This document supports the version of each product listed and
supports all subsequent versions until the document is
replaced by a new edition. To check for more recent editions of
this document, see http://www.vmware.com/support/pubs.
EN-002372-00
Using VMware Horizon Client for iOS
You can find the most up-to-date technical documentation on the VMware Web site at:
hp://www.vmware.com/support/
The VMware Web site also provides the latest product updates.
If you have comments about this documentation, submit your feedback to:
3401 Hillview Ave.
Palo Alto, CA 94304
www.vmware.com
2 VMware, Inc.
Contents
Using VMware Horizon Client for iOS5
Setup and Installation7
1
System Requirements 7
System Requirements for Real-Time Audio-Video 8
Smart Card Authentication Requirements 8
Congure Smart Card Authentication 9
Touch ID Authentication Requirements 10
Supported Desktop Operating Systems 11
Preparing Connection Server for Horizon Client 11
Install or Upgrade Horizon Client on an iOS Device 12
Using Embedded RSA SecurID Software Tokens 13
Congure Advanced TLS/SSL Options 14
Congure VMware Blast Options 14
Congure the Horizon Client Default View 15
Congure AirWatch to Deliver Horizon Client to iOS Devices 15
Horizon Client Data Collected by VMware 16
Using URIs to Congure Horizon Client19
2
Syntax for Creating vmware-view URIs 19
Examples of vmware-view URIs 21
Managing Remote Desktop and Application Connections25
3
Connect to a Remote Desktop or Application 25
Seing the Certicate Checking Mode for Horizon Client 27
Manage Saved Servers 28
Select a Favorite Remote Desktop or Application 29
Disconnecting From a Remote Desktop or Application 29
Log O from a Remote Desktop 30
Manage Desktop and Application Shortcuts 30
Using 3D Touch with Horizon Client 31
Using Spotlight Search with Horizon Client 31
Using Split View and Slide Over with Horizon Client 32
VMware, Inc.
Using a Microsoft Windows Desktop or Application33
4
Feature Support Matrix for iOS 34
External Keyboards and Input Devices 36
Enable the Japanese 106/109 Keyboard Layout 37
Using the Real-Time Audio-Video Feature for Microphones 37
Using Native Operating System Gestures with Touch Redirection 37
Using the Unity Touch Sidebar with a Remote Desktop 38
3
Using VMware Horizon Client for iOS
Using the Unity Touch Sidebar with a Remote Application 40
Horizon Client Tools on a Mobile Device 41
Gestures 43
Multitasking 44
Copying and Pasting Text and Images 44
Saving Documents in a Remote Application 45
Congure Horizon Client to Support Reversed Mouse Buons 45
Screen Resolutions and Using External Displays 46
PCoIP Client-Side Image Cache 47
Suppress the Cellular Data Warning Message 47
Internationalization 47
Troubleshooting Horizon Client49
5
Collecting and Sending Logging Information 49
Enable Horizon Client Log Collection 49
Manually Retrieve and Send Horizon Client Log Files 50
Disable Horizon Client Log Collection 51
Reset a Remote Desktop or Application 51
Uninstall Horizon Client 52
Horizon Client Stops Responding or the Remote Desktop Freezes 52
Problem Establishing a Connection When Using a Proxy 52
Index55
4 VMware, Inc.
Using VMware Horizon Client for iOS
This guide, Using VMware Horizon Client for iOS, provides information about installing and using VMware
Horizon® Client™ software on an iOS device to connect to a remote desktop or application in the datacenter.
The information in this document includes system requirements and instructions for installing
Horizon Client. This document also provides tips for improving the user experience of navigating and using
Windows desktop elements on an iOS device such as an iPad.
This information is intended for administrators who need to set up a View deployment that includes iOS
client devices. The information is wrien for experienced system administrators who are familiar with
virtual machine technology and datacenter operations.
VMware, Inc. 5
Using VMware Horizon Client for iOS
6 VMware, Inc.
Setup and Installation1
Seing up a View deployment for iOS clients involves using certain Connection Server conguration
seings, meeting the system requirements for View servers and iOS clients, and installing the app for
Horizon Client from the Apple App Store. VMware also recommends that you set up a security server so
that your iOS clients will not need a VPN connection.
N In Horizon 7 and later, View Administrator is renamed Horizon Administrator. This document uses
the name View Administrator to refer to both View Administrator and Horizon Administrator.
This chapter includes the following topics:
“System Requirements,” on page 7
n
“System Requirements for Real-Time Audio-Video,” on page 8
n
“Smart Card Authentication Requirements,” on page 8
n
“Congure Smart Card Authentication,” on page 9
n
“Touch ID Authentication Requirements,” on page 10
n
“Supported Desktop Operating Systems,” on page 11
n
“Preparing Connection Server for Horizon Client,” on page 11
n
“Install or Upgrade Horizon Client on an iOS Device,” on page 12
n
“Using Embedded RSA SecurID Software Tokens,” on page 13
n
“Congure Advanced TLS/SSL Options,” on page 14
n
“Congure VMware Blast Options,” on page 14
n
“Congure the Horizon Client Default View,” on page 15
n
“Congure AirWatch to Deliver Horizon Client to iOS Devices,” on page 15
n
“Horizon Client Data Collected by VMware,” on page 16
n
System Requirements
The iOS device on which you install Horizon Client, and the peripherals it uses, must meet certain system
requirements.
Operating systems
External keyboards
VMware, Inc. 7
iOS 8.4.1 and later, including iOS 9.x and iOS 10
(Optional) iPad Keyboard Dock and Apple Wireless Keyboard (Bluetooth)
Using VMware Horizon Client for iOS
Smart card
authentication
Touch ID authentication
Connection Server,
Security Server, and
View Agent or
Horizon Agent
Display protocol for
View
Network protocol for
View
See “Smart Card Authentication Requirements,” on page 8.
See “Touch ID Authentication Requirements,” on page 10.
Latest maintenance release of View 5.3.x and later releases.
VMware recommends that you use a security server so that your iOS clients
will not require a VPN connection.
To use the Unity Touch feature with View 5.3.x desktops, the Remote
Experience Agent must be installed on the desktops.
Remote applications are available on Horizon 6.0 with View and later
servers.
PCoIP
n
VMware Blast (requires Horizon Agent 7.0 or later)
n
IPv4
n
IPv6 (requires iOS 9.2 or later)
n
For information about using View in an IPv6 environment, see the View
Installation document.
System Requirements for Real-Time Audio-Video
Real-Time Audio-Video works with standard audio devices and with standard conferencing applications
such as Skype, WebEx, and Google Hangouts. To support Real-Time Audio-Video, your View deployment
must meet certain software and hardware requirements.
I Only the audio-in feature is supported. The video feature is not supported.
View remote desktop
Client access device
The desktops must have View Agent 5.3 or later installed. For View Agent
5.3 desktops, the desktops must also have the corresponding Remote
Experience Agent installed. For example, if View Agent 5.3 is installed, you
must also install the Remote Experience Agent from View 5.3 Feature Pack 1.
See the View Feature Pack Installation and Administration document for View. If
you have View Agent 6.0 or later, or Horizon Agent 7.0 or later, no feature
pack is required.
To use Real-Time Audio-Video with RDS desktops and remote applications,
you must have Horizon Agent 7.0.2 or later.
Real-Time Audio-Video is supported on all iOS devices that run
Horizon Client for iOS. For more information, see “System Requirements,”
on page 7.
Smart Card Authentication Requirements
Client systems that use a smart card for user authentication must meet certain requirements.
Horizon Client for iOS supports using smart cards with remote desktops that have Windows 7, Windows
Vista, Windows XP, Windows 8.1, Windows 10, and Windows Server 2008 R2 guest operating systems. For
Microsoft RDS host-based desktops and applications, the Windows Server 2008 R2 and Windows Server
2012 R2 operating systems are supported. An iOS 8.4.1 or later operating system is required.
8 VMware, Inc.
Chapter 1 Setup and Installation
Each client system that uses a smart card for user authentication must have the following software and
hardware:
Horizon Client
n
A compatible smart card reader
n
Product-specic application drivers
n
You must also install product-specic application drivers on the remote desktops or Microsoft RDS host.
Users that authenticate with smart cards must have a smart card and each smart card must contain a user
certicate.
In addition to meeting these requirements for Horizon Client systems, other View components must meet
certain conguration requirements to support smart cards:
For information about conguring Connection Server to support smart card use, see "Seing Up Smart
n
Card Authentication" in the View Administration document.
You must add all applicable Certicate Authority (CA) certicates for all trusted user certicates to a
server truststore le on the Connection Server host or security server host. These certicates include
root certicates and must include intermediate certicates if the user's smart card certicate was issued
by an intermediate certicate authority.
For information about tasks you might need to perform in Active Directory to implement smart card
n
authentication, see "Seing Up Smart Card Authentication" in the View Administration document.
Enabling the Username Hint Field in Horizon Client
In some environments, smart card users can use a single smart card certicate to authenticate to multiple
user accounts. Users enter their user name in the Username hinteld during smart card sign-in.
To make the Username hinteld appear on the Horizon Client login dialog box, you must enable the smart
card user name hints feature for the Connection Server instance in View Administrator. The smart card user
name hints feature is supported only with Horizon 7 version 7.0.2 and later servers and agents. For
information about enabling the smart card user name hints feature, see "Seing Up Smart Card
Authentication" in the View Administration document.
If your environment uses an Access Point appliance rather than a security server for secure external access,
you must congure the Access Point appliance to support the smart card user name hints feature. The smart
card user name hints feature is supported only with Access Point 2.7.2 and later. For information about
enabling the smart card user name hints feature in Access Point, see the Deploying and Conguring AccessPoint document.
N Horizon Client still supports single-account smart card certicates when the smart card user name
hints feature is enabled.
Configure Smart Card Authentication
Conguration tasks include connecting and pairing the card reader with the device and seing the smart
card removal policy.
Prerequisites
Verify that you are using the correct version of the client, desktop agent, server, operating system, smart
n
card reader, and smart card. See “Smart Card Authentication Requirements,” on page 8.
If you have not already done so, perform the tasks described in "Prepare Active Directory for Smart
n
Card Authentication," in the View Installation document.
VMware, Inc. 9
Using VMware Horizon Client for iOS
Congure View servers to support smart card use. See the topic "Congure Smart Card
n
Authentication," in the View Administration document.
Procedure
1Pair the device with the smart card reader, according to the documentation provided by the
manufacturer of the reader.
If your iOS device has a 30-pin connector, you can plug the smart card reader into the connector. For
iPad Air and iPhone 5S, which have Lightning interfaces, you must use a 30-pin adapter to plug the
smart card reader into the device's 30-pin connector.
2Congure the smart card removal policy.
OptionDescription
Set the policy on the server
Set the policy on the desktop
If you use View Administrator to set a policy, the choices are to disconnect
users from Connection Server when they remove their smart cards or to
keep users connected to Connection Server when they remove their smart
cards and let them start new desktop or application sessions without
reauthenticating.
aIn View Administrator, select View > Servers.
b On the Connection Servers tab, select the Connection Server instance
and click Edit.
cOn the Authentication tab, select or deselect the Disconnect user
sessions on smart card removal check box to congure the smart card
removal policy.
d Click OK to save your changes.
e Restart the Connection Server service to make your changes take eect.
If you select the Disconnect user sessions on smart card removal check
box, Horizon Client returns to the Recent screen when users remove their
smart cards.
If you use the Group Policy Editor (gpedit.msc), you have the following
possible seings: no action, lock workstation, force log o, or Disconnect if
a Remote Desktop Services session.
After you open gpedit.msc in the desktop operating system, go to
Windows > Security > Local policies > Security options >
Interactive logon: smart card removal behavior. Run the
gpupdate /force command after you change the conguration to force a
group policy refresh.
Touch ID Authentication Requirements
To use Touch ID for user authentication in Horizon Client, you must meet certain requirements.
iPad and iPhone models
Operating system
requirements
Connection Server
requirements
10 VMware, Inc.
Any iPad or iPhone model that supports Touch ID, for example, iPad Air 2
and iPhone 6.
iOS 8 or later.
n
Add at least one ngerprint in the Touch ID & Passcode seing.
n
Horizon 6 version 6.2 or a later release.
n
Enable biometric authentication in Connection Server. For information,
n
see "Congure Biometric Authentication" in the View Administration
document.
Chapter 1 Setup and Installation
The Connection Server instance must present a valid root-signed
n
certicate to Horizon Client.
Horizon Client
requirements
Set the certicate checking mode to Never connect to untrusted servers
n
or Warn before connecting to untrusted servers. For information aboutseing the certicate checking mode, see “Seing the Certicate
Checking Mode for Horizon Client,” on page 27.
Enable Touch ID by tapping Enable Touch ID on the View server login
n
screen. After you successfully log in, your Active Directory credentials
are stored securely in the iOS device's Keychain. The Enable Touch ID
option is shown the rst time you log in and does not appear after Touch
ID is enabled.
You can use Touch ID with smart card authentication and as part of two-factor authentication with RSA
SecurID and RADIUS authentication. If you use Touch ID with smart card authentication, Horizon Client
connects to the server after you enter your PIN and the Touch ID login screen does not appear.
Supported Desktop Operating Systems
Administrators create virtual machines with a guest operating system and install agent software in the guest
operating system. End users can log in to these virtual machines from a client device.
For a list of the supported Windows guest operating systems, see the "Supported Operating Systems for
View Agent" topic in the View 5.x or 6.x installation documentation. See the "Supported Operating Systems
for Horizon Agent" topic in the Horizon 7 installation documentation.
Some Linux guest operating systems are also supported if you have View Agent 6.1.1 or later, or
Horizon Agent 7.0 or later. For information about system requirements, conguring Linux virtual machines
for use in Horizon 6 or Horizon 7, and a list of supported features, see Seing Up Horizon 6 for Linux
Desktops, which is part of the Horizon 6, version 6.1 documentation, or see Seing Up Horizon 7 for Linux
Desktops.
Preparing Connection Server for Horizon Client
Administrators must perform specic tasks to enable end users to connect to remote desktops and
applications.
Before end users can connect to Connection Server or a security server and access a remote desktop or
application, you must congure certain pool seings and security seings:
If you plan to use Access Point, congure Connection Server to work with Access Point. See Deploying
n
and Conguring Access Point. Access Point appliances fulll the same role that was previously played by
only security servers.
If you are using a security server, verify that you are using the latest maintenance releases of
n
Connection Server 5.3.x and Security Server 5.3.x or later releases. For more information, see the View
Installation document.
If you plan to use a secure tunnel connection for client devices and if the secure connection is
n
congured with a DNS host name for Connection Server or a security server, verify that the client
device can resolve this DNS name.
To enable or disable the secure tunnel, in View Administrator, go to the Edit View Connection Server
Seings dialog box and use the check box called Use secure tunnel connection to desktop.
Verify that a desktop or application pool has been created and that the user account that you plan to use
n
is entitled to access the pool.
VMware, Inc. 11
Using VMware Horizon Client for iOS
For Connection Server 5.3.x, see the topics about creating desktop pools in the View Administration
document. For Connection Server 6.0 and later, see the topics about creating desktop and application
pools in the Seing Up Desktop and Application Pools in View document.
To use two-factor authentication with Horizon Client, such as RSA SecurID or RADIUS authentication,
n
you must enable this feature on Connection Server. For more information, see the topics about twofactor authentication in the View Administration document.
To use Touch ID authentication, you must enable biometric authentication in Connection Server.
n
Biometric authentication is supported in Horizon 6 version 6.2 and later. For more information, see
"Congure Biometric Authentication" in the View Administration document.
To enable end users to save their passwords with Horizon Client, so that they do not always need to
n
supply credentials when connecting to a Connection Server instance, congure View LDAP for this
feature on the Connection Server host.
Users can save their passwords if View LDAP is congured to allow it, if the Horizon Client certicate
verication mode is set to Warn before connecting to untrusted servers or Never connect to untrusted
servers, and if Horizon Client can fully verify the server certicate that Connection Server presents. For
instructions, see "Saving Credentials in Mobile and Mac Horizon Clients" in the View Administration
document.
Verify that the desktop or application pool is set to use the VMware Blast display protocol or the PCoIP
n
display protocol. For Connection Server 5.3.x, see the View Administration document. For Connection
Server 6.0 and later, see the Seing Up Desktop and Application Pools in View document.
Install or Upgrade Horizon Client on an iOS Device
You can install Horizon Client from the VMware Downloads page or from the App Store.
Prerequisites
If you have not already set up the iOS device, do so. See the user guide from Apple.
n
Verify that you have the URL for a download page that contains the Horizon Client installer. This URL
n
might be the VMware Downloads page at hp://www.vmware.com/go/viewclients, or it might be the
URL for a Connection Server instance.
Procedure
1On your iOS device, Mac, or PC, browse to the URL for downloading the installer le, or search the
App Store for the Horizon Client app.
2Download the app.
3If you downloaded the app to a Mac or PC, connect your iOS device to the computer and follow the
onscreen instructions in iTunes.
4To determine whether the installation succeeded, verify that the Horizon app icon appears on the iOS
device.
12 VMware, Inc.
Using Embedded RSA SecurID Software Tokens
If you create and distribute RSA SecurID software tokens to end users, they need enter only their PIN, rather
than PIN and token code, to authenticate.
Setup Requirements
You can use Compressed Token Format (CTF) or dynamic seed provisioning, which is also called CT-KIP
(Cryptographic Token Key Initialization Protocol), to set up an easy-to-use RSA authentication system. With
this system, you generate a URL to send to end users. To install the token, end users paste this URL directly
into Horizon Client on their client devices. The dialog box for pasting this URL appears when end users
connect to Connection Server with Horizon Client.
After the software token is installed, end users enter a PIN to authenticate. With external RSA tokens, end
users must enter a PIN and the token code generated by a hardware or software authentication token.
The following URL prexes are supported if end users will be copying and pasting the URL into
Horizon Client when Horizon Client is connected to an RSA-enabled Connection Server instance:
viewclient-securid://
n
com.rsa.securid.iphone://
n
Chapter 1 Setup and Installation
com.rsa.securid://
n
For end users who will be installing the token by tapping the URL, only the prexviewclient-securid:// is
supported.
For information about using dynamic seed provisioning or le-based (CTF) provisioning, see the Web page
RSA SecurID Software Token for iPhone Devices at hp://www.rsa.com/node.aspx?id=3652 or RSA SecurID
Software Token for Android at hp://www.rsa.com/node.aspx?id=3832.
Instructions to End Users
When you create a CTFString URL or CT-KIP URL to send to end users, you can generate a URL with or
without a password or activation code. You send this URL to end users in an email that must include the
following information:
Instructions for navigating to the Install Software Token dialog box.
n
Tell end users to tap External Token in the Horizon Client dialog box that prompts them for RSA
SecurID credentials when they connect to a Connection Server instance.
CTFString URL or CT-KIP URL in plain text.
n
If the URL has formaing on it, end users will get an error message when they try to use it in
Horizon Client.
Activation code, if the CT-KIP URL that you create does not already include the activation code.
n
End users must enter this activation code in a text eld of the dialog box.
If the CT-KIP URL includes an activation code, tell end users that they need not enter anything in the
n
Password or Activation Code text box in the Install Software Token dialog box.
VMware, Inc. 13
Using VMware Horizon Client for iOS
Configure Advanced TLS/SSL Options
You can select the security protocols and cryptographic algorithms that are used to encrypt communications
between Horizon Client and Horizon servers and between Horizon Client and the agent in the remote
desktop.
By default, TLSv1.0, TLSv1.1, and TLSv1.2 are enabled. SSL v2.0 and 3.0 are not supported. The default
cipher control string is "!aNULL:kECDH+AESGCM:ECDH+AESGCM:RSA+AESGCM:kECDH+AES:ECDH
+AES:RSA+AES".
If you congure a security protocol for Horizon Client that is not enabled on the Horizon server to which the
client connects, a TLS/SSL error occurs and the connection fails.
For information about conguring the security protocols that are accepted by Connection Server instances,
see the View Security document.
Procedure
1Tap at the boom of the Horizon Client screen.
2Tap Advanced SSL Options.
3Make sure that the Reset to Default option is set to o.
4To enable or disable a security protocol, tap the On or toggle next to the security protocol name.
5To change the cipher control string, replace the default string.
6(Optional) If you need to revert to the default seings, tap Reset in the upper right corner of the screen.
Your changes take eect the next time you connect to the server.
Configure VMware Blast Options
You can congure H.264 decoding and network protocol options for remote desktop and application
sessions that use the VMware Blast display protocol.
Prerequisites
This feature requires Horizon Agent 7.0 or later.
Procedure
1Tap at the boom of the Horizon Client screen.
2Tap VMware Blast.
14 VMware, Inc.
3Congure the decoding and network protocol options.
OptionDescription
H.264
UDP
Select this option to allow H.264 decoding in Horizon Client. When this
option is selected (the default seing), Horizon Client uses H.264 decoding
if the agent supports H.264 software encoding. If the agent does not
support H.264 software encoding, Horizon Client uses JPG/PNG decoding.
Deselect this option to use JPG/PNG decoding.
Select this option to allow UDP networking in Horizon Client. When this
option is selected (the default seing), Horizon Client uses UDP
networking if UDP connectivity is available. If UDP networking is blocked,
Horizon Client uses TCP networking.
Deselect this option to use TCP networking.
N UDP is disabled by default on a Horizon remote desktop. For UDP
to work, it must be enabled on the desktop, the client, and the Blast Secure
Gateway (BSG).
Your changes take eect the next time a user connects to a remote desktop or application and selects the
VMware Blast display protocol. Your changes do not aect existing VMware Blast sessions.
Configure the Horizon Client Default View
You can congure whether the Recent screen or the Servers screen appears when you launch Horizon Client.
Chapter 1 Setup and Installation
Procedure
1Tap at the boom of the Horizon Client screen.
2Tap Default View.
3Tap an option to select the default view.
OptionDescription
Recent
Servers
The Recent screen appears when you launch Horizon Client. The Recent
screen contains shortcuts to recently used desktops and applications. This
is the default seing.
The Servers screen appears when you launch Horizon Client. The Servers
screen contains shortcuts to the servers that you added to Horizon Client.
The default view you selected takes eect immediately.
Configure AirWatch to Deliver Horizon Client to iOS Devices
You can congure AirWatch to deliver Horizon Client to iOS device users.
You can optionally specify a default list of Connection Server instances. The Connection Server instances
that you specify appear as shortcuts in Horizon Client.
Prerequisites
Install and deploy AirWatch. See hp://www.air-watch.com.
n
Become familiar with the AirWatch console. This procedure assumes you know how to use the
n
AirWatch console. For more information, see the AirWatch documentation or online help.
Procedure
1Log in to the AirWatch console as an administrator.
VMware, Inc. 15
Using VMware Horizon Client for iOS
2Select Accounts > Users > List View, click Add User, and add user accounts for the users who will run
Horizon Client on their mobile devices.
3Select Accounts > Users > User Groups, click Add, and create a user group for the user accounts that
you created.
4Upload and add the Horizon Client application to AirWatch.
aSelect Apps & Books > Applications > List View and click Add Application on the Public tab.
bSearch for and select VMware Horizon Client for Apple iOS in the App Store.
cOn the Info tab, type an application name and specify the supported iOS device models.
dOn the Assignment tab, assign the Horizon Client application to the user group that you created.
e(Optional) To congure a default Connection Server instance, on the Deployment tab, select the
Send Application check box, type servers in the Key text box, select
String from the Value Type drop-down menu, and type an IP address or host name in the Value text box.
servers is case sensitive. To specify a list of Connection Server instances, type multiple IP
addresses or host names, separated by commas, in the Value text box.
For example: 123.456.1.1, viewserver4.mydomain.com, 123.456.1.2
N This feature is supported only for iOS 7 and later devices. You cannot push a default
Connection Server list to an iOS 6 device.
fPublish the Horizon Client application.
5Install and set up the AirWatch MDM Agent on each iOS device.
You can download the AirWatch MDM Agent from iTunes.
6Use the AirWatch console to install the Horizon Client application on the mobile devices.
You cannot install the Horizon Client application before the eective date on the Deployment tab.
AirWatch delivers Horizon Client to the iOS devices in the user group that you associated with the
Horizon Client application.
When a user launches Horizon Client, Horizon Client communicates with the AirWatch MDM Agent on the
device. If you congured a default list of Connection Server instances, AirWatch pushes the server
information to the AirWatch MDM Agent on the device and shortcuts for those servers appear in
Horizon Client.
What to do next
You can use the AirWatch console to edit the Horizon Client application and push those changes to iOS
devices. For example, you can add a default Connection Server instance to the server list for the
Horizon Client application.
Horizon Client Data Collected by VMware
If your company participates in the customer experience improvement program, VMware collects data from
certain Horizon Client elds. Fields containing sensitive information are made anonymous.
VMware collects data on the clients to prioritize hardware and software compatibility. If your company's
administrator has opted to participate in the customer experience improvement program, VMware collects
anonymous data about your deployment in order to improve VMware's response to customer requirements.
No data that identies your organization is collected. Horizon Client information is sent rst to Connection
Server and then on to VMware, along with data from Connection Server instances, desktop pools, and
remote desktops.
16 VMware, Inc.
Chapter 1 Setup and Installation
Although the information is encrypted while in transit to Connection Server, the information on the client
system is logged unencrypted in a user-specic directory. The logs do not contain any personally identiable
information.
The administrator who installs Connection Server can select whether to participate in the VMware customer
experience improvement program while running the Connection Server installation wizard, or an
administrator can set an option in View Administrator after the installation.
Table 1‑1. Data Collected from Horizon Clients for the Customer Experience Improvement Program
Is This Field
Made
Anonymous
Description
Company that produced the
Horizon Client application
Product nameNoVMware Horizon Client
Client product versionNo(The format is x.x.x-yyyyyy, where x.x.x is the client version
Client binary architectureNoExamples include the following:
Client build nameNoExamples include the following:
Host operating systemNoExamples include the following:
Host operating system kernelNoExamples include the following:
Host operating system architectureNoExamples include the following:
Host system modelNoExamples include the following:
?Example Value
NoVMware
number and yyyyyy is the build number.)
i386
n
x86_64
n
arm
n
VMware-Horizon-Client-Win32-Windows
n
VMware-Horizon-Client-Linux
n
VMware-Horizon-Client-iOS
n
VMware-Horizon-Client-Mac
n
VMware-Horizon-Client-Android
n
VMware-Horizon-Client-WinStore
n
Windows 8.1
n
Windows 7, 64-bit Service Pack 1 (Build 7601 )
n
iPhone OS 5.1.1 (9B206)
n
Ubuntu 12.04.4 LTS
n
Mac OS X 10.8.5 (12F45)
n
Windows 6.1.7601 SP1
n
Darwin Kernel Version 11.0.0: Sun Apr 8 21:52:26 PDT
n
2012; root:xnu-1878.11.10~1/RELEASE_ARM_S5L8945X
Darwin 11.4.2
n
Linux 2.6.32-44-generic #98-Ubuntu SMP Mon Sep 24
n
17:27:10 UTC 2012
unknown (for Windows Store)
n
x86_64
n
i386
n
armv71
n
ARM
n
Dell Inc. OptiPlex 960
n
iPad3,3
n
MacBookPro8,2
n
Dell Inc. Precision WorkStation T3400 (A04 03/21/2008)
n
VMware, Inc. 17
Loading...
+ 39 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.