You can define default settings for the Horizon Client in the Windows Registry instead of specifying these settings on the command line. Policy entries take precedence over Windows Registry settings, and command-line settings take precedence over policy entries.

1 shows the registry settings for logging in to Horizon Client. These settings are located under HKEY_CURRENT_USER\Software\VMware, Inc.\VMware VDM\Client\ in the registry. This location is specific to a particular user, whereas the HKEY_LOCAL_MACHINE settings, described in the next table, are computer-wide settings and pertain to all local users and all domain users in a Windows domain environment who have permission to log in to the computer.

Table 1. Horizon Client Registry Settings for Credentials

Registry Setting

Description

Password

Specifies the default password.

UserName

Specifies the default user name.

2 shows the registry settings for Horizon Client that do not include login credentials. The location of these settings depends on the type of system:

  • For 32-bit Windows: HKEY_LOCAL_MACHINE\Software\VMware, Inc.\VMware VDM\Client\

  • For 64-bit Windows: HKLM\SOFTWARE\Wow6432Node\VMware, Inc.\VMware VDM\Client\

Table 2. Horizon Client Registry Settings

Registry Setting

Description

DomainName

Specifies the default NETBIOS domain name. For example, you would use mycompany rather than mycompany.com.

EnableShade

Specifies whether the menu bar (shade) at the top of the Horizon Client window is enabled. The menu bar is enabled by default except for clients in kiosk mode. A value of false disables the menu bar.

Note:

This setting is applicable only when you have the display layout set to All Monitors or Fullscreen.

ServerURL

Specifies the default View Connection Server instance by its URL, IP address, or FQDN.

EnableSoftKeypad

(Horizon Client 3.3 and later) If set to true and a Horizon Client window has focus, then physical keyboard, onscreen keyboard, mouse, and handwriting pad events are sent to the remote desktop or remote application, even if the mouse or onscreen keyboard is outside of the Horizon Client window. The default is false.

The following table shows security settings that you can add. The location of these settings depends on the type of system:

  • For 32-bit Windows: HKEY_LOCAL_MACHINE\Software\VMware, Inc.\VMware VDM\Client\Security

  • For 64-bit Windows: HKLM\SOFTWARE\Wow6432Node\VMware, Inc.\VMware VDM\Client\Security

Table 3. Security Settings

Registry Setting

Description and Valid Values

CertCheckMode

Specifies the certificate checking mode.

  • 0 implements Do not verify server identity certificates.

  • 1 implements Warn before connecting to untrusted servers.

  • 2 implements Never connect to untrusted servers.

SSLCipherList

Configures the cipher list to restrict the use of certain cryptographic algorithms and protocols before establishing an encrypted SSL connection. The cipher list consists of one or more cipher strings separated by colons.

Note:

All cipher strings are case-sensitive.

  • If this feature is enabled, the default value for Horizon Client 4.0 is TLSv1.1:TLSv1.2:!aNULL:kECDH+AES:ECDH+AES:RSA+AES:@STRENGTH.

  • The default value for Horizon Client 3.5 is TLSv1:TLSv1.1:TLSv1.2:!aNULL:kECDH+AES:ECDH+AES:RSA+AES:@STRENGTH.

  • The default value for Horizon Client 3.3 and 3.4 is TLSv1:TLSv1.1:AES:!aNULL:@STRENGTH.

  • The value for Horizon Client 3.2 and earlier is SSLv3:TLSv1:TLSv1.1:AES:!aNULL:@STRENGTH.

That means that in Horizon Client 4.0, TLS v1.1 and TLS v1.2 are enabled. (TLS v1.0 is disabled. SSL v2.0 and v3.0 are removed.) In Horizon Client 3.5, TLS v1.0, TLS v1.1, and TLS v1.2 are enabled. (SSL v2.0 and v3.0 are disabled.) In Horizon Client 3.3 and 3.4, TLS v1.0 and TLS v1.1 are enabled. (SSL v2.0 and v3.0, and TLS v1.2 are disabled.) In Horizon Client 3.2 and earlier, SSL v3.0 is also enabled. (SSL v2.0 and TLS v1.2 are disabled.)

Cipher suites use 128- or 256-bit AES, remove anonymous DH algorithms, and then sort the current cipher list in order of encryption algorithm key length.

Reference link for the configuration: http://www.openssl.org/docs/apps/ciphers.html