All configuration settings for View Agent Direct-Connection Plug-In are stored in the local registry on each virtual machine-based desktop or RDS host. You can manage these settings using Windows Active Directory group policy objects (GPOs), through the local policy editor, or by directly modifying the registry.

The registry values are located in the registry key HKEY_LOCAL_MACHINE\Software\VMware, Inc.\VMware VDM\Agent\Configuration\XMLAPI.

Table 1. View Agent Direct-Connection Plug-In Configuration Settings

Setting

Registry Value

Type

Description

HTTPS Port Number

httpsPortNumber

REG_SZ

The TCP port on which the plug-in listens for incoming HTTPS requests from Horizon Client. If this value is changed, you must make a corresponding change to the Windows firewall to allow incoming traffic.

Session Timeout

sessionTimeout

REG_SZ

The period of time a user can keep a session open after logging in with Horizon Client. The value is set in minutes. The default is 600 minutes. When this timeout is reached, all of a user's desktop and applications sessions are disconnected.

Disclaimer Enabled

disclaimerEnabled

REG_SZ

The value can be set to TRUE or FALSE. If set to TRUE, show disclaimer text for user acceptance at login. The text is shown from 'Disclaimer Text' if written, or from the GPO Configuration\Windows Settings\Security Settings\Local Policies\Security Options: Interactive logon. The default setting for disclaimerEnabled is FALSE.

Disclaimer Text

disclaimerText

REG_SZ

The disclaimer text shown to Horizon Client users at login. The Disclaimer Enabled policy must be set to TRUE. If the text is not specified, the default is to use the value from Windows policy Configuration\Windows Settings\Security Settings\Local Policies\Security Options.

Client setting: AlwaysConnect

alwaysConnect

REG_SZ

The value can be set to TRUE or FALSE. AlwaysConnect setting is sent to Horizon Client. If this policy is set to TRUE, it overrides any saved client preferences. No value is set by default. Enabling this policy sets the value to TRUE. Disabling this policy sets the value to FALSE.

External PCoIP Port

externalPCoIPPort

REG_SZ

The port number sent to Horizon Client for the destination TCP/UDP port number that is used for the PCoIP protocol. A + character in front of the number indicates a relative number from the port number used for HTTPS. Only set this value if the externally exposed port number does not match the port that the service is listening on. Typically, this port number is in a NAT environment. No value is set by default.

External Blast Port

externalBlastPort

REG_SZ

The port number sent to Horizon Client for the destination TCP port number that is used for the HTML5/Blast protocol. A + character in front of the number indicates a relative number from the port number used for HTTPS. Only set this value if the externally exposed port number does not match the port that the service is listening on. Typically, this port number is in a NAT environment. No value is set by default.

External RDP Port

externalRDPPort

REG_SZ

The port number sent to Horizon Client for the destination TCP port number that is used for the RDP protocol. A + character in front of the number indicates a relative number from the port number used for HTTPS. Only set this value if the externally exposed port number does not match the port that the service is listening on. Typically, this port number is in a NAT environment. No value is set by default.

External IP Address

externalIPAddress

REG_SZ

The IPV4 address sent to Horizon Client for the destination IP address that is used for secondary protocols (RDP, PCoIP, Framework channel, and so on). Only set this value if the externally exposed address does not match the address of the desktop machine. Typically, this address is in a NAT environment. No value is set by default.

External Framework Channel Port

externalFrameworkChannelPort

REG_SZ

The port number sent to the Horizon Client for the destination TCP port number that is used for the Framework Channel protocol. A + character in front of the number indicates a relative number from the port number used for HTTPS. Only set this value if the externally exposed port number does not match the port where the service is listening. Typically, this port number is in a NAT environment. No value is set by default.

USB Enabled

usbEnabled

REG_SZ

The value can be set to TRUE or FALSE. Determines whether desktops can use USB devices connected to the client system. The default value is enabled. To prevent the use of external devices for security reasons, change the setting to disabled (FALSE).

Client setting: USB AutoConnect

usbAutoConnect

REG_SZ

The value can be set to TRUE or FALSE. Connect USB devices to the desktop when they are plugged in. If this policy is set, it overrides any saved client preferences. No value is set by default.

Reset Enabled

resetEnabled

REG_SZ

The value can be set to TRUE or FALSE. When set to TRUE, an authenticated Horizon client can perform an operating system level reboot. The default setting is disabled (FALSE).

Client Credential Cache Timeout

clientCredentialCacheTimeout

REG_SZ

The time period, in minutes, that a Horizon client allows a user to use a saved password. 0 means never, and -1 means forever. Horizon Client offers users the option of saving their passwords if this setting is set to a valid value. The default is 0 (never).

User Idle Timeout

userIdleTimeout

REG_SZ

If there is no user activity on the Horizon client for this period of time, the user's desktop and application sessions are disconnected. The value is set in seconds. The default is 900 seconds (15 minutes).

The External Port numbers and External IP Address values are used for Network Address Translation (NAT) and port mapping support. For more information see, Using Network Address Translation and Port Mapping.

You can set policies that override these registry settings by using the Local Policy Editor or by using Group Policy Objects (GPOs) in Active directory. Policy settings have precedence over normal registry settings. A GPO template file is supplied to configure policies. When ViewView Agent and the plug-in are installed in the default location, the template file has the following location:

C:\Program Files\VMware\VMware View\Agent\extras\view_agent_direct_connection.adm

You can import this template file into Active Directory or the Local Group Policy Editor to simplify the management of these configuration settings. See the Microsoft Policy Editor and GPO handling documentation for details of managing policy settings in this way. Policy settings for the plug-in are stored in the registry key:

HKEY_LOCAL_MACHINE Software\Policies\VMware, Inc.\VMware VDM\Agent\Configuration\XMLAPI