User manual

Table Of Contents
PCoIP Client Session Variables ADM Template Settings
The PCoIP Client Session Variables ADM and ADMX template les (pcoip.client.adm and
pcoip.cient.admx) contain policy seings related to the PCoIP display protocol. You can congure seings
to default values that can be overridden by an administrator, or you can congure seings to values that
cannot be overridden.
The ADMX and ADM les are available in a bundled .zip le named VMware-Horizon-Extras-Bundle-
x.x.x-yyyyyyy.zip, which you can download from the VMware download site at
hps://my.vmware.com/web/vmware/downloads. Under Desktop & End-User Computing, select the
VMware Horizon 7 download, which includes the bundled .zip le.
Table 310. PCoIP Client Session Variables
Setting Description
Configure PCoIP
client image cache
size policy
Controls the size of the PCoIP client image cache. The client uses image caching to store
portions of the display that were previously transmied. Image caching reduces the amount
of data that is retransmied.
When this seing is not congured or when it is disabled, PCoIP uses a default client image
cache size of 250MB.
When you enable this seing, you can congure a client image cache size from a minimum
of 50 MB to a maximum of 300 MB. The default value is 250MB.
Configure PCoIP event
log verbosity
Sets the PCoIP event log verbosity. The values range from 0 (least verbose) to 3 (most
verbose).
When this seing is enabled, you can set the verbosity level from 0 to 3. When the seing is
not congured or disabled, the default event log verbosity level is 2.
When this seing is modied during an active PCoIP session, the new seing takes eect
immediately.
Configure PCoIP
session encryption
algorithms
Controls the encryption algorithms advertised by the PCoIP endpoint during session
negotiation.
Checking one of the check boxes disables the associated encryption algorithm. You must
enable at least one algorithm.
This seing applies to both agent and client. The endpoints negotiate the actual session
encryption algorithm that is used. If FIPS140-2 approved mode is enabled, the Disable
AES-128-GCM encryption value will be overridden if both AES-128-GCM encryption and
AES-256-GCM encryption are disabled.
If the Configure SSL Connections seing is disabled or not congured, both the
Salsa20-256round12 and AES-128-GCM algorithms are available for negotiation by this
endpoint.
Supported encryption algorithms, in order of preference, are SALSA20/12-256, AES-
GCM-128, and AES-GCM-256. By default, all supported encryption algorithms are available
for negotiation by this endpoint.
Chapter 3 Configuring Horizon Client for End Users
VMware, Inc. 57