Management of user profiles in VDI environments

by | Feb 4, 2015

ETIQUETAS: VDI-en

A few weeks ago we talked about Hace unas semanas tratamos en nuestro blog la issues in the management of user profiles in VDI environments. Today we are going to discuss the most appropiate solutions.

One solution is the use of mobile profiles. These profiles are defined through the Active Directory group policy, storing the user data in a shared resource. The mobile profile will allow the user data to become available from any Windows device: a physical desktop, virtual desktop or a Terminal Services user session. This data is loaded at the start of a session and the changes made to the profile during the session are saved upon closing it. In the case of non-persistent desktops, the use of mobile profiles is clear, since the user is assigned a new desktop in the infrastructure with each session start-up, loading the mobile profile stored in a network resource during the start-up process.

The main problem with using mobile profiles arises when a large amount of data is stored in the profile. When a session is started in Windows, the complete user profile is downloaded during the process. The more information stored in said profile, the longer the start-up process will take in a proportional amount of time. The same thing happens during the shut down process, as the data has to be restored in the mobile profile.

In addition to the assignment of mobile profiles, another alternative practice for managing user profiles is to assign each non-persistent virtual desktop with a
persistent hard drive that stores the user data. This hard drive is connected to the virtual desktop when the system assigns the desktop to the user. In this case, the difficulty arises when you have to back up the data stored on these hard drives, since many of the current backup solutions are not compatible with these types of hard drives.

Lastly, current VDI solutions propose different types of management and administration of user profiles. These types of VDI solutions result in the drawback that they have a very close integration with Windows’ Active Directory, making it impossible to operate with other authentication systems. The most ideal and simple solution for implementation is one that makes use of the advantages from Windows’ mobile profiles, storing application data and desktop configuration there and at the same time
storing the documents and user data in shared resources.

This solution has practically become a standard, since it uses the Windows user profiles management system, improved in the 2012 version, and uses shared resources to store the user data and documents. With the use of virtual desktops based on templates, the storage of user data in shared network resources and the isolation of the virtual desktop user profiles, administration and management of the user station platform and the establishment and application of user station backup policies are greatly simplified.

SHARE

0 Comments

Submit a Comment

Your email address will not be published. Required fields are marked *

Recent posts

VDI: The most secure environment for hybrid working

Today is Data Privacy Day. The purpose of this date is to raise awareness and promote privacy and data protection best practices. It was initiated by the European Commission, the Council of Europe, and the Data Protection authorities of the European Union’s member states. Their main goal was to drive attention to the importance of privacy, user data protection, and compliance of the General Data Protection Regulation (RGPD). It is a regulation characterized by significant fines for non-compliance since its implementation in 2018.

How to avoid issues with virtual machines

Virtualization comes with a wide range of benefits for organizations. It helps cut IT costs and reduces downtime while increasing efficiency and productivity. It also increases the resiliency of networks, primarily when disasters occur, and promotes more green-friendly operations.

However, using virtual machines also comes with a set of downsides. Information security may get compromised, workloads mixed up, separation duties lost, among other issues. It is vital to know how you can get over these problems, and that’s what this article will discuss.

Let’s get started.

Archives


Stay up to date with all the news from UDS ENTERPRISE through our social networks. Follow us!

Skip to content