Book Image

Implementing VMware Horizon 7 - Second Edition

By : Jason Ventresco
Book Image

Implementing VMware Horizon 7 - Second Edition

By: Jason Ventresco

Overview of this book

VMware Horizon 7 has been a buzz since it was announced. One of the major reasons is the introduction of the new Instant Clones feature. This book will complement the product documentation by providing real-life examples of how it is implemented along with the latest features and components of the platform. We'll explore the latest features of the platform, including those added through product acquisitions such as User Environment Manager and App Volumes. Further on, you will also be introduced to the new capabilities added to the core product such Linked-Clone RDS pools. Upon completion of this book, you will have an understanding of the capabilities and benefits VMware Horizon can provide to your organization, and how each of its components are implemented.
Table of Contents (21 chapters)
Implementing VMware Horizon 7 Second Edition
Credits
About the Author
About the Reviewer
www.PacktPub.com
Preface

Horizon Security Server recovery or upgrade


The process used to recover a Horizon Security Server is almost identical to that used to perform an upgrade. The only difference is that when performing an upgrade the target server is typically in a usable state, and when doing a recovery a new server may be required. This section will provide one set of instructions that will cover both an upgrade or a recovery of a Horizon Security Server.

The simplest way to restore a Horizon Security Server is to simply reinstall the software using the steps provided earlier in this chapter, and re-pair the Security Server with the Horizon Connection Server.

The following steps outline how to restore a Horizon Security Server in a scenario where the previous one is unavailable, or how to upgrade an existing Security Server: (Steps which are specific to a recovery will be identified as such).

  1. Generate a new Security Server pairing password using the process outlined earlier in this chapter.

  2. Configure a new Security...