Skip to main content

Desktop Virtualization Software in Virtual Desktop Infrastructure

$249.00
When you get access:
Course access is prepared after purchase and delivered via email
Your guarantee:
30-day money-back guarantee — no questions asked
Toolkit Included:
Includes a practical, ready-to-use toolkit containing implementation templates, worksheets, checklists, and decision-support materials used to accelerate real-world application and reduce setup time.
How you learn:
Self-paced • Lifetime updates
Who trusts this:
Trusted by professionals in 160+ countries
Adding to cart… The item has been added

This curriculum spans the equivalent of a multi-workshop technical engagement for designing, deploying, and operating a production-grade VDI environment, addressing the same architectural, operational, and security considerations as an internal enterprise virtualization team would manage across infrastructure, desktop, and access layers.

Module 1: Architectural Design and Sizing for VDI Environments

  • Selecting between persistent and non-persistent desktop pools based on user workload profiles and data retention requirements.
  • Calculating concurrent user density per host by analyzing CPU, memory, disk I/O, and network bandwidth consumption under peak load.
  • Determining the appropriate hypervisor placement for connection brokers, desktop agents, and management components to minimize latency and single points of failure.
  • Designing storage tiering strategies using SSD caching or all-flash arrays to meet IOPS demands during boot storms.
  • Integrating load balancing mechanisms for connection servers to ensure high availability and session failover.
  • Planning network segmentation for management, desktop, and storage traffic to enforce security and reduce congestion.

Module 2: Hypervisor and Host Infrastructure Configuration

  • Configuring CPU and memory overcommit ratios based on workload predictability and service level agreements.
  • Implementing NUMA node alignment for virtual desktops to optimize memory access and reduce latency.
  • Enabling and tuning hypervisor-level features such as memory ballooning, transparent page sharing, and CPU reservations.
  • Deploying GPU passthrough or vGPU profiles for users requiring CAD, video editing, or 3D rendering capabilities.
  • Setting up host maintenance modes and live migration policies to support patching without desktop disruption.
  • Validating firmware and driver compatibility across server, storage, and network hardware for stable virtualization operations.

Module 3: Desktop Image Management and Golden Image Lifecycle

  • Defining a standardized OS build process with automated patching, application layering, and security baselines.
  • Choosing between full clone, linked clone, or instant clone strategies based on storage efficiency and provisioning speed needs.
  • Scheduling and testing periodic recomposition of non-persistent desktops to apply security updates and configuration changes.
  • Managing application compatibility issues in shared or pooled environments through user environment virtualization.
  • Implementing version control and rollback procedures for golden images to support audit and recovery requirements.
  • Integrating third-party tools for application packaging and deployment to minimize image sprawl and update cycles.

Module 4: User Profile and Data Management Strategies

  • Selecting profile management solutions (FSLogix, UE-V, or native roaming) based on logon performance and roaming needs.
  • Configuring profile container locations on high-performance, resilient storage to prevent logon delays.
  • Defining redirection policies for Documents, Desktop, and AppData to network shares or OneDrive to reduce profile size.
  • Implementing profile size quotas and cleanup scripts to prevent storage bloat and performance degradation.
  • Handling offline access requirements by synchronizing user data across devices with conflict resolution policies.
  • Securing profile containers with encryption and access controls to protect sensitive user data at rest.

Module 5: Connection Broker and Access Layer Configuration

  • Deploying and clustering connection brokers to support failover and load distribution across multiple data centers.
  • Configuring authentication methods (SAML, RADIUS, smart cards) based on organizational identity infrastructure.
  • Setting up secure gateway or reverse proxy components to enable external access without exposing internal desktops.
  • Defining access policies based on user group, device compliance, location, and time-of-day restrictions.
  • Integrating with existing Active Directory structures to manage user-to-desktop assignments and group policies.
  • Monitoring connection latency and session reliability metrics to identify and resolve access bottlenecks.

Module 6: Security, Compliance, and Endpoint Hardening

  • Applying least-privilege principles to virtual desktop templates by removing local admin rights and unnecessary services.
  • Enforcing encryption for desktop VMs at rest using BitLocker or hypervisor-level storage encryption.
  • Implementing anti-malware solutions with centralized management and exclusion rules to avoid performance impact.
  • Configuring audit policies to log user activity, file access, and administrative changes for compliance reporting.
  • Validating VDI deployment against regulatory frameworks such as HIPAA, GDPR, or PCI-DSS through configuration checks.
  • Isolating high-risk desktops (e.g., for contractors or untrusted networks) using dedicated pools and micro-segmentation.

Module 7: Monitoring, Performance Tuning, and Troubleshooting

  • Deploying monitoring agents on desktop VMs and infrastructure components to collect real-time performance data.
  • Establishing baseline metrics for logon duration, frame rate, input latency, and resource utilization per user type.
  • Using synthetic transactions to simulate user logons and detect performance degradation before user impact.
  • Diagnosing boot storm conditions by analyzing storage queue depth and IOPS distribution across datastores.
  • Correlating hypervisor, connection broker, and user session logs to isolate root causes of desktop disconnects.
  • Adjusting display protocol settings (e.g., PCoIP, Blast, RDP) to balance visual quality and bandwidth consumption.

Module 8: Scalability, Disaster Recovery, and Lifecycle Management

  • Designing multi-site VDI deployments with local desktop provisioning to reduce WAN dependency and latency.
  • Implementing automated scaling of desktop pools based on real-time demand using orchestration tools.
  • Configuring replication of desktop VMs and user data to a secondary site for failover during site outages.
  • Testing failover and failback procedures for connection brokers, databases, and storage systems annually.
  • Planning for end-of-life upgrades by validating compatibility with new OS versions and hardware platforms.
  • Decommissioning unused desktop images and snapshots to reclaim storage and reduce backup overhead.