You can define default settings for Horizon Client in the Windows Registry instead of specifying these settings on the command line. Group policy settings take precedence over Windows Registry settings, and Windows Registry settings take precedence over the command line.
The following table lists the registry settings for logging in to Horizon Client. These settings are located under HKEY_CURRENT_USER\Software\VMware, Inc.\VMware VDM\Client\ in the registry. This location is specific to a particular user. The HKEY_LOCAL_MACHINE settings, which are described in the next table, are computer-wide settings and pertain to all local users and all domain users that have permission to log in to the computer in a Windows domain environment.
|UserName||Default user name.|
The following table lists the registry settings for Horizon Client that do not include login credentials. The location of these settings depends on the type of system as follows:
- For 32-bit Windows: HKEY_LOCAL_MACHINE\Software\VMware, Inc.\VMware VDM\Client\
- For 64-bit Windows: HKLM\SOFTWARE\WOW6432Node\VMware, Inc.\VMware VDM\Client\
|DomainName||Default NETBIOS domain name. For example, you might use mycompany rather than mycompany.com.|
|EnableShade||Determines whether the menu bar (shade) at the top of the Horizon Client window is enabled. The menu bar is enabled by default, except for clients in kiosk mode. A value of false disables the menu bar.
Note: This setting is applicable only when you have the display layout set to All Monitors or Fullscreen.
|ServerURL||URL, IP address, or FQDN of the default Connection Server instance.|
|EnableSoftKeypad||If set to true and a Horizon Client window has focus, the physical keyboard, onscreen keyboard, mouse, and handwriting pad events are sent to the remote desktop or published application, even if the mouse or onscreen keyboard is outside the Horizon Client window. The default is false.|
The following table shows security settings that you can add. The location of these settings depends on the type of system as follows:
- For 32-bit Windows: HKEY_LOCAL_MACHINE\Software\VMware, Inc.\VMware VDM\Client\Security
- For 64-bit Windows: HKLM\SOFTWARE\WOW6432Node\VMware, Inc.\VMware VDM\Client\Security
|Registry Setting||Description and Valid Values|
|CertCheckMode||Certificate checking mode. Valid values are as follows:
|SSLCipherList||Configures the cipher list to restrict the use of certain cryptographic algorithms and protocols before establishing an encrypted TLS connection. The cipher list consists of one or more cipher strings separated by colons. All cipher strings are case-sensitive.
The default value is TLSv1.1:TLSv1.2:!aNULL:kECDH+AESGCM:ECDH+AESGCM:RSA+AESGCM:kECDH+AES:ECDH+AES:RSA+AES.
The default value means that TLS v1.1 and TLS v1.2 are enabled and SSL v.2.0, SSL v3.0, and TLS v1.0 are disabled. SSL v2.0, SSL v3.0, and TLS v1.0 are no longer the approved protocols and are permanently disabled.
Cipher suites use 128-bit or 256-bit AES, remove anonymous DH algorithms, and sort the current cipher list in order of encryption algorithm key length.
For reference information about the configuration, see http://www.openssl.org/docs/apps/ciphers.html .