In certain View environments, it is a priority to prohibit access to View desktops through the RDP display protocol. You can prevent users and administrators from using RDP to access View desktops by configuring pool settings and a group policy setting.

Note

Remote Desktop Services, called Terminal Services on Windows XP systems, must be started on the virtual machine that you use to create pools and on View desktops. Remote Desktop Services are required for View Agent installation, SSO, and other View session-management operations.

Verify that the VMware View Agent Configuration Administrative Template file is installed in Active Directory. See Using the View Group Policy Administrative Template Files.

1

Select PCoIP as the display protocol that you want View Connection Server to use to communicate with View clients.

Option

Description

Create a desktop pool

a

In View Administrator, start the Add Pool wizard.

b

On the Desktop Settings page, select PCoIP as the default display protocol.

Edit an existing desktop pool

a

In View Administrator, select the desktop pool and click Edit.

b

Select the Pool Settings tab and select PCoIP as the default display protocol.

2

For the Allow users to choose protocol setting, select No.

3

Prevent non-View clients from connecting directly to View desktops through RDP by disabling the AllowDirectRDP group policy setting.

a

On your Active Directory server, open the Group Policy Management Console and select Computer Configuration > Administrative Templates > VMware View Agent Configuration.

b

Disable the AllowDirectRDP setting.