Horizon Security
VMware Horizon Security
VMware Horizon Accounts, Resources, and Log Files
VMware Horizon Accounts
VMware Horizon Resources
VMware Horizon Log Files
VMware Horizon Security Settings
Security-Related Global Settings in Horizon Console
Change the Data Recovery Password
Message Security Mode for Horizon Components
Using the vdmutil Utility to Configure the JMS Message Security Mode
Security-Related Server Settings in Horizon Console
Security-Related Settings in Horizon LDAP
Security-Related Server Settings for User Authentication
Providing Server Details
Providing Domain Information
Ports and Services
VMware Horizon TCP and UDP Ports
HTTP Redirection in VMware Horizon
VMware Horizon TrueSSO Ports
Services on a Connection Server Host
Certificate Thumbprint Verification and Automatic Certificate Generation
Configuring Security Protocols and Cipher Suites on a Connection Server Instance
Default Global Policies for Security Protocols and Cipher Suites
Configuring Global Acceptance and Proposal Policies
Global Acceptance and Proposal Policies Defined in Horizon LDAP
Change the Global Acceptance and Proposal Policies
Configure Acceptance Policies on Individual Servers
Configure Proposal Policies on Remote Desktops
Older Protocols and Ciphers Disabled in VMware Horizon
Configuring Security Protocols and Cipher Suites for Blast Secure Gateway
Configure Security Protocols and Cipher Suites for Blast Secure Gateway (BSG)
Configuring Security Protocols and Cipher Suites for PCoIP Secure Gateway
Configure Security Protocols and Cipher Suites for PCoIP Secure Gateway (PSG)
Deploying USB Devices in a Secure VMware Horizon Environment
Disabling USB Redirection for All Types of Devices
Disabling USB Redirection for Specific Devices
HTTP Protection Measures on Connection Servers
Internet Engineering Task Force Standards
World Wide Web Consortium Standards
Cross-Origin Resource Sharing
Content Security Policy
Other Protection Measures
Reducing MIME Type Security Risks
Mitigating Cross-Site Scripting Attacks
Content Type Checking
Client Behavior Monitoring
Handshake Monitoring
Request Reception Monitoring
Request Counting
Client Blacklisting
Behavior Monitoring Properties
User Agent Whitelisting
Configure HTTP Protection Measures