You can define default settings for the Horizon Client in the Windows Registry instead of specifying these settings on the command line. Group policy settings take precedence over Windows Registry settings, and Windows Registry settings take precedence over the command line..
Table 1 shows the registry settings for logging in to Horizon Client. These settings are located under HKEY_CURRENT_USER\Software\VMware, Inc.\VMware VDM\Client\ in the registry. This location is specific to a particular user, whereas the HKEY_LOCAL_MACHINE settings, described in the next table, are computer-wide settings and pertain to all local users and all domain users in a Windows domain environment who have permission to log in to the computer.
|Password||Specifies the default password.|
|UserName||Specifies the default user name.|
Table 2 shows the registry settings for Horizon Client that do not include login credentials. The location of these settings depends on the type of system:
- For 32-bit Windows: HKEY_LOCAL_MACHINE\Software\VMware, Inc.\VMware VDM\Client\
- For 64-bit Windows: HKLM\SOFTWARE\Wow6432Node\VMware, Inc.\VMware VDM\Client\
|DomainName||Specifies the default NETBIOS domain name. For example, you would use mycompany rather than mycompany.com.|
|EnableShade||Specifies whether the menu bar (shade) at the top of the Horizon Client window is enabled. The menu bar is enabled by default except for clients in kiosk mode. A value of false disables the menu bar.
Note: This setting is applicable only when you have the display layout set to All Monitors or Fullscreen.
|ServerURL||Specifies the default View Connection Server instance by its URL, IP address, or FQDN.|
|EnableSoftKeypad||If set to true and a Horizon Client window has focus, then physical keyboard, onscreen keyboard, mouse, and handwriting pad events are sent to the remote desktop or remote application, even if the mouse or onscreen keyboard is outside of the Horizon Client window. The default is false.|
The following table shows security settings that you can add. The location of these settings depends on the type of system:
- For 32-bit Windows: HKEY_LOCAL_MACHINE\Software\VMware, Inc.\VMware VDM\Client\Security
- For 64-bit Windows: HKLM\SOFTWARE\Wow6432Node\VMware, Inc.\VMware VDM\Client\Security
|Registry Setting||Description and Valid Values|
|CertCheckMode||Specifies the certificate checking mode.
|SSLCipherList||Configures the cipher list to restrict the use of certain cryptographic algorithms and protocols before establishing an encrypted SSL connection. The cipher list consists of one or more cipher strings separated by colons.
Note: All cipher strings are case-sensitive.
The default value is TLSv1:TLSv1.1:TLSv1.2:!aNULL:kECDH+AESGCM:ECDH+AESGCM:RSA+AESGCM:kECDH+AES:ECDH+AES:RSA+AES.
This means that TLSv.1, TLSv1.1, and TLSv1.2 are enabled. (SSL v2.0 and v3.0 are removed.)
Cipher suites use 128- or 256-bit AES, remove anonymous DH algorithms, and then sort the current cipher list in order of encryption algorithm key length.
Reference link for the configuration: http://www.openssl.org/docs/apps/ciphers.html