In certain View environments, it is a priority to prohibit access to View desktops through the RDP display protocol. You can prevent users and administrators from using RDP to access View desktops by configuring pool settings and a group policy setting.

By default, while a user is logged in to a View desktop session, you can use RDP to connect to the desktop virtual machine from outside of View. The RDP connection terminates the View desktop session, and the View user's unsaved data and settings might be lost. The View user cannot log in to the desktop until the external RDP connection is closed. To avoid this situation, disable the AllowDirectRDP setting.


Remote Desktop Services, called Terminal Services on Windows XP systems, must be started on the virtual machine that you use to create pools and on View desktops. Remote Desktop Services are required for View Agent installation, SSO, and other View session-management operations.

Verify that the View Agent Configuration Administrative Template file is installed in Active Directory. See Using the View Group Policy Administrative Template Files.


Select PCoIP as the display protocol that you want View Connection Server to use to communicate with View clients.



Create a desktop pool


In View Administrator, start the Add Pool wizard.


On the Desktop Settings page, select PCoIP as the default display protocol.

Edit an existing desktop pool


In View Administrator, select the desktop pool and click Edit.


Select the Pool Settings tab and select PCoIP as the default display protocol.


For the Allow users to choose protocol setting, select No.


Prevent non-View clients from connecting directly to View desktops through RDP by disabling the AllowDirectRDP group policy setting.


On your Active Directory server, open the Group Policy Management Console and select Computer Configuration > Administrative Templates > VMware View Agent Configuration.


Disable the AllowDirectRDP setting.