Skip to main content

Remote Desktop in Virtual Desktop Infrastructure

$249.00
When you get access:
Course access is prepared after purchase and delivered via email
How you learn:
Self-paced • Lifetime updates
Your guarantee:
30-day money-back guarantee — no questions asked
Who trusts this:
Trusted by professionals in 160+ countries
Toolkit Included:
Includes a practical, ready-to-use toolkit containing implementation templates, worksheets, checklists, and decision-support materials used to accelerate real-world application and reduce setup time.
Adding to cart… The item has been added

This curriculum spans the technical breadth of a multi-workshop infrastructure rollout, addressing the same design, integration, and operational challenges encountered in enterprise VDI deployments from initial architecture through ongoing security and performance management.

Module 1: Architecture Design and Sizing for VDI Environments

  • Selecting between persistent and non-persistent desktop pools based on user profile requirements and storage cost implications.
  • Determining host VM density per physical server while balancing CPU, memory, and IOPS constraints to avoid resource contention.
  • Designing network segmentation for broker, connection, and display protocols to minimize latency and isolate management traffic.
  • Choosing between GPU passthrough and virtual GPU (vGPU) profiles for knowledge workers versus power users with graphics-intensive applications.
  • Calculating required bandwidth per user session based on display resolution, frame rate, and peripheral redirection usage.
  • Integrating load balancers and DNS policies to support high availability for connection brokers across multiple data centers.

Module 2: Hypervisor and Infrastructure Integration

  • Configuring VM resource reservations and limits in VMware vSphere or Microsoft Hyper-V to ensure consistent desktop performance.
  • Implementing storage tiering using SSD caching or all-flash arrays to meet boot storm IOPS demands during peak logon hours.
  • Deploying and managing VM templates with sysprep or cloud-init to standardize desktop image deployment across pools.
  • Setting up vMotion or Live Migration compatibility across clusters to support maintenance without session disruption.
  • Configuring NIC teaming and jumbo frames on hypervisor hosts to optimize network throughput for display protocols.
  • Integrating infrastructure monitoring tools (e.g., vRealize, SCOM) to track hypervisor-level metrics impacting desktop performance.

Module 3: Remote Display Protocol Optimization

  • Tuning PCoIP, Blast Extreme, or RDP settings to balance visual fidelity and bandwidth consumption for WAN users.
  • Disabling unnecessary multimedia redirection or USB device support to reduce protocol overhead and improve responsiveness.
  • Enabling adaptive transport features based on real-time network conditions to maintain session stability over fluctuating links.
  • Configuring lossless versus lossy compression settings for CAD or medical imaging use cases requiring pixel-perfect rendering.
  • Implementing UDP versus TCP fallback policies to handle firewall restrictions while preserving protocol performance.
  • Profiling user workloads to apply protocol-specific GPOs or configuration policies based on application usage patterns.

Module 4: Identity, Access, and Authentication Management

  • Integrating multi-factor authentication (MFA) with connection brokers using RADIUS or SAML without increasing login latency.
  • Mapping Active Directory group policies to VDI access controls to enforce role-based desktop assignments.
  • Configuring smart card or certificate-based authentication for regulated environments requiring non-repudiation.
  • Managing session timeouts and reconnection policies to balance security with user productivity during intermittent connectivity.
  • Implementing conditional access rules based on device compliance, location, or network posture before granting desktop access.
  • Auditing authentication attempts and failed logons across brokers and gateways for compliance and threat detection.

Module 5: Image Management and Lifecycle Operations

  • Scheduling and testing non-disruptive image updates using recompose operations in linked clone environments.
  • Managing golden image versioning and rollback procedures to support patch compliance and application updates.
  • Integrating third-party tools like Microsoft SCCM or VMware Update Manager for OS patching within VDI templates.
  • Implementing application layering with solutions like App Volumes or MSIX to decouple software from base images.
  • Monitoring storage growth from user profile data and managing quotas to prevent datastore overutilization.
  • Enforcing antivirus and endpoint protection policies within desktop images without degrading boot performance.

Module 6: User Profile and Personalization Strategy

  • Selecting between roaming profiles, FSLogix, or UE-V based on profile size, logon duration, and Office application usage.
  • Configuring profile container redirection to network shares or Azure Files with appropriate caching mechanisms.
  • Managing registry hive size and exclusion lists to prevent profile bloat and slow logon times.
  • Implementing mandatory profile components for kiosk or task workers while allowing selective personalization.
  • Monitoring profile corruption incidents and automating remediation through login scripts or monitoring tools.
  • Designing fallback mechanisms for profile access during file server outages to maintain user session continuity.

Module 7: Monitoring, Troubleshooting, and Performance Tuning

  • Deploying end-to-end monitoring tools to correlate user experience metrics with infrastructure performance data.
  • Interpreting display protocol packet loss, latency, and jitter metrics to isolate network versus server bottlenecks.
  • Using session shadowing or remote assistance features to diagnose user-reported performance issues without session takeover.
  • Establishing baseline performance thresholds for CPU, memory, and disk latency to trigger proactive alerts.
  • Conducting log analysis from connection brokers, agents, and hypervisors to trace authentication or connection failures.
  • Performing load testing with synthetic users to validate scalability before rolling out to large user groups.

Module 8: Security, Compliance, and Data Protection

  • Enforcing encryption for desktop images at rest using VM-level or storage array-based mechanisms.
  • Configuring clipboard and file transfer restrictions between local and remote sessions based on data classification policies.
  • Implementing Just-In-Time (JIT) access and privileged access management for administrative console access.
  • Applying network micro-segmentation to isolate VDI components and prevent lateral movement in case of compromise.
  • Conducting regular vulnerability scans and hardening of connection brokers, gateways, and desktop OS images.
  • Designing backup and recovery procedures for user profiles and persistent desktops to meet RPO and RTO requirements.