You can disable client drive redirection by configuring a Microsoft Remote Desktop Services group policy setting for remote desktops and RDS hosts in Active Directory.

Before you begin

If your View deployment includes a back-end firewall between your DMZ-based security servers and your internal network, verify that the back-end firewall allows traffic to port 9427 on your single-user and RDS desktops. TCP connections on port 9427 are required to support client drive redirection.

For Horizon Client 4.2 or Horizon 7 version 7.0.2 or later, port 9427 is not required to be open if VMware Blast Extreme is enabled because client drive redirection transfers data through the virtual channel.

About this task

For more information about client drive redirection, see the Using VMware Horizon Client document for the specific type of desktop client device. Go to https://www.vmware.com/support/viewclients/doc/viewclients_pubs.html.

Note:

This setting overrides local registry and Smart Policies settings that enable the client drive redirection feature.

Procedure

  1. In the Group Policy Editor, go to Computer Configuration\Policies\Administrative Templates\Windows Components\Remote Desktop Services\Remote Desktop Session Host\Device and Resource Redirection.

    This navigation path is for Active Directory on Windows Server 2012. The navigation path differs on other Windows operating systems.

  2. Enable the Do not allow drive redirection group policy setting.