Book Image

Implementing VMware Horizon 7.7 - Third Edition

By : Jason Ventresco
Book Image

Implementing VMware Horizon 7.7 - Third Edition

By: Jason Ventresco

Overview of this book

This third edition of Implementing VMware Horizon 7.7 has been updated to get you up to speed with VMware Horizon 7.7 by showing you how to use its key features and deploying an end-user computing infrastructure for your own organization. The book begins by guiding you on how to deploy all the core requirements for a VMware Horizon infrastructure. It then moves on to show you how to provision and administer end-user computing resources using VMware Horizon. You’ll not only be able to deploy the core VMware Horizon features, but you’ll also be able to implement new features, such as the Just-in-Time Management Platform (JMP) and the Horizon Console. You’ll also focus on the latest features and components of the Horizon platform and learn when and how they are used. By the end of the book, you will have developed a solid understanding of how your organization can benefit from the capabilities VMware Horizon offers and how each of its components is implemented.
Table of Contents (17 chapters)

Horizon Security Server recovery or upgrade

The process used to recover a Horizon Security Server is almost identical to that used to perform an upgrade. The only difference is that when performing an upgrade the target server is typically in a usable state, and when doing a recovery a new server may be required. This section will provide one set of instructions that will cover both an upgrade or a recovery of a Horizon Security Server.

The simplest way to restore a Horizon Security Server is to simply reinstall the software using the steps provided earlier in this chapter, and re-pair the Security Server with the Horizon Connection Server.

The following steps outline how to restore a Horizon Security Server in a scenario where the previous one is unavailable, or how to upgrade an existing Security Server (steps that are specific to a recovery will be identified as such):

  1. Generate...