Skip to main content

VDI Migration in Virtual Desktop Infrastructure

$249.00
Who trusts this:
Trusted by professionals in 160+ countries
When you get access:
Course access is prepared after purchase and delivered via email
Toolkit Included:
Includes a practical, ready-to-use toolkit containing implementation templates, worksheets, checklists, and decision-support materials used to accelerate real-world application and reduce setup time.
How you learn:
Self-paced • Lifetime updates
Your guarantee:
30-day money-back guarantee — no questions asked
Adding to cart… The item has been added

This curriculum spans the equivalent of a multi-phase VDI migration advisory engagement, covering technical and operational considerations from initial assessment through disaster recovery, comparable to the scope of an enterprise-wide virtual desktop transformation program.

Module 1: Assessment and Readiness Evaluation

  • Conduct inventory audits of existing physical and virtual desktops to determine application compatibility with target VDI platform.
  • Profile user workloads by department to classify desktop requirements into knowledge worker, task worker, and power user categories.
  • Evaluate network latency and bandwidth between user locations and data centers to identify sites unsuitable for centralized VDI.
  • Assess storage IOPS requirements during peak boot and login storms using historical performance data from current desktops.
  • Determine licensing eligibility for Windows client operating systems under VDI scenarios based on existing Microsoft volume licensing agreements.
  • Engage application owners to test critical line-of-business applications in non-production VDI environments for rendering and performance issues.

Module 2: Architecture Design and Sizing

  • Select between persistent and non-persistent desktop pools based on user personalization needs and IT support overhead tolerance.
  • Size connection broker infrastructure to handle concurrent user logins, factoring in failover capacity and geographic distribution.
  • Design storage tiering strategy using SSD and HDD arrays to balance cost and performance for OS, user profile, and application layers.
  • Calculate GPU requirements for engineering and design users and decide between physical GPU passthrough and virtual GPU (vGPU) allocation.
  • Define network VLAN segmentation and QoS policies to prioritize PCoIP, Blast, or RDP traffic over WAN links.
  • Architect high availability for critical VDI components including brokers, gateways, and database servers using clustering or load balancing.

Module 3: Image Management and Golden Image Strategy

  • Establish a change control process for golden image updates, including testing cycles and rollback procedures.
  • Decide between full image cloning and layering technologies (e.g., App Layering, FSLogix) based on application delivery complexity.
  • Integrate golden image builds into CI/CD pipelines using automation tools like HashiCorp Packer or VMware Image Builder.
  • Implement driver management strategy to support diverse endpoint devices accessing the same base image.
  • Define patching cadence for OS and security updates within golden images, balancing compliance and stability.
  • Optimize image size by removing unnecessary components and pre-installing common software to reduce provisioning time.

Module 4: User Profile and Data Management

  • Deploy profile containerization using FSLogix or UE-V to ensure consistent user experience across non-persistent desktops.
  • Configure OneDrive and Teams redirection policies to minimize profile bloat and improve logon performance.
  • Establish file share access controls and quotas for redirected folders (Documents, Desktop, AppData).
  • Design profile backup and recovery procedures for disaster scenarios involving profile store corruption.
  • Implement exclusion rules for large or frequently changing files in profile containers to prevent performance degradation.
  • Evaluate on-premises versus cloud-based profile storage based on latency, cost, and data sovereignty requirements.

Module 5: Security and Access Control

  • Enforce multi-factor authentication for external access via VDI gateways using RADIUS or SAML integration.
  • Configure role-based access control (RBAC) in the VDI console to limit administrative privileges to specific desktop pools.
  • Implement endpoint compliance checks through NAC or conditional access policies before allowing broker connections.
  • Apply Just Enough Administration (JEA) principles to limit PowerShell and console access for support staff.
  • Encrypt desktop images and profile stores at rest using platform-native or third-party encryption tools.
  • Integrate VDI session logging with SIEM systems to detect anomalous user behavior or data exfiltration attempts.

Module 6: Network and Performance Optimization

  • Select display protocol (PCoIP, Blast Extreme, HDX) based on WAN conditions, client device capabilities, and security posture.
  • Deploy WAN optimization appliances or SD-WAN solutions to reduce latency and packet loss for remote users.
  • Configure adaptive transport settings to dynamically switch between UDP and TCP based on network quality.
  • Implement client-side rendering for multimedia content to reduce server CPU and bandwidth consumption.
  • Monitor and tune MTU settings across network paths to prevent fragmentation in UDP-based display protocols.
  • Establish baseline performance metrics for login duration, application launch time, and input responsiveness for SLA tracking.

Module 7: Monitoring, Support, and Lifecycle Management

  • Deploy synthetic transaction monitoring to simulate user logins and detect broker or infrastructure failures.
  • Configure alerts for storage latency spikes, connection broker queue depth, and VM power state anomalies.
  • Integrate VDI event logs with existing ITSM platforms to automate incident ticket creation for common failures.
  • Develop escalation paths for resolving issues involving multiple domains (network, storage, AD, VDI).
  • Plan desktop refresh cycles to phase out older VM hardware versions and maintain hypervisor compatibility.
  • Conduct quarterly capacity reviews to adjust host, storage, and license allocations based on usage trends.

Module 8: Business Continuity and Disaster Recovery

  • Define RPO and RTO for VDI workloads and align replication frequency of desktop VMs and profile stores accordingly.
  • Replicate critical VDI components (brokers, databases, connection servers) to secondary site with automated DNS failover.
  • Test failover procedures for non-persistent desktop pools, ensuring image repositories are accessible at DR site.
  • Validate user profile replication consistency between primary and secondary file servers.
  • Document manual connection procedures for users to access desktops during automated broker failover delays.
  • Include VDI in enterprise-wide backup validation exercises to confirm recoverability of configuration databases.