VDI Security – Hardening Virtual Desktops

The same security measures and hardening you would apply to a physical computer should be applied to virtual machines. You should perform hardening steps for the virtual machine’s server role as indicated in the “Server Role Security Configuration” section in chapter 1, including consulting the appropriate Microsoft Solution Accelerator guidance for the specific operating system….


VDI Security – Virtual Desktop Configuration

The following recommended best practices can help you enhance security when configuring virtual machines on servers running the Hyper-V role: ·         Configure virtual machines to use fixed-sized virtual hard disks. ·         Store virtual hard disks and snapshot files in a secure location. ·         Decide how much memory to assign to a virtual machine. ·         Impose…


VDI Forum

Please use the following forum for Microsoft VDI related questions. I will be following this forum regularly http://social.technet.microsoft.com/Forums/en/windowsserver2008r2virtualization/threads


MED-V v1 Released

Microsoft Enterprise Desktop Virtualization (MED-V) provides deployment and management of virtual Windows desktops to enable key enterprise scenarios. MED-V 1.0 helps enterprises upgrade to the latest version of Windows even when some applications are not yet compatible. MED-V builds on top of Microsoft Virtual PC to run two operating systems on one device, adding virtual…


XP Performance Optimizations for VDI solutions

Paul Wilson has a usefull article on Windows XP Performance Optimizations in VDI scenarios. This one is optimized for Citrix XenDesktop. Windows XP Performance Optimizations for XenDesktop and Provisioning Server vDisks


Windows Server 2008 R2 Beta VDI Solution

VDI is attracting  our enterprise customers for certain user scenarios. Most common user scenario is the task worker  where they want to extend the the hardware lifecycle, improve desktop and application control and centralize the user data. Also contractors and external employees are strong candidates due the security and low-cost desktop provisioinig reasons. Below is a R2 beta version based Microsoft…


Desktop Virtualization Strategy – Part I

There are many desktop virtualization options and possible combinations and therefore the development of a desktop virtualization strategy requires three distinct steps: Map the available technologies Define user needs Match technologies with user needs. Mapping the Technologies User state virtualization. The first and simplest virtualization strategy is to deploy user state virtualization, which separates the…