HP ProLiant BL660c Citrix XenDesktop architecture and implementation on ProLia - Page 12

Run anti-virus software at the end-user access device.

Page 12 highlights

To reutilize existing systems, the following steps should be taken: • Convert the device to a read-only state through domain policy, local system policy or both. • Remove any existing programs that can be provided by HP virtual desktops. • Remove local logins from these systems and require any network activity be directed toward approved resources (connection brokers, media servers, domain resources). • Run anti-virus software at the end-user access device. • Implement a throw-away policy for malfunctioning access devices to minimize desk-side support costs. 12

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13

12
To reutilize existing systems, the following steps should be taken:
Convert the device to a read-only state through domain policy, local system policy or both.
Remove any existing programs that can be provided by HP virtual desktops.
Remove local logins from these systems and require any network activity be directed toward
approved resources (connection brokers, media servers, domain resources).
Run anti-virus software at the end-user access device.
Implement a throw-away policy for malfunctioning access devices to minimize desk-side support
costs.