Skip to main content

Infrastructure For VDI in Virtual Desktop Infrastructure

$249.00
Your guarantee:
30-day money-back guarantee — no questions asked
Who trusts this:
Trusted by professionals in 160+ countries
How you learn:
Self-paced • Lifetime updates
Toolkit Included:
Includes a practical, ready-to-use toolkit containing implementation templates, worksheets, checklists, and decision-support materials used to accelerate real-world application and reduce setup time.
When you get access:
Course access is prepared after purchase and delivered via email
Adding to cart… The item has been added

This curriculum spans the equivalent of a multi-phase infrastructure advisory engagement, addressing compute, storage, network, security, and operational resilience decisions required to design, deploy, and sustain enterprise-grade VDI at scale.

Module 1: Assessing Organizational Readiness and Use Case Alignment

  • Conduct a user segmentation analysis to classify desktop workloads into knowledge, task, and power user categories based on application intensity and usage patterns.
  • Evaluate existing application delivery mechanisms to determine compatibility with centralized desktop models, including legacy client-server apps requiring local execution.
  • Map geographic distribution of users to identify optimal data center or cloud region placement for low-latency access.
  • Assess helpdesk capacity and incident trends to project changes in support demand post-VDI migration, particularly around profile and peripheral issues.
  • Review compliance requirements such as data residency, audit logging, and access controls to determine if VDI introduces new regulatory obligations.
  • Compare total cost of ownership (TCO) between traditional desktop refresh cycles and VDI, factoring in storage, licensing, and network upgrades.

Module 2: Designing the Compute Architecture for Scalability and Performance

  • Select between persistent and non-persistent desktop pools based on user personalization needs and IT manageability trade-offs.
  • Size host clusters with appropriate CPU core density and memory overcommit ratios, considering hypervisor overhead and peak concurrency.
  • Implement CPU and memory resource reservations for mission-critical desktops to prevent performance degradation during host contention.
  • Configure virtual machine templates with standardized OS images, drivers, and agent software to ensure consistency across deployments.
  • Plan for burst capacity using cloud-hosted desktops or reserved instances to handle temporary workforce increases without over-provisioning on-premises hardware.
  • Integrate monitoring tools to track VM-level metrics such as CPU ready time, memory ballooning, and hypervisor latency for proactive tuning.

Module 3: Storage Architecture and I/O Optimization

  • Choose between tiered SAN, hyperconverged infrastructure, or cloud object storage based on performance SLAs, data protection needs, and operational complexity.
  • Implement storage quality of service (QoS) policies to prevent noisy neighbor effects in shared storage environments.
  • Deploy caching mechanisms such as RAM-based or SSD read caches to absorb boot and login storms in non-persistent environments.
  • Configure thin provisioning with alerts for overcommitment thresholds to avoid runtime storage exhaustion.
  • Optimize disk layout by separating OS, user data, and swap files onto different volumes with appropriate RAID and replication settings.
  • Use storage analytics to identify I/O bottlenecks and adjust block sizes, queue depths, or replication intervals accordingly.

Module 4: Network Design for Latency-Sensitive Delivery

  • Implement QoS policies on network switches and routers to prioritize VDI traffic, particularly display protocols like Blast or PCoIP.
  • Design separate VLANs for management, desktop, and storage traffic to reduce broadcast domains and improve security segmentation.
  • Deploy WAN optimization or SD-WAN solutions for remote sites to mitigate latency and packet loss affecting user experience.
  • Configure UDP-based display protocols with fallback to TCP in environments with aggressive firewall rules or poor packet loss recovery.
  • Size bandwidth capacity based on peak user concurrency and application usage, including allowance for peripheral redirection and file transfers.
  • Integrate network path monitoring to detect and alert on jitter, latency spikes, or routing changes impacting desktop responsiveness.

Module 5: Identity, Access, and Security Integration

  • Integrate multi-factor authentication (MFA) at the connection broker level to enforce strong access controls before desktop launch.
  • Map Active Directory group policies to VDI desktops while resolving conflicts between local and domain-based policy enforcement.
  • Implement role-based access control (RBAC) for administrative functions to limit configuration changes to authorized personnel.
  • Enforce encryption for desktop images at rest and in transit using TLS and storage-level encryption mechanisms.
  • Configure session timeouts and automatic logoff policies to reduce exposure from unattended desktop sessions.
  • Integrate with SIEM systems to forward authentication logs, connection events, and policy violations for centralized monitoring.

Module 6: Desktop Delivery and Connection Broker Configuration

  • Select a connection broker based on feature support for load balancing, farm grouping, and cross-site desktop assignment.
  • Configure load balancing algorithms to distribute user sessions based on host CPU, memory, or session count thresholds.
  • Implement smart card or certificate-based authentication for regulated environments requiring high-assurance identity validation.
  • Define automated desktop provisioning and reclamation schedules to align with business hours and reduce idle resource consumption.
  • Test and validate failover procedures for connection brokers to maintain availability during outages or maintenance.
  • Enable client-side printer and drive redirection with filtering rules to prevent unauthorized data exfiltration.

Module 7: Monitoring, Support, and Lifecycle Management

  • Deploy end-user experience monitoring tools to capture display latency, input response time, and application launch duration.
  • Establish baseline performance metrics for normal operation to enable rapid detection of degradation events.
  • Configure automated alerts for critical conditions such as storage full, broker unavailability, or high VM boot times.
  • Develop standardized troubleshooting playbooks for common issues including profile corruption, peripheral mapping failures, and display artifacts.
  • Plan OS and application patching cycles for desktop images using golden image rebuilds or layering technologies to minimize downtime.
  • Implement version control and change management for VM templates and broker configurations to support audit and rollback requirements.

Module 8: Disaster Recovery and Business Continuity Planning

  • Define RPO and RTO for VDI components and align replication frequency and failover procedures accordingly.
  • Replicate critical VMs and connection brokers to a secondary site or cloud region using synchronous or asynchronous methods based on distance and bandwidth.
  • Test failover procedures regularly to validate desktop availability and user reconnection mechanisms during outages.
  • Maintain offline copies of golden images and configuration backups in case of primary storage corruption or ransomware events.
  • Document user communication protocols for redirecting to alternate access methods during extended VDI outages.
  • Evaluate cloud-based DR services for VDI to reduce on-premises footprint while maintaining recovery readiness.