7.0

Table Of Contents
3 Set the RedirectionPolicy value to always.
Value name = RedirectionPolicy
Value Type = REG_SZ
Value data = always
4 Restart Windows Media Player on the desktop to allow the updated value to take effect.
Managing Access to Client Drive Redirection
When you deploy Horizon Client 3.5 or later and View Agent 6.2 or later or Horizon Agent 7.0 or later with
client drive redirection, folders and files are sent across the network with encryption. Client drive
redirection connections between clients and the View Secure Gateway and connections from the View
Secure Gateway to desktop machines are secure.
With earlier client or agent releases, client drive redirection folders and files are sent across the network
without encryption and might contain sensitive data, depending on the content being redirected.
If the secure tunnel is enabled, client drive redirection connections between Horizon Client and the View
Secure Gateway are secure, but connections from the View Secure Gateway to desktop machines are not
encrypted. If the secure tunnel is disabled, client drive redirection connections from Horizon Client to the
desktop machines are not encrypted.
To ensure that this data cannot be monitored on the network, use client drive redirection only on a secure
network if Horizon Client is earlier than version 3.5 or agent is earlier than version 6.2.
The Client Drive Redirection setup option in the agent installer is selected by default. As a best practice,
enable the Client Drive Redirection setup option only in desktop pools where users require this feature.
Use Group Policy to Disable Client Drive Redirection
You can disable client drive redirection by configuring a Microsoft Remote Desktop Services group policy
setting for remote desktops and RDS hosts in Active Directory.
For more information about client drive redirection, see the Using VMware Horizon Client document for the
specific type of desktop client device. Go to
https://www.vmware.com/support/viewclients/doc/viewclients_pubs.html.
NOTE This setting overrides local registry and Smart Policies settings that enable the client drive redirection
feature.
Prerequisites
If your View deployment includes a back-end firewall between your DMZ-based security servers and your
internal network, verify that the back-end firewall allows traffic to port 9427 on your single-user and RDS
desktops. TCP connections on port 9427 are required to support client drive redirection.
Procedure
1 In the Group Policy Editor, go to Computer Configuration\Policies\Administrative
Templates\Windows Components\Remote Desktop Services\Remote Desktop Session Host\Device
and Resource Redirection.
This navigation path is for Active Directory on Windows Server 2012. The navigation path differs on
other Windows operating systems.
2 Enable the Do not allow drive redirection group policy setting.
Chapter 14 Configuring Remote Desktop Features
VMware, Inc. 211