Administrator Guide

Introduction
There are two main Virtual Desktop Infrastructure (VDI) architectures used by the Dell Cloud Client-Computing (CCC) team: VMware and
Citrix. Endpoint Security Suite Enterprise - Support for VDI integrates the Citrix architecture and Endpoint Security Suite Enterprise. It also
includes support for Endpoint Security Suite Enterprise in VMware VDI environments.
VDI Deployment Models
There are two models for Virtual Desktop Infrastructure (VDI) deployment: Persistent and Non-Persistent. Endpoint Security Suite
Enterprise supports the Persistent and Non-Persistent VDI models with Citrix and VMware.
Persistent VDI - After the image is deployed, it can be modied by each end user. Users' changes are saved for future sessions and these
changes persist until the VDI clone pool is rebuilt. Also, VDI persistence dedicates a specic Virtual Machine in the VDI pool to a specic
user and only that user can access that specic Virtual Machine. The user can store data in the personal vdisk that resides within the
Virtual Machine.
NOTE
: The personal vdisk is not saved after a VDI clone pool rebuild.
Non-Persistent VDI - After the image is deployed, the image cannot be modied and then saved by the end user. The session is dedicated
to a single user while in use and is then returned to the pool at log-o.
Deployments of a VDI persistent pool can vary greatly. An example of a large-scale VDI environment may be considered to be a delivery
group of 150-200 simultaneous Virtual Machines. The VDI clone pool reconstruction may be needed for several reasons. For example,
updates to the applications or operating system in the VDI environment would require the updates to be made in the VDI template master,
the current VDI clone pool torn down and rebuilt or updated, based on the updated VDI template master. Impact to this methodology will be
taken into account with regards to Phase 1 and any discrepancies will be considered in future releases.
Either Dell Enterprise Server or DDP Enterprise Server - Virtual Edition manages Endpoint Security Suite Enterprise. Take extra precautions
to prevent policies of unsupported features from being enabled on VDI systems. Before and after deployment, follow Dell Server Policy and
Conguration Requirements.
Supported Features
Supported features include Encryption and Advanced Threat Prevention.
Encryption
The encryption feature includes encryption of both removable media (External Media Shield, or EMS) and xed drives (Policy-Based
Encryption).
External Media Shield protects removable media (for example, ash drives) by encrypting them. Use the user roaming key.
Policy-Based Encryption protects les on local xed drives by encrypting their les and folders. Use either the common or user key types.
1
4 Dell Data Protection | Endpoint Security Suite Enterprise Support for VDI
Introduction