VMware Horizon Client 4.3 User Guide

Using VMware Horizon Client for iOS
Horizon Client 4.3
This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document, see http://www.vmware.com/support/pubs.
EN-002372-00
Using VMware Horizon Client for iOS
You can find the most up-to-date technical documentation on the VMware Web site at:
hp://www.vmware.com/support/
The VMware Web site also provides the latest product updates.
If you have comments about this documentation, submit your feedback to:
docfeedback@vmware.com
Copyright © 2010–2016 VMware, Inc. All rights reserved. Copyright and trademark information.
VMware, Inc.
3401 Hillview Ave. Palo Alto, CA 94304 www.vmware.com

Contents

Using VMware Horizon Client for iOS 5
Setup and Installation 7
1
System Requirements 7
System Requirements for Real-Time Audio-Video 8
Smart Card Authentication Requirements 8
Congure Smart Card Authentication 9
Touch ID Authentication Requirements 10
Supported Desktop Operating Systems 11
Preparing Connection Server for Horizon Client 11
Install or Upgrade Horizon Client on an iOS Device 12
Using Embedded RSA SecurID Software Tokens 13
Congure Advanced TLS/SSL Options 14
Congure VMware Blast Options 14
Congure the Horizon Client Default View 15
Congure AirWatch to Deliver Horizon Client to iOS Devices 15
Horizon Client Data Collected by VMware 16
Using URIs to Congure Horizon Client 19
2
Syntax for Creating vmware-view URIs 19
Examples of vmware-view URIs 21
Managing Remote Desktop and Application Connections 25
3
Connect to a Remote Desktop or Application 25
Seing the Certicate Checking Mode for Horizon Client 27
Manage Saved Servers 28
Select a Favorite Remote Desktop or Application 29
Disconnecting From a Remote Desktop or Application 29
Log O from a Remote Desktop 30
Manage Desktop and Application Shortcuts 30
Using 3D Touch with Horizon Client 31
Using Spotlight Search with Horizon Client 31
Using Split View and Slide Over with Horizon Client 32
VMware, Inc.
Using a Microsoft Windows Desktop or Application 33
4
Feature Support Matrix for iOS 34
External Keyboards and Input Devices 36
Enable the Japanese 106/109 Keyboard Layout 37
Using the Real-Time Audio-Video Feature for Microphones 37
Using Native Operating System Gestures with Touch Redirection 37
Using the Unity Touch Sidebar with a Remote Desktop 38
3
Using VMware Horizon Client for iOS
Using the Unity Touch Sidebar with a Remote Application 40
Horizon Client Tools on a Mobile Device 41
Gestures 43
Multitasking 44
Copying and Pasting Text and Images 44
Saving Documents in a Remote Application 45
Congure Horizon Client to Support Reversed Mouse Buons 45
Screen Resolutions and Using External Displays 46
PCoIP Client-Side Image Cache 47
Suppress the Cellular Data Warning Message 47
Internationalization 47
Troubleshooting Horizon Client 49
5
Collecting and Sending Logging Information 49
Enable Horizon Client Log Collection 49
Manually Retrieve and Send Horizon Client Log Files 50
Disable Horizon Client Log Collection 51
Reset a Remote Desktop or Application 51
Uninstall Horizon Client 52
Horizon Client Stops Responding or the Remote Desktop Freezes 52
Problem Establishing a Connection When Using a Proxy 52
Index 55
4 VMware, Inc.

Using VMware Horizon Client for iOS

This guide, Using VMware Horizon Client for iOS, provides information about installing and using VMware Horizon® Client™ software on an iOS device to connect to a remote desktop or application in the datacenter.
The information in this document includes system requirements and instructions for installing Horizon Client. This document also provides tips for improving the user experience of navigating and using Windows desktop elements on an iOS device such as an iPad.
This information is intended for administrators who need to set up a View deployment that includes iOS client devices. The information is wrien for experienced system administrators who are familiar with virtual machine technology and datacenter operations.
Using VMware Horizon Client for iOS

Setup and Installation 1

Seing up a View deployment for iOS clients involves using certain Connection Server conguration seings, meeting the system requirements for View servers and iOS clients, and installing the app for
Horizon Client from the Apple App Store. VMware also recommends that you set up a security server so that your iOS clients will not need a VPN connection.
N In Horizon 7 and later, View Administrator is renamed Horizon Administrator. This document uses the name View Administrator to refer to both View Administrator and Horizon Administrator.
This chapter includes the following topics:
“System Requirements,” on page 7
n
“System Requirements for Real-Time Audio-Video,” on page 8
n
“Smart Card Authentication Requirements,” on page 8
n
“Congure Smart Card Authentication,” on page 9
n
“Touch ID Authentication Requirements,” on page 10
n
“Supported Desktop Operating Systems,” on page 11
n
“Preparing Connection Server for Horizon Client,” on page 11
n
“Install or Upgrade Horizon Client on an iOS Device,” on page 12
n
“Using Embedded RSA SecurID Software Tokens,” on page 13
n
“Congure Advanced TLS/SSL Options,” on page 14
n
“Congure VMware Blast Options,” on page 14
n
“Congure the Horizon Client Default View,” on page 15
n
“Congure AirWatch to Deliver Horizon Client to iOS Devices,” on page 15
n
“Horizon Client Data Collected by VMware,” on page 16
n

System Requirements

The iOS device on which you install Horizon Client, and the peripherals it uses, must meet certain system requirements.
Operating systems
External keyboards
VMware, Inc. 7
iOS 8.4.1 and later, including iOS 9.x and iOS 10
(Optional) iPad Keyboard Dock and Apple Wireless Keyboard (Bluetooth)
Using VMware Horizon Client for iOS
Smart card authentication
Touch ID authentication
Connection Server, Security Server, and View Agent or Horizon Agent
Display protocol for View
Network protocol for View
See “Smart Card Authentication Requirements,” on page 8.
See “Touch ID Authentication Requirements,” on page 10.
Latest maintenance release of View 5.3.x and later releases.
VMware recommends that you use a security server so that your iOS clients will not require a VPN connection.
To use the Unity Touch feature with View 5.3.x desktops, the Remote Experience Agent must be installed on the desktops.
Remote applications are available on Horizon 6.0 with View and later servers.
PCoIP
n
VMware Blast (requires Horizon Agent 7.0 or later)
n
IPv4
n
IPv6 (requires iOS 9.2 or later)
n
For information about using View in an IPv6 environment, see the View Installation document.

System Requirements for Real-Time Audio-Video

Real-Time Audio-Video works with standard audio devices and with standard conferencing applications such as Skype, WebEx, and Google Hangouts. To support Real-Time Audio-Video, your View deployment must meet certain software and hardware requirements.
I Only the audio-in feature is supported. The video feature is not supported.
View remote desktop
Client access device
The desktops must have View Agent 5.3 or later installed. For View Agent
5.3 desktops, the desktops must also have the corresponding Remote Experience Agent installed. For example, if View Agent 5.3 is installed, you must also install the Remote Experience Agent from View 5.3 Feature Pack 1. See the View Feature Pack Installation and Administration document for View. If you have View Agent 6.0 or later, or Horizon Agent 7.0 or later, no feature pack is required.
To use Real-Time Audio-Video with RDS desktops and remote applications, you must have Horizon Agent 7.0.2 or later.
Real-Time Audio-Video is supported on all iOS devices that run Horizon Client for iOS. For more information, see “System Requirements,” on page 7.

Smart Card Authentication Requirements

Client systems that use a smart card for user authentication must meet certain requirements.
Horizon Client for iOS supports using smart cards with remote desktops that have Windows 7, Windows Vista, Windows XP, Windows 8.1, Windows 10, and Windows Server 2008 R2 guest operating systems. For Microsoft RDS host-based desktops and applications, the Windows Server 2008 R2 and Windows Server 2012 R2 operating systems are supported. An iOS 8.4.1 or later operating system is required.
Chapter 1 Setup and Installation
Each client system that uses a smart card for user authentication must have the following software and hardware:
Horizon Client
n
A compatible smart card reader
n
Product-specic application drivers
n
You must also install product-specic application drivers on the remote desktops or Microsoft RDS host.
Users that authenticate with smart cards must have a smart card and each smart card must contain a user
certicate.
In addition to meeting these requirements for Horizon Client systems, other View components must meet certain conguration requirements to support smart cards:
For information about conguring Connection Server to support smart card use, see "Seing Up Smart
n
Card Authentication" in the View Administration document.
You must add all applicable Certicate Authority (CA) certicates for all trusted user certicates to a server truststore le on the Connection Server host or security server host. These certicates include root certicates and must include intermediate certicates if the user's smart card certicate was issued by an intermediate certicate authority.
For information about tasks you might need to perform in Active Directory to implement smart card
n
authentication, see "Seing Up Smart Card Authentication" in the View Administration document.
Enabling the Username Hint Field in Horizon Client
In some environments, smart card users can use a single smart card certicate to authenticate to multiple user accounts. Users enter their user name in the Username hint eld during smart card sign-in.
To make the Username hint eld appear on the Horizon Client login dialog box, you must enable the smart card user name hints feature for the Connection Server instance in View Administrator. The smart card user name hints feature is supported only with Horizon 7 version 7.0.2 and later servers and agents. For information about enabling the smart card user name hints feature, see "Seing Up Smart Card Authentication" in the View Administration document.
If your environment uses an Access Point appliance rather than a security server for secure external access, you must congure the Access Point appliance to support the smart card user name hints feature. The smart card user name hints feature is supported only with Access Point 2.7.2 and later. For information about enabling the smart card user name hints feature in Access Point, see the Deploying and Conguring Access Point document.
N Horizon Client still supports single-account smart card certicates when the smart card user name hints feature is enabled.

Configure Smart Card Authentication

Conguration tasks include connecting and pairing the card reader with the device and seing the smart card removal policy.
Prerequisites
Verify that you are using the correct version of the client, desktop agent, server, operating system, smart
n
card reader, and smart card. See “Smart Card Authentication Requirements,” on page 8.
If you have not already done so, perform the tasks described in "Prepare Active Directory for Smart
n
Card Authentication," in the View Installation document.
VMware, Inc. 9
Using VMware Horizon Client for iOS
Congure View servers to support smart card use. See the topic "Congure Smart Card
n
Authentication," in the View Administration document.
Procedure
1 Pair the device with the smart card reader, according to the documentation provided by the
manufacturer of the reader.
If your iOS device has a 30-pin connector, you can plug the smart card reader into the connector. For iPad Air and iPhone 5S, which have Lightning interfaces, you must use a 30-pin adapter to plug the smart card reader into the device's 30-pin connector.
2 Congure the smart card removal policy.
Option Description
Set the policy on the server
Set the policy on the desktop
If you use View Administrator to set a policy, the choices are to disconnect users from Connection Server when they remove their smart cards or to keep users connected to Connection Server when they remove their smart cards and let them start new desktop or application sessions without reauthenticating.
a In View Administrator, select View  > Servers.
b On the Connection Servers tab, select the Connection Server instance
and click Edit.
c On the Authentication tab, select or deselect the Disconnect user
sessions on smart card removal check box to congure the smart card removal policy.
d Click OK to save your changes.
e Restart the Connection Server service to make your changes take eect.
If you select the Disconnect user sessions on smart card removal check box, Horizon Client returns to the Recent screen when users remove their smart cards.
If you use the Group Policy Editor (gpedit.msc), you have the following possible seings: no action, lock workstation, force log o, or Disconnect if a Remote Desktop Services session.
After you open gpedit.msc in the desktop operating system, go to
Windows  > Security  > Local policies > Security options > Interactive logon: smart card removal behavior. Run the
gpupdate /force command after you change the conguration to force a group policy refresh.

Touch ID Authentication Requirements

To use Touch ID for user authentication in Horizon Client, you must meet certain requirements.
iPad and iPhone models
Operating system requirements
Connection Server requirements
10 VMware, Inc.
Any iPad or iPhone model that supports Touch ID, for example, iPad Air 2 and iPhone 6.
iOS 8 or later.
n
Add at least one ngerprint in the Touch ID & Passcode seing.
n
Horizon 6 version 6.2 or a later release.
n
Enable biometric authentication in Connection Server. For information,
n
see "Congure Biometric Authentication" in the View Administration document.
Chapter 1 Setup and Installation
The Connection Server instance must present a valid root-signed
n
certicate to Horizon Client.
Horizon Client requirements
Set the certicate checking mode to Never connect to untrusted servers
n
or Warn before connecting to untrusted servers. For information about seing the certicate checking mode, see “Seing the Certicate
Checking Mode for Horizon Client,” on page 27.
Enable Touch ID by tapping Enable Touch ID on the View server login
n
screen. After you successfully log in, your Active Directory credentials are stored securely in the iOS device's Keychain. The Enable Touch ID option is shown the rst time you log in and does not appear after Touch ID is enabled.
You can use Touch ID with smart card authentication and as part of two-factor authentication with RSA SecurID and RADIUS authentication. If you use Touch ID with smart card authentication, Horizon Client connects to the server after you enter your PIN and the Touch ID login screen does not appear.

Supported Desktop Operating Systems

Administrators create virtual machines with a guest operating system and install agent software in the guest operating system. End users can log in to these virtual machines from a client device.
For a list of the supported Windows guest operating systems, see the "Supported Operating Systems for View Agent" topic in the View 5.x or 6.x installation documentation. See the "Supported Operating Systems for Horizon Agent" topic in the Horizon 7 installation documentation.
Some Linux guest operating systems are also supported if you have View Agent 6.1.1 or later, or Horizon Agent 7.0 or later. For information about system requirements, conguring Linux virtual machines for use in Horizon 6 or Horizon 7, and a list of supported features, see Seing Up Horizon 6 for Linux
Desktops, which is part of the Horizon 6, version 6.1 documentation, or see Seing Up Horizon 7 for Linux Desktops.

Preparing Connection Server for Horizon Client

Administrators must perform specic tasks to enable end users to connect to remote desktops and applications.
Before end users can connect to Connection Server or a security server and access a remote desktop or application, you must congure certain pool seings and security seings:
If you plan to use Access Point, congure Connection Server to work with Access Point. See Deploying
n
and Conguring Access Point. Access Point appliances fulll the same role that was previously played by only security servers.
If you are using a security server, verify that you are using the latest maintenance releases of
n
Connection Server 5.3.x and Security Server 5.3.x or later releases. For more information, see the View Installation document.
If you plan to use a secure tunnel connection for client devices and if the secure connection is
n
congured with a DNS host name for Connection Server or a security server, verify that the client device can resolve this DNS name.
To enable or disable the secure tunnel, in View Administrator, go to the Edit View Connection Server Seings dialog box and use the check box called Use secure tunnel connection to desktop.
Verify that a desktop or application pool has been created and that the user account that you plan to use
n
is entitled to access the pool.
VMware, Inc. 11
Using VMware Horizon Client for iOS
For Connection Server 5.3.x, see the topics about creating desktop pools in the View Administration document. For Connection Server 6.0 and later, see the topics about creating desktop and application pools in the Seing Up Desktop and Application Pools in View document.
To use two-factor authentication with Horizon Client, such as RSA SecurID or RADIUS authentication,
n
you must enable this feature on Connection Server. For more information, see the topics about two­factor authentication in the View Administration document.
To use Touch ID authentication, you must enable biometric authentication in Connection Server.
n
Biometric authentication is supported in Horizon 6 version 6.2 and later. For more information, see "Congure Biometric Authentication" in the View Administration document.
To enable end users to save their passwords with Horizon Client, so that they do not always need to
n
supply credentials when connecting to a Connection Server instance, congure View LDAP for this feature on the Connection Server host.
Users can save their passwords if View LDAP is congured to allow it, if the Horizon Client certicate
verication mode is set to Warn before connecting to untrusted servers or Never connect to untrusted servers, and if Horizon Client can fully verify the server certicate that Connection Server presents. For
instructions, see "Saving Credentials in Mobile and Mac Horizon Clients" in the View Administration document.
Verify that the desktop or application pool is set to use the VMware Blast display protocol or the PCoIP
n
display protocol. For Connection Server 5.3.x, see the View Administration document. For Connection Server 6.0 and later, see the Seing Up Desktop and Application Pools in View document.

Install or Upgrade Horizon Client on an iOS Device

You can install Horizon Client from the VMware Downloads page or from the App Store.
Prerequisites
If you have not already set up the iOS device, do so. See the user guide from Apple.
n
Verify that you have the URL for a download page that contains the Horizon Client installer. This URL
n
might be the VMware Downloads page at hp://www.vmware.com/go/viewclients, or it might be the URL for a Connection Server instance.
Procedure
1 On your iOS device, Mac, or PC, browse to the URL for downloading the installer le, or search the
App Store for the Horizon Client app.
2 Download the app.
3 If you downloaded the app to a Mac or PC, connect your iOS device to the computer and follow the
onscreen instructions in iTunes.
4 To determine whether the installation succeeded, verify that the Horizon app icon appears on the iOS
device.

Using Embedded RSA SecurID Software Tokens

If you create and distribute RSA SecurID software tokens to end users, they need enter only their PIN, rather than PIN and token code, to authenticate.
Setup Requirements
You can use Compressed Token Format (CTF) or dynamic seed provisioning, which is also called CT-KIP (Cryptographic Token Key Initialization Protocol), to set up an easy-to-use RSA authentication system. With this system, you generate a URL to send to end users. To install the token, end users paste this URL directly into Horizon Client on their client devices. The dialog box for pasting this URL appears when end users connect to Connection Server with Horizon Client.
After the software token is installed, end users enter a PIN to authenticate. With external RSA tokens, end users must enter a PIN and the token code generated by a hardware or software authentication token.
The following URL prexes are supported if end users will be copying and pasting the URL into Horizon Client when Horizon Client is connected to an RSA-enabled Connection Server instance:
viewclient-securid://
n
com.rsa.securid.iphone://
n
Chapter 1 Setup and Installation
com.rsa.securid://
n
For end users who will be installing the token by tapping the URL, only the prex viewclient-securid:// is supported.
For information about using dynamic seed provisioning or le-based (CTF) provisioning, see the Web page
RSA SecurID Software Token for iPhone Devices at hp://www.rsa.com/node.aspx?id=3652 or RSA SecurID Software Token for Android at hp://www.rsa.com/node.aspx?id=3832.
Instructions to End Users
When you create a CTFString URL or CT-KIP URL to send to end users, you can generate a URL with or without a password or activation code. You send this URL to end users in an email that must include the following information:
Instructions for navigating to the Install Software Token dialog box.
n
Tell end users to tap External Token in the Horizon Client dialog box that prompts them for RSA SecurID credentials when they connect to a Connection Server instance.
CTFString URL or CT-KIP URL in plain text.
n
If the URL has formaing on it, end users will get an error message when they try to use it in Horizon Client.
Activation code, if the CT-KIP URL that you create does not already include the activation code.
n
End users must enter this activation code in a text eld of the dialog box.
If the CT-KIP URL includes an activation code, tell end users that they need not enter anything in the
n
Password or Activation Code text box in the Install Software Token dialog box.
VMware, Inc. 13
Using VMware Horizon Client for iOS

Configure Advanced TLS/SSL Options

You can select the security protocols and cryptographic algorithms that are used to encrypt communications between Horizon Client and Horizon servers and between Horizon Client and the agent in the remote desktop.
By default, TLSv1.0, TLSv1.1, and TLSv1.2 are enabled. SSL v2.0 and 3.0 are not supported. The default cipher control string is "!aNULL:kECDH+AESGCM:ECDH+AESGCM:RSA+AESGCM:kECDH+AES:ECDH +AES:RSA+AES".
If you congure a security protocol for Horizon Client that is not enabled on the Horizon server to which the client connects, a TLS/SSL error occurs and the connection fails.
For information about conguring the security protocols that are accepted by Connection Server instances, see the View Security document.
Procedure
1 Tap  at the boom of the Horizon Client screen.
2 Tap Advanced SSL Options.
3 Make sure that the Reset to Default  option is set to o.
4 To enable or disable a security protocol, tap the On or  toggle next to the security protocol name.
5 To change the cipher control string, replace the default string.
6 (Optional) If you need to revert to the default seings, tap Reset in the upper right corner of the screen.
Your changes take eect the next time you connect to the server.

Configure VMware Blast Options

You can congure H.264 decoding and network protocol options for remote desktop and application sessions that use the VMware Blast display protocol.
Prerequisites
This feature requires Horizon Agent 7.0 or later.
Procedure
1 Tap  at the boom of the Horizon Client screen.
2 Tap VMware Blast.
14 VMware, Inc.
3 Congure the decoding and network protocol options.
Option Description
H.264
UDP
Select this option to allow H.264 decoding in Horizon Client. When this option is selected (the default seing), Horizon Client uses H.264 decoding if the agent supports H.264 software encoding. If the agent does not support H.264 software encoding, Horizon Client uses JPG/PNG decoding.
Deselect this option to use JPG/PNG decoding.
Select this option to allow UDP networking in Horizon Client. When this option is selected (the default seing), Horizon Client uses UDP networking if UDP connectivity is available. If UDP networking is blocked, Horizon Client uses TCP networking.
Deselect this option to use TCP networking.
N UDP is disabled by default on a Horizon remote desktop. For UDP to work, it must be enabled on the desktop, the client, and the Blast Secure Gateway (BSG).
Your changes take eect the next time a user connects to a remote desktop or application and selects the VMware Blast display protocol. Your changes do not aect existing VMware Blast sessions.

Configure the Horizon Client Default View

You can congure whether the Recent screen or the Servers screen appears when you launch Horizon Client.
Chapter 1 Setup and Installation
Procedure
1 Tap  at the boom of the Horizon Client screen.
2 Tap Default View.
3 Tap an option to select the default view.
Option Description
Recent
Servers
The Recent screen appears when you launch Horizon Client. The Recent screen contains shortcuts to recently used desktops and applications. This is the default seing.
The Servers screen appears when you launch Horizon Client. The Servers screen contains shortcuts to the servers that you added to Horizon Client.
The default view you selected takes eect immediately.

Configure AirWatch to Deliver Horizon Client to iOS Devices

You can congure AirWatch to deliver Horizon Client to iOS device users.
You can optionally specify a default list of Connection Server instances. The Connection Server instances that you specify appear as shortcuts in Horizon Client.
Prerequisites
Install and deploy AirWatch. See hp://www.air-watch.com.
n
Become familiar with the AirWatch console. This procedure assumes you know how to use the
n
AirWatch console. For more information, see the AirWatch documentation or online help.
Procedure
1 Log in to the AirWatch console as an administrator.
VMware, Inc. 15
Using VMware Horizon Client for iOS
2 Select Accounts > Users > List View, click Add User, and add user accounts for the users who will run
Horizon Client on their mobile devices.
3 Select Accounts > Users > User Groups, click Add, and create a user group for the user accounts that
you created.
4 Upload and add the Horizon Client application to AirWatch.
a Select Apps & Books > Applications > List View and click Add Application on the Public tab.
b Search for and select VMware Horizon Client for Apple iOS in the App Store.
c On the Info tab, type an application name and specify the supported iOS device models.
d On the Assignment tab, assign the Horizon Client application to the user group that you created.
e (Optional) To congure a default Connection Server instance, on the Deployment tab, select the
Send Application  check box, type servers in the  Key text box, select String from the Value Type drop-down menu, and type an IP address or host name in the  Value text box.
servers is case sensitive. To specify a list of Connection Server instances, type multiple IP
addresses or host names, separated by commas, in the  Value text box.
For example: 123.456.1.1, viewserver4.mydomain.com, 123.456.1.2
N This feature is supported only for iOS 7 and later devices. You cannot push a default Connection Server list to an iOS 6 device.
f Publish the Horizon Client application.
5 Install and set up the AirWatch MDM Agent on each iOS device.
You can download the AirWatch MDM Agent from iTunes.
6 Use the AirWatch console to install the Horizon Client application on the mobile devices.
You cannot install the Horizon Client application before the eective date on the Deployment tab.
AirWatch delivers Horizon Client to the iOS devices in the user group that you associated with the Horizon Client application.
When a user launches Horizon Client, Horizon Client communicates with the AirWatch MDM Agent on the device. If you congured a default list of Connection Server instances, AirWatch pushes the server information to the AirWatch MDM Agent on the device and shortcuts for those servers appear in Horizon Client.
What to do next
You can use the AirWatch console to edit the Horizon Client application and push those changes to iOS devices. For example, you can add a default Connection Server instance to the server list for the Horizon Client application.

Horizon Client Data Collected by VMware

If your company participates in the customer experience improvement program, VMware collects data from certain Horizon Client elds. Fields containing sensitive information are made anonymous.
VMware collects data on the clients to prioritize hardware and software compatibility. If your company's administrator has opted to participate in the customer experience improvement program, VMware collects anonymous data about your deployment in order to improve VMware's response to customer requirements. No data that identies your organization is collected. Horizon Client information is sent rst to Connection Server and then on to VMware, along with data from Connection Server instances, desktop pools, and remote desktops.
16 VMware, Inc.
Chapter 1 Setup and Installation
Although the information is encrypted while in transit to Connection Server, the information on the client system is logged unencrypted in a user-specic directory. The logs do not contain any personally identiable information.
The administrator who installs Connection Server can select whether to participate in the VMware customer experience improvement program while running the Connection Server installation wizard, or an administrator can set an option in View Administrator after the installation.
Table 11. Data Collected from Horizon Clients for the Customer Experience Improvement Program
Is This Field Made Anonymous
Description
Company that produced the Horizon Client application
Product name No VMware Horizon Client
Client product version No (The format is x.x.x-yyyyyy, where x.x.x is the client version
Client binary architecture No Examples include the following:
Client build name No Examples include the following:
Host operating system No Examples include the following:
Host operating system kernel No Examples include the following:
Host operating system architecture No Examples include the following:
Host system model No Examples include the following:
? Example Value
No VMware
number and yyyyyy is the build number.)
i386
n
x86_64
n
arm
n
VMware-Horizon-Client-Win32-Windows
n
VMware-Horizon-Client-Linux
n
VMware-Horizon-Client-iOS
n
VMware-Horizon-Client-Mac
n
VMware-Horizon-Client-Android
n
VMware-Horizon-Client-WinStore
n
Windows 8.1
n
Windows 7, 64-bit Service Pack 1 (Build 7601 )
n
iPhone OS 5.1.1 (9B206)
n
Ubuntu 12.04.4 LTS
n
Mac OS X 10.8.5 (12F45)
n
Windows 6.1.7601 SP1
n
Darwin Kernel Version 11.0.0: Sun Apr 8 21:52:26 PDT
n
2012; root:xnu-1878.11.10~1/RELEASE_ARM_S5L8945X
Darwin 11.4.2
n
Linux 2.6.32-44-generic #98-Ubuntu SMP Mon Sep 24
n
17:27:10 UTC 2012
unknown (for Windows Store)
n
x86_64
n
i386
n
armv71
n
ARM
n
Dell Inc. OptiPlex 960
n
iPad3,3
n
MacBookPro8,2
n
Dell Inc. Precision WorkStation T3400 (A04 03/21/2008)
n
VMware, Inc. 17
Loading...
+ 39 hidden pages