Browse by Tags

Tagged Content List
  • Blog Post: Microsoft VDI – High Availability Deployment Options

    The Microsoft Virtual Desktop Infrastructure (Microsoft VDI) involves multiple role services. To develop a true high availability solution for this setup, you need to understand the high availability solution for each role service. This blog post identifies the key pieces of the Microsoft VDI solution...
  • Blog Post: User Profiles on Windows Server 2008 R2 Remote Desktop Services

    Introduction: This blog post contains a high-level overview of different types of profiles, considerations for choosing a profile solution for your deployment, highlights of new profile features in Windows Server 2008 R2, and a best practices recommendation for deploying roaming user profiles with folder...
  • Blog Post: Creating Kerberos Identity for RD Session Host Farms Part II: using a WMI Script

    Part I of this blog post series describes the benefits of using a Kerberos Identity for Remote Desktop Session Host (Terminal Server) farms and provides information on how to create and manage this Kerberos Identity using Remote Desktop Services provider for Windows PowerShell. You can achieve finer...
  • Blog Post: Creating Kerberos Identity for RD Session Host Farms Part I: using the Remote Desktop Services provider for Windows PowerShell

    Why create Kerberos Identity for farms? In Windows 2008, it is possible to provide server authentication by issuing a Secure Sockets Layer (SSL) certificate to the Remote Desktop Session Host (Terminal Server) farm and deploying it to each server in the farm. Since requiring SSL certificates on each...
  • Blog Post: App-V Usage Survey

    Folks, The App-V and RDS teams would like your help in planning future releases. We would appreciate if you could take a few minutes to complete the survey below. Please include your contact information if you wish to be contacted for further discussions to help us shape the next versions! http://www...
  • Blog Post: Configuring Terminal Servers for Server Authentication to Prevent “Man in the Middle” Attacks

    General Intro “Man In The Middle (MITM) attack” is a term used to describe a class of security vulnerabilities in which an attacker intercepts communication between two parties and impersonates each one to the other. The attacker can view and/or modify the traffic without the two parties...
  • Blog Post: Problems using default credentials with Vista RDP clients with Single Sign-on Enabled

    Note: This post was updated with improved suggestions. With Single Sign-on enabled , the current user’s credentials, also known as “default credentials”, are used to log on to a remote computer. In several scenarios, users may get the following error message when trying to connect to a TS server with...
Page 1 of 1 (7 items)