP\shell\open\command"(Default)" (REG_SZ) ="C:\Program Files
(x86)\Quest Software\vWorkspace\IE Redirection\iexplore.exe" %1
HKEY_CLASSES_ROOT\IE.HTTPS\shell\open\command"(Default)" (REG_SZ) = "C:\Program Files
(x86)\Quest Software\vWorkspace\IE Redirection\iexplore.exe" %1
vWorkspace 8.6.3
Administration Guide
Configuration of a managed application
For the URL Redirection Internet Explorer Browser add-on to successfully launch a web site in a
hosted Internet Explorer session, the following must be true:
• The client operating system default Internet browser is Internet Explorer.
• The URL Redirection Add-On (Pnurlhook.dll) is enabled in Internet Explorer. This is
done during the vWorkspace Connector installation.
• At least one URL is configured in on the client workstation for the logged on user
at HKCU\Software\Provision Networks\Provision-IT Client\Server
Farms\Farm1\URLCapture. This is configured using Group Policy, Config.xml, or
manual registry entry.
• A vWorkspace-managed application is properly configured for URL Redirection to
match the setting on the client, and is assigned to the appropriate vWorkspace
target.
Most web applications require a specific Java Applet, .Net application, or ActiveX
control, which needs to be installed on the selected session host for the application to
work properly.
The following needs to be considered when configuring a managed application:
When completing the Program Specifications | Defaults settings on the New Managed
Application wizard, use the following settings:
Table 86. New Managed Application settings
Select the Target that is allowed to run this application. Although in typical deployments,
all of the configured URLs are pushed to all users, only authorized users are allowed to
launch the application. Nonauthorized targets receive an error stating that the
application is not found.
For more information on how to configure a vWorkspace managed application, see Publish
RD Session Host applications.
vWorkspace 8.6.3
Administration Guide
Typical vWorkspace deployment
A typical deployment of vWorkspace Internet Explorer Compatibility consists of:
• One or more Hyper-V servers running vWorkspace Hyper-V Catalyst components for
hosting vWorkspace Terminal Server or Session Host virtual computers.
• One Terminal Server or Session Host virtual computer for every 20-25 expected
concurrent users of Internet Explorer. Each virtual computer is typically configured for 2
vCPUs and 1024-4096MB of dynamic memory.
• Two or more vWorkspace Connection Brokers for user authentication and provisioning of
the vWorkspace Terminal Server or Session Host virtual computers.
• System Center Configuration Manager or Group Policy to deploy the vWorkspace
Connector.
• Group Policy to configure the client redirection URLs.
• Group Policy to configure the server redirection URLs.
• vWorkspace Connectors configured in Desktop Integrated Mode.
vWorkspace 8.6.3
Administration Guide
5 Apply the hotfix referenced in Microsoft KB article 942610, if using Microsoft Server 2003
R2.
http://support.microsoft.com/kb/942610
In addition, the following registry entry needs to exist on the Terminal Servers so user’s
Remote Display Settings are not reduced to 8-bit when their screen resolution is higher
than 1600x1200.
HKEY_LOCAL_computer\SYSTEM\CurrentControlSet\Control\
Terminal Server
Registry entry: AllowHigherColorDepth
Type: REG_DWORD
Value: 1
6 Disable the screen saver if using Microsoft Server 2003 R2. The screen saver option is
enabled by default, which would require users to authenticate to unlock the screen saver.
To disable the screen saver setting, set the following in Group Policy:
User Configuration | Administrative Templates | Control Panel | Display | Password
protect the screen saver = Disabled
User Configuration | Administrative Templates | Control Panel | Display |Screen Saver
executable name = Disabled
User Configuration | Administrative Templates | Control Panel | Display | Screen Saver
timeout = Disabled
vWorkspace interfaces
A vWorkspace Connector allows users to access the virtual workspace from a client device.
vWorkspace provides Connectors for the following platforms:
• Connector for Windows. Allows users to access virtual desktops and managed
applications from Windows computers, laptops, and thin client terminals. vWorkspace has
an intuitive windows application that helps users to view a list of authorized desktops and
applications. vWorkspace Web Access allows users to retrieve a list of available
applications or desktops through a web browser.
• Mac OS X Connector. Users can access their virtual desktops from a Mac-based client.
Supports up to two monitors with a resolution of up to 1400 x 900 for each monitor.
• iOS Connector. Allows users to connect to their virtual desktops from an iOS device. It
has a built-in support for VPN connections.
• Android Connector. Allows users to connect to their virtual desktops from an Android
device.
• Linux Connector. Allows users to access virtual desktops from a Linux-based client.
Supports features such as bidirectional audio content redirection, which enhance user
experience.
• Java Connector. A platform-independent Connector that works in conjunction with the
Web Access component.
• Chrome. Allows users to connect to vWorkspace from a Chrome OS.
• HTML5. Allows users to connect to vWorkspace using HTML5.
This document describes using the vWorkspace Connector for Windows. For information about
using the non-Windows Connectors, see the vWorkspace documentation for each Connector.
vWorkspace 8.6.3
Administration Guide
Using the vWorkspace Connector for Windows
The administrator can set up a vWorkspace Connector configuration from the vWorkspace
Management Console. Users can then connect to a vWorkspace environment by using Web Access
or by using the vWorkspace Connector for Windows. The Connector automatically detects,
installs and configures the users’ devices, based on the Connector Management settings (see
Connector management overview on page 104).
vWorkspace 8.6.3
Administration Guide
To connect to vWorkspace if the native Connector is installed
If you want some users to connect using Web Access and other users to use the native Connector, copy the
link from the deployment dialog (see Deploying Connector updates on page 115).
1 From the Windows desktop, the user clicks the vWorkspace icon. If a configuration is not
set up, the user is prompted to enter an email address or a website name.
2 On the Logon Credentials prompt, the user enters credentials and clicks OK. The
vWorkspace window is displayed.
3 The name of the vWorkspace environment and icons for the applications of the selected
configuration are displayed.
4 From the vWorkspace window, the user can access the following:
• Toolbar options. See Using the toolbar options.
• Change configurations. See Change to a different configuration.
• Configuration tools and applications. See Using the configuration tools.
vWorkspace 8.6.3
Administration Guide
2 The user enters the website name or email address, then presses Enter or clicks OK.
3 On the Logon Credentials prompt, the user enters credentials and clicks OK.
4 The Welcome window is displayed. The user enters login credentials and clicks OK. The
vWorkspace window is displayed, showing the new configuration.
vWorkspace 8.6.3
Administration Guide
4 Click OK.
NOTE: The user configuration settings were simplified in vWorkspace 8.6. If you need to access the
advanced user configuration settings that were available in version 8.5, use the following shortcut keys:
Windows: Ctrl+Shift+Click on gear
Mac OS X: Cmd+E in connection setting
iOS: Long press on any place in connection settings
Android: Tap on gears in connection settings
Linux: Ctrl + Shift + gear on connection
To open an application
• Click an application to open it.
vWorkspace 8.6.3
Administration Guide
Using the vWorkspace Diagnostics Tool
The vWorkspace Diagnostics tool enables log configuration for components, collects the logs and
compresses them into a Zip file, which you can then send to Technical Support for analysis.
Typically, vWorkspace Diagnostics is used only when assisted by Technical Support.
The vWorkspace Diagnostics tool is included in all Windows-based vWorkspace components.
Prerequisites:
• If you are using a virtual desktop, ensure that Virtual Desktop Extensions (PNTools)
is installed.
• If you have User Account Control (UAC) enabled, run the Diagnostics Tool as an
Administrator.
TIP: If you are using vWorkspace Diagnostics with vWorkspace 7.6, copy PNTray.exe
and PNTray.dll to the Diagnostics folder if they are not installed in SysWow64.
Do not copy PNTray.exe or PNTray.dll into Syswow64 as this can cause problems
with future installations.
vWorkspace 8.6.3
Administration Guide
shortcuts are placed on the user’s Desktop, Start Menu, or All Programs menu, depending on your
settings.
NOTE: On a Windows XP computer, the placement of shortcuts depends on whether
Windows is using the Start menu or Classic Start menu.
The default wait time value is set to 10 seconds. To change the default wait time value
to some other value create the following registry value. In the example below the initial
wait time value is set to 15 seconds.
HKLM\SOFTWARE\Provision Networks\Provision-IT
vWorkspace 8.6.3
Administration Guide
HKEY_LOCAL_MACHINE\SOFTWARE\Provision Networks\Provision-IT (for 32-bit systems)
DoubleHop = REG_DWORD (0=disabled 1=enabled)
HKLM\SOFTWARE\Provision Networks\Provision-IT
HKCU\SOFTWARE\Provision Networks\Provision-IT
Mouse movement
This setting controls whether to disable mouse movement. To disable mouse
movement, create the following registry value:
HKLM\SOFTWARE\Provision Networks\Provision-IT
vWorkspace 8.6.3
Administration Guide
Table 89. User Environment Management options
Additional customizations
The Additional Customizations node gives administrators control over the configuration of the
Windows Desktop and Start menu, visibility of drive letters, and existing network drive and
printer mappings.
Default Customizations are a set of customizations configured with settings commonly used in
Session Host and VDI environments, which can be assigned to vWorkspace targets. Default
Customizations cannot be modified, but they can be duplicated and used to create new
customized settings.
vWorkspace 8.6.3
Administration Guide
Color schemes
A color scheme can be assigned to vWorkspace clients by administrators. The color scheme is
used when connecting to applications or desktops hosted from vWorkspace enabled Session Hosts
and VDI computers.
NOTE: When assigning color schemes through the vWorkspace Management Console, a
color scheme is not loaded for Microsoft Windows 7 or later.
Drive mappings
Administrators can assign network drive mappings to vWorkspace to use when they are
connecting to applications and desktops hosted from vWorkspace enabled Session Hosts and VDI
computers.
Assigning drive mappings through the vWorkspace Management Console has the following
advantages:
• Domain administrative rights are not required.
• Knowledge of scripting languages or command line syntax is not required.
• Drive mappings are only applied when connecting to vWorkspace enabled Session Hosts or
desktops. More flexibility in how mappings are assigned.
vWorkspace 8.6.3
Administration Guide
6 Enter alternative credentials to be used when mapping this drive, and then click Next.
7 Complete the Target Assignment window to assign the drive mapping, and then click
Next.
a Click the plus (+) sign and the Select Targets window opens.
b Click the green plus (+) sign to add targets that are not included in the Select
Targets window.
c Select users from the list. Use Ctrl to select more than one user to assign.
d Click OK to close the window and save your assignments.
8 Specify permissions on the Permissions window, and then click Finish.
Environment variables
Administrators can assign environment variables to vWorkspace when connecting to applications
or desktops hosted from vWorkspace enabled Session Hosts or VDI computers. These environment
variables are created automatically when the user logs on, and are cleared when the user logs
off.
Registry tasks
The Registry Tasks tool allows administrators to add, delete, or modify registry keys in the
HKEY_CURRENT_USER registry hive without manually loading and editing each user’s
ntuser.dat registry hive, or writing complex registry editing scripts for RD Session Host or VDI
environments.
NOTE: The vWorkspace Management Console should be started from a Session Host
when working with Registry Tasks. A non-Session Host computer may not have
the registry keys and hives that need to be manipulated.
vWorkspace 8.6.3
Administration Guide
2 Expand the User Environment Management node, and then select Registry Tasks.
3 Click the Toggle Client Assignment List Display icon on the information pane to change
the view, if needed.
4 From the context menu of the Registry Tasks node, select New Registry Task.
5 On the Welcome window of the Registry Task wizard, click Next.
6 On the Name window, enter a name for the registry task and then click Next.
7 Select the Registry Action from the following options:
• Add Key
• Delete Key
• Add Value
• Delete Value
8 Enter the key or value parameters, or use Browse to find the appropriate parameters.
9 Do one of the following:
• If you are adding a key, enter the name in the Key field.
• If you are deleting a value, select it from the list, and then click OK.
• If you are adding a value, enter the corresponding parameters in the fields.
• If you are modifying an existing value, change the Value Name, Value Type, or
Value fields as appropriate.
• Select the type of registry value from the Value Type field.
10 Click Next.
11 Complete the Target Assignment window to assign the task, and then click Next.
a Click the plus (+) sign to select targets, and the Select Targets window opens.
b Click the green plus (+) sign to add targets that are not included in the Select
Targets window.
c Select users from the list. Use Ctrl to select more than one user to assign.
d Click OK to close the window and save your assignments.
12 On the Permissions window, specify permissions, and then click Finish.
vWorkspace 8.6.3
Administration Guide
• The scripts used in the vWorkspace Management Console and scripts started using other
methods should not interfere with each other.
• The simplest form of a script should be used for the task. Do not write a complex script to
carry out a task that can be accomplished using a command line script.
NOTE: The scripts do not execute in interactive mode, so Pause, Echo, and any other
outputs are not displayed.
To assign a script
1 Open the vWorkspace Management Console.
2 Expand the User Environment Management node, and then select Scripts.
3 Click the Toggle Client Assignment List Display icon on the information pane to change
the view.
4 Do one of the following:
• Click the + on the toolbar of the information pane.
• Right-click on the Scripts node, and then select New Script.
5 On the Welcome window of the Scripts wizard, click Next.
6 On the Script File window, enter the complete path and file name in Script File, or use
the ellipsis to browse to the script. Click Next.
The script must be on a network share. If you are typing a path name, it should resemble
the following, \\servername\sharename\script.bat.
7 Complete the Target Assignment window to assign the script, and then click Next.
a Click the plus (+) sign to select targets, and the Select Targets window opens.
b Click the green plus (+) sign to add targets that are not included in the Select
Targets window.
c Select users from the list. Use Ctrl to select more than one user to assign.
d Click OK to close the window and save your assignments.
8 On the Permissions window, specify permissions, and then click Finish.
Time Zones
A date and time stamp that is placed on opened files, messages, and scheduled meetings is
based upon an application location, which can be a Session Host in a time zone that is different
from the user. The Time Zones tool allows administrators to assign appropriate time zones to
users in a Session Host or VDI environment.
vWorkspace 8.6.3
Administration Guide
User policies
The User Policies tool provides a way for vWorkspace administrators to better control user
desktop environments. The following settings can be controlled with User Policies:
• Windows Components — Windows Explorer and the Help and Support Center
• Start Menu and Taskbar— Control Panel and Display
• System — Ctrl+Alt+Del options and Logon
The Properties option of User Policies allow administrators to select which policy template is
used to create new user policies. Two user policies are provided with vWorkspace, Default Admin
and Default User, which contain settings that are commonly implemented for administrators and
users. These policies can be modified and duplicated as appropriate. vWorkspace administrators
can also add new policy templates.
vWorkspace 8.6.3
Administration Guide
11 On the Permissions window, specify permissions, if needed, and then click Finish.
User profiles
User Profiles is an alternative to roaming profiles. User Profiles eliminate potential profile
corruption and accelerate logon and logoff times. It does this by combining the use of a
mandatory profile with a custom persistence layer designed to preserve user profile settings
between sessions.
Wallpaper
A wallpaper can be assigned to vWorkspace clients by administrators. The wallpaper is used
when connecting to applications or desktops hosted from vWorkspace enabled Session Hosts and
VDI computers.
To assign wallpapers
1 Open the vWorkspace Management Console.
2 Expand User Environment Management, and then select Wallpapers.
3 On the information pane, click on the Toggle Client Assignment List Display button to
change the display view, if needed.
4 To select a wallpaper, do one of the following:
• Right-click on the style, and then select Assign to.
• Click the Assign to icon (the icon with the blue circle and a white plus sign) from
the toolbar.
5 Add or remove targets in the Select Targets window.
6 Click OK.
vWorkspace 8.6.3
Administration Guide
4 Change the property as appropriate.
Table 91. Properties fields
Wallpaper File The full path and file name of the wallpaper.
NOTE: Each Session Host must have a copy of
the bitmapped image file for the defined
wallpapers. It needs to be in the same location
as the one displayed here.
Default Style Three options:
• Centered
• Tiled
• Stretched
Target Assignments A list of vWorkspace targets to whom the
wallpaper is assigned.
You can assign or unassign wallpaper from this
list.
Permissions The user or groups with permissions for this
wallpaper are specified here.
vWorkspace 8.6.3
Administration Guide
The Secure Access service applet allows the management of three separate proxies. Each proxy
secures communication to a separate vWorkspace component.
• RDP Proxy. Allows users on a public network, like the Internet, to connect
to virtual desktops or Remote Desktop Session Hosts that are managed by
vWorkspace and located on a private network. The connection to this proxy
is always SSL encrypted.
• Web Interface Proxy. Allows users on a public network to connect to Web
Access through the Secure Access service. The connection to this proxy is
always SSL encrypted.
• Connection Broker Proxy. Allows users on a public network to connect to a
vWorkspace Connection Broker that is located on a private network. The
connection to this proxy is always SSL encrypted.
vWorkspace 8.6.3
Administration Guide
Table 92. Proxies tab fields
vWorkspace 8.6.3
Administration Guide
Table 92. Proxies tab fields
vWorkspace 8.6.3
Administration Guide
Table 93. Options tab fields
vWorkspace 8.6.3
Administration Guide
Disabling the Nagle Algorithm
The Nagle Algorithm places controls on packet delivery by limiting the sending of partial TCP
packets. While useful in may scenarios, this can cause performance issues for Secure Access
service when used in conjunction with delayed acknowledgments. The Nagle algorithm is
disabled by default during installation. This setting can be reversed by modifying the following
registry key on the Secure Access service server.
HKLM\SOFTWARE\Provision Networks\Secure-IT
DisableNagle REG_DWORD (0=nagle enabled, 1=nagle disabled (default))
vWorkspace 8.6.3
Administration Guide
setting of Secure Access service. As demonstrated below, all connections would be routed
to the Secure Access service unless the client prefix is equal to 10.24.
5 Click Secure Access service to define the Secure Access service settings.
Table 94. Secure Access service fields
Field Description
Secure Access service
Enable Secure Access service Select to specify your Secure Access service server.
Secure Server Enter the external, fully qualified domain name
(FQDN) of your Secure Access service server.
This setting controls the vWorkspace Secure Access
service addressing for Web Access.
Port number Enter the port number for your Secure Access
service server.
Address Enter the local, internal address of your Secure
Access service server, and then click Add.
Additional addresses may be added if there are
multiple servers implementing your Secure Access
service in a cluster.
External URL Enter the external URL that is used to connect
remote users to Web Access.
Typically, this is the Secure Access service FQDN
with an https:// prefix.
Internal URL Enter the internal URL that is used to connect
internal users to Web Access.
Typically, this is the internal IP address of your Web
Access server with an http:// prefix.
Web Access URL (internal users) If the URL is different than the external users, this
enter the proper link for Internal Users.
The Secure Access service, if situated in the DMZ, may require additional firewall rules to allow
the Secure Access service to communicate with the Connection Brokers and the virtual desktops
on the internal network.
vWorkspace 8.6.3
Administration Guide
2 Complete the RDP Proxy section as follows:
a Select Local IP Address, and then select an IP address from the list.
b Enter the Local Port.
c Click the Lock icon to select the web server certificate used by the Secure Access
service for inbound SSL-encrypted RDP session traffic.
Only certificates installed in the Windows computer store are recognized.
3 Complete the Connection Broker Proxy section as follows:
a Select Local IP Address, and then select an IP address from the list.
b Enter the Local Port.
c Enter the IP address, host name, or FQDN of the Web Access web server that the
Secure Access service forwards requests. Use commas to separate entries.
d Click the Lock icon to select the web server certificate used by the Secure Access
service for inbound SSL-encrypted RDP session traffic.
Only certificates installed in the Windows computer store are recognized.
NOTE: Both the RDP and the Connection Broker proxies can share the same IP address
and TCP port.
4 From the vWorkspace Connector for Windows Interface at the client end point do the
following,
a Configure a connection using vWorkspace Connector for Windows | Manage
Connections.
b In the Server List on the Connectivity tab, enter the FQDN of the Connection
Broker proxy.
c Select Enable RDP over SSL/TLS, and then enter the FQDN of the RDP proxy in the
SSL Gateway Server field.
There are two ways to configure the use of the vWorkspace Connector for Windows and Web
Access.
One option allows all three proxies to share the same IP address and SSL certificate, but the Web
Access and the Connection Broker proxies have different TCP ports. This allows the Secure
Access service to distinguish HTTP connections going to Web Access from HTTP connections going
to the Connection Broker.
A second option is for all three proxies to use the same TCP port, but the Connection Broker has
a different IP address and SSL certificate.
vWorkspace 8.6.3
Administration Guide
To configure vWorkspace Connector for Windows and Web Access
1 Use the following path to access the applet:
Windows Control Panel | vWorkspace Secure Access service
2 To configure using the same IP address and SSL certificate:
a In the RDP Proxy, Web Access Proxy, and Connection Broker Proxy fields, enter
the same IP address.
b Enter the same Local Port for RDP Proxy and Web Access Proxy, and a different
Local Port for the Connection Broker Proxy.
3 Complete the other fields and then click Apply to make the changes without closing the
window. Or click OK to make the changes and close the window.
a Configure a connection using vWorkspace Connector for Windows | Manage
Connections.
b In the Server List on the Connectivity tab, enter the FQDN of the Connection
Broker proxy
c Select Enable RDP over SSL/TLS, and then enter the FQDN of the RDP proxy in the
SSL Gateway Server field, and then click OK.
NOTE: Both proxies may share the same FQDN, but the Connection Broker proxy is set
to a different TCP port.
vWorkspace 8.6.3
Administration Guide
Web Access Site Manager
The vWorkspace Web Access Site Manager (WASM) allows you to generate multiple Web Access
sites.
Web Access is an ASP.Net application that installs as a virtual directory within an IIS default web
site. You can initially create the Web Access site during installation or by using the WASM. An IIS
virtual directory is created with the proper folder structure to host a Web Access site. However,
the new site has no configuration. You must create a Web Access configuration in the
vWorkspace Management Console and export it to the Web Access site.
One Web Access server can host multiple Web Access sites. Each site provides an interface to a
separate vWorkspace environment. The WASM can be used to aggregate multiple Web Access
sites into a federated site. A federated site provides a hyperlinked list of Web Access sites to the
user.
vWorkspace 8.6.3
Administration Guide
2 Create or modify a website:
• To create a new website, click Actions | New Website. On the Welcome page,
click Next. On the Connection Properties step, specify the Display Name and URL
path used to connect to the new Web Access site. You can create multiple sites.
• To modify a website, select the website you want to modify and click Properties.
3 Set up the Firewall/secure access service step, which are used to inform the Workspace
Connector how to communicate with the vWorkspace environment when a connection is
attempted.
Table 95. Firewall/Secure Access service properties
Advanced Settings: • Enable NAT for firewall traversal. This is helpful when
Specify the advanced Web Access your Web Access server and Secure Access service are
settings. separated by a NAT enabled firewall.
vWorkspace 8.6.3
Administration Guide
4 Set up the Domain/Login settings. These settings define what access control methods are
used when authenticating connecting users. The Domain setting must be defined in order
for authentication to the farm to succeed. The other Domain/Login settings are optional
and can be used to further secure access to your vWorkspace environment..
Table 96. Domain/Login properties
vWorkspace 8.6.3
Administration Guide
Table 96. Domain/Login properties
5 Set up the Connectors and Downloads. This is a group of settings that define the
availability of the vWorkspace Connector and other files for download from the Web
Access user interface.
NOTE: To install the vWorkspace Connector for Windows you must have administrative
rights on the device where the Connector is to be installed.
6 Set up the Experience settings. These settings control Microsoft or RDP virtual channels,
such as Desktop Composition and Graphics Acceleration.
vWorkspace 8.6.3
Administration Guide
Some settings display two tabs. The Default Settings tab provides the configuration of the
specific category unless the properties of a connection are set to override. The User
Overrides tab defines which values can be overridden by the user.
Table 98. Experience settings
vWorkspace 8.6.3
Administration Guide
Table 98. Experience settings
7 Set up the Browser Interface settings, and then click Apply. The Browser Interface
settings define the appearance of the Web Access client interface. The Web Access client
interface can be executed in Internet Explorer, Mozilla Firefox, or Google Chrome.
Table 99. Browser Interface settings
vWorkspace 8.6.3
Administration Guide
Table 99. Browser Interface settings
To specify the options for displaying and launching applications from Web Access
1 From the vWorkspace Management Console, select the Web Access node.
2 Select the name of a Website and click Properties. The Web Access Site Properties
window is displayed.
3 Select the Workspace Connectors step to display the vWorkspace Connectors window.
4 Select the tab of the operating system (Windows, Mac, iOS, Android, Linux or Chrome OS)
that you want to configure. The settings for the selected operating system will apply
when a user launches WebAccess from that operating system.
5 Select one of the following to define how to launch the applications and desktop remote
sessions. Select one of the following options:
• Native Connector Application. Provides the best user experience. Must be
installed on the user’s device.
• HTML5 Connector. Provides low user experience, but does not need to be
installed.
• Java Connector. Java Runtime must be installed on the user’s device.
• Chrome Connector. Must be installed on the user’s device.
• Immediately redirect users to the native Connector application. Select this
option to display and launch applications and desktops using the native Connector.
vWorkspace 8.6.3
Administration Guide
vWorkspace Connector Needs to be installed Full Featured OS-Specific
Java No (Requires Java) Yes No
Chrome Yes No Noa
a. Supports only Windows, Mac and Chrome operating systems (not iOS, Android or Linux).
6 If you want to disable automatic detection, select the Disable automatic detection of
vWorkspace native Connector applications for this website button.
vWorkspace 8.6.3
Administration Guide
Other vWorkspace Connectors
vWorkspace Web Access supports Linux, Mac, Android, and iOS as client Connectors. These, must
be installed through their respective methods. Web Access cannot be automatically installed on
these platforms.
Prerequisites
• Secure Access Device must be running at least System Version 7.0 R0.
• Authentication Realm must be set up and configured for the correct Active Directory
domain.
• SSO License must be installed on the Administrator’s device, if SSO is required.
• Integration with WSAM and Network Connect.
• vWorkspace Web Access server configured properly.
vWorkspace 8.6.3
Administration Guide
6 Do the following on the Allowed Server window, and then click Save Changes.
a Enter a Name.
b Add a Description, if needed.
c Add a Server. In this example, a subnet is used for the vWorkspace environment.
d Set the appropriate ports, such as 80 (Web), 8080 (Broker), and 3389 (Terminal
Services).
7 From the vWorkspace Role, select the SAM tab, and then select Options.
8 On the Options settings window, complete the following:
a Select Windows SAM.
b Set appropriate Windows SAM options for this role.
c Click Save Changes.
9 Select the Web tab, and create a bookmark for the vWorkspace Web Access server.
http://server/<identity>
10 From the main system menu, go to Users | Resource Policies | Secure Application
Manager Policies.
See Step 12 if SSO is required.
11 Add a new policy or modify an existing policy by doing the following:
a Enter a Name for the policy.
b Enter Resources to which this WSAM role is allowed to access. For example,
10.1.1.1/25:80,8080,3389.
c Select Policy applies to SELECTED roles.
d Select the vWorkspace role created previously.
e Select Allow socket access.
f Click Save Changes.
12 If SSO is required, from the main menu screen go to Resource Policies |Headers/Cookies
Policies, select the SSO tab, and then select Headers/Cookies.
13 Select New Policy on the Headers/Cookies Policies window, and do the following:
a Enter a Name.
b Add a description, if needed.
c Enter a Resource, which is the direct link to the vWorkspace Web Access site.
http://server/<identity>
a Set the role to which it applies.
b Select Append headers as defined below.
c Create three headers to write during the request process:
• PN_Username<User>
• PN_Password<Password>
• PN_Domain NetBIOS Domain
F5 Firepass
Web Access and F5 FirePass SSL VPN can be integrated to be used as a single sign-on solution by
creating tunnels in the FirePass Administrator Console.
vWorkspace 8.6.3
Administration Guide
Prerequisites for F5 FirePass
• Must use version 7.0.0. or later.
• Must be configured for the appropriate Active Directory domain.
• vWorkspace Web Access server must be installed and configured properly, if configuring
connections to a Web Access server.
F5 Firepass can be configured to tunnel connections to a vWorkspace Connection Broker or a
vWorkspace Web Access server.
vWorkspace 8.6.3
Administration Guide
SharePoint integration
vWorkspace Web Access can be integrated with a SharePoint server, allowing users to access Web
Access from a link on the SharePoint site.
Microsoft SharePoint 2010 was used in the following step process.
Cisco ASA
Web Access and Cisco ASA can be integrated to be used as a secure connection solution.
vWorkspace 8.6.3
Administration Guide
5 Select Add or Edit on the Edit Bookmark List window.
6 Complete the following:
a Enter a Bookmark Title.
b Enter the URL.
If using SSO to access the vWorkspace page, append /Login/gateway/ to the link.
If you are not using SSO, remove /Login/gateway from the URL and set the Advanced
Options to Get.
c Enter a Subtitle, if needed.
d Select a Thumbnail, if needed.
e Unselect the Allow the users to bookmark the link option.
7 Expand Portal, and then select Smart Tunnels from the Remote Access VPN window.
8 On the Edit Smart Tunnel List window, select Add or Edit.
9 Add or edit a PNTSC item with the following information, and then click OK:
a Application ID: PNTSC
b OS: Windows
c Process Name: pntsc.exe
d Hash: optional (it is not needed).
10 Add a Connector for Windows item with the following information, and then click OK:
a Application ID: vWorkspace Connector for Windows
b OS: Windows
c Process Name: pnap32.exe
d Hash: optional (it is not needed).
11 From the Remote Access VPN window, select the Group Policies option.
12 Click Edit to edit a group policy item with the following information:
a Name: DNPolicy
b Type: Internal
c Tunneling Protocol: webvpn,svc
13 On the Edit Internal Group Policy window, select Portal, and do the following:
a In the Smart Tunnel section, select vWorkspace_Client from the drop-down list.
b Select Auto Start.
c Click OK.
vWorkspace 8.6.3
Administration Guide
Microsoft UAG folders
The following folders are used for the integration. These folders are located under \Program
Files\Microsoft Unified Access Gateway.
• Custom Update. These folders are where the vWorkspace integration files are placed.
• Trunk_Name. This folder is the name of the Trunk created within the Microsoft UAG
console. For example, if the name of your trunk is MyPortal, this folder would be called
myportal.
NOTE: • Check the folder locations to make sure there are no other files residing
in the locations.
• Prior to applying the vWorkspace integration templates, backup and
export the current working configuration.
File locations
There should be no files in the above locations. If files exist already, contact technical support to
provide you with assistance of modifying the existing files to append the changes to them.
Table 102. File locations for integration
If files do not exist in the current locations, copy the files to the appropriate locations and save
the configuration. Complete the following steps:
vWorkspace 8.6.3
Administration Guide
1 Run IISRESET.EXE.
2 Activate the configuration.
3 Ensure activation completed fully by checking the UAG Activation Monitor.
Continue with the next steps to complete access to vWorkspace Connector for Windows, Remote
Desktop Connection, or Web Access.
vWorkspace 8.6.3
Administration Guide
Citrix XenApp and XenDesktop
Web Access can send user credentials to both vWorkspace Connection Brokers and servers
running the Citrix Program Neighborhood Agent (pnagent). Web Access takes the data returned
from each solution and aggregates it into the user’s application set. Therefore, the user can
access one interface to connect to presentation hosts from either solution seamlessly.
Web Access can integrate with the following Citrix products:
• XenApp 5.0
• Presentation Server 4.0 and 4.5
• XenDesktop 4.0, 5.0 and 5.5
To achieve this, a PNagent server must be configured to communicate with a Citrix environment
and the Web Access server must be configured with the URL of the PNagent server.
vWorkspace 8.6.3
Administration Guide
6
Managing the User Experience
Experience Optimizations
The Experience Optimizations address the user experience challenges of presenting applications
and desktops using a remote display protocol by providing seamless, reliable, high-performance
enhancements to Microsoft’s Remote Desktop Protocol.
The following features are available through the Experience Optimizations:
• WAN Acceleration. Accelerates RDP traffic on wide area networks (WANs). This provides
for an improved user experience by providing faster RDP screen responses and improved
performance of all optimization features.
• Universal Printing. A single-driver printing solution that satisfies both client-side and
network printing needs in a vWorkspace environment.
• Enhanced Audio. Enables support for applications that require the use of a microphone,
such as dictation, collaboration, and certain Voice Over Internet Protocol (VOIP)
applications such as Office Communicator and Lync.
• Graphics Acceleration. Reduces bandwidth consumption and dramatically improves the
user experience, making RDP usable over WAN connections.
• USB Redirection. Universal USB enables the use of virtually any USB connected device,
such as PDAs, local printers, scanners, cameras, and headsets to be used in conjunction
with VDI.
These features can be assigned to Users, Groups, OU, Client IP, Client Device Name or Advanced
boolean targets.
vWorkspace 8.6.3
Administration Guide
Setting up optimizations
The optimization features are installed by deploying Virtual Desktop Extensions to a virtual
desktop or by installing the TS/RDSH role on a Remote Desktop Session Host. In the vWorkspace
Management Console, administrators can manage which features govern a user’s connection to
the virtual workspace.
The optimizations settings can be found at the following locations. The options are set to
disabled by default.
Using the vWorkspace Remote Desktop connection
• Experience tab | Optimizations section
Using vWorkspace vWorkspace Connector for Windows
• Actions | Manage Connections | Experience section
Using Web Access
• Properties of a Web Site| Experience section
WAN Acceleration
WAN Acceleration accelerates RDP traffic on wide area networks (WANs). This provides for an
improved user experience by providing faster RDP screen responses and improved performance
of all Optimizations features.
WAN Acceleration is specifically designed for users on WAN links with modest to high round trip
latency. For example, the typical amount of latency that is common when connecting from the
United States to Europe. WAN Acceleration is also effective on WAN links that are much closer,
such as a VPN link from a home to a corporate office in the same city.
WAN Acceleration operates transparently to the users. WAN Acceleration is enabled with RDP
pass-through mode configured by default.
vWorkspace 8.6.3
Administration Guide
3 Configure the settings..
Table 103. WAN Acceleration settings
Experience Optimization
Description
setting
Enable support for bandwidth Enable or disable RDP compression.
optimization appliances
Enable support for WAN Enable or disable support for WAN Acceleration.
Acceleration
Enable RDP pass-through mode Selecting this option allows WAN Acceleration to
use the RDP port, eliminating the need to configure
additional firewall settings.
WAN Acceleration Port Number Enter a port number to be used, if other than the
default number, which is 3389.
NOTE: Any changes made to the default options
require a reboot. The reboot is automatic in a VDI
environment, but requires a manual reboot in an RD
Session Host environment.
Maximum number of Enter a maximum number of connections.
connections
4 Any changes made to the default options require a reboot. The reboot is automatic in a
VDI environment, but requires a manual reboot in an RD Session Host environment
A configurable client side timeout is available for WAN Acceleration. The default timeout is 5
seconds, if no other value is stated in the registry entry.
The registry value that needs to be set is:
HKLM\Software\Provision Networks\PNDNACLI
"ConnectTimeout" (REG_DWORD) = "15"
Universal Printing
vWorkspace Universal Printing is a single-driver printing solution that satisfies both client-side
and network printing needs in a vWorkspace environment. In addition to its driver-independent
approach to printing, benefits include:
• Bandwidth usage control and intelligent font embedding (only fonts that do not exist on
the client are embedded inside the print stream).
• Excellent print quality and reliability.
vWorkspace 8.6.3
Administration Guide
• Support for native printer features, such as bins, paper sizes, margins, stapling and
watermarks.
• Client-less support for LAN connected print servers and for remote site print servers in
situated and distributed environments.
vWorkspace 8.6.3
Administration Guide
Universal Printer auto-creation
The Universal Printer Auto-Creation option enables client side printers to be autocreated during
logon for each user session. For each client printer, Universal Printer autocreates and configures
a server-side printer, using the Universal Print driver, that has the same printer features as the
client printer.
Universal Printer auto-creation relies on a custom virtual channel driver to transfer the print job
from the server to the client. This mode of operation requires a vWorkspace Connector, that
supports the Universal print driver, to be installed on the client access device.
Administrators specify what types of client printers to autocreate, as well as allow users to
choose which printers to autocreate. The options for client printers that can be autocreated
include:
• Local printers
• Network printer connections
• Only the default printer
• All the printers and printer connections
Administrators can also configure several preferences and performance parameters including the
printer naming convention, print bandwidth upper limit, and compression options.
To enable the auto-creation of client printers, the following criteria must be met:
• A vWorkspace Connector that supports the Universal Printer driver must be installed on
the client access device.
• The Universal Printer option must be enabled on the client.
• At least one Auto-Creation option must be enabled in the client.
To print to an auto-created client printer, the user selects the Print command, and a list of
printers is presented to them. Print preview is also available by selecting Preview before printing
from the vWorkspace system tray icon.
vWorkspace 8.6.3
Administration Guide
Table 104. Universal Printer Properties, General tab
vWorkspace 8.6.3
Administration Guide
Universal Printer Properties, Compression tab
Controls when and to what extent compression is applied to the printer output. The options on
the window depend on the Print Data Format, either PDF or EMF, that is chosen on the General
tab.
Table 105. Compression tab (EMF format)
vWorkspace 8.6.3
Administration Guide
Universal Printer Properties, Naming tab
The Naming tab is used to control which client printer naming convention to use when naming
autocreated client printers.
Table 107. Universal Printer Properties, Naming tab
Universal Printer
Properties Server Farm Description
Tab
Server Types Filters the display of servers by type. Available types
include:
• Terminal Servers
• vWorkspace Servers
• Custom Server List
Propagate When selected, the universal printer settings are propagated
to all the servers that were selected.
vWorkspace 8.6.3
Administration Guide
Universal Printer Properties, Notification tab
The Notification tab is used when administrators want a customized print notification to be sent
to user sessions.
Table 109. Universal Printer Properties, Notification tab
vWorkspace 8.6.3
Administration Guide
Table 111. Universal Print Client Properties
Performance Options • Use Printer Properties Cache. Allows
printer properties from previous sessions to
be cached and used, instead of having to
reenumerate them each time a session is set
up.
Universal Print Bandwidth Tab
Enables the user to specify the amount of bandwidth available for printing.
Universal Print Logging Tab
Enables logging for troubleshooting purposes.
vWorkspace 8.6.3
Administration Guide
Use Ctrl to make multiple selections.
8 Click Close.
vWorkspace 8.6.3
Administration Guide
• Size optimization. The print streams produce as small as 10 percent of the size of
conventional PCL or Postscript print jobs using techniques such as intelligent/partial font
embedding, duplicate image removal, and dynamic compression.
The process of deploying Remote Site Relay involves the following items:
• Install the Remote Site Relay role on the print servers at each remote site.
• Use the Remote Site Relay Control Panel applet to configure network communication
parameters and identify the printers that are to be available to vWorkspace targets when
connecting to a vWorkspace RD Session Host.
• Import the exported network printers from each remote site. Each imported printer is
created as a Universal printer and is shared from a designated print server.
• Assign the printers to the appropriate vWorkspace targets.
Mutual computer-level authentication can be configured using an assigned shared pass phrase.
When it is authenticated, the Remote Site Relay server and Universal Print Server can encrypt
the print data before it is passed across the WAN link, eliminating the requirement for complex
Windows or Kerberos trust relations and obtaining commercial server certificates.
Remote site relay can be configured to use any port that security administrators allow to be
open on the firewalls.
vWorkspace 8.6.3
Administration Guide
b Select Properties to set printing preferences for each printer.
c Select the Use Printer Properties Cache check box, if needed.
4 Complete the Logging tab if you need to enable trace logging for troubleshooting.
5 Click OK.
NOTE: After making configuration changes using the Remote Site Relay Control Panel
applet, it may be necessary to restart the vWorkspace Remote Site Relay service
for the changes to be implemented.
vWorkspace 8.6.3
Administration Guide
8 Click Import Now to start the import process.
9 Review the message box confirming the import process has been initiated, and then click
OK.
10 To close the Remote Site Relay Servers window, click Close.
11 On the Manage Universal Printers window, click Close.
vWorkspace 8.6.3
Administration Guide
• B & W Image Compression
• Color Image Compression
• Color Image Quality Level
• Duplicate Images Removal
For EMF format, the available options are:
• Data Compression Level
• JPEG Image Compression Level
8 Change the Target assignments, as needed, and then click Apply.
9 Change permissions as needed, and then click Apply.
10 Click OK to complete the task and save changes.
Or, click Cancel to close without saving the changes.
Enhanced Audio
The Enhanced Audio feature enables users to redirect their audio devices to and hosted desktops
to use with applications involving dictation and for certain VOIP applications. These settings are
disabled by default.
Enhanced Audio is supported on the following:
• Microsoft Office Communicator
• Microsoft Lync (see Configuring the Microsoft Lync 2013 plug-in)
• Avaya Software
• Skype
Microphone sound quality is best with sufficient bandwidth, at least 25 to 30 Kbps, to support
the audio channels and round trip latency less than 250 milliseconds.
CAUTION:The Connection Policies Remote Computer Sound option overrides the setting
for Remote computer sound on the Local Resources window in the vWorkspace
Connector for Windows setup, as well as the Local Resource Settings window in
the Web Access preferences.
vWorkspace 8.6.3
Administration Guide
Setting up Enhanced Audio
To set up Enhanced Audio from vWorkspace Connector for Windows
1 From vWorkspace Connector for Windows, select Manage Connections | Local
Resources.
2 Set the Remote audio option to Leave at Remote Computer.
NOTE: If you are using vWorkspace 8.0.1 or earlier, set the Remote Audio option to Bring to Local
Computer.
vWorkspace 8.6.3
Administration Guide
For Windows x64 OS:
[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Provision Networks\Terminal Services
Client\Addins\LyncVdiPluginLib]
"Name"="{DEDC9BA7-C55C-4a3b-965E-B08EAC50D504}"
Flash Acceleration
Flash Acceleration allows flash content (such as Youtube) to be played on the client computer,
leveraging the resources of the client computer and providing an optimal user experience.
Adobe Flash Player must be installed on the server and client access device.
NOTE: The client Adobe Flash player version must match the version (major versions)
that is installed on the server.
If the versions do not match, then the flash content plays without Flash
Acceleration. Or, unexpected results may occur.
Factory
defaults set at Blacklist of sites that are not redirected
BL Server REG_MULTI_SZ RTM and may using flash redirection. This is used for
vary with unsupported sites.
updates.
vWorkspace 8.6.3
Administration Guide
NAME LOCATION TYPE DEFAULT DESCRIPTION
Graphics Acceleration
vWorkspace Graphics Acceleration adds additional compression to Microsoft’s Remote Desktop
Protocol (RDP) to dramatically reduce bandwidth consumption and improve end user experience,
making RDP usable over WAN connections. Graphic Acceleration can be assigned to Users,
Groups, OU, Client IP or Client Device Name.
Graphics Acceleration performs better with applications and documents that contain a high
degree of graphics, and may not perform as well with text based applications. It is
recommended that Graphics Acceleration be thoroughly tested with each application before
implementing in a production environment.
vWorkspace 8.6.3
Administration Guide
Enabling this feature for specified applications ensures the benefits of this feature to the end
users.
vWorkspace 8.6.3
Administration Guide
• To enable Graphics Acceleration in vWorkspace Connector for Windows
• To set Graphics Acceleration in Web Access
vWorkspace 8.6.3
Administration Guide
4 Select Graphics Acceleration, and then click Save Changes.
USB devices
From headsets to mobile devices, USB devices are frequently used, but can sometimes be
problematic when used in a virtualized environment. USB device integration issues can be solved
with the vWorkspace features of USB Hub client and Load balancing.
Devices Tab
Share Makes the device available to the server. When a device is
shared, it is unavailable to the client computer.
Unshare Makes the device unavailable to the server, which makes it
available to the client computer.
Exclude Excludes this device from being shared.
See the Note in Auto-connect devices.
Unexclude Allows the device to automatically be shared.
Properties Displays the USB Device Properties window. The ability to add
an optional nickname for the device is included in the
properties.
Information on this window includes:
• Nickname
• Name
• Location
• Serial Number
• Information
• Status
vWorkspace 8.6.3
Administration Guide
Table 114. USB Hub Client, Devices tab
Auto-share devices Allows the connected devices to automatically be shared
with the server.
NOTE: If a user is going to select this option and they are
using a USB keyboard or mouse, they need to confirm that
these devices have been excluded before selecting this check
box. The keyboard and mouse might not function locally on
the client while being shared.
Use Taskbar Icon Allows the system tray to be used.
Advanced Tab
Bandwidth Control Set the bandwidth control by moving the slider to
the threshold amount.
Compression Zip compression, and then do the following:
• Move the slider to set the minimum packet
size.
For example, if you set the compression to
1024 bytes, compression occurs only if the
amount is greater than 1024 bytes.
• Enter a number from one to ten in the
Settings field. The setting values are:
1 = best speed
10 = best compression
4 Click OK.
Devices are listed with their name, current status, and if they are shared (indicated with a check
mark) or excluded (indicated with an X).
To share a device using the system tray, click on it. To exclude a device using the system tray, use
Ctrl + click.
vWorkspace 8.6.3
Administration Guide
USB Server properties
You can use the following USB Server properties:
Table 116. USB Server properties fields
The Advanced tab on the USB Server properties allows you to set a priority for this service on
the server. The setting options are Normal, Low, or High, and the default setting is Normal.
vWorkspace 8.6.3
Administration Guide
5 Select the device, and click Properties.
6 From the USB Device Properties window, you need the following information:
• VendorID
• ProductID
• Revision
7 Create the following key in the registry:
HKEY_LOCAL_computer\SOFTWARE\Quest Software, Inc.\Quest Software USB Virtual
Hub\Excluded USB Devices
8 Create a sub key with a unique name under the Excluded USB Devices key. This key name
can be any name.
9 In the Sub Key, create a value "HARDWAREID" of type REG_BINARY.
10 Enter the hardware identification information into this key in binary format.
You have the option to be more or less specific about the devices you want to auto
exclude. Entering only the VendorID excludes all devices with that VendorID, which may
exclude more devices than you want to exclude. Entering the VendorID, ProductID, and
Revision information from the USB device allows you to be very specific with the excluded
USB device.
The following table provides examples of a binary format:
Table 117. Binary format examples
For example, using the device information from the above table, the registry entries
might be:
Table 118. Example of registry entries
VendorID: f2 04
VendorID and f2 04 12 01
ProductID:
VendorID, ProductID, f2 04 12 01 03 01
and Revision:
vWorkspace 8.6.3
Administration Guide
To add the registry value
The installation steps are as follows:
1 Locate PNSCHOOK.DLL in the \windows\system32 directory.
2 Add PNSCHOOK.DLL to the AppInit_DLLs key.
3 Configure applications to hook in SCHookList registry value; that is, in the pathname
HKLM\Software\Provision Networks\Provision-IT. Locate a REG_SZ value called SCHookList
(which is a comma-delimited list of EXEs to be hooked).
vWorkspace 8.6.3
Administration Guide
• User Profile (agent for desktops). This option installs on Desktops, using Virtual Desktop
Extensions (PNTools). See Virtual Desktop Extensions (VDE) for more information.
vWorkspace 8.6.3
Administration Guide
• Select New User Profile Item to add a new user profile.
• Select Properties to modify the User Profiles Properties.
3 On the User Profile Properties, General window, define the general properties and then
click Next.
Table 119. User Profiles Properties, General property fields
4 On the Storage Servers window, define Storage Servers by clicking New and then do the
following:
a Enter a name for the Storage Server, and then click OK.
b Click in the columns on the ellipsis to change the Base Folder, Global Folder, and
TCP Port settings.
The profiles are saved in the Base Folder. It should be a local path on the server.
The Global Folder is the name of the folder for Global settings/profiles.
Table 120. Storage Server Properties
5 On the Silos window, set up Silos by clicking New, and then do the following:
a On the Welcome window of the Silo wizard, click Next.
b Enter a name for this silo group, and then click Next.
c Click Add Session Hosts or Add Computer Groups to define the silo. From the
Select window, select the appropriate Session Host computer group, and then click
OK.
Session Hosts and computer groups can only be added to one silo at a time.
d On the Members window, click Next.
vWorkspace 8.6.3
Administration Guide
e Specify the Auto-Save setting, and then click Finish to close the wizard and return
to the User Profile Properties window.
f Select the User Profile Storage Server from the list, and then click Finish.
The new silo displays in the list.
g On the Silos window, click Next.
6 Specify the Permissions for the user profile.
7 Click Apply and OK.
vWorkspace 8.6.3
Administration Guide
The Terminal Services Profile path can be set using Active Directory Group policy if the
domain controllers are Windows Server 2003 Service Pack 1 and appropriate hotfixes have
been applied.
5 In the Profile Path box, enter the local file system path to the mandatory user profile.
6 Click OK.
Visual Basic scripting can be used to automatically modify the profile path for existing users. The
sample below is from Microsoft TechNet Script Center Library.
vWorkspace 8.6.3
Administration Guide
Each User Profile element has the following properties associated with it.
Table 121. User Profile Element Properties
vWorkspace 8.6.3
Administration Guide
6 On the Type & Location window, select Registry Key, and then enter the desired Registry
Key path and name or use the ellipsis to browse to it. Click Next.
7 In the Logon Processing window, select Asynchronous or Synchronous, and then click
Next.
8 On the Profile Persistence window, select one of the settings to specify when modified
profile data is to be saved, and then click Next.
9 On the Scope window, select Global or Silo. If Silo is selected, use the Silo field to
identify the group that will use this profile element or click Edit Silos to add a new silo.
10 To assign this user profile to a user, complete the Client Assignments window, and then
click Next.
11 To assign permissions to this User Profile, complete the Permissions window, and then
click Finish.
vWorkspace 8.6.3
Administration Guide
Import an XML file
After selecting to import an XML file, you need to confirm that you are about to import user
profile items. Once the import process has completed, another window displays the number
items found and the number items imported.
The default folder location for the XML file is My Documents.
vWorkspace 8.6.3
Administration Guide
Table 122. XML formats used in user profiles
Load balancing
Load balancing can be enabled in a vWorkspace infrastructure when published applications are
hosted across multiple RD Session Hosts or multiple Hyper-V hypervisors. Load balancing rules
are assigned SCVMM managed computer groups, Hyper-V managed computer groups or RD Session
Hosts.
vWorkspace 8.6.3
Administration Guide
Table 123. Load balancing rules
vWorkspace 8.6.3
Administration Guide
Table 124. Available counters for load balancing
vWorkspace 8.6.3
Administration Guide
Table 124. Available counters for load balancing
vWorkspace 8.6.3
Administration Guide
To create a load balancer
The Number of Users counter is the default load balance assigned by the system, and its values
cannot be modified.
1 Open the vWorkspace Management Console.
2 Right-click on the Load Balancing node, and select New Load Balancing Rule.
3 On the Welcome window of the Load Balancing Rule Wizard, click Next.
4 On the Name & Description window, enter a name and description for the new load
balancing rule, then click Next.
5 On the Counters window, do the following:
a Select the counter to be used by clicking in the Assigned column.
b Set the minimum value for each counter selected by clicking on its current value
in the Min Value column, and then type a new value in the input box.
c Set the maximum value for each counter selected by clicking on its current value
in the Max Value column, and then type a new value in the input box.
d Set the weight value for each counter selected by clicking on its current value in
the Weight column, and then select a new value from the list.
e Select Report full load when at least one counter has reached its maximum
value, if needed.
f Click Next.
6 Set the permissions and then click Finish.
vWorkspace 8.6.3
Administration Guide
• Click the Use the default load balancing rule action button to use the default
SCVMM rule.
• Click the Specify a custom load balancing rule: action button to enable the custom
rules. Select the desired custom Load Balancing Rule from the Load Balancing Rule
list.
• Click the View button on any action button selection to view the rule properties.
8 Proceed through the windows to configure the new computer group.
9 Click Finish to complete the task.
For more detail on adding new SCVMM computer groups, see the Microsoft SCVMM integration
section.
vWorkspace 8.6.3
Administration Guide
To configure the vWorkspace Password Reset service
1 Use the following path to open the Password Manager Control Panel applet.
Start | Control Panel | Quest Password Manager
2 On the General tab, enter the TCP Port.
3 Click the Lock icon by Certificate Name.
4 On the Select Certificate window, select the certificate, and then click OK.
5 If you want to use logging, select the Logging tab and then Enable trace logging to the
specified file.
6 Enter the path and file name for the log file, or use the folder button to browse to it.
7 Click OK to save your changes.
vWorkspace 8.6.3
Administration Guide
7
Appendix
Sentillion integration
Sentillion markets numerous health care integration products that unify single sign-on (SSO),
context management and strong authentication, into a fully integrated managed clinical workstation
enabling caregivers to quickly access their applications and the associated patient data. Sentillion
components install a custom Sentillion GINA that integrates with the clinical desktop to provide SSO
services and chains to subsequent GINAs. Thus, the Sentillion components should be installed after
Virtual Desktop Extensions (PNTools) to ensure proper GINA chaining with vWorkspace.
This section describes the registry entry necessary for the integration of vWorkspace and Sentillion.
Because of the Sentillion GINA, vWorkspace must properly initialize Windows Explorer and bypass
the normal PNStart execution. With the following integration, you are able to complete a single sign-
on to a virtual computer using the Sentillion solution.
The following registry entry needs to be added to the client endpoint running vWorkspace Connector
for Windows or PNTSC that is connecting to the Sentillion desktop. By setting this registry entry,
pnstart.exe is bypassed, launching Explorer directly, allowing Sentillion to obtain credentials for
further application logon passthrough.
HKLM\Software\Provision Networks\Provision-
This setting is only effective for terminal servers. PNStart is executed on VDI virtual machines using
the registry value:
PNTools setup will set this value to ’PNSTART.EXE’. To disable PNSTART.EXE from running on VDI
computers, change this value to ’EXPLORER.EXE’.
vWorkspace 8.6.3
256
Administration Guide
About Dell
Dell listens to customers and delivers worldwide innovative technology, business solutions and services they
trust and value. For more information, visit www.dell.com.
Third-party contributions
This product contains the third-party components listed below. For third-party license information, go to
http://www.quest.com/legal/license-agreements.aspx. Source code for components marked with an asterisk
(*) is available at http://opensource.dell.com.
vWorkspace 8.6.3
257
Administration Guide