Skip to main content

VDI Infrastructure in Virtual Desktop Infrastructure

$249.00
Your guarantee:
30-day money-back guarantee — no questions asked
Toolkit Included:
Includes a practical, ready-to-use toolkit containing implementation templates, worksheets, checklists, and decision-support materials used to accelerate real-world application and reduce setup time.
How you learn:
Self-paced • Lifetime updates
When you get access:
Course access is prepared after purchase and delivered via email
Who trusts this:
Trusted by professionals in 160+ countries
Adding to cart… The item has been added

This curriculum spans the equivalent of a multi-workshop technical engagement, addressing the full lifecycle of VDI infrastructure design, deployment, and operations as typically managed by enterprise infrastructure teams supporting large-scale virtual desktop environments.

Module 1: Architecture Design and Sizing

  • Selecting between persistent and non-persistent desktop pools based on user profile requirements and storage cost implications.
  • Calculating CPU and memory overcommit ratios while maintaining performance SLAs during peak login storms.
  • Determining the appropriate hypervisor cluster size to balance high availability with management overhead.
  • Designing network segmentation for management, vMotion, storage, and desktop traffic to prevent congestion.
  • Choosing between full clone and linked clone provisioning based on patching frequency and storage efficiency.
  • Integrating load balancers and connection brokers to distribute user sessions across multiple Horizon pods.

Module 2: Storage Strategy and Optimization

  • Implementing tiered storage policies using SSD and HDD tiers for VDI write cache and base image storage.
  • Configuring storage I/O control to prioritize desktop workloads during backup or maintenance windows.
  • Deploying deduplication and compression at the storage layer without introducing latency spikes.
  • Planning for disposable disk placement in non-persistent environments to minimize storage churn.
  • Monitoring and tuning IOPS per desktop to meet application performance requirements.
  • Integrating storage APIs (VAAI) to offload clone and snapshot operations from the hypervisor.

Module 3: Network Design and Traffic Management

  • Configuring QoS policies on physical and virtual switches to prioritize PCoIP or Blast Extreme traffic.
  • Designing WAN optimization strategies for remote users accessing VDI from branch offices.
  • Implementing VLANs and firewall rules to isolate desktop, management, and backend infrastructure traffic.
  • Planning for UDP vs. TCP transport selection based on network reliability and user location.
  • Deploying edge gateways in DMZs to securely expose desktops to external users without exposing internal systems.
  • Measuring and mitigating network latency impact on real-time applications like VoIP within virtual desktops.

Module 4: Image Management and Lifecycle

  • Creating gold images with standardized OS builds, applications, and security baselines using automation tools.
  • Scheduling recompose operations for linked clone pools during maintenance windows to minimize disruption.
  • Managing application layering with solutions like App Volumes or FSLogix to decouple software from base images.
  • Testing and validating image updates in a staging environment before production rollout.
  • Handling driver injection for diverse endpoint devices without bloating the master image.
  • Enforcing patch compliance by integrating image builds with WSUS or Configuration Manager pipelines.

Module 5: Security and Compliance Enforcement

  • Applying role-based access control (RBAC) to limit administrative privileges across VDI components.
  • Encrypting desktop VMs at rest using hypervisor-level encryption or guest OS BitLocker policies.
  • Integrating multi-factor authentication (MFA) at the connection broker or identity provider level.
  • Configuring antivirus and EDR solutions to avoid performance degradation from simultaneous scans.
  • Implementing USB redirection policies with device whitelisting to prevent data exfiltration.
  • Auditing user session activity and connection logs for compliance with regulatory frameworks like HIPAA or GDPR.

Module 6: Monitoring, Performance Tuning, and Support

  • Deploying monitoring agents to collect per-desktop metrics on CPU, memory, disk, and network usage.
  • Establishing baseline performance thresholds to trigger alerts for degraded user experience.
  • Using synthetic transactions to simulate logon loads and identify bottlenecks before peak usage.
  • Correlating Horizon logs with vCenter and Active Directory events during incident investigations.
  • Optimizing display protocol settings to balance visual fidelity and bandwidth consumption.
  • Creating standardized troubleshooting runbooks for common issues like failed logons or black screens.

Module 7: Business Continuity and Scalability Planning

  • Designing cross-site replication for desktop VMs and user data to support disaster recovery objectives.
  • Implementing automated failover procedures for connection servers and brokers during outages.
  • Planning capacity headroom to accommodate seasonal workforce increases or acquisitions.
  • Integrating VDI with cloud bursting strategies using Azure or AWS to handle overflow demand.
  • Managing user profile storage with solutions like FSLogix or UE-V to ensure consistency across sessions.
  • Validating backup and restore procedures for both infrastructure components and user data sets.

Module 8: End-User Experience and Endpoint Integration

  • Configuring peripheral redirection policies for printers, scanners, and smart cards based on department needs.
  • Optimizing audio and video redirection for conferencing applications like Teams or Zoom.
  • Deploying client software on diverse endpoint devices (Windows, macOS, thin clients, tablets).
  • Managing offline desktop access for mobile workers using local mode or cloud-hosted alternatives.
  • Standardizing display resolution and DPI scaling settings to prevent application rendering issues.
  • Enabling clipboard and file transfer controls to balance usability with data security policies.