Archive for the ‘Uncategorized’ Category

Delivering Web Applications with Hyper-V hosted RD Session Host VMs and Quest Workspace Desktop Virtualization

Today I finished a large RD Session Host deployment using Quest Workspace Desktop Virtualization.

The deployment consisted of 8 Hyper-V Servers, each hosting 7 RD Session Host VMs.  The 56 VMs serve up seamless RemoteApps for a few web applications.

One of the requirements was to limit users web browsing to the websites that the customer needed published.  There are several ways this could be accomplished, like host files, proxy filtering, web filtering applications and probably some I haven’t thought of.

They way we chose to accomplish this was via Quest Workspace Desktop Virtualization’s URL Redirection feature.  In a nutshell we placed the VMs in an OU and linked a GPO to this OU where the Quest URL Redirection ADMX template was loaded.  In the template we specified which URL strings were allowed on the RD Session Hosts, and any other URLs that hit the hosted IE Browser got redirected back to the client device’s Internet Browser.

The customer did not mention this as a requirement when they purchased Quest Workspace Desktop Virtualization and Quest Defender to secure their applications for use by remote contractors, but it was very easy to implement.  It was nice to be able to meet a customer’s requirements on the fly, without having to scramble to figure out how.  It was simply, we can do that….

Updates to the allowed URLs can be made on the fly via GPO, and updates to the VM configuration or installed applications on the RD Session Hosts can be made to all 56 VMs in about 10 minutes by updating the template VM and reprovisioning the 56 child VMs.  Quest Workspace Desktop Virtualization automatically and instantly replicates the update VM template to all 8 Hyper-V servers, and using our Hyper-V Catalyst Components, the instant the first block of data from the VM template is replicated to each Hyper-V Server, the VMs can be rebuilt.  They will retain their MAC address, IP address, FQDN, Domain Membership, VM configuration (NIC, Memory, CPU, VLAN tags…) and of course any settings from Quest Workspace Desktop Virtualization, like applications being published.

Another thing we did that one cannot do with the in box functionality of Microsoft’s RD Broker is publish different applications on different RD Session Hosts.  This is commonly referred to as “Application Siloing”.  We had to do this because one application had different security requirements than the others.

Other components of the architecture included a set of 2 Quest Web Access and Secure Gateway VMs that were load balanced by F5 Big IP LTMs and front ended by Microsoft ISA server.  ISA Server was not a technical requirement, but the customer’s security team required all access to go thru their ISA servers.

Quest’s brokers not only load balance the RD Session Host connections, but also the placement of the VMs across Hyper-V Servers.


Gearing up for MGX and Briforum

Last year was the first time I missed Briforum since 2006 so I’m pleased to be attending this year.  I’m also going to MGX for the first time and hope to be showing some new goodies on Windows 8 Client Hyper-V.

If you haven’t made plans to attend Briforum yet, don’t miss out on the Conference for REAL Desktop Virtualization GEEKS!  Be sure to visit the Quest Software demo to see demos of Dell Wyse gear and Quest Workspace Desktop Virtualization, as well as Quest Workspace ChangeBASE!

Categories: Uncategorized

The Experts Conference (TEC) in San Diego – April 29-May 2

April 23, 2012 Leave a comment

If you’re in the San Diego area from April 29 to May 2nd don’t miss TEC 2012 Virtualization and Workspace Management Track. Brian Madden is delivering the keynote and the session content is listed here:

Categories: Uncategorized

Microsoft Education Roadshow in Overland Park, KS

April 23, 2012 Leave a comment

I’m on my way to Kansas City (Overland Park) to speak at a Microsoft Education Roadshow.

Categories: Uncategorized

Mitigating IE6 Compatibility Issues when migrating to Windows 7

August 3, 2011 Leave a comment

In this video I demonstrate how vWorkspace seamlessly redirects specific (defined by IT via GPO) URLs from the local IE8 or IE9 Browser to IE6.  If a user browses to a the site that does not require IE6, they are redirected back to their local IE browser.

Because IE6 is running in its native operating system (Server 2003 R2 Terminal Server), this is completely legal, in accordance with the Microsoft EULA and supported and endorsed by Microsoft and Quest.

There is no application virtualization going on here, just application presentation.  As you know, RemoteApp didn’t exist on 2003 R2 Terminal Server, so the seamless Windows engine here is Quest vWorkspace.

Using this, customers can continue their Win7 migrations and can deal with remediating their IE6 applications on a separate timeline and/or separate project.

Categories: Uncategorized

Mitigating IE6 Application Compatibility in Windows 7 with Quest vWorkspace

In this presentation I explain how Quest and Microsoft have partnered to offer an IE6 Compatibility Bundle (known as Quest vWorkspace IE6 Compatibility Edition) for customers migrating to Windows 7 who need to support IE6 applications.  As you may well know, Windows 7 can’t natively run Internet Explorer 6 (or 7).  Many customers are left without a viable solution on how to migrate to Windows 7, when they have mission critical applications that REQUIRE IE6.

Initially Application Virtualization seems like the answer, but virtualizing Internet Explorer is neither compliant with the Microsoft EULA, nor is it supported (just like running any binaries from one Microsoft OS is not supported if the binaries are executed on a different OS).  So while it may be technically possible to virtualize IE6 with Microsoft App-V, VMware ThinApp, Symantec SVS, Citrix Application Virtualization, none of these are supported and all violate the Microsoft EULA.

The solution detailed in this presentation is SUPPORTED, COMPLIANT and ENDORSED by Microsoft and Quest.  In a nutshell, Quest vWorkspace seamlessly presents IE6 (from 2003 R2 Terminal Server) onto the Windows 7 Desktop (physical or virtual).

This solution for IE6 Delivery to Win7 includes all of the bells and whistles of vWorkspace (when publishing IE6) Enterprise Edition, such as:

  • Server and Application Load Balancing
  • Seamless Application Presentation
  • Desktop & Start Menu Integration
  • WAN Acceleration & RDP Compression (via Quest EOP)
  • Multimedia Acceleration (Flash)
  • Bi-directional audio
  • Universal Printing (Client, Network and Remote Relay)
  • User Profile Management
  • User Environment Configuration
  • Single Management Console with Granular Delegated Administration
vWorkspace is the same product that has helped customers like Kingston University to deploy a large scale VDI implementation on Hyper-V and integrates with App-V and SCVMM.
Categories: Uncategorized

Rapid Virtual Desktop Provisioning / Cloning with Microsoft SCVMM, Hyper-V and Quest vWorkspace

February 8, 2011 Leave a comment

Last week I took some time to record two new youtube videos of Quest vWorkspace automating Microsoft SCVMM (System Center Virtual Machine Manager).  Quest vWorkspace is a Connection Broker for VDI, Terminal Server and Physical PCs and has hooks into SCVMM, RD Session Host, App-V and non-Microsoft platforms like VMware vCenter and Parallels Virtuozzo.

Since I work on the Microsoft Partner Alliance at Quest’s Desktop Virtualization Group, I get to spend lots of time working with Hyper-V and SCVMM, so I recorded these videos to show what I could do with my little demo environment (Dell Precision M6500 Core i7 with 16GB RAM, 250GB SATA, 128GB SSD and NVidia Quadro FX 3800M Display Adapter (for RemoteFX)).

In the first video I narrate using Quest vWorkspace to rapidly provision / clone 3 new Windows 7 Virtual Desktops and in the second video I rapidly provision 10 new Windows 7 Virtual Desktops and then reprovision 2 of the Virtual Desktops to show that vWorkspace can automate SCVMM to redeploy VMs from a SCVMM Template while retaining the original VMs Active Directory identity and SCVMM VM Settings.

All of this capability is native to SCVMM, but only accessible via powershell, so Quest Software (the company where I work) automates the whole process for you.


Categories: Uncategorized