User environment management helps VDI shops control the chaos

Virtual desktop users require some degree of personalization and customization, even in nonpersistent deployments. As a result, VDI shops need an effective user profile management method.

Adding yet another management tool, however, can end up creating more complexity. It’s tempting to try and manage user profiles with built-in Windows features, such as folder redirection and local machine permissions. IT can use these features to take administrator rights away from users, but some users actually need them for certain applications. And Group Policies can easily contradict each other especially as the user base grows. In short, these built-in features are sufficient in smaller organizations, but if administrators deal with more than a few dozen users, this approach to profile management can quickly become untenable.

User environment management helps admins manage settings so users feel like they are working with their own personal desktops, even though they really aren’t.

What can admins do with user environment management?

Admins must ensure that they can deliver a high-quality user experience.

User environment management allows admins to deliver personalized information, including bookmarks and browser histories, to users on nonpersistent desktops.

Admins can customize user privileges on an app-by-app basis and grant admin rights for specific periods of time. IT can also apply policies that override Group Policy, disable specific peripherals and limit each user’s resource consumption. From a security standpoint, admins can include logon scripts to automatically enforce certain features.

What should a user environment management tool look like?

A strong user environment management tool delivers the correct profile data quickly, whenever and wherever users need it, all while keeping login times in check. It should personalize the user experience based on the type of device and include multi-platform support. Scalability and…

Read the full article from the Source…

Back to Top