In this chapter we will talk about securing the View desktop client. In doing so, we need to think about securing our data and infrastructure against harmful interactions, as well as access to different environments. Harming data can take two forms, the first (and foremost) would be unauthorized alteration of data and the second, unauthorized copying of data. When you are securing your environment against data alteration and copy, you will inevitably interfere with the users' productivity. For example, if one would switch off USB forwarding, one would be saved against someone downloading data onto a USB stick, however, it would also impair any user from connecting a USB headset.
The last but most important feature is making sure that the user authenticates properly. Authentication can be as easy as logging in with an AD account or as secure as using smart cards.
In this chapter we will be talking about most of these features.