This curriculum spans the equivalent of a multi-workshop technical engagement, covering the full lifecycle of VDI deployment and operations—from architecture and image management to security, monitoring, and endpoint integration—mirroring the scope of an internal enterprise capability program for virtual desktop and application delivery.
Module 1: Architecture Design and Sizing for VDI Environments
- Selecting between persistent and non-persistent desktop pools based on user profile requirements and storage cost implications.
- Determining host-to-VM density ratios while accounting for CPU overcommitment policies and memory ballooning risks.
- Designing network segmentation for management, vMotion, and user traffic to prevent bandwidth contention and ensure isolation.
- Choosing storage architectures (e.g., SAN, NAS, hyper-converged) based on IOPS requirements for boot, login, and peak usage storms.
- Planning for high availability by configuring vSphere HA, DRS, and fault tolerance settings aligned with SLA requirements.
- Integrating load balancers and connection brokers to distribute user sessions across multiple Horizon Connection Servers.
Module 2: Virtual Application Delivery Mechanisms
- Deciding between full virtual desktops and published applications using RDSH or App Volumes based on application compatibility and licensing.
- Sequencing and packaging applications with App-V or ThinApp to resolve dependency conflicts and ensure clean isolation.
- Configuring application entitlements through Active Directory groups versus dynamic assignment via UEM policies.
- Managing application updates in non-persistent environments using layered image management or dynamic app layering tools.
- Handling GPU-intensive applications by assigning vGPUs or pass-through GPUs and selecting appropriate NVIDIA/AMD profiles.
- Implementing application masking to hide or restrict access to specific functions based on user role or department.
Module 3: Image Management and Golden Image Lifecycle
- Defining a standardized OS image build process with sysprep or generalize workflows to prevent SID conflicts.
- Integrating third-party tools like VMware Dynamic Environment Manager to decouple user settings from base images.
- Scheduling and testing periodic image updates to incorporate security patches without disrupting user sessions.
- Using version control and change tracking for golden images to support audit compliance and rollback scenarios.
- Managing driver injection for diverse endpoint devices (e.g., USB peripherals, printers) within a single image.
- Optimizing image size by removing unnecessary services and bloatware to reduce storage footprint and boot time.
Module 4: User Environment and Profile Management
- Choosing between roaming profiles, FSLogix, and UE-V based on performance, scalability, and Microsoft 365 integration needs.
- Configuring profile container locations on high-performance file shares with appropriate NTFS permissions and quotas.
- Handling Outlook OST file redirection and locking issues in multi-session environments using FSLogix profile rules.
- Defining folder redirection policies for Documents, Desktop, and AppData to centralize data and simplify backup.
- Implementing profile reset policies after logout to maintain non-persistent desktop cleanliness.
- Monitoring profile corruption events and designing automated remediation workflows using log analysis and scripting.
Module 5: Security, Compliance, and Access Control
- Enforcing multi-factor authentication for Horizon access via RADIUS or SAML integration with identity providers.
- Applying role-based access control (RBAC) in Horizon Console to limit administrative privileges by team function.
- Encrypting desktop traffic using TLS 1.2+ and validating certificate chains across Connection Server and clients.
- Disabling clipboard and file transfer between client and virtual desktop based on data loss prevention policies.
- Implementing antivirus and EDR solutions within VMs without degrading performance during scan operations.
- Auditing user login/logout events and connection failures using SIEM integration for compliance reporting.
Module 6: Monitoring, Performance Tuning, and Troubleshooting
- Deploying monitoring agents (e.g., vRealize Operations, ControlUp) to track VM-level metrics like latency and CPU ready time.
- Interpreting boot storm patterns and adjusting provisioning thresholds to prevent storage I/O bottlenecks.
- Using Horizon Help Desk tool to isolate user session issues without granting full administrative access.
- Correlating network jitter and packet loss with user-reported audio/video quality in real-time collaboration apps.
- Adjusting display protocol settings (e.g., PCoIP, Blast Extreme) based on endpoint device capabilities and bandwidth.
- Diagnosing application crashes in virtual sessions using event logs, process monitors, and compatibility modes.
Module 7: Business Continuity and Scalability Planning
- Designing cross-site VDI deployments with paired Connection Servers and replicated databases for disaster recovery.
- Configuring automated desktop pool scaling using Horizon Cloud Pod Architecture or orchestration scripts.
- Testing failover procedures for user redirection to secondary data centers with minimal session disruption.
- Estimating bandwidth requirements for remote users accessing VDI over WAN links with QoS policies.
- Planning capacity growth by forecasting user and application demand over 12–18 months using historical utilization data.
- Integrating VDI with cloud providers (AWS WVD, Azure Virtual Desktop) for burst scalability during peak workloads.
Module 8: Endpoint Integration and Client Management
- Selecting appropriate client software (HTML5, native, zero client) based on endpoint OS and security constraints.
- Deploying and configuring client group policies to enforce printer redirection, drive mapping, and audio settings.
- Managing thin client firmware updates centrally to maintain compatibility with connection broker protocols.
- Handling USB device redirection with policy-based filtering to allow authorized peripherals only.
- Optimizing Wi-Fi performance for mobile users by tuning client-side power management and roaming settings.
- Enforcing conditional access based on client device compliance status using integration with MDM or Intune.