Book Image

VMware View Security Essentials

By : Daniel Langenhan
Book Image

VMware View Security Essentials

By: Daniel Langenhan

Overview of this book

Most people associate security with network security and focus on firewalls and network monitoring. However, there is more to security than that. Security starts with the establishment of a stable environment, protecting this environment not only from intrusion, but also from malicious intent. It is about tracking the issue and recovering from it. These elements of security are what this book aims to address. VMware View Security Essentials addresses the topic of security in the corporate environment in a new way. It starts with the underlying virtual infrastructure and then delves into securing your base, your connection, and your client. This is not only a “how-to” book, but is also a book that explains the background and the insights of View security for the experienced professional's desktop virtualization. This book takes you through the four major View security areas. Each area deals with all the aspects of security and explains the background as well as laying out simple-to-follow recipes to implement a higher security standard. We start at the Virtualization base and work our way through the various View server types. We will then dive into the problems and issues of securing a connection before we address the security of the desktop itself. We conclude with a look into the backing up of our View installation and preparing for disaster recovery.
Table of Contents (12 chapters)

View desktop pools

The source for every View desktop is a View desktop pool. In this chapter we will discuss how to set security settings for a desktop pool.

The first thing we need to do is create a desktop pool. For the purpose of this book, we assume that you know how to do this. Now we have to access the settings of each pool, by clicking on Inventory | Pool and then double-clicking on the pool of which you want to change the settings. This opens up the configuration details for the pool. Every procedure that we will be performing in this section will start from here.

The Settings tab

In Settings, all the settings of the desktop pool can be changed as well as the Delete Pool… setting. We also can change the entitlements for the pool. The Entitlements… setting allows us to define what user group can access this pool. All these are shown in the following screenshot:

The Inventory tab

The inventory shows all deployed View desktops, the version of their View Agent, the host they are deployed...