Book Image

Implementing VMware Horizon 7 - Second Edition

By : Jason Ventresco
Book Image

Implementing VMware Horizon 7 - Second Edition

By: Jason Ventresco

Overview of this book

VMware Horizon 7 has been a buzz since it was announced. One of the major reasons is the introduction of the new Instant Clones feature. This book will complement the product documentation by providing real-life examples of how it is implemented along with the latest features and components of the platform. We'll explore the latest features of the platform, including those added through product acquisitions such as User Environment Manager and App Volumes. Further on, you will also be introduced to the new capabilities added to the core product such Linked-Clone RDS pools. Upon completion of this book, you will have an understanding of the capabilities and benefits VMware Horizon can provide to your organization, and how each of its components are implemented.
Table of Contents (21 chapters)
Implementing VMware Horizon 7 Second Edition
Credits
About the Author
About the Reviewer
www.PacktPub.com
Preface

Configuring User Environment Manager


Assuming that we have configured the UEM shares and uploaded the GPO templates as described previously in the section of this chapter titled User Environment Manager pre-installation tasks, we are ready to configure UEM itself. In this section of the chapter, we will complete the initial configuration of UEM, which includes installing the UEM management console, implementing the required AD GPOs, and, while optional, we will also enable Windows folder redirection.

Installing the User Environment Manager management console

The UEM management console software may be installed wherever it is needed to facilitate UEM management. The actual UEM configuration is stored in the UEM configuration share; the console does nothing more than connect to and manage the UEM configuration data stored on it. In the examples provided in this chapter, administrative access to UEM is controlled using the UEM_Admins AD security group. Only members of that group have the necessary...