VMware View Security Essentials
()
About this ebook
Read more from Langenhan Daniel
VMware vCloud Director Cookbook Rating: 0 out of 5 stars0 ratingsInstant VMware vCloud Starter Rating: 0 out of 5 stars0 ratingsVMware vRealize Orchestrator Essentials Rating: 0 out of 5 stars0 ratingsVMware vRealize Orchestrator Cookbook Rating: 0 out of 5 stars0 ratingsVMware vRealize Orchestrator Cookbook - Second Edition Rating: 5 out of 5 stars5/5
Related to VMware View Security Essentials
Related ebooks
Learning AirWatch Rating: 5 out of 5 stars5/5Hyper-V Security Rating: 0 out of 5 stars0 ratingsInstant Citrix Security How-to Rating: 0 out of 5 stars0 ratingsDisaster Recovery Using VMware vSphere Replication and vCenter Site Recovery Manager Rating: 0 out of 5 stars0 ratingsMicrosoft DirectAccess Best Practices and Troubleshooting Rating: 5 out of 5 stars5/5VMware vSphere Security Cookbook Rating: 0 out of 5 stars0 ratingsPrivacy And Cybersecurity A Complete Guide - 2019 Edition Rating: 0 out of 5 stars0 ratingsThirdParty Cybersecurity Risk Management A Complete Guide - 2019 Edition Rating: 0 out of 5 stars0 ratingsSecurity, Privacy, and Digital Forensics in the Cloud Rating: 0 out of 5 stars0 ratingsCybersecurity Regulations A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsManaging Online Risk: Apps, Mobile, and Social Media Security Rating: 0 out of 5 stars0 ratingsCybersecurity Center A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsPenetration Testing Fundamentals -1: Penetration Testing Study Guide To Breaking Into Systems Rating: 0 out of 5 stars0 ratingsPrivacy Impact A Complete Guide - 2019 Edition Rating: 0 out of 5 stars0 ratingsNetwork Security A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsUltimate Splunk for Cybersecurity Rating: 0 out of 5 stars0 ratingsNetwork Security Evaluation Using the NSA IEM Rating: 3 out of 5 stars3/5Elastix Unified Communications Server Cookbook Rating: 0 out of 5 stars0 ratingsSecrets Management A Complete Guide - 2019 Edition Rating: 0 out of 5 stars0 ratingsSecurity And Privacy Governance A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsSnort Intrusion Detection and Prevention Toolkit Rating: 5 out of 5 stars5/5Data Protection Standard Requirements Rating: 0 out of 5 stars0 ratingsPrivacy Engineering A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsCyber Security Audit A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsAccess Control Biometrics A Complete Guide Rating: 0 out of 5 stars0 ratingsDLP Architecture Second Edition Rating: 0 out of 5 stars0 ratingsCybersecurity Regulations A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsSecurity Monitoring A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsPrivacy-Preserving Machine Learning Rating: 0 out of 5 stars0 ratingsSecurity Technology Convergence Insights Rating: 0 out of 5 stars0 ratings
Computers For You
The Invisible Rainbow: A History of Electricity and Life Rating: 4 out of 5 stars4/5Alan Turing: The Enigma: The Book That Inspired the Film The Imitation Game - Updated Edition Rating: 4 out of 5 stars4/5101 Awesome Builds: Minecraft® Secrets from the World's Greatest Crafters Rating: 4 out of 5 stars4/5Slenderman: Online Obsession, Mental Illness, and the Violent Crime of Two Midwestern Girls Rating: 4 out of 5 stars4/5Mastering ChatGPT: 21 Prompts Templates for Effortless Writing Rating: 5 out of 5 stars5/5Standard Deviations: Flawed Assumptions, Tortured Data, and Other Ways to Lie with Statistics Rating: 4 out of 5 stars4/5Elon Musk Rating: 4 out of 5 stars4/5Dark Aeon: Transhumanism and the War Against Humanity Rating: 5 out of 5 stars5/5SQL QuickStart Guide: The Simplified Beginner's Guide to Managing, Analyzing, and Manipulating Data With SQL Rating: 4 out of 5 stars4/5The ChatGPT Millionaire Handbook: Make Money Online With the Power of AI Technology Rating: 0 out of 5 stars0 ratingsProcreate for Beginners: Introduction to Procreate for Drawing and Illustrating on the iPad Rating: 0 out of 5 stars0 ratingsGrokking Algorithms: An illustrated guide for programmers and other curious people Rating: 4 out of 5 stars4/5Hacking: Ultimate Beginner's Guide for Computer Hacking in 2018 and Beyond: Hacking in 2018, #1 Rating: 4 out of 5 stars4/5How to Create Cpn Numbers the Right way: A Step by Step Guide to Creating cpn Numbers Legally Rating: 4 out of 5 stars4/5The Insider's Guide to Technical Writing Rating: 0 out of 5 stars0 ratingsCompTIA Security+ Practice Questions Rating: 2 out of 5 stars2/5CompTIA IT Fundamentals (ITF+) Study Guide: Exam FC0-U61 Rating: 0 out of 5 stars0 ratingsEverybody Lies: Big Data, New Data, and What the Internet Can Tell Us About Who We Really Are Rating: 4 out of 5 stars4/5Summary of Max Tegmark's Life 3.0 Rating: 0 out of 5 stars0 ratingsRemote/WebCam Notarization : Basic Understanding Rating: 3 out of 5 stars3/5Artificial Intelligence: The Complete Beginner’s Guide to the Future of A.I. Rating: 4 out of 5 stars4/5Creating Online Courses with ChatGPT | A Step-by-Step Guide with Prompt Templates Rating: 4 out of 5 stars4/5Master Builder Roblox: The Essential Guide Rating: 4 out of 5 stars4/5The Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5Deep Search: How to Explore the Internet More Effectively Rating: 5 out of 5 stars5/5
Reviews for VMware View Security Essentials
0 ratings0 reviews
Book preview
VMware View Security Essentials - Langenhan Daniel
Table of Contents
VMware View Security Essentials
Credits
About the Author
About the Reviewers
www.PacktPub.com
Support files, eBooks, discount offers and more
Why Subscribe?
Free Access for Packt account holders
Instant Updates on New Packt Books
Preface
What this book covers
What you need for this book
Who this book is for
Conventions
Reader feedback
Customer support
Errata
Piracy
Questions
1. Introduction to View
VMware View definitions
Summary
2. Securing Your Base
vSphere considerations
VMware High Availability (HA)
Fault Tolerance (FT)
DRS and resource pools
Capacity planning
Basic View hardening
vSphere hardening
Operating system (OS) hardening
User accounts
A View Administrator Console user
Services
Logging
The Event Database
Logfiles
VMware support logs
SSL certificates
Creating a Certificate Authority (CA) and obtaining a certificate
Creating a CA on AD
Creating a certificate
Importing a certificate
Retrofit vSphere
The View Composer
Installer
Retrofit
The View Connection Server
Creating a redundant View Connection Server
Usage of a replica server
Installation of a replica server
Creating a load balanced View Connection Server
A configuration example with vCloud Network and Security (vCNS or vShield)
Summary
3. Securing the Connection
View connections
A View DMZ
View Security Server
Setup
Load balancing
General connection settings
Desktop connection
A quick look at TCP and UDP
Remote Desktop Protocol (RDP)
PCoverIP (PCoIP)
RDP and PCoIP – direct comparison
Setting up PCoIP Secure Gateway
HTTP(s) secure tunnel
USB redirection
Multimedia redirect (MMR)
View Transfer Server
Setup
Server connection
View connect and security firewall rules
Summary
4. Securing the Client
Client software
View Client
View Agent
Local Mode
Global settings
View desktop pools
The Settings tab
The Inventory tab
The Sessions tab
The Entitlements tab
The Events tab
The Policies tab
Working with ADM templates
Importing View ADM templates
View Agent settings
View Client settings
Working with USB devices
View Persona management
Example setup
Summary
5. Backup and Recovery
Backup and recovery
The vSphere environment
VMware View Servers
Basic infrastructure
Desktop pools and linked cloning
Documenting – the ultimate backup
Backup timing
Patching the View environment
View server
View desktops
Summary
Index
VMware View Security Essentials
VMware View Security Essentials
Copyright © 2013 Packt Publishing
All rights reserved. No part of this book may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written permission of the publisher, except in the case of brief quotations embedded in critical articles or reviews.
Every effort has been made in the preparation of this book to ensure the accuracy of the information presented. However, the information contained in this book is sold without warranty, either express or implied. Neither the author, nor Packt Publishing, and its dealers and distributors will be held liable for any damages caused or alleged to be caused directly or indirectly by this book.
Packt Publishing has endeavored to provide trademark information about all of the companies and products mentioned in this book by the appropriate use of capitals. However, Packt Publishing cannot guarantee the accuracy of this information.
First published: July 2013
Production Reference: 1190713
Published by Packt Publishing Ltd.
Livery Place
35 Livery Street
Birmingham B3 2PB, UK.
ISBN 978-1-78217-008-2
www.packtpub.com
Cover Image by Jarek Blaminsky (<milak6@wp.pl>)
Credits
Author
Daniel Langenhan
Reviewers
Christian Rudolph
Ramses Smeyers
Acquisition Editor
Andrew Duckworth
Commissioning Editor
Mohammed Fahad
Technical Editors
Sharvari H Baet
Jalasha D'costa
Pratik More
Amit Ramadas
Project Coordinator
Amigya Khurrana
Proofreader
Amy Guest
Indexer
Monica Ajmera Mehta
Graphics
Abhinash Sahu
Ronak Dhruv
Production Coordinator
Nilesh R. Mohite
Cover Work
Nilesh R. Mohite
About the Author
Daniel Langenhan is a client-focused virtualization expert with more than 18 years of international industry experience.
His skills span the breadth of virtualization, ranging from Architecture, Design, and implementation for large multitier enterprise client systems to delivering captivating education and training sessions in security technologies, and practices to diverse audiences.
He also possesses an extensive knowledge and experience in Process management, Enterprise level storage, and Linux and Solaris operating systems.
Utilizing his extensive knowledge, experience, and skills, he has a proven track record of successful integration of virtualization into different business areas, while minimizing cost and maximizing reliability and effectiveness of the solution for his clients.
He has gained some experience working with major Australian and International vendors and clients. Daniel's consulting company is well established with strong industry ties in many verticals; for example, Finance, Telecommunications, and Print. His consulting business also provided services to VMware International.
I would like to thank my wife Renata for her tireless support, without her this book would have not been possible.
About the Reviewers
Christian Rudolph is a Cloud consultant who has worked with virtualization technologies since 2003. He started as a virtualization infrastructure architect and worked in several server consolidation projects. Later, he built the operational team for the virtualization and was the responsible technical lead for this. During this time, he also got in touch with possible virtualization solution for end users, where he was part of some projects to build virtual desktops for end users. Since 2012, he is responsible to build and design the cloud solution of his company with a focus on infrastructure-as-a-service and desktop-as-a-service.
Christian holds the VCP-DCV 2/3/4/5 certification and has been also selected as a vExpert in 2013.
Ramses Smeyers is part of Cisco Technical Services where he works with the Datacenter Solutions support team. His main job consists of supporting customers to implement and manage Cisco UCS, VDI, and VXI infrastructures. He has a very strong background in computing, networking, and storage, and has more than 10 years of experience deploying enterprise and service provider datacenter solutions. His relevant certifications include VMware VCP/VCAP DCA|DCD/VCDX, Cisco CCIE Voice, RHCE, and Cisco Data Center Unified Computing Support Specialist.
www.PacktPub.com
Support files, eBooks, discount offers and more
You might want to visit www.PacktPub.com for support files and downloads related to your book.
Did you know that Packt offers eBook versions of every book published, with PDF and ePub files available? You can upgrade to the eBook version at www.PacktPub.com and as a print book customer, you are entitled to a discount on the eBook copy. Get in touch with us at
At www.PacktPub.com, you can also read a collection of free technical articles, sign up for a range of free newsletters and receive exclusive discounts and offers on Packt books and eBooks.
http://PacktLib.PacktPub.com
Do you need instant solutions to your IT questions? PacktLib is Packt's online digital book library. Here, you can access, read and search across Packt's entire library of books.
Why Subscribe?
Fully searchable across every book published by Packt
Copy and paste, print and bookmark content
On demand and accessible via web browser
Free Access for Packt account holders
If you have an account with Packt at www.PacktPub.com, you can use this to access PacktLib today and view nine entirely free books. Simply use your login credentials for immediate access.
Instant Updates on New Packt Books
Get notified! Find out when new books are published by following @PacktEnterprise on Twitter, or the Packt Enterprise Facebook page.
Preface
Most people associate security with network security and focus on firewalls and network monitoring. But security is more than that. It starts with establishing a stable environment, protecting this environment not only from intrusion but also from malicious intent. Last but not the least it is