User manual

Table Of Contents
View PCoIP Client Session Variables ADM Template Settings
The View PCoIP Client Session Variables ADM template file (pcoip.client.adm) contains policy settings
related to the PCoIP display protocol. You can configure settings to default values that can be overridden by
an administrator, or you can configure settings to values that cannot be overridden.
This ADM file is available in a bundled .zip file named VMware-Horizon-View-Extras-Bundle-x.x.x-
yyyyyyy.zip, which you can download from the VMware Horizon (with View) download site at
http://www.vmware.com/go/downloadview.
Table 310. View PCoIP Client Session Variables
Setting Description
Configure PCoIP
client image cache
size policy
Controls the size of the PCoIP client image cache. The client uses image caching to store
portions of the display that were previously transmitted. Image caching reduces the amount
of data that is retransmitted.
This setting applies only to Windows and Linux clients when Horizon Client, View Agent,
and View Connection Server are a View 5.0 or later release.
When this setting is not configured or when it is disabled, PCoIP uses a default client image
cache size of 250MB.
When you enable this setting, you can configure a client image cache size from a minimum
of 50 MB to a maximum of 300 MB. The default value is 250MB.
Configure PCoIP event
log verbosity
Sets the PCoIP event log verbosity. The values range from 0 (least verbose) to 3 (most
verbose).
When this setting is enabled, you can set the verbosity level from 0 to 3. When the setting is
not configured or disabled, the default event log verbosity level is 2.
When this setting is modified during an active PCoIP session, the new setting takes effect
immediately.
Configure PCoIP
session encryption
algorithms
Controls the encryption algorithms advertised by the PCoIP endpoint during session
negotiation.
Checking one of the check boxes disables the associated encryption algorithm. You must
enable at least one algorithm.
By default, both the Salsa20-256round12 and AES-128-GCM algorithms are available for
negotiation by this endpoint.
This setting applies to both agent and client. The endpoints negotiate the actual session
encryption algorithm that is used. If FIPS140-2 approved mode is enabled, the Disable
AES-128-GCM encryption value is always overridden so that AES-128-GCM encryption is
enabled.
If this setting is disabled or not configured, both the Salsa20-256round12 and AES-128-GCM
algorithms are available for negotiation by this endpoint.
Chapter 3 Configuring Horizon Client for End Users
VMware, Inc. 45