5.2

Table Of Contents
Choosing a User Authentication Method 64
Restricting View Desktop Access 66
Using Group Policy Settings to Secure View Desktops 67
Implementing Best Practices to Secure Client Systems 68
Assigning Administrator Roles 68
Preparing to Use a Security Server 69
Understanding Horizon View Communications Protocols 74
6
Overview of Steps to Setting Up a Horizon View Environment 81
Index 83
VMware Horizon View Architecture Planning
4 VMware, Inc.