<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/">
    <channel>
        <copyright>Copyright TechTarget - All rights reserved</copyright>
        <description></description>
        <docs>https://cyber.law.harvard.edu/rss/rss.html</docs>
        <generator>Techtarget Feed Generator</generator>
        <language>en</language>
        <lastBuildDate>Sun, 15 Mar 2026 22:04:22 GMT</lastBuildDate>
        <link>https://www.techtarget.com/searchvirtualdesktop</link>
        <managingEditor>editor@techtarget.com</managingEditor>
        <item>
            <body>&lt;p data-end="1161" data-start="794"&gt;Organizations evaluating desktop delivery models must weigh the advantages and disadvantages of virtual desktop infrastructure (VDI) before making long-term platform decisions. While VDI can offer strong security and centralized management, building and operating a virtual desktop environment requires significant planning, infrastructure and licensing investment.&lt;/p&gt; 
&lt;p data-end="1442" data-start="1168"&gt;Because &lt;a href="https://www.techtarget.com/searchvirtualdesktop/definition/virtual-desktop-infrastructure-VDI"&gt;VDI&lt;/a&gt; environments are complex and resource intensive, IT leaders should carefully evaluate whether traditional VDI, cloud-hosted virtual desktops or desktop as a service (&lt;a href="https://www.techtarget.com/searchvirtualdesktop/definition/desktop-as-a-service-DaaS"&gt;DaaS&lt;/a&gt;) best aligns with their organization's workforce, security and infrastructure requirements.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="Pros and cons of building a modern VDI environment"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Pros and cons of building a modern VDI environment&lt;/h2&gt;
 &lt;p&gt;Perhaps the single biggest advantage to &lt;a href="https://www.techtarget.com/searchvirtualdesktop/definition/virtual-desktop"&gt;virtual desktops&lt;/a&gt; is that IT teams can make them far more secure than physical desktops. Because virtual desktops run on a back-end server, organizations can lock them down to prevent any alterations or unauthorized software installations. If a user does manage to change anything, administrators can reset the virtual desktop to a pristine state at the end of the session.&lt;/p&gt;
 &lt;p&gt;Another advantage to virtual desktops is the ease of management. It is typically far easier to centrally manage a collection of virtual desktops than it is to manage a collection of physical PCs. Virtual desktops also work well in &lt;a href="https://www.techtarget.com/whatis/definition/BYOD-bring-your-own-device"&gt;BYOD&lt;/a&gt; environments. Depending on the virtualization platform, &lt;a href="https://www.techtarget.com/searchvirtualdesktop/feature/Benefits-of-desktop-virtualization-for-businesses"&gt;organizations can deliver a virtual desktop to several different device types&lt;/a&gt;.&lt;/p&gt;
 &lt;p&gt;Of course, virtual desktops do have some disadvantages, one of which is complexity.&lt;/p&gt;
 &lt;blockquote class="main-article-pullquote"&gt;
  &lt;div class="main-article-pullquote-inner"&gt;
   &lt;figure&gt;
    Virtual desktop deployments involve a lot of different components, which tends to make troubleshooting more difficult than it would be in a physical desktop environment.
   &lt;/figure&gt;
   &lt;i class="icon" data-icon="z"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/blockquote&gt;
 &lt;p&gt;Virtual desktop deployments involve a lot of different components, which tends to make troubleshooting more difficult than it would be in a physical desktop environment. This complexity also means that the initial startup cost tends to be high. An organization must purchase and deploy several components before it can provision the first virtual desktop. These components vary by platform, but can include virtualization hosts, load balancers, security servers and more.&lt;/p&gt;
 &lt;p&gt;There are also licensing costs to consider, and &lt;a href="https://www.techtarget.com/searchvirtualdesktop/feature/Solve-the-mystery-of-VDI-licenses"&gt;VDI licensing costs can be quite high&lt;/a&gt;. In an environment that uses physical desktops, each desktop needs an OS license. Virtual desktops also require an operating system license. However, users must still use a physical device to access their virtual desktop and that physical device, whatever it is, will need a license for its native operating system.&lt;/p&gt;
 &lt;p&gt;This native operating system license is a non-issue for some devices. If a user is working from an iPad for example, the OS license is included with the device. If, however, the user is accessing the virtual desktop environment from a Windows PC, then two OS licenses are required -- one for the native operating system and one for the virtual desktop. These desktop OS licenses are in addition to any server licenses and client access licenses that may be required. Again, the licensing requirements vary by platform and some organizations have found that using an open source technology yields a significant savings.&lt;/p&gt;
 &lt;p&gt;It's also important to consider whether any users' applications will run on a virtual desktop. While most applications will generally work fine in a virtual desktop environment, some will require minor alterations. There are also applications that either will not work or are not licensed for use in virtual desktop environments.&lt;/p&gt;
 &lt;p&gt;Virtual desktop administrators must carefully design virtual desktop environments to avoid having any single points of failure. This means organizations must invest in redundant hypervisors, connection brokers, load balancers and more. Redundancy improves reliability and performance, but it also increases hardware and licensing costs. This will affect both upfront costs and monthly payments as well as overall support and maintenance costs.&lt;/p&gt;
&lt;/section&gt;          
&lt;section class="section main-article-chapter" data-menu-title="Is VDI still relevant today?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Is VDI still relevant today?&lt;/h2&gt;
 &lt;p&gt;Given the cost and complexity associated with VDI, organizations must stop and consider whether VDI is still a viable option in today's desktop market.&lt;/p&gt;
 &lt;p&gt;In some ways, VDI is still relevant. In recent years, trends such as &lt;a href="https://www.techtarget.com/searchhrsoftware/definition/hybrid-work-model"&gt;hybrid work&lt;/a&gt; and BYOD have increasingly gained traction, so users frequently work from outside the office using a wide variety of devices. VDI can go a long way toward meeting the challenges associated with BYOD and hybrid work because it allows users to work from a carefully configured and secure enterprise desktop regardless of where they are working from and what type of device they are using. Additionally, the virtual desktop serves as an abstraction layer, reducing the chances of a user saving corporate data on their personal device.&lt;/p&gt;
 &lt;p&gt;Another reason why an organization might choose to use VDI in 2023 is because of the need to support legacy applications. One of the best things about VDI environments is that most VDI platforms give administrators a great deal of flexibility for the way that virtual desktops are configured. This means an organization might be able to &lt;a href="https://www.techtarget.com/searchvirtualdesktop/feature/Application-virtualizationbreathes-digital-life-into-legacy-apps"&gt;configure a virtual desktop to run custom and legacy applications&lt;/a&gt;, while running the same application on a cloud-based platform might not be an option.&lt;/p&gt;
 &lt;p&gt;Organizations might also opt to continue using VDI virtual desktops in 2023 because of legal or compliance reasons. VDI environments allow virtual desktops to run on virtual machines in the organization's own data center. This may make it easier for an organization to comply with certain regulations, particularly regarding the geographic location of data.&lt;/p&gt;
 &lt;p&gt;Finally, there are also business reasons to consider. Specifically, if an organization has invested in &lt;a href="https://www.techtarget.com/searchvirtualdesktop/opinion/11-more-alternative-desktop-and-app-virtualization-vendors"&gt;a pricey virtual desktop environment&lt;/a&gt;, then it may not seem prudent to abandon that investment just to move to a cloud-based &lt;a href="https://www.techtarget.com/searchvirtualdesktop/definition/desktop-as-a-service-DaaS"&gt;desktop as a service (DaaS)&lt;/a&gt; environment. This may be especially true if the organization has not yet fully depreciated the hardware cost or if the organization is locked into long-term support contracts.&lt;/p&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="DaaS as an alternative to modern VDI"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;DaaS as an alternative to modern VDI&lt;/h2&gt;
 &lt;p&gt;While many organizations continue to run traditional VDI environments, the market has expanded to include cloud-hosted desktops and DaaS. These alternatives reduce infrastructure management while still delivering centralized desktops.&lt;/p&gt;
 &lt;p&gt;Modern platforms such as Azure Virtual Desktop, Windows 365 and other hosted desktop services now offer alternatives that combine traditional VDI capabilities with cloud-based management.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/virt_desktop-vdi_vs_daas-f.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/virt_desktop-vdi_vs_daas-f_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/virt_desktop-vdi_vs_daas-f_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/virt_desktop-vdi_vs_daas-f.png 1280w" alt="Chart comparing VDI and DaaS showing infrastructure location, management responsibilities and cost models." height="247" width="560"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Key differences between virtual desktop infrastructure (VDI) and desktop as a service (DaaS) include where desktops are hosted, who manages the infrastructure and how licensing and costs are structured.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;p&gt;One of the biggest advantages of DaaS is that it is generally offered as a managed service, meaning that IT pros don't have to worry about managing or maintaining the underlying infrastructure. The hosting company handles everything from patch management to hardware refreshes.&lt;/p&gt;
 &lt;p&gt;Another advantage of using DaaS is that by &lt;a href="https://www.techtarget.com/searchvirtualdesktop/feature/Comparing-AVD-vs-VDI-and-how-to-start-a-migration-plan"&gt;moving virtual desktops out of a data center&lt;/a&gt;, organizations may free up a considerable amount of internet bandwidth for other uses. This is especially true if most of the users work remotely.&lt;/p&gt;
 &lt;p&gt;Finally, DaaS is likely going to be the obvious choice for organizations that are &lt;a href="https://www.techtarget.com/searchvirtualdesktop/answer/Comparing-virtual-desktops-vs-remote-desktops"&gt;just getting started with virtual desktops&lt;/a&gt;. Setting up a VDI environment from scratch requires a large upfront investment and a considerable amount of time. Building up VDI also requires certain skills from the IT department and may take up a significant portion of their time, thus pulling resources away from other tasks. In contrast, organizations can implement a DaaS environment in a matter of hours and for a small fraction of the VDI startup cost.&lt;/p&gt;
 &lt;p&gt;&lt;/p&gt;
 &lt;p&gt;&lt;em&gt;Brien Posey is a former 22-time Microsoft MVP and a commercial astronaut candidate. In his more than 30 years in IT, he has served as a lead network engineer for the U.S. Department of Defense and a network administrator for some of the largest insurance companies in America&lt;/em&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>Determining how to host and manage desktops across an organization is a major decision. Business leaders should understand the pros, costs and complexity of modern VDI.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/competition_a237411574.jpg</image>
            <link>https://www.techtarget.com/searchvirtualdesktop/answer/What-are-the-biggest-pros-and-cons-of-VDI</link>
            <pubDate>Fri, 06 Mar 2026 09:05:00 GMT</pubDate>
            <title>Pros and cons of building up VDI in the current market</title>
        </item>
        <item>
            <body>&lt;p&gt;Desktop as a Service (DaaS) is a cloud computing offering in which a third party hosts the back end of a virtual desktop infrastructure (&lt;a href="https://www.techtarget.com/searchvirtualdesktop/definition/virtual-desktop-infrastructure-VDI"&gt;VDI&lt;/a&gt;) deployment.&lt;/p&gt; 
&lt;p&gt;DaaS allows authorized end users who have a reliable internet connection to connect to a &lt;a href="https://www.techtarget.com/searchvirtualdesktop/definition/virtual-desktop"&gt;virtual desktop&lt;/a&gt; in the cloud from almost any type of computing device. Essentially, the user's PC, &lt;a href="https://www.techtarget.com/searchnetworking/definition/thin-client"&gt;thin client&lt;/a&gt;, tablet or smartphone becomes an access point that can connect remotely to a virtual desktop hosted by the &lt;a href="https://www.techtarget.com/searchitchannel/definition/cloud-service-provider-cloud-provider"&gt;cloud service provider&lt;/a&gt;. End users typically access their virtual desktop(s) through a web browser or dedicated client application provided by the DaaS vendor.&lt;/p&gt; 
&lt;p&gt;DaaS offerings are designed to provide authorized users with the same responsive performance, personalized settings and seamless access to applications and files as in-house VDI deployments. With DaaS, however, the desktop operating systems (&lt;a href="https://www.techtarget.com/whatis/definition/operating-system-OS"&gt;OSes&lt;/a&gt;) and apps run inside virtual machines (&lt;a href="https://www.techtarget.com/searchitoperations/definition/virtual-machine-VM"&gt;VMs&lt;/a&gt;) that are hosted on &lt;a href="https://www.techtarget.com/whatis/definition/server"&gt;servers&lt;/a&gt; managed by the cloud service provider.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="How does desktop as a service work?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;How does desktop as a service work?&lt;/h2&gt;
 &lt;p&gt;DaaS can be purchased through a subscription model that bundles infrastructure, OS licensing and (sometimes) &lt;a href="https://www.techtarget.com/searchenterprisedesktop/definition/desktop-management"&gt;desktop management&lt;/a&gt; services. In most cases, DaaS runs on a multi-tenant architecture in the cloud. Each tenant (customer) is logically isolated so their data, applications and policies remain secure and separate. In business settings, users might need to use credentials that are tied to an identity and access management (&lt;a href="https://www.techtarget.com/searchsecurity/definition/identity-access-management-IAM-system"&gt;IAM&lt;/a&gt;) system like &lt;a target="_blank" href="https://www.microsoft.com/en-us/security/business/identity-access/microsoft-entra-id" rel="noopener"&gt;Microsoft Entra ID&lt;/a&gt; (formerly Azure Active Directory) in order to access their virtual desktop(s).&lt;/p&gt;
 &lt;p&gt;On the back end, the DaaS environment consists of several interconnected components. The management layer, which can also be called the &lt;i&gt;control plane&lt;/i&gt; or &lt;i&gt;connection broker&lt;/i&gt;, is responsible for provisioning or assigning desktops, monitoring their use and enforcing &lt;a href="https://www.techtarget.com/searchsecurity/feature/How-to-create-a-data-security-policy-with-template"&gt;security policies&lt;/a&gt;. Virtual machines provide the actual desktop environments, and &lt;a href="https://www.techtarget.com/searchstorage/tip/Comparing-4-decentralized-data-storage-offerings"&gt;cloud storage systems&lt;/a&gt; retain user files, profiles and settings.&lt;/p&gt;
 &lt;p&gt;As with on-premises VDI, cloud desktop services use a &lt;a href="https://www.techtarget.com/searchenterprisedesktop/definition/Remote-Desktop-Protocol-RDP"&gt;remote desktop protocol&lt;/a&gt; like Microsoft RDP, &lt;a target="_blank" href="https://www.citrix.com/glossary/what-is-hdx.html" rel="noopener"&gt;Citrix HDX&lt;/a&gt; or &lt;a target="_blank" href="https://blogs.vmware.com/euc/2016/09/story-of-vmware-blast.html" rel="noopener"&gt;VMware Blast&lt;/a&gt; to stream virtual desktops to &lt;a href="https://www.techtarget.com/whatis/definition/endpoint-device"&gt;endpoint devices&lt;/a&gt;. This type of protocol continually sends the visual output of the user's desktop to the user's device while also capturing the user's keyboard strokes, mouse clicks and touchscreen gestures.&lt;/p&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="VDI vs. DaaS"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;VDI vs. DaaS&lt;/h2&gt;
 &lt;p&gt;VDI and DaaS are often confused because both involve delivering virtual desktops to end users, but they're deployed and managed in very different ways.&lt;/p&gt;
 &lt;p&gt;VDI &lt;a href="https://www.techtarget.com/searchvirtualdesktop/definition/desktop-virtualization"&gt;desktop virtualization&lt;/a&gt; deployments run in an organization's own &lt;a href="https://www.techtarget.com/searchdatacenter/definition/data-center"&gt;data center&lt;/a&gt; or on &lt;a href="https://www.techtarget.com/searchcloudcomputing/tip/Top-public-cloud-providers-A-brief-comparison"&gt;public cloud&lt;/a&gt; infrastructure and are self-managed by the organization's own information technology (IT) staff.&lt;/p&gt;
 &lt;div class="youtube-iframe-container"&gt;
  &lt;iframe id="ytplayer-0" src="https://www.youtube.com/embed/Nz9r3HxI8qI?si=Tq5FtHlXjv-k3M0w?autoplay=0&amp;amp;modestbranding=1&amp;amp;rel=0&amp;amp;widget_referrer=null&amp;amp;enablejsapi=1&amp;amp;origin=https://www.techtarget.com" type="text/html" height="360" width="640" frameborder="0"&gt;&lt;/iframe&gt;
 &lt;/div&gt;
 &lt;p&gt;In contrast, desktop as a service (&lt;a href="https://www.techtarget.com/searchvirtualdesktop/definition/desktop-as-a-service-DaaS"&gt;DaaS&lt;/a&gt;) is VDI technology that's delivered as a managed cloud service. Desktop as a service provides many of the same advantages that virtual desktop infrastructure does without requiring a significant upfront investment in compute, storage and network infrastructure.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/virt_desktop-vdi_vs_daas-f.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/virt_desktop-vdi_vs_daas-f_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/virt_desktop-vdi_vs_daas-f_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/virt_desktop-vdi_vs_daas-f.png 1280w" alt="This image compares VDI and DaaS infrastructure, management and cost." height="247" width="560"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;VDI is self-managed and typically runs in an organization's own data center, while DaaS is a managed cloud service that provides virtual desktops through a subscription model.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;p&gt;It should be noted that if an organization runs its own VDI deployment on public cloud infrastructure, it's still VDI, not DaaS. It only becomes DaaS if the cloud provider or a third-party managed service provider (&lt;a href="https://www.techtarget.com/searchitchannel/definition/managed-service-provider"&gt;MSP&lt;/a&gt;) is responsible for running the VDI infrastructure &lt;a href="https://www.techtarget.com/searchitchannel/Guide-to-building-and-executing-an-MSP-business-model"&gt;as a managed service&lt;/a&gt;.&lt;/p&gt;
&lt;/section&gt;       
&lt;section class="section main-article-chapter" data-menu-title="Use cases for desktop as a service"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Use cases for desktop as a service&lt;/h2&gt;
 &lt;p&gt;Desktop as a service is widely used in scenarios where scalability and centralized management are important concerns. DaaS is particularly attractive for large enterprises, &lt;a target="_blank" href="https://github.com/yanirs/established-remote" rel="noopener"&gt;remote-first companies&lt;/a&gt; and organizations in industries that have high compliance and/or data security requirements. Popular use cases for DaaS include:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Improving security. &lt;/b&gt;When properly configured, DaaS can &lt;a href="https://www.techtarget.com/searchsecurity/tip/Cybersecurity-risk-management-Best-practices-and-frameworks"&gt;help mitigate many of the security risks&lt;/a&gt; associated with physical devices, including risks posed by lost or stolen laptops, malware infections or insecure &lt;a href="https://www.techtarget.com/searchdatabackup/definition/removable-media"&gt;removable media&lt;/a&gt;. Common DaaS security features include multifactor authentication (&lt;a href="https://www.techtarget.com/searchsecurity/definition/multifactor-authentication-MFA"&gt;MFA&lt;/a&gt;), encryption, conditional access policies and the ability to restrict data transfers to specific types of endpoints or storage media.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Providing better business continuity.&lt;/b&gt; Desktop as a service &lt;a href="https://www.techtarget.com/searchdatabackup/tip/Use-backup-and-business-continuity-planning-to-protect-data"&gt;supports business continuity&lt;/a&gt; by allowing users to log in from anywhere. If a local office or data center experiences a disaster, work can continue from another location that still has power and internet connectivity.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Supporting shift work.&lt;/b&gt; DaaS deployments allow multiple employees on different work shifts to securely share the same physical computing device. Essentially, the physical computing device becomes a wired or &lt;a href="https://www.techtarget.com/searchmobilecomputing/definition/access-point"&gt;wireless access point&lt;/a&gt; that allows the user to connect to a cloud-hosted virtual desktop.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Supporting remote and hybrid work.&lt;/b&gt; DaaS makes it easier and safer for remote and hybrid employees to use corporate desktops and apps on personal computing devices.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Supporting contractors and seasonal workers.&lt;/b&gt; DaaS allows organizations to quickly provision desktops for temporary workers without having to purchase new hardware or build out additional infrastructure.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Facilitating compliance in regulated industries.&lt;/b&gt; Healthcare, finance, government and legal organizations often use DaaS to manage sensitive data in the cloud. This deployment model helps organizations meet compliance regulations, such as the Health Insurance Portability and Accountability Act (&lt;a href="https://www.techtarget.com/searchhealthit/definition/HIPAA"&gt;HIPAA&lt;/a&gt;), the Payment Card Industry Data Security Standard (&lt;a href="https://www.techtarget.com/searchsecurity/definition/PCI-DSS-Payment-Card-Industry-Data-Security-Standard"&gt;PCI-DSS&lt;/a&gt;) and/or the General Data Protection Regulation (&lt;a href="https://www.computerweekly.com/opinion/GDPRs-7th-anniversary-in-the-AI-age-privacy-legislation-is-still-relevant"&gt;GDPR&lt;/a&gt;), while also reducing security risks on devices.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Allowing Mac users to run Windows. &lt;/b&gt;DaaS gives Mac users the ability to work in a Windows environment without needing to use dual boot, Boot Camp or local virtualization software.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Reducing hardware costs.&lt;/b&gt; Because DaaS runs in the cloud, end users can use older PCs or &lt;a href="https://www.techtarget.com/searchvirtualdesktop/tip/Evaluating-tablets-as-thin-clients-in-the-enterprise"&gt;tablets as thin clients&lt;/a&gt;. This can extend the hardware's lifecycle while also helping to keep an organization's capital expenditures (&lt;a href="https://www.techtarget.com/whatis/definition/CAPEX-capital-expenditure"&gt;Capex&lt;/a&gt;) line items as low as possible.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="Advantages and disadvantages of DaaS"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Advantages and disadvantages of DaaS&lt;/h2&gt;
 &lt;p&gt;Like any technology, desktop as a service has both &lt;a href="https://www.techtarget.com/searchvirtualdesktop/feature/What-are-the-pros-and-cons-of-DaaS"&gt;advantages and disadvantages&lt;/a&gt;. For example, while DaaS reduces the need for organizations to buy and maintain additional hardware and infrastructure for each new remote employee, a positive user experience (UX) depends on whether the remote worker has a reliable internet connection and sufficient &lt;a href="https://www.techtarget.com/searchnetworking/definition/bandwidth"&gt;bandwidth&lt;/a&gt;.&lt;/p&gt;
 &lt;p&gt;Here are some additional pros and cons of using desktop-as-a-service technology:&lt;/p&gt;
 &lt;h3&gt;Advantages of DaaS&lt;/h3&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Cloud service providers make it easy to scale virtual desktop deployments up or down as needed.&lt;/li&gt; 
  &lt;li&gt;DaaS lets users work from a computing device of their choosing.&lt;/li&gt; 
  &lt;li&gt;DaaS subscriptions can help organizations shift desktop delivery from a Capex to an Opex expense.&lt;/li&gt; 
  &lt;li&gt;In some cases, DaaS can help reduce licensing costs per user by allowing an application to be installed once in the user's cloud desktop and accessed from any device the service-level agreement (SLA) permits.&lt;/li&gt; 
  &lt;li&gt;Administrators can quickly disconnect a compromised device from the service through the cloud management platform or the organization's IAM system.&lt;/li&gt; 
  &lt;li&gt;DaaS can help simplify &lt;a href="https://www.techtarget.com/searchdisasterrecovery/feature/Disaster-recovery-glossary-Terms-to-know"&gt;disaster recovery&lt;/a&gt; by consolidating user data in the cloud.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;h3&gt;Disadvantages of DaaS&lt;/h3&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;If the end user's internet connection is unreliable, they might experience lag, &lt;a href="https://www.techtarget.com/searchunifiedcommunications/definition/jitter"&gt;jitter&lt;/a&gt; or lose access to their desktop.&lt;/li&gt; 
  &lt;li&gt;Some application vendors impose restrictions on how their software can be used in virtualized environments.&lt;/li&gt; 
  &lt;li&gt;Microsoft licenses for virtualized environments can be complex, especially when third-party DaaS providers are involved.&lt;/li&gt; 
  &lt;li&gt;Persistent desktop services are generally more expensive than nonpersistent ones because they require more resources.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;       
&lt;section class="section main-article-chapter" data-menu-title="Persistent vs. nonpersistent DaaS desktops"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Persistent vs. nonpersistent DaaS desktops&lt;/h2&gt;
 &lt;p&gt;Many DaaS providers support both persistent and nonpersistent desktops so organizations can match the right desktop type to different user needs and workloads.&lt;/p&gt;
 &lt;p&gt;A &lt;i&gt;persistent&lt;/i&gt; desktop saves all changes the user makes during a session, and the next time the user logs in, they are sent the same VM with all their changes intact. Persistent desktops provide end users with a highly personalized experience, but they require additional &lt;a href="https://www.techtarget.com/searchstorage/definition/cloud-storage"&gt;cloud storage&lt;/a&gt;, which can add to the cost of a subscription.&lt;/p&gt;
 &lt;p&gt;In contrast, a &lt;i&gt;nonpersistent&lt;/i&gt; desktop gives the user a fresh instance of the base desktop image each time they log in. When the user logs out, the desktop is reset to its original state and any changes are discarded. Nonpersistent desktops are easier and cheaper to manage at scale because they &lt;a href="https://www.techtarget.com/searchvirtualdesktop/tip/How-to-create-and-manage-Azure-Virtual-Desktop-golden-images"&gt;use a single golden image&lt;/a&gt;. Once an update, software patch or configuration change has been made to the golden image, it will be applied to all future user sessions.&lt;/p&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="DaaS providers"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;DaaS providers&lt;/h2&gt;
 &lt;p&gt;Organizations need to do their homework before selecting a DaaS provider. Not all DaaS services offer the same pricing, performance, security or compliance features, so decision-makers need to ensure the vendor and subscription tier they choose meet both the users' and organization's needs.&lt;/p&gt;
 &lt;p&gt;The comparison table below provides an overview of the different factors organizations should consider before they select a DaaS provider.&lt;/p&gt;
 &lt;table class="main-article-table"&gt; 
  &lt;thead&gt; 
   &lt;tr&gt; 
    &lt;td&gt; &lt;p&gt;&lt;span style="color: #ecf0f1;"&gt;&lt;b&gt;Vendor / Product&lt;/b&gt;&lt;/span&gt;&lt;/p&gt; &lt;/td&gt; 
    &lt;td&gt; &lt;p&gt;&lt;span style="color: #ecf0f1;"&gt;&lt;b&gt;Hosting&lt;/b&gt;&lt;/span&gt;&lt;/p&gt; &lt;/td&gt; 
    &lt;td&gt; &lt;p&gt;&lt;span style="color: #ecf0f1;"&gt;&lt;b&gt;Requirements &lt;/b&gt;&lt;/span&gt;&lt;/p&gt; &lt;/td&gt; 
    &lt;td&gt; &lt;p&gt;&lt;span style="color: #ecf0f1;"&gt;&lt;b&gt;Licensing&lt;/b&gt;&lt;/span&gt;&lt;/p&gt; &lt;/td&gt; 
    &lt;td&gt; &lt;p&gt;&lt;span style="color: #ecf0f1;"&gt;&lt;b&gt;Setup&lt;/b&gt;&lt;/span&gt;&lt;/p&gt; &lt;/td&gt; 
    &lt;td&gt; &lt;p&gt;&lt;span style="color: #ecf0f1;"&gt;&lt;b&gt;Support&lt;/b&gt;&lt;/span&gt;&lt;/p&gt; &lt;/td&gt; 
   &lt;/tr&gt; 
  &lt;/thead&gt; 
  &lt;tbody&gt; 
   &lt;tr&gt; 
    &lt;td&gt; &lt;p&gt;&lt;b&gt;Amazon WorkSpaces&lt;/b&gt;&lt;/p&gt; &lt;/td&gt; 
    &lt;td&gt; &lt;p&gt;AWS public cloud (multi-region)&lt;/p&gt; &lt;/td&gt; 
    &lt;td&gt; &lt;p&gt;AWS account&lt;/p&gt; &lt;/td&gt; 
    &lt;td&gt; &lt;p&gt;OS license bundled; BYOL for Microsoft apps possible; hourly or monthly subscription pricing&lt;/p&gt; &lt;/td&gt; 
    &lt;td&gt; &lt;p&gt;Minimal setup, auto-provisioned via AWS console&lt;/p&gt; &lt;/td&gt; 
    &lt;td&gt; &lt;p&gt;Standard AWS Support plans (Basic, Developer, Business, Enterprise) -- charged separately&lt;/p&gt; &lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td&gt; &lt;p&gt;&lt;b&gt;Azure Virtual Desktop (AVD)&lt;/b&gt;&lt;/p&gt; &lt;/td&gt; 
    &lt;td&gt; &lt;p&gt;Microsoft Azure cloud&lt;/p&gt; &lt;/td&gt; 
    &lt;td&gt; &lt;p&gt;Azure subscription; Microsoft 365 or Windows license; Azure AD integration&lt;/p&gt; &lt;/td&gt; 
    &lt;td&gt; &lt;p&gt;Eligible Microsoft 365/Windows licenses cover internal users; external users require additional access pricing; Azure resources billed separately&lt;/p&gt; &lt;/td&gt; 
    &lt;td&gt; &lt;p&gt;Moderate setup -- requires Azure infra and identity integration&lt;/p&gt; &lt;/td&gt; 
    &lt;td&gt; &lt;p&gt;Microsoft Unified Support or pay-as-you-go Azure support tiers&lt;/p&gt; &lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td&gt; &lt;p&gt;&lt;b&gt;Omnissa Horizon Cloud&lt;/b&gt; &lt;i&gt;(formerly VMware Horizon Cloud)&lt;/i&gt;&lt;/p&gt; &lt;/td&gt; 
    &lt;td&gt; &lt;p&gt;Omnissa cloud + hybrid deployment options&lt;/p&gt; &lt;/td&gt; 
    &lt;td&gt; &lt;p&gt;Horizon subscription; enterprise IT team for deployment&lt;/p&gt; &lt;/td&gt; 
    &lt;td&gt; &lt;p&gt;Subscription-based; costs vary by package (Standard, Advanced, Enterprise); Microsoft licensing rules apply&lt;/p&gt; &lt;/td&gt; 
    &lt;td&gt; &lt;p&gt;Higher setup effort; best for enterprises that need hybrid cloud services&lt;/p&gt; &lt;/td&gt; 
    &lt;td&gt; &lt;p&gt;Omnissa enterprise support (successor to VMware Global Support Services)&lt;/p&gt; &lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td&gt; &lt;p&gt;&lt;b&gt;Dizzion Frame&lt;/b&gt; &lt;i&gt;(formerly Nutanix Frame)&lt;/i&gt;&lt;/p&gt; &lt;/td&gt; 
    &lt;td&gt; &lt;p&gt;Dizzion cloud or customer cloud (AWS, Azure, GCP)&lt;/p&gt; &lt;/td&gt; 
    &lt;td&gt; &lt;p&gt;Dizzion subscription&lt;/p&gt; &lt;/td&gt; 
    &lt;td&gt; &lt;p&gt;Licensing bundled with subscription; flexible hybrid deployment supported&lt;/p&gt; &lt;/td&gt; 
    &lt;td&gt; &lt;p&gt;Low to moderate setup -- browser-based management simplifies provisioning&lt;/p&gt; &lt;/td&gt; 
    &lt;td&gt; &lt;p&gt;Direct support from Dizzion (24/7 options available), often bundled into subscription&lt;/p&gt; &lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td&gt; &lt;p&gt;&lt;b&gt;Citrix DaaS&lt;/b&gt; &lt;i&gt;(formerly Citrix Virtual Apps and Desktops Service)&lt;/i&gt;&lt;/p&gt; &lt;/td&gt; 
    &lt;td&gt; &lt;p&gt;Citrix Cloud service on Azure, AWS, GCP, or hybrid&lt;/p&gt; &lt;/td&gt; 
    &lt;td&gt; &lt;p&gt;Citrix Cloud subscription; enterprise identity system&lt;/p&gt; &lt;/td&gt; 
    &lt;td&gt; &lt;p&gt;Subscription-based; integrates with Microsoft licensing for Windows; supports SaaS, VDI, and hybrid deployments&lt;/p&gt; &lt;/td&gt; 
    &lt;td&gt; &lt;p&gt;Moderate to high setup depending on architecture; strong use in regulated industries&lt;/p&gt; &lt;/td&gt; 
    &lt;td&gt; &lt;p&gt;Citrix Standard and Premium Support packages; enterprise SLAs available&lt;/p&gt; &lt;/td&gt; 
   &lt;/tr&gt; 
  &lt;/tbody&gt; 
 &lt;/table&gt;
 &lt;p&gt;&lt;i&gt;Learn &lt;/i&gt;&lt;i&gt;more about Omnissa, the company that took over VMware's end-user computing division, and &lt;a href="https://www.techtarget.com/searchvirtualdesktop/opinion/Who-owns-Omnissa-and-whats-next-for-this-vendor"&gt;find out what's expected next&lt;/a&gt; for this vendor's subscription licensing model and product offerings.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>Desktop as a service (DaaS) is a cloud computing offering in which a third party hosts the back end of a virtual desktop infrastructure (VDI) deployment.</description>
            <image>https://cdn.ttgtmedia.com/visuals/digdeeper/3.jpg</image>
            <link>https://www.techtarget.com/searchvirtualdesktop/definition/desktop-as-a-service-DaaS</link>
            <pubDate>Wed, 15 Oct 2025 00:00:00 GMT</pubDate>
            <title>What is desktop as a service (DaaS)?</title>
        </item>
        <item>
            <body>&lt;p&gt;A graphics processing unit (GPU) is a computer &lt;a href="https://www.techtarget.com/whatis/definition/microchip"&gt;chip&lt;/a&gt; that renders graphics and images by performing rapid mathematical calculations. GPUs are used for both professional and personal computing. Originally, GPUs were responsible for the rendering of 2D and &lt;a href="https://www.techtarget.com/whatis/definition/3-D-three-dimensions-or-three-dimensional"&gt;3D&lt;/a&gt; images, animations and video, but now they have a wider use range.&lt;/p&gt; 
&lt;p&gt;Like a central processing unit (&lt;a href="https://www.techtarget.com/whatis/definition/processor"&gt;CPU&lt;/a&gt;), a GPU is also a chip component in computing devices. One important difference is that the GPU is specifically designed to handle and accelerate graphics workloads and display graphics content on a device such as a PC or &lt;a href="https://www.techtarget.com/searchmobilecomputing/definition/smartphone"&gt;smartphone&lt;/a&gt;.&lt;/p&gt; 
&lt;p&gt;An electronic device with an &lt;a href="https://www.techtarget.com/whatis/definition/embedded-device"&gt;embedded&lt;/a&gt; or discrete GPU can smoothly render 3D graphics and video content, making it suitable for gaming and other visual applications. Over time, technological improvements have resulted in more flexible and programmable GPUs that can be used for many more applications and workloads other than gaming. GPUs are now used for creative content production, video editing, high-performance computing (&lt;a href="https://www.techtarget.com/searchdatacenter/definition/high-performance-computing-HPC"&gt;HPC&lt;/a&gt;) and artificial intelligence (&lt;a href="https://www.techtarget.com/searchenterpriseai/definition/AI-Artificial-Intelligence"&gt;AI&lt;/a&gt;).&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="What does a GPU do?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;What does a GPU do?&lt;/h2&gt;
 &lt;p&gt;In the early days of computing, the CPU performed the calculations required for graphics applications, such as the rendering of 2D and 3D images, animations and video. As more graphics-intensive applications were developed, however, their demands put a strain on the CPU and decreased the computer's overall performance.&lt;/p&gt;
 &lt;p&gt;Today, a GPU is a specialized computing system that performs these tasks:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Handles graphics-related tasks in lieu of the CPU.&lt;/li&gt; 
  &lt;li&gt;Performs graphics calculations very quickly.&lt;/li&gt; 
  &lt;li&gt;Uses &lt;a href="https://www.techtarget.com/searchdatacenter/definition/parallel-processing"&gt;parallel processing&lt;/a&gt; to increase processing performance.&lt;/li&gt; 
  &lt;li&gt;Delivers graphic content to the computer display.&lt;/li&gt; 
  &lt;li&gt;Frees up the CPU to handle all other processing tasks.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="How does a GPU work?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;How does a GPU work?&lt;/h2&gt;
 &lt;p&gt;GPUs work by using parallel processing, where multiple processors handle separate parts of a single task. A GPU will also have its own &lt;a href="https://www.techtarget.com/searchstorage/definition/RAM-random-access-memory"&gt;RAM&lt;/a&gt; to store the data it is processing. This RAM is designed specifically to hold the large amounts of information coming into the GPU for highly intensive graphics use cases.&lt;/p&gt;
 &lt;p&gt;For graphics applications, the CPU sends instructions to the GPU for drawing the graphics content on a screen. The GPU executes the instructions in parallel and at high speeds to display the content on the device -- a process known as the graphics or rendering &lt;a href="https://www.techtarget.com/whatis/definition/pipelining"&gt;pipeline&lt;/a&gt;.&lt;/p&gt;
 &lt;div class="youtube-iframe-container"&gt;
  &lt;iframe id="ytplayer-0" src="https://www.youtube.com/embed/_DNxgnINNAY?autoplay=0&amp;amp;modestbranding=1&amp;amp;rel=0&amp;amp;widget_referrer=null&amp;amp;enablejsapi=1&amp;amp;origin=https://www.techtarget.com" type="text/html" height="360" width="640" frameborder="0"&gt;&lt;/iframe&gt;
 &lt;/div&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="Are GPUs and graphics cards the same?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Are GPUs and graphics cards the same?&lt;/h2&gt;
 &lt;p&gt;GPU and graphics card are two terms that are sometimes used interchangeably. However, there are some important distinctions between the two. The main difference is that the GPU is a specific unit within a graphics card, among other components. The GPU is what performs the image and graphics processing. The graphics card presents images to the display unit.&lt;/p&gt;
 &lt;h3&gt;GPU use cases: What GPUs are used for today&lt;/h3&gt;
 &lt;p&gt;GPUs are widely used for PC gaming, allowing for smooth, high-quality graphics rendering. Modern GPUs are also adapted to a wider variety of tasks than they were originally designed for, partially because they are more programmable than they were in the past. That's why GPUs are now also used to &lt;a href="https://www.techtarget.com/searchenterpriseai/feature/CPUs-vs-GPUs-for-AI-workloads"&gt;accelerate AI workloads&lt;/a&gt; and for machine learning (&lt;a href="https://www.techtarget.com/searchenterpriseai/definition/machine-learning-ML"&gt;ML&lt;/a&gt;).&lt;/p&gt;
 &lt;p&gt;Some of the most popular applications of GPUs include:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Rendering real-time 2D and 3D graphics&lt;/b&gt;. These devices perform complicated mathematical calculations using &lt;a href="https://www.techtarget.com/whatis/definition/algorithm"&gt;algorithms&lt;/a&gt; that convert moving bits into &lt;a href="https://www.techtarget.com/whatis/definition/pixel"&gt;pixels&lt;/a&gt; on displays.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Video editing and video content creation&lt;/b&gt;. When used for video content creation and editing, GPUs deliver high-resolution images and videos, enhanced video effects using AI, and provide sufficient RAM to handle the computational requirements of video content.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Video game graphics.&lt;/b&gt; Video game GPUs perform the same kinds of complex calculations using parallel processing as for other graphics tasks, and deliver images and videos by managing tasks such as shading, lighting and texturing, each of which is needed for realistic game visuals.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Accelerating AI/ML applications.&lt;/b&gt; GPUs have the processing power needed to support the massive computations and algorithms used in AI and ML applications, such as image recognition and &lt;a href="https://www.techtarget.com/searchenterpriseai/definition/face-detection"&gt;facial detection&lt;/a&gt; and &lt;a href="https://www.techtarget.com/searchenterpriseai/definition/facial-recognition"&gt;recognition&lt;/a&gt;.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Training deep learning neural networks&lt;/b&gt;. GPUs have thousands of smaller core memory units that work in parallel to provide the matrix processing needed for &lt;a href="https://www.techtarget.com/searchenterpriseai/definition/deep-learning-deep-neural-network"&gt;deep learning&lt;/a&gt; training and &lt;a href="https://www.techtarget.com/searchenterpriseai/definition/neural-network"&gt;neural networks&lt;/a&gt;.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Cryptomining. &lt;/b&gt;GPUs support cryptocurrency mining, especially for coins that employ Proof of Work (&lt;a href="https://www.techtarget.com/whatis/feature/Proof-of-work-vs-proof-of-stake-Whats-the-difference"&gt;PoW&lt;/a&gt;) mechanisms for establishing consensus; they also use parallel processing to perform multiple &lt;a href="https://www.techtarget.com/searchdatamanagement/definition/hashing"&gt;hash&lt;/a&gt; functions.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="Types of GPUs"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Types of GPUs&lt;/h2&gt;
 &lt;p&gt;Generally, there are three types of GPUs:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Integrated GPU. A&lt;/b&gt;n integrated GPU is built into the computer's &lt;a href="https://www.techtarget.com/whatis/definition/motherboard"&gt;motherboard&lt;/a&gt; or could be integrated with the CPU. Systems with integrated GPUs are generally small and light because less space is required to incorporate the GPU. The use of an internal GPU also reduces system power consumption. When buying a system with an internal GPU, care must be taken as the internal GPU may not be upgradeable. If buying a gaming computer, the GPU is an essential part of the device and should be carefully researched.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Discrete GPU.&lt;/b&gt; This is a physically separate GPU and is mounted separately from the CPU and other peripherals on the motherboard. While such devices typically offer far more processing power than an integrated GPU, they also increase power usage and generate additional heat, which may necessitate additional cooling. Discrete GPUs are used for resource-intensive, high-performance applications such as 3D games.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Hybrid GPU.&lt;/b&gt; A hybrid GPU arrangement can take different forms, such as combining an integrated GPU with a discrete GPU in the same system, with one used for normal graphics and the discrete unit for high-performance requirements. Another approach is to combine discrete graphics performance with specialized accelerators, such as for AI applications.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="What is a cloud GPU?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;What is a cloud GPU?&lt;/h2&gt;
 &lt;p&gt;Taking advantage of the convenience, &lt;a href="https://www.techtarget.com/searchdatacenter/definition/scalability"&gt;scalability&lt;/a&gt; and costs of &lt;a href="https://www.techtarget.com/searchcloudcomputing/definition/cloud-computing"&gt;cloud computing&lt;/a&gt; services, users can obtain the GPU functionality they need by obtaining it from a cloud vendor. All three major cloud services, AWS, Microsoft Azure and Google Cloud, offer virtual machines (&lt;a href="https://www.techtarget.com/searchitoperations/definition/virtual-machine-VM"&gt;VMs&lt;/a&gt;) with built-in GPU speed and functionality. Cloud GPU services are typically used in compute-intensive situations involving AI, video game development and &lt;a href="https://www.techtarget.com/whatis/definition/Bitcoin-mining"&gt;bitcoin mining&lt;/a&gt;. As with any activity involving cloud services, cybersecurity must be carefully managed.&lt;/p&gt;
&lt;/section&gt;  
&lt;section class="section main-article-chapter" data-menu-title="GPU vs. CPU"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;GPU vs. CPU&lt;/h2&gt;
 &lt;p&gt;A GPU might be found integrated with a CPU on the same electronic circuit, on a graphics card or in the motherboard of a PC or &lt;a href="https://www.techtarget.com/whatis/definition/server"&gt;server&lt;/a&gt;. GPUs and CPUs are fairly similar in construction. However, CPUs are used to respond to and process the basic instructions that drive a computer, while GPUs are designed specifically to quickly render high-resolution images and video.&lt;/p&gt;
 &lt;p&gt;Essentially, CPUs are responsible for interpreting most of a computer's commands, while GPUs perform more complex mathematical and geometric calculations to focus on graphics rendering and other applications that require intensive calculations.&lt;/p&gt;
 &lt;p&gt;Both processors have different numbers of cores and transistors. The core can be thought of as the processor within the processor. Each core can process its own tasks, or &lt;a href="https://www.techtarget.com/whatis/definition/thread"&gt;threads&lt;/a&gt;. A CPU uses fewer cores and performs tasks sequentially. A GPU, in contrast, might have hundreds or thousands of cores, which allow for parallel processing and lightning-fast graphics output.&lt;/p&gt;
 &lt;p&gt;A single-core CPU usually lacks the capability for parallel processing, but &lt;a href="https://www.techtarget.com/searchdatacenter/definition/multi-core-processor"&gt;multicore processors&lt;/a&gt; can perform calculations in parallel by combining more than one CPU onto the same chip. GPUs can also contain more transistors than a CPU.&lt;/p&gt;
 &lt;p&gt;In addition, a CPU has a higher &lt;a href="https://www.techtarget.com/whatis/definition/clock-speed"&gt;clock speed&lt;/a&gt;, meaning it can perform an individual calculation faster than a GPU, so it is often better equipped to handle basic computing tasks.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/enterprise_ai-cpu_vs_gpu_chips.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/enterprise_ai-cpu_vs_gpu_chips_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/enterprise_ai-cpu_vs_gpu_chips_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/enterprise_ai-cpu_vs_gpu_chips.png 1280w" alt="CPU vs. GPU chips" height="370" width="560"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;While their architectures and technologies are similar, CPUs and GPUs perform discrete functions, with GPUs focused on calculation-intensive computations.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;p&gt;&lt;i&gt;Data centers use three processing units: CPU, GPU, and DPU. Each has unique functions that can be combined to enhance data center performance. Explore &lt;/i&gt;&lt;a href="https://www.techtarget.com/searchdatacenter/tip/How-do-CPU-GPU-and-DPU-differ-from-one-another"&gt;&lt;i&gt;how CPU vs. GPU vs. DPU differ from one another&lt;/i&gt;&lt;/a&gt;&lt;i&gt;.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>A graphics processing unit (GPU) is a computer chip that renders graphics and images by performing rapid mathematical calculations.</description>
            <image>https://cdn.ttgtmedia.com/visuals/digdeeper/2.jpg</image>
            <link>https://www.techtarget.com/searchvirtualdesktop/definition/GPU-graphics-processing-unit</link>
            <pubDate>Fri, 05 Sep 2025 13:00:00 GMT</pubDate>
            <title>What is a graphics processing unit (GPU)?</title>
        </item>
        <item>
            <body>&lt;p&gt;Virtual desktop clients play a crucial role for any organization that uses VDI, Desktop as a Service, or cloud desktops because it is what allows an end user to connect to and use their virtual desktop.&lt;/p&gt; 
&lt;p&gt;This client is designed to access, not run the virtual desktop OS, meaning it sends keyboard and mouse inputs to the virtual desktop and receives screen refreshes. Most of the actual computing occurs on the server that is hosting the virtual desktop.&lt;/p&gt; 
&lt;p&gt;Offloading compute and storage from the endpoint device to a server reduces the hardware requirements for end user devices. In fact, an endpoint device does not necessarily have to meet the minimum hardware requirements for the OS and applications that the user works with, because that software is running on a backend server, not on the client device itself.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="Deciding between thin and thick clients"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Deciding between thin and thick clients&lt;/h2&gt;
 &lt;p&gt;Managing and delivering virtual desktops is a significant task for IT administrators to take on, but sometimes choosing the right endpoint for accessing the virtual desktop can go a long way for the user experience.&lt;/p&gt;
 &lt;p&gt;One key decision surrounding virtual desktop delivery is whether end users access their resources via a &lt;a href="https://www.techtarget.com/searchnetworking/definition/thin-client"&gt;thin client&lt;/a&gt; or a PC running thin client software. Such PCs are commonly referred to as thick clients. Both types of endpoints have their benefits and drawbacks, so IT admins and executives should be sure they know the pros and cons of using both thin and thick clients.&lt;/p&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="Differences between thin clients and thick clients"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Differences between thin clients and thick clients&lt;/h2&gt;
 &lt;p&gt;Thin clients and thick clients -- sometimes referred to as &lt;i&gt;fat clients&lt;/i&gt; -- differ across numerous categories, such as hardware cost, licensing and maintenance. Each organization will have different needs and preferences regarding which functions are most important.&lt;/p&gt;
 &lt;h3&gt;Security&lt;/h3&gt;
 &lt;p&gt;One of the primary benefits of &lt;a href="https://www.techtarget.com/searchvirtualdesktop/tip/Evaluating-tablets-as-thin-clients-in-the-enterprise"&gt;using thin client hardware&lt;/a&gt; compared to thick client hardware is security. Thin client devices may not even be equipped with an internal hard drive and removable media ports, which means &lt;a href="https://www.techtarget.com/searchsecurity/feature/Explore-7-data-loss-prevention-tools-for-utmost-security"&gt;users can't copy data from within the network to removable media&lt;/a&gt;. While it is true that some thin client devices do contain a small amount of internal storage, this storage is almost always reserved for use by the device's internal OS and cannot be used for data storage or for installing applications directly onto the device.&lt;/p&gt;
 &lt;p&gt;Because thin client machines typically do not have an accessible hard drive, there is very little risk of malware infecting the client itself, though under the right circumstances the virtual desktop operating system could be infected.&lt;/p&gt;
 &lt;p&gt;Although &lt;a href="https://www.techtarget.com/searchvirtualdesktop/opinion/Is-it-time-for-a-new-name-for-thin-clients"&gt;a desktop PC can function as a thin client computer&lt;/a&gt;, the thin client software typically resides on top of a normal OS. As such, the device would be susceptible to many of the same types of security risks as it would be if it were operating as a regular PC within the virtual environment.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/virt_desktop-thin_vs_thick_vs_zero_clients-f.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/virt_desktop-thin_vs_thick_vs_zero_clients-f_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/virt_desktop-thin_vs_thick_vs_zero_clients-f_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/virt_desktop-thin_vs_thick_vs_zero_clients-f.png 1280w" alt="An illustration comparing thin, thick and zero clients" height="342" width="560"&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;h3&gt;Startup costs&lt;/h3&gt;
 &lt;p&gt;Initial deployment costs are a major consideration for some organizations. While it is true that thin client hardware typically has a very low price tag, the cost of deploying thin clients may be much higher than that of deploying PCs. For example, organizations that already own PCs can reuse them, which will cut down significantly on hardware costs. At the same time, organizations that start from scratch will see lower costs with thin client hardware. Some thin client devices cost as little as $300 or less out of the box. Organizations can opt for even greater savings if they purchase refurbished devices, but this may not be worth the hassle from a support perspective.&lt;/p&gt;
 &lt;h3&gt;Software licensing costs&lt;/h3&gt;
 &lt;p&gt;When comparing thin clients to thick clients to determine which platform is a better fit, an organization absolutely must consider software licensing costs. Traditional PCs acting as thick clients are almost always required to run a full OS, such as Windows 10 or Windows 11. This is in addition to licensing the client software and any other software that might be installed locally on the PC. As such, an organization could end up being forced to pay for two operating system licenses for each device. One of these licenses covers the local OS while the other applies to the operating system running on the virtual desktop.&lt;/p&gt;
 &lt;p&gt;A dedicated thin client device may come with its own light weight operating system. This could be a Linux kernel, or perhaps a copy of Windows Embedded. This can reduce licensing costs, since the organization would only be responsible for licensing the OS that is running on the virtual desktop.&lt;/p&gt;
 &lt;p&gt;Thin client devices could potentially incur licensing costs that thick clients do not. Some vendors offer management software for thin client devices, and this management software is often licensed on a per device basis. However, some vendors bundle the management license into the device's cost.&lt;/p&gt;
 &lt;p&gt;Licensing requirements can vary widely depending on the virtual desktop operating system that in use are using and on how the virtual desktops are being hosted. Windows 365, Microsoft's cloud desktop offering, for example, is licensed on a per user basis, not a per device basis. However, depending on which tier is in use, there may be additional licensing requirements, such as Microsoft Intune, or Entra ID Premium.&lt;/p&gt;
 &lt;h3&gt;Maintenance costs&lt;/h3&gt;
 &lt;p&gt;One of the big selling points of thin client hardware is that it reduces maintenance costs. Thin client devices are essentially proprietary PCs that only have their most basic components in place. As such, IT doesn't have to perform much maintenance. There are almost no moving parts, so thin client devices also tend to last a long time. However, when a problem does occur, there might be nothing that admins can do to fix it. IT may have to replace the device.&lt;/p&gt;
 &lt;p&gt;Conversely, it is usually easier to fix hardware problems that occur on a PC. Admins can replace the failed component, typically for much less than the cost of &lt;a href="https://www.techtarget.com/searchvirtualdesktop/feature/VDI-hardware-comparison-Thin-vs-thick-vs-zero-clients"&gt;replacing an entire thin client device&lt;/a&gt;.&lt;/p&gt;
 &lt;blockquote class="main-article-pullquote"&gt;
  &lt;div class="main-article-pullquote-inner"&gt;
   &lt;figure&gt;
    Zero clients offer the lowest per device cost, fastest boot times, and smallest attack surface of any of the client types.
   &lt;/figure&gt;
   &lt;i class="icon" data-icon="z"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/blockquote&gt;
 &lt;p&gt;Of course, this is only taking hardware maintenance into account. PCs need consistent maintenance at the software level. For example, IT must routinely install patches to keep a PC's OS, applications, and antivirus software up to date.&lt;/p&gt;
 &lt;h3&gt;Power consumption&lt;/h3&gt;
 &lt;p&gt;When comparing thin and thick client's power consumption, thin clients tend to consume far less power than PCs. Of course, power consumption varies among makes and models, but organizations can count on thin clients generally being far more &lt;a target="_blank" href="https://www.scribd.com/document/505807953/Energy-Study" rel="noopener"&gt;energy efficient&lt;/a&gt; if that's a concern for organizations.&lt;/p&gt;
 &lt;h3&gt;Flexibility&lt;/h3&gt;
 &lt;p&gt;Flexibility is the category in which PCs are finally able to make up some ground. It's clear that thin client devices tend to have more advantages than PCs in virtual desktop environments, but in a business environment, the flexibility provided by PCs could make up for all these disadvantages.&lt;/p&gt;
 &lt;p&gt;For example, consider an organization that goes through a corporate buyout. The organization already has a VDI platform in place, but the organization that completed the acquisition uses mainframes. Because some users have to connect to the VDI environment and the mainframe, it is necessary to replace the existing thin client hardware with PCs.&lt;/p&gt;
 &lt;p&gt;One option is to link the PCs' network cards to the VDI environment while a secondary network card links to a mainframe gateway. Users could then run a dual monitor configuration with one screen displaying the VDI session and the other showing the mainframe session.&lt;/p&gt;
 &lt;p&gt;This functionality and level of flexibility are not possible without dedicated thin client hardware and is just one scenario showcasing how the flexibility of PCs helps organizations.&lt;/p&gt;
 &lt;div class="youtube-iframe-container"&gt;
  &lt;iframe id="ytplayer-0" src="https://www.youtube.com/embed/gctocRTgq-U?si=_5vQSfj9cYXSDFGx?autoplay=0&amp;amp;modestbranding=1&amp;amp;rel=0&amp;amp;widget_referrer=null&amp;amp;enablejsapi=1&amp;amp;origin=https://www.techtarget.com" type="text/html" height="360" width="640" frameborder="0"&gt;&lt;/iframe&gt;
 &lt;/div&gt;
&lt;/section&gt;                           
&lt;section class="section main-article-chapter" data-menu-title="What are zero clients and are they an option?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;&lt;br&gt;What are zero clients and are they an option?&lt;/h2&gt;
 &lt;p&gt;&lt;a href="https://www.techtarget.com/searchvirtualdesktop/definition/zero-client"&gt;Zero clients&lt;/a&gt; are a lot like thin clients, but they take things just a step further. While a thin client typically contains an embedded, lightweight operating system and some minimal hardware resources to support that OS, a zero client has no local operating system at all -- though they do contain firmware. Instead, these devices are configured to connect to a specific virtual desktop platform by using a platform specific protocol such as PC over IP or HDX.&lt;/p&gt;
 &lt;p&gt;Zero clients offer the lowest per device cost, fastest boot times, and smallest attack surface of any of the client types. Because zero clients do not include an OS, there is no internal storage device, and thus, nothing that can be infected by malware.&lt;/p&gt;
 &lt;p&gt;The low cost, simplicity, and security associated might on the surface seem to be ideal. However, this convenience and security comes at a cost. Zero clients lack any sort of flexibility. These clients are designed to do one job, and they cannot be repurposed to do something else. As such, zero clients are often a great choice for organizations that have very clearly defined goals for their endpoints. However, they probably aren't going to be the best choice for use in a highly dynamic environment.&lt;/p&gt;
 &lt;p&gt;&lt;em&gt;Brien Posey is a former 22-time Microsoft MVP and a commercial astronaut candidate. In his more than 30 years in IT, he has served as a lead network engineer for the U.S. Department of Defense and a network administrator for some of the largest insurance companies in America.&lt;/em&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>How do thin and thick clients compare for licensing or flexibility? These endpoints have their role in the enterprise, but they fit into organizations in very different ways.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/competition_a110169470.jpg</image>
            <link>https://www.techtarget.com/searchvirtualdesktop/tip/Weighing-the-pros-and-cons-of-thin-clients-vs-thick-clients-for-VDI</link>
            <pubDate>Tue, 02 Sep 2025 00:00:00 GMT</pubDate>
            <title>Understanding the difference between thin and thick clients</title>
        </item>
        <item>
            <body>&lt;p&gt;Microsoft's roaming profiles give IT administrators a basic option to provide users with their personal settings and data on any Windows device or virtual desktop connected to the corporate network.&lt;/p&gt; 
&lt;p&gt;Windows systems maintain a profile for each user who logs in to the OS. The user's profile folder contains user-specific data and user's packaged data on customizations such as application configuration data, browser history, documents, photos and much more.&lt;/p&gt; 
&lt;p&gt;A user profile's location varies depending on which version of Windows an organization uses, but most newer Windows versions include a folder named C:\Users. A user's local profile lives there in another folder usually titled with the user's name or an identifying number that IT assigns.&lt;/p&gt; 
&lt;p&gt;The problem with standard user profiles is that they are tied to an individual desktop. If users log in from a different physical desktop or virtual desktop, their profile data won't exist on that machine. If the user logs in to a new machine, Windows creates a new and empty local profile for the user. This is where it's important for IT professionals to know what a roaming profile is.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="What is a roaming profile?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;What is a roaming profile?&lt;/h2&gt;
 &lt;p&gt;A roaming profile is very similar to the local profiles that exist on every Windows desktop. The difference is that, rather than being stored locally on the desktop, a roaming profile is stored on a network server. Because the roaming profile is centralized, as opposed to being local to a specific desktop, the profile data can follow the user from one machine to another. This means that the user will have access to all the data that's stored within their profile, regardless of which of the networked Windows PCs they log in to.&lt;/p&gt;
&lt;/section&gt;  
&lt;section class="section main-article-chapter" data-menu-title="How do roaming profiles work?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;How do roaming profiles work?&lt;/h2&gt;
 &lt;p&gt;With a roaming user profile, employees' data follows them from device to device, so long as those devices are part of the same &lt;a href="https://www.techtarget.com/searchwindowsserver/definition/Active-Directory"&gt;Active Directory&lt;/a&gt; environment and run a Windows OS. These profiles are stored on a network server rather than on a desktop computer. Admins can configure Active Directory so that it associates the roaming user profile with the user's account.&lt;/p&gt;
 &lt;figure class="main-article-image half-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/windows_server-active_directory-h.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/windows_server-active_directory-h_half_column_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/windows_server-active_directory-h_half_column_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/windows_server-active_directory-h.png 1280w" alt="A graphic showing the services in Active Directory including Domain Services, Lightweight Directory Services and Certificate Services." height="304" width="279"&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;p&gt;When an employee logs in, Windows copies the user's profile from the network to the local computer that the employee has logged in to. When the employee logs off, Windows copies any updates the user made to profile data from the desktop computer to the network copy of the profile. This process ensures that the roaming user profile contains current data the next time the employee logs in to a &lt;a href="https://www.techtarget.com/searchvirtualdesktop/definition/virtual-desktop"&gt;virtual desktop&lt;/a&gt; or PC.&lt;/p&gt;
 &lt;p&gt;If an organization decides to use roaming profiles, then it will need to take steps to control the volume of data that is associated with each profile. Otherwise, the profile can grow to become quite large. This can be a problem because the profile must be copied to the user's computer each time the user logs on, and the profile also has to be copied from the user's desktop to a network server when the user logs off. In some real-world deployments, it can take nearly an hour for users to log in, simply because of the volume of profile data that had to be copied to the user's desktop as a part of the login process.&lt;/p&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="How to use folder redirection with roaming profiles"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;How to use folder redirection with roaming profiles&lt;/h2&gt;
 &lt;p&gt;The best way to avoid this problem is to use folder redirection. Library folders such as Documents, Pictures and Videos are a part of a user's profile and can accumulate large amounts of data. Many organizations use folder redirection as a way of moving these folders to a network file share, so that they are stored outside of the user's profile. In doing so, the user might have the illusion that documents are still located in their library folders, when the documents are stored on a centrally accessible network share instead.&lt;/p&gt;
 &lt;p&gt;The most obvious benefit to using folder redirection is that it can reduce the time required for a user to log on or log off. However, another potential benefit is that folder redirection can sometimes make it easier to back up a user's files.&lt;/p&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="What are the software and hardware requirements for roaming profiles?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;What are the software and hardware requirements for roaming profiles?&lt;/h2&gt;
 &lt;p&gt;For an organization to use roaming profiles, its servers must be running Windows Server 2008 or newer. Similarly, desktops must be running Windows 7 or later. These systems must be domain joined.&lt;/p&gt;
 &lt;p&gt;If an organization wants to use roaming profiles, then it's best to try to use a consistent version of Windows across all the desktops. If there are multiple desktop versions -- such as some machines &lt;a href="https://www.techtarget.com/whatis/feature/Windows-11-vs-Windows-10-What-are-the-differences"&gt;running Windows 10 and others running Windows 11&lt;/a&gt; -- then IT should create two profile versions -- one for each OS.&lt;/p&gt;
 &lt;p&gt;Admins need to make sure that the server where the profiles reside has enough free space to accommodate all the profiles. Remember, if users need two different versions of each profile, that effectively doubles the storage requirements. IT will also need to let its users know that a profile change that they make to one OS won't show up if they log in to a different OS because two different profiles are being used. This simple fact further underscores the importance of using folder redirection to store documents and other data files outside of the profile.&lt;/p&gt;
 &lt;p&gt;Otherwise, if a user creates a document on a Windows 10 machine, that document might not be available if the user logs in to a machine that's running Windows 11. This holds true even if the user creates the document on a Windows 10 machine and then that machine is upgraded to Windows 11. The document remains inaccessible, even though the user is logging in to the same machine.&lt;/p&gt;
 &lt;blockquote class="main-article-pullquote"&gt;
  &lt;div class="main-article-pullquote-inner"&gt;
   &lt;figure&gt;
    Roaming user profiles are still a good basic option to provide the same experience across PC and virtual desktop environments, but third-party user profile management tools are also available for organizations that know more specific features they need.
   &lt;/figure&gt;
   &lt;i class="icon" data-icon="z"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/blockquote&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="What options are there to manage roaming user profiles?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;What options are there to manage roaming user profiles?&lt;/h2&gt;
 &lt;p&gt;Roaming profiles have been a standard and cost-effective way to deliver user settings across physical and virtual desktops for more than a decade, although Microsoft also released a UX management tool called &lt;a href="https://www.techtarget.com/searchvirtualdesktop/definition/Microsoft-UE-V-User-Experience-Virtualization"&gt;User Experience Virtualization&lt;/a&gt; (UE-V) in 2012. Microsoft UE-V virtualizes users' Oses and application settings from a settings store on a file server. UE-V has been updated several times over the years, and the most recent version is compatible with Windows 10, but is not officially supported for use with Windows 11.&lt;/p&gt;
 &lt;p&gt;Roaming user profiles are still a good basic option to provide the same experience across PC and virtual desktop environments, but third-party user profile management tools are also available for organizations that know more specific features they need.&lt;/p&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="How to deploy a roaming profile"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;How to deploy a roaming profile&lt;/h2&gt;
 &lt;p&gt;Setting up roaming profiles tends to be a relatively easy and straightforward &lt;a target="_blank" href="https://learn.microsoft.com/en-us/windows-server/storage/folder-redirection/deploy-roaming-user-profiles" rel="noopener"&gt;process&lt;/a&gt;. The first step is to create a share on a file server and to set up the appropriate permissions. Administrators will need full control, and end users -- who will be seen as creator owners -- will require full control over their own profile folders. Users should not have the ability to access someone else's profile folder.&lt;/p&gt;
 &lt;p&gt;Once the necessary network share is in place, admins can create a Group Policy setting that sets the profile path to the network share that IT created. There are also some other settings that admins can enable at the group policy level to fine-tune the behavior of roaming profiles. This includes folder redirection, but there are other settings related to things like caching or slow link detection.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Editor's note:&lt;i&gt; &lt;/i&gt;&lt;/b&gt;&lt;i&gt;This article was originally written by Brien Posey in May 2020. He updated this &lt;/i&gt;&lt;i&gt;article in May 2025 to include more information on hotspot devices and improve readability.&lt;/i&gt;&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Brien Posey is a former 22-time Microsoft MVP and a commercial astronaut candidate. In his more than 30 years in IT, he has served as a lead network engineer for the U.S. Department of Defense and a network administrator for some of the largest insurance companies in America. &lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>Though newer tools are available, a Microsoft roaming profile is a simple and time-tested way to manage a user's profile across physical and virtual desktop environments.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/collab_g1227412970.jpg</image>
            <link>https://www.techtarget.com/searchvirtualdesktop/answer/How-does-a-roaming-user-profile-work</link>
            <pubDate>Wed, 07 May 2025 13:00:00 GMT</pubDate>
            <title>What is a roaming profile, and how does it work?</title>
        </item>
        <item>
            <body>&lt;p&gt;A virtual hard disk (VHD) is a &lt;a href="https://www.techtarget.com/whatis/definition/disk-image"&gt;disk image&lt;/a&gt; file format for storing the entire contents of a computer's hard drive. The disk image, sometimes called a &lt;i&gt;virtual machine&lt;/i&gt; (&lt;a href="https://www.techtarget.com/searchitoperations/definition/virtual-machine-VM"&gt;VM&lt;/a&gt;), replicates an existing drive, including all data and structural elements. It can be stored in any location accessible to the physical &lt;a href="https://www.techtarget.com/searchnetworking/definition/host"&gt;host&lt;/a&gt;, and it is also transportable, meaning it can be stored and moved with a &lt;a href="https://www.techtarget.com/searchstorage/definition/USB-drive"&gt;USB flash memory device&lt;/a&gt;.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="What does a virtual hard disk do?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;What does a virtual hard disk do?&lt;/h2&gt;
 &lt;p&gt;A virtual hard &lt;i&gt;disk&lt;/i&gt; is not the same as a virtual hard &lt;i&gt;drive&lt;/i&gt;. In fact, a VHD &lt;i&gt;represents&lt;/i&gt; a virtual hard drive. It is a disk image file format that mimics the functionality of a physical hard drive, so users can store data on the virtual drive just as they would on the physical drive.&lt;/p&gt;
 &lt;p&gt;VHDs play an important role in virtualization environments. To create a VM, a logical disk must be associated with a VM. To do that, the image of a virtual hard disk must be created. This image is the VHD. When a VHD is created and made available to the system, the contents of a computer's drive can be virtualized to create a VM with its own operating system (&lt;a href="https://www.techtarget.com/whatis/definition/operating-system-OS"&gt;OS&lt;/a&gt;), applications and data.&lt;/p&gt;
 &lt;div class="youtube-iframe-container"&gt;
  &lt;iframe id="ytplayer-0" src="https://www.youtube.com/embed/O0D8Ftc44ls?autoplay=0&amp;amp;modestbranding=1&amp;amp;rel=0&amp;amp;widget_referrer=null&amp;amp;enablejsapi=1&amp;amp;origin=https://www.techtarget.com" type="text/html" height="360" width="640" frameborder="0"&gt;&lt;/iframe&gt;
 &lt;/div&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="What is a virtual hard disk used for?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;What is a virtual hard disk used for?&lt;/h2&gt;
 &lt;p&gt;The VHD image file format is mainly used to virtualize a computer's hard drive, i.e., to create VMs. The image lives as a file on the host OS in one of four configurations:&lt;/p&gt;
 &lt;ol class="default-list"&gt; 
  &lt;li&gt;Fixed hard disk image.&lt;/li&gt; 
  &lt;li&gt;Dynamic hard disk image.&lt;/li&gt; 
  &lt;li&gt;Differencing hard disk image.&lt;/li&gt; 
  &lt;li&gt;Pass-through hard disk image.&lt;/li&gt; 
 &lt;/ol&gt;
 &lt;p&gt;Regardless of its type, a VHD is used to easily create preconfigured VMs and to simplify &lt;a href="https://www.techtarget.com/searchdatabackup/definition/backup"&gt;data backup&lt;/a&gt; and &lt;a href="https://www.techtarget.com/searchdatabackup/definition/restore"&gt;restoration&lt;/a&gt;. Differencing VHDs can also be used to set up multiuser isolation and to ensure that OS instances remain unaffected even if one instance happens to crash.&lt;/p&gt;
 &lt;p&gt;The VHD format is a standard format for Microsoft's virtualization products, including the &lt;a href="https://www.techtarget.com/searchitoperations/tip/3-FAQs-to-improve-your-Hyper-V-basic-knowledge"&gt;Hyper-V&lt;/a&gt; hypervisor. Since Windows 2012, the default VHD format for Microsoft Hyper-V is &lt;a href="https://www.techtarget.com/searchstorage/tip/Microsoft-VHDX-format-Understanding-benefits-conversion-process"&gt;VHDX&lt;/a&gt;. Sharing a VHDX file provides shared storage for a Hyper-V guest &lt;a href="https://www.techtarget.com/searchwindowsserver/definition/failover-cluster"&gt;failover cluster&lt;/a&gt;. The shared VHD must use the .vhdx file format for the data drive.&lt;/p&gt;
 &lt;p&gt;It is important to note that, while it is called a &lt;i&gt;virtual hard drive&lt;/i&gt;, a VHD can be created using &lt;a href="https://www.techtarget.com/searchstorage/definition/solid-state-storage"&gt;solid-state storage&lt;/a&gt; resources.&lt;/p&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="Virtual hard disk vs. physical hard disk: Similarities and differences"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Virtual hard disk vs. physical hard disk: Similarities and differences&lt;/h2&gt;
 &lt;p&gt;A virtual hard disk has similar functionality to a physical &lt;a href="https://www.techtarget.com/searchstorage/definition/hard-disk-drive"&gt;hard disk drive&lt;/a&gt;. For example, it often contains the same hard drive sectors, such as a &lt;a href="https://www.techtarget.com/searchstorage/definition/file-system"&gt;file system&lt;/a&gt;, disk &lt;a href="https://www.techtarget.com/searchstorage/definition/partition"&gt;partitions&lt;/a&gt;, etc. It also appears and operates like a hard disk that's physically connected to the system. As with a hard disk, you can do the following with a VHD:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Create disk sectors, files and folders.&lt;/li&gt; 
  &lt;li&gt;Run an OS.&lt;/li&gt; 
  &lt;li&gt;Execute user applications.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;What differentiates a VHD from a physical hard disk is that it is designed for use by VMs and is installed on a VM infrastructure, such as &lt;a href="https://www.techtarget.com/searchvmware/tip/Compare-VMware-Workstation-Pro-vs-Microsoft-Hyper-V"&gt;VMware Workstation or Microsoft Hyper-V&lt;/a&gt; VMs.&lt;/p&gt;
 &lt;p&gt;While a VHD is created on a physical drive, it is a virtualized file and has its own logical distribution. Its size can be fixed or flexible. This size is managed by the OS or &lt;a href="https://www.techtarget.com/searchitoperations/feature/How-to-find-the-best-server-virtualization-management-software"&gt;virtualization manager&lt;/a&gt;. The OS communicates with the &lt;a href="https://www.techtarget.com/searchenterprisedesktop/definition/device-driver"&gt;device drivers&lt;/a&gt; to access the VHD.&lt;/p&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="Types of virtual hard disk"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Types of virtual hard disk&lt;/h2&gt;
 &lt;p&gt;As noted, the main types of VHD formats are fixed, dynamic, differencing and pass-through.&lt;/p&gt;
 &lt;h3&gt;Fixed virtual hard disk&lt;/h3&gt;
 &lt;p&gt;In this VHD format, the VHD consumes a fixed amount of space on the host machine drive. In effect, it mirrors the size of the virtual disk. There is no block allocation table, so any extra &lt;a href="https://www.techtarget.com/whatis/definition/input-output-I-O"&gt;input/output&lt;/a&gt; load only occurs within the virtualization stack. Fixed VHDs support fast processing speeds and a constant fragmentation level as at the time of its creation. Also, the potential for overcommitment collisions is almost nonexistent.&lt;/p&gt;
 &lt;h3&gt;Dynamic virtual hard disk&lt;/h3&gt;
 &lt;p&gt;Dynamic or expandable VHDs with varying disk sizes can also be created. With dynamic VHDs, the storage space starts at a particular minimum size and grows as data is added to the VHD until it reaches a predetermined maximum size. The main advantage of dynamic VHDs is high-speed storage space &lt;a href="https://www.techtarget.com/searchcio/definition/resource-allocation"&gt;allocation&lt;/a&gt;. Also, the VHD file can be created quickly due to its small size. The size also speeds up backup and reduces the backup data size. Two key drawbacks of dynamic VHDs are the higher potential for VHD fragmentation and slower processing speeds.&lt;/p&gt;
 &lt;h3&gt;Differencing virtual hard disk&lt;/h3&gt;
 &lt;p&gt;A differencing VHD is used to create a copy (clone) of an existing disk. Two VHDs are used: a parent and a child. With a differencing VHD, it is possible to make changes to a parent VHD without altering that disk.&lt;/p&gt;
 &lt;h3&gt;Pass-through virtual hard disk&lt;/h3&gt;
 &lt;p&gt;A pass-through VHD is linked to a physical hard drive. The term mainly refers to a physical disk used as a storage source in a single, dual or mirrored virtual disk. One of the main uses of a pass-through VHD is to migrate data from one storage architecture to another with minimal disruptions, while maintaining access to the current disk.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineImages/server_virt-vhd_files.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineImages/server_virt-vhd_files_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineImages/server_virt-vhd_files_mobile.png 960w,https://www.techtarget.com/rms/onlineImages/server_virt-vhd_files.png 1280w" alt="VDH file types graphic" height="279" width="520"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;There are several sizing options when creating a VHD, including fixed capacity, capacity that expands dynamically as needed and linked VHDs.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
&lt;/section&gt;           
&lt;section class="section main-article-chapter" data-menu-title="Benefits of a virtual hard disk"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Benefits of a virtual hard disk&lt;/h2&gt;
 &lt;p&gt;There are numerous benefits when using a VHD, including the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Easy deployment.&lt;/b&gt; A VHD has provisions for prebuilt and standard &lt;a href="https://www.techtarget.com/whatis/definition/configuration"&gt;configurations&lt;/a&gt; in the VHD files for working on specific OS environments, simplifying deployment.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Efficient backup and restore.&lt;/b&gt; If VHD data is accidentally deleted or affected by a &lt;a href="https://www.techtarget.com/searchsecurity/tip/How-to-prevent-and-mitigate-process-injection"&gt;malicious file injection&lt;/a&gt;, it can be recovered.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Snapshot recovery.&lt;/b&gt; A &lt;a href="https://www.techtarget.com/searchdatabackup/definition/storage-snapshot"&gt;snapshot&lt;/a&gt; of an existing VHD configuration can be recovered, enabling a user to revert to a previous state if there are installation problems and troubleshooting isn't successful.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Swift replication.&lt;/b&gt; The work or file in one system can be &lt;a href="https://www.techtarget.com/searchdisasterrecovery/definition/data-replication"&gt;replicated&lt;/a&gt; to another system. This is especially useful for developers who collaborate.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Isolation for users. &lt;/b&gt;Users can work on their chosen OS without interference from other users.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Cost-effectiveness.&lt;/b&gt; VHD technology eliminates the need for multiple hardware components and OSes, reducing the cost of storage and deployment.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="Process to create a virtual hard disk in Windows"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Process to create a virtual hard disk in Windows&lt;/h2&gt;
 &lt;p&gt;In Windows OSes -- 8.1, 10, 11, Server 2016, Server 2012 R2 and Server 2012 -- VHDs appear like physical disks in the Disk Management utility. When a VHD is attached, it appears blue. If it is detached, the icon turns gray.&lt;/p&gt;
 &lt;h3&gt;Steps to create a VHD&lt;/h3&gt;
 &lt;p&gt;Admin access is required to do the following by selecting &lt;b&gt;Computer Management&lt;/b&gt; and then &lt;b&gt;Disk Management&lt;/b&gt;:&lt;/p&gt;
 &lt;ol class="default-list"&gt; 
  &lt;li&gt;From the &lt;b&gt;Action&lt;/b&gt; menu of Disk Management, select &lt;b&gt;Create VHD&lt;/b&gt;.&lt;/li&gt; 
  &lt;li&gt;The &lt;b&gt;Create and Attach Virtual Hard Disk&lt;/b&gt; &lt;a href="https://www.techtarget.com/whatis/definition/menu"&gt;dialog box&lt;/a&gt; opens.&lt;/li&gt; 
  &lt;li&gt;Specify the location on the physical computer where the VHD file will be stored.&lt;/li&gt; 
  &lt;li&gt;In the &lt;b&gt;File&lt;/b&gt; name field, enter a name for the drive.&lt;/li&gt; 
  &lt;li&gt;Specify the size of the VHD in the &lt;b&gt;Virtual hard disk size&lt;/b&gt; field.&lt;/li&gt; 
  &lt;li&gt;Under the &lt;b&gt;Virtual hard disk type&lt;/b&gt; section, select &lt;b&gt;Fixed size&lt;/b&gt; or &lt;b&gt;Dynamically expanding&lt;/b&gt;.&lt;/li&gt; 
  &lt;li&gt;Click &lt;b&gt;OK&lt;/b&gt;.&lt;/li&gt; 
 &lt;/ol&gt;
 &lt;h3&gt;Steps to attach a VHD&lt;/h3&gt;
 &lt;p&gt;Attaching the VHD makes it available for use:&lt;/p&gt;
 &lt;ol class="default-list"&gt; 
  &lt;li&gt;From the &lt;b&gt;Action&lt;/b&gt; menu of the Disk Management utility, select &lt;b&gt;Attach VHD&lt;/b&gt;.&lt;/li&gt; 
  &lt;li&gt;When the &lt;b&gt;Attach Virtual Hard Disk&lt;/b&gt; dialog box opens, select the VHD (.vhd) file.&lt;/li&gt; 
  &lt;li&gt;Click &lt;b&gt;OK&lt;/b&gt;.&lt;/li&gt; 
 &lt;/ol&gt;
 &lt;h3&gt;Steps to detach a VHD&lt;/h3&gt;
 &lt;p&gt;Detaching a VHD makes it unavailable to applications and users, but it doesn't delete the VHD:&lt;/p&gt;
 &lt;ol type="1" start="1" class="default-list"&gt; 
  &lt;li&gt;In the Disk Management utility, right-click on the VHD.&lt;/li&gt; 
  &lt;li&gt;Select &lt;b&gt;Detach VHD&lt;/b&gt;.&lt;/li&gt; 
  &lt;li&gt;Click &lt;b&gt;OK&lt;/b&gt;.&lt;/li&gt; 
 &lt;/ol&gt;
&lt;/section&gt;           
&lt;section class="section main-article-chapter" data-menu-title="VHD vs. VHDX file formats"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;VHD vs. VHDX file formats&lt;/h2&gt;
 &lt;p&gt;The VHD file format was originally introduced with Connectix Virtual PC and was eventually adopted by Microsoft Hyper-V. It works with many versions of Microsoft's Windows OSes.&lt;/p&gt;
 &lt;p&gt;VHDX is functionally equivalent to VHD. However, it is an advanced version of VHD that supports larger storage capacity, larger logical sectors and live disk resizing. VHDX also provides the following advantages over VHD:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;a href="https://www.techtarget.com/whatis/definition/metadata"&gt;Metadata&lt;/a&gt; updates tracking.&lt;/li&gt; 
  &lt;li&gt;&lt;a href="https://www.techtarget.com/searchdatabackup/definition/data-protection"&gt;Data protection&lt;/a&gt; against power failures.&lt;/li&gt; 
  &lt;li&gt;More adaptability to newer hardware.&lt;/li&gt; 
  &lt;li&gt;Support for custom metadata.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;Both VHD and VHDX disk images are prone to file system corruption, which could result from corrupted hard disk storage, suboptimal network conditions during file transfers or interference from &lt;a href="https://www.techtarget.com/searchsecurity/definition/antivirus-software"&gt;antivirus programs&lt;/a&gt;. If a VHD or VHDX file is corrupted, a &lt;a href="https://www.techtarget.com/searchdisasterrecovery/definition/data-recovery"&gt;recovery&lt;/a&gt; tool can help recover some or all data.&lt;/p&gt;
 &lt;p&gt;&lt;em&gt;Virtualization functions by separating physical hardware and devices from the applications operating on that hardware. Learn the &lt;a href="https://www.techtarget.com/searchitoperations/tip/Whats-the-difference-between-Type-1-vs-Type-2-hypervisor"&gt;difference between Type 1 vs. Type 2 hypervisors&lt;/a&gt; and their specific use cases. Explore the &lt;a href="https://www.techtarget.com/searchitoperations/tip/Containers-vs-VMs-What-are-the-key-differences"&gt;key differences between containers vs. VMs&lt;/a&gt;, and see &lt;a href="https://www.techtarget.com/searchitoperations/feature/What-to-know-for-your-virtualized-storage-selection-process"&gt;what to know for your virtualized storage selection process&lt;/a&gt;. Become &lt;a href="https://www.techtarget.com/searchitoperations/tip/Get-familiar-with-storage-virtualization-software-options"&gt;familiar with storage virtualization software options&lt;/a&gt;, and check out &lt;a href="https://www.techtarget.com/searchitoperations/tip/6-virtual-server-management-best-practices"&gt;virtual server management best practices&lt;/a&gt;.&lt;/em&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>A virtual hard disk (VHD) is a disk image file format for storing the entire contents of a computer's hard drive.</description>
            <image>https://cdn.ttgtmedia.com/visuals/digdeeper/6.jpg</image>
            <link>https://www.techtarget.com/searchvirtualdesktop/definition/virtual-hard-disk-VHD</link>
            <pubDate>Wed, 26 Mar 2025 09:00:00 GMT</pubDate>
            <title>What is a virtual hard disk (VHD)?</title>
        </item>
        <item>
            <body>&lt;div class="imagecaption alignLeft"&gt;
 &lt;img src="https://cdn.ttgtmedia.com/rms/onlineImages/LGTS_Logo_145x115.jpg" alt="LGTS logo"&gt;
&lt;/div&gt; 
&lt;p&gt;There are two main types of desktops you can deploy in a virtual desktop infrastructure: persistent and nonpersistent. So, what's the difference?&lt;/p&gt; 
&lt;p&gt;With persistent VDI, each user gets their own &lt;a href="https://www.techtarget.com/searchvirtualdesktop/definition/virtual-desktop"&gt;virtual desktop&lt;/a&gt; -- also known as a one-to-one ratio. Nonpersistent desktops are many-to-one, meaning they are shared among end users. Each setup has its advantages and disadvantages when it comes to storage, management and customization.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="What is persistent VDI and how does it work?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;What is persistent VDI and how does it work?&lt;/h2&gt;
 &lt;p&gt;With one-to-one persistent VDI, each persistent desktop runs from a separate &lt;a href="https://whatis.techtarget.com/definition/disk-image"&gt;disk image&lt;/a&gt;. The user's settings are saved and appear each time at login. These types of desktops allow for more &lt;a href="https://searchenterprisedesktop.techtarget.com/definition/desktop-personalization"&gt;personalization&lt;/a&gt; but require more storage and backup than nonpersistent desktops.&lt;/p&gt;
 &lt;h3&gt;Pros: Customization and familiarity&lt;/h3&gt;
 &lt;p&gt;It's easier to personalize persistent desktops because users can access their own data, shortcuts and files from the same dedicated desktop every time they log in. That level of familiarity may help users embrace VDI more easily because it provides consistency and customizations similar to a physical desktop.&lt;/p&gt;
 &lt;p&gt;Persistent VDI may also be easier for IT admins to manage because the one-to-one setup is similar to a physical desktop deployment.&lt;/p&gt;
 &lt;h3&gt;Cons: Storage requirements and image management&lt;/h3&gt;
 &lt;p&gt;Storage can be a concern with persistent VDI. All those individual, customized disk images require more storage capacity than a single &lt;a href="https://searchservervirtualization.techtarget.com/definition/golden-image"&gt;golden image&lt;/a&gt; does with nonpersistent desktops. The golden image, also known as a master image, is one of several stripped-down desktops that contain only essential applications and data. User settings and customizations are stored separately as user layers, which are applied to the golden image during the virtual desktop delivery.&lt;/p&gt;
 &lt;p&gt;Storage for persistent desktops is usually a separate logical drive, so it's integrated with the underlying VM, while the actual user data is stored on the desktop itself. However, some of the storage constraints that kept IT away from persistent desktops in the past have been eliminated.&lt;/p&gt;
 &lt;p&gt;An additional concern is that managing numerous diverse images is more complex than managing a master image, which can be altered and updated in one stroke.&lt;/p&gt;
 &lt;div class="youtube-iframe-container"&gt;
  &lt;iframe id="ytplayer-0" src="https://www.youtube.com/embed/Nz9r3HxI8qI?autoplay=0&amp;amp;modestbranding=1&amp;amp;rel=0&amp;amp;widget_referrer=null&amp;amp;enablejsapi=1&amp;amp;origin=https://www.techtarget.com" type="text/html" height="360" width="640" frameborder="0"&gt;&lt;/iframe&gt;
 &lt;/div&gt;
&lt;/section&gt;          
&lt;section class="section main-article-chapter" data-menu-title="What is nonpersistent VDI and how does it work?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;What is nonpersistent VDI and how does it work?&lt;/h2&gt;
 &lt;p&gt;When users access a nonpersistent desktop, none of their settings or data is saved once they log out. At the end of a session, the desktop reverts to its original state, and the user receives a fresh image the next time they log in.&lt;/p&gt;
 &lt;h3&gt;Pros: Image manageability, better security, less storage&lt;/h3&gt;
 &lt;p&gt;Since nonpersistent desktops are built from a master image, it's easier for administrators to patch and update the image, back it up quickly and deploy company-wide applications to all end users. Users can't alter desktop settings or install their own applications, making the image more secure.&lt;/p&gt;
 &lt;p&gt;Plus, if the image is hacked or compromised, IT can simply reboot desktops back to a clean state. If the same instance happened with a persistent desktop, that desktop user's credentials or other sensitive data could be compromised.&lt;/p&gt;
 &lt;p&gt;This setup also means there's less storage to deal with. User configuration settings and data are stored on separate hardware that's accessible remotely, such as a network share. That separates the OS from user data and allows admins to store that data on a lower-cost device.&lt;/p&gt;
 &lt;h3&gt;Cons: Less personalization and application flexibility&lt;/h3&gt;
 &lt;p&gt;With nonpersistent VDI, users cannot easily personalize their desktop. That's because nonpersistent desktops don't require dedicated user profiles to be saved and managed; in fact, some organizations deploy nonpersistent VDI so they don't have to manage distinct profiles. In some cases, the VDI setup may store profile information in a separate profile management tool. Or, IT can set user profiles to delete automatically from desktops when they're powered down, and spin up a new one from the base image on startup.&lt;/p&gt;
 &lt;p&gt;Since users share a common disk image, there's a certain amount of desktop customization admins need to ensure users can access all the apps they need. Virtual desktop admins can create several golden images for this &lt;a target="_blank" href="https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-vdi" rel="noopener"&gt;situation&lt;/a&gt; -- one golden image for each type of user or department based on the users' needs.&lt;/p&gt;
 &lt;p&gt;IT administrators can use application management tools to deliver virtual applications as well. This technology separates virtual applications from the desktop. Once a user accesses the VM, the VDI delivers the applications in addition to the desktop. The user can then interact with the applications as if they were native to the OS. Tools in this market include Citrix App Layering, Liquidware FlexApp, Numecent Cloudpaging, Omnissa App Volumes and others.&lt;/p&gt;
 &lt;p&gt;Lastly, it's important to note that not all apps lend themselves to being virtualized. Legacy applications, especially, may cause issues when organizations try to virtualize them.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Editor's note:&lt;/b&gt; &lt;em&gt;This article was republished in 2025 to improve the reader experience.&lt;/em&gt;&lt;/p&gt;
 &lt;p&gt;&lt;em&gt;Alyssa Provazza is an editorial director at Informa TechTarget.&lt;/em&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>Should you go with persistent or nonpersistent VDI? The choice often comes down to storage.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/keyboard_g1077903946.jpg</image>
            <link>https://www.techtarget.com/searchvirtualdesktop/feature/Understanding-nonpersistent-vs-persistent-VDI</link>
            <pubDate>Fri, 14 Mar 2025 13:00:00 GMT</pubDate>
            <title>Understanding persistent vs. nonpersistent VDI</title>
        </item>
        <item>
            <body>&lt;p&gt;When the remote desktop connection between a Windows desktop and its host fails, it's time to do some remote desktop troubleshooting by checking firewalls, security certificates and more.&lt;/p&gt; 
&lt;p&gt;Administrators can encounter many remote desktop connection problems, including network failure, Secure Sockets Layer (SSL) &lt;a href="https://www.techtarget.com/searchsecurity/tip/SSL-certificate-best-practices-for-2020-and-beyond"&gt;certificate issues&lt;/a&gt;, authentication troubles and capacity limitations.&lt;/p&gt; 
&lt;p&gt;As a desktop admin, you can prevent and solve common remote desktop problems by using these tips.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="1. Network failure"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;1. Network failure&lt;/h2&gt;
 &lt;p&gt;A lack of a valid communications path can prevent a client from connecting to a &lt;a href="https://www.techtarget.com/searchvirtualdesktop/tip/Why-remote-connectivity-problems-happen-and-how-to-fix-them"&gt;remote desktop session&lt;/a&gt;. The easiest way to diagnose this issue is through the process of elimination.&lt;/p&gt;
 &lt;p&gt;First, try to establish a session from a client that has been able to successfully connect in the past. The goal is to find out if the problem is specific to an individual client, the network or a terminal server/Windows server.&lt;/p&gt;
 &lt;p&gt;If you suspect the &lt;a href="https://www.techtarget.com/searchnetworking/answer/What-are-the-3-most-common-network-issues-to-troubleshoot"&gt;network might be to blame&lt;/a&gt;, try to narrow down the scope of the issue to find the root cause. In doing so, you might discover that the problem affects wireless connections but not wired ones. Likewise, you might discover the problem is unique to &lt;a href="https://www.techtarget.com/searchnetworking/tip/Preparing-for-a-disaster-When-remote-employees-overload-your-VPN"&gt;VPN traffic&lt;/a&gt; or a particular subnet.&lt;/p&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="2. Firewall problems"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;2. Firewall problems&lt;/h2&gt;
 &lt;p&gt;It's easy to dismiss the notion that a firewall could contribute to a remote desktop not working, but it's quite common. Some organizations configure their corporate firewall to block outbound RDP traffic, thereby preventing connectivity to remote systems. It's also common for organizations to make it so that an RDP session can only be connected through a VPN.&lt;/p&gt;
 &lt;p&gt;To avoid firewall problems, ensure that the port your remote desktop software uses is open on any firewalls residing between client computers and the server they connect to. Remote Desktop Protocol-based tools use &lt;a href="https://www.techtarget.com/searchenterprisedesktop/definition/Remote-Desktop-Protocol-RDP"&gt;RDP&lt;/a&gt; port 3389 by default.&lt;/p&gt;
 &lt;p&gt;You can check to make sure that the Windows Defender Firewall service allows RDP traffic and update general firewall settings by completing these steps:&lt;/p&gt;
 &lt;ol type="1" start="1" class="default-list"&gt; 
  &lt;li&gt;Open the &lt;b&gt;Control Panel&lt;/b&gt; by entering Control at the Windows Run prompt.&lt;/li&gt; 
  &lt;li&gt;Click &lt;b&gt;System and Security&lt;/b&gt;.&lt;/li&gt; 
  &lt;li&gt;Click &lt;b&gt;Windows Defender Firewall&lt;/b&gt;.&lt;/li&gt; 
  &lt;li&gt;Click &lt;b&gt;Allow an App&lt;/b&gt;or &lt;b&gt;Feature Through Windows Defender Firewall&lt;/b&gt;.&lt;/li&gt; 
  &lt;li&gt;Select the &lt;b&gt;Remote Desktop&lt;/b&gt; option.&lt;/li&gt; 
  &lt;li&gt;Click &lt;b&gt;OK&lt;/b&gt;.&lt;/li&gt; 
 &lt;/ol&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/Troubleshooting_RDP_1.jpg"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/Troubleshooting_RDP_1_mobile.jpg" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/Troubleshooting_RDP_1_mobile.jpg 960w,https://www.techtarget.com/rms/onlineimages/Troubleshooting_RDP_1.jpg 1280w" alt="Windows Defender Firewall RDP traffic" data-credit="Brien Posey" height="294" width="560"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;The Control Panel setting that shows Windows Defender Firewall allowing RDP traffic on port 3389.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="3. SSL certificate issues"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;3. SSL certificate issues&lt;/h2&gt;
 &lt;p&gt;Security certificates can also cause remote desktop connection problems. Many VDI products use &lt;a href="https://www.techtarget.com/searchsecurity/tip/How-to-encrypt-and-secure-a-website-using-HTTPS"&gt;SSL encryption&lt;/a&gt; for users that access VDI sessions outside the network perimeter. But SSL encryption requires the use of certificates, which creates two problems that can cause a remote desktop to not work.&lt;/p&gt;
 &lt;p&gt;First, if remote desktops are going to connect properly, client computers must trust the &lt;a href="https://www.techtarget.com/searchsecurity/definition/certificate-authority"&gt;certificate authority&lt;/a&gt; that issued the certificate. This isn't usually a problem for organizations that purchase certificates from large, well-known authorities, but clients won't always trust the certificates an organization generates in-house. Use a reliable certificate authority to ensure that clients establish remote desktop connectivity.&lt;/p&gt;
 &lt;p&gt;If you're using a certificate provided by an enterprise certificate authority, download a copy of the certificate authority's root certificate and add it to the client's certificate store in a way that is associated with the certificate.&lt;/p&gt;
 &lt;p&gt;The client must also be able to verify the certificate the &lt;a href="https://www.techtarget.com/searchvirtualdesktop/tip/How-to-secure-Azure-RDP-virtual-machine-access-with-a-jumpbox"&gt;server uses&lt;/a&gt;. The verification process can break down if the certificate has expired or if the name on the certificate doesn't match the name of the server using it.&lt;/p&gt;
 &lt;p&gt;To check if your network endpoint trusts your certificate authority and import any required certificates, complete these steps:&lt;/p&gt;
 &lt;ol type="1" start="1" class="default-list"&gt; 
  &lt;li&gt;Enter the MMC command at the Windows Run prompt.&lt;/li&gt; 
  &lt;li&gt;Select the &lt;b&gt;Add / Remove Snap-In Command&lt;/b&gt; from the File menu.&lt;/li&gt; 
  &lt;li&gt;Choose &lt;b&gt;Certificates&lt;/b&gt; from the list of available snap-ins and click &lt;b&gt;Add&lt;/b&gt;.&lt;/li&gt; 
  &lt;li&gt;When prompted, choose the &lt;b&gt;Computer Account&lt;/b&gt; option and click &lt;b&gt;Next&lt;/b&gt;.&lt;/li&gt; 
  &lt;li&gt;Choose the &lt;b&gt;Local Computer&lt;/b&gt; option and click &lt;b&gt;Finish&lt;/b&gt;.&lt;/li&gt; 
  &lt;li&gt;Click &lt;b&gt;OK&lt;/b&gt;.&lt;/li&gt; 
  &lt;li&gt;Navigate through the console tree to Certificates (Local Computer) \ Trusted Root Certification Authorities \ Certificates.&lt;/li&gt; 
  &lt;li&gt;Browse the list of certification authorities to make sure that your certificate authority is listed. If not, right-click on the &lt;b&gt;Certificates&lt;/b&gt; container and choose the &lt;b&gt;All Tasks | Import&lt;/b&gt; option.&lt;/li&gt; 
 &lt;/ol&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/Troubleshooting_RDP_2.jpg"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/Troubleshooting_RDP_2_mobile.jpg" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/Troubleshooting_RDP_2_mobile.jpg 960w,https://www.techtarget.com/rms/onlineimages/Troubleshooting_RDP_2.jpg 1280w" alt="Importing root certificate" data-credit="Brien Posey" height="350" width="560"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;The option to import a root certificate that you need your endpoints' firewall(s) to trust.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;ol class="default-list"&gt;&lt;/ol&gt;
 &lt;p&gt;After verifying and importing the root certificate that will allow Windows to trust the SSL certificate, take the following steps.&lt;/p&gt;
 &lt;ol class="default-list"&gt; 
  &lt;li style="list-style-type: none;"&gt; 
   &lt;ol type="1" start="1" class="default-list"&gt; 
    &lt;li&gt;Check for the existence of the SSL certificate. Navigate through the console tree to Certificates (Local Computer) | Personal | Certificates.&lt;/li&gt; 
    &lt;li&gt;If the SSL certificate does not exist or has expired, right-click on the &lt;b&gt;Certificates&lt;/b&gt; container and choose the &lt;b&gt;All Tasks | Import&lt;/b&gt; commands from the shortcut menus.&lt;/li&gt; 
    &lt;li&gt;Follow the prompts to import the certificate.&lt;/li&gt; 
   &lt;/ol&gt; 
   &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/Troubleshooting_RDP_3.jpg"&gt;
    &lt;img data-src="https://www.techtarget.com/rms/onlineimages/Troubleshooting_RDP_3_mobile.jpg" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/Troubleshooting_RDP_3_mobile.jpg 960w,https://www.techtarget.com/rms/onlineimages/Troubleshooting_RDP_3.jpg 1280w" alt="The SSL certificate list" data-credit="Brien Posey" height="320" width="558"&gt;
    &lt;figcaption&gt;
     &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;The list of trusted SSL certificates for the firewall.
    &lt;/figcaption&gt;
    &lt;div class="main-article-image-enlarge"&gt;
     &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
    &lt;/div&gt;
   &lt;/figure&gt; &lt;h2&gt;4. DNS problems&lt;/h2&gt; &lt;p&gt;Many remote desktop connectivity problems can be traced to DNS issues. If an admin changes a host's IP address, then clients might not be able to connect to the host until the client's DNS resolver cache expires. To expire a DNS resolver cache, follow these steps:&lt;/p&gt; 
   &lt;ol type="1" start="1" class="default-list"&gt; 
    &lt;li&gt;Open an elevated &lt;b&gt;Command Prompt&lt;/b&gt; window by entering the CMD command at the Windows Run prompt.&lt;/li&gt; 
    &lt;li&gt;Enter the &lt;b&gt;IPConfig /FlushDNS&lt;/b&gt; command.&lt;/li&gt; 
   &lt;/ol&gt; 
   &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/Troubleshooting_RDP_4.jpg"&gt;
    &lt;img data-src="https://www.techtarget.com/rms/onlineimages/Troubleshooting_RDP_4_mobile.jpg" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/Troubleshooting_RDP_4_mobile.jpg 960w,https://www.techtarget.com/rms/onlineimages/Troubleshooting_RDP_4.jpg 1280w" alt="Fixing the DNS cache" data-credit="Brien Posey" height="275" width="560"&gt;
    &lt;figcaption&gt;
     &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;The process for resolving the DNS cache.
    &lt;/figcaption&gt;
    &lt;div class="main-article-image-enlarge"&gt;
     &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
    &lt;/div&gt;
   &lt;/figure&gt; &lt;p&gt;Clients might also have trouble connecting to a host if they use an external DNS server that is unable to resolve hosts on the organization's private network. To fix this problem, modify the client's IP address settings so it uses one of the organization's &lt;a href="https://www.techtarget.com/searchsecurity/tip/The-3-types-of-DNS-servers-and-how-they-work"&gt;DNS servers&lt;/a&gt; rather than an external DNS.&lt;/p&gt; &lt;p&gt;As an alternative, you might be able to connect to a remote system by specifying its IP address rather than a host name. To determine whether an endpoint is connected to the correct DNS server, complete the following steps:&lt;/p&gt; 
   &lt;ol type="1" start="1" class="default-list"&gt; 
    &lt;li&gt;Open a &lt;b&gt;Command Prompt&lt;/b&gt; window by entering the CMD command at the Windows Run prompt.&lt;/li&gt; 
    &lt;li&gt;Enter the &lt;b&gt;IPConfig / all&lt;/b&gt; command.&lt;/li&gt; 
    &lt;li&gt;Verify that the correct DNS server is being used with the Preferred network adapter. If the DNS server listed is incorrect, then you can manually specify a different DNS server in the PC's IP address properties or configure the PC to use a DHCP server.&lt;/li&gt; 
   &lt;/ol&gt; &lt;p&gt;These steps should work for both Windows 10 and Windows 11.&lt;/p&gt; 
   &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/Troubleshooting_RDP_5.jpg"&gt;
    &lt;img data-src="https://www.techtarget.com/rms/onlineimages/Troubleshooting_RDP_5_mobile.jpg" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/Troubleshooting_RDP_5_mobile.jpg 960w,https://www.techtarget.com/rms/onlineimages/Troubleshooting_RDP_5.jpg 1280w" alt="Verifying DNS server usage" data-credit="Brien Posey" height="336" width="560"&gt;
    &lt;figcaption&gt;
     &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;The process to verify that a PC is pointed to the proper DNS server.
    &lt;/figcaption&gt;
    &lt;div class="main-article-image-enlarge"&gt;
     &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
    &lt;/div&gt;
   &lt;/figure&gt; &lt;h2&gt;5. Permission and licensing issues&lt;/h2&gt; &lt;p&gt;For users to access a remote resource through the Remote Desktop Services, you must assign them the Logon Through Remote Desktop Services right. Otherwise, the users will receive an error when they try to connect to the remote computer. To make sure you have the proper permissions assigned, complete these steps on the remote server:&lt;/p&gt; 
   &lt;ol type="1" start="1" class="default-list"&gt; 
    &lt;li&gt;Open the &lt;b&gt;Group Policy Object Editor&lt;/b&gt; by entering the GPEdit.msc command at the Windows Run prompt.&lt;/li&gt; 
    &lt;li&gt;Navigate through the console tree to Computer Configuration \ Windows Settings \ Security Settings \ Local Policies \ User Rights Assignment.&lt;/li&gt; 
    &lt;li&gt;Double-click on &lt;b&gt;Allow log on through Remote Desktop Services&lt;/b&gt;.&lt;/li&gt; 
    &lt;li&gt;Add the necessary groups and click &lt;b&gt;OK&lt;/b&gt;.&lt;/li&gt; 
   &lt;/ol&gt; &lt;p&gt;You could also experience remote desktop connectivity issues if you deplete your pool of licenses. If users are connecting through the Remote Desktop Services, then make sure that you have a sufficient number of RDS CALs and that the CALs have been properly installed. It is worth noting that Microsoft allows for a 120-day grace period before it begins enforcing CALs. Hence, if your deployment is relatively new and you suddenly begin having problems, check if your RDS CALs are installed.&lt;/p&gt; 
   &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/Troubleshooting_RDP_6.jpg"&gt;
    &lt;img data-src="https://www.techtarget.com/rms/onlineimages/Troubleshooting_RDP_6_mobile.jpg" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/Troubleshooting_RDP_6_mobile.jpg 960w,https://www.techtarget.com/rms/onlineimages/Troubleshooting_RDP_6.jpg 1280w" alt="RDS permission verification" data-credit="Brien Posey" height="357" width="560"&gt;
    &lt;figcaption&gt;
     &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Verifying that the endpoint has the right permissions to access Remote Desktop Services.
    &lt;/figcaption&gt;
    &lt;div class="main-article-image-enlarge"&gt;
     &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
    &lt;/div&gt;
   &lt;/figure&gt; &lt;h2&gt;6. Dropped connections&lt;/h2&gt; &lt;p&gt;Sometimes the client can establish an RDP session, but the available bandwidth is inadequate to support the session's requirements. &lt;a href="https://www.techtarget.com/searchvirtualdesktop/tip/What-to-do-when-a-Windows-11-remote-desktop-keeps-freezing"&gt;The session might appear to freeze&lt;/a&gt;, or you might &lt;a href="https://www.techtarget.com/searchenterprisedesktop/tip/Steps-to-fix-a-black-screen-in-Windows-11"&gt;see a black screen&lt;/a&gt;. In some cases, the client might drop the connection and display a message that says 'Reconnecting.'&lt;/p&gt; &lt;p&gt;If you suspect there might not be enough bandwidth to support the RDP session, try closing any applications and shutting off other devices that might be consuming bandwidth.&lt;/p&gt; &lt;p&gt;You can adjust the RDP client to use a lower display resolution or color depth and disable visual features, such as font smoothing or the Windows background. To reduce the bandwidth consumption of the native Windows RDP client, follow these steps:&lt;/p&gt; 
   &lt;ol type="1" start="1" class="default-list"&gt; 
    &lt;li&gt;Open the &lt;b&gt;RDP client&lt;/b&gt;.&lt;/li&gt; 
    &lt;li&gt;Expand the console by clicking on the &lt;b&gt;Show Options&lt;/b&gt; link.&lt;/li&gt; 
    &lt;li&gt;Select the &lt;b&gt;Experience&lt;/b&gt; tab.&lt;/li&gt; 
    &lt;li&gt;Select the &lt;b&gt;Low-speed broadband&lt;/b&gt; option from the drop-down menu.&lt;/li&gt; 
    &lt;li&gt;Click &lt;b&gt;Connect&lt;/b&gt;.&lt;/li&gt; 
   &lt;/ol&gt; 
   &lt;figure class="main-article-image half-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/Troubleshooting_RDP_7.jpg"&gt;
    &lt;img data-src="https://www.techtarget.com/rms/onlineimages/Troubleshooting_RDP_7_mobile.jpg" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/Troubleshooting_RDP_7_mobile.jpg 960w,https://www.techtarget.com/rms/onlineimages/Troubleshooting_RDP_7.jpg 1280w" alt="RDP low-speed broadband" data-credit="Brien Posey" height="654" width="560"&gt;
    &lt;figcaption&gt;
     &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;The remote desktop session Windows with the low-speed broadband option selected.
    &lt;/figcaption&gt;
    &lt;div class="main-article-image-enlarge"&gt;
     &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
    &lt;/div&gt;
   &lt;/figure&gt; &lt;h2&gt;7. CredSSP problems&lt;/h2&gt; &lt;p&gt;RDP connectivity can sometimes fail due to issues with the Credential Security Support Provider (CredSSP) protocol. The CredSSP provides a means of sending user credentials from a client computer to a host computer when an RDP session is in use. By default, the RDP only works if both the client and the RDP host use an updated CredSSP provider. If a system does not include an up-to-date CredSSP provider, the client will typically display an authentication error.&lt;/p&gt; &lt;p&gt;The best way to fix this is to ensure that both the client and the host are running supported Windows versions and both systems are fully updated. You can temporarily turn off the CredSSP requirement to test whether it is the source of the problem. The exact steps vary from one Windows version to the next, but here is a general description:&lt;/p&gt; 
   &lt;ol type="1" start="1" class="default-list"&gt; 
    &lt;li&gt;Open the &lt;b&gt;System Properties&lt;/b&gt; sheet and select the &lt;b&gt;Remote tab&lt;/b&gt;.&lt;/li&gt; 
    &lt;li&gt;Verify that &lt;b&gt;Allow Remote Connections&lt;/b&gt; is enabled.&lt;/li&gt; 
    &lt;li&gt;Deselect the &lt;b&gt;Allow Connections Only From Computers Running Remote Desktop With Network Level Authentication&lt;/b&gt; check box.&lt;/li&gt; 
    &lt;li&gt;Click &lt;strong&gt;Connect.&lt;/strong&gt;&lt;/li&gt; 
   &lt;/ol&gt; &lt;p&gt;&lt;i&gt;Brien Posey is a former 22-time Microsoft MVP and a commercial astronaut candidate. In his more than 30 years in IT, he has served as a lead network engineer for the U.S. Department of Defense and a network administrator for some of the largest insurance companies in America. &lt;/i&gt;&lt;/p&gt; &lt;/li&gt; 
 &lt;/ol&gt;
&lt;/section&gt;</body>
            <description>When the connection between a desktop and its host fails, it's time to do some remote desktop troubleshooting. Check firewalls, security certificates and more if a remote desktop is not working.</description>
            <image>https://cdn.ttgtmedia.com/visuals/searchVirtualDesktop/management/virtualdesktop_article_004.jpg</image>
            <link>https://www.techtarget.com/searchvirtualdesktop/tip/Top-5-remote-desktop-connectivity-problems-and-how-to-prevent-them</link>
            <pubDate>Thu, 13 Mar 2025 14:30:00 GMT</pubDate>
            <title>How to fix 7 common remote desktop connection problems</title>
        </item>
        <item>
            <body>&lt;p&gt;As an IT administrator, a common practice is to use an extra virtual machine to perform a variety of management and testing tasks.&lt;/p&gt; 
&lt;p&gt;The isolated nature of virtual machines (&lt;a href="https://www.techtarget.com/searchitoperations/definition/virtual-machine-VM"&gt;VMs&lt;/a&gt;) lets desktop administrators protect the underlying desktop from potential malware. However, this can lead to the reputation that VMs are immune to viruses.&lt;/p&gt; 
&lt;p&gt;It's important for admins to understand what types of security risks are present with virtual machines, whether they can get viruses and how to ensure VMs are secure.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="Can virtual machines get viruses?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Can virtual machines get viruses?&lt;/h2&gt;
 &lt;p&gt;VMs can get viruses just like a desktop or laptop. While there are many of &lt;a href="https://www.techtarget.com/searchvirtualdesktop/tip/Understanding-virtual-desktops-vs-virtual-machines"&gt;the same security risks with VMs and desktops&lt;/a&gt;, VMs in an enterprise environment have a major benefit: In most instances, only trained IT admins use them. This isn't an architectural benefit, but it can ensure a user won't open a personal email containing a virus link on the machine.&lt;/p&gt;
 &lt;p&gt;Additionally, the &lt;a href="https://www.techtarget.com/searchsecurity/answer/Whats-the-difference-between-software-containers-and-sandboxing"&gt;sandboxed nature of VMs&lt;/a&gt; lets admins disable all access to the internet to further secure the machine. A VM can also be set up to only connect with a VPN to the server back end when performing management tasks. This removes any chance of downloading a virus from the internet.&lt;/p&gt;
 &lt;figure class="main-article-image half-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/virtual_machines-h.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/virtual_machines-h_half_column_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/virtual_machines-h_half_column_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/virtual_machines-h.png 1280w" alt="A chart showing the architecture of a virtual machine and how it operates." height="298" width="279"&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;p&gt;Despite all these measures, it's still possible for a virtual machine to get a virus. For example, a virus in the enterprise environment can travel back to the VM over the VPN. This is why antivirus software should always be used, including on a VM.&lt;/p&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="What happens when a VM gets a virus?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;What happens when a VM gets a virus?&lt;/h2&gt;
 &lt;p&gt;The consequences of having a virus on a VM depends on the type of virus or malware; however, the effects will occur only on the virtual disk.&lt;/p&gt;
 &lt;p&gt;For example, ransomware within the VM &lt;a href="https://www.techtarget.com/searchstorage/answer/What-are-3-best-practices-for-storage-encryption-at-rest"&gt;will encrypt files&lt;/a&gt; on the Windows installation within the virtual disk. But because the virtual disk is just a .VMDK file on a user's laptop, it can quickly be deleted or replaced with a backup or snapshot.&lt;/p&gt;
 &lt;blockquote class="main-article-pullquote"&gt;
  &lt;div class="main-article-pullquote-inner"&gt;
   &lt;figure&gt;
    If spyware is placed on a VM, it can take screen captures of a user's screen but can't make screen captures of the host machine.
   &lt;/figure&gt;
   &lt;i class="icon" data-icon="z"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/blockquote&gt;
 &lt;p&gt;If spyware is placed on a VM, it can take screen captures of a user's screen but it can't make screen captures of the host machine.&lt;/p&gt;
 &lt;p&gt;An important thing to remember is that viruses want to spread to connected machines. The host laptop machine should therefore be protected with options from virtualization vendors.&lt;/p&gt;
 &lt;p&gt;In addition, admins can restrict the ability to share folders between the host and VM, communicate via the network connection, and cut and paste between the VM and host. To be extra safe, ensure the virus scanner on both the VM and laptop are up to date and that folder and network sharing is turned off.&lt;/p&gt;
&lt;/section&gt;       
&lt;section class="section main-article-chapter" data-menu-title="What should you do when a virtual machine gets a virus?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;What should you do when a virtual machine gets a virus?&lt;/h2&gt;
 &lt;p&gt;If a &lt;a href="https://www.techtarget.com/searchsecurity/tip/VM-security-in-cloud-computing-explained"&gt;virus is detected on a VM&lt;/a&gt;, close any open VPNs connecting to the enterprise back end and shut the VM down. Then notify other administrators that the VM is compromised.&lt;/p&gt;
 &lt;p&gt;Virus scans should be implemented on any servers that were connected with the VM and the host device should also be scanned. Then delete the VMDK or restore it with a snapshot or backup of the VM.&lt;/p&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="Should you use a management VM on the server back end?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Should you use a management VM on the server back end?&lt;/h2&gt;
 &lt;p&gt;Another form of VM administration is running a VM on the enterprise server network. This VM could also be a Remote Desktop Session Host that lets additional administrators sign in and manage the environment. For IT, this is much better than letting administrators sign into domain controllers to perform domain management tasks.&lt;/p&gt;
 &lt;p&gt;If hackers get access to this VM via a virus, they can reach all other systems and use the tools on the VM to infiltrate the enterprise. That's why it's essential that a management VM never has access to the internet and that an administrator never performs personal or private tasks on the VM. Also, the VM will need a virus scanner. If the VM gets a virus, it's important to turn off the VM, scan the entire network, and then delete the VM or restore with a snapshot or backup.&lt;/p&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="Can nonpersistent VMs improve security?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Can nonpersistent VMs improve security?&lt;/h2&gt;
 &lt;p&gt;One option is to &lt;a href="https://www.techtarget.com/searchvirtualdesktop/feature/Understanding-nonpersistent-vs-persistent-VDI"&gt;use a non-persistent management VM&lt;/a&gt; on laptops or within the enterprise server environment. But this will not automatically protect an organization from viruses, as the virus can spread over the network or be transferred to the host machine.&lt;/p&gt;
 &lt;p&gt;There is one big advantage to using a non-persistent VM: Rebooting the VM can get rid of the virus. This is because each time a non-persistent VM is rebooted, it's reset to a pre-divined state that does not include the virus. But it's still important to run a virus scanner on the VM to receive an alert when a virus is present.&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Chris Twiest works as a technology officer at RawWorks in the Netherlands, focusing on the standardization and automation of IT services.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>There is a perception that virtual machines are completely secure and immune to all malware, but the reality of virtual machine security is much more complicated.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/covid_g1213713667.jpg</image>
            <link>https://www.techtarget.com/searchvirtualdesktop/answer/Can-a-virtual-machine-get-a-virus-like-a-desktop-can</link>
            <pubDate>Tue, 18 Jun 2024 16:47:00 GMT</pubDate>
            <title>Can a virtual machine get a virus like a desktop can?</title>
        </item>
        <item>
            <body>&lt;section class="section main-article-chapter" data-menu-title="What is desktop virtualization?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;What is desktop virtualization?&lt;/h2&gt;
 &lt;p&gt;Desktop virtualization is the concept of isolating a logical operating system (&lt;a href="https://www.techtarget.com/whatis/definition/operating-system-OS"&gt;OS&lt;/a&gt;) instance from the client used to access it.&lt;/p&gt;
 &lt;p&gt;There are several different conceptual models of desktop virtualization, which can be broadly divided into two categories based on whether the technology executes the OS instance locally or remotely. It's important to note that not all forms of desktop virtualization technology involve the use of virtual machines (&lt;a href="https://www.techtarget.com/searchitoperations/definition/virtual-machine-VM"&gt;VMs&lt;/a&gt;).&lt;/p&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="How desktop virtualization works"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;How desktop virtualization works&lt;/h2&gt;
 &lt;p&gt;Desktop virtualization employs hardware virtualization technology. Virtual desktops exist as VMs, running on a virtualization host. These VMs share the host server's processing power, memory and other resources.&lt;/p&gt;
 &lt;p&gt;Users typically run a remote desktop protocol (&lt;a href="https://www.techtarget.com/searchenterprisedesktop/definition/Remote-Desktop-Protocol-RDP"&gt;RDP&lt;/a&gt;) client to access the virtual desktop environment. This client attaches to a connection broker that links the user's session to a virtual desktop. Typically, virtual desktops are nonpersistent, meaning the connection broker assigns the user a random virtual desktop from a virtual desktop pool. When the user logs out, this virtual desktop resets to a pristine, unchanged state and returns to the pool. However, some vendors offer an option to create persistent virtual desktops, in which users receive their own writable virtual desktop.&lt;/p&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="Desktop virtualization deployment types"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Desktop virtualization deployment types&lt;/h2&gt;
 &lt;p&gt;There are three main types of desktop virtualization: virtual desktop infrastructure (&lt;a href="https://www.techtarget.com/searchvirtualdesktop/definition/virtual-desktop-infrastructure-VDI"&gt;VDI&lt;/a&gt;), Remote Desktop Services (&lt;a href="https://www.techtarget.com/searchvirtualdesktop/definition/Remote-Desktop-Services-RDS"&gt;RDS&lt;/a&gt;) -- formerly, Terminal Services -- and desktop as a service (&lt;a href="https://www.techtarget.com/searchvirtualdesktop/definition/desktop-as-a-service-DaaS"&gt;DaaS&lt;/a&gt;).&lt;/p&gt;
 &lt;p&gt;When most people think of desktop virtualization, VDI is probably the first thing that comes to mind. VDI is a technology in which physical servers host virtual desktops in an organization's own data center. Like server computing and virtualization, VDI relies on underlying hardware virtualization technology. Users sometimes use the terms &lt;i&gt;desktop virtualization&lt;/i&gt; and &lt;i&gt;VDI&lt;/i&gt; interchangeably, but they aren't the same.&lt;/p&gt;
 &lt;p&gt;While VDI is a type of desktop virtualization, not all types of desktop virtualization use VDI. VDI refers exclusively to the use of host-based VMs to deliver virtualized desktops, which emerged in 2006 as an alternative to Terminal Services and Citrix's client-server approach to desktop virtualization technology.&lt;/p&gt;
 &lt;p&gt;Other types of desktop virtualization -- including the shared hosted model, host-based physical machines and all methods of client virtualization -- aren't examples of VDI.&lt;/p&gt;
 &lt;p&gt;RDS is also an on-premises desktop virtualization technology. Unlike VDI, however, RDS doesn't rely on hardware virtualization, nor does it use desktop OSes. Instead, the server acts as a session host, running a &lt;a href="https://www.techtarget.com/searchvirtualdesktop/definition/Remote-Desktop-Session-Host-RDSH"&gt;Remote Desktop Session Host&lt;/a&gt;. One potential disadvantage of using this method is that application virtualization can be a problem. RDS runs desktop applications on &lt;a href="https://www.techtarget.com/searchwindowsserver/definition/Microsoft-Windows-Server-OS-operating-system"&gt;Microsoft Windows Server&lt;/a&gt;, and an application that's designed to run on Windows 10 won't necessarily run on Windows Server. This is especially true for Microsoft Store apps.&lt;/p&gt;
 &lt;p&gt;DaaS is a &lt;a href="https://www.techtarget.com/searchcloudcomputing/definition/public-cloud"&gt;public cloud&lt;/a&gt;-based desktop virtualization service that vendors offer. Organizations lease virtual desktops on an as-needed basis from a cloud provider. DaaS is generally accessible from anywhere using an RDP client.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/virt_desktop-vdi_vs_rds_vs_daas-f.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/virt_desktop-vdi_vs_rds_vs_daas-f_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/virt_desktop-vdi_vs_rds_vs_daas-f_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/virt_desktop-vdi_vs_rds_vs_daas-f.png 1280w" alt="A chart comparing VDI, RDS and DaaS." height="358" width="559"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;A comparison of three types of desktop virtualization.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
&lt;/section&gt;        
&lt;section class="section main-article-chapter" data-menu-title="Choosing a deployment model"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Choosing a deployment model&lt;/h2&gt;
 &lt;p&gt;The primary decision that organizations must make when they choose a deployment model is whether to deploy an on-premises VDI platform or subscribe to a cloud-based &lt;a href="https://www.techtarget.com/searchvirtualdesktop/tip/Compare-7-desktop-as-a-service-providers"&gt;DaaS provider&lt;/a&gt;.&lt;/p&gt;
 &lt;p&gt;An on-premises platform is best suited to organizations that have already acquired, or have the budget to purchase, &lt;a href="https://www.techtarget.com/searchdatacenter/Server-hardware-guide-to-architecture-products-and-management"&gt;server hardware&lt;/a&gt; and any other required resources. An on-premises platform might also be a good choice for organizations that wish to repurpose their existing desktop OS licenses. Lastly, on-premises VDI is a good fit for organizations that lack the internet bandwidth needed to support a cloud computing DaaS offering.&lt;/p&gt;
 &lt;p&gt;A cloud-based option tends to be a good fit for organizations that don't have the IT expertise or budget to support an on-premises virtual desktop deployment. Cloud-based deployments are also well suited to organizations that employ seasonal or temporary workers because administrators can add or remove end-user capacity on an as-needed basis without incurring a significant investment in server hardware.&lt;/p&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="Types of desktop virtualization technologies"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Types of desktop virtualization technologies&lt;/h2&gt;
 &lt;p&gt;Host-based forms of desktop virtualization require end users to view and interact with their virtual desktops over a network using a remote display protocol. Because all processing takes place in a data center, user devices can be traditional PCs, &lt;a href="https://www.techtarget.com/searchnetworking/definition/thin-client"&gt;thin clients&lt;/a&gt;, &lt;a href="https://www.techtarget.com/searchvirtualdesktop/definition/zero-client"&gt;zero clients&lt;/a&gt;, smartphones or tablets.&lt;/p&gt;
 &lt;p&gt;Examples of host-based desktop virtualization technology include the following.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Host-based VM.&lt;/b&gt; Each user connects to an individual VM that a data center hosts. The user can connect to the same persistent desktop every time or access a fresh nonpersistent desktop with each login.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Shared host.&lt;/b&gt; Users connect to a shared desktop that runs on a server. RDS takes this client-server approach. Users can also connect to individual applications running on a server; this technology is an example of &lt;a href="https://www.techtarget.com/searchvirtualdesktop/definition/app-virtualization"&gt;application virtualization&lt;/a&gt;.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Host-based physical machine.&lt;/b&gt; The OS runs directly on another device's physical hardware. Client virtualization requires processing to occur on local hardware.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;OS image streaming.&lt;/b&gt; The OS runs on local hardware, but it boots to a remote disk image over the network. This is useful for groups of desktops that use the same &lt;a href="https://www.techtarget.com/whatis/definition/disk-image"&gt;disk image&lt;/a&gt;. OS image streaming, also known as &lt;i&gt;remote desktop virtualization&lt;/i&gt;, requires a constant network connection to function.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Client-based VM.&lt;/b&gt; This is a VM that runs on a fully functional PC with a &lt;a href="https://www.techtarget.com/searchitoperations/definition/hypervisor"&gt;hypervisor&lt;/a&gt; in place. Administrators can manage client-based VMs regularly by syncing the disk image with a server, but a constant network connection isn't necessary for them to function.&lt;/p&gt;
 &lt;div class="youtube-iframe-container"&gt;
  &lt;iframe id="ytplayer-0" src="https://www.youtube.com/embed/Xvw2MIjSA9g?autoplay=0&amp;amp;modestbranding=1&amp;amp;rel=0&amp;amp;widget_referrer=null&amp;amp;enablejsapi=1&amp;amp;origin=https://www.techtarget.com" type="text/html" height="360" width="640" frameborder="0"&gt;&lt;/iframe&gt;
 &lt;/div&gt;
&lt;/section&gt;         
&lt;section class="section main-article-chapter" data-menu-title="Desktop virtualization vs. server virtualization"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Desktop virtualization vs. server virtualization&lt;/h2&gt;
 &lt;p&gt;Server virtualization is the abstraction of a server OS and the apps from the physical machine, which creates a virtual server, running on a physical server above the actual server operating system. In such a configuration, many VMs can be running on a single physical server, each having its own OS and apps.&lt;/p&gt;
 &lt;p&gt;In desktop virtualization, the OS and apps are abstracted from a physical thin client, connecting to data over the internet. In this model, the desktop is completely hardware-independent, an obvious upside. On the other hand, the bandwidth requirement for such a deployment is significant and can create difficulties during peak usage.&lt;/p&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="Desktop virtualization vs. app virtualization"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Desktop virtualization vs. app virtualization&lt;/h2&gt;
 &lt;p&gt;Application virtualization differs from desktop virtualization in that isolates the app itself, rather than the app and the OS executing it. As with desktop virtualization, however, it's hardware-independent, allowing the app to run on almost any client. It's also independent of the OS running on the endpoint.&lt;/p&gt;
 &lt;p&gt;Installation and maintenance of apps are thus greatly simplified, as only one installation is required and only one instance will require updates. Deployment is a bit more cumbersome than with a virtual desktop, as a preconfigured executable must be run on user devices, but this is a minor concern. On the other hand, apps can be retired from many end-users' devices at once by simply deleting them on the app server.&lt;/p&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="Benefits of desktop virtualization (and some drawbacks)"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Benefits of desktop virtualization (and some drawbacks)&lt;/h2&gt;
 &lt;p&gt;Like any other technology, there are both advantages and disadvantages to using desktop virtualization. One of the primary advantages of desktop virtualization is that virtualization often makes it easier for IT professionals to manage the desktop environment. Rather than maintaining countless physical desktops, administrators can focus their attention on a small number of desktop images that they deploy to the users.&lt;/p&gt;
 &lt;p&gt;Conversely, there are some circumstances in which the use of desktop virtualization can increase an organization's management burden and its licensing costs. For example, if an organization allows users to connect to virtual desktops from their physical desktops, then the IT staff must license and maintain both the physical and virtual desktops.&lt;/p&gt;
 &lt;p&gt;In this example, each user is consuming two desktop OS licenses -- one for the physical desktop and one for the virtual desktop -- and two IP addresses. If an organization provides its users with virtual desktops, it's usually best to provide connectivity to those virtual desktops through thin clients, zero clients or &lt;a href="https://www.techtarget.com/whatis/definition/BYOD-bring-your-own-device"&gt;bring your own device&lt;/a&gt; hardware.&lt;/p&gt;
 &lt;p&gt;Another advantage to desktop virtualization is that users can access their virtual desktops from anywhere. Even if a user is working from home or a hotel room, they can still work from the same desktop environment that they use in the office.&lt;/p&gt;
 &lt;p&gt;A potential disadvantage, however, is that virtual desktops can't function without connectivity to the VDI environment. As such, an internet connectivity failure or a server hardware failure could make an organization's virtual desktops inaccessible to users.&lt;/p&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="Virtual desktop providers"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Virtual desktop providers&lt;/h2&gt;
 &lt;p&gt;As the &lt;a href="https://www.forbes.com/sites/forbestechcouncil/2023/03/09/the-future-of-work-what-the-consumerization-of-vdi-could-look-like/?sh=e5ba76044ebc" target="_blank" rel="noopener"&gt;presence of VDI&lt;/a&gt; grew, VMware -- which coined the term &lt;i&gt;VDI&lt;/i&gt; -- joined Citrix and Microsoft as leaders in the desktop virtualization market. Other examples of vendors that offer various desktop virtualization technologies include Amazon Web Services, Hewlett Packard Enterprise, Oracle, Parallels International, Red Hat and Workspot.&lt;/p&gt;
 &lt;p&gt;There are also many &lt;a href="https://www.techtarget.com/searchvirtualdesktop/opinion/11-more-alternative-desktop-and-app-virtualization-vendors"&gt;third-party vendors&lt;/a&gt; with products and services that are designed to improve the management, security and usability of virtual desktops. These offerings range from monitoring and application management tools to user environment management and bandwidth optimization software.&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Learn how organizations determine the best way to host and deliver virtual desktops and the advantages of &lt;/i&gt;&lt;a href="https://www.techtarget.com/searchvirtualdesktop/feature/Comparing-AVD-vs-VDI-and-how-to-start-a-migration-plan"&gt;&lt;i&gt;considering different migration strategies&lt;/i&gt;&lt;/a&gt;&lt;i&gt;.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>Desktop virtualization is the concept of isolating a logical operating system (OS) instance from the client used to access it.</description>
            <image>https://cdn.ttgtmedia.com/visuals/digdeeper/1.jpg</image>
            <link>https://www.techtarget.com/searchvirtualdesktop/definition/desktop-virtualization</link>
            <pubDate>Wed, 28 Feb 2024 09:00:00 GMT</pubDate>
            <title>desktop virtualization</title>
        </item>
        <item>
            <body>&lt;p&gt;Trends such as remote work, work from home and BYOD have become the norm, and while these trends have liberated end users, they pose significant challenges for IT. Desktop virtualization offers one of the best options for addressing these challenges.&lt;/p&gt; 
&lt;p&gt;Desktop virtualization allows users to access carefully configured desktop operating systems similar to those used on domain-joined PCs within the workplace. Because these desktop operating systems are virtual, they can be accessed from any device in any location, providing a consistent end-user experience no matter where or how the user works.&lt;/p&gt; 
&lt;p&gt;Those who wish to implement virtual desktops have two main options: virtual desktop infrastructure (&lt;a href="https://www.techtarget.com/searchvirtualdesktop/definition/virtual-desktop-infrastructure-VDI"&gt;VDI&lt;/a&gt;) and desktop as a service (&lt;a href="https://www.techtarget.com/searchvirtualdesktop/definition/desktop-as-a-service-DaaS"&gt;DaaS&lt;/a&gt;). However, when it comes to DaaS vs. VDI, organizations must carefully consider their options, as both technologies have advantages and disadvantages.&lt;/p&gt; 
&lt;p&gt;VDI and DaaS can help organizations provide business continuity to remote employees and offer the ability to scale up or down quickly as employee bases change. From a user perspective, these methods are most successful when they provide the same user experience a person would get from a physical, local desktop.&lt;/p&gt; 
&lt;p&gt;IT admins should compare desktop as a service vs. VDI to understand the differences between these approaches and determine which is right for their organization.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="What is virtual desktop infrastructure?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;What is virtual desktop infrastructure?&lt;/h2&gt;
 &lt;p&gt;VDI works by hosting a desktop OS on a central server running software provided by a vendor such as VMware, Citrix or Microsoft. This server sends the desktop interface over a &lt;a href="https://www.techtarget.com/searchenterprisedesktop/definition/Remote-Desktop-Protocol-RDP"&gt;remote display protocol&lt;/a&gt;. The user can then interact with the desktop on their endpoint device, whether a &lt;a href="https://www.techtarget.com/searchnetworking/definition/thin-client"&gt;thin client&lt;/a&gt;, mobile device, laptop or other client. The user must be connected to a network to access the desktop, although some VDI software offers offline capabilities. VDI enables users to access full desktop capabilities on thinner machines, as most processing and computing happens on the back end.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/virt_desktop-vdi_vs_daas-f.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/virt_desktop-vdi_vs_daas-f_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/virt_desktop-vdi_vs_daas-f_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/virt_desktop-vdi_vs_daas-f.png 1280w" alt="Comparing infrastructure, management and cost of DaaS vs. VDI." height="247" width="560"&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="Pros and cons of VDI"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Pros and cons of VDI&lt;/h2&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;VDI can be cost-effective for companies with a large employee base, particularly if IT can deploy shared or pooled virtual desktops that cut down on the number of overall desktops in the organization.&lt;/li&gt; 
  &lt;li&gt;Simplified management is often a benefit of VDI; groups of users can share virtual desktops, or IT can deploy desktops without much customization.&lt;/li&gt; 
  &lt;li&gt;VDI requires significant hardware running in the organization's data center. As such, the initial costs associated with deploying VDI tend to be high.&lt;/li&gt; 
  &lt;li&gt;Because VDI deployments run on premises, organizations that choose to deploy VDI will need well-trained support staff who are experts in VDI. Remember, a VDI outage impacts all users, so it's essential that IT can resolve problems quickly.&lt;/li&gt; 
  &lt;li&gt;As an on-premises option, VDI is a good choice for those who want to keep their sensitive data in their own data center instead of the public cloud.&lt;/li&gt; 
  &lt;li&gt;VDI offers the flexibility for organizations to choose a hardware configuration based on their users' performance needs. Organizations also have &lt;a href="https://www.techtarget.com/searchvirtualdesktop/feature/How-VDI-supports-compliance-in-regulated-industries"&gt;total control over virtual desktop security&lt;/a&gt; and how virtual desktop operating systems are configured.&lt;/li&gt; 
  &lt;li&gt;Organizations hosting virtual desktops must ensure they have the required network bandwidth. Otherwise, users will find their VDI sessions slow to a crawl, which cuts into valuable work time.&lt;/li&gt; 
  &lt;li&gt;Scalability can only be achieved by adding hardware. VDI deployments normally use &lt;a href="https://www.techtarget.com/searchdatacenter/definition/What-is-hyper-converged-infrastructure-Guide-to-HCI"&gt;hyper-converged infrastructure&lt;/a&gt;, with each node supporting a specific number of virtual desktops. When the organization needs to increase its capacity, it will have to purchase additional nodes.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;  
&lt;section class="section main-article-chapter" data-menu-title="What is DaaS?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;What is DaaS?&lt;/h2&gt;
 &lt;p&gt;DaaS is similar to VDI in that it hosts a desktop operating system on a remote server. However, DaaS differs from VDI because instead of hosting desktops in an on-premises data center, DaaS uses a cloud-based system from a DaaS provider. The cloud service provider handles connectivity and security and maintains the cloud infrastructure. &lt;a href="https://www.techtarget.com/searchvirtualdesktop/tip/Compare-7-desktop-as-a-service-providers"&gt;Options for DaaS providers&lt;/a&gt; include Amazon, Citrix, Microsoft and VMware.&lt;/p&gt;
&lt;/section&gt;  
&lt;section class="section main-article-chapter" data-menu-title="Pros and cons of DaaS"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Pros and cons of DaaS&lt;/h2&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;DaaS uses subscription-based pricing, meaning organizations don't have to incur the expense of purchasing server hardware and software.&lt;/li&gt; 
  &lt;li&gt;DaaS can be deployed quickly and easily. While it may take several weeks to get a VDI deployment up and running, DaaS can be set up and ready to use in a matter of hours.&lt;/li&gt; 
  &lt;li&gt;DaaS providers will generally handle any issues with the connectivity at the infrastructure level. The customer acts as an administrator but is not typically responsible for troubleshooting.&lt;/li&gt; 
  &lt;li&gt;It's relatively easy to scale a DaaS deployment up or down. DaaS providers typically offer scalability on demand, meaning an organization can change its virtual desktop count anytime without worrying about capacity planning or hardware acquisitions.&lt;/li&gt; 
  &lt;li&gt;IT generally has less control over a DaaS environment. A DaaS provider may impose its own security requirements and software update schedules and might even require using its own desktop images.&lt;/li&gt; 
  &lt;li&gt;Over time, DaaS may be more expensive than VDI because the organization pays service fees monthly for as long as it uses the service.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;  
&lt;section class="section main-article-chapter" data-menu-title="DaaS and VDI: Key differences"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;DaaS and VDI: Key differences&lt;/h2&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Cost.&lt;/b&gt; DaaS has a far lower startup cost since no hardware purchases are required. However, DaaS can sometimes cost more in the long run since the organization must pay subscription fees for as long as it uses the service. It is also worth noting that the DaaS provider could theoretically increase its billing rates at any time.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Single tenant vs. multi-tenant.&lt;/b&gt; VDI is designed to be a &lt;a href="https://www.techtarget.com/searchcloudcomputing/definition/single-tenancy"&gt;single-tenant model&lt;/a&gt;. An organization would use VDI to host virtual desktops on the hardware in its data center. Conversely, DaaS is a cloud-based option. Cloud providers commonly share servers among multiple tenants rather than adhering to a single-tenant model.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Flexibility.&lt;/b&gt; VDI offers more flexibility than DaaS because the organization owns the entire VDI deployment and is, therefore, free to choose its hardware and software and can configure it as they see fit. It is worth noting, however, that DaaS offers far more flexibility with scalability. Cloud providers generally allow subscribers to scale their virtual desktop deployment on demand.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Management.&lt;/b&gt; Both VDI and DaaS offer simplified management. Cloud vendors provide a special web-based console through which their subscribers can configure and manage their virtual desktops. VDI vendors, however, offer similar tools for managing VDI deployments.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Access to resources.&lt;/b&gt; Organizations that choose to deploy VDI usually have full access to the full VDI stack (both at a hardware and software level). Conversely, DaaS providers allow their subscribers to create and manage virtual desktops but prevent them from accessing the underlying infrastructure.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;  
&lt;section class="section main-article-chapter" data-menu-title="When to use desktop as a service vs. VDI"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;When to use desktop as a service vs. VDI&lt;/h2&gt;
 &lt;p&gt;How can IT settle the DaaS vs. VDI debate? VDI is the winner when it comes to security and control. And for companies with the money, time and resources, VDI is a good option.&lt;/p&gt;
 &lt;p&gt;DaaS offers scalability and user access flexibility and does not require a large startup investment, which is a good fit for a smaller business or one testing out virtualization. If a company is unsure of its desired scale, &lt;a href="https://www.techtarget.com/searchvirtualdesktop/tip/How-to-keep-DaaS-pricing-stable-and-consistent"&gt;DaaS can adjust to fluctuation&lt;/a&gt; in virtual desktop numbers, where VDI is more rigid.&lt;/p&gt;
 &lt;p&gt;Each industry has its own set of security and compliance &lt;a target="_blank" href="https://www.irs.gov/privacy-disclosure/protecting-federal-tax-information-fti-in-a-virtual-desktop-environment" rel="noopener"&gt;regulations&lt;/a&gt; to follow. Since DaaS is packaged by a provider, it can be difficult to find an offering that fits a business perfectly. Organizations will need to verify that the DaaS provider adheres to their IT security and compliance requirements.&lt;/p&gt;
 &lt;p&gt;DaaS simplifies data storage while also addressing cost concerns and location dependency problems. However, the cloud is a double-edged sword as it can contain security vulnerabilities. IT must put full faith into the hands of the DaaS provider to keep the deployment secure. Meanwhile, &lt;a href="https://www.techtarget.com/searchvirtualdesktop/feature/3-steps-to-lock-down-VDI-security"&gt;VDI security&lt;/a&gt; is often based on older infrastructures that were never designed to guard against sophisticated, next-generation online attacks. On the other hand, DaaS providers are aware of the various online threats and can target and eliminate a threat once it's identified.&lt;/p&gt;
 &lt;p&gt;&lt;em&gt;Brien Posey is a 15-time Microsoft MVP with two decades of IT experience. He has served as a lead network engineer for the U.S. Department of Defense and as a network administrator for some of the largest insurance companies in America.&lt;/em&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>For IT to choose between desktop as a service vs. VDI, they'll need to decide what's more important -- security and control or flexibility for development and maintenance.</description>
            <image>https://cdn.ttgtmedia.com/visuals/searchVirtualDesktop/management/virtualdesktop_article_004.jpg</image>
            <link>https://www.techtarget.com/searchvirtualdesktop/feature/Compare-desktop-virtualization-options-DaaS-vs-VDI</link>
            <pubDate>Fri, 15 Dec 2023 10:33:00 GMT</pubDate>
            <title>Desktop as a service vs. VDI: What's the difference?</title>
        </item>
        <item>
            <body>&lt;section class="section main-article-chapter" data-menu-title="What is a remote desktop connection broker?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;What is a remote desktop connection broker?&lt;/h2&gt;
 &lt;p&gt;A remote desktop connection broker is software that allows a remote desktop client to connect to a remote desktop host or server. It's responsible for directing the incoming remote desktop connection to an available host. It can also perform other related roles, such as checking the health of the host, &lt;a href="https://www.techtarget.com/searchnetworking/definition/load-balancing"&gt;load balancing&lt;/a&gt;, creating new hosts, destroying unused hosts or reconnecting dropped sessions.&lt;/p&gt;
 &lt;p&gt;A remote desktop connection broker is like a stockbroker. When someone wants to buy stock in a company, they ask a broker. The broker then finds someone who wants to sell it and facilitates the sale. The broker isn't a party to the purchase though.&lt;/p&gt;
 &lt;p&gt;Another way to illustrate the role of a remote desktop connection broker is that it's like the host at a restaurant. When you enter most formal restaurants, you're greeted by a host or hostess. It's their job to find an available table that meets your needs and ensure it's clean, and then take you to the table. Once you're seated at the table, the host's role ends.&lt;/p&gt;
 &lt;p&gt;The remote desktop connection broker's role is similar. It takes the initial &lt;a href="https://www.techtarget.com/searchenterprisedesktop/definition/Remote-Desktop-Protocol-RDP"&gt;Remote Desktop Protocol&lt;/a&gt; connection from the remote desktop client and finds the correct services available to it. It then tells the client to connect to an available computer that has sufficient capacity. It can use physical computers, desktop virtualization or a remote desktop service host. The remote desktop connection broker then logs the connection for load balancing purposes or to reconnect a dropped session, but it's no longer directly involved with the communication between the host and client.&lt;/p&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="Remote desktop connection broker roles"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Remote desktop connection broker roles&lt;/h2&gt;
 &lt;p&gt;Remote desktop connection broker software can have different capabilities, depending on the software manufacturer or installed roles. Some of these roles can be handled by the broker software or can be part of another service in a larger deployment.&lt;/p&gt;
 &lt;p&gt;Remote desktop connection brokers can perform a variety of tasks, including the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Checking user credentials for access rights.&lt;/li&gt; 
  &lt;li&gt;Assigning users to remote desktops, session host or virtual machines (&lt;a href="https://www.techtarget.com/searchitoperations/definition/virtual-machine-VM"&gt;VMs&lt;/a&gt;).&lt;/li&gt; 
  &lt;li&gt;Turning VMs on and off as needed.&lt;/li&gt; 
  &lt;li&gt;Load balancing the connections to available hosts.&lt;/li&gt; 
  &lt;li&gt;Managing resource pools; for example, assigning accounting users to accounting VMs and engineering users to engineering computers.&lt;/li&gt; 
  &lt;li&gt;Redirecting multimedia processing to the client.&lt;/li&gt; 
  &lt;li&gt;Reconnecting a dropped or disconnected connection to the existing session or host.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;&lt;a href="https://www.techtarget.com/whatis/definition/Citrix"&gt;Citrix&lt;/a&gt; Systems, Microsoft, &lt;a href="https://www.techtarget.com/searchvmware/definition/VMware"&gt;VMware&lt;/a&gt; and several other vendors offer remote desktop connection brokers. Some are offered as standalone products and others as a part of a complete desktop virtualization suite. Compatibility with other vendors' products is affected by the remote display protocol used and, in the case of &lt;a href="https://www.techtarget.com/searchvirtualdesktop/definition/virtual-desktop-infrastructure-VDI"&gt;virtual desktop infrastructure&lt;/a&gt; desktops, the hypervisor that's used to host the desktop VMs. Although licensing these products can be expensive, they're highly integrated end-to-end products that can manage all parts of the remote session, including the connection client software, VM creation and &lt;a href="https://www.techtarget.com/searchvirtualdesktop/definition/app-virtualization"&gt;application virtualization&lt;/a&gt;.&lt;/p&gt;
 &lt;p&gt;Microsoft Remote Desktop Connection Broker (RD Connection Broker) is a component of Microsoft Windows Server. RD Connection Broker has two primary roles -- sending the incoming connection to the remote desktop host with the least load and reconnecting dropped sessions. It's often used as part of Microsoft &lt;a href="https://www.techtarget.com/searchvirtualdesktop/definition/Remote-Desktop-Services-RDS"&gt;Remote Desktop Services&lt;/a&gt; with Microsoft Remote Desktop Session Host, Remote Desktop Gateway, &lt;a href="https://www.techtarget.com/searchwindowsserver/definition/Microsoft-Remote-Desktop-Web-Access-Microsoft-RD-Web-Access"&gt;Remote Desktop Web Access&lt;/a&gt; and other third-party tools as part of a full deployment.&lt;/p&gt;
 &lt;p&gt;Remote desktop connection brokers are used in Microsoft RemoteApp deployments. They find an available host and set up the application virtualization.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/virt_desktop-microsoft_rds.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/virt_desktop-microsoft_rds_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/virt_desktop-microsoft_rds_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/virt_desktop-microsoft_rds.png 1280w" alt="Diagram showing how Microsoft Remote Desktop Services works" height="434" width="559"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Microsoft RDS allows users to remotely access Windows applications.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
&lt;/section&gt;        
&lt;section class="section main-article-chapter" data-menu-title="When is a remote desktop connection broker required?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;When is a remote desktop connection broker required?&lt;/h2&gt;
 &lt;p&gt;A remote desktop connection broker isn't required for small or simple deployments. In these cases, the end user directly connects to an assigned computer or remote desktop server.&lt;/p&gt;
 &lt;p&gt;A remote desktop server is valuable for large-scale deployments that involve automation. These include remote desktops that host hundreds or thousands of end users. These are also often a part of a package with a remote desktop gateway.&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Learn how to &lt;/i&gt;&lt;a href="https://www.techtarget.com/searchvirtualdesktop/tip/How-to-configure-multiple-monitors-for-remote-desktop-use"&gt;&lt;i&gt;configure multiple monitors&lt;/i&gt;&lt;/a&gt;&lt;i&gt; for a remote desktop workstation. &lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>A remote desktop connection broker is software that allows a remote desktop client to connect to a remote desktop host or server.</description>
            <image>https://cdn.ttgtmedia.com/visuals/digdeeper/2.jpg</image>
            <link>https://www.techtarget.com/searchvirtualdesktop/definition/remote-desktop-connection-broker</link>
            <pubDate>Tue, 05 Sep 2023 15:17:00 GMT</pubDate>
            <title>remote desktop connection broker</title>
        </item>
        <item>
            <body>&lt;p&gt;As business technology vendors prioritize service-based models, IT teams and executives must familiarize themselves with the terminology and functions of these services.&lt;/p&gt; 
&lt;p&gt;Complicating this process is the similarity between "as a service" acronyms, including desktop as a service (&lt;a href="https://www.techtarget.com/searchvirtualdesktop/definition/desktop-as-a-service-DaaS"&gt;DaaS&lt;/a&gt;), &lt;a href="https://www.techtarget.com/whatis/video/An-explanation-of-software-as-a-service-SaaS"&gt;software as a service&lt;/a&gt; (&lt;a href="https://www.techtarget.com/searchcloudcomputing/definition/Software-as-a-Service"&gt;SaaS&lt;/a&gt;) and many others. In some cases, organizations can subscribe to one, two or several of these services concurrently to deliver users all the resources they need to work.&lt;/p&gt; 
&lt;p&gt;A major trend in the modern enterprise is &lt;a href="https://www.techtarget.com/searchstorage/feature/Explore-the-consumption-based-IT-and-Opex-storage-landscape"&gt;converting Capex to Opex&lt;/a&gt;, which often takes the form of purchasing these services for users. Rather than manage all aspects of applications and desktops in-house, these services outsource the hosting and some of the management to free up IT for more complicated and specialized tasks.&lt;/p&gt; 
&lt;p&gt;Before organizations can fully outsource these processes via a subscription service, they must carefully form a strategy based on their needs. That process should begin by clearly defining options and including the key user-focused technologies, DaaS and SaaS.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="What is DaaS and what does it do?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;What is DaaS and what does it do?&lt;/h2&gt;
 &lt;p&gt;DaaS is a popular virtualization technology in which a third-party vendor hosts and delivers virtual desktops to customers. These virtual desktops serve as users' workstations where they can access applications, data, services and other work-related resources.&lt;/p&gt;
 &lt;p&gt;This technology is an alternative to VDI, where organizations host virtual desktops within an in-house data center. By &lt;a href="https://www.techtarget.com/searchvirtualdesktop/feature/Compare-desktop-virtualization-options-DaaS-vs-VDI"&gt;moving from VDI to DaaS&lt;/a&gt;, organizations can shift Capex to Opex and free up all the IT labor hours and expenses of building, maintaining and operating VDI through their own data centers. DaaS vendors offer flexible plans where organizations can determine their desktops' requirements and how much desktop management the customer is responsible for.&lt;/p&gt;
 &lt;p&gt;DaaS also offers a reasonable entry point for desktop virtualization if an organization is considering a move away from physical desktops running local OSes. The service model lets organizations attain the benefits of virtualization -- such as easier remote access for IT and centralized management -- without the upfront cost of building up VDI internally. Further, smaller organizations might not have the resources -- or the need -- to create an entire VDI environment in a data center. DaaS is also a good fit for smaller organizations that need to quickly scale.&lt;/p&gt;
 &lt;h3&gt;Common DaaS use cases&lt;/h3&gt;
 &lt;p&gt;If an organization has 100 knowledge workers and 50 task workers that only need one application connected to their credentials, DaaS can help deliver those apps. A &lt;a href="https://www.techtarget.com/searchvirtualdesktop/tip/Compare-7-desktop-as-a-service-providers"&gt;DaaS provider&lt;/a&gt; can deliver 100 desktops with the full Microsoft 365 suite, any other line-of-business apps and 50 non-persistent desktops with that single application for task workers. This way, organizations only pay for the licenses, storage and other necessary resources while delivering a complete workstation. Organizations can also be sure there aren't other programs and apps that might serve as a distraction from work tasks.&lt;/p&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="What is SaaS and what does it do?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;What is SaaS and what does it do?&lt;/h2&gt;
 &lt;p&gt;SaaS delivers applications to users via the internet instead of running an application locally on an endpoint. This model offers many of the same benefits of DaaS, but fulfills a very different role.&lt;/p&gt;
 &lt;p&gt;Organizations purchase licenses for the desired software -- usually common business applications -- for all users that need access to these programs, and the SaaS provider delivers those applications to the endpoint. However, not all applications are a good fit for SaaS.&lt;/p&gt;
 &lt;div class="youtube-iframe-container"&gt;
  &lt;iframe id="ytplayer-0" src="https://www.youtube.com/embed/4oQjPlS2gSg?autoplay=0&amp;amp;modestbranding=1&amp;amp;rel=0&amp;amp;widget_referrer=null&amp;amp;enablejsapi=1&amp;amp;origin=https://www.techtarget.com" type="text/html" height="360" width="640" frameborder="0"&gt;&lt;/iframe&gt;
 &lt;/div&gt;
 &lt;h3&gt;Common uses for SaaS&lt;/h3&gt;
 &lt;blockquote class="main-article-pullquote"&gt;
  &lt;div class="main-article-pullquote-inner"&gt;
   &lt;figure&gt;
    The best fit for SaaS are universal applications that many users require, such as suites of productivity apps.
   &lt;/figure&gt;
   &lt;i class="icon" data-icon="z"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/blockquote&gt;
 &lt;p&gt;The best fit for SaaS are universal applications that many users require, such as suites of productivity apps. Microsoft 365 is a common instance of SaaS in a business setting because employees usually need several applications within this service, such as Outlook, Word and Excel. Alternatively, organizations can use Google Workspace to &lt;a href="https://www.techtarget.com/searchenterprisedesktop/tip/Evaluating-Microsoft-365-vs-G-Suite-for-enterprise-use"&gt;deliver similar functionalities&lt;/a&gt; with Gmail, Docs and Sheets.&lt;/p&gt;
 &lt;p&gt;Custom applications that organizations have developed in-house aren't as good of a fit for SaaS, as these vendors tend to focus on their first-party software. The same is true for &lt;a href="https://www.techtarget.com/searchcio/feature/Replacing-vs-maintaining-legacy-systems"&gt;legacy applications that require in-house testing&lt;/a&gt; for compatibility and might not perform as desired when running on different platforms. Organizations could try to containerize such applications, host them virtually and deliver them via the internet, but that isn't SaaS -- it's application virtualization.&lt;/p&gt;
 &lt;p&gt;Organizations that subscribe to SaaS offerings can manage applications centrally and immediately push out updates and patches with minimal downtime and no risk of outdated software running. Up-to-date applications mean fewer security risks and quick deployment of new features.&lt;/p&gt;
&lt;/section&gt;         
&lt;section class="section main-article-chapter" data-menu-title="Daas vs. SaaS comparison"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Daas vs. SaaS comparison&lt;/h2&gt;
 &lt;p&gt;DaaS and SaaS have several similarities, but they're ultimately more different than alike. As their names imply, desktop as a service focuses on delivering a desktop, while software as a service focuses on applications.&lt;/p&gt;
 &lt;p&gt;Organizations can deploy DaaS and SaaS for users -- in fact, this approach allows for some synergy within IT management tasks. DaaS and SaaS offer similar benefits in the following ways:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Both services provide the benefits of virtualization without the back-end work required.&lt;/li&gt; 
  &lt;li&gt;DaaS and SaaS are both highly scalable for initial deployment or increases and decreases in the workforce.&lt;/li&gt; 
  &lt;li&gt;IT can deliver either of these services to users via browser-based portals.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;Providing all business resources &lt;a href="https://www.techtarget.com/searchvirtualdesktop/answer/What-does-IT-need-to-know-about-VDI-web-browsers"&gt;within a single browser portal&lt;/a&gt; helps IT minimize bloat from extraneous and unneeded applications on desktops. It also helps data security ensure that all business files and data are only accessible within company-approved platforms. However, it's unlikely an organization would want to run both services via a browser.&lt;/p&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="Can DaaS and SaaS function together?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Can DaaS and SaaS function together?&lt;/h2&gt;
 &lt;p&gt;DaaS and SaaS can run alongside one another to deliver desktops, applications and other services, and in some cases, can complement one another well.&lt;/p&gt;
 &lt;p&gt;Some examples of environments that include DaaS and/or SaaS include the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Local desktop OS with SaaS applications.&lt;/li&gt; 
  &lt;li&gt;Virtual desktop via DaaS with SaaS applications.&lt;/li&gt; 
  &lt;li&gt;Virtual desktop via DaaS with applications the organization hosts on its own via a method such as &lt;a href="https://www.techtarget.com/searchvirtualdesktop/definition/application-layering-app-layering"&gt;application layering&lt;/a&gt;.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;figure class="main-article-image half-col" data-img-fullsize="https://www.techtarget.com/rms/onlineImages/AC0517_p18g1.jpg"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineImages/AC0517_p18g1_mobile.jpg" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineImages/AC0517_p18g1_mobile.jpg 960w,https://www.techtarget.com/rms/onlineImages/AC0517_p18g1.jpg 1280w" alt="A diagram showing how application layering delivers virtual apps alongside virtual desktops."&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;p&gt;If an organization has users that work while traveling a significant amount of time or at locations with unreliable internet connection, IT teams should consider avoiding these services and deploy local applications to a local desktop OS.&lt;/p&gt;
 &lt;p&gt;However, consider an accounting firm with 1,000 users working in a large office building that requires productivity software and an accounting program available as SaaS. IT could reasonably rely on DaaS and SaaS for all of these users' needs. But if this firm has a specific team that requires a custom line-of-business application, IT might need to deploy that application manually so it runs on the local device or find a way to deliver that application virtually via alternative methods of hosting.&lt;/p&gt;
 &lt;p&gt;Now consider an organization with 100 users &lt;a href="https://www.techtarget.com/whatis/feature/6-remote-work-legal-risks-to-consider"&gt;who are usually remote&lt;/a&gt;. The decision to run DaaS and SaaS may rely on the &lt;a href="https://www.nytimes.com/2020/03/18/technology/personaltech/working-from-home-problems-solutions.html" target="_blank" rel="noopener"&gt;stability&lt;/a&gt; of a user's home internet. This might be a case where organizations should deploy laptops with Windows or macOS running on the endpoint while providing their productivity applications via SaaS running in a browser.&lt;/p&gt;
&lt;/section&gt;</body>
            <description>There are many services organizations can purchase to simplify business processes and IT management, and DaaS and SaaS are two of the most common examples.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/competition_a299069360.jpg</image>
            <link>https://www.techtarget.com/searchvirtualdesktop/feature/Comparing-DaaS-vs-SaaS-and-how-they-work</link>
            <pubDate>Mon, 14 Aug 2023 11:49:00 GMT</pubDate>
            <title>Comparing DaaS vs. SaaS and how they work</title>
        </item>
        <item>
            <body>&lt;h3&gt;What is Citrix XenApp?&lt;/h3&gt; 
&lt;p&gt;&lt;a href="https://www.techtarget.com/whatis/definition/Citrix"&gt;Citrix&lt;/a&gt; XenApp, now called Citrix Virtual Apps, was a product that extended Microsoft &lt;a href="https://www.techtarget.com/searchvirtualdesktop/definition/Remote-Desktop-Session-Host-RDSH"&gt;Remote Desktop Session Host&lt;/a&gt; (formerly known as Terminal Services) desktop sessions and applications to users through the Citrix HDX protocol.&lt;/p&gt; 
&lt;p&gt;XenApp and &lt;a href="https://www.techtarget.com/searchvirtualdesktop/definition/Remote-Desktop-Services-RDS"&gt;Remote Desktop Services&lt;/a&gt; allowed IT departments to centrally manage Windows applications and computing resources in a secure data center. Users could access the Citrix XenApp applications from anywhere and from non-Windows &lt;a href="https://www.techtarget.com/searchenterprisedesktop/definition/client"&gt;clients&lt;/a&gt;. Citrix Virtual Apps now offers the same capabilities as part of Citrix Virtual Apps and Desktops, the company's VDI offering.&lt;/p&gt; 
&lt;p&gt;A XenApp environment consisted of three parts:&lt;/p&gt; 
&lt;ul class="default-list"&gt; 
 &lt;li&gt;&lt;b&gt;A multiuser operating system.&lt;/b&gt; &lt;a href="https://www.techtarget.com/searchwindowsserver/definition/Microsoft-Windows-Server-OS-operating-system"&gt;Microsoft Windows Server&lt;/a&gt; with the Remote Desktop Session Host feature allowed multiple users to independently access a server. Users could connect to individual Citrix XenApp applications or session-based desktops.&lt;/li&gt; 
 &lt;li&gt;&lt;b&gt;XenApp software.&lt;/b&gt; XenApp extended the Remote Desktop Services applications and desktops to client devices via the HDX protocol. HDX provides remote display capabilities, multimedia redirection, USB redirection and a variety of other capabilities, depending on the client device.&lt;/li&gt; 
 &lt;li&gt;&lt;b&gt;Client devices.&lt;/b&gt; Citrix XenApp applications and sessions could be accessed by endpoint devices using a software client called &lt;a href="https://www.techtarget.com/searchvirtualdesktop/definition/Citrix-Receiver"&gt;Citrix Receiver&lt;/a&gt;, which is now called the Citrix Workspace app. The software is available for a very large array of client form factors and operating systems.&lt;/li&gt; 
&lt;/ul&gt; 
&lt;h3&gt;Citrix XenApp versions&lt;/h3&gt; 
&lt;p&gt;Beginning with the XenApp 7 release in 2018, XenApp was renamed Citrix Virtual Apps. Today, Citrix's virtualization product &lt;a href="https://www.citrix.com/products/citrix-daas/feature-matrix.html" target="_blank" rel="noopener"&gt;suites&lt;/a&gt; are Citrix Virtual Apps and Desktops (CVAD) -- which Citrix Virtual Apps is a component of -- and Citrix DaaS.&lt;/p&gt; 
&lt;p&gt;Previous Citrix XenApp versions went by the names MetaFrame, MetaFrame XP, MetaFrame Presentation Server and Presentation Server. MetaFrame hit the market in 1998. Its predecessor, WinFrame, debuted in 1995.&lt;/p&gt; 
&lt;p&gt;The product received the name XenApp following Citrix's acquisition of XenSource. Edition names included Citrix XenApp Fundamentals, XenApp Advanced, XenApp Enterprise and XenApp Platinum.&lt;/p&gt; 
&lt;h3&gt;What does Citrix Virtual Apps do?&lt;/h3&gt; 
&lt;p&gt;There are several different reasons organizations choose to deploy Citrix Virtual Apps, including the following:&lt;/p&gt; 
&lt;ul class="default-list"&gt; 
 &lt;li&gt;&lt;b&gt;Security.&lt;/b&gt; CVAD applications live in the data center, where IT can better protect them. Because the applications don't live on the endpoint, no data is at risk when a device is lost or stolen.&lt;/li&gt; 
 &lt;li&gt;&lt;b&gt;Support for remote and mobile workers.&lt;/b&gt; IT can centrally manage CVAD applications, even when workers are distributed.&lt;/li&gt; 
 &lt;li&gt;&lt;b&gt;PC refreshes and OS upgrades.&lt;/b&gt; Users can continue to access their CVAD applications as usual when they get new PCs or migrate OSes. Previously, IT had to reconfigure and redeploy the applications to each new or updated machine.&lt;/li&gt; 
&lt;/ul&gt;</body>
            <description>Citrix XenApp, now called Citrix Virtual Apps, was a product that extends Microsoft Remote Desktop Session Host (formerly known as Terminal Services) desktop sessions and applications to users through the Citrix HDX protocol.</description>
            <image>https://cdn.ttgtmedia.com/visuals/digdeeper/2.jpg</image>
            <link>https://www.techtarget.com/searchvirtualdesktop/definition/Citrix-XenApp</link>
            <pubDate>Thu, 20 Jul 2023 13:12:00 GMT</pubDate>
            <title>Citrix XenApp</title>
        </item>
        <item>
            <body>&lt;section class="section main-article-chapter" data-menu-title="What is Windows as a service?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;What is Windows as a service?&lt;/h2&gt;
 &lt;p&gt;Windows as a service is the approach Microsoft introduced with Windows 10 to deploy, update and service the operating system.&lt;/p&gt;
 &lt;p&gt;Instead of releasing a new version of Windows every three to five years, as the company did with past iterations of the OS, Microsoft will continually update &lt;a href="https://www.techtarget.com/searchenterprisedesktop/definition/Windows-10"&gt;Windows 10&lt;/a&gt; and &lt;a href="https://www.techtarget.com/whatis/feature/Windows-11-explained-Everything-you-need-to-know"&gt;Windows 11&lt;/a&gt;. The updates are categorized in two ways: feature updates and quality updates.&lt;/p&gt;
 &lt;p&gt;Feature updates occur about twice a year, roughly scheduled for March and September. They contain new functionalities for the OS. Quality updates are cumulative updates that come out at least once a month and contain security patches and other fixes to make the OS more reliable. Because they are cumulative, the latest update carries all updates that came before it and trumps any previous updates. Each feature update continues to receive quality updates for 18 months after its initial release.&lt;/p&gt;
 &lt;figure class="main-article-image" data-img-fullsize="https://www.techtarget.com/rms/editorial/sED_Introducing-Windows-as-a-Service.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/editorial/sED_Introducing-Windows-as-a-Service_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/editorial/sED_Introducing-Windows-as-a-Service_mobile.png 960w,https://www.techtarget.com/rms/editorial/sED_Introducing-Windows-as-a-Service.png 1280w" alt="Windows as a service explained" data-credit="Microsoft" height="292" width="519"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Windows as a service explained
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="Servicing options for Windows client updates"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Servicing options for Windows client updates&lt;/h2&gt;
 &lt;p&gt;IT professionals can use the three servicing channels within Windows as a service to create deployment groups with different users or devices that they deliver the updates to at different cadences. The three servicing channels are as follows:&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Windows Insider Program. &lt;/b&gt;Members of the Windows Insider Program get access to whatever updates are coming as soon as they are available during Microsoft's development process. This allows IT to work with the updates and test compatibility before the update goes out to an organization's users and the general public. In addition, Microsoft encourages members of the Windows Insider Program to provide feedback on any issues they encounter. The gestation period for updates is about four months, but it depends on the feedback Microsoft receives from Insider members. When an update is ready for general use -- meaning customers, &lt;a href="https://www.techtarget.com/searchitchannel/definition/ISV"&gt;independent software vendors&lt;/a&gt; and Microsoft partners consider it functional -- Microsoft declares it to be "ready for broad deployment."&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;General Availability Channel. &lt;/b&gt;With this approach to Windows servicing, feature updates are accessible and deployable on an annual basis rather than immediately after their release. Organizations can still test the updates before pushing them out to an entire organization's Windows environment, but this channel offers less advanced testing opportunity than the Windows Insider Program.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Long-Term Servicing Channel (LTSC). &lt;/b&gt;This channel is designed for specialized devices such as ATMs and other kiosk endpoints where security and stability are paramount and the downtime associated with OS updates is unacceptable. The &lt;a href="https://www.techtarget.com/searchwindowsserver/definition/Microsoft-Windows-Server-LTSC-Long-Term-Servicing-Channel"&gt;LTSC&lt;/a&gt;, available only for the Windows 10 Enterprise Long-Term Servicing Branch edition of the OS, blocks feature updates but allows quality updates to continue. IT can defer the quality updates using Windows Update, Windows Update for Business, WSUS or &lt;a href="https://www.techtarget.com/searchwindowsserver/definition/Microsoft-System-Center-Configuration-Manager-2012"&gt;SCCM&lt;/a&gt;. Updates in the LTSC occur about once every three years, and IT can implement them through in-place upgrades.&lt;/p&gt;
 &lt;div class="youtube-iframe-container"&gt;
  &lt;iframe id="ytplayer-0" src="https://www.youtube.com/embed/1iWD31hOrHQ?autoplay=0&amp;amp;modestbranding=1&amp;amp;rel=0&amp;amp;widget_referrer=null&amp;amp;enablejsapi=1&amp;amp;origin=https://www.techtarget.com" type="text/html" height="360" width="640" frameborder="0"&gt;&lt;/iframe&gt;
 &lt;/div&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="Servicing tools for Windows"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Servicing tools for Windows&lt;/h2&gt;
 &lt;p&gt;IT can use many of the same management tools it used in previous versions of Windows to control updates, including the following:&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Windows Update. &lt;/b&gt;With Windows Update, IT can pick and choose which devices are part of the Semi-Annual Channel and which devices within that channel can defer updates.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Windows Update for Business. &lt;/b&gt;In addition to deciding which devices defer updates, Windows Update for Business allows IT to centrally manage updates through Group Policy. IT can defer updates with Windows Update for Business for up to one full year. Windows Update for Business is also available in the cloud with &lt;a href="https://www.techtarget.com/searchitchannel/definition/Microsoft-Intune"&gt;Microsoft Intune&lt;/a&gt;.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;WSUS. &lt;/b&gt;The deferment options go a step further with WSUS, as IT professionals can approve when the update goes to different specific devices or groups of devices.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;SCCM. &lt;/b&gt;With SCCM, IT can defer and approve updates, as well as target specific devices or groups of devices and manage how much bandwidth the Windows update consumes and when the update runs.&lt;/p&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="Windows as a service in the past"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Windows as a service in the past&lt;/h2&gt;
 &lt;p&gt;Prior to Windows 10, Windows as a service referred to a delivery method for Windows virtual desktops and applications through a cloud service provider.&lt;/p&gt;
 &lt;p&gt;With that model, the service provider managed the back-end responsibilities of data storage, backup, security, patches, and upgrades. It copied the customer's personal data to and from the &lt;a href="https://www.techtarget.com/searchvirtualdesktop/definition/virtual-desktop"&gt;virtual desktop&lt;/a&gt; during logon and logoff. Similar to &lt;a href="https://www.techtarget.com/searchvirtualdesktop/definition/desktop-as-a-service-DaaS"&gt;desktop as a service&lt;/a&gt;, IT purchased Windows as a service on a subscription basis. According to Microsoft's virtualization licensing policy, the end user was required to hold valid license keys for each Microsoft product IT pushed to their virtual desktop.&lt;/p&gt;
&lt;/section&gt;</body>
            <description>Windows as a service is the approach Microsoft introduced with Windows 10 to deploy, update and service the operating system.</description>
            <image>https://cdn.ttgtmedia.com/visuals/digdeeper/1.jpg</image>
            <link>https://www.techtarget.com/searchenterprisedesktop/definition/Windows-as-a-service</link>
            <pubDate>Tue, 18 Jul 2023 12:42:00 GMT</pubDate>
            <title>Windows as a service</title>
        </item>
        <item>
            <body>&lt;h3&gt;What is Citrix Cloud?&lt;/h3&gt; 
&lt;p&gt;Citrix Cloud is a management and delivery platform for IT administrators to design, deploy and manage virtual desktops and applications, and other services, such as file sharing, on any device.&lt;/p&gt; 
&lt;p&gt;IT administrators can use Citrix Cloud -- also known as Citrix cloud services -- to deploy and manage workloads from a &lt;a href="https://www.techtarget.com/searchcloudcomputing/definition/public-cloud"&gt;public cloud&lt;/a&gt;, private cloud, on-premises hardware or a combination of all three. To deliver resources to users, administrators use the Citrix Cloud management console to click on the services they want users to be able to access, and the users receive a link which takes them to Citrix StoreFront, an enterprise app store where users can see all the resources they are allowed to use, including email and third-party apps.&lt;/p&gt; 
&lt;h3&gt;History of Citrix Cloud&lt;/h3&gt; 
&lt;p&gt;Citrix first announced its Citrix Workspace Cloud service in May 2015. It hit the market in August of the same year. Citrix rebranded it as Citrix Cloud in May 2016. Today, Citrix Cloud offers numerous services including DaaS, Citrix Analytics, ITSM Adapter, the &lt;a href="https://www.techtarget.com/searchvirtualdesktop/definition/Citrix-Receiver"&gt;Citrix Workspace app&lt;/a&gt;, Citrix Endpoint Management, Citrix Analytics for Security and Citrix Secure Private Access.&lt;/p&gt; 
&lt;h3&gt;Citrix Cloud's key features&lt;/h3&gt; 
&lt;p&gt;Citrix Cloud provides centralized management for virtual desktops, software and other services based in Citrix's public cloud. It also uses &lt;a href="https://www.techtarget.com/searchsecurity/definition/single-sign-on"&gt;single sign-on (SSO)&lt;/a&gt;.&lt;/p&gt; 
&lt;p&gt;The Citrix Cloud Connector, which ties the platform into Microsoft Active Directory, enables IT admins to configure which users can access which applications and data based on their specific locations.&lt;/p&gt; 
&lt;p&gt;Citrix Cloud also includes Smart Tools, which aims to help with lifecycle management, automated resource deployment and migration to the latest versions of Citrix DaaS. In addition, Smart Tools monitors an organization's virtual app and desktop deployments for problems, and then resolves them when they arise.&lt;/p&gt; 
&lt;div class="youtube-iframe-container"&gt;
 &lt;iframe id="ytplayer-0" src="https://www.youtube.com/embed/X99wIBjVTS0?autoplay=0&amp;amp;modestbranding=1&amp;amp;rel=0&amp;amp;widget_referrer=null&amp;amp;enablejsapi=1&amp;amp;origin=https://www.techtarget.com" type="text/html" height="360" width="640" frameborder="0"&gt;&lt;/iframe&gt;
&lt;/div&gt; 
&lt;h3&gt;Citrix Cloud pricing&lt;/h3&gt; 
&lt;p&gt;Citrix Cloud uses subscription-based pricing through which organizations pay per user, per year. Though there are many ways to bundle different licenses together, there are four main packages for the DaaS cloud services to choose from: Citrix DaaS Standard, Citrix DaaS Advanced Plus, Citrix DaaS Premium and Citrix DaaS Premium Plus.&lt;/p&gt; 
&lt;p&gt;The pricing for these plans reflects access to certain end-user virtual desktop aspects of Citrix Cloud and does not reflect the &lt;a href="https://www.techtarget.com/searchdatacenter/definition/TCO"&gt;total cost of ownership (TCO)&lt;/a&gt;. However, the pricing is $10 per user, per month for the standard plan; $13 per user, per month for the advanced plan, $20 per user, per month for premium and $23 per user, per month for premium plus.&lt;/p&gt; 
&lt;p&gt;Products similar to Citrix Cloud include CloudJumper's Cloud Workspace Management Suite and &lt;a href="https://www.techtarget.com/searchvirtualdesktop/definition/VMware-Workspace-ONE"&gt;VMware Workspace One&lt;/a&gt;.&lt;/p&gt;</body>
            <description>Citrix Cloud is a management and delivery platform for IT administrators to design, deliver and manage virtual desktops and applications and other services, such as file sharing, on any device.</description>
            <image>https://cdn.ttgtmedia.com/visuals/digdeeper/1.jpg</image>
            <link>https://www.techtarget.com/searchvirtualdesktop/definition/Citrix-Workspace-Cloud</link>
            <pubDate>Thu, 06 Jul 2023 14:49:00 GMT</pubDate>
            <title>Citrix Cloud</title>
        </item>
        <item>
            <body>&lt;p&gt;As an IT professional, Microsoft licensing rules can be the bane of your existence if you're using RDS, so it's important to get your licenses and policies straight.&lt;/p&gt; 
&lt;p&gt;Prior to the release of &lt;a href="https://www.techtarget.com/searchwindowsserver/definition/Microsoft-Windows-Server-OS-operating-system"&gt;Windows Server&lt;/a&gt; 2008 R2 in 2009, if you used Terminal Services -- now &lt;a href="https://www.techtarget.com/searchvirtualdesktop/definition/Remote-Desktop-Services-RDS"&gt;Remote Desktop Services&lt;/a&gt; -- you had to purchase Terminal Services licenses for Windows Terminal Server to meet licensing requirements for remote sessions. Since Microsoft released Windows Server 2008 R2, however, you must comply with an RDS licensing scheme based on the Remote Desktop (RD) Licensing role for Windows Server instead. This remains true through the &lt;a href="https://www.techtarget.com/searchwindowsserver/tip/Compare-the-features-in-the-Windows-Server-2022-editions"&gt;most current preview of Windows Server 2022&lt;/a&gt;.&lt;/p&gt; 
&lt;p&gt;Make sure you understand the requirements of the RD Licensing policy and the various methods to calculate the number of licenses you require to comply with RDS licensing terms and conditions.&lt;/p&gt; 
&lt;h3&gt;What are RDS CALs and who needs to use them?&lt;/h3&gt; 
&lt;p&gt;Each active remote session on a server that supports the RD Session Host (&lt;a href="https://www.techtarget.com/searchvirtualdesktop/definition/Remote-Desktop-Session-Host-RDSH"&gt;RDSH&lt;/a&gt;) services role requires a single RDS Client Access License (&lt;a href="https://www.techtarget.com/searchwindowsserver/definition/Windows-Server-Client-Access-License-CAL"&gt;CAL&lt;/a&gt;). Every prospective user needs a unique CAL to create a working remote session to any targeted RDSH server.&lt;/p&gt; 
&lt;figure class="main-article-image half-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/virtual_desktop-rds_per_device_cals_01.png"&gt;
 &lt;img data-src="https://www.techtarget.com/rms/onlineimages/virtual_desktop-rds_per_device_cals_01_half_column_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/virtual_desktop-rds_per_device_cals_01_half_column_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/virtual_desktop-rds_per_device_cals_01.png 1280w" alt="RDS per-device CALs" data-credit="Microsoft" height="309" width="279"&gt;
 &lt;figcaption&gt;
  &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;How Microsoft Remote Desktop Services per-device Client Access Licenses work
 &lt;/figcaption&gt;
 &lt;div class="main-article-image-enlarge"&gt;
  &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
 &lt;/div&gt;
&lt;/figure&gt; 
&lt;p&gt;RDS CALs must be tracked across an organization's networks through the Windows Server Licensing role. That licensing role keeps track of CALs on a network and won't allow more active sessions at a given time than the total number of CALs under its control. Microsoft Learn offers an excellent tutorial on this &lt;a href="https://learn.microsoft.com/en-us/windows-server/remote/remote-desktop-services/rds-activate-license-server" target="_blank" rel="noopener"&gt;subject&lt;/a&gt;.&lt;/p&gt; 
&lt;p&gt;Any current Windows Server -- namely 2016, 2019 and 2022 -- includes the two server-side building blocks. Administrators need to set up and use RDSH and RD Licensing services.&lt;/p&gt; 
&lt;h3&gt;How does the RDS licensing model work?&lt;/h3&gt; 
&lt;p&gt;There are two major components that come into play with remote desktop access in a &lt;a href="https://www.techtarget.com/searchvirtualdesktop/tip/Clear-the-confusion-around-Microsoft-RDS"&gt;Microsoft RDS deployment&lt;/a&gt; apart from the CALs.&lt;/p&gt; 
&lt;h4&gt;Remote Desktop Session Host&lt;/h4&gt; 
&lt;p&gt;For Windows Server 2008 R2 and later versions, the server role for RDS is called RDSH. For clients to have a remote server with which to establish a session, at least one internet-accessible host on the network must support the RDHS server role.&lt;/p&gt; 
&lt;h4&gt;Licensing server&lt;/h4&gt; 
&lt;p&gt;When it comes to RDS licensing, at least one RD Licensing server must also be available on your network -- usually as part of the domain or domain forest in which the remote users reside. It is possible for a single physical or virtual server to support both the RDSH and the RD Licensing role services -- usually called an RD Licensing server -- in smaller network deployments. On larger, more distributed networks, those roles typically reside on different servers, often in different locations.&lt;/p&gt; 
&lt;h3&gt;Types of RDS CALs: per device vs. per user&lt;/h3&gt; 
&lt;p&gt;While the purpose for all CALs is the same, there are different approaches to these licenses. CALs come in two forms:&lt;/p&gt; 
&lt;ol type="1" start="1" class="default-list"&gt; 
 &lt;li&gt;&lt;b&gt;RDS per-device CALs.&lt;/b&gt; These licenses are associated with a specific device. They are nontransferable to other devices.&lt;/li&gt; 
 &lt;li&gt;&lt;b&gt;RDS per-user CALs.&lt;/b&gt; These licenses are associated with a specific user account. They are nontransferable to other user accounts.&lt;/li&gt; 
&lt;/ol&gt; 
&lt;p&gt;Choosing one type of CAL over another depends on whether users typically initiate remote sessions from the same device or not. If they generally use the same device, then per device probably makes the most sense. On the other hand, if users log in remotely from two or more devices regularly, per-user RDS licensing keeps costs down.&lt;/p&gt; 
&lt;blockquote class="main-article-pullquote"&gt;
 &lt;div class="main-article-pullquote-inner"&gt;
  &lt;figure&gt;
   To determine the exact needs for an organization's CALs, IT teams should calculate the maximum number of simultaneous remote sessions needed.
  &lt;/figure&gt;
  &lt;i class="icon" data-icon="z"&gt;&lt;/i&gt;
 &lt;/div&gt;
&lt;/blockquote&gt; 
&lt;h3&gt;Calculating CAL needs&lt;/h3&gt; 
&lt;p&gt;To determine the exact needs for an organization's CALs, IT teams should calculate the maximum number of simultaneous remote sessions needed. This straightforward number should determine how many CALs are necessary for any RD Licensing server to manage.&lt;/p&gt; 
&lt;p&gt;Microsoft sells its RDS CALs on an individual basis or in license packages of five and 25. The company negotiates some set number of CALs as part of overall volume licensing agreements. Prices for CALs vary from around $120 -- purchased one at a time or in small lots -- down to $100 or so for 25-pack CALs. Organizations with a volume licensing program agreement and business leaders have to negotiate with Microsoft on a case-by-case basis. Generally speaking, negotiating volume pricing beats unit prices for the various RDS CAL bundles available through resellers for one, five, 10 and 25 packs.&lt;/p&gt; 
&lt;div class="youtube-iframe-container"&gt;
 &lt;iframe id="ytplayer-0" src="https://www.youtube.com/embed/Nz9r3HxI8qI?autoplay=0&amp;amp;modestbranding=1&amp;amp;rel=0&amp;amp;widget_referrer=null&amp;amp;enablejsapi=1&amp;amp;origin=https://www.techtarget.com" type="text/html" height="360" width="640" frameborder="0"&gt;&lt;/iframe&gt;
&lt;/div&gt; 
&lt;h3&gt;Tips for implementing RDS licensing&lt;/h3&gt; 
&lt;p&gt;When an IT team sets up one or more Windows 2016, 2019 or 2022 server for the RDSH and RD Licensing services roles, a grace period of 60 days, renewable once for a total of 120 days, applies to the initial usage time frame for client access. During this time, Microsoft does not check CALs. Once that grace period expires, however, some IT administrators report difficulties recognizing their RD Licensing server, which locks remote clients out of remote access.&lt;/p&gt; 
&lt;p&gt;This is a well-known catch that administrators can repair by deleting a specific registry key. Once the admin deletes that key, remote clients can then use the RD Licensing server to access remote desktop sessions using available CALs.&lt;/p&gt; 
&lt;p&gt;RDS also supports &lt;a href="https://www.techtarget.com/searchvirtualdesktop/definition/virtual-desktop-infrastructure-VDI"&gt;VDI&lt;/a&gt; deployments. In a VDI deployment, every device that connects to RDS must have its own RDS CAL and access to a license server, as with any remote desktop access. In addition, organizations must either be covered by Windows Client Software Assurance or a license for Windows Virtual Desktop Access to use remote desktop on a VDI desktop.&lt;/p&gt;</body>
            <description>IT teams rely on CALs to ensure that RDS users are properly licensed for their sessions, so they should know how to work with them and what different options they present.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/container_g1128254725.jpg</image>
            <link>https://www.techtarget.com/searchvirtualdesktop/tip/Remote-Desktop-Services-licensing-rules-and-recommendations</link>
            <pubDate>Thu, 11 May 2023 09:00:00 GMT</pubDate>
            <title>What are RDS CALs and how should IT use them?</title>
        </item>
        <item>
            <body>&lt;h3&gt;What is a terminal server?&lt;/h3&gt; 
&lt;p&gt;A terminal server, also known as a communication server, is a hardware device or &lt;a href="https://www.techtarget.com/whatis/definition/server"&gt;server&lt;/a&gt; that provides terminals -- such as PCs, printers and other devices -- with a common connection point to a local or wide area network (&lt;a href="https://www.techtarget.com/searchnetworking/definition/WAN-wide-area-network"&gt;WAN&lt;/a&gt;). The terminals connect to the terminal server from their &lt;a href="https://www.techtarget.com/searchnetworking/definition/RS-232C"&gt;RS-232C&lt;/a&gt; or RS-423 serial &lt;a href="https://www.techtarget.com/searchnetworking/definition/port"&gt;port&lt;/a&gt;. The other side of the terminal server connects through network interface cards (&lt;a href="https://www.techtarget.com/searchnetworking/definition/network-interface-card"&gt;NICs&lt;/a&gt;) to a local area network (&lt;a href="https://www.techtarget.com/searchnetworking/definition/local-area-network-LAN"&gt;LAN&lt;/a&gt;), usually an &lt;a href="https://www.techtarget.com/searchnetworking/definition/Ethernet"&gt;Ethernet&lt;/a&gt; or &lt;a href="https://www.techtarget.com/searchnetworking/definition/Token-Ring"&gt;token ring&lt;/a&gt; LAN, through modems to the dial-in/out WAN, or to an X.25 network or a 3270 gateway. Different makes of terminal servers offer different kinds of interconnection. Some can be ordered in different configurations based on customer needs.&lt;/p&gt; 
&lt;p&gt;The use of a terminal server means that each terminal doesn't need its own NIC or modem. The connection resources inside the terminal server are usually shared dynamically by all attached terminals.&lt;/p&gt; 
&lt;p&gt;Some terminal servers can be shared by hundreds of terminals. The terminals can be PCs, terminals that emulate 3270s, printers, or other devices with the RS-232/423 interface. Terminals can use &lt;a href="https://www.techtarget.com/searchnetworking/definition/TCP-IP"&gt;TCP/IP&lt;/a&gt; for a &lt;a href="https://www.techtarget.com/searchnetworking/definition/Telnet"&gt;Telnet&lt;/a&gt; connection to a host, LAT to a Digital Equipment Corporation (DEC) host, or TN3270 for a Telnet connection to an &lt;a href="https://www.techtarget.com/searchitchannel/definition/IBM-International-Business-Machines"&gt;IBM&lt;/a&gt; host with 3270 applications. With some terminal servers, a given terminal user can have multiple host connections to different kinds of &lt;a href="https://www.techtarget.com/searchvmware/definition/host-operating-system"&gt;host operating systems&lt;/a&gt;, such as UNIX, IBM and DEC.&lt;/p&gt; 
&lt;p&gt;Although the concept of a terminal has its origins in the mainframe world, the &lt;a href="https://www.techtarget.com/searchwindowsserver/definition/Microsoft-Windows-Server-OS-operating-system"&gt;Windows Server operating system&lt;/a&gt; has long had the ability to act as a terminal server.&lt;/p&gt; 
&lt;h3&gt;How a terminal server works&lt;/h3&gt; 
&lt;p&gt;The way that a terminal server works tends to vary from one vendor to the next. In the case of a Windows terminal server, the Windows operating system is configured to support multiple user sessions. This is different from other multi-session environments such as a Windows file server because the operating system renders a &lt;a href="https://www.techtarget.com/searchapparchitecture/definition/user-interface-UI"&gt;user interface&lt;/a&gt; for each of the sessions.&lt;/p&gt; 
&lt;p&gt;End users connect to a terminal server by using a remote desktop protocol (&lt;a href="https://www.techtarget.com/searchenterprisedesktop/definition/Remote-Desktop-Protocol-RDP"&gt;RDP&lt;/a&gt;) client -- a desktop or mobile application whose job it is to connect to the terminal server -- and display the session’s contents. The RDP client communicates with the terminal server through a connection port. A session manager component keeps all user sessions separate, and also handles tasks such as allowing a user to reconnect to their session after accidentally closing the RDP client. The sessions actually run as a part of the terminal server utility, but the session manager is responsible for managing those sessions.&lt;/p&gt; 
&lt;p&gt;When a user needs to interact with a session through keyboard, mouse or touch inputs, those inputs are made within the RDP client. The RDP client then transmits the inputs to the terminal server for processing. The terminal server is also responsible for performing all graphical rendering, although it is the RDP client that actually makes the session visible to the user.&lt;/p&gt; 
&lt;h3&gt;Terminal server vs. remote desktop&lt;/h3&gt; 
&lt;p&gt;A terminal server and a &lt;a href="https://www.techtarget.com/searchenterprisedesktop/definition/remote-desktop"&gt;remote desktop&lt;/a&gt; both serve a similar purpose. They allow a user to interact with a remote session through an RDP client. The main difference is that terminal servers run on a Windows Server, and the user is therefore provided with a Windows Server desktop. Conversely, remote desktop environments typically have desktop operating systems such as &lt;a href="https://www.techtarget.com/searchenterprisedesktop/definition/Windows-10"&gt;Windows 10&lt;/a&gt; running within &lt;a href="https://www.techtarget.com/searchitoperations/definition/host-virtual-machine-host-VM"&gt;virtual machines&lt;/a&gt;. As such, the user is provided with a true desktop operating system, rather than a session running on a server.&lt;/p&gt;</body>
            <description>A terminal server, also known as a communication server, is a hardware device or server that provides terminals -- such as PCs, printers and other devices -- with a common connection point to a local or wide area network (WAN).</description>
            <image>https://cdn.ttgtmedia.com/visuals/digdeeper/3.jpg</image>
            <link>https://www.techtarget.com/searchvirtualdesktop/definition/terminal-server</link>
            <pubDate>Thu, 11 May 2023 00:00:00 GMT</pubDate>
            <title>terminal server</title>
        </item>
        <item>
            <body>&lt;h3&gt;What is USB redirection?&lt;/h3&gt; 
&lt;p&gt;USB redirection is a technology that enables an end user to plug an external device into a USB port on their endpoint and access the device from within a remote desktop or application.&lt;/p&gt; 
&lt;p&gt;The redirection process involves forwarding the USB device's functionality from a local device to a virtual desktop over the network. USB redirection works on both &lt;a href="https://www.techtarget.com/searchnetworking/definition/WAN-wide-area-network"&gt;wide area networks&lt;/a&gt; and &lt;a href="https://www.techtarget.com/searchnetworking/definition/local-area-network-LAN"&gt;local area networks&lt;/a&gt;, but it is often easier over a LAN because LANs usually provide a stronger network connection than WANs.&lt;/p&gt; 
&lt;p&gt;Organizations supporting USB redirection on virtual desktops must use servers that are compatible with the remote display protocol in their virtual desktop infrastructure (&lt;a href="https://www.techtarget.com/searchvirtualdesktop/definition/virtual-desktop-infrastructure-VDI"&gt;VDI&lt;/a&gt;) software. Redirection capabilities also depend on the version of VDI software a company uses.&lt;/p&gt; 
&lt;div class="youtube-iframe-container"&gt;
 &lt;iframe id="ytplayer-0" src="https://www.youtube.com/embed/xt0YqqbvSFQ?autoplay=0&amp;amp;modestbranding=1&amp;amp;rel=0&amp;amp;widget_referrer=null&amp;amp;enablejsapi=1&amp;amp;origin=https://www.techtarget.com" type="text/html" height="360" width="640" frameborder="0"&gt;&lt;/iframe&gt;
&lt;/div&gt; 
&lt;p&gt;Administrators can choose which USB devices they allow users to redirect. Common USB devices that are candidates for redirection include flash and other storage drives, &lt;a href="https://www.techtarget.com/searchsecurity/definition/smart-card"&gt;smart card&lt;/a&gt; devices and printers, as well as audio, video and image devices. Some devices, such as scanners and audio or video devices, require a lot of bandwidth and can increase latency. Some USB redirection tools block certain device types altogether. Other USB devices, such as mice and keyboards, are integrated into the VDI software already.&lt;/p&gt; 
&lt;p&gt;Citrix supports USB redirection through its HDX remote display technologies. VMware uses the Horizon client's command-line interface, and Microsoft can use &lt;a href="https://www.techtarget.com/searchenterprisedesktop/definition/Remote-Desktop-Protocol-RDP"&gt;Remote Desktop Protocol&lt;/a&gt; for USB redirection.&lt;/p&gt;</body>
            <description>USB redirection is a technology that enables an end user to plug an external device into a USB port on their endpoint and access the device from within a remote desktop or application.</description>
            <image>https://cdn.ttgtmedia.com/visuals/digdeeper/3.jpg</image>
            <link>https://www.techtarget.com/searchvirtualdesktop/definition/USB-redirection-Universal-Serial-Bus-redirection</link>
            <pubDate>Tue, 09 May 2023 09:00:00 GMT</pubDate>
            <title>USB redirection</title>
        </item>
        <item>
            <body>&lt;section class="section main-article-chapter" data-menu-title="What is Microsoft App-V?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;What is Microsoft App-V?&lt;/h2&gt;
 &lt;p&gt;Microsoft Application Virtualization (App-V) is an &lt;a href="https://www.techtarget.com/searchvirtualdesktop/definition/app-virtualization"&gt;application virtualization&lt;/a&gt; client that makes an application available to end users without installing it on a personal computer (PC). Instead, Microsoft App-V wraps each application in a virtual layer that sits between the software and the operating system (OS). This lets applications behave as if they're traditionally installed when in fact they're being streamed from a centrally managed service or even from the end user's PC.&lt;/p&gt;
 &lt;p&gt;Businesses and other organizations use App-V to deploy applications at scale to employees regardless of the location, type or &lt;a href="https://www.techtarget.com/whatis/definition/compatibility"&gt;compatibility&lt;/a&gt; of the client machines. IT also uses App-V to control user access to applications, ensuring only authorized users have access to certain applications.&lt;/p&gt;
 &lt;p&gt;App-V was first launched in 2006. It will reach its end of life in April 2026 &lt;a href="https://learn.microsoft.com/en-us/windows/application-management/app-v/appv-for-windows" target="_blank" rel="noopener"&gt;according to Microsoft&lt;/a&gt;. The company recommends users switch to Azure Virtual Desktop with MSIX app attach, which provides a &lt;a href="https://www.techtarget.com/searchvirtualdesktop/tip/Comparing-Windows-365-vs-Azure-Virtual-Desktop"&gt;virtual desktop service similar to Windows 365&lt;/a&gt;.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/key_windows_365_and_azure_virtual_desktop_features-f.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/key_windows_365_and_azure_virtual_desktop_features-f_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/key_windows_365_and_azure_virtual_desktop_features-f_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/key_windows_365_and_azure_virtual_desktop_features-f.png 1280w" alt="Windows 365 vs. Azure Virtual Desktop comparison list." height="430" width="560"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Windows 365 and Azure Virtual Desktop offer similar services.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="How does App-V work?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;How does App-V work?&lt;/h2&gt;
 &lt;p&gt;Microsoft App-V &lt;a href="https://www.techtarget.com/searchvirtualdesktop/answer/How-does-a-Microsoft-App-V-client-based-application-work"&gt;creates a virtual environment&lt;/a&gt;, called a &lt;i&gt;bubble&lt;/i&gt;, for each application deployed by an organization. This virtual layer is wrapped around the software and isolates it from other applications and the OS. It also includes files, settings and other registry entries required to run the application.&lt;/p&gt;
 &lt;p&gt;The virtual environment is created on the client machine every time an App-V-enabled application is launched. App-V intercepts and redirects all files and registry requests the application makes to a virtual copy stored in the virtual environment. This lets applications run as if installed locally and enables IT to easily manage and update the virtual environment without affecting a user's personal device.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/how_microsoft_app_v_works-f.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/how_microsoft_app_v_works-f_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/how_microsoft_app_v_works-f_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/how_microsoft_app_v_works-f.png 1280w" alt="Diagram of how Microsoft App-V works" height="269" width="560"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;App-V works by creating a virtual bubble around the application, sitting between it and the operating system.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;h3&gt;App-V components&lt;/h3&gt;
 &lt;p&gt;Microsoft App-V includes the following components that are critical to its functioning:&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;App-V Sequencer.&lt;/b&gt; The application virtualization process starts packaging the application into a self-contained environment that runs on the client computer. App-V Sequencer handles this process. It's a wizard-based tool that builds App-V packages, providing all executable components such as sequenced app files, data files, Windows installer files, registry settings and an array of &lt;a href="https://www.techtarget.com/whatis/definition/XML-Extensible-Markup-Language"&gt;extensible markup language&lt;/a&gt; files.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;App-V Desktop Client. &lt;/b&gt;The Microsoft App-V Desktop Client executes the applications. It resides on the end user's device, and it retrieves and publishes the virtual applications. It also tracks and saves file alterations and custom settings of the published applications.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;App-V Management Server. &lt;/b&gt;This server centrally delivers and manages applications that the App-V Desktop Client and the Remote Desktop Services Client use. It tracks users and their application in real time through &lt;a href="https://www.techtarget.com/searchwindowsserver/definition/Active-Directory"&gt;Active Directory&lt;/a&gt;, and authenticates application requests to secure and control access to these apps.&lt;/p&gt;
 &lt;p&gt;The server uses monitoring and metering to track data use. It allows IT to assign application permissions and deliver or remove virtualized applications through a management console. A lightweight version of the App-V server, called the System Center App-V Streaming Server, is also available.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;App-V Reporting Server. &lt;/b&gt;This App-V server creates and stores reports that show how end users use their virtual applications and application packages.&lt;/p&gt;
 &lt;div class="youtube-iframe-container"&gt;
  &lt;iframe id="ytplayer-0" src="https://www.youtube.com/embed/8Cu2c_nLOxA?autoplay=0&amp;amp;modestbranding=1&amp;amp;rel=0&amp;amp;widget_referrer=null&amp;amp;enablejsapi=1&amp;amp;origin=https://www.techtarget.com" type="text/html" height="360" width="640" frameborder="0"&gt;&lt;/iframe&gt;
 &lt;/div&gt;
&lt;/section&gt;            
&lt;section class="section main-article-chapter" data-menu-title="Benefits of App-V"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Benefits of App-V&lt;/h2&gt;
 &lt;p&gt;Microsoft App-V provides IT groups with a lot of time-saving features and flexibility. The following are some of the benefits to using App-V's virtualization software:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Application compatibility and functionality are improved, enabling older applications to run on modern OSes.&lt;/li&gt; 
  &lt;li&gt;There is less application conflict and improved &lt;a href="https://www.techtarget.com/searchcio/definition/UX-user-experience"&gt;user experience&lt;/a&gt;.&lt;/li&gt; 
  &lt;li&gt;Software is easier to deliver and uninstall.&lt;/li&gt; 
  &lt;li&gt;Less PC support is required when applications run without making changes to the host computer.&lt;/li&gt; 
  &lt;li&gt;Managing and &lt;a href="https://www.techtarget.com/whatis/definition/troubleshooting"&gt;troubleshooting&lt;/a&gt; applications is easier with centralized control.&lt;/li&gt; 
  &lt;li&gt;Hardware costs might be lower, because App-V lets users run applications without specific hardware requirements.&lt;/li&gt; 
  &lt;li&gt;Client machines have fewer &lt;a href="https://www.techtarget.com/whatis/definition/attack-surface"&gt;attack surfaces&lt;/a&gt; because installed applications run isolated from the OS and other applications.&lt;/li&gt; 
  &lt;li&gt;Zero configuration eliminates a key cause of crashes or "hangs" known as &lt;a href="https://www.techtarget.com/searchenterprisedesktop/tip/How-to-troubleshoot-the-blue-screen-of-death-for-Windows-10"&gt;Windows' blue screen of death&lt;/a&gt;.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="Top commercial applications for App-V"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Top commercial applications for App-V&lt;/h2&gt;
 &lt;p&gt;App-V can virtualize most enterprise applications. Some common commercial applications it's used with include the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Browsers such as &lt;a href="https://www.techtarget.com/searchmobilecomputing/definition/Google-Chrome-browser"&gt;Google Chrome&lt;/a&gt; and &lt;a href="https://www.techtarget.com/whatis/definition/Microsoft-Edge"&gt;Microsoft Edge&lt;/a&gt;.&lt;/li&gt; 
  &lt;li&gt;Office integrations such as &lt;a href="https://www.techtarget.com/searchenterprisedesktop/definition/Microsoft-Office-365-suite"&gt;Microsoft Office 365&lt;/a&gt;.&lt;/li&gt; 
  &lt;li&gt;Email applications such as &lt;a href="https://www.techtarget.com/searchwindowsserver/definition/Microsoft-Outlook"&gt;Microsoft Outlook&lt;/a&gt;.&lt;/li&gt; 
  &lt;li&gt;Multimedia software such as Adobe products.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;A small number of applications from third-party providers support the use and management of App-V, including the following:&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Advanced Installer&lt;/b&gt; is a Windows software installation and packaging tool that supports virtual apps. It provides support for App-V and &lt;a href="https://www.techtarget.com/searchvmware/definition/VMware"&gt;VMware&lt;/a&gt; ThinApp, and lets users create packages of virtual applications.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Cloudpager&lt;/b&gt; is Numecent's cloud &lt;a href="https://www.techtarget.com/searchitoperations/definition/container-containerization-or-container-based-virtualization"&gt;container&lt;/a&gt; program that runs App-V virtual apps; it will do so even after App-V's end of life, according to Numecent.&lt;/p&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="End of life in 2026"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;End of life in 2026&lt;/h2&gt;
 &lt;p&gt;Microsoft has said App-V's end of life will be in April 2026. It hasn't made significant updates to the program in several years. Instead, Microsoft is focusing on their &lt;a href="https://www.techtarget.com/searchvirtualdesktop/tip/Azure-Virtual-Desktop-requirements-customizations-and-more"&gt;Azure Virtual Desktop program&lt;/a&gt; and MSIX container, and it suggests App-V users switch to these programs by 2026.&lt;/p&gt;
 &lt;p&gt;Azure Virtual Desktop virtualizes entire desktops, letting users run desktops and applications from a remote server or service. MSIX works as an attachment to the Azure Virtual Desktop, using containers to separate user data, OSes and applications. It delivers applications without the need to repackage them.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/virt_desktop-vdi_vs_daas-f.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/virt_desktop-vdi_vs_daas-f_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/virt_desktop-vdi_vs_daas-f_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/virt_desktop-vdi_vs_daas-f.png 1280w" alt="Virtual desktops vs. DaaS comparison list." height="247" width="560"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Virtual desktops are often compared to desktop as a service (DaaS), though they have key differences.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="History of App-V"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;History of App-V&lt;/h2&gt;
 &lt;p&gt;App-V was created by a company named Softricity in 1999 and was originally known as SoftGrid. The founders of Softricity got the idea for app virtualization after working with the Boston Computer Museum. Museum visitors would play games on the museum's computers and end up altering the OS's configurations. Softricity created SoftGrid to isolate the gaming applications from the OS.&lt;/p&gt;
 &lt;p&gt;In 2006, Microsoft acquired Softricity and renamed it SoftGrid App-V like its Hyper-V hardware virtualization tool. App-V has seen several development milestones since then, including the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;2006.&lt;/b&gt; Microsoft buys SoftGrid 3.0.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;2008.&lt;/b&gt; Microsoft releases the beta of App-V version 4.5.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;2012.&lt;/b&gt; App-V 5.0 is released.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;2022.&lt;/b&gt; Microsoft announces App-V is no longer part of the Microsoft Desktop Optimization Pack but is included with Windows 10 for Enterprise and Windows 10 for Education, &lt;a href="https://www.computerweekly.com/news/252508310/What-will-the-2025-end-of-life-mean-for-enterprise-Windows-10"&gt;both of which will reach their end of life in 2025&lt;/a&gt;. Microsoft announces that App-V's end of life will be April 2026 and urges users to switch to Azure Virtual Desktop.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;&lt;i&gt;Microsoft App-V is an application virtualization client. Learn more about the &lt;/i&gt;&lt;a href="https://www.techtarget.com/searchvirtualdesktop/opinion/Analyzing-the-chaos-in-the-desktop-virtualization-market"&gt;&lt;i&gt;market for desktop virtualization&lt;/i&gt;&lt;/a&gt;&lt;i&gt;.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>Microsoft Application Virtualization (App-V) is an application virtualization client that makes an application available to end users without installing it on a personal computer (PC).</description>
            <image>https://cdn.ttgtmedia.com/visuals/digdeeper/4.jpg</image>
            <link>https://www.techtarget.com/searchvirtualdesktop/definition/Microsoft-App-V-Microsoft-Application-Virtualization</link>
            <pubDate>Wed, 12 Apr 2023 14:48:00 GMT</pubDate>
            <title>Microsoft App-V (Microsoft Application Virtualization)</title>
        </item>
        <title>Search Virtual Desktop Resources and Information from TechTarget</title>
        <ttl>60</ttl>
        <webMaster>webmaster@techtarget.com</webMaster>
    </channel>
</rss>
