VMware Horizon 7: Install, Configure, Manage v7

5 Day | Instructor Led

In this course, you will learn how to install, configure, and manage VMware Horizon. You will gain practical experience through the completion of hands-on labs.

Inquire About:
VMware Horizon 7: Install, Configure, Manage v7

Ideal Candidates for VMware Horizon 7: Install, Configure, Manage v7 Class

Technical personnel who work in the IT departments of end-customer companies and people who are responsible for the delivery of remote or virtual desktop services

VMware Horizon 7: Install, Configure, Manage v7 Prerequisites

Attendees should possess the following VMware infrastructure skills:

Use VMware vSphere Web Client to view the state of virtual machines, datastores, and networks
Open a virtual machine console on VMware vCenter Server and access the guest operating system
Create snapshots of virtual machines
Configure guest customization specifications
Modify virtual machine properties
Convert a virtual machine into a template
Deploy a virtual machine from a template
Attendees should also have the following Microsoft Windows system administration experience:

Configure Active Directory services, including DNS, DHCP, and time synchronization
Restrict users’ activities by implementing Group Policy objects
Configure Windows systems to allow Remote Desktop Connections
Build an ODBC connection to an SQL Server database

What You'll Get in VMware Horizon 7: Install, Configure, Manage v7

What You'll Learn in VMware Horizon 7: Install, Configure, Manage v7

VMware Horizon components
Install and configure View Connection Server
Install and configure virtual desktops
Configure and manage VMware Horizon Client systems
Configure and manage pools of physical and virtual machines
Configure and manage automated pools of full virtual machines
Configure and manage pools of linked-clone desktops
Configure and manage automated pools of instant clones
Configure and manage Remote Desktop Services (RDS) pools of desktops and applications
Use Horizon Administrator to configure the VMware Horizon environment
Configure secure access to virtual desktops
Use VMware User Environment Manager™ to manage user personalization and application configurations
Describe steps to deploy profile management
Use VMware App Volumes to provision and manage applications
Manage the performance and scalability of a VMware Horizon deployment

No Certification Test Available For This Course

No Certification Test Available For This Course

VMware Horizon 7: Install, Configure, Manage v7 Outline

1. Course Introduction

  • Course goals, objectives, and outline
  • Additional resources upon completing this course

2. Introduction to VMware Horizon

  • Features and benefits of VMware Horizon
  • Major function of each VMware Horizon component
  • Use case for your virtual desktop and application infrastructure

3. View Connection Server

  • VMware vSphere requirements for a connection server
  • Network and firewall configurations for View Connection Server
  • License VMware Horizon components
  • Configure View Connection Server

4. VMware Horizon Pools and Desktops

  • Process and choices in setting up VMware Horizon 7 virtual machines
  • Remote display protocols that are available in VMware Horizon
  • Ports that must be opened in the machine’s firewall for VMware Horizon operations
  • Configuration choices when installing Horizon Agent
  • Steps to set up a template for desktop pool deployment
  • How information on the Users and Groups page can be used to control and monitor View users
  • Hierarchy of global policies, pool-level policies, and user-level policies
  • View Group Policy administrative (ADM) template files

5. Horizon Client Options

  • Requirements for a Horizon Client installation
  • USB redirection and options
  • Power states for desktops
  • Compare a thin client with a system running Horizon Client
  • Benefits of Virtual Printing
  • Virtual Printing architecture
  • Configuration options for Virtual Printing
  • Location-based printing feature

6. Creating Automated Pools of Full Virtual Machines

  • How an automated pool operates
  • Compare dedicated-assignment and floating-assignment pools
  • Outline the steps to create an automated pool
  • Entitlement of desktops in automated pools

7. Creating and Managing Linked-Clone Desktops

  • VMware linked-clone technology
  • Why both a parent virtual machine and a snapshot must be used to create linked clones
  • System requirements for View Composer
  • Relationship between a persistent disk and the system disk
  • Outline the steps necessary to set up an automated desktop pool that uses linked clones
  • Compare the purpose of the parent and the replica virtual machines
  • Compare the linked-clone management operations
  • Management operations for persistent disks

8. Creating and Managing Instant-Clone Pools

  • Advantages of instant clones
  • Distinguish View Composer clones from instant clones
  • Requirements of instant clones
  • Types of instant-clone virtual machines
  • How folders are used to delegate pool administration
  • Outline the steps to set up an automated pool that uses instant clones
  • Instant-clone limitations in VMware Horizon 7
  • Creation of instant clones
  • Set up an automated pool of instant clones

9. Creating RDS Desktop and Application Pools

  • Difference between an RDS desktop pool and an automated pool
  • How a user can access a single application by using the RDS application pool
  • Relationship between an RDS host, a farm, and an application pool
  • Create an RDS desktop pool and an application pool
  • How the View Composer linked-clone technology can automate the build-out of RDS server farms
  • Load-balancing options for RDS hosts

10. VMware Horizon 7 Authentication

  • Compare the authentication options that View Connection Server supports
  • purpose of TrueSSO single sign-on
  • TrueSSO single sign-on components

11. Managing VMware Horizon Security

  • Compare tunnels and direct connections for client access to desktops
  • Benefits of using either VMware Horizon Security Server or Access Point in the DMZ
  • Identify where the tunnel endpoints are in a security server or an Access Point implementation
  • Identify the tunnel endpoints when the security gateway is not used
  • A direct connection
  • Advantages of direct connections

12. Profile Management Using User Environment Manager

  • Use cases and benefits of using User Environment Manager
  • User Environment Manager and its architecture
  • User Environment Manager functional areas and their benefits
    User Environment Manager profile management and its features
  • Use the User Environment Manager management console and application profiler to manage user personalization and application configurations

13. Using App Volumes to Provision and Manage Applications

  • How App Volumes works
  • Features and benefits of App Volumes
  • Interface elements of App Volumes
  • Install and configure App Volumes

14. Command-Line Tools and Backup Options

  • Key View Connection Server features that are available as command-line options with the vdmadmin command
  • Purpose of kiosk mode for client systems and how it is configured
  • Why you might want to limit the domains that View Connection Server makes available to end users
  • Log locations for each VMware Horizon component

15. VMware Horizon Performance and Scalability

  • Purpose of a replica server
  • Compare a replica server to a standard connection server
  • How multiple VMware Horizon servers maintain synchronization
  • Best practices for multiserver deployment in a pod
  • How a load-balancing capability might improve VMware Horizon performance


A. Erlich


I just wanted to say your presentation on Social Media Technology and Security was the finest I have ever attended.

Wilder Guerra

US Navy Reserve

This course is definitely an eye opener. With how much social media has taken over, it is important to be fully aware of the capabilities along with all the risks it brings. It is important to get this course because social media is the new norm.

Rebekah Coughlin


The Social Media and Security Training course offered by UKI is a great and beneficial course combining technical training to fully understand TCP IP networking, DNS, and the harms of malware and cross-site scripting; as well as practical training that allowed attendees to play with open source social intelligence gathering solutions. This is the perfect class for those involved in IT security and interested in social media and identity theft.

Top Related Courses

In this course, you will focus on installing, configuring, and managing the VMware vRealize Automation platform, including self-service provisioning and the creation of catalog services that include predefined virtual machines, software components, and on-demand VMware NSX networks. This class also helps you understand and achieve the benefits of automation as a component of the software-defined data center (SDDC).

This course features intensive hands-on training that focuses on installing, configuring, and managing VMware vSphere 6.5, which includes VMware ESXi 6.5 and VMware vCenter Server 6.5. You will learn how to administer a vSphere infrastructure for an organization of any size. It is the foundation for most other VMware technologies in the software-defined data center.

In this course, you will learn how to configure and maintain a highly available and scalable virtual infrastructure. Through a mix of lecture and hands-on labs, you will configure and optimize the vSphere features that build a foundation for a truly scalable infrastructure, and you will learn when and where these features have the greatest effect.

© 2019 Ultimate Knowledge Insitute | All Rights Reserved
GSA# GS-35F-0469W