<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/">
    <channel>
        <copyright>Copyright TechTarget - All rights reserved</copyright>
        <description></description>
        <docs>https://cyber.law.harvard.edu/rss/rss.html</docs>
        <generator>Techtarget Feed Generator</generator>
        <language>en</language>
        <lastBuildDate>Sun, 15 Mar 2026 23:22:04 GMT</lastBuildDate>
        <link>https://www.techtarget.com/searchvirtualdesktop</link>
        <managingEditor>editor@techtarget.com</managingEditor>
        <item>
            <body>&lt;p&gt;Remote desktops can be incredibly flexible and fulfill numerous use cases, but they need all the right settings and configurations to make those use cases work.&lt;/p&gt; 
&lt;p&gt;In today's distributed enterprise, remote desktop protocol (&lt;a href="https://www.techtarget.com/searchenterprisedesktop/definition/Remote-Desktop-Protocol-RDP"&gt;RDP&lt;/a&gt;) remains a foundational technology for delivering secure, scalable access to corporate resources. But as environments grow more complex -- and as attackers increasingly target remote access pathways -- IT leaders must ensure that their RDP configurations are both functional and strategically governed. Misconfigured RDP files, unmanaged endpoints and inconsistent session policies can introduce operational friction and unnecessary risk.&lt;/p&gt; 
&lt;p&gt;To build a resilient, well‑managed RDP strategy, IT administrators should learn all the most common settings for RDP sessions and how to manage the files that control them.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="What are the components of an RDP session?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;What are the components of an RDP session?&lt;/h2&gt;
 &lt;p&gt;Knowing the basics of RDP before editing RDP files for end users is essential for an administrator. A Microsoft remote desktop implementation consists of the following components:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;RD Connection Broker.&lt;/b&gt; This is the load balancer and broker for the environment. The server will check a user's credentials and which remote resources the user has access to. The connection broker &lt;a href="https://www.techtarget.com/searchnetworking/answer/Application-vs-network-load-balancing-Whats-the-difference"&gt;also load balances the sessions&lt;/a&gt; over the available session hosts.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;RD Licensing.&lt;/b&gt; As the name suggests, this is the licensing server for a remote desktop deployment. Each user who signs into the environment needs a valid license to create a session.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;RD Web Access.&lt;/b&gt; This server creates a website -- or web server -- for end users to easily access their remote resources. When an end user clicks on a resource, an RDP file is generated for the user to start.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;RD Gateway.&lt;/b&gt; This server enables a remote desktop session to be started over the internet. It translates RDP to HTTPS.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;RD Session Hosts.&lt;/b&gt; These are the servers that host the resources that end users connect to and start their sessions on.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;RD Virtualization Host.&lt;/b&gt; This is an optional component. &lt;a href="https://www.techtarget.com/searchvirtualdesktop/tip/How-to-enable-and-manage-Windows-11-Hyper-V"&gt;Organizations that use Hyper-V&lt;/a&gt; can choose to set up a VDI with many hosts managed through the RDS console. This function is not used often.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="What are the different RDP file settings and what do they do?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;What are the different RDP file settings and what do they do?&lt;/h2&gt;
 &lt;p&gt;With the basics of RDP covered, IT administrators should look at the RDP files. The Remote Desktop Client can open RDP files on a computer through MSTSC.exe, and this is where administrators can see the status of different settings. Another way to look at the files as an administrator is with a text editor. Because an RDP file is a non-encrypted configuration file, administrators can easily edit it with text editors. Notepad++ has many extra features like line numbers and easy selections.&lt;/p&gt;
 &lt;p&gt;Figure 1 shows an example of a basic RDP file for a local session to a server named test in Notepad++. Administrators can edit this file, save it and distribute it to the clients.&lt;/p&gt;
 &lt;figure class="main-article-image half-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/understand_rdp_file_settings-h.jpg"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/understand_rdp_file_settings-h_half_column_mobile.jpg" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/understand_rdp_file_settings-h_half_column_mobile.jpg 960w,https://www.techtarget.com/rms/onlineimages/understand_rdp_file_settings-h.jpg 1280w" alt="A screenshot of the RDP files within a text editor and their various settings. " data-credit="Chris Twiest" height="603" width="280"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Figure 1. The settings for an RDP file that define the session and how it functions. 
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;p&gt;As an administrator, it's important to know what most of these options mean for end users, especially if these settings go to users' Microsoft-managed endpoints.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;screen mode.&lt;/b&gt; Determines whether the session starts in a window (1) or full screen (2).&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;use multimon.&lt;/b&gt; &amp;nbsp;Enables the remote session to use multiple monitors.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;desktopwidth.&lt;/b&gt; Specifies the &lt;a href="https://www.techtarget.com/searchvirtualdesktop/tutorial/How-to-get-the-right-Hyper-V-window-size-in-Windows-11"&gt;session's width&lt;/a&gt; in pixels.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;desktopheight.&lt;/b&gt; Specifies the session's height in pixels. &amp;nbsp;&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;session bpp.&lt;/b&gt; Determines the color depth of the session.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;winposstr.&lt;/b&gt; Sets the start position of the Remote Desktop Connection window.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;compression.&lt;/b&gt; Enables or disables bulk compression for data transmission to the local device.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;keyboardhook.&lt;/b&gt; With this option, admins can map the Windows and Alt + Tab key combinations to the remote session or keep them locally.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;audiocapturemode.&lt;/b&gt; With this option, admins can enable audio capture -- or microphone -- redirection to the remote session.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;videoplaybackmode.&lt;/b&gt; Determines whether administrators use RDP-efficient multimedia streaming for video playback. This can &lt;a href="https://www.techtarget.com/searchvirtualdesktop/tip/Running-GPU-passthrough-for-a-virtual-desktop-with-Hyper-V"&gt;offload video GPU work&lt;/a&gt; to the local GPU instead of the remote GPU.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;connection type.&lt;/b&gt; Steers the maximum used bandwidth the remote session can use.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;networkautodetect.&lt;/b&gt; With this option, administrators can autodetect network type and settings from the local client.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;bandwidthautodetect.&lt;/b&gt; Enables or disables the autodetection of network bandwidth.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;displayconnectionbar.&lt;/b&gt; With this option, admins can enable or disable the connection bar that they would normally see at the top of the Remote Desktop Session.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;enableworkspacereconnect.&lt;/b&gt; With this option, admins can determine if a Remote Desktop Session should reconnect when it is disconnected.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;disable wallpaper.&lt;/b&gt; Enables administrators to turn off the wallpaper of the remote session, which can improve the session quality.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;allow font smoothing.&lt;/b&gt; Turns on ClearType in the RDP session.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;allow desktop composition.&lt;/b&gt; Determines if the admin can use the modern Windows interface within the remote desktop session.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;disable full window drag.&lt;/b&gt; With this option, admins can disable the content in a window while a user is dragging it, which can improve session performance.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;disable menu anims.&lt;/b&gt; With this option, admins can disable menu animations, which improves session performance.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;disable themes.&lt;/b&gt; Disables Windows Themes in the remote session.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;disable cursor setting.&lt;/b&gt; With this option, admins can disable cursor animations, which will improve session performance.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;bitmapcachepersistenable.&lt;/b&gt; Enables the client device to create a cache of bitmaps that are rendered during the session, improving performance.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;full address.&lt;/b&gt; This is the fully qualified domain name of the server the admin is trying to connect to. In a full remote desktop deployment, this will have the connection broker address, which then load balances the session.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;audiomode.&lt;/b&gt; With this option, admins can disable the local client to play audio from the remote host.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;redirectprinters.&lt;/b&gt; Enables or disables the redirection from local printers to the remote session.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;redirectlocation.&lt;/b&gt; Enables or disables the redirection of the local device's location service to the remote session.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;redirectcomports.&lt;/b&gt; Enables or disables the redirection from local COM ports to the remote session.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;redirectsmartcards.&lt;/b&gt; Enables or disables the redirection from local smart cards to the remote session.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;redirectwebauthn.&lt;/b&gt; Enables or disables the redirection from local web authentication -- such as Windows Hello -- to the remote session.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;redirectclipboard.&lt;/b&gt; Enables or disables clipboard redirection between the local computer and the remote session.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;redirectposdevices.&lt;/b&gt; Enables or disables the redirection from local point-of-service devices to the remote session.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;autoreconnection enabled.&lt;/b&gt; Enables the RDP session to automatically reconnect on a disconnect.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;authentication level.&lt;/b&gt; Determines what happens when authentication to the server fails.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;prompt for credentials.&lt;/b&gt; Enables or disables the prompt for authentication.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;negotiate security layer.&lt;/b&gt; Determines which level of security is negotiated.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;remoteapplicationmode.&lt;/b&gt; Enables RemoteApp mode instead of a desktop.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;alternate shell. &lt;/b&gt;If a RemoteApp is configured, this will launch the application instead of the full Windows shell desktop.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;shell working directory.&lt;/b&gt; Specifies the working directory of the RemoteApp.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;gatewayhostname.&lt;/b&gt; Determines whether a Remote Desktop Gateway is configured in the deployment. &amp;nbsp;&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;gatewayusagemethod.&lt;/b&gt; Determines whether or not the connection uses an RD Gateway.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;gatewaycredentialssource.&lt;/b&gt; Specifies which authentication method is used on the gateway.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;gatewayprofileusagemethod.&lt;/b&gt; Selects whether to use the default RD Gateway profile or the user-specified gateway settings.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;promptcredentialonce.&lt;/b&gt; With this option, administrators can choose to save the user credentials after they have been entered.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;gatewaybrokeringtype.&lt;/b&gt; Determines the type of Gateway server used.&lt;/p&gt;
 &lt;blockquote class="main-article-pullquote"&gt;
  &lt;div class="main-article-pullquote-inner"&gt;
   &lt;figure&gt;
    Ensure your end users never open an unknown RDP file, and never email them an RDP file in the first place.
   &lt;/figure&gt;
   &lt;i class="icon" data-icon="z"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/blockquote&gt;
 &lt;p&gt;&lt;b&gt;use redirection server name.&lt;/b&gt; Enables the use of a redirection server for the RD Gateway.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;rdgiskdcproxy.&lt;/b&gt; Sets the use of a proxy for the user credentials over Kerberos.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;kdcproxyname.&lt;/b&gt; The name of the Kerberos Key Distribution Center proxy server.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;enablerdsaadauth.&lt;/b&gt; Decides whether admins can use Microsoft Entra ID to connect to the remote server.&lt;/p&gt;
 &lt;p&gt;There are a lot of options that remote desktop administrators can preconfigure in an RDP file for end users. A good tip for distributing preconfigured RDP files is to &lt;a href="https://learn.microsoft.com/en-us/azure/storage/blobs/storage-blobs-introduction" target="_blank" rel="noopener"&gt;use&lt;/a&gt; an Azure storage container. Then, use a remediation PowerShell script in Microsoft Intune. This enables central management and a remediation script to check for changes to the RDP files.&lt;/p&gt;
 &lt;p&gt;Lastly, admins need to keep the dangers of RDP files in mind. In October 2024, a Russian cybercrime organization named Midnight Blizzard &lt;a href="https://www.techtarget.com/searchsecurity/news/366614828/Microsoft-warns-of-Midnight-Blizzard-spear-phishing-campaign"&gt;sent emails containing an RDP file&lt;/a&gt;. The file was configured to connect to their server and had all redirection enabled. When someone clicked on the email's file and connected to the remote session, all local drives, clipboard, printers, etc. would connect to the remote session, which the hacker group controlled. That way, it could easily steal information and deploy ransomware. Ensure your end users never open an unknown RDP file, and never email them an RDP file in the first place.&lt;/p&gt;
 &lt;p&gt;RDP offers flexibility and broad compatibility, but only when IT manages its underlying components and configuration files&amp;nbsp;properly. With the right controls in place,&amp;nbsp;IT leaders can treat&amp;nbsp;RDP as a secure, high‑performance access&amp;nbsp;platform that&amp;nbsp;supports modern enterprise requirements.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Editor's note: &lt;/b&gt;&lt;i&gt;This article was updated in March 2026 to improve the reader experience.&lt;/i&gt;&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Chris Twiest works as a technology officer at RawWorks in the Netherlands, focusing on the future Workspace and Cloud technologies for the end user.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>RDP sessions might seem pretty universal, but IT administrators should make sure they're familiar with all the customizations that RDP files support.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/code_g684641103.jpg</image>
            <link>https://www.techtarget.com/searchvirtualdesktop/tip/What-are-RDP-file-settings-and-how-do-they-work</link>
            <pubDate>Mon, 09 Mar 2026 16:44:00 GMT</pubDate>
            <title>What are RDP file settings and how do they work?</title>
        </item>
        <item>
            <body>&lt;p data-end="1184" data-start="1039"&gt;IT teams need to support remote desktop users with whatever peripheral device setup and troubleshooting they need, including multiple monitors.&lt;/p&gt; 
&lt;p data-end="1690" data-start="1191"&gt;Users in the financial sector and healthcare -- among many other industries -- are especially accustomed to multiple monitor configurations, putting pressure on IT to adjust the settings to meet user needs. The challenge is getting remote desktops to detect and interact with local hardware when the desktop isn't running locally.&lt;/p&gt; 
&lt;p data-end="1690" data-start="1191"&gt;When multiple monitors are not detected correctly in a remote desktop session, users may see only a single display, incorrect display resolutions or performance issues.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="Configuring remote desktop sessions with the Windows App"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Configuring remote desktop sessions with the Windows App&lt;/h2&gt;
 &lt;p&gt;Previously, remote desktops were available through the Remote Desktop app in the Microsoft Store. However, in May 2025, the Windows App replaced the Remote Desktop app, and the transition is not yet complete.&lt;/p&gt;
 &lt;p&gt;It's still possible to access a Windows desktop from another Windows computer with the Microsoft Remote Desktop Connection application, MSTSC.exe. For other platforms, such as macOS, accessing a Windows desktop is only possible with the Windows App. Connecting to a desktop in Microsoft Azure also involves using Windows App from a Windows computer.&lt;/p&gt;
 &lt;p&gt;The Windows App is available in the Microsoft Store, Apple App Store and Google Play Store. Additionally, browser access to remote desktops is &lt;a target="_blank" href="https://windows.cloud.microsoft/" rel="noopener"&gt;available&lt;/a&gt; through the Windows Cloud portal.&lt;/p&gt;
 &lt;p&gt;&lt;iframe title="Which remote desktop connections do different platforms support?" aria-label="Table" id="datawrapper-chart-ZpEwV" src="https://datawrapper.dwcdn.net/ZpEwV/1/" scrolling="no" frameborder="0" style="width: 0; min-width: 100% !important; border: none;" height="524" data-external="1"&gt;&lt;/iframe&gt; &lt;script type="text/javascript"&gt;window.addEventListener("message",function(a){if(void 0!==a.data["datawrapper-height"]){var e=document.querySelectorAll("iframe");for(var t in a.data["datawrapper-height"])for(var r,i=0;r=e[i];i++)if(r.contentWindow===a.source){var d=a.data["datawrapper-height"][t]+"px";r.style.height=d}}});&lt;/script&gt; &lt;/p&gt;
 &lt;p&gt;Access to virtual desktops from the Windows App requires a Microsoft work or school account and doesn't work with a personal account.&lt;/p&gt;
 &lt;p&gt;Organizations should consider a phased adoption of the Windows App, balancing legacy RDP support with modern features. This approach maximizes employee productivity, minimizes support overhead and ensures alignment with long-term IT strategy.&lt;/p&gt;
 &lt;h3&gt;Technical considerations for setup&lt;/h3&gt;
 &lt;p&gt;Enabling multiple monitors in Windows App&amp;nbsp;is an option the&amp;nbsp;end user needs to enable&amp;nbsp;on their Windows or Mac device. As an IT administrator, it's not something you can configure on the server side. As such, it might be a good idea to write up a good user instruction manual -- feel free to base it off these instructions.&lt;/p&gt;
 &lt;p&gt;Before IT embarks on this process, it's important to keep the limitations of multiple monitor RDP in mind. While it should be more than enough to have two medium-resolution monitors, RDP supports&amp;nbsp;&lt;a target="_blank" href="https://social.technet.microsoft.com/wiki/contents/articles/31983.remote-desktop-protocol-maximum-supported-resolutions.aspx" rel="noopener"&gt;up to&lt;/a&gt; 16 displays. Administrators can further reduce this limit. RDP users are also limited to a maximum resolution of 8192 x 8192, though this might vary between environments. IT can also&amp;nbsp;&lt;a href="https://www.techtarget.com/searchvirtualdesktop/tip/Fix-Windows-11-remote-desktop-credentials-that-dont-work"&gt;connect through RDP to a virtual desktop&lt;/a&gt;&amp;nbsp;on a virtual server with multiple monitors. This will simply create a virtual desktop on the end user's monitors.&lt;/p&gt;
&lt;/section&gt;          
&lt;section class="section main-article-chapter" data-menu-title="Set up multiple monitors on a remote desktop session"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Set up multiple monitors on a remote desktop session&lt;/h2&gt;
 &lt;p&gt;With the new Windows App, the steps to set up multiple monitors on a remote desktop session are fairly straightforward. However, the process varies depending on the OS in use.&lt;/p&gt;
 &lt;p&gt;In enterprise environments, Windows or macOS are the typical platforms for multi-monitor remote desktop configurations.&lt;/p&gt;
 &lt;h3&gt;How to set up multiple monitors for remote desktop use on Windows&lt;/h3&gt;
 &lt;p&gt;To enable and customize multiple monitor support for a remote desktop session on a Windows device, use the following steps:&lt;/p&gt;
 &lt;ol type="1" start="1" class="default-list"&gt; 
  &lt;li&gt;From the&amp;nbsp;Windows App, select&amp;nbsp;&lt;b&gt;Devices&lt;/b&gt;, then find the device you want to configure the display settings for.&lt;/li&gt; 
  &lt;li&gt;Select the three dots on the panel representing the device, then click on&amp;nbsp;&lt;b&gt;Settings&lt;/b&gt;.&lt;/li&gt; 
  &lt;li&gt;Toggle&amp;nbsp;off the &lt;b&gt;Use default settings&lt;/b&gt;&amp;nbsp;switch.&lt;/li&gt; 
  &lt;li&gt;Under&amp;nbsp;&lt;b&gt;Display Settings&lt;/b&gt;, select one of the following options:&lt;/li&gt; 
  &lt;ul type="disc" class="default-list"&gt; 
   &lt;li&gt;&lt;b&gt;All displays.&lt;/b&gt; This setting automatically uses all displays for the device.&lt;/li&gt; 
   &lt;li&gt;&lt;b&gt;Single display.&lt;/b&gt; With this setting, you choose one display to use.&lt;/li&gt; 
   &lt;li&gt;&lt;b&gt;Select displays.&lt;/b&gt; With this setting, you select two or more specific displays to use.&lt;/li&gt; 
  &lt;/ul&gt; 
 &lt;/ol&gt;
 &lt;p&gt;Additionally, Windows continues to support several traditional and advanced Remote Desktop Connection methods. These can be helpful in environments that use legacy tools, scripting or specialized configurations.&lt;/p&gt;
 &lt;p&gt;The first option is to use the traditional Remote Desktop Connection client. Click on the search bar on the Start menu and type in &lt;em&gt;mstsc /multimon&lt;/em&gt;. This will start up the RDP client in a multi-monitor configuration. From here, you can enter the server address, and &lt;a href="https://www.techtarget.com/searchvirtualdesktop/tip/Top-5-remote-desktop-connectivity-problems-and-how-to-prevent-them"&gt;it will automatically connect to the server&lt;/a&gt;&amp;nbsp;full screen on all your monitors.&lt;/p&gt;
 &lt;figure class="main-article-image half-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/configure_multiple_monitors_1-h.jpg"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/configure_multiple_monitors_1-h_half_column_mobile.jpg" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/configure_multiple_monitors_1-h_half_column_mobile.jpg 960w,https://www.techtarget.com/rms/onlineimages/configure_multiple_monitors_1-h.jpg 1280w" alt="Screenshot of the display setting of the Remote Desktop Connection agent." data-credit="Chris Twiest" height="327" width="280"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Figure 1. The Remote Desktop Connection agent, showing the option to use all monitors checked off.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;p&gt;The legacy RDP client also enables multi-monitor support through the UI. Launch the Remote Desktop Connection agent the usual way from the start menu. Then, go to the&amp;nbsp;&lt;b&gt;Display&lt;/b&gt;&amp;nbsp;tab and select&amp;nbsp;&lt;b&gt;Use all my monitors for the remote session &lt;/b&gt;(Figure 1).&lt;/p&gt;
 &lt;p&gt;The last legacy option is to edit the RDP file directly. This approach is more advanced.&lt;/p&gt;
 &lt;p&gt;You can save the connection setting of the RDP session in the general tab of the RDP client. These settings will then be saved in an RDP file. You can edit this file within the client, or simply with the Notepad app.&lt;/p&gt;
 &lt;p&gt;After opening the RDP file in Notepad, you can change multiple options. But the one that configures multiple monitors is called&amp;nbsp;&lt;b&gt;use multimon:i:1&lt;/b&gt;. The number 1 means the option is enabled, and 0 means the option is not enabled.&lt;/p&gt;
 &lt;h3&gt;How to set up multiple monitors for remote desktop use on macOS&lt;/h3&gt;
 &lt;p&gt;To configure multiple monitor support for a remote desktop session on a macOS device, use the following steps:&lt;/p&gt;
 &lt;ol type="1" start="1" class="default-list"&gt; 
  &lt;li&gt;From the&amp;nbsp;Windows App, select&amp;nbsp;&lt;b&gt;Devices&lt;/b&gt;, then find the device you want to configure the display settings for.&lt;/li&gt; 
  &lt;li&gt;Select the&amp;nbsp;pencil icon on the panel representing the device.&lt;/li&gt; 
  &lt;li&gt;Check the box next to&amp;nbsp;&lt;b&gt;Use customized settings&lt;/b&gt;.&lt;/li&gt; 
  &lt;li&gt;On the&amp;nbsp;&lt;b&gt;Display&lt;/b&gt;&amp;nbsp;tab, select the &lt;b&gt;Use all monitors&lt;/b&gt; option (Figure 2).&lt;/li&gt; 
 &lt;/ol&gt;
 &lt;figure class="main-article-image half-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/multiple_monitors_rd_1-h.jpg"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/multiple_monitors_rd_1-h_half_column_mobile.jpg" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/multiple_monitors_rd_1-h_half_column_mobile.jpg 960w,https://www.techtarget.com/rms/onlineimages/multiple_monitors_rd_1-h.jpg 1280w" alt="The macOS remote desktop display settings in the Windows App." data-credit="Rob Bastiaansen" height="248" width="280"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Figure 2. The macOS remote desktop display settings.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;p&gt;Multiple monitors in the macOS Windows App is an all-or-nothing selection. In comparison to Windows, where users can choose which monitors to use, on macOS, users can only choose to use one or all monitors.&lt;/p&gt;
 &lt;p&gt;The 'select displays' feature was available in the Remote Desktop app on macOS. If this option is important for your users, then it's better not to update the app unless Microsoft eventually brings back the feature.&lt;/p&gt;
 &lt;p&gt;To manually enable multi-monitor mode in macOS, edit the RDP file with Text Editor in the same way as editing the RDP file on Windows.&amp;nbsp;&lt;a href="https://www.techtarget.com/searchenterprisedesktop/tip/Set-up-Windows-Remote-Desktop-on-a-Mac-device"&gt;For macOS, the same setting for multiple monitor support&lt;/a&gt;&amp;nbsp;is called&amp;nbsp;&lt;b&gt;usemultimon:i:1&lt;/b&gt;, where 1 means enabled and 0 means disabled.&lt;/p&gt;
&lt;/section&gt;                    
&lt;section class="section main-article-chapter" data-menu-title="Ensuring positive UX on multi-monitor RDP sessions"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Ensuring positive UX on multi-monitor RDP sessions&lt;/h2&gt;
 &lt;p&gt;Enabling multi-monitor access on a remote desktop is the first and most essential step to providing good UX, but IT teams need to account for several other factors.&lt;/p&gt;
 &lt;h3&gt;Using published applications on multiple monitors&lt;/h3&gt;
 &lt;p&gt;Published applications are apps that are loaded from an RDP session, but instead of showing the full remote desktop, the end user can only see the image of the chosen app. This should automatically work on multiple monitor setups. In addition, the end user can drag and drop the application screen to any connected monitor they want.&lt;/p&gt;
 &lt;p&gt;Using published apps also gives more freedom of use on the end user's device because it will appear that the remote applications are running exactly the same as any local applications. This makes switching between these apps feel natural and normal. It's an excellent alternative for users who only need hosted applications and can run a native desktop for work. The method is especially helpful if the end user connects from a capable&amp;nbsp;&lt;a target="_blank" href="https://www.techtarget.com/searchenterprisedesktop/opinion/Windows-apps-are-here-to-stay-and-thats-OK" rel="noopener"&gt;Windows device that also hosts local applications&lt;/a&gt;.&lt;/p&gt;
 &lt;h3&gt;The 'use selected monitors' option for legacy systems&lt;/h3&gt;
 &lt;p&gt;In legacy RDP clients, sessions automatically detect and use all monitors. However, this might not be the best user experience in certain situations. Consider an example where you have three monitors and want to use local apps on monitor one and use monitors two and three for an RDP session.&lt;/p&gt;
 &lt;p&gt;For computers still running the legacy Remote Desktop app, the 'use selected monitors' option can configure this setup. This option doesn't apply to the Windows App and only works in legacy RDP clients.&lt;/p&gt;
 &lt;p&gt;&lt;a href="https://www.techtarget.com/searchvirtualdesktop/tip/How-to-access-and-interact-with-the-RDP-Task-Manager"&gt;Running the command MSTSC /L&lt;/a&gt;&amp;nbsp;will output the available monitors on the system and show the monitor IDs. In this example, the monitor hosting local apps has ID 0, and the other two monitors have ID 1 and 2. With this information, you can edit the RDP file by adding the&amp;nbsp;&lt;b&gt;selectedmonitors:s:&lt;/b&gt;&amp;nbsp;option. The correct configuration in this example would be&amp;nbsp;&lt;b&gt;selectedmonitors:s:1,2&lt;/b&gt;&amp;nbsp;together with&amp;nbsp;&lt;b&gt;use multimon:i:1&lt;/b&gt;.&lt;/p&gt;
 &lt;blockquote class="main-article-pullquote"&gt;
  &lt;div class="main-article-pullquote-inner"&gt;
   &lt;figure&gt;
    The challenge is getting remote desktops to detect and interact with local hardware when the desktop isn't running locally.
   &lt;/figure&gt;
   &lt;i class="icon" data-icon="z"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/blockquote&gt;
&lt;/section&gt;          
&lt;section class="section main-article-chapter" data-menu-title="Troubleshooting multi-monitor remote desktop performance issues"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Troubleshooting multi-monitor remote desktop performance issues&lt;/h2&gt;
 &lt;p&gt;When using multiple monitors for a remote desktop, performance issues can occur. Users might experience slow screen refresh rates, distorted images or video frame drops, for example. In some cases, a user might not be able to connect to a second monitor in the first place. All these issues can hinder user productivity and increase help desk requests.&lt;/p&gt;
 &lt;p&gt;For any problems with multiple monitor remote desktop setups, IT can try a few key troubleshooting steps.&lt;/p&gt;
 &lt;h3&gt;Check for human error&lt;/h3&gt;
 &lt;p&gt;Make sure the Windows App is configured to show the remote desktop on multiple monitors. The user might say they enabled it, but you should look for yourself to confirm they haven't missed something.&lt;/p&gt;
 &lt;h3&gt;Make sure all monitors are working properly with the local OS&lt;/h3&gt;
 &lt;p&gt;If the local setting is to mirror the displays, then both monitors should show the same remote desktop screen. Instead, you can configure the monitors to extend the desktop to the additional displays.&lt;/p&gt;
 &lt;h3&gt;Make sure the remote computer supports multiple monitors&lt;/h3&gt;
 &lt;p&gt;When connecting to a computer running Windows Home, only a single monitor is supported. For multiple monitor support, the computer needs to be running Windows Pro, Enterprise or Windows Server.&lt;/p&gt;
 &lt;p&gt;In general, admins should ensure all remote desktops are configured on supported systems. This minimizes operational risk and prevents &lt;a href="https://www.techtarget.com/searchcio/tip/6-dangers-of-shadow-IT-and-how-to-avoid-them"&gt;workarounds that could compromise compliance&lt;/a&gt; in regulated industries.&lt;/p&gt;
 &lt;h3&gt;Verify the screen resolution&lt;/h3&gt;
 &lt;p&gt;Another possible fix is to check the screen resolution. Selecting a resolution that's too high in multiple monitors might exceed the maximum total resolution for all combined displays.&lt;/p&gt;
 &lt;h3&gt;Check the available bandwidth&lt;/h3&gt;
 &lt;p&gt;When all monitors are in use and the UX isn't optimal, find out the available bandwidth. The combined resolution might be too high for the network connection.&lt;/p&gt;
 &lt;p&gt;IT decision-makers should also note that high-resolution multi-monitor setups can increase network load, which might require &lt;a href="https://www.techtarget.com/searchnetworking/feature/Top-ten-ways-to-optimize-network-performance"&gt;bandwidth investments&lt;/a&gt; to maintain consistent performance.&lt;/p&gt;
 &lt;h3&gt;Access the remote desktop from another client&lt;/h3&gt;
 &lt;p&gt;To verify whether the problem is within the remote desktop or within the client, access the remote desktop from another client. If another client does work with multiple monitors, the remote desktop is the most likely source of the problem.&lt;/p&gt;
 &lt;p&gt;If none of these steps solves the issue, restart the remote desktop and try reconnecting. If that doesn't work, try the same process with the client computer.&lt;/p&gt;
 &lt;p&gt;IT can also check the log files for any indication of the possible source of a multi-monitor RDP problem. Logging is enabled by default for the Windows App. On Windows, the logs are located in %temp%\DiagOutputDir\Windows365\Logs.&lt;/p&gt;
 &lt;p&gt;On macOS, you can access the log location from the Windows App menu under Help &amp;gt; Troubleshooting &amp;gt; Logging. In the dialog, you can configure the logging level and open the logs folder.&amp;nbsp;&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Editor's note:&lt;/b&gt;&amp;nbsp;&lt;i&gt;This article was originally written by Chris Twiest in June 2023. Rob Bastiaansen updated this article to reflect changes in Microsoft's remote desktop options and troubleshooting steps.&lt;/i&gt;&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Chris Twiest works as a technology officer at RawWorks in the Netherlands, focusing on the future Workspace and Cloud technologies for the end user.&lt;/i&gt;&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Rob Bastiaansen is an independent trainer and consultant based in the Netherlands specializing in VMware and Linux. He writes articles for several print and online publications, and is founder of VMwarebits.com, a site dedicated to technical content related to VMware.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>Learn how to set up multiple monitors for remote desktop sessions across Windows App, macOS and legacy RDP clients, plus tips for troubleshooting performance issues.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/security_a254815015.jpg</image>
            <link>https://www.techtarget.com/searchvirtualdesktop/tip/How-to-configure-multiple-monitors-for-remote-desktop-use</link>
            <pubDate>Fri, 06 Mar 2026 12:11:00 GMT</pubDate>
            <title>How to configure multiple monitors for remote desktop use</title>
        </item>
        <item>
            <body>&lt;p&gt;Deploying local desktops may seem simpler, but organizations shouldn't overlook the benefits of desktop virtualization.&lt;/p&gt; 
&lt;p&gt;Desktop virtualization has become a key strategy for organizations that support hybrid work, bring-your-own-device programs and centralized endpoint management. Instead of managing software and operating systems across hundreds or thousands of individual devices, IT teams can deliver desktop environments from centralized infrastructure or cloud platforms.&lt;/p&gt; 
&lt;p&gt;IT teams can deliver virtual desktops in several ways, each with a different hosting model:&lt;/p&gt; 
&lt;ul class="default-list"&gt; 
 &lt;li&gt;&lt;strong data-end="1294" data-start="1253"&gt;Virtual desktop infrastructure (VDI).&lt;/strong&gt; Organizations host virtual desktops on infrastructure they manage internally.&lt;/li&gt; 
 &lt;li&gt;&lt;strong data-end="1548" data-start="1516"&gt;Desktop as a service (DaaS).&lt;/strong&gt; A third-party provider hosts the virtual desktops, sometimes managing infrastructure and updates.&lt;/li&gt; 
 &lt;li&gt;&lt;strong data-end="1831" data-start="1797"&gt;Hybrid desktop virtualization.&lt;/strong&gt; Organizations combine elements of VDI and DaaS, hosting some components internally while outsourcing others.&lt;/li&gt; 
 &lt;li&gt;&lt;strong data-end="2137" data-start="2118"&gt;Remote desktop.&lt;/strong&gt; Users connect remotely to an existing desktop operating system running on another endpoint.&lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;Regardless of how organizations deliver virtual desktops, several key benefits apply across most virtualization approaches. IT departments and executives who create plans for end-user computing should familiarize themselves with the benefits of desktop virtualization and how to make the most of them.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="1. Centralized management"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;1. Centralized management&lt;/h2&gt;
 &lt;p&gt;The most well-known benefit of desktop virtualization is that all desktop management occurs from a central location. Some organizations require users to restart laptops over a few weeks to apply a key update, download a new bit of software or add a new desktop configuration.&lt;/p&gt;
 &lt;p&gt;With virtual desktops, there is no such downtime. The end users don't have access to their desktops until they connect to the virtual desktop host, so any updates or software changes can happen during downtime. Often, IT teams push out these updates when the fewest employees are working, such as overnight or during the weekend.&lt;/p&gt;
 &lt;p&gt;For example, if an organization wants to deploy a new video editing application, its IT team needs to deploy that software. Once the users who need the latest software have logged off for the day, IT teams can alter the virtual desktop image for that user group to include the new virtual application. IT admins can get the virtual app up and running in advance and &lt;a href="https://www.techtarget.com/searchenterprisedesktop/feature/How-to-build-a-virtual-lab-with-Hyper-V"&gt;test it in a virtual desktop lab setting before deployment&lt;/a&gt;.&lt;/p&gt;
 &lt;p&gt;This process requires a hard reset of the desktop with laptops or PCs running local desktops. It may also cause compatibility issues for users who don't have the right OS version or have made some alterations to the desktop's base settings. This is not likely to happen with every instance, but there's a reason that IT departments try to test software and updates before deploying them.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/benefits_of_desktop_virtualization-f.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/benefits_of_desktop_virtualization-f_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/benefits_of_desktop_virtualization-f_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/benefits_of_desktop_virtualization-f.png 1280w" alt="Chart highlighting the main benefits of desktop virtualization for businesses." height="198" width="560"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Desktop virtualization provides benefits such as centralized management, improved scalability, hardware cost savings and easier backup and recovery.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="2. Easier to scale and deploy"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;2. Easier to scale and deploy&lt;/h2&gt;
 &lt;p&gt;Deploying a new laptop or PC isn't as difficult as it once was. Zero-touch enrollment is now commonplace for many organizations, and &lt;a href="https://www.techtarget.com/searchvirtualdesktop/opinion/11-more-alternative-desktop-and-app-virtualization-vendors"&gt;numerous service vendors&lt;/a&gt; handle getting properly provisioned devices to end users. And yet, it's still simpler to spin up and deploy virtual desktops to end users.&lt;/p&gt;
 &lt;p&gt;Laptops and PCs with local OSes require someone to load an OS onto the endpoint, connect the user's work accounts, and ensure all required software is present and the desktop is connected to the organization's desktop management platform. For a virtual desktop endpoint, whoever provisions the device only needs to configure the user credentials&amp;nbsp;and ensure it can connect with the desktop virtualization host.&lt;/p&gt;
 &lt;p&gt;Beyond the device itself, organizations don't have to wait for a bulk endpoint seller to get new devices with desktop OSes properly licensed and running on them. Virtual desktop OSes are much easier to create, regardless of what virtualization method an organization is using. If an outside vendor provides these OSes via DaaS, an IT admin has to reach out to the &lt;a href="https://www.techtarget.com/searchvirtualdesktop/tip/Compare-7-desktop-as-a-service-providers"&gt;DaaS provider&lt;/a&gt; and ask to increase their subscription to take on more users. If an organization runs the desktops in its own VDI, IT teams need to make the changes on the back-end servers to ensure they have the capacity for the new virtual desktops.&lt;/p&gt;
 &lt;blockquote class="main-article-pullquote"&gt;
  &lt;div class="main-article-pullquote-inner"&gt;
   &lt;figure&gt;
    The most well-known benefit of desktop virtualization is that all desktop management occurs from a central location.
   &lt;/figure&gt;
   &lt;i class="icon" data-icon="z"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/blockquote&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="3. Cost savings on endpoint hardware"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;3. Cost savings on endpoint hardware&lt;/h2&gt;
 &lt;p&gt;Organizations can also benefit from the cost savings of virtual desktops. A virtual desktop does not require a fully featured endpoint running a locally licensed operating system. Further, &lt;a href="https://www.techtarget.com/searchnetworking/definition/thin-client"&gt;thin clients&lt;/a&gt; can save organizations on hardware costs because these devices are stripped-down endpoints specializing in hosting virtual desktops. They rely mostly on peripheral devices to support user interaction with the virtual desktop and can be incredibly small and cost-effective.&lt;/p&gt;
 &lt;p&gt;Thin clients are much simpler for admins to manage, so they don't have to spend as much time working on them. And calculating labor hours is a key factor in understanding a technology's &lt;a href="https://www.techtarget.com/searchdatacenter/definition/TCO"&gt;total cost of ownership&lt;/a&gt;.&lt;/p&gt;
 &lt;p&gt;Virtual desktops can also &lt;a href="https://www.techtarget.com/searchmobilecomputing/feature/Key-benefits-of-enacting-a-BYOD-policy"&gt;work for BYOD scenarios&lt;/a&gt;, another way organizations can save on hardware. If a user brings their own laptop, there's no need for any hardware purchase.&lt;/p&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="4. Accessible through a browser or desktop"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;4. Accessible through a browser or desktop&lt;/h2&gt;
 &lt;p&gt;Virtual desktops support BYOD scenarios because they can run within an existing laptop's operating system. The virtual desktop can run in a sandbox within the desktop, ensuring that the security of the underlying OS doesn't threaten the work-related desktop session. The reverse side of this is that IT can prevent the proliferation of corporate data with the proper configurations.&lt;/p&gt;
 &lt;p&gt;This doesn't have to be the main virtual desktop workstation for an end user for it to come in handy. A user relies on a thin client while in the office, but on remote days, they could run the virtual desktop within a secure browser on a personal endpoint. This could also help if users need to travel, as it's much more convenient to pack a laptop than a thin client with numerous peripherals.&lt;/p&gt;
 &lt;p&gt;With the proper virtual desktop agent installed on any desktop OS -- or a secure and functioning browser -- end users can access their resources in various ways even if they don't have their usual workplace endpoint.&lt;/p&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="5. IT controls updates and versions of OSes, software and services"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;5. IT controls updates and versions of OSes, software and services&lt;/h2&gt;
 &lt;p&gt;Ensuring that all desktops, applications and services are running their latest versions can bring peace of mind to IT teams. The uniformity of different versions improves the security posture of an organization's users and delivers new quality-of-life updates quickly to facilitate productivity.&lt;/p&gt;
 &lt;p&gt;Consider a situation with a significant vulnerability in a key piece of business software -- or even the desktop OS itself. Once there is a patch from the first-party vendor, IT teams must get it distributed as soon as possible.&lt;/p&gt;
 &lt;p&gt;With a PC or a laptop, IT teams may need users to restart their laptops as soon as possible to&lt;a href="https://www.techtarget.com/searchenterprisedesktop/tip/12-best-patch-management-software-and-tools"&gt; apply critical patches&lt;/a&gt;. However, virtual desktops take that burden away from the user. Instead, IT can apply the patch to the virtual desktops during off-work hours, and the next time users log on to their OS, they have the latest patches and updates.&lt;/p&gt;
 &lt;div class="youtube-iframe-container"&gt;
  &lt;iframe id="ytplayer-0" src="https://www.youtube.com/embed/gctocRTgq-U?autoplay=0&amp;amp;modestbranding=1&amp;amp;rel=0&amp;amp;widget_referrer=null&amp;amp;enablejsapi=1&amp;amp;origin=https://www.techtarget.com" type="text/html" height="360" width="640" frameborder="0"&gt;&lt;/iframe&gt;
 &lt;/div&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="6. Easier backup when major disruptions occur"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;6. Easier backup when major disruptions occur&lt;/h2&gt;
 &lt;p&gt;Desktop virtualization enables IT teams to quickly replicate and recreate desktop environments for end users. The need for quick backup can come into play in various situations, such as disaster recovery for large-scale and technical issues that a single user might be experiencing.&lt;/p&gt;
 &lt;p&gt;If a region's data center has an outage, a backup data center should exist at a separate physical location to help IT teams quickly redistribute the desktops. Organizations with a DaaS subscription should confirm via their &lt;a target="_blank" href="https://learn.microsoft.com/en-us/azure/cloud-adoption-framework/scenarios/wvd/eslz-business-continuity-and-disaster-recovery" rel="noopener"&gt;provider&lt;/a&gt; that they can rely on options like this with the vendor, but this backup option is the industry standard.&lt;/p&gt;
 &lt;p&gt;Things get more complicated regarding VDI backup, as an organization must account for these scenarios with its own data centers and planning. But this shouldn't be a major issue for an organization that is large enough to consider deploying VDI, especially if it's an organization that spans multiple locations across the U.S. or around the world.&lt;/p&gt;
 &lt;p&gt;Consider a scenario where a user has issues with a critical business application or the underlying desktop OS. With a PC or laptop, that user would have to reach out to IT and hope they could successfully handle the issue by directly interfacing with it in person or via remote desktop technology.&lt;/p&gt;
 &lt;p&gt;In the office, IT could give the user a temporary laptop while it works on the user's usual endpoint. The user will likely spend a long time getting all their accounts signed in and ensuring they have all the necessary resources. But, if the worker is remote, it gets even more difficult. A user may have to log off for the day due to the lack of a suitable replacement endpoint.&lt;/p&gt;
 &lt;p&gt;A virtual desktop helps with all these acute user issues because IT could simply terminate the desktop instance and recreate it with all the resources, access and accounts the end user needs.&lt;/p&gt;
 &lt;p&gt;While desktop virtualization introduces its own infrastructure and management considerations, the model continues to appeal to organizations that need stronger security controls, centralized desktop management and flexible access for distributed workforces. As IT teams evaluate strategies such as VDI, DaaS and hybrid desktop delivery models, understanding these benefits can help determine whether desktop virtualization aligns with long-term end-user computing goals.&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;John Powers was senior site editor for TechTarget's Enterprise Desktop, Virtual Desktop and Mobile Computing. He graduated from the Philip Merrill College of Journalism at the University of Maryland.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>There are several ways to manage and deliver desktops to end users, and a few of them involve desktop virtualization. Find out what the major benefits of virtualization are.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/container_g1074391400.jpg</image>
            <link>https://www.techtarget.com/searchvirtualdesktop/feature/Benefits-of-desktop-virtualization-for-businesses</link>
            <pubDate>Fri, 06 Mar 2026 09:57:00 GMT</pubDate>
            <title>6 benefits of desktop virtualization for enterprise IT teams</title>
        </item>
        <item>
            <body>&lt;p data-end="376" data-start="123"&gt;When a Windows 11 Remote Desktop session opens to a black screen, users cannot access applications or interact with the system. For IT teams supporting remote desktops, quickly diagnosing the cause of the black screen is essential to restoring access.&lt;/p&gt; 
&lt;p data-end="580" data-start="383"&gt;Users can't simply reboot their endpoint to fix the issue as they might with a local desktop. IT admins and help desk teams need a plan to quickly diagnose the root cause and restore the session.&lt;/p&gt; 
&lt;p data-end="838" data-start="587"&gt;A black screen in a Windows Remote Desktop session usually occurs when the session cannot properly render the desktop environment. This can occur because of graphics driver problems, interrupted updates, network issues or incorrect display settings.&lt;/p&gt; 
&lt;p data-end="1064" data-start="845"&gt;While these six steps can address the most common issues that occur with Remote Desktop Protocol (&lt;a href="https://www.techtarget.com/searchenterprisedesktop/definition/Remote-Desktop-Protocol-RDP"&gt;RDP&lt;/a&gt;) and Windows 11, many of these troubleshooting steps also apply to Windows 10 and Windows Server 2016, 2019 and 2022.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="1. Review the latest Windows Updates"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;1. Review the latest Windows Updates&lt;/h2&gt;
 &lt;p&gt;One of the most common causes of a Windows 11 Remote Desktop black screen is a Windows update that is in progress. When a remote system is performing a Windows update, the remote desktop services get interrupted. This leads to the remote desktop displaying a black screen until the system is done updating and restarts.&lt;/p&gt;
 &lt;p&gt;It's always good to stay on top of the Windows updates and ensure your system runs the latest updates, but new updates can introduce unexpected problems. Windows updates occasionally introduce compatibility issues that affect Remote Desktop Services. This should serve as a reminder for you to always test the latest updates before deploying them to your end users &lt;a href="https://www.techtarget.com/searchenterprisedesktop/tip/Windows-10-updates-to-avoid-and-how-to-address-them"&gt;because they could cause issues&lt;/a&gt;. You should consider turning off Windows Update service on live production VDI, especially when using any image management technology such as Citrix Machine Creation Services.&lt;/p&gt;
 &lt;p&gt;The best way to handle the Windows Updates is to either put them in the golden image of your desktop host when using an image management system, or update your remote desktop hosts once a month outside of official work hours. This can be as simple as starting up the Windows update services once a month on a Sunday evening and running the updates. You can also use a PowerShell &lt;a target="_blank" href="https://www.powershellgallery.com/packages/PSWindowsUpdate/2.2.0.3" rel="noopener"&gt;module&lt;/a&gt; to manage Windows Updates.&lt;/p&gt;
 &lt;p&gt;These issues can occur in both traditional remote desktop environments and cloud-hosted desktops such as Azure Virtual Desktop.&lt;/p&gt;
 &lt;div class="extra-info"&gt;
  &lt;div class="extra-info-inner"&gt;
   &lt;h3 class="splash-heading"&gt;Common causes of a Windows Remote Desktop black screen&lt;/h3&gt; 
   &lt;p&gt;Remote Desktop sessions may display a black screen for several reasons. The most common causes include:&lt;/p&gt; 
   &lt;ul class="default-list"&gt; 
    &lt;li&gt;Windows updates that interrupt Remote Desktop Services&lt;/li&gt; 
    &lt;li&gt;Graphics driver conflicts or outdated GPU drivers&lt;/li&gt; 
    &lt;li&gt;Network interruptions or unstable Wi-Fi connections&lt;/li&gt; 
    &lt;li&gt;Incorrect display resolution settings&lt;/li&gt; 
    &lt;li&gt;Profile loading problems in VDI environments&lt;/li&gt; 
    &lt;li&gt;Stuck Remote Desktop Services components&lt;/li&gt; 
   &lt;/ul&gt; 
   &lt;p&gt;Identifying which of these conditions occurred can help administrators quickly determine the correct troubleshooting step.&lt;/p&gt;
  &lt;/div&gt;
 &lt;/div&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="2. Check for issues with the graphics drivers and licenses"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;2. Check for issues with the graphics drivers and licenses&lt;/h2&gt;
 &lt;p&gt;Graphics drivers can cause issues with a remote desktop as well. There is an extensive list of known issues on the &lt;a href="https://www.techtarget.com/searchdatacenter/news/366562344/AMD-Instinct-MI300-AI-accelerator-takes-aim-at-Nvidia-GPUs"&gt;Nvidia and AMD&lt;/a&gt; forums about crashing drivers when using remote desktops. These vendors and others work to get fixes out quickly but it's still helpful for admins to diagnose these issues quickly. Keep your graphics driver up to date on both the host and the client when using a remote desktop.&lt;/p&gt;
 &lt;p&gt;Like with Windows updates, however, new graphics drivers can also break back-end systems and machines. So always test new display drivers before deploying them on your live production environments.&lt;/p&gt;
 &lt;p&gt;In &lt;a href="https://www.techtarget.com/searchvirtualdesktop/definition/virtual-desktop-infrastructure-VDI"&gt;virtual desktop infrastructure&lt;/a&gt; environments, expired virtual GPU licenses can also cause black screen issues. This is, of course, less common if you use RDP to access a Windows 11 computer elsewhere. However, this issue can occur for enterprise environments that use VDI with virtual GPUs from Nvidia. This can occur with other virtual GPUs, but this example explains the process for Nvidia specifically.&lt;/p&gt;
 &lt;blockquote class="main-article-pullquote"&gt;
  &lt;div class="main-article-pullquote-inner"&gt;
   &lt;figure&gt;
    A black screen in a Windows Remote Desktop session usually occurs when the session cannot properly render the desktop environment.
   &lt;/figure&gt;
   &lt;i class="icon" data-icon="z"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/blockquote&gt;
 &lt;p&gt;Since the M-series cards, Nvidia requires a virtual GPU license for each user connecting to the card. Nvidia has made a Linux appliance that serves as the GPU licensing server. Every time an end user signs in, a license is assigned to that user. When there are no licenses available, the end user might experience a failing session or a black screen issue when signing in. Nvidia licenses are often a set-and-forget system, and IT teams do not usually have to actively monitor the Linux appliance and the licensing manager.&lt;/p&gt;
 &lt;div class="youtube-iframe-container"&gt;
  &lt;iframe id="ytplayer-0" src="https://www.youtube.com/embed/_DNxgnINNAY?autoplay=0&amp;amp;modestbranding=1&amp;amp;rel=0&amp;amp;widget_referrer=null&amp;amp;enablejsapi=1&amp;amp;origin=https://www.techtarget.com" type="text/html" height="360" width="640" frameborder="0"&gt;&lt;/iframe&gt;
 &lt;/div&gt;
 &lt;p&gt;The licenses could have also expired because &lt;a href="https://www.techtarget.com/searchitoperations/tip/Assign-GPUs-to-virtual-machines-with-VMware-vGPU-mode"&gt;these licenses&lt;/a&gt; are often applicable for one to three years. IT may need to extend and update the licensing and deploy it to their servers. Make sure to put the end date of the licenses on your maintenance calendar with a reminder four weeks in advance to source new licenses. Also, you should open and check in with the Nvidia license manager once every month to see if there are still enough available and verify that there are no stale licenses.&lt;/p&gt;
&lt;/section&gt;        
&lt;section class="section main-article-chapter" data-menu-title="3. Test remote desktop connection"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;3. Test remote desktop connection&lt;/h2&gt;
 &lt;p&gt;Remote desktop sessions depend heavily on &lt;a href="https://www.techtarget.com/searchvirtualdesktop/tip/Top-5-remote-desktop-connectivity-problems-and-how-to-prevent-them"&gt;network stability&lt;/a&gt;. This can occur on both internal networks and over internet connections. When users lose the connection to the remote desktop, they can experience a black screen when trying to reconnect.&lt;/p&gt;
 &lt;p&gt;To ensure your users don't experience connection issues, you should advise them to connect to the internet over a wired connection such as ethernet instead of relying on Wi-Fi.&lt;/p&gt;
 &lt;p&gt;Similar connection issues can also affect hosted desktop platforms such as Azure Virtual Desktop or Windows 365, where unstable endpoint connectivity may cause sessions to reconnect to a black screen.&lt;/p&gt;
 &lt;p&gt;If there is no other possibility, ensure that users have access to a strong, stable Wi-Fi connection. End users can always test their connection by using an online speed test. Some monitoring tools such as ControlUp can monitor your end-user environment and see what kind of Wi-Fi connection they are using.&lt;/p&gt;
 &lt;div class="extra-info"&gt;
  &lt;div class="extra-info-inner"&gt;
   &lt;h3 class="splash-heading"&gt;Quick checks before deeper troubleshooting&lt;/h3&gt; 
   &lt;p&gt;Before investigating drivers or profile issues, administrators should confirm a few basic conditions:&lt;/p&gt; 
   &lt;ul class="default-list"&gt; 
    &lt;li&gt;The remote system is not currently installing updates&lt;/li&gt; 
    &lt;li&gt;The network connection is stable&lt;/li&gt; 
    &lt;li&gt;The display resolution settings are compatible&lt;/li&gt; 
    &lt;li&gt;The user profile mounted successfully&lt;/li&gt; 
   &lt;/ul&gt; 
   &lt;p&gt;These quick checks can often resolve a black screen issue without deeper troubleshooting.&lt;/p&gt;
  &lt;/div&gt;
 &lt;/div&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="4. Correct any faulty display settings"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;4. Correct any faulty display settings&lt;/h2&gt;
 &lt;p&gt;Sometimes all it takes to cause a black screen on a remote desktop is an incorrect resolution setting. Go to the display tab when using the remote desktop client -- located at MSTSC.EXE. Check if the display resolution slider is on the same setting as your remote desktop.&lt;/p&gt;
 &lt;p&gt;Usually, sliding it all the way to the right and selecting full screen will automatically verify that the correct &lt;a href="https://www.techtarget.com/whatis/definition/resolution"&gt;resolution&lt;/a&gt; is in place. But if you experience issues, you can test setting it to the native resolution of the machine. It can also help to choose a lower resolution than your screen or the remote screen -- for example, 800 x 600 -- to ensure the connection works.&lt;/p&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="5. Verify the remote desktop profile settings"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;5. Verify the remote desktop profile settings&lt;/h2&gt;
 &lt;p&gt;One issue you may often see is trouble with profiles and underlying profile management technologies, such as FSLogix. When a profile isn't correctly connected, a user can experience a black screen or could be completely disconnected from the session. This can happen when the profile share is inaccessible, or the profile disk has reached its maximum size.&lt;/p&gt;
 &lt;p&gt;Admins can deploy the PreventLoginWithFailure setting, which means the remote desktop will block the login if the profile is not correctly connected. This can result in a strange interaction for your end users, but this way they will know the session is problematic right away and can ask for help. The core of the challenge is to ensure that the profile management technology works and connects quickly. That's why it is essential to monitor your &lt;a href="https://www.techtarget.com/searchnetworking/definition/file-server"&gt;file server&lt;/a&gt; to determine if there is still enough free storage, and whether user profiles are not hitting their maximum. You should actively monitor your remote desktop profile environment and test every update thoroughly.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/enterprise_desktop-best_practices_rdp_sessions-f.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/enterprise_desktop-best_practices_rdp_sessions-f_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/enterprise_desktop-best_practices_rdp_sessions-f_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/enterprise_desktop-best_practices_rdp_sessions-f.png 1280w" alt="Illustration showing security best practices for protecting Remote Desktop Protocol sessions, including limiting login attempts, using two-factor authentication and enabling Network Level Authentication." height="329" width="559"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Security best practices for protecting Remote Desktop Protocol (RDP) sessions include limiting login attempts, enabling two-factor authentication and restricting access to port 3389.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="6. Check for stuck RDS components"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;6. Check for stuck RDS components&lt;/h2&gt;
 &lt;p&gt;Another issue that can occur in Windows 11 RDP sessions is when Remote Desktop Services become stuck or unresponsive. As an administrator, you can easily fix this by starting services.msc from the Run command. Then, select the option to connect to a different computer. Connect to the machine that has an issue, then select Remote Desktop Services &amp;gt; Restart.&lt;/p&gt;
&lt;/section&gt;  
&lt;section class="section main-article-chapter" data-menu-title="Why a remote desktop session might show a black screen"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Why a remote desktop session might show a black screen&lt;/h2&gt;
 &lt;p&gt;A black screen usually indicates that the remote desktop session started successfully but failed to load the graphical interface. This can occur because of graphics driver conflicts, display resolution mismatches, profile loading failures or network interruptions during session initialization.&lt;/p&gt;
 &lt;p&gt;&lt;strong data-end="246" data-start="228"&gt;Editor’s note:&lt;/strong&gt; &lt;em&gt;This article was updated to reflect current troubleshooting practices for Windows 11 Remote Desktop environments and to include additional guidance for virtual desktop infrastructure and cloud-hosted desktop platforms. &lt;/em&gt;&lt;/p&gt;
 &lt;p&gt;&lt;em&gt;Chris Twiest works as a technology officer at RawWorks in the Netherlands, focusing on the standardization and automation of IT services.&lt;/em&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>Remote desktops provide access to Windows systems but can sometimes display a full black screen. Learn six troubleshooting steps IT admins can use to restore the session.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/keyboard_g516059959.jpg</image>
            <link>https://www.techtarget.com/searchvirtualdesktop/tip/Steps-to-fix-a-black-screen-on-a-Windows-11-remote-desktop</link>
            <pubDate>Thu, 05 Mar 2026 22:00:00 GMT</pubDate>
            <title>6 steps to fix a black screen on a Windows 11 remote desktop</title>
        </item>
        <item>
            <body>&lt;p&gt;When Windows 11 Remote Desktop sessions freeze, the impact extends beyond individual users. For IT leaders responsible for endpoint management and hybrid workforce productivity, frozen remote sessions can interrupt access to business-critical applications and delay operational workflows.&lt;/p&gt; 
&lt;p&gt;Problems with the Remote Desktop client -- MSTSC.EXE -- on Windows 11 can lead to freezing and hanging sessions. When sessions hang, employees can lose access to line-of-business applications, internal systems and enterprise data hosted in remote environments.&lt;/p&gt; 
&lt;p&gt;Some general remote desktop best practices, such as making sure remote desktop users have a strong network connection with low latency and accounting for external peripheral hardware, can resolve some of these issues. However, a recent Remote Desktop Protocol (&lt;a href="https://www.techtarget.com/searchenterprisedesktop/definition/Remote-Desktop-Protocol-RDP"&gt;RDP&lt;/a&gt;) issue has made frozen sessions much more common.&lt;/p&gt; 
&lt;p&gt;This freezing on Windows 11 is tied to the Windows 11 22H2 release. While Microsoft addressed the underlying bug in later cumulative updates, organizations with inconsistent endpoint patch levels or mixed device configurations can still encounter the issue.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="How to fix an RDP session that keeps freezing"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;How to fix an RDP session that keeps freezing&lt;/h2&gt;
 &lt;p&gt;Microsoft RDP can &lt;a href="https://www.techtarget.com/searchvirtualdesktop/answer/What-are-the-differences-between-TCP-and-UDP"&gt;run on TCP or UDP&lt;/a&gt;, with UDP delivering a more stable connection. However, UDP is tied to the Windows 11 22H2 release issue. Remote desktop administrators can disable UDP with Group Policies as a workaround if they cannot apply the KB5022360 update to all of their clients.&lt;/p&gt;
 &lt;p&gt;To do this, create a &lt;a href="https://www.techtarget.com/searchwindowsserver/definition/Group-Policy-Object"&gt;Group Policy Object &lt;/a&gt;and browse to Computer Configuration &amp;gt; Administrative templates &amp;gt; Windows components &amp;gt; Remote Desktop Services &amp;gt; Remote Desktop Connection client.&lt;b&gt; &lt;/b&gt;Here, select the group policy &lt;b&gt;Turn Off UDP On Client &lt;/b&gt;and enable the policy (Figure 1).&lt;/p&gt;
 &lt;p&gt;This fix is just a workaround for the underlying problem, however, so running &lt;strong data-end="725" data-start="707"&gt;Windows Update&lt;/strong&gt; is the preferred and more permanent option.&lt;/p&gt;
 &lt;figure class="main-article-image half-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/windows_remote_desktop_freezing_fix-h.jpg"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/windows_remote_desktop_freezing_fix-h_half_column_mobile.jpg" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/windows_remote_desktop_freezing_fix-h_half_column_mobile.jpg 960w,https://www.techtarget.com/rms/onlineimages/windows_remote_desktop_freezing_fix-h.jpg 1280w" alt="Group Policy Editor showing the Turn Off UDP On Client setting for the Remote Desktop Connection client." height="158" width="280"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Figure 1. Group Policy setting Turn Off UDP On Client in the Remote Desktop Connection client configuration.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="Consider desktop environments beyond traditional RDP"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Consider desktop environments beyond traditional RDP&lt;/h2&gt;
 &lt;p&gt;Many organizations now rely on hosted desktop environments such as &lt;a href="https://www.techtarget.com/searchvirtualdesktop/tip/Comparing-Windows-365-vs-Azure-Virtual-Desktop"&gt;Azure Virtual Desktop or Windows 365&lt;/a&gt; instead of connecting directly to physical machines. While these platforms still rely on the Remote Desktop Protocol, the infrastructure supporting the connection is managed in the cloud. If freezing issues occur in these environments, administrators should review host session health, client versions and endpoint network conditions to determine whether the issue originates from the endpoint device or the hosted desktop environment.&lt;/p&gt;
 &lt;p&gt;Troubleshooting remote desktops in these environments often starts with the same fundamentals as traditional RDP sessions: validating endpoint connectivity, confirming the client software version and verifying that recent Windows updates have been applied. Administrators should also check platform-specific monitoring tools to determine whether the issue stems from the endpoint device, the session host or the broader remote desktop infrastructure.&lt;/p&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="How to deploy the latest Windows updates to all remote desktops"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;How to deploy the latest Windows updates to all remote desktops&lt;/h2&gt;
 &lt;p&gt;Maintaining consistent Windows update levels across a distributed device fleet can be challenging, especially in hybrid environments where laptops often operate outside the corporate network for extended periods. This is especially true for the common hybrid work environment with laptops that aren't domain-joined but &lt;a href="https://www.techtarget.com/searchwindowsserver/tip/What-should-admins-know-about-Microsoft-Entra-features"&gt;Microsoft Entra ID hybrid-joined&lt;/a&gt;.&lt;/p&gt;
 &lt;p&gt;Windows administrators used to roll out Windows updates with &lt;a href="https://www.techtarget.com/searchwindowsserver/definition/Windows-Server-Update-Services-WSUS"&gt;Windows Server Update Services&lt;/a&gt; on all machines, but now they need new methods to ensure all machines have the updates. This is especially important for updates that have a significant effect on performance and UX, such as the update that fixed the freezing issue.&lt;/p&gt;
 &lt;p&gt;Windows Update for Business, which integrates with Microsoft Intune endpoint management, allows administrators to monitor update compliance across Windows devices and verify that clients are running builds that address stability issues. With Windows Update for Business, it's possible to run reports &lt;a href="https://www.techtarget.com/searchenterprisedesktop/tip/How-to-add-and-enroll-devices-to-Microsoft-Intune"&gt;on all Intune-enrolled Windows 11 client devices&lt;/a&gt; and check if they are running the latest Windows 11 build with the issue fixed. IT administrators should use Intune or a management tool with similar capabilities to Windows Update for Business to &lt;a target="_blank" href="https://learn.microsoft.com/en-us/mem/intune/protect/windows-update-reports" rel="noopener"&gt;check&lt;/a&gt; the compliance of end-user devices.&amp;nbsp; &amp;nbsp;&lt;/p&gt;
 &lt;p&gt;In hybrid work environments, consistent patching and endpoint configuration management are critical to maintaining reliable remote access experiences for distributed employees.&lt;/p&gt;
 &lt;blockquote class="main-article-pullquote"&gt;
  &lt;div class="main-article-pullquote-inner"&gt;
   &lt;figure&gt;
    Frozen remote sessions can interrupt access to business-critical applications and delay operational workflows.
   &lt;/figure&gt;
   &lt;i class="icon" data-icon="z"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/blockquote&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="How to manage Windows updates to prevent version inconsistency"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;How to manage Windows updates to prevent version inconsistency&lt;/h2&gt;
 &lt;p data-end="774" data-start="544"&gt;To proactively prevent these version consistency issues, admins can manage Windows update rollouts. This way, if Windows releases a harmful or malfunctioning Windows build, desktop administrators can block it from being installed.&lt;/p&gt;
 &lt;p data-end="1476" data-start="776"&gt;Admins should also test every release and Windows update before deploying it within their organization. Make sure a test script can run on a test device when a new update is released and keep the RDP client open for an extended period during testing.&lt;/p&gt;
 &lt;p data-end="1476" data-start="776"&gt;While this process can be time-consuming, testing new Windows builds against remote access workflows and critical enterprise applications helps IT teams identify stability issues early and maintain reliable remote connectivity across the organization. As remote access continues to support hybrid work environments, maintaining consistent endpoint configurations and update policies is essential to ensuring remote desktop reliability at scale.&lt;/p&gt;
 &lt;p data-end="1476" data-start="776"&gt;&lt;em&gt;&lt;strong data-end="268" data-start="250"&gt;Editor's note:&lt;/strong&gt; This article was updated to reflect current Windows Remote Desktop environments and expanded to include guidance for cloud-hosted desktop platforms. &lt;/em&gt;&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Chris Twiest works as a technology officer at RawWorks in the Netherlands, focusing on the standardization and automation of IT services.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>Windows 11 Remote Desktop sessions can freeze due to updates, configuration issues or network problems. Learn how IT admins can troubleshoot and prevent RDP freezes.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/check_g1268128622.jpg</image>
            <link>https://www.techtarget.com/searchvirtualdesktop/tip/What-to-do-when-a-Windows-11-remote-desktop-keeps-freezing</link>
            <pubDate>Thu, 05 Mar 2026 19:25:00 GMT</pubDate>
            <title>What to do when a Windows 11 Remote Desktop keeps freezing</title>
        </item>
        <item>
            <body>&lt;p&gt;Secure remote access is essential for protecting enterprise workloads, and organizations can't achieve it without strong controls over who can reach critical Windows systems.&lt;/p&gt; 
&lt;p&gt;It's crucial for IT to be able to manage which users have remote desktop access to a Windows machine. Administrators primarily do this through the Remote Desktop Users group in Windows. While it sounds simple enough, there are multiple ways to manage it and several scenarios that can make it more complex.&lt;/p&gt; 
&lt;p&gt;The Remote Desktop Users group controls who can remotely access Windows systems, which makes it a significant security and governance control point. Proper configuration improves operational efficiency, prevents unnecessary privilege escalation and &lt;a href="https://www.techtarget.com/searchnetworking/tip/8-remote-work-security-risks-and-tips-to-mitigate-them"&gt;reduces attack surface&lt;/a&gt;. IT leaders must understand how to manage access to the group using different tools, as well as the security factors that affect this process.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="Understanding RDP access requirements"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Understanding RDP access requirements&lt;/h2&gt;
 &lt;p&gt;If an admin wants to remotely manage a Windows-based machine, the easiest way to do this is using the Remote Desktop Protocol (RDP) feature that is built into the OS. RDP is available on most editions of Windows, including Windows Pro, Enterprise, Education and Windows Server editions.&lt;/p&gt;
 &lt;p&gt;To be able to access a machine, a user must have Remote Desktop enabled, and the firewall must &lt;a href="https://www.techtarget.com/searchvirtualdesktop/tip/Top-5-remote-desktop-connectivity-problems-and-how-to-prevent-them"&gt;allow RDP traffic&lt;/a&gt;. They also need a user account that is either an administrator account or part of the Remote Desktop Users group. By default, users who are a part of either of these groups will be authorized to log on remotely to the server.&lt;/p&gt;
 &lt;p&gt;The authentication mechanism differs depending on whether the target machine is joined to a domain, not joined to a domain or joined directly to Entra ID. If the machine is joined to a domain, the target machine also needs to be able to reach a domain controller to authenticate to the machine with that account.&lt;/p&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="Managing the Remote Desktop Users group"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Managing the Remote Desktop Users group&lt;/h2&gt;
 &lt;p&gt;There are a few ways to manage access to remote desktop users. If an admin has local access to the machine, they can use the UI or PowerShell. This approach is the easiest for managing access on a per-machine basis.&lt;/p&gt;
 &lt;p&gt;To manage Remote Desktop Users group access with the UI, navigate to Start &amp;gt; Computer Management &amp;gt; Local Users and Groups &amp;gt; Groups. Next, select &lt;b&gt;Remote Desktop Users&lt;/b&gt; and define the user or group that should receive access (Figure 1).&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/remote_desktop_users_windows_1-h.jpg"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/remote_desktop_users_windows_1-h_mobile.jpg" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/remote_desktop_users_windows_1-h_mobile.jpg 960w,https://www.techtarget.com/rms/onlineimages/remote_desktop_users_windows_1-h.jpg 1280w" alt="The 'Computer Management' page in Windows." data-credit="Marius Sandbu"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Figure 1. Configuring the Remote Desktop User group through the Windows UI.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;p&gt;To &lt;a href="https://www.techtarget.com/searchwindowsserver/tutorial/Learn-to-monitor-group-memberships-with-PowerShell"&gt;manage access with PowerShell&lt;/a&gt;, type the following command in the PowerShell window:&lt;/p&gt;
 &lt;pre class="language-powershell"&gt;&lt;code&gt;Add-LocalGroupMember -Group "Remote Desktop Users" -Member nameofaccount&lt;/code&gt;&lt;/pre&gt;
 &lt;p&gt;It's also possible to create a group of IT admins and assign them to the Remote Desktop Users group on a selected collection of devices. To do this, use Microsoft Intune.&lt;/p&gt;
 &lt;p&gt;Open the Microsoft Intune admin center portal and navigate to&lt;b&gt; &lt;/b&gt;Endpoint security &amp;gt; Account protection. From there, click &lt;b&gt;Create Policy&lt;/b&gt;.&lt;/p&gt;
 &lt;p&gt;On the Create a profile page, choose &lt;b&gt;Windows&lt;/b&gt; from the first drop-down menu and&lt;b&gt; Local user group membership&lt;/b&gt; from the second drop-down menu (Figure 2). Then, click &lt;b&gt;Create&lt;/b&gt;.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/remote_desktop_users_windows_2-h.jpg"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/remote_desktop_users_windows_2-h_mobile.jpg" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/remote_desktop_users_windows_2-h_mobile.jpg 960w,https://www.techtarget.com/rms/onlineimages/remote_desktop_users_windows_2-h.jpg 1280w" alt="The 'Create a profile' page in the Microsoft Intune admin center portal." data-credit="Marius Sandbu"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Figure 2. Specifying the platform and profile type for a Remote Desktop Users group policy.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;p&gt;Specify a name for the policy, and go into configuration settings and select &lt;b&gt;Remote Desktop Users&lt;/b&gt; from the drop-down menu under Local group. Select the users that should be added to the group, then specify any required scope tags and assign the policy to the appropriate group of devices (Figure 3).&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/remote_desktop_users_windows_3-h.jpg"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/remote_desktop_users_windows_3-h_mobile.jpg" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/remote_desktop_users_windows_3-h_mobile.jpg 960w,https://www.techtarget.com/rms/onlineimages/remote_desktop_users_windows_3-h.jpg 1280w" alt="The 'Create Policy' page in the Microsoft Intune admin center portal." data-credit="Marius Sandbu"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Figure 3. Configuring settings for a Remote Desktop Users group policy.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;p&gt;Once this policy is deployed, it can take 30 to 60 minutes for it to be applied to the machines.&lt;/p&gt;
 &lt;h3&gt;Managing RDP access for Azure VMs joined to Entra ID&lt;/h3&gt;
 &lt;p&gt;The UI, PowerShell and Intune access management methods work for physical or on‑premises Windows machines. However, if the Windows machine is an Azure VM joined to Entra ID, RDP access requires an additional layer of authorization: Azure role-based access control (RBAC). Even if a user is in the Remote Desktop Users group, they might be unable to log on (Figure 4).&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/remote_desktop_users_windows_4-h.jpg"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/remote_desktop_users_windows_4-h_mobile.jpg" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/remote_desktop_users_windows_4-h_mobile.jpg 960w,https://www.techtarget.com/rms/onlineimages/remote_desktop_users_windows_4-h.jpg 1280w" alt="A Windows Security credentials error message." data-credit="Marius Sandbu"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Figure 4. Without the proper Azure role assignment, users might receive an error message when trying to log on.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;p&gt;For machines that are running in Azure and are joined to Entra ID, IT must &lt;a target="_blank" href="https://learn.microsoft.com/en-us/azure/role-based-access-control/role-assignments" rel="noopener"&gt;assign&lt;/a&gt; the appropriate Azure role.&lt;/p&gt;
 &lt;p&gt;The correct permissions must be configured in Microsoft Azure by assigning one of two roles to the VM. To do this, use Azure RBAC. Go to Virtual machine &amp;gt; Access control &amp;gt; Add role assignment. From there, select either &lt;b&gt;Virtual Machine User Login&lt;/b&gt; or &lt;b&gt;Virtual Machine Administrator Login&lt;/b&gt; for the user that needs access to the machine (Figure 5).&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/remote_desktop_users_windows_5-h.jpg"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/remote_desktop_users_windows_5-h_mobile.jpg" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/remote_desktop_users_windows_5-h_mobile.jpg 960w,https://www.techtarget.com/rms/onlineimages/remote_desktop_users_windows_5-h.jpg 1280w" alt="The 'Add role assignment' page in Microsoft Azure." data-credit="Marius Sandbu"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Figure 5. Selecting a role assignment for a VM in Microsoft Azure.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;p&gt;The Azure agent on the VM will then add the user as a remote desktop user or administrator on the target machine. This also ensures that RBAC is handled by Azure.&lt;/p&gt;
&lt;/section&gt;                    
&lt;section class="section main-article-chapter" data-menu-title="RDP access security considerations"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;RDP access security considerations&lt;/h2&gt;
 &lt;p&gt;Even after configuring who can access a machine through the Remote Desktop Users group, admins must ensure that access is secure. By default, RDP does not provide built-in multifactor authentication (MFA). This means that if a bad actor gains access to a user's credentials, they could use RDP to gain unauthorized access to the machine. In &lt;a href="https://www.techtarget.com/searchsecurity/tip/Top-3-ransomware-attack-vectors-and-how-to-avoid-them"&gt;many ransomware attacks&lt;/a&gt;, for example, attackers use RDP as a method to gain access or move laterally inside the infrastructure.&lt;/p&gt;
 &lt;p&gt;Therefore, it's important for IT departments to implement additional security measures -- such as VPNs with MFA, or RDP gateways that enforce MFA -- to protect RDP connections.&lt;/p&gt;
 &lt;p&gt;IT should strictly limit access to only users and groups who require it for their job functions. This means regularly reviewing and auditing who has RDP access to machines and removing access for users who no longer need it. Admins can actively monitor RDP access using Windows Event Logs or a Security Information and Event Management (SIEM) platform such as Microsoft Sentinel. Active monitoring helps detect suspicious activity and potential security breaches.&lt;/p&gt;
 &lt;p&gt;When &lt;a href="https://www.techtarget.com/searchsecurity/tip/SIEM-implementation-steps-and-best-practices"&gt;using any SIEM product&lt;/a&gt;, IT should look for the following event IDs:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Event ID 4624: An account was successfully logged on.&lt;/b&gt; This signals a successful RDP logon. While normal, a high volume of successful logons from unusual IP addresses or at unusual times could indicate compromise. For RDP sessions, look for logon type 10.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Event ID 4625: An account failed to log on.&lt;/b&gt; This signals a failed logon attempt. Frequent occurrences from a single source IP, especially with different usernames, can point to brute-force attacks. Analyze the Failure Reason and Sub Status codes for more details.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Event ID 4634: An account was logged off.&lt;/b&gt; This event shows when an RDP session ends.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Event ID 4776: The domain controller attempted to validate the credentials for an account.&lt;/b&gt; This event is relevant for domain-joined machines and indicates NT LAN Manager authentication attempts.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Event ID 4870: Remote Desktop Services session reconnected.&lt;/b&gt; This event occurs when a user reconnects to an existing RDP session.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Event ID 4871: Remote Desktop Services session disconnected.&lt;/b&gt; This event occurs when a user disconnects from an RDP session without logging off.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;SIEM platforms like Microsoft Sentinel let IT create custom rules and alerts to correlate event IDs with other security data, such as geolocation information, &lt;a href="https://www.techtarget.com/whatis/definition/threat-intelligence-feed"&gt;threat intelligence feeds&lt;/a&gt; and user behavior analytics. This enables sophisticated detection of anomalies. Examples of RDP access anomalies include the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Multiple failed RDP logon attempts followed by a successful one from a different IP address.&lt;/li&gt; 
  &lt;li&gt;RDP logons from countries or regions where the organization does not operate.&lt;/li&gt; 
  &lt;li&gt;Unusual RDP logon times for specific user accounts.&lt;/li&gt; 
  &lt;li&gt;Spikes in RDP activity that deviate from baseline behavior.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;Regularly reviewing these logs and configuring appropriate alerts within the SIEM platform is vital for maintaining the security of the RDP infrastructure and detecting potential threats promptly.&lt;/p&gt;
 &lt;p&gt;Effective management of the Remote Desktop Users group is essential for controlling who can access Windows systems remotely. Whether access is configured locally, through Intune or through Azure RBAC, organizations must pair access management with strong security controls. Limiting RDP exposure, enforcing MFA and continuously monitoring logon activity are key steps in reducing risk. By combining proper group configuration with layered security, IT teams can maintain operational flexibility without expanding the attack surface.&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Marius Sandbu is a cloud evangelist for Sopra Steria in Norway who mainly focuses on end-user computing and cloud-native technology.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>Managing the Remote Desktop Users group is essential for secure Windows access. IT teams should know how to configure it properly across local, Intune and Azure environments.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/security_a385093447.jpg</image>
            <link>https://www.techtarget.com/searchvirtualdesktop/tip/How-to-configure-the-Remote-Desktop-Users-group-in-Windows</link>
            <pubDate>Fri, 20 Feb 2026 15:15:00 GMT</pubDate>
            <title>How to configure the Remote Desktop Users group in Windows</title>
        </item>
        <item>
            <body>&lt;p&gt;IT administrators can use Hyper-V on Windows 11 for a variety of business tasks, from testing software and services to securing individual sessions. However, there are several steps they need to take before Hyper-V and any virtual machines are ready to use.&lt;/p&gt; 
&lt;p&gt;Successfully running Hyper-V requires a solid grasp of how it fits into existing security, infrastructure and operational workflows. IT teams must understand Hyper-V for Windows 11, including the prerequisites, how to enable it, and how to set up a VM and network. Additionally, as an administrator, you should learn what Hyper-V can do &lt;a href="https://www.techtarget.com/searchitoperations/answer/Hyper-V-vs-VMware-comparison-What-are-the-differences"&gt;compared to other virtualization tools&lt;/a&gt; and what features make it stand out.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="Why use Hyper-V on a Windows 11 machine?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Why use Hyper-V on a Windows 11 machine?&lt;/h2&gt;
 &lt;p&gt;One of the biggest reasons that you might want to use Hyper-V is that it's free and included in your &lt;a href="https://www.techtarget.com/searchenterprisedesktop/tip/What-do-the-different-licenses-for-Windows-11-come-with"&gt;Windows 11 Pro or Enterprise license&lt;/a&gt;. Other virtualization software often requires you to pay extra. Even if some technologies are free -- for example, VMware Workstation Pro -- you must download and register the software. The enrollment process for Hyper-V is quite straightforward for Windows administrators.&lt;/p&gt;
 &lt;p&gt;Virtualization is most often hosted on specialized servers with &lt;a href="https://www.techtarget.com/searchitoperations/feature/How-to-choose-the-best-CPU-for-virtualization"&gt;many CPU cores&lt;/a&gt; and plenty of RAM, so why would IT want to run Hyper-V on a Windows 11 machine? There are many good scenarios for this.&lt;/p&gt;
 &lt;h3&gt;Security&lt;/h3&gt;
 &lt;p&gt;Hyper-V is very useful for creating a VM to work within. This way, you can separate work and private software. You can even sandbox the machine on the network to only let it connect to corporate resources.&lt;/p&gt;
 &lt;p&gt;Many viruses or ransomware still come through phishing emails or messenger apps. The risk of viruses and ransomware is much lower if you don't have social media or email on the VM. Also, the chance of spreading it to the company network is lower. IT administrators -- especially those who connect directly from their workstations to servers and the company back end -- should consider doing this from a secure VM.&lt;/p&gt;
 &lt;h3&gt;Lab testing&lt;/h3&gt;
 &lt;p&gt;Another good use of Hyper-V is a lab environment to test changes and updates to software. You can have a VM with company software and install the update first on the VM. Then, you can go through a testing procedure before installing the update on all computers in the corporate network.&lt;/p&gt;
 &lt;p&gt;A major advantage of using Hyper-V is &lt;a href="https://www.techtarget.com/searchitoperations/tip/A-beginners-guide-to-Hyper-V-checkpoints"&gt;its ability to create checkpoints&lt;/a&gt;, which are snapshots of the VM, and bring the VM directly back to that point. You can quickly test out an update, and if it doesn't work, you can just set back the VM to the checkpoint. Then, it's immediately ready for another test.&lt;/p&gt;
 &lt;h3&gt;Education and training&lt;/h3&gt;
 &lt;p&gt;When engaging with IT training from vendors, you might learn about new tools that your organization doesn't use. Creating a VM on your own workstation to go through the training material can be an easy way to learn hands-on. Checkpoints can quickly reset these training machines to a clean state to let you do a different exercise or retry a lesson.&lt;/p&gt;
&lt;/section&gt;           
&lt;section class="section main-article-chapter" data-menu-title="Prerequisites for Hyper-V on Windows 11"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Prerequisites for Hyper-V on Windows 11&lt;/h2&gt;
 &lt;p&gt;Running Hyper-V on a Windows 11 machine has the following prerequisites:&lt;/p&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;Windows 11 Pro or Enterprise 64-bit OS.&lt;/li&gt; 
  &lt;li&gt;A 64-bit processor with Second Level Address Translation.&lt;/li&gt; 
  &lt;li&gt;A minimum of 4 GB of RAM.&lt;/li&gt; 
  &lt;li&gt;BIOS-level hardware virtualization support.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;To check if a system meets these requirements, start up the Task Manager by right-clicking on the taskbar. In the CPU part of the performance tab, see if the processor has virtualization enabled (Figure 1).&lt;/p&gt;
 &lt;figure class="main-article-image half-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/how_to_manage_hyperv_in_windows_1-h.jpg"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/how_to_manage_hyperv_in_windows_1-h_half_column_mobile.jpg" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/how_to_manage_hyperv_in_windows_1-h_half_column_mobile.jpg 960w,https://www.techtarget.com/rms/onlineimages/how_to_manage_hyperv_in_windows_1-h.jpg 1280w" alt="A screenshot of Virtualization turned on in the Windows 11 task manager. " data-credit="Chris Twiest" height="222" width="280"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Figure 1. The CPU section of the Windows 11 task manager performance tab showing Virtualization set to enabled.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;p&gt;Most modern CPUs and motherboards support virtualization by default, but it might be disabled.&lt;/p&gt;
 &lt;p&gt;You can change the virtualization setting in your machine's BIOS. The best way to do this is to Google your motherboard type or laptop manufacturer for "[brand and model] change BIOS CPU virtualization setting." This should provide manual or guided steps to change the virtualization feature of your CPU.&lt;/p&gt;
 &lt;p&gt;In the performance tab, you can also see if you have enough RAM to use Hyper-V. In Figure 1, there is a total of 15.9 GB, which exceeds the 4 GB needed. If the prerequisites are met, you can enable Hyper-V.&lt;/p&gt;
&lt;/section&gt;        
&lt;section class="section main-article-chapter" data-menu-title="3 methods to enable Hyper-V on Windows 11"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;3 methods to enable Hyper-V on Windows 11&lt;/h2&gt;
 &lt;p&gt;There are three ways to enable Hyper-V. The first method relies on Windows features. First, search for Windows features in the Start menu. This will bring up the features window and let you turn features on or off. Scroll to Hyper-V and check the boxes for Hyper-V (Figure 2). After you click &lt;b&gt;OK&lt;/b&gt;, the Hyper-V installation will start. After the installation, a prompt will appear to reboot the machine.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/how_to_manage_hyperv_in_windows_2-h.jpg"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/how_to_manage_hyperv_in_windows_2-h_mobile.jpg" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/how_to_manage_hyperv_in_windows_2-h_mobile.jpg 960w,https://www.techtarget.com/rms/onlineimages/how_to_manage_hyperv_in_windows_2-h.jpg 1280w" alt="The Hyper-V option in the Windows Features menu shown to be checked to indicate they are on. " data-credit="Chris Twiest"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Figure 2. The Windows Features menu with Hyper-V selected and the drop-down menus showing.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;p&gt;You can also use the following command prompt to enable Hyper-V:&lt;/p&gt;
 &lt;pre&gt;&lt;span style="font-family: 'courier new', courier, monospace;"&gt;DISM /Online /Enable-Feature /All /FeatureName:Microsoft-Hyper-V&lt;/span&gt;&lt;/pre&gt;
 &lt;p&gt;After this &lt;a href="https://www.techtarget.com/searchenterprisedesktop/definition/Microsoft-Windows-Deployment-Image-Servicing-and-Management-DISM"&gt;Deployment Image Servicing and Management&lt;/a&gt; command runs, you will be prompted to restart the machine.&lt;/p&gt;
 &lt;p&gt;The last way to enable Hyper-V on your system is to use the following PowerShell command:&lt;/p&gt;
 &lt;pre class="language-powershell"&gt;&lt;code&gt;Enable-WindowsOptionalFeature -Online -FeatureName Microsoft-Hyper-V-All&lt;/code&gt;&lt;/pre&gt;
 &lt;p&gt;After the PowerShell script, you will be prompted to restart the machine.&lt;/p&gt;
 &lt;p&gt;To start using Hyper-V, you'll need to start the Hyper-V Manager. This tool is installed when enabling Hyper-V on the system in the last step. Searching the Start menu for Hyper-V will prompt you to open the manager.&lt;/p&gt;
&lt;/section&gt;          
&lt;section class="section main-article-chapter" data-menu-title="How to manage Hyper-V on Windows 11"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;How to manage Hyper-V on Windows 11&lt;/h2&gt;
 &lt;p&gt;In the Hyper-V Manager, you can create and manage multiple VMs, change global settings and set up virtual networking. If this is your first time using Hyper-V, look over the global settings and check the networking settings to see if they fit your use case.&lt;/p&gt;
 &lt;p&gt;To access the global settings, click on &lt;b&gt;Hyper-V Settings... &lt;/b&gt;in the Hyper-V Manager. This option should be under Actions, either on the right side or in the top bar.&lt;/p&gt;
 &lt;figure class="main-article-image half-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/how_to_manage_hyperv_in_windows_4-h.jpg"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/how_to_manage_hyperv_in_windows_4-h_half_column_mobile.jpg" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/how_to_manage_hyperv_in_windows_4-h_half_column_mobile.jpg 960w,https://www.techtarget.com/rms/onlineimages/how_to_manage_hyperv_in_windows_4-h.jpg 1280w" alt="The storage location of the Virtual Hard Disks for the Hyper-V VMs." data-credit="Chris Twiest" height="262" width="280"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Figure 3. The Virtual Hard Disks section showing the location of these large files. 
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;p&gt;The settings you can change here will affect how the VMs are created. There are two settings that have the most significant effect on your Hyper-V system. First, the virtual hard disk setting is where the &lt;a href="https://www.techtarget.com/searchvirtualdesktop/definition/virtual-hard-disk-VHD"&gt;VHDs&lt;/a&gt; are created for your VMs. You can browse to a different HDD or SSD location in your system to save these files (Figure 3). The VHD files can grow into large files and require available storage.&lt;/p&gt;
 &lt;p&gt;The second setting to check is Virtual Machines, shown just below the Virtual Hard Disks setting in Figure 3. This is the location where VM configuration files are saved. Most of the time, you should save these in the same location as the VHDs.&lt;/p&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="Networking for Hyper-V VMs"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Networking for Hyper-V VMs&lt;/h2&gt;
 &lt;p&gt;The network is an integral part of Hyper-V because it works with virtual network switches, which you can set to different access levels. To access the Virtual Switch Manager, click on &lt;b&gt;Actions&lt;/b&gt; in the Hyper-V Manager or on the right-side action pane under Hyper-V settings.&lt;/p&gt;
 &lt;p&gt;Hyper-V will always create a default network switch. This will be an internal switch with NAT enabled.&lt;/p&gt;
 &lt;p&gt;From there, you can create three types of switches: external, internal or private (Figure 4). Understanding the differences between these switches and selecting the correct one for your environment is essential.&lt;/p&gt;
 &lt;h3&gt;Private switch&lt;/h3&gt;
 &lt;p&gt;A private switch allows only communication between VMs on this private switch. It stops communication between the VM and the host.&lt;/p&gt;
 &lt;h3&gt;Internal switch&lt;/h3&gt;
 &lt;p&gt;An internal switch allows communication between all VMs on the switch and connection to the host. It can also communicate with the host and use its internet connection through NAT.&lt;/p&gt;
 &lt;h3&gt;External switch&lt;/h3&gt;
 &lt;p&gt;An external switch requires its own physical network adapter and can be used to separate the Virtual Machine and Host Networks.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/how_to_manage_hyperv_in_windows_5-h.jpg"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/how_to_manage_hyperv_in_windows_5-h_mobile.jpg" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/how_to_manage_hyperv_in_windows_5-h_mobile.jpg 960w,https://www.techtarget.com/rms/onlineimages/how_to_manage_hyperv_in_windows_5-h.jpg 1280w" alt="The option to choose an External, Internal or Private virtual switch for the VM." data-credit="Chris Twiest"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Figure 4. The Virtual Switch Manager showing the three types of virtual switches the administrator can create. 
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
&lt;/section&gt;           
&lt;section class="section main-article-chapter" data-menu-title="How to create a VM with Hyper-V"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;How to create a VM with Hyper-V&lt;/h2&gt;
 &lt;p&gt;After enabling Hyper-V and setting up the network and global settings, you can create a VM. Before you begin, &lt;a href="https://www.techtarget.com/searchenterprisedesktop/tutorial/How-to-perform-a-Windows-11-ISO-file-install"&gt;you need an ISO of the OS you want to install&lt;/a&gt;. This example uses an ISO of Windows Server 2022.&lt;/p&gt;
 &lt;p&gt;To start creating a VM, select Action &amp;gt; New &amp;gt; Virtual Machine in the Action menu (Figure 5).&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/how_to_manage_hyperv_in_windows_6-h.jpg"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/how_to_manage_hyperv_in_windows_6-h_mobile.jpg" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/how_to_manage_hyperv_in_windows_6-h_mobile.jpg 960w,https://www.techtarget.com/rms/onlineimages/how_to_manage_hyperv_in_windows_6-h.jpg 1280w" alt="The drop-down menu for Action in Hyper-V Manager showing the option to create a new VM." data-credit="Chris Twiest"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Figure 5. The Action menu showing the path to create a new VM.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;p&gt;This will bring up the New Virtual Machine Wizard. On the first screen, click &lt;b&gt;Next&lt;/b&gt;. Then, specify a name for the VM. You can also choose to store the VM in a different location than the one set in the global settings (Figure 6). After entering a name, click &lt;b&gt;Next&lt;/b&gt;.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/how_to_manage_hyperv_in_windows_7-h.jpg"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/how_to_manage_hyperv_in_windows_7-h_mobile.jpg" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/how_to_manage_hyperv_in_windows_7-h_mobile.jpg 960w,https://www.techtarget.com/rms/onlineimages/how_to_manage_hyperv_in_windows_7-h.jpg 1280w" alt="The New Virtual Machine Wizard showing the option to choose the storage location of the new VM." data-credit="Chris Twiest"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Figure 6. The section of the VM setup process that specifies the location that Windows 11 will store the VM.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;p&gt;This will bring you to the Generation selection screen. For modern OSes such as Windows Server 2022 or Windows 11, you can go with Generation 2 -- older OSes or 32-bit OSes require Generation 1. After selecting the right generation, click &lt;b&gt;Next&lt;/b&gt;.&lt;/p&gt;
 &lt;p&gt;Next, assign the VM the right amount of startup memory. If you check the Dynamic Memory box, the VM will not take all the RAM of the host assigned to it; rather, it takes only the memory it is using at the moment (Figure 7). After setting the right amount for your deployment, click &lt;b&gt;Next&lt;/b&gt;.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/how_to_manage_hyperv_in_windows_8-h.jpg"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/how_to_manage_hyperv_in_windows_8-h_mobile.jpg" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/how_to_manage_hyperv_in_windows_8-h_mobile.jpg 960w,https://www.techtarget.com/rms/onlineimages/how_to_manage_hyperv_in_windows_8-h.jpg 1280w" alt="The New Virtual Machine Wizard enabling the administrator to choose an amount of memory for the VM and whether to use Dynamic Memory. " data-credit="Chris Twiest"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Figure 7. The option to assign startup memory for the new VM.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;p&gt;On the next screen, select which virtual network switch the VM will connect to. Select the switch you decided on and click &lt;b&gt;Next&lt;/b&gt;.&lt;/p&gt;
 &lt;p&gt;After that, you need to configure the VHD for the VM. Select the option to create a new disk. By default, it will choose the location of the global Hyper-V settings to save the virtual hard drive. These VHDX files are dynamic and will only require the storage they use, not their full storage capacity (Figure 8). After setting up the disk, click &lt;b&gt;Next&lt;/b&gt;.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/how_to_manage_hyperv_in_windows_9-h.jpg"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/how_to_manage_hyperv_in_windows_9-h_mobile.jpg" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/how_to_manage_hyperv_in_windows_9-h_mobile.jpg 960w,https://www.techtarget.com/rms/onlineimages/how_to_manage_hyperv_in_windows_9-h.jpg 1280w" alt="The section of the New Virtual Machine Wizard pertaining to virtual hard disk creation." data-credit="Chris Twiest"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Figure 8. The dynamic VHDX file, which will function as the virtual hard disk for the VM.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;p&gt;The last thing to do is select the ISO from which you want to install your OS on the VM and click Next &amp;gt; Finish. Now that the VM is created, you can connect to it and install the OS in the VM. To do this, right-click on the VM in the Hyper-V Manager and click &lt;b&gt;Connect&lt;/b&gt;.&lt;/p&gt;
 &lt;p&gt;After connecting, you can start the VM by selecting Action &amp;gt; Start or pressing the green power button in the upper left corner (Figure 9).&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/how_to_manage_hyperv_in_windows_10-h.jpg"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/how_to_manage_hyperv_in_windows_10-h_mobile.jpg" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/how_to_manage_hyperv_in_windows_10-h_mobile.jpg 960w,https://www.techtarget.com/rms/onlineimages/how_to_manage_hyperv_in_windows_10-h.jpg 1280w" alt="The Virtual Machine Connection interface ready to boot up the VM. " data-credit="Chris Twiest"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Figure 9. A test VM ready to be started up.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;p&gt;The VM will now boot from the ISO and is ready to install the OS.&lt;/p&gt;
 &lt;p&gt;After the OS installation, you don't need to install extra drivers, as is the case with many other virtualization tools. Because Hyper-V is a Microsoft product, the drivers are already &lt;a target="_blank" href="https://learn.microsoft.com/en-us/windows-hardware/drivers/network/overview-of-hyper-v" rel="noopener"&gt;included&lt;/a&gt; in the Windows OS.&lt;/p&gt;
&lt;/section&gt;                 
&lt;section class="section main-article-chapter" data-menu-title="How to manage a VM in Windows 11"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;How to manage a VM in Windows 11&lt;/h2&gt;
 &lt;p&gt;With a VM up and running, you can perform all administrative tasks from the Hyper-V Manager. In the Hyper-V Manager's Virtual Machines pane, you can see a list of all VMs created in Hyper-V (Figure 10).&lt;/p&gt;
 &lt;figure class="main-article-image half-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/how_to_manage_hyperv_in_windows_11-h.jpg"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/how_to_manage_hyperv_in_windows_11-h_half_column_mobile.jpg" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/how_to_manage_hyperv_in_windows_11-h_half_column_mobile.jpg 960w,https://www.techtarget.com/rms/onlineimages/how_to_manage_hyperv_in_windows_11-h.jpg 1280w" alt="The Hyper-V Manager interface with one VM that administrators can manage. " data-credit="Chris Twiest" height="68" width="279"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Figure 10. The Virtual Machines section of Hyper-V Manager showing the one VM available to manage. 
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;p&gt;By right-clicking on the VM, you can start it, suspend it or shut it down. Hyper-V also enables admins to pause and reset a VM. One other important option that Hyper-V offers is Checkpoints, which are snapshots of the VM that let you reset the VM to the point in time the checkpoint was created.&lt;/p&gt;
 &lt;p&gt;You can create and manage a checkpoint by right-clicking on the VM, where you can select &lt;b&gt;Checkpoint&lt;/b&gt; -- which will create a new point in time -- or &lt;b&gt;Revert&lt;/b&gt;, which lets you restore an earlier state of the VM.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;&lt;i&gt;Editor's note:&lt;/i&gt;&lt;/b&gt;&lt;i&gt;&amp;nbsp;This article was updated in February 2026 to reflect technology changes and to improve the reader experience.&lt;/i&gt;&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Chris Twiest works as a technology officer at RawWorks in the Netherlands, focusing on the future Workspace and Cloud technologies for the end user.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>Hyper-V virtual machines have many use cases in enterprise IT. Windows administrators should follow these steps to create new VMs no matter what their intended use is.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/container_g922017556.jpg</image>
            <link>https://www.techtarget.com/searchvirtualdesktop/tip/How-to-enable-and-manage-Windows-11-Hyper-V</link>
            <pubDate>Tue, 10 Feb 2026 13:10:00 GMT</pubDate>
            <title>How to enable and manage Windows 11 Hyper-V</title>
        </item>
        <item>
            <body>&lt;p&gt;Organizations that offer Apple endpoints as work devices must address the specific requirements of macOS in any technology implementation. Desktop virtualization is no exception.&lt;/p&gt; 
&lt;p&gt;Many organizations have adopted Windows-based &lt;a href="https://www.techtarget.com/searchvirtualdesktop/definition/virtual-desktop-infrastructure-VDI"&gt;VDI&lt;/a&gt; and desktop as a service (&lt;a href="https://www.techtarget.com/searchvirtualdesktop/definition/desktop-as-a-service-DaaS"&gt;DaaS&lt;/a&gt;) to deploy virtual desktops to end users. The Windows virtual desktop can be based on a 1-to-many ratio with a server OS, 1-to-1 with a workstation OS, or 1-to-many with Windows 10 or 11 multi-user workstation OS. Regardless of the VM's OS, the user experiences a familiar Windows desktop after successful authentication.&lt;/p&gt; 
&lt;p&gt;Through &lt;a href="https://www.techtarget.com/searchvirtualdesktop/tip/Compare-7-desktop-as-a-service-providers"&gt;DaaS providers&lt;/a&gt;, such as Citrix, Microsoft Azure and VMware, users can access Windows-based virtual desktops from any type of Apple device, including an iOS-based iPhone or a macOS-based device such as a MacBook. This type of access is common and has been available for many years. Every end-user device type -- including Google Chromebooks and other Linux-based devices -- can be used, whether in conjunction with a native client or web-based access.&lt;/p&gt; 
&lt;p&gt;macOS maintains a significant presence in enterprise desktop environments, especially in organizations that permit employee device choice. As an extension of this system's familiarity and functionality, some organizations are interested in subscribing to macOS virtual desktops from a DaaS provider. However, Apple's licensing requirements pose a challenge to this possibility.&lt;/p&gt; 
&lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/benefits_of_desktop_virtualization-f.png"&gt;
 &lt;img data-src="https://www.techtarget.com/rms/onlineimages/benefits_of_desktop_virtualization-f_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/benefits_of_desktop_virtualization-f_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/benefits_of_desktop_virtualization-f.png 1280w" alt="A graphic highlighting the benefits of desktop virtualization. " height="198" width="560"&gt;
 &lt;figcaption&gt;
  &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Desktop virtualization centralizes management and access, but operating system licensing -- especially for macOS -- shapes how fully those benefits can be realized.
 &lt;/figcaption&gt;
 &lt;div class="main-article-image-enlarge"&gt;
  &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
 &lt;/div&gt;
&lt;/figure&gt; 
&lt;h3&gt;Hosted macOS&lt;/h3&gt; 
&lt;p&gt;In practice, hosted macOS environments are used primarily for development and testing rather than as general-purpose desktops for end users. The concept of hosting macOS works for two distinct cases: macOS development and macOS DaaS for user access. These two functionalities are not interchangeable.&lt;/p&gt; 
&lt;p&gt;Developers creating Apple-focused software can use a virtualized macOS desktop to develop and test the software. For example, an enterprise that provides an editing application may wish to have the application run on both Windows and Mac devices. Within the development environment, this could imply physical devices or VMs. Additionally, a virtual macOS desktop frees developers to work from a Windows device, if necessary.&lt;/p&gt; 
&lt;p&gt;It's easy to create a cloud-based development environment for Windows. Using the cloud minimizes costs and setup work, enhances flexibility and gives developers easy access to the environment. For example, if an error occurs during testing wherein an action programmatically generates an &lt;a href="https://www.techtarget.com/whatis/definition/infinite-loop-endless-loop"&gt;infinite loop&lt;/a&gt;, developers can gather forensics to fix the problem and then quickly and easily delete the virtual desktop. They can subsequently correct the issue and test again on a newly deployed Windows-based VM within minutes.&lt;/p&gt; 
&lt;p&gt;That type of setup was not available for Mac development until recently. While Mac developers can get mini devices for the lab, cloud-based application development and testing is a better option. However, Apple licensing controls what users can and cannot legally do with macOS software.&lt;/p&gt; 
&lt;h3&gt;Licensing for macOS&lt;/h3&gt; 
&lt;p&gt;Apple has stringent &lt;a target="_blank" href="https://www.apple.com/legal/sla/" rel="noopener"&gt;licensing requirements&lt;/a&gt; for macOS regarding hardware and shared services. First, macOS must run on designated Apple hardware, as per the licensing agreement. In addition, service providers or other shared services cannot use macOS because Apple doesn't allow virtualized copies or instances of its software in connection with services such as service bureaus, time-sharing or terminal sharing.&lt;/p&gt; 
&lt;p&gt;Apple allows remote desktop connections, though with some limitations. Although users can make multiple connections to a single Mac, only one remote session can control the Apple software; the other connections can only observe the connection. This limited connectivity stipulation severely curbs remote access functionality from both a business and technical perspective.&lt;/p&gt; 
&lt;p&gt;In late 2020, Apple introduced an aspect of licensing wherein service providers could offer hosting services specifically for developers to use. This section of the licensing agreement, called Leasing for Permitted Developer Services, likewise has strict requirements. However, it does legally allow providers such as AWS to &lt;a target="_blank" href="https://aws.amazon.com/pm/ec2-mac/" rel="noopener"&gt;offer macOS instances&lt;/a&gt; for development purposes. In addition, several smaller providers, such as MacStadium and MacinCloud, also provide cloud-based macOS instances for developers. Conditions for developer usage include lessee agreement, a minimum lease period of 24 hours and "sole and exclusive use and control." Activities covered include building software from source, automated testing and running the tools to carry out these activities.&lt;/p&gt; 
&lt;blockquote class="main-article-pullquote"&gt;
 &lt;div class="main-article-pullquote-inner"&gt;
  &lt;figure&gt;
   A key benefit of Windows-based DaaS is centralization and resource sharing, with an end result of lower costs.
  &lt;/figure&gt;
  &lt;i class="icon" data-icon="z"&gt;&lt;/i&gt;
 &lt;/div&gt;
&lt;/blockquote&gt; 
&lt;p&gt;The stipulations for Apple use have some ramifications for macOS-based DaaS. &lt;a name="_Hlk101346997"&gt;&lt;/a&gt;&lt;a href="https://www.techtarget.com/searchvirtualdesktop/news/252485353/Security-productivity-key-desktop-virtualization-benefits"&gt;Key benefits of DaaS&lt;/a&gt; for Windows include centralization and resource sharing, ultimately resulting in lower costs. As macOS licensing requires Apple hardware, disallows service bureau and sharing, and limits connectivity to one controlling session per device, service providers cannot offer macOS DaaS. On-premises deployments of macOS-based virtual desktops are technically possible, but this falls into a gray area of licensing and is costly.&lt;/p&gt; 
&lt;p&gt;Thus, Apple licensing now permits developers to lease macOS from service providers but prohibits access to DaaS for end users. For IT teams, this makes macOS DaaS a licensing constraint rather than a technology gap.&lt;/p&gt; 
&lt;h3&gt;DaaS operating system options&lt;/h3&gt; 
&lt;p&gt;Interest in desktop as a service based on macOS certainly exists, but it is not possible from a legal standpoint. Even if it were, the financial investment and costs would likely raise feasibility questions. There is little indication that Apple plans to change its licensing requirements. Apple derives significant profit from hardware -- closely coupling its hardware and software is its long-standing business model and key to its success. Apple continues to focus on tying OS functionality to its physical devices. Physical devices running iOS and macOS operating systems continue to proliferate. Supporting these Apple devices for remote access to Windows-based virtual desktops, therefore, shows no signs of slowing down.&lt;/p&gt; 
&lt;p&gt;An &lt;a href="https://www.techtarget.com/searchdatacenter/tip/8-things-to-know-when-switching-from-Windows-to-Linux"&gt;alternative to Windows-based DaaS is Linux VMs&lt;/a&gt;. If an organization seeks an OS other than Windows due to Microsoft's licensing costs or other requirements, Linux is an option worth considering. However, end users are far less familiar with Linux, so involving it in a user-facing technology could cause confusion. Further, some traditional software packages, such as Office 365 and Microsoft 365, aren't available for direct download onto a Linux machine. While there might be some use cases for Linux VMs, they face challenges from an integration and familiarity perspective for most enterprise users.&lt;/p&gt; 
&lt;p&gt;Because &lt;a href="https://www.techtarget.com/searchvirtualdesktop/tip/Benefits-of-multi-user-Windows-10-in-Windows-Virtual-Desktop"&gt;multi-user Windows 10 and 11&lt;/a&gt; is available only on Microsoft Azure, this functionality is a key feature of Azure Virtual Desktops. Other cloud providers -- including AWS and Google Cloud -- cannot offer multi-user Windows 10 or 11. However, 1-to-1 virtualized Windows 10 and 11 workstations are available. Because Windows OSes are not dependent on native Microsoft hardware, organizations have flexibility and can find ways to cut costs.&lt;/p&gt; 
&lt;p&gt;For most organizations, supporting Macs through Windows-based DaaS remains the most practical option, while true macOS DaaS remains limited by licensing rather than technology.&lt;/p&gt; 
&lt;p&gt;&lt;b&gt;Editor's note:&lt;/b&gt; &lt;i&gt;This article was updated in January 2026 to improve&lt;/i&gt;&lt;em&gt;&amp;nbsp;clarity, flow and the overall reader experience.&lt;/em&gt;&lt;/p&gt;</body>
            <description>When people discuss desktop as a service, it is usually in the context of Windows desktops. For macOS, however, implementing DaaS can be more complicated.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/keyboard_g164210754.jpg</image>
            <link>https://www.techtarget.com/searchvirtualdesktop/tip/Understanding-the-DaaS-options-for-Macs</link>
            <pubDate>Thu, 22 Jan 2026 10:30:00 GMT</pubDate>
            <title>Understanding the DaaS options for Macs</title>
        </item>
        <item>
            <body>&lt;p&gt;Ensuring secure remote access to corporate applications and data is a fundamental requirement for IT teams. However, the methods organizations use to provide that access have evolved. Desktop as a service (&lt;a href="https://www.techtarget.com/searchvirtualdesktop/definition/desktop-as-a-service-DaaS"&gt;DaaS&lt;/a&gt;) and virtual private network (&lt;a href="https://www.techtarget.com/searchnetworking/definition/virtual-private-network"&gt;VPN&lt;/a&gt;) are both popular options, but they address different issues and come with distinct advantages and disadvantages.&lt;/p&gt; 
&lt;p&gt;While both give remote users access to an organization's resources, DaaS and VPN differ in user-friendliness, performance, security and manageability. IT administrators should examine the similarities and differences between these two services to determine which one best suits their goals.&lt;/p&gt; 
&lt;h3&gt;What is DaaS?&lt;/h3&gt; 
&lt;p&gt;Desktop as a service gives end users access to a virtual desktop that is hosted in the cloud. With this option, IT admins can manage virtual desktops while the &lt;a href="https://www.techtarget.com/searchvirtualdesktop/tip/Compare-7-desktop-as-a-service-providers"&gt;DaaS provider&lt;/a&gt; handles the hosting infrastructure setup and management. When end users connect to the virtual desktop, the DaaS provider streams the screen of the virtual desktop over a network to the endpoint devices. The display signal of the desktop is the only data that goes to end users' personal devices.&lt;/p&gt; 
&lt;p&gt;End users might need access to a corporate application that requires a SQL database connection on the corporate network. With DaaS, the virtual desktop already has the application installed. The network the DaaS desktop is on has access to the SQL database. The only thing the end user must do is log into the DaaS offering, start the virtual desktop and open the application. The end user then has fast access to the SQL database because it's on the same network as the virtual desktop.&lt;/p&gt; 
&lt;p&gt;DaaS technology is centralized, allowing organizations to manage all aspects of deployment from a single administrative interface. If IT administrators need to apply an update to desktops or business applications, they can easily do so, and the update will be distributed immediately. Because DaaS gives IT the power to decide when a new version of the application is available to end users, with DaaS image management and virtualization software, the IT admin can run the update only once.&lt;/p&gt; 
&lt;p&gt;Popular DaaS offerings include Amazon Workspaces, Citrix Managed Desktops, Microsoft Azure Virtual Desktop and VMware Horizon Cloud.&lt;/p&gt; 
&lt;p&gt;In addition to DaaS, &lt;a href="https://www.techtarget.com/searchvirtualdesktop/definition/virtual-desktop-infrastructure-VDI"&gt;VDI&lt;/a&gt; is another option for organizations to deploy virtual desktops. Both give an end user remote access to a virtual desktop and corporate resources, but there are some important &lt;a href="https://www.techtarget.com/searchvirtualdesktop/feature/Compare-desktop-virtualization-options-DaaS-vs-VDI"&gt;differences between DaaS and VDI&lt;/a&gt;. With VDI, the organization creates, maintains and updates the virtual desktop environment. With DaaS, the DaaS provider handles these responsibilities for the back end and, in some cases, the front end of the deployment.&lt;/p&gt; 
&lt;h3&gt;What is a VPN?&lt;/h3&gt; 
&lt;p&gt;A &lt;a href="https://www.techtarget.com/searchnetworking/definition/virtual-private-network"&gt;VPN&lt;/a&gt; creates a tunnel, or agent, between two networks, allowing them to connect and transfer data. A business VPN enables end users to &lt;a href="https://www.techtarget.com/searchnetworking/answer/How-do-site-to-site-VPN-configuration-and-remote-access-VPNs-vary"&gt;connect to corporate resources&lt;/a&gt; such as applications and data. A business VPN works via a &lt;a href="https://www.techtarget.com/searchenterprisedesktop/definition/client"&gt;client&lt;/a&gt; on end-user personal devices. The client can connect a private network over a public network -- such as the internet -- between that device and the corporate network. Users upload and download data over this connection. The virtual network is created with a &lt;a href="https://www.techtarget.com/searchsecurity/definition/Secure-Sockets-Layer-SSL"&gt;secure sockets layer&lt;/a&gt; connection and is often end-to-end encrypted, enabling secure access between the networks.&lt;/p&gt; 
&lt;p&gt;Let's return to the example of an end user who needs access to a corporate application that requires a SQL database connection on the corporate network. The user signs into the VPN agent on the personal device, setting up the virtual network tunnel between the device and the corporate network. Because there is then a network connection through the VPN tunnel to the SQL database on the corporate network, the end user can start the corporate application locally from the device and it can reach this data. This makes VPN technology a decentralized approach.&lt;/p&gt; 
&lt;p&gt;With a VPN, every end-user device needs to have the corporate applications installed. The IT administrators must update every device when an application update is required as well. Because of this, VPN use is often combined with &lt;a href="https://www.techtarget.com/searchenterprisedesktop/feature/Understand-how-UEM-EMM-and-MDM-differ-from-one-another"&gt;endpoint management tools&lt;/a&gt; such as Microsoft Endpoint Manager. With endpoint management software, IT organizations can distribute applications and updates to all devices, often through the internet. With its configuration, IT can also push the VPN agent updates with an endpoint management tool.&lt;/p&gt; 
&lt;p&gt;Security is a significant consideration with VPNs. Users upload and download data when using a VPN, so data can end up on the end-user device. In addition, a VPN gives end users direct access to a part of the corporate network. If the connection gets hacked, for example, when using a weak or old digital certificate, the hacker has access to the company network. &lt;a href="https://www.techtarget.com/searchnetworking/definition/network-segmentation"&gt;Network segmentation&lt;/a&gt; with VPNs is essential. Common examples of VPN software include Cisco Systems VPN Client, F5 Networks FirePass SSL VPN, NordLayer VPN and OpenVPN.&lt;/p&gt; 
&lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/key_differences_between_daas_and_vpn-f.png "&gt;
 &lt;img data-src="https://www.techtarget.com/rms/onlineimages/key_differences_between_daas_and_vpn-f_mobile.png " class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/key_differences_between_daas_and_vpn-f_mobile.png  960w,https://www.techtarget.com/rms/onlineimages/key_differences_between_daas_and_vpn-f.png  1280w" alt="A Venn diagram showing the similarities and differences between DaaS and VPN." height="308" width="560"&gt;
 &lt;div class="main-article-image-enlarge"&gt;
  &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
 &lt;/div&gt;
&lt;/figure&gt; 
&lt;h3&gt;How are DaaS and VPN different?&lt;/h3&gt; 
&lt;p&gt;Both DaaS and VPN give &lt;a href="https://www.techtarget.com/searchsecurity/Ultimate-guide-to-secure-remote-access"&gt;secure remote access to applications and data&lt;/a&gt;, but the two options are rather different. The choice increasingly comes down to how much control, isolation and operational overhead an organization is willing to manage internally.&lt;/p&gt; 
&lt;p&gt;VPNs are easy to set up on both the end-user and administrative sides. They enable IT to onboard end users quickly. A new user downloads the VPN client, signs in and accesses the corporate network. With DaaS, the IT organization must give each new user a desktop, profile, home drive folder and other specific items, which might require more setup work than a VPN.&lt;/p&gt; 
&lt;p&gt;A VPN goes into the company network and, in doing so, provides access to applications and data. With corporate data and applications at stake, &lt;a href="https://www.techtarget.com/searchnetworking/tip/How-to-implement-network-segmentation-for-better-security"&gt;security considerations include network segmentation&lt;/a&gt;, endpoint management and decentralizing applications. VPNs also rely heavily on internet quality for both the speed and the stability of the application. If, for example, an end user loses connection while updating a database, the database can get out of sync, with destructive results. Of course, VPNs require stable internet access as well, but if there are any network issues, a desktop running a VPN can still access local applications, documents and other aspects that don't rely on a secure internet connection.&lt;/p&gt; 
&lt;blockquote class="main-article-pullquote"&gt;
 &lt;div class="main-article-pullquote-inner"&gt;
  &lt;figure&gt;
   Security is a significant consideration with VPNs. Users upload and download data when using a VPN, so data can end up on the end-user device.
  &lt;/figure&gt;
  &lt;i class="icon" data-icon="z"&gt;&lt;/i&gt;
 &lt;/div&gt;
&lt;/blockquote&gt; 
&lt;p&gt;With DaaS, the virtual desktop is in the corporate network, so data and applications do not leave the network. Users only receive the display from the desktop, making DaaS more secure than a VPN connection. This also means it's less reliant on an internet connection. Protocols such as Citrix HDX, Microsoft RDP and VMware Horizon (formerly View) optimize bandwidth by sending the user only the part of the screen that is updated, and they can scale in quality.&lt;/p&gt; 
&lt;p&gt;A disconnect while updating a database is not a problem with DaaS. The virtual desktop in the data center is talking to the database. Any &lt;a href="https://www.techtarget.com/searchvirtualdesktop/tip/Top-5-remote-desktop-connectivity-problems-and-how-to-prevent-them"&gt;disruptions in connectivity&lt;/a&gt; between the virtual desktop server and endpoint device will not affect the database update on the server side. When users sign back in after an interruption, they will be back at the same point where they left their sessions. This also lets users switch between personal devices. Users can start a session on a PC, then disconnect in the morning and pick the session back up in the afternoon on a laptop.&lt;/p&gt; 
&lt;h3&gt;Deciding between DaaS and VPN&lt;/h3&gt; 
&lt;p&gt;If an organization needs to make one application on the corporate network available for end users from the internet, for example, DaaS might be too complex, as it creates an entire virtual desktop for each user. But if security is an organization's main concern, then DaaS might be the best option, even for just one application.&lt;/p&gt; 
&lt;p&gt;Organizations should also keep in mind that DaaS and VPN are both technologies for legacy applications and data. For example, if an organization migrates all its data to a cloud platform such as &lt;a href="https://www.techtarget.com/searchcontentmanagement/definition/Microsoft-SharePoint-2016"&gt;SharePoint&lt;/a&gt; in Microsoft 365, users can automatically access the data through the internet without DaaS or VPN. This is also the case with SaaS applications. Additionally, web applications on the corporate network can be made internet-facing with an authenticated application proxy.&lt;/p&gt; 
&lt;p&gt;As application architectures increasingly shift toward software as a service (SaaS) and browser-based access, many organizations are likely to rely less on DaaS and VPN for their daily operations. However, both technologies will continue to be essential for legacy systems, specialized workloads, and environments with high security or control requirements.&lt;/p&gt; 
&lt;p&gt;&lt;b&gt;Editor's note:&lt;/b&gt; &lt;i&gt;This article was updated in January 2026 to&lt;/i&gt; &lt;em&gt;improve clarity, flow and the overall reader experience.&lt;/em&gt;&lt;/p&gt; 
&lt;p&gt;&lt;i&gt;Chris Twiest works as a technology officer at RawWorks in the Netherlands, focusing on the future Workspace and Cloud technologies for the end user.&lt;/i&gt;&lt;/p&gt;</body>
            <description>DaaS and VPN both provide remote access to corporate resources, but they differ in important ways that IT leaders should evaluate when choosing between them.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/folder-files05.jpg</image>
            <link>https://www.techtarget.com/searchvirtualdesktop/tip/What-are-the-key-differences-between-DaaS-and-VPN</link>
            <pubDate>Wed, 21 Jan 2026 04:30:00 GMT</pubDate>
            <title>What are the key differences between DaaS and VPN?</title>
        </item>
        <item>
            <body>&lt;p&gt;Desktop as a service (&lt;a href="https://www.techtarget.com/searchvirtualdesktop/definition/desktop-as-a-service-DaaS"&gt;DaaS&lt;/a&gt;) has become a popular option for organizations rethinking how employees access corporate desktops and applications. In addition to enabling remote work, DaaS is crucial for security, scalability and operational control. This is especially important as IT teams strive to reduce infrastructure costs while efficiently managing access to enterprise resources.&lt;/p&gt; 
&lt;p&gt;One way to deploy virtual desktops is DaaS, where desktop OSes run inside VMs on servers in a third-party cloud provider's data center. Organizations can also implement &lt;a href="https://www.techtarget.com/searchvirtualdesktop/definition/virtual-desktop-infrastructure-VDI"&gt;VDI&lt;/a&gt; -- which entails building out their own virtualization infrastructure and running desktop OSes on on-premises servers -- or stick with traditional desktops.&lt;/p&gt; 
&lt;p&gt;DaaS outsources the work of hosting virtual desktops to a third-party provider. It does not require a substantial initial investment like VDI does, so DaaS stands out for its easy and inexpensive setup. Still, IT administrators should weigh the full set of tradeoffs -- not just cost -- to determine whether desktop as a service is the right fit for their organizations.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="Pros of DaaS"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Pros of DaaS&lt;/h2&gt;
 &lt;p&gt;For many organizations, the appeal of DaaS lies in its ability to simplify desktop delivery while shifting infrastructure and operational responsibility to a cloud provider.&lt;/p&gt;
 &lt;h3&gt;Lower upfront costs&lt;/h3&gt;
 &lt;p&gt;One of the most significant advantages of DaaS is that &lt;a href="https://www.techtarget.com/searchvirtualdesktop/answer/What-are-the-biggest-pros-and-cons-of-VDI"&gt;it offers lower upfront costs than VDI&lt;/a&gt;&amp;nbsp;or regular desktops. VDI requires a costly infrastructure investment to get started, whereas DaaS is typically priced per user. Organizations that want to test virtualization can turn to DaaS and skip the costs and labor of building a VDI when they might want to change their desktop virtualization approach years down the road. The subscription model also makes the costs involved in DaaS more predictable over the long term.&lt;/p&gt;
 &lt;p&gt;DaaS can also reduce license costs by making it easy to provision and deprovision virtual desktops as needed. For startups looking to onboard employees quickly, DaaS can help scale up quickly and inexpensively. Likewise, &lt;a href="https://www.techtarget.com/searchvirtualdesktop/feature/Comparing-DaaS-vs-SaaS-and-how-they-work"&gt;the scalability of desktop as a service&lt;/a&gt;&amp;nbsp;can have cost benefits for organizations that employ seasonal workers. Once the season is over and these employees leave, the virtual desktops they used can be easily deprovisioned, eliminating license costs for those desktops.&lt;/p&gt;
 &lt;h3&gt;Flexibility&lt;/h3&gt;
 &lt;p&gt;The scalability of DaaS is also beneficial on a logistical level for organizations and their IT teams. If an organization wants to scale up, IT can update the DaaS subscription rather than increasing VDI capacity by adding additional hardware. This is especially helpful for organizations that don't know what scale they want; DaaS can adjust to fluctuations in virtual desktop numbers without requiring any reworking.&lt;/p&gt;
 &lt;p&gt;DaaS also offers flexibility in the &lt;a href="https://www.techtarget.com/searchenterprisedesktop/opinion/DaaS-may-encourage-organizations-to-adopt-Macs-and-Chromebooks"&gt;variety of endpoints cloud providers can easily support&lt;/a&gt;&amp;nbsp;out of the box. No matter what type of device a user chooses to work on, the desktop environment is identical if it has the necessary display resolution and remote desktop client software. DaaS generally offers the same UX as VDI, but the ability to choose from &lt;a href="https://www.techtarget.com/searchvirtualdesktop/opinion/PC-as-a-service-is-an-alternative-and-a-complement-to-DaaS"&gt;a wider range of endpoints&lt;/a&gt; and locations to work from and maintain an acceptable desktop environment can result in a better experience for end users.&lt;/p&gt;
 &lt;h3&gt;Broader accessibility&lt;/h3&gt;
 &lt;p&gt;Desktop as a service is available from anywhere, on any device. Because the virtual desktops are hosted in the cloud, they are accessible anywhere, as long as power and internet connectivity are available. With VDI, on the other hand, users must connect to their organization's corporate network directly or via a &lt;a href="https://www.techtarget.com/searchnetworking/answer/What-are-the-differences-between-VPN-and-VDI-services"&gt;VPN to access their virtual desktops&lt;/a&gt;, which requires further security considerations.&lt;/p&gt;
 &lt;p&gt;The rise of remote work has highlighted the value of DaaS for organizations that want to ensure business continuity amid circumstances such as the COVID-19 pandemic. DaaS's ability to support a variety of endpoints is especially helpful for facilitating remote work. Even if users have PCs at home, they can still access a virtual desktop with DaaS.&lt;/p&gt;
 &lt;p&gt;Some DaaS providers offer browser accessibility. This is a secure and simple way for users to access DaaS. Rather than installing the virtual desktop, a user can log in to a browser-accessible virtual desktop from any supported browser. Some examples of this option include the Web Access feature in Amazon WorkSpaces, Azure Virtual Desktop web client and DesktopReady.&lt;/p&gt;
 &lt;h3&gt;Easier setup and management&lt;/h3&gt;
 &lt;p&gt;Setting up DaaS is easy for IT. The most critical step is &lt;a href="https://www.techtarget.com/searchvirtualdesktop/tip/Compare-7-desktop-as-a-service-providers"&gt;choosing the best DaaS provider&lt;/a&gt;&amp;nbsp;to meet the organization's needs.&lt;/p&gt;
 &lt;p&gt;DaaS is an easier option for IT after setup as well. &lt;a href="https://www.techtarget.com/searchvirtualdesktop/opinion/Forecasting-VDI-trends-and-the-future-of-the-market"&gt;To successfully deploy and maintain VDI&lt;/a&gt;, IT departments must have the skill set and sufficient employees to stay on top of updates, data traffic and troubleshooting. DaaS providers have the resources and expertise to reliably address many of these concerns, enabling IT teams to focus on issues specific to their organizations. This can also provide security benefits. IT has less control over security with desktop as a service, but a DaaS provider likely has more up-to-date tools and knowledge, which can help IT manage and prevent any issues.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/virt_desktop-vdi_vs_daas-f.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/virt_desktop-vdi_vs_daas-f_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/virt_desktop-vdi_vs_daas-f_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/virt_desktop-vdi_vs_daas-f.png 1280w" alt="A chart comparing the infrastructure, management and cost differences between VDI and DaaS." height="247" width="560"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;This shows how VDI and DaaS compare when it comes to infrastructure, management and cost. 
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
&lt;/section&gt;                
&lt;section class="section main-article-chapter" data-menu-title="Cons of DaaS"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Cons of DaaS&lt;/h2&gt;
 &lt;p&gt;Those same characteristics can introduce tradeoffs around cost, customization and control that become more visible as deployments scale.&lt;/p&gt;
 &lt;h3&gt;Potentially higher long-term costs&lt;/h3&gt;
 &lt;p&gt;While DaaS is less expensive than VDI in terms of initial investments, over time, the subscription costs that come with DaaS might accumulate to be higher than the &lt;a href="https://www.techtarget.com/searchvirtualdesktop/tip/How-do-Citrix-and-VMwares-on-premises-VDI-costs-compare"&gt;upfront costs of VDI&lt;/a&gt;.&lt;/p&gt;
 &lt;p&gt;Additionally, depending on the licensing models a vendor offers, DaaS can have higher license costs to account for the effort required to host virtual desktops. Most DaaS providers bundle the OS license with the cost of the virtual desktop, but organizations must weigh their options and keep these factors in mind to &lt;a href="https://www.techtarget.com/searchvirtualdesktop/tip/How-to-keep-DaaS-pricing-stable-and-consistent"&gt;ensure that desktop as a service is the best approach financially&lt;/a&gt;. Pricing for DaaS is still more predictable and consistent than for VDI, but it's not necessarily less expensive in the long term.&lt;/p&gt;
 &lt;h3&gt;Less customizability&lt;/h3&gt;
 &lt;p&gt;Another con of DaaS is that the one-size-fits-all approach also might not be ideal for every organization. Security and compliance regulations vary by organization, so finding a DaaS package that fits perfectly can be difficult. Because organizations build it in-house, &lt;a href="https://www.techtarget.com/searchvirtualdesktop/feature/VDI-applications-maintain-many-use-case-advantages-over-DaaS"&gt;VDI enables IT to make more customizations&lt;/a&gt; -- such as disabling certain services for users -- to meet compliance standards and ensure VDI security. If an organization with strict compliance regulations wants to use DaaS to implement virtual desktops, choosing a provider that prioritizes these standards is vital.&lt;/p&gt;
 &lt;p&gt;For example, Evolve IP Workspaces is a DaaS provider that is third-party-audited to meet compliance standards, such as HIPAA or &lt;a href="https://www.techtarget.com/whatis/definition/General-Data-Protection-Regulation-GDPR"&gt;GDPR&lt;/a&gt;. Providers that don't specifically take certain compliance standards into account should allow IT to check compliance measures or control the hypervisors' configurations and customize features.&lt;/p&gt;
 &lt;p&gt;Some DaaS packages won't have everything an organization might want. Different vendors offer different levels of customizability, and some offer more advanced management capabilities than others.&lt;/p&gt;
 &lt;h3&gt;Less control&lt;/h3&gt;
 &lt;p&gt;Desktop as a service offers little control over updates and security in general, which can lead to problems that IT cannot directly address. Many of these issues stem from the hosting concerns that come with using a public cloud. For example, if the public cloud hosting the virtual desktops experiences an outage, an organization's productivity comes to a halt.&lt;/p&gt;
 &lt;p&gt;Security is a significant factor in both the pros and cons of DaaS. Because having all resources in a single location -- such as a DaaS vendor's public cloud -- can help security, DaaS might seem like the most secure desktop virtualization option. Additionally, some organizations might prefer the security a vendor can guarantee rather than trusting IT staff to maintain a perfect security posture. However, some IT teams might be better prepared to handle their organization's unique security strategy than a third-party provider, and admins must &lt;a href="https://searchcloudsecurity.techtarget.com/tip/Top-cloud-security-challenges-and-how-to-combat-them"&gt;consider cloud security concerns&lt;/a&gt; with DaaS.&lt;/p&gt;
 &lt;p&gt;Not having full control over connectivity can put organizations in situations where they are unable to do anything about it. If there's a connectivity issue, IT has less insight into the network and must wait for the provider to fix it. And while UX might be better and easier to ensure with DaaS, if there are UX issues, the IT team can't handle them directly.&lt;/p&gt;
 &lt;p&gt;For IT leaders, the decision to adopt DaaS is less about whether the technology is effective and more about determining where responsibility and control should reside. While DaaS can alleviate operational burdens and enhance flexibility, it also transfers essential aspects of desktop management to a third party. It is crucial to understand these trade-offs and how they align with the organization's security, access, and long-term infrastructure strategies to make an informed decision.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Editor’s note:&lt;/b&gt; &lt;i&gt;This article was updated in January 2026 to &lt;em&gt;improve clarity, flow and the overall reader experience.&lt;/em&gt;&lt;/i&gt;&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>Desktop as a service stands out for its scalability, but IT admins should also keep factors such as customizability in mind when considering their desktop virtualization options.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/competition_a299069360.jpg</image>
            <link>https://www.techtarget.com/searchvirtualdesktop/feature/What-are-the-pros-and-cons-of-DaaS</link>
            <pubDate>Tue, 20 Jan 2026 13:30:00 GMT</pubDate>
            <title>What are the pros and cons of DaaS?</title>
        </item>
        <item>
            <body>&lt;p&gt;Many organizations adopt VDI for streamlined management and greater flexibility. In some sectors, its true strength lies in enhanced security.&lt;/p&gt; 
&lt;p&gt;Organizations in highly regulated industries such as healthcare or finance operate under multiple &lt;a href="https://www.techtarget.com/searchsecurity/tip/IT-security-frameworks-and-standards-Choosing-the-right-one"&gt;compliance frameworks&lt;/a&gt;. A healthcare organization, for example, might be subject to the overlapping requirements associated with HIPAA, GDPR and other regulatory statutes. These regulations ensure data protection, privacy and accountability through auditable controls.&lt;/p&gt; 
&lt;p&gt;As stringent as these standards might be, however, it's ultimately up to the organization to choose technology that will enable it to meet all the requirements. In some cases, an organization might be able to simplify compliance by &lt;a target="_blank" href="https://omdia.tech.informa.com/om138151/vdi-and-daas-trends-in-the-hybrid-digital-workplace" rel="noopener"&gt;adopting VDI&lt;/a&gt; rather than relying on traditional endpoint computing.&lt;/p&gt; 
&lt;p&gt;VDI enables users to work from virtual desktops, which are essentially VMs running desktop OSes. These VMs can be hosted on-premises or in the cloud. Users typically access these VMs from thin client devices. This has benefits for both mobility and security.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="Why VDI aligns with regulatory compliance goals"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Why VDI aligns with regulatory compliance goals&lt;/h2&gt;
 &lt;p&gt;In highly regulated industries, failing to comply with data protection standards can lead to significant financial penalties, reputational damage and operational disruptions. VDI offers executives a strategic tool to reduce these risks while supporting business continuity and digital transformation initiatives.&lt;/p&gt;
 &lt;p&gt;In a VDI environment, users do all their work from VMs running desktop OSes. Like virtual servers, these virtual desktops are hosted centrally and fully controlled by the organization. IT teams can then manage desktop configurations consistently, reduce the attack surface and ensure that OSes and apps are configured to meet the organization's regulatory standards.&lt;/p&gt;
 &lt;blockquote class="main-article-pullquote"&gt;
  &lt;div class="main-article-pullquote-inner"&gt;
   &lt;figure&gt;
    No regulatory framework requires the use of VDI, but in many cases, VDI adoption can make it a lot easier to meet regulatory requirements.
   &lt;/figure&gt;
   &lt;i class="icon" data-icon="z"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/blockquote&gt;
 &lt;p&gt;Another advantage of using virtual desktops is that it eliminates any possibility of users saving sensitive data directly to their own devices. Instead, all corporate data stays within the virtual desktop environment.&lt;/p&gt;
 &lt;p&gt;Using VDI can also simplify audit readiness in regulated industries. Most VDI platforms include built-in &lt;a href="https://www.techtarget.com/searchvirtualdesktop/feature/Monitor-VDI-with-these-top-tools"&gt;monitoring and logging tools&lt;/a&gt;. This makes it easy for IT to track user activity, enforce policies and maintain evidence of compliance.&lt;/p&gt;
 &lt;p&gt;&lt;a name="_Hlk217382148"&gt;&lt;/a&gt;No regulatory framework requires the use of VDI, but in many cases, VDI adoption can make it a lot easier to meet regulatory requirements.&lt;/p&gt;
 &lt;h3&gt;VDI capabilities that support compliance&lt;/h3&gt;
 &lt;p&gt;Various VDI capabilities directly support compliance. Key capabilities include the following:&lt;/p&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Centralized data management.&lt;/b&gt; Data never leaves the virtual desktop environment, meaning users can't transfer it to local devices or removable media.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Encryption.&lt;/b&gt; Virtual desktops encrypt sensitive data while it's in transit and at rest.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;User session isolation.&lt;/b&gt; Each user session runs in a dedicated and isolated VM. This means users can safely share a physical endpoint with one another without any chance of leaving behind sensitive data on the device.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Audit logging.&lt;/b&gt; Most VDI platforms support audit logging for user authentication, login and logoff events, resource access and administrative actions.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Risk avoidance.&lt;/b&gt; No data loss or data exposure can occur if a physical device is lost or stolen.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Incident containment.&lt;/b&gt; If a user's session becomes compromised, IT can easily terminate that session without impacting other users.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;h3&gt;Using VDI to handle industry-specific compliance challenges&lt;/h3&gt;
 &lt;p&gt;Some requirements, such as encryption, are almost universally applicable to all regulated industries. At the same time, each sector tends to also have its own unique challenges. In some cases, these challenges stem from specific regulatory standards. In other cases, the challenges relate to common working practices within the industry. VDI can be helpful &lt;a target="_blank" href="https://www.smartcitiesdive.com/news/archive-acc-empowering-public-sector-it-overcoming-security-compliance-and-access-challenges/754773/" rel="noopener"&gt;across these environments&lt;/a&gt;.&lt;/p&gt;
 &lt;div class="youtube-iframe-container"&gt;
  &lt;iframe id="ytplayer-0" src="https://www.youtube.com/embed/Ejr7F6iVYuE?autoplay=0&amp;amp;modestbranding=1&amp;amp;rel=0&amp;amp;widget_referrer=null&amp;amp;enablejsapi=1&amp;amp;origin=https://www.techtarget.com" type="text/html" height="360" width="640" frameborder="0"&gt;&lt;/iframe&gt;
 &lt;/div&gt;
 &lt;p&gt;In healthcare, for example, clinicians often work from shared workstations. A single clinician might log in from several different locations over the course of their shift. VDI can help make a clinician's work easier -- without creating a HIPAA violation in the process. An organization might create persistent virtual desktops, meaning that each user account is mapped to a specific virtual desktop as opposed to a generic pool of virtual desktops. In other words, the clinician's desktop can follow them from machine to machine as they move throughout the facility. Better still, when a clinician signs out, nothing from the user's session remains on the shared PC. This prevents the accidental exposure of sensitive data.&lt;/p&gt;
 &lt;p&gt;VDI can also be a good fit for organizations in the financial services sector. Because financial institutions are &lt;a href="https://www.techtarget.com/searchsecurity/feature/Top-10-ransomware-targets-in-2021-and-beyond"&gt;high-value targets for attackers&lt;/a&gt;, regulatory frameworks require them to implement controls preventing data exfiltration. VDI works extremely well for this. Since data never resides directly on a physical endpoint device, a user cannot copy data to removable media. Additionally, VDI meshes well with zero-trust models.&lt;/p&gt;
&lt;/section&gt;               
&lt;section class="section main-article-chapter" data-menu-title="Best practices for compliance-focused VDI deployments"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Best practices for compliance-focused VDI deployments&lt;/h2&gt;
 &lt;p&gt;Before committing to a VDI adoption, an organization should make sure the investment fits into its overall strategy. Perform a thorough assessment to determine whether VDI can support scalable IT operations and broader business goals.&lt;/p&gt;
 &lt;p&gt;It's also important to consider the total cost of ownership. Licensing and deployment costs for VDI can exceed those of traditional endpoint devices. Conversely, decision-makers should weigh the potential savings from reduced data breach risk and streamlined audit processes.&lt;/p&gt;
 &lt;figure class="main-article-image half-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/virt_desktop-8_vdi_deployment_factors-h.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/virt_desktop-8_vdi_deployment_factors-h_half_column_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/virt_desktop-8_vdi_deployment_factors-h_half_column_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/virt_desktop-8_vdi_deployment_factors-h.png 1280w" alt="List of eight VDI deployment factors." data-credit="Informa TechTarget" height="373" width="279"&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;p&gt;Next, the organization should choose how to configure the virtual desktops based on both functionality and regulatory requirements. Admins must decide, for example, whether to use &lt;a href="https://www.techtarget.com/searchvirtualdesktop/feature/Understanding-nonpersistent-vs-persistent-VDI"&gt;persistent or non-persistent virtual desktops&lt;/a&gt;, or a mixture of the two. Likewise, the organization must make sure its VDI platform of choice has a setting for controlling logging retention, and that the platform supports an adequate retention period.&lt;/p&gt;
 &lt;p&gt;Organizations in regulated industries typically need to meet data residency requirements as well. Be sure to host the virtual desktops in locations that satisfy those rules.&lt;/p&gt;
 &lt;p&gt;After confirming that a VDI deployment will meet the organization's compliance requirements, consider performing a pilot deployment. This helps ensure that the virtual desktops perform sufficiently and can fully meet users' needs. A &lt;a href="https://www.techtarget.com/searchvirtualdesktop/tip/Important-end-user-experience-monitoring-metrics-for-VDI"&gt;consistent, positive end-user experience&lt;/a&gt; is key to functionality.&lt;/p&gt;
&lt;/section&gt;       
&lt;section class="section main-article-chapter" data-menu-title="Common pitfalls to avoid for VDI compliance"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Common pitfalls to avoid for VDI compliance&lt;/h2&gt;
 &lt;p&gt;While VDI can simplify compliance efforts, there are some common issues IT should avoid.&lt;/p&gt;
 &lt;p&gt;Some IT teams make the mistake of treating VDI adoption as a simple lift-and-shift migration. Use the migration process as an opportunity to ensure that everything is configured properly rather than just trying to create a clone of a physical desktop.&lt;/p&gt;
 &lt;p&gt;Another pitfall is failing to &lt;a href="https://www.techtarget.com/searchcio/tip/Prep-a-compliance-audit-checklist-that-auditors-want-to-see"&gt;document controls for auditors&lt;/a&gt;. It's important to document all settings and security controls as the team works through the implementation process.&lt;/p&gt;
 &lt;p&gt;Finally, don't overlook monitoring for administrators and other privileged users. Remember, the monitoring requirements don't go away simply because an organization has made the switch to virtual desktops.&lt;/p&gt;
 &lt;p&gt;With careful implementation and monitoring, VDI helps organizations maintain security and operational efficiency. In highly regulated industries, IT leaders should consider it as part of their compliance strategy.&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Brien Posey is a former 22-time Microsoft MVP and a commercial astronaut candidate. In his more than 30 years in IT, he has served as a lead network engineer for the U.S. Department of Defense and a network administrator for some of the largest insurance companies in America. &lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>Regulatory compliance is a crucial but challenging objective for many organizations. VDI can support compliance goals by strengthening security and simplifying the audit process.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/security_g1192070289.jpg</image>
            <link>https://www.techtarget.com/searchvirtualdesktop/feature/How-VDI-supports-compliance-in-regulated-industries</link>
            <pubDate>Tue, 30 Dec 2025 14:00:00 GMT</pubDate>
            <title>How VDI supports compliance in regulated industries</title>
        </item>
        <item>
            <body>&lt;p&gt;When organizations take their desktops to the cloud with desktop as a service (DaaS), they must consider both functionality and cost.&lt;/p&gt; 
&lt;p&gt;Although DaaS adoption can have some financial advantages, without proper planning, costs can spiral out of control. In fact, the cost of using &lt;a href="https://www.techtarget.com/searchvirtualdesktop/feature/Compare-desktop-virtualization-options-DaaS-vs-VDI"&gt;virtual desktops in the cloud&lt;/a&gt; can sometimes exceed the cost of physical desktops.&lt;/p&gt; 
&lt;p&gt;For a positive ROI, IT must assess current and future desktop requirements, model costs under different licensing scenarios and select a DaaS provider that balances flexibility with predictable pricing.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="1. Know the use cases for DaaS"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;1.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Know the use cases for DaaS&lt;/h2&gt;
 &lt;p&gt;Before an organization shops for virtual desktops, it's important to determine how many virtual desktops it needs and how it plans to use them. Most &lt;a href="https://www.techtarget.com/searchvirtualdesktop/tip/Compare-7-desktop-as-a-service-providers"&gt;DaaS providers&lt;/a&gt; offer a variety of virtual desktops, each with their own hardware configuration. A low-end virtual desktop might be budget-friendly, but it probably can't meet the needs of power users. Likewise, a user who spends their entire day using lightweight applications such as Microsoft Word or Outlook probably doesn't need a virtual desktop built on the most powerful hardware.&lt;/p&gt;
 &lt;p&gt;Taking the time upfront to determine how employees will use their virtual desktops makes it easier to figure out what virtual desktop size can meet their needs -- without going overboard. Proper sizing, in turn, maximizes workforce productivity, controls costs and supports long-term scalability. Having this information also makes it easier to get a price quote from DaaS vendors.&lt;/p&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="2. Plan for growth"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;2.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Plan for growth&lt;/h2&gt;
 &lt;p&gt;Although IT admins must initially choose the size of the virtual desktops their organization will use, they should also keep &lt;a target="_blank" href="https://omdia.tech.informa.com/om138151/vdi-and-daas-trends-in-the-hybrid-digital-workplace" rel="noopener"&gt;future growth&lt;/a&gt; in mind. A flexible DaaS strategy enables organizations to adjust resources in real time while minimizing capital expenditures.&lt;/p&gt;
 &lt;p&gt;Applications tend to become more demanding over time, and users might eventually need additional computing power or memory. Some organizations address this concern by purchasing virtual desktops that are slightly larger than what the users currently need, with the idea that users will eventually "grow into them." While this approach works, it also means paying for hardware resources that the organization might not use right away.&lt;/p&gt;
 &lt;p&gt;Another approach is to talk to the DaaS provider about flexibility. Many providers enable customers to upgrade to larger virtual desktops as their needs change.&lt;/p&gt;
 &lt;p&gt;When planning for growth, make sure that the DaaS provider allows customers to purchase additional virtual desktops at any time, rather than requiring them to wait for the current subscription period to expire. Additionally, any newly purchased virtual desktops should be billed at the same rate as the virtual desktops that the organization is already using, rather than a new rate.&lt;/p&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="3. Know how the virtual desktops are licensed"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;3.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Know how the virtual desktops are licensed&lt;/h2&gt;
 &lt;p&gt;Purchasing virtual desktops in the cloud might not always be as simple as specifying the desired quantity and size of virtual desktops. Some providers license virtual desktops on a per-user basis, requiring each user to have their own virtual desktop.&lt;/p&gt;
 &lt;p&gt;Other providers don't license by user count but instead restrict access so that only one user can log on to a virtual desktop at a time. Organizations that operate multiple shifts can benefit from this model, as users working different shifts never access virtual desktops simultaneously. Then, the organization only needs to license as many virtual desktops as it plans to have in use during a given shift.&lt;/p&gt;
 &lt;p&gt;Although it's less common, there are also providers that support multi-session desktops. This means that two or more clients can connect to a single virtual desktop at the same time. While this approach generally requires more powerful virtual desktop hardware, an organization might be able to license fewer virtual desktops.&lt;/p&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="4. Know what's included in the licensing"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;4.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Know what's included in the licensing&lt;/h2&gt;
 &lt;p&gt;Every DaaS provider offers different licensing models and tiers for IT pros to consider, and it's important to know what the license includes. Understanding licensing models is critical for controlling costs, supporting compliance and avoiding audit penalties.&lt;/p&gt;
 &lt;p&gt;DaaS uses a &lt;a href="https://www.techtarget.com/searchcloudcomputing/definition/consumption-based-pricing-model"&gt;consumption-based pricing model&lt;/a&gt;, with customers paying only for the resources that they use. Many DaaS providers bill their customers at a flat rate, based on the number and size of virtual desktops they purchase. However, there are DaaS providers that charge extra based on the internet bandwidth, storage and other resources users consume.&lt;/p&gt;
 &lt;p&gt;In addition to the pricing model, admins must consider what services the provider includes. For example, some providers handle patch management as a part of the DaaS subscription, while others don't.&lt;/p&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="5. Consider how software licensing affects total cost of ownership"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;5.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Consider how software licensing affects total cost of ownership&lt;/h2&gt;
 &lt;p&gt;Most DaaS providers focus on offering virtual desktops preloaded with a specific OS. It's ultimately up to clients to license additional software users might need to run on those virtual desktops.&lt;/p&gt;
 &lt;blockquote class="main-article-pullquote"&gt;
  &lt;div class="main-article-pullquote-inner"&gt;
   &lt;figure&gt;
    Organizations can save money by canceling any subscriptions that DaaS renders unnecessary.
   &lt;/figure&gt;
   &lt;i class="icon" data-icon="z"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/blockquote&gt;
 &lt;p&gt;In some cases, an organization might already have some of the licenses it needs. For example, the Microsoft 365 E3 and E5 subscriptions include licenses for various Office apps, such as Word, Excel and PowerPoint. Some &lt;a href="https://www.techtarget.com/searchenterprisedesktop/tip/Whats-included-in-Microsoft-365-subscription-plans"&gt;Microsoft 365 subscriptions&lt;/a&gt; also include access to tools, such as Intune, which IT might be able to use to manage virtual desktops.&lt;/p&gt;
 &lt;p&gt;Organizations should also consider whether the management software they currently use will still be helpful or necessary after transitioning to DaaS. While such tools might be capable of managing virtual desktops in the cloud, it's possible that a DaaS offering comes with its own management software, making third-party management tools redundant. Organizations can save money by canceling any subscriptions that DaaS renders unnecessary.&lt;/p&gt;
 &lt;p&gt;SaaS bundles and vendor ecosystem pricing can also help reduce costs. Some virtual desktop platforms are available as &lt;a href="https://www.techtarget.com/searchvirtualdesktop/feature/Comparing-DaaS-vs-SaaS-and-how-they-work"&gt;part of larger SaaS software&lt;/a&gt; offerings. This can be cost-effective for organizations that already use or plan to adopt other services in the same ecosystem. However, if an organization doesn't need everything that's included in the bundle, it might be better off making an a la carte DaaS purchase.&lt;/p&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="6. Lock in DaaS pricing for new users and annual renewals"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;6.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Lock in DaaS pricing for new users and annual renewals&lt;/h2&gt;
 &lt;p&gt;IT pros should be aware of any possible discounts that could apply to their organization. Discounts might align with their number of users, storage consumption or subscription term. For example, some providers offer a promotional rate to organizations that commit to a three-year subscription instead of the standard one-year term.&lt;/p&gt;
 &lt;p&gt;Locking into a longer subscription can sometimes provide cost benefits beyond just upfront savings. DaaS providers tend to raise their rates over time, so opting for a longer subscription period might help shield an organization from rate hikes.&lt;/p&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="7. Ask lots of questions when comparing DaaS vendors"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;7.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Ask lots of questions when comparing DaaS vendors&lt;/h2&gt;
 &lt;p&gt;Administrators should always ask plenty of questions as they research their DaaS options. In fact, it's a good idea to keep a list of questions on hand. By asking every vendor the same questions, decision-makers can get a comprehensive view of each offering's technical features and pricing model. This makes it easier to conduct an accurate and thorough comparison and get the best possible price.&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Brien Posey is a former 22-time Microsoft MVP and a commercial astronaut candidate. In his more than 30 years in IT, he has served as a lead network engineer for the U.S. Department of Defense and a network administrator for some of the largest insurance companies in America. &lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>An effective DaaS deployment delivers business agility without unnecessary costs. Evaluate users' virtual desktop needs from the outset to keep DaaS costs stable in the long term.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/money_g1021600178.jpg</image>
            <link>https://www.techtarget.com/searchvirtualdesktop/tip/How-to-keep-DaaS-pricing-stable-and-consistent</link>
            <pubDate>Fri, 19 Dec 2025 14:30:00 GMT</pubDate>
            <title>7 best practices to manage DaaS costs</title>
        </item>
        <item>
            <body>&lt;p&gt;VMC on AWS creates new use cases for running Horizon virtual desktops in the cloud, such as data center expansion and bursting, as well as improvements to cloud-based deployments.&lt;/p&gt; 
&lt;p&gt;VMware Horizon 7 now integrates with VMware Cloud (VMC) on AWS. You can run all your data center components in the cloud if you don't want to invest in on-premises hardware. That might be too big a leap for some organizations, but there are several other use cases you might want to consider.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="New use cases"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;New use cases&lt;/h2&gt;
 &lt;p&gt;Data center expansion and bursting enable you to maintain your own on-premises Horizon deployment and temporarily expand your capacity. You can connect both environments using Cloud Pod Architecture (CPA) for seamless management.&lt;/p&gt;
 &lt;p&gt;Another reason you might consider moving virtual desktops to the cloud is application locality. If your virtual desktops are on premises and the applications users need are in the cloud, the distance between them creates latency. But if you put both the desktops and applications in the cloud, users will get better performance because the only traffic over the network will come from the virtual desktops.&lt;/p&gt;
 &lt;p&gt;With a &lt;a href="https://www.techtarget.com/searchdisasterrecovery/news/252454652/Disaster-recovery-to-cloud-popular-in-2018"&gt;cloud-based setup&lt;/a&gt; for disaster recovery (DR), you only have to pay for a base infrastructure in the cloud as opposed to purchasing and maintaining hardware to create your own DR site. You can then easily and rapidly scale up when needed.&lt;/p&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="Horizon with VMC on AWS"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Horizon with VMC on AWS&lt;/h2&gt;
 &lt;p&gt;Certain features of Horizon -- such as App Volumes, which attaches AppStacks to VMs, and Instant Clones -- integrate with vCenter and vSphere. However, you don't get the same level of access to those servers in the cloud as you have on premises. Administrator-level access and root-level permissions to ESXi aren't available on vCenter, so VMware still &lt;a href="https://www.techtarget.com/searchvmware/tip/Explore-VMC-on-AWS-pricing-features-and-use-cases-with-a-trial-run"&gt;needs to tweak&lt;/a&gt; these features with that level of access.&lt;/p&gt;
 &lt;p&gt;At VMworld 2018 in Barcelona, Spain, VMware announced that features such as App Volumes and Instant Clones will become available with the upcoming releases of Horizon 7.7 and App Volumes 2.15. VMware &lt;a href="https://www.techtarget.com/searchvirtualdesktop/feature/Get-to-know-the-latest-VMware-Horizon-7-features"&gt;doesn't plan to support&lt;/a&gt; several other features, such as Linked Clones and Security Servers, either because they are obsolete, because there are technical limitations or just because the features don't make sense in an AWS environment.&lt;/p&gt;
 &lt;blockquote class="main-article-pullquote"&gt;
  &lt;div class="main-article-pullquote-inner"&gt;
   &lt;figure&gt;
    Data center expansion and bursting enable you to maintain your own on-premises Horizon deployment and temporarily expand your capacity. 
   &lt;/figure&gt;
   &lt;i class="icon" data-icon="z"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/blockquote&gt;
 &lt;p&gt;VMware also announced improvements to cloud-based and on-premises deployment management with the VMware Horizon Cloud Service. For those admins interested in deploying a hybrid cloud, this is good news, as it will &lt;a href="https://www.techtarget.com/searchcloudcomputing/feature/Cloud-management-platforms-offer-a-unified-approach-to-hybrid-IT"&gt;unify their management&lt;/a&gt;.&lt;/p&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="How to get started"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;How to get started&lt;/h2&gt;
 &lt;p&gt;The last feature announced in Barcelona was an automated installation procedure for Horizon 7 with VMC on AWS. Until that arrives, you still have to install Horizon in the traditional way, which means setting up the same series of servers in the cloud as you would on premises. The required services include Active Directory (AD), a domain name service, Dynamic Host Configuration Protocol and Key Management Servers for Windows activation, and possibly Microsoft SQL Server for the event database.&lt;/p&gt;
 &lt;p&gt;To start, install a few Windows servers in your software-defined data center (SDDC) and get those up and running.&lt;/p&gt;
 &lt;p&gt;You can deploy a hybrid cloud with the use of CPA, which also enables you to connect two Horizon instances from separate data centers. In this case, you must set up a connection between your on-premises data center and VMC on AWS.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/HorizonCPAwithVMConAWS.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/HorizonCPAwithVMConAWS_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/HorizonCPAwithVMConAWS_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/HorizonCPAwithVMConAWS.png 1280w" alt="Horizon CPA" height="316" width="560"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Figure A. Horizon CPA with VMC on AWS
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;p&gt;When integrating two data centers, you can set up the connection between the two Horizon environments. To connect to VMC on AWS, you must take a few additional steps.&lt;/p&gt;
 &lt;p&gt;Part of setting up the link from the cloud environment to your on-premises data center is getting the virtual private network (VPN) to run with the correct firewall rules. This enables you to connect your two AD instances. It also permits users to connect to either of your Horizon environments to access their virtual desktops, which offers a seamless experience.&lt;/p&gt;
 &lt;p&gt;This becomes especially important when setting up a DR environment; if done properly, users won't even realize they aren't working in their normal production environment.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/SDDC-6.1-1024x508.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/SDDC-6.1-1024x508_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/SDDC-6.1-1024x508_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/SDDC-6.1-1024x508.png 1280w" alt="SDDC connectivity options" height="279" width="559"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Figure B. VMC on AWS SDDC connectivity options
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;p&gt;If you have NSX, you can easily &lt;a href="http://www.virtualizationblog.com/learning-nsx-step-by-step-configuring-ssl-vpn-plus-on-vmware-nsx-edge-gateway/" target="_blank" rel="noopener"&gt;set up the Edge VPN&lt;/a&gt; from there. If you don't have NSX, then you can run a separate appliance as a stand-alone client to set up the VPN.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/VMCSDDCVPN.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/VMCSDDCVPN_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/VMCSDDCVPN_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/VMCSDDCVPN.png 1280w" alt="VPN setup" height="304" width="560"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Figure C. VMC on AWS SDDC VPN setup
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;p&gt;The other part of setting up the VPN must happen within the SDDC configuration, as shown in Figure C above.&lt;/p&gt;
&lt;/section&gt;</body>
            <description>Take advantage of Horizon 7 with VMC on AWS for a better hybrid cloud user experience, new use cases, and several different options for installation, deployment and integration.</description>
            <image>https://cdn.ttgtmedia.com/visuals/searchSQLServer/microsoft_server_admin/sqlserver_article_001.jpg</image>
            <link>https://www.techtarget.com/searchvmware/tip/Integrating-VMC-on-AWS-with-Horizon-7-leads-to-new-use-cases</link>
            <pubDate>Fri, 21 Nov 2025 14:33:00 GMT</pubDate>
            <title>Integrating VMC on AWS with Horizon 7 leads to new use cases</title>
        </item>
        <item>
            <body>&lt;p&gt;In just a few years, MSIX app attach has evolved a lot.&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;As Microsoft updates its app delivery ecosystem, app attach has become the strategic direction for app deployment in Azure Virtual Desktop (AVD). This shift enables organizations to simplify app management, reduce infrastructure complexity and extend virtualized app delivery into hybrid and cloud environments.&lt;/p&gt; 
&lt;p&gt;With these changes, IT teams can have greater flexibility and control over application lifecycle management. Organizations should evaluate the latest updates to app attach as an opportunity to refresh their IT strategy and optimize licensing and infrastructure costs.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="Recent changes to Microsoft app virtualization"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Recent changes to Microsoft app virtualization&lt;/h2&gt;
 &lt;p&gt;In April 2023, Microsoft announced that &lt;a href="https://www.techtarget.com/searchvirtualdesktop/definition/Microsoft-App-V-Microsoft-Application-Virtualization"&gt;App-V&lt;/a&gt; as a product was no longer in development and would reach its end of life (EOL) in 2026. However, in November 2024, the company announced the following changes:&lt;/p&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;The previous EOL announcement for the App-V client was &lt;a target="_blank" href="https://learn.microsoft.com/en-us/microsoft-desktop-optimization-pack/app-v/appv-support-policy" rel="noopener"&gt;revoked&lt;/a&gt;.&lt;/li&gt; 
  &lt;li&gt;The deprecation of the App-V Sequencer was revoked.&lt;/li&gt; 
  &lt;li&gt;App-V Server will still reach its EOL on the same date.&amp;nbsp;&lt;/li&gt; 
  &lt;li&gt;The app attach feature in AVD would now support delivering both MSIX packages and&amp;nbsp;App-V packages.&amp;nbsp;&lt;/li&gt; 
  &lt;li&gt;The original MSIX app attach feature would be deprecated on June 1, 2025.&amp;nbsp;&lt;/li&gt; 
  &lt;li&gt;The new app attach would feature integrations from third-party vendors, enabling package delivery through additional third-party software that integrates with the Azure Console for AVD.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;As a result of these changes, the main delivery method for App-V packages will be through app attach, so organizations that still use App-V can continue to do so with app attach in AVD.&amp;nbsp;&lt;/p&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="What is app attach?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;What is app attach?&amp;nbsp;&lt;/h2&gt;
 &lt;p&gt;App attach is a feature that delivers MSIX-, App-V- and AppX-based applications to &lt;a name="_Hlk211871018"&gt;&lt;/a&gt;AVD VMs.&amp;nbsp;App-V is a virtualized application format, and AppX is mostly a wrapper for Universal Windows Platform apps.&lt;/p&gt;
 &lt;p&gt;MSIX, in its simplest form, is a packaging format for Windows apps. It offers an updated and improved packaging experience and lifecycle management compared with the traditional Microsoft Installer (MSI) format. It also maintains the functionality of current app packages and installation files. In addition, MSIX introduces new features for packaging and deploying Win32, Windows Presentation Foundation and Windows Forms apps.&amp;nbsp;&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/how_microsoft_app_v_works-f.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/how_microsoft_app_v_works-f_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/how_microsoft_app_v_works-f_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/how_microsoft_app_v_works-f.png 1280w" alt="A diagram explaining of how App-V interacts with OSes to deliver apps to end users." data-credit="Informa TechTarget" height="269" width="560"&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;p&gt;IT can also configure MSIX-packaged applications to operate within a container called AppContainer. Within this container, both the main app process and its child processes operate, letting them run isolated through file system and registry virtualization similar to what App-V provided. This lets IT pros have multiple versions of the same app running on the same machine without causing any conflicts if they need to read or write to the same set of files or registry.&lt;/p&gt;
 &lt;p&gt;Every AppContainer application can access the global registry. However, it only writes to its individual virtual registry and application data directory. This ensures that the data is removed upon app uninstallation or reset. The virtual registry and file system of an AppContainer app remain inaccessible to other applications on the same host.&amp;nbsp;&lt;/p&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="How app attach works in AVD"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;How app attach works in AVD&lt;/h2&gt;
 &lt;p&gt;App attach uses a unique format for its package definitions, differing from the standard MSIX format. This ensures that apps become available to users quickly when they log into a Windows VDI session. Specifically, the package format is a Windows disk partition or volume that is remotely mounted rather than copied into the user's virtual machine and then integrated into the environment.&amp;nbsp;&lt;/p&gt;
 &lt;p&gt;App attach adds no new capabilities when it comes to delivering standard MSIX packages, other than the speed of getting the package ready for the user. Additionally, Microsoft designed the feature to &lt;a href="https://www.techtarget.com/searchvirtualdesktop/tip/Azure-Virtual-Desktop-best-practices-for-management"&gt;work with AVD&lt;/a&gt; to provide app streaming.&lt;/p&gt;
 &lt;div class="youtube-iframe-container"&gt;
  &lt;iframe id="ytplayer-0" src="https://www.youtube.com/embed/l9JkLhvaKA8?autoplay=0&amp;amp;modestbranding=1&amp;amp;rel=0&amp;amp;widget_referrer=null&amp;amp;enablejsapi=1&amp;amp;origin=https://www.techtarget.com" type="text/html" height="360" width="640" frameborder="0"&gt;&lt;/iframe&gt;
 &lt;/div&gt;
 &lt;p&gt;IT can assign app attach packages across any host pool or session host and distribute them to multiple host pools. One of the benefits of app attach is that it now supports both common identity options: either Active Directory (AD)- or Entra ID-joined. This enables IT to handle app deployment without the need for any AD domain controllers.&amp;nbsp;&lt;/p&gt;
 &lt;p&gt;App attach works by storing app images on an SMB version 3 file share, which gets mounted on each session host at user sign-in. This setup is flexible in terms of storage, so IT isn't limited to a specific storage type. The recommendation from Microsoft is to use Azure Files since it's compatible with both Microsoft Entra ID and AD Domain Services (&lt;a href="https://www.techtarget.com/searchwindowsserver/definition/Microsoft-Active-Directory-Domain-Services-AD-DS"&gt;AD DS&lt;/a&gt;).&amp;nbsp;&lt;/p&gt;
 &lt;p&gt;An alternative option is Azure NetApp Files, but it requires session hosts to be joined to AD DS, since it doesn't support Entra ID.&amp;nbsp;&lt;/p&gt;
 &lt;p&gt;Each host in AVD mounts the application images from the file share. This means that each host needs to have &lt;a href="https://www.techtarget.com/searchwindowsserver/definition/NTFS"&gt;NTFS&lt;/a&gt; and share permissions to read objects from the file share.&amp;nbsp;&lt;/p&gt;
 &lt;p&gt;For instance, if an admin plans to use AVD app attach with Entra ID-joined devices, they only need to assign the "Reader and Data Access" role to both AVD and Azure Resource Manager Provider service principals.&amp;nbsp;&lt;/p&gt;
 &lt;p&gt;When planning to deploy this for a production environment, IT must take the following measures:&amp;nbsp;&lt;/p&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;Make sure the file share is in the same Azure region as the session hosts.&lt;/li&gt; 
  &lt;li&gt;If using Azure Files, make sure the storage account is also in the same region as the session hosts.&lt;/li&gt; 
  &lt;li&gt;Exclude the disk images containing the apps from antivirus scans such as Defender, since they're read-only.&lt;/li&gt; 
  &lt;li&gt;Make sure the storage and network fabric can deliver sufficient performance.&lt;/li&gt; 
  &lt;li&gt;Avoid using the same file share for FSLogix profile containers.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;The integration process of an MSIX application on a VDI host involves three steps: mounting, staging, and registering. For single-user OSes, these steps are performed for each package individually. In a multi-user OS, the mounting and staging might be omitted for packages that are already added for another user. Once the app is registered, it operates within the same MSIX container as it would if deployed using the traditional MSIX format. This approach lets the app function as though it were natively installed.&amp;nbsp;&lt;/p&gt;
 &lt;h3&gt;App attach implementation requirements&lt;/h3&gt;
 &lt;p&gt;MSIX offers support for other Windows OSes, including Windows Server and &lt;a href="https://www.techtarget.com/whatis/feature/Windows-11-vs-Windows-10-What-are-the-differences"&gt;Windows 10 and 11&lt;/a&gt; for both single-session and multi-session configurations. However, the app attach feature specifically requires Windows 10 or 11.&lt;/p&gt;
 &lt;table class="main-article-table"&gt; 
  &lt;thead&gt; 
   &lt;tr style="text-align: center;"&gt; 
    &lt;td&gt;&lt;b&gt;Operating system&lt;/b&gt;&lt;/td&gt; 
    &lt;td&gt;&lt;b&gt;MSIX support&lt;/b&gt;&lt;/td&gt; 
    &lt;td&gt;&lt;b&gt;App attach support&lt;/b&gt;&lt;/td&gt; 
   &lt;/tr&gt; 
  &lt;/thead&gt; 
  &lt;tbody&gt; 
   &lt;tr&gt; 
    &lt;td&gt;Windows Server 2019&lt;/td&gt; 
    &lt;td&gt;Yes&lt;/td&gt; 
    &lt;td&gt;No&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td&gt;Windows Server 2022&lt;/td&gt; 
    &lt;td&gt;Yes&lt;/td&gt; 
    &lt;td&gt;No&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td&gt;Windows 10 and 11 Single Session&lt;/td&gt; 
    &lt;td&gt;Yes&lt;/td&gt; 
    &lt;td&gt;Yes&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td&gt;Windows 10 and 11 Multisession&lt;/td&gt; 
    &lt;td&gt;Yes&lt;/td&gt; 
    &lt;td&gt;Yes&lt;/td&gt; 
   &lt;/tr&gt; 
  &lt;/tbody&gt; 
 &lt;/table&gt;
 &lt;p&gt;For app attach, IT can use the new Composite Image File System (CimFS), VHDX or virtual hard disk (VHD) for disk images, though Microsoft does not recommend using VHD. Mounting and unmounting CimFS images is also significantly faster than VHD and VHDX. In addition, these processes consume less CPU and memory.&amp;nbsp;Microsoft specifically recommends using CimFS for app images if the session hosts are running Windows 11. However, there is not much tooling available for the use of CimFS. It also circumvents the 256-character path limit that VHD/VHDX has, which commonly affects apps such as those bundled with a Python distribution.&lt;/p&gt;
 &lt;p&gt;In all three of the formats, the MSIX files are stored uncompressed using app attach, unlike the original MSIX package, where they are compressed. Therefore, on average, applications take up 2.5 times the storage that the MSIX packages do on the file share that they are stored on.&lt;/p&gt;
 &lt;p&gt;However, one of the strengths of app attach is that it does not require any additional infrastructure, just storage. Other app layering and virtualization services have some infrastructure requirements.&amp;nbsp;&lt;/p&gt;
&lt;/section&gt;                  
&lt;section class="section main-article-chapter" data-menu-title="The future of app attach"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;The future of app attach&lt;/h2&gt;
 &lt;p&gt;App attach will most likely become the default service to deploy applications to AVD. The news of App-V support in app attach made it easier for organizations to postpone the job of converting their existing App-V applications, since not all apps can be directly converted to the new MSIX format.&amp;nbsp;&lt;/p&gt;
 &lt;p&gt;Even with higher levels of compatibility due to the changes made in the MSIX format with the release of Windows 11 version 24H2, some are still struggling with old apps.&amp;nbsp;&lt;/p&gt;
 &lt;p&gt;This is also why Microsoft has started to &lt;a target="_blank" href="https://learn.microsoft.com/en-us/azure/virtual-desktop/app-attach-partner-solutions" rel="noopener"&gt;allow&lt;/a&gt; third-party vendors to build integrations on top of app attach. It helps with app compatibility, but it also provides more control mechanisms to handle app distribution more dynamically. The following vendors are now able to integrate with app attach:&amp;nbsp;&lt;/p&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;Liquidware FlexApp.&lt;/li&gt; 
  &lt;li&gt;Numecent Cloudpager.&lt;/li&gt; 
  &lt;li&gt;Omnissa App Volumes.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;One of the upsides of using a third-party vendor is support for non-Azure platforms and the ability to run on physical devices. They also provide higher compatibility rates compared with traditional MSIX-based apps. Another feature is support for application grouping. This enables, for instance, two given apps to interact in their own virtual environment, which is useful for apps that have some form of integration.&amp;nbsp;&lt;/p&gt;
 &lt;p&gt;MSIX-based apps also need to be signed with a code certificate, which can be from a trusted certificate authority or self-signed certificate, which must be trusted by the host pools. This process is much simpler with third parties that do not have the same requirement.&amp;nbsp;&lt;/p&gt;
 &lt;h3&gt;What do these changes mean for organizations?&lt;/h3&gt;
 &lt;p&gt;Because app attach &lt;a href="https://www.techtarget.com/searchwindowsserver/tip/What-are-the-Microsoft-Entra-ID-benefits-for-on-prem-admins"&gt;supports Entra ID&lt;/a&gt; and doesn't require dedicated infrastructure, it provides a cost-efficient way to deliver applications for AVD.&amp;nbsp;&lt;/p&gt;
 &lt;p&gt;With Microsoft's strategy of only supporting App-V for AVD-based environments, it's clear that the company wants to push existing App-V customers to move their VDI workloads to Azure as well.&amp;nbsp;While the features it provides might work for many organizations, others have requirements or a complex list of apps that require third-party tools.&lt;/p&gt;
 &lt;p&gt;These developments show Microsoft's intent to make app attach the standard for application delivery in AVD, giving organizations a scalable foundation for workspace management.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Editor's note:&lt;/b&gt; &lt;i&gt;This article was originally published in 2024 and was updated in 2025 to improve the reader experience.&lt;/i&gt;&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Marius Sandbu is a cloud evangelist for Sopra Steria in Norway who mainly focuses on end-user computing and cloud-native technology.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>With app attach, IT can deploy and perform various management tasks for Windows applications. MSIX app attach has been deprecated, but the new feature brings new capabilities.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/books_g1158413597.jpg</image>
            <link>https://www.techtarget.com/searchvirtualdesktop/tip/Compare-MSIX-App-Attach-to-other-app-layering-tools</link>
            <pubDate>Mon, 03 Nov 2025 17:00:00 GMT</pubDate>
            <title>Learning the features and limitations of MSIX app attach</title>
        </item>
        <item>
            <body>&lt;p&gt;Desktop as a Service (DaaS) is a cloud computing offering in which a third party hosts the back end of a virtual desktop infrastructure (&lt;a href="https://www.techtarget.com/searchvirtualdesktop/definition/virtual-desktop-infrastructure-VDI"&gt;VDI&lt;/a&gt;) deployment.&lt;/p&gt; 
&lt;p&gt;DaaS allows authorized end users who have a reliable internet connection to connect to a &lt;a href="https://www.techtarget.com/searchvirtualdesktop/definition/virtual-desktop"&gt;virtual desktop&lt;/a&gt; in the cloud from almost any type of computing device. Essentially, the user's PC, &lt;a href="https://www.techtarget.com/searchnetworking/definition/thin-client"&gt;thin client&lt;/a&gt;, tablet or smartphone becomes an access point that can connect remotely to a virtual desktop hosted by the &lt;a href="https://www.techtarget.com/searchitchannel/definition/cloud-service-provider-cloud-provider"&gt;cloud service provider&lt;/a&gt;. End users typically access their virtual desktop(s) through a web browser or dedicated client application provided by the DaaS vendor.&lt;/p&gt; 
&lt;p&gt;DaaS offerings are designed to provide authorized users with the same responsive performance, personalized settings and seamless access to applications and files as in-house VDI deployments. With DaaS, however, the desktop operating systems (&lt;a href="https://www.techtarget.com/whatis/definition/operating-system-OS"&gt;OSes&lt;/a&gt;) and apps run inside virtual machines (&lt;a href="https://www.techtarget.com/searchitoperations/definition/virtual-machine-VM"&gt;VMs&lt;/a&gt;) that are hosted on &lt;a href="https://www.techtarget.com/whatis/definition/server"&gt;servers&lt;/a&gt; managed by the cloud service provider.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="How does desktop as a service work?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;How does desktop as a service work?&lt;/h2&gt;
 &lt;p&gt;DaaS can be purchased through a subscription model that bundles infrastructure, OS licensing and (sometimes) &lt;a href="https://www.techtarget.com/searchenterprisedesktop/definition/desktop-management"&gt;desktop management&lt;/a&gt; services. In most cases, DaaS runs on a multi-tenant architecture in the cloud. Each tenant (customer) is logically isolated so their data, applications and policies remain secure and separate. In business settings, users might need to use credentials that are tied to an identity and access management (&lt;a href="https://www.techtarget.com/searchsecurity/definition/identity-access-management-IAM-system"&gt;IAM&lt;/a&gt;) system like &lt;a target="_blank" href="https://www.microsoft.com/en-us/security/business/identity-access/microsoft-entra-id" rel="noopener"&gt;Microsoft Entra ID&lt;/a&gt; (formerly Azure Active Directory) in order to access their virtual desktop(s).&lt;/p&gt;
 &lt;p&gt;On the back end, the DaaS environment consists of several interconnected components. The management layer, which can also be called the &lt;i&gt;control plane&lt;/i&gt; or &lt;i&gt;connection broker&lt;/i&gt;, is responsible for provisioning or assigning desktops, monitoring their use and enforcing &lt;a href="https://www.techtarget.com/searchsecurity/feature/How-to-create-a-data-security-policy-with-template"&gt;security policies&lt;/a&gt;. Virtual machines provide the actual desktop environments, and &lt;a href="https://www.techtarget.com/searchstorage/tip/Comparing-4-decentralized-data-storage-offerings"&gt;cloud storage systems&lt;/a&gt; retain user files, profiles and settings.&lt;/p&gt;
 &lt;p&gt;As with on-premises VDI, cloud desktop services use a &lt;a href="https://www.techtarget.com/searchenterprisedesktop/definition/Remote-Desktop-Protocol-RDP"&gt;remote desktop protocol&lt;/a&gt; like Microsoft RDP, &lt;a target="_blank" href="https://www.citrix.com/glossary/what-is-hdx.html" rel="noopener"&gt;Citrix HDX&lt;/a&gt; or &lt;a target="_blank" href="https://blogs.vmware.com/euc/2016/09/story-of-vmware-blast.html" rel="noopener"&gt;VMware Blast&lt;/a&gt; to stream virtual desktops to &lt;a href="https://www.techtarget.com/whatis/definition/endpoint-device"&gt;endpoint devices&lt;/a&gt;. This type of protocol continually sends the visual output of the user's desktop to the user's device while also capturing the user's keyboard strokes, mouse clicks and touchscreen gestures.&lt;/p&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="VDI vs. DaaS"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;VDI vs. DaaS&lt;/h2&gt;
 &lt;p&gt;VDI and DaaS are often confused because both involve delivering virtual desktops to end users, but they're deployed and managed in very different ways.&lt;/p&gt;
 &lt;p&gt;VDI &lt;a href="https://www.techtarget.com/searchvirtualdesktop/definition/desktop-virtualization"&gt;desktop virtualization&lt;/a&gt; deployments run in an organization's own &lt;a href="https://www.techtarget.com/searchdatacenter/definition/data-center"&gt;data center&lt;/a&gt; or on &lt;a href="https://www.techtarget.com/searchcloudcomputing/tip/Top-public-cloud-providers-A-brief-comparison"&gt;public cloud&lt;/a&gt; infrastructure and are self-managed by the organization's own information technology (IT) staff.&lt;/p&gt;
 &lt;div class="youtube-iframe-container"&gt;
  &lt;iframe id="ytplayer-0" src="https://www.youtube.com/embed/Nz9r3HxI8qI?si=Tq5FtHlXjv-k3M0w?autoplay=0&amp;amp;modestbranding=1&amp;amp;rel=0&amp;amp;widget_referrer=null&amp;amp;enablejsapi=1&amp;amp;origin=https://www.techtarget.com" type="text/html" height="360" width="640" frameborder="0"&gt;&lt;/iframe&gt;
 &lt;/div&gt;
 &lt;p&gt;In contrast, desktop as a service (&lt;a href="https://www.techtarget.com/searchvirtualdesktop/definition/desktop-as-a-service-DaaS"&gt;DaaS&lt;/a&gt;) is VDI technology that's delivered as a managed cloud service. Desktop as a service provides many of the same advantages that virtual desktop infrastructure does without requiring a significant upfront investment in compute, storage and network infrastructure.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/virt_desktop-vdi_vs_daas-f.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/virt_desktop-vdi_vs_daas-f_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/virt_desktop-vdi_vs_daas-f_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/virt_desktop-vdi_vs_daas-f.png 1280w" alt="This image compares VDI and DaaS infrastructure, management and cost." height="247" width="560"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;VDI is self-managed and typically runs in an organization's own data center, while DaaS is a managed cloud service that provides virtual desktops through a subscription model.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;p&gt;It should be noted that if an organization runs its own VDI deployment on public cloud infrastructure, it's still VDI, not DaaS. It only becomes DaaS if the cloud provider or a third-party managed service provider (&lt;a href="https://www.techtarget.com/searchitchannel/definition/managed-service-provider"&gt;MSP&lt;/a&gt;) is responsible for running the VDI infrastructure &lt;a href="https://www.techtarget.com/searchitchannel/Guide-to-building-and-executing-an-MSP-business-model"&gt;as a managed service&lt;/a&gt;.&lt;/p&gt;
&lt;/section&gt;       
&lt;section class="section main-article-chapter" data-menu-title="Use cases for desktop as a service"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Use cases for desktop as a service&lt;/h2&gt;
 &lt;p&gt;Desktop as a service is widely used in scenarios where scalability and centralized management are important concerns. DaaS is particularly attractive for large enterprises, &lt;a target="_blank" href="https://github.com/yanirs/established-remote" rel="noopener"&gt;remote-first companies&lt;/a&gt; and organizations in industries that have high compliance and/or data security requirements. Popular use cases for DaaS include:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Improving security. &lt;/b&gt;When properly configured, DaaS can &lt;a href="https://www.techtarget.com/searchsecurity/tip/Cybersecurity-risk-management-Best-practices-and-frameworks"&gt;help mitigate many of the security risks&lt;/a&gt; associated with physical devices, including risks posed by lost or stolen laptops, malware infections or insecure &lt;a href="https://www.techtarget.com/searchdatabackup/definition/removable-media"&gt;removable media&lt;/a&gt;. Common DaaS security features include multifactor authentication (&lt;a href="https://www.techtarget.com/searchsecurity/definition/multifactor-authentication-MFA"&gt;MFA&lt;/a&gt;), encryption, conditional access policies and the ability to restrict data transfers to specific types of endpoints or storage media.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Providing better business continuity.&lt;/b&gt; Desktop as a service &lt;a href="https://www.techtarget.com/searchdatabackup/tip/Use-backup-and-business-continuity-planning-to-protect-data"&gt;supports business continuity&lt;/a&gt; by allowing users to log in from anywhere. If a local office or data center experiences a disaster, work can continue from another location that still has power and internet connectivity.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Supporting shift work.&lt;/b&gt; DaaS deployments allow multiple employees on different work shifts to securely share the same physical computing device. Essentially, the physical computing device becomes a wired or &lt;a href="https://www.techtarget.com/searchmobilecomputing/definition/access-point"&gt;wireless access point&lt;/a&gt; that allows the user to connect to a cloud-hosted virtual desktop.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Supporting remote and hybrid work.&lt;/b&gt; DaaS makes it easier and safer for remote and hybrid employees to use corporate desktops and apps on personal computing devices.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Supporting contractors and seasonal workers.&lt;/b&gt; DaaS allows organizations to quickly provision desktops for temporary workers without having to purchase new hardware or build out additional infrastructure.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Facilitating compliance in regulated industries.&lt;/b&gt; Healthcare, finance, government and legal organizations often use DaaS to manage sensitive data in the cloud. This deployment model helps organizations meet compliance regulations, such as the Health Insurance Portability and Accountability Act (&lt;a href="https://www.techtarget.com/searchhealthit/definition/HIPAA"&gt;HIPAA&lt;/a&gt;), the Payment Card Industry Data Security Standard (&lt;a href="https://www.techtarget.com/searchsecurity/definition/PCI-DSS-Payment-Card-Industry-Data-Security-Standard"&gt;PCI-DSS&lt;/a&gt;) and/or the General Data Protection Regulation (&lt;a href="https://www.computerweekly.com/opinion/GDPRs-7th-anniversary-in-the-AI-age-privacy-legislation-is-still-relevant"&gt;GDPR&lt;/a&gt;), while also reducing security risks on devices.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Allowing Mac users to run Windows. &lt;/b&gt;DaaS gives Mac users the ability to work in a Windows environment without needing to use dual boot, Boot Camp or local virtualization software.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Reducing hardware costs.&lt;/b&gt; Because DaaS runs in the cloud, end users can use older PCs or &lt;a href="https://www.techtarget.com/searchvirtualdesktop/tip/Evaluating-tablets-as-thin-clients-in-the-enterprise"&gt;tablets as thin clients&lt;/a&gt;. This can extend the hardware's lifecycle while also helping to keep an organization's capital expenditures (&lt;a href="https://www.techtarget.com/whatis/definition/CAPEX-capital-expenditure"&gt;Capex&lt;/a&gt;) line items as low as possible.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="Advantages and disadvantages of DaaS"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Advantages and disadvantages of DaaS&lt;/h2&gt;
 &lt;p&gt;Like any technology, desktop as a service has both &lt;a href="https://www.techtarget.com/searchvirtualdesktop/feature/What-are-the-pros-and-cons-of-DaaS"&gt;advantages and disadvantages&lt;/a&gt;. For example, while DaaS reduces the need for organizations to buy and maintain additional hardware and infrastructure for each new remote employee, a positive user experience (UX) depends on whether the remote worker has a reliable internet connection and sufficient &lt;a href="https://www.techtarget.com/searchnetworking/definition/bandwidth"&gt;bandwidth&lt;/a&gt;.&lt;/p&gt;
 &lt;p&gt;Here are some additional pros and cons of using desktop-as-a-service technology:&lt;/p&gt;
 &lt;h3&gt;Advantages of DaaS&lt;/h3&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Cloud service providers make it easy to scale virtual desktop deployments up or down as needed.&lt;/li&gt; 
  &lt;li&gt;DaaS lets users work from a computing device of their choosing.&lt;/li&gt; 
  &lt;li&gt;DaaS subscriptions can help organizations shift desktop delivery from a Capex to an Opex expense.&lt;/li&gt; 
  &lt;li&gt;In some cases, DaaS can help reduce licensing costs per user by allowing an application to be installed once in the user's cloud desktop and accessed from any device the service-level agreement (SLA) permits.&lt;/li&gt; 
  &lt;li&gt;Administrators can quickly disconnect a compromised device from the service through the cloud management platform or the organization's IAM system.&lt;/li&gt; 
  &lt;li&gt;DaaS can help simplify &lt;a href="https://www.techtarget.com/searchdisasterrecovery/feature/Disaster-recovery-glossary-Terms-to-know"&gt;disaster recovery&lt;/a&gt; by consolidating user data in the cloud.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;h3&gt;Disadvantages of DaaS&lt;/h3&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;If the end user's internet connection is unreliable, they might experience lag, &lt;a href="https://www.techtarget.com/searchunifiedcommunications/definition/jitter"&gt;jitter&lt;/a&gt; or lose access to their desktop.&lt;/li&gt; 
  &lt;li&gt;Some application vendors impose restrictions on how their software can be used in virtualized environments.&lt;/li&gt; 
  &lt;li&gt;Microsoft licenses for virtualized environments can be complex, especially when third-party DaaS providers are involved.&lt;/li&gt; 
  &lt;li&gt;Persistent desktop services are generally more expensive than nonpersistent ones because they require more resources.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;       
&lt;section class="section main-article-chapter" data-menu-title="Persistent vs. nonpersistent DaaS desktops"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Persistent vs. nonpersistent DaaS desktops&lt;/h2&gt;
 &lt;p&gt;Many DaaS providers support both persistent and nonpersistent desktops so organizations can match the right desktop type to different user needs and workloads.&lt;/p&gt;
 &lt;p&gt;A &lt;i&gt;persistent&lt;/i&gt; desktop saves all changes the user makes during a session, and the next time the user logs in, they are sent the same VM with all their changes intact. Persistent desktops provide end users with a highly personalized experience, but they require additional &lt;a href="https://www.techtarget.com/searchstorage/definition/cloud-storage"&gt;cloud storage&lt;/a&gt;, which can add to the cost of a subscription.&lt;/p&gt;
 &lt;p&gt;In contrast, a &lt;i&gt;nonpersistent&lt;/i&gt; desktop gives the user a fresh instance of the base desktop image each time they log in. When the user logs out, the desktop is reset to its original state and any changes are discarded. Nonpersistent desktops are easier and cheaper to manage at scale because they &lt;a href="https://www.techtarget.com/searchvirtualdesktop/tip/How-to-create-and-manage-Azure-Virtual-Desktop-golden-images"&gt;use a single golden image&lt;/a&gt;. Once an update, software patch or configuration change has been made to the golden image, it will be applied to all future user sessions.&lt;/p&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="DaaS providers"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;DaaS providers&lt;/h2&gt;
 &lt;p&gt;Organizations need to do their homework before selecting a DaaS provider. Not all DaaS services offer the same pricing, performance, security or compliance features, so decision-makers need to ensure the vendor and subscription tier they choose meet both the users' and organization's needs.&lt;/p&gt;
 &lt;p&gt;The comparison table below provides an overview of the different factors organizations should consider before they select a DaaS provider.&lt;/p&gt;
 &lt;table class="main-article-table"&gt; 
  &lt;thead&gt; 
   &lt;tr&gt; 
    &lt;td&gt; &lt;p&gt;&lt;span style="color: #ecf0f1;"&gt;&lt;b&gt;Vendor / Product&lt;/b&gt;&lt;/span&gt;&lt;/p&gt; &lt;/td&gt; 
    &lt;td&gt; &lt;p&gt;&lt;span style="color: #ecf0f1;"&gt;&lt;b&gt;Hosting&lt;/b&gt;&lt;/span&gt;&lt;/p&gt; &lt;/td&gt; 
    &lt;td&gt; &lt;p&gt;&lt;span style="color: #ecf0f1;"&gt;&lt;b&gt;Requirements &lt;/b&gt;&lt;/span&gt;&lt;/p&gt; &lt;/td&gt; 
    &lt;td&gt; &lt;p&gt;&lt;span style="color: #ecf0f1;"&gt;&lt;b&gt;Licensing&lt;/b&gt;&lt;/span&gt;&lt;/p&gt; &lt;/td&gt; 
    &lt;td&gt; &lt;p&gt;&lt;span style="color: #ecf0f1;"&gt;&lt;b&gt;Setup&lt;/b&gt;&lt;/span&gt;&lt;/p&gt; &lt;/td&gt; 
    &lt;td&gt; &lt;p&gt;&lt;span style="color: #ecf0f1;"&gt;&lt;b&gt;Support&lt;/b&gt;&lt;/span&gt;&lt;/p&gt; &lt;/td&gt; 
   &lt;/tr&gt; 
  &lt;/thead&gt; 
  &lt;tbody&gt; 
   &lt;tr&gt; 
    &lt;td&gt; &lt;p&gt;&lt;b&gt;Amazon WorkSpaces&lt;/b&gt;&lt;/p&gt; &lt;/td&gt; 
    &lt;td&gt; &lt;p&gt;AWS public cloud (multi-region)&lt;/p&gt; &lt;/td&gt; 
    &lt;td&gt; &lt;p&gt;AWS account&lt;/p&gt; &lt;/td&gt; 
    &lt;td&gt; &lt;p&gt;OS license bundled; BYOL for Microsoft apps possible; hourly or monthly subscription pricing&lt;/p&gt; &lt;/td&gt; 
    &lt;td&gt; &lt;p&gt;Minimal setup, auto-provisioned via AWS console&lt;/p&gt; &lt;/td&gt; 
    &lt;td&gt; &lt;p&gt;Standard AWS Support plans (Basic, Developer, Business, Enterprise) -- charged separately&lt;/p&gt; &lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td&gt; &lt;p&gt;&lt;b&gt;Azure Virtual Desktop (AVD)&lt;/b&gt;&lt;/p&gt; &lt;/td&gt; 
    &lt;td&gt; &lt;p&gt;Microsoft Azure cloud&lt;/p&gt; &lt;/td&gt; 
    &lt;td&gt; &lt;p&gt;Azure subscription; Microsoft 365 or Windows license; Azure AD integration&lt;/p&gt; &lt;/td&gt; 
    &lt;td&gt; &lt;p&gt;Eligible Microsoft 365/Windows licenses cover internal users; external users require additional access pricing; Azure resources billed separately&lt;/p&gt; &lt;/td&gt; 
    &lt;td&gt; &lt;p&gt;Moderate setup -- requires Azure infra and identity integration&lt;/p&gt; &lt;/td&gt; 
    &lt;td&gt; &lt;p&gt;Microsoft Unified Support or pay-as-you-go Azure support tiers&lt;/p&gt; &lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td&gt; &lt;p&gt;&lt;b&gt;Omnissa Horizon Cloud&lt;/b&gt; &lt;i&gt;(formerly VMware Horizon Cloud)&lt;/i&gt;&lt;/p&gt; &lt;/td&gt; 
    &lt;td&gt; &lt;p&gt;Omnissa cloud + hybrid deployment options&lt;/p&gt; &lt;/td&gt; 
    &lt;td&gt; &lt;p&gt;Horizon subscription; enterprise IT team for deployment&lt;/p&gt; &lt;/td&gt; 
    &lt;td&gt; &lt;p&gt;Subscription-based; costs vary by package (Standard, Advanced, Enterprise); Microsoft licensing rules apply&lt;/p&gt; &lt;/td&gt; 
    &lt;td&gt; &lt;p&gt;Higher setup effort; best for enterprises that need hybrid cloud services&lt;/p&gt; &lt;/td&gt; 
    &lt;td&gt; &lt;p&gt;Omnissa enterprise support (successor to VMware Global Support Services)&lt;/p&gt; &lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td&gt; &lt;p&gt;&lt;b&gt;Dizzion Frame&lt;/b&gt; &lt;i&gt;(formerly Nutanix Frame)&lt;/i&gt;&lt;/p&gt; &lt;/td&gt; 
    &lt;td&gt; &lt;p&gt;Dizzion cloud or customer cloud (AWS, Azure, GCP)&lt;/p&gt; &lt;/td&gt; 
    &lt;td&gt; &lt;p&gt;Dizzion subscription&lt;/p&gt; &lt;/td&gt; 
    &lt;td&gt; &lt;p&gt;Licensing bundled with subscription; flexible hybrid deployment supported&lt;/p&gt; &lt;/td&gt; 
    &lt;td&gt; &lt;p&gt;Low to moderate setup -- browser-based management simplifies provisioning&lt;/p&gt; &lt;/td&gt; 
    &lt;td&gt; &lt;p&gt;Direct support from Dizzion (24/7 options available), often bundled into subscription&lt;/p&gt; &lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td&gt; &lt;p&gt;&lt;b&gt;Citrix DaaS&lt;/b&gt; &lt;i&gt;(formerly Citrix Virtual Apps and Desktops Service)&lt;/i&gt;&lt;/p&gt; &lt;/td&gt; 
    &lt;td&gt; &lt;p&gt;Citrix Cloud service on Azure, AWS, GCP, or hybrid&lt;/p&gt; &lt;/td&gt; 
    &lt;td&gt; &lt;p&gt;Citrix Cloud subscription; enterprise identity system&lt;/p&gt; &lt;/td&gt; 
    &lt;td&gt; &lt;p&gt;Subscription-based; integrates with Microsoft licensing for Windows; supports SaaS, VDI, and hybrid deployments&lt;/p&gt; &lt;/td&gt; 
    &lt;td&gt; &lt;p&gt;Moderate to high setup depending on architecture; strong use in regulated industries&lt;/p&gt; &lt;/td&gt; 
    &lt;td&gt; &lt;p&gt;Citrix Standard and Premium Support packages; enterprise SLAs available&lt;/p&gt; &lt;/td&gt; 
   &lt;/tr&gt; 
  &lt;/tbody&gt; 
 &lt;/table&gt;
 &lt;p&gt;&lt;i&gt;Learn &lt;/i&gt;&lt;i&gt;more about Omnissa, the company that took over VMware's end-user computing division, and &lt;a href="https://www.techtarget.com/searchvirtualdesktop/opinion/Who-owns-Omnissa-and-whats-next-for-this-vendor"&gt;find out what's expected next&lt;/a&gt; for this vendor's subscription licensing model and product offerings.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>Desktop as a service (DaaS) is a cloud computing offering in which a third party hosts the back end of a virtual desktop infrastructure (VDI) deployment.</description>
            <image>https://cdn.ttgtmedia.com/visuals/digdeeper/5.jpg</image>
            <link>https://www.techtarget.com/searchvirtualdesktop/definition/desktop-as-a-service-DaaS</link>
            <pubDate>Wed, 15 Oct 2025 00:00:00 GMT</pubDate>
            <title>What is desktop as a service (DaaS)?</title>
        </item>
        <item>
            <body>&lt;p&gt;To find the right VDI software for their organization, IT administrators must understand how tools from vendors such as Citrix and Omnissa differ.&lt;/p&gt; 
&lt;p&gt;Omnissa Horizon (formerly VMware Horizon) and Citrix Virtual Apps and Desktops (CVAD) are two major platforms that offer virtual desktop infrastructure. &lt;a href="https://www.techtarget.com/searchvirtualdesktop/opinion/VMware-EUC-is-now-Omnissa-What-we-know-so-far"&gt;Omnissa is a new company&lt;/a&gt; formed after Broadcom's acquisition of VMware. Broadcom sold VMware's end-user computing division to an investment company for it to continue under the name &lt;i&gt;Omnissa&lt;/i&gt;.&lt;/p&gt; 
&lt;p&gt;VMware and Citrix have been prominent VDI providers for years. As the VDI landscape evolves and VMware Horizon takes on a new name, IT needs to know what each platform has to offer today and how their differences can affect management.&amp;nbsp;&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="VDI deployment options for Citrix and Omnissa"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;VDI deployment options for Citrix and Omnissa&lt;/h2&gt;
 &lt;p&gt;One of the most important considerations for choosing a VDI provider is knowing which deployment options are available. Before diving into feature details, admins must weigh on-premises capabilities and cloud integration in the context of their infrastructure needs.&lt;/p&gt;
 &lt;p&gt;Citrix's and Omnissa's platforms are both feature-rich and able to support on-premises, cloud and hybrid deployments. Still, differences in their approaches can help determine which platform is the best fit for an organization.&lt;/p&gt;
 &lt;h3&gt;On-premises and cloud support from Citrix&lt;/h3&gt;
 &lt;p&gt;In addition to Citrix's XenServer hypervisor, CVAD supports many different hypervisors, such as Nutanix AHV and &lt;a href="https://www.techtarget.com/searchvmware/definition/VMware-ESXi"&gt;VMware ESXi&lt;/a&gt;. Citrix also supports a wide range of cloud platforms, including Microsoft Azure, AWS, IBM Cloud, Oracle Cloud and Google Cloud. This provides customers with a flexible choice for both on-premises deployments and cloud deployments.&lt;/p&gt;
 &lt;p&gt;Additionally, Citrix offers desktop as a service (&lt;a href="https://www.techtarget.com/searchvirtualdesktop/definition/desktop-as-a-service-DaaS"&gt;DaaS&lt;/a&gt;) that can integrate with on-premises environments. With Citrix DaaS, organizations can choose between a deployment that runs entirely in the cloud and a hybrid deployment with management components in the cloud and virtual desktops in a customer's data center. The hybrid approach eliminates the need to maintain the management and control plane on premises. This enables IT to instead focus on managing virtual desktop resources.&lt;/p&gt;
 &lt;h3&gt;On-premises and cloud support from Omnissa&lt;/h3&gt;
 &lt;p&gt;Omnissa Horizon is still tightly integrated with the VMware vSphere hypervisor, ESXi. Until recently, the platform didn't support any other hypervisors. Currently, Omnissa has an agreement with Broadcom that allows it to keep shipping ESXi and vSAN with its products. However, Omnissa Horizon can run virtual machines on Hyper-V and recently &lt;a target="_blank" href="https://www.omnissa.com/insights/blog/omnissa-horizon-8-support-for-nutanix-ahv/" rel="noopener"&gt;added&lt;/a&gt; limited support for Nutanix AHV.&lt;/p&gt;
 &lt;p&gt;As for cloud support, Omnissa offers Horizon Cloud Service Next-Gen. This DaaS deployment enables organizations to run virtual desktops through approved &lt;a target="_blank" href="https://techzone.omnissa.com/resource/horizon-cloud-service-next-gen-architecture#introduction" rel="noopener"&gt;infrastructure&lt;/a&gt; providers, including Amazon WorkSpaces Core and Microsoft Azure IaaS.&lt;/p&gt;
 &lt;p&gt;Organizations seeking to use cloud technology might find that Citrix DaaS or CVAD is their best option. Citrix has a long history in this market and offers broad support for major cloud providers. Hypervisor compatibility also isn't really a concern with Citrix products.&lt;/p&gt;
 &lt;p&gt;Omnissa, on the other hand, has yet to prove itself as a cloud-first vendor. For on-premises deployments, Omnissa Horizon might be more suitable because of its tight integration with VMware vSphere components such as ESXi and vSAN. The ESXi hypervisor continues to have a strong reputation in the industry for its stability and performance. In the next few years, the question will be whether Omnissa can provide the same features, stability and performance on other hypervisors.&lt;/p&gt;
&lt;/section&gt;           
&lt;section class="section main-article-chapter" data-menu-title="Comparing the technical features of Citrix and Omnissa"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Comparing the technical features of Citrix and Omnissa&lt;/h2&gt;
 &lt;p&gt;From a technical perspective, Citrix's and Omnissa's desktop virtualization products are similar. While the components of each platform have their own characteristics, both vendors show comparable performance across the full list.&lt;/p&gt;
 &lt;p&gt;The following table outlines the vendors' different features.&lt;/p&gt;
 &lt;table class="main-article-table"&gt; 
  &lt;thead&gt; 
   &lt;tr style="height: 18px;"&gt; 
    &lt;td style="width: 150.25pt;"&gt;&lt;/td&gt; 
    &lt;td style="width: 150.25pt;"&gt;Citrix&lt;/td&gt; 
    &lt;td style="width: 150.3pt;"&gt;Omnissa&lt;/td&gt; 
   &lt;/tr&gt; 
  &lt;/thead&gt; 
  &lt;tbody&gt; 
   &lt;tr style="height: 55px;"&gt; 
    &lt;td style="width: 150.25pt;"&gt; &lt;p&gt;&lt;b&gt;On-premises VDI offering&lt;/b&gt;&lt;/p&gt; &lt;/td&gt; 
    &lt;td style="width: 150.25pt;"&gt; &lt;p&gt;Citrix Virtual Apps and Desktops&lt;/p&gt; &lt;/td&gt; 
    &lt;td style="width: 150.3pt;"&gt; &lt;p&gt;Omnissa Horizon&lt;/p&gt; &lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr style="height: 55px;"&gt; 
    &lt;td style="width: 150.25pt;"&gt; &lt;p&gt;&lt;b&gt;DaaS offering&lt;/b&gt;&lt;/p&gt; &lt;/td&gt; 
    &lt;td style="width: 150.25pt;"&gt; &lt;p&gt;Citrix DaaS&lt;/p&gt; &lt;/td&gt; 
    &lt;td style="width: 150.3pt;"&gt; &lt;p&gt;Omnissa Horizon Cloud Service Next-Gen&lt;/p&gt; &lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr style="height: 55px;"&gt; 
    &lt;td style="width: 150.25pt;"&gt; &lt;p&gt;&lt;b&gt;Remote display protocol&lt;/b&gt;&lt;/p&gt; &lt;/td&gt; 
    &lt;td style="width: 150.25pt;"&gt; &lt;p&gt;HDX&lt;/p&gt; &lt;/td&gt; 
    &lt;td style="width: 150.3pt;"&gt; &lt;p&gt;Blast Extreme&lt;/p&gt; &lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr style="height: 55px;"&gt; 
    &lt;td style="width: 150.25pt;"&gt; &lt;p&gt;&lt;b&gt;Client support &lt;/b&gt;&lt;/p&gt; &lt;/td&gt; 
    &lt;td style="width: 150.25pt;"&gt; &lt;p&gt;- Citrix Workspace app for Windows, Linux, macOS, iOS, Android or ChromeOS&lt;/p&gt; &lt;p&gt;- HTML5 browser&lt;/p&gt; &lt;p&gt;- All leading thin clients&lt;/p&gt; &lt;/td&gt; 
    &lt;td style="width: 150.3pt;"&gt; &lt;p&gt;- Omnissa Horizon client for Windows, Linux, macOS, iOS, Android or ChromeOS&lt;/p&gt; &lt;p&gt;- HTML5 browser&lt;/p&gt; &lt;p&gt;- All leading thin clients&lt;/p&gt; &lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr style="height: 55px;"&gt; 
    &lt;td style="width: 150.25pt;"&gt; &lt;p&gt;&lt;b&gt;Virtual desktop OSes&lt;/b&gt;&lt;/p&gt; &lt;/td&gt; 
    &lt;td style="width: 150.25pt;"&gt; &lt;p&gt;Windows, Linux&lt;/p&gt; &lt;/td&gt; 
    &lt;td style="width: 150.3pt;"&gt; &lt;p&gt;Windows, Linux&lt;/p&gt; &lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr style="height: 55px;"&gt; 
    &lt;td style="width: 150.25pt;"&gt; &lt;p&gt;&lt;b&gt;Authentication &lt;/b&gt;&lt;/p&gt; &lt;/td&gt; 
    &lt;td style="width: 150.25pt;"&gt; &lt;p&gt;- Active Directory required&lt;/p&gt; &lt;p&gt;- Smart card and MFA through Citrix Workspace app&lt;/p&gt; &lt;p&gt;- Login through Storefront Portal&lt;/p&gt; &lt;/td&gt; 
    &lt;td style="width: 150.3pt;"&gt; &lt;p&gt;- Active Directory required&lt;/p&gt; &lt;p&gt;- Smart card and MFA through Horizon client&lt;/p&gt; &lt;p&gt;- Login through Workspace One Access Portal&lt;/p&gt; &lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr style="height: 55px;"&gt; 
    &lt;td style="width: 150.25pt;"&gt; &lt;p&gt;&lt;b&gt;Remote Desktop Services support&lt;/b&gt;&lt;/p&gt; &lt;/td&gt; 
    &lt;td style="width: 150.25pt;"&gt; &lt;p&gt;Available through Citrix Virtual Delivery Agent&lt;/p&gt; &lt;/td&gt; 
    &lt;td style="width: 150.3pt;"&gt; &lt;p&gt;Available through Omnissa Horizon Agent&lt;/p&gt; &lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr style="height: 55px;"&gt; 
    &lt;td style="width: 150.25pt;"&gt; &lt;p&gt;&lt;b&gt;Remote access&lt;/b&gt;&lt;/p&gt; &lt;/td&gt; 
    &lt;td style="width: 150.25pt;"&gt; &lt;p&gt;Citrix Gateway&lt;/p&gt; &lt;p&gt;Remote PC Access for physical resources&lt;/p&gt; &lt;/td&gt; 
    &lt;td style="width: 150.3pt;"&gt; &lt;p&gt;Unified Access Gateway&lt;/p&gt; &lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr style="height: 55px;"&gt; 
    &lt;td style="width: 150.25pt;"&gt; &lt;p&gt;&lt;b&gt;Supported cloud environments&lt;/b&gt;&lt;/p&gt; &lt;/td&gt; 
    &lt;td style="width: 150.25pt;"&gt; &lt;p&gt;Microsoft Azure, Windows 365 Cloud PC, AWS, IBM Cloud, Oracle Cloud, Google Cloud&lt;/p&gt; &lt;/td&gt; 
    &lt;td style="width: 150.3pt;"&gt; &lt;p&gt;Microsoft Azure, Windows 365 Cloud PC, Amazon WorkSpaces Core, Google Cloud&lt;/p&gt; &lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr style="height: 55px;"&gt; 
    &lt;td style="width: 150.25pt;"&gt; &lt;p&gt;&lt;b&gt;App layering&lt;/b&gt;&lt;/p&gt; &lt;/td&gt; 
    &lt;td style="width: 150.25pt;"&gt; &lt;p&gt;Citrix App Layering&lt;/p&gt; &lt;/td&gt; 
    &lt;td style="width: 150.3pt;"&gt; &lt;p&gt;App Volumes&lt;/p&gt; &lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr style="height: 55px;"&gt; 
    &lt;td style="width: 150.25pt;"&gt; &lt;p&gt;&lt;b&gt;Profile and policy management&lt;/b&gt;&lt;/p&gt; &lt;/td&gt; 
    &lt;td style="width: 150.25pt;"&gt; &lt;p&gt;Citrix Profile Management&lt;/p&gt; &lt;/td&gt; 
    &lt;td style="width: 150.3pt;"&gt; &lt;p&gt;Dynamic Environment Manager&lt;/p&gt; &lt;/td&gt; 
   &lt;/tr&gt; 
  &lt;/tbody&gt; 
 &lt;/table&gt;
 &lt;p&gt;Both vendors use an adaptive remote display protocol -- HDX for Citrix, and Blast Extreme for Omnissa -- to adjust for high-latency, low-bandwidth connections. Citrix's adaptive display feature and Omnissa's codec switching feature both automatically apply the right codec for video, image or text encoding. For security, Citrix and Omnissa offer similar authentication and remote access options.&lt;/p&gt;
 &lt;p&gt;Depending on the hypervisor or cloud provider, both Citrix and Omnissa support vGPU acceleration for graphics processing. They also support conferencing software optimization, multimedia processing and peripheral connections such as printers and USB devices.&lt;/p&gt;
 &lt;p&gt;Because both vendors offer a comprehensive feature set, the key thing for organizations to evaluate is whether either product meets all of their requirements. There are so many different use cases for virtual desktops that no one platform can fit them all.&lt;/p&gt;
 &lt;h3&gt;Supported clients and access methods&lt;/h3&gt;
 &lt;p&gt;Citrix and Omnissa both support Windows, Linux, macOS, iOS, Android and ChromeOS devices. Major &lt;a href="https://www.techtarget.com/searchvirtualdesktop/feature/How-to-pick-the-best-thin-client-OS-for-an-organization"&gt;vendors in the thin client market&lt;/a&gt;, such as iGel, Dell and HP, also support both platforms. Additionally, both platforms enable users to access virtual resources from a web browser.&lt;/p&gt;
 &lt;p&gt;&lt;a href="https://www.techtarget.com/searchvirtualdesktop/definition/Remote-Desktop-Session-Host-RDSH"&gt;Microsoft Remote Desktop Session Host&lt;/a&gt; access and app publishing are available with Citrix and Omnissa. This provides seamless access to Windows-based applications from any device.&lt;/p&gt;
 &lt;h3&gt;Management and monitoring&lt;/h3&gt;
 &lt;p&gt;CVAD and Citrix DaaS have separate management consoles. Likewise, Omnissa Horizon Cloud Service Next-Gen also has a separate management console from on-premises Horizon environments.&lt;/p&gt;
 &lt;p&gt;In terms of management capabilities, Citrix has more advanced monitoring and analytics features through &lt;a href="https://www.techtarget.com/searchvirtualdesktop/feature/Monitor-VDI-with-these-top-tools"&gt;tools like Director&lt;/a&gt; and Analytics. Omnissa Horizon does integrate with VMware Aria Operations, but IT decision-makers have to wait to see how integration with VMware products might evolve in the future. For serious monitoring and troubleshooting, most Omnissa Horizon customers use additional third-party software.&lt;/p&gt;
 &lt;p&gt;Organizations wanting to implement virtual desktops should first decide between on-premises VDI or cloud-based DaaS. Citrix and Omnissa have very different support for cloud environments or hypervisors. When planning an on-premises deployment, the hypervisor that the organization already uses can also guide the choice between CVAD and Omnissa Horizon.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Editor's note:&lt;/b&gt;&lt;i&gt; This article was originally written by Chris Twiest in October 2022. Rob Bastiansen wrote an updated version in September 2025 to reflect changes in the VDI market and improve the reader experience.&lt;/i&gt;&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Rob Bastiaansen is an independent trainer and consultant based in the Netherlands specializing in VMware and Linux. He writes articles for several print and online publications, and is founder of VMwarebits.com, a site dedicated to technical content related to VMware.&lt;/i&gt;&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Chris Twiest works as a technology officer at RawWorks in the Netherlands, focusing on the future Workspace and Cloud technologies for the end user.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>Citrix Virtual Apps and Desktops and Omnissa Horizon -- formerly VMware Horizon -- can simplify VDI management for IT. Discover the key differences between the vendors' offerings.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/competition_a110169470.jpg</image>
            <link>https://www.techtarget.com/searchvirtualdesktop/tip/Comparing-the-features-of-Citrix-and-VMwares-VDI-software</link>
            <pubDate>Wed, 24 Sep 2025 00:00:00 GMT</pubDate>
            <title>Comparing VDI software from Omnissa and Citrix</title>
        </item>
        <item>
            <body>&lt;p&gt;I was eager to attend Omnissa One 2025 this week to see how the company would lay out its vision at an in-person event more than a year after its launch party­ -- an event that I thought missed the mark. This year, it did not disappoint.&lt;/p&gt; 
&lt;p&gt;At last year's event, I felt like Omnissa could've done a better job of focusing on the practical questions that customers had regarding the transition from VMware to Broadcom to Omnissa, as well as the current state -- and direction of -- its products. Instead, it focused on broad-strokes AI that left a lot of questions on the table.&lt;/p&gt; 
&lt;p&gt;This week, that all changed, and Omnissa not only answered the questions many people had -- it took a few moments to throw some barbs at "monopolistic pricing schemes," "licensing," and "bloated tools." It's language I hadn't heard the company use before, which indicates that things are a bit different now.&lt;/p&gt; 
&lt;p&gt;Here's a look at a few of my key takeaways. You can check the &lt;a target="_blank" href="https://www.omnissa.com/insights/" rel="noopener"&gt;Omnissa blogs&lt;/a&gt; for all the announcements.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="Workspace One is now decoupled from MDM"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Workspace One is now decoupled from MDM&lt;/h2&gt;
 &lt;p&gt;One of my big questions heading into this was, "How can Omnissa continue to be successful with Workspace One amidst Intune adoption?" This has long been a challenge for any company that isn't Microsoft, but being part of VMware opened up some opportunity for a quid pro quo to carve out room for competition. Without the VMware parts, the dynamic surely changed.&lt;/p&gt;
 &lt;p&gt;The answer is, in American football parlance, an end-around. The challenges came from conflicts in using the MDM APIs in Windows, so the solution was to decouple Workspace One from MDM. This is shocking if you go back to the AirWatch days, but it makes sense. Plus, it frees Omnissa up to implement its roadmap without having to navigate some rather large roadblocks. This also means anyone can run it on any device, even on devices with &lt;a href="https://www.techtarget.com/searchwindowsserver/tip/SCCM-vs-Intune-A-closer-look-at-the-capabilities-of-each"&gt;Intune or Config Manager&lt;/a&gt; -- a significant change from the Workspace One of the VMware era.&lt;/p&gt;
 &lt;p&gt;Finally, this next-gen approach to endpoint management actually enables Workspace One to work with Horizon, including building VMs and host pools using Workspace One with Freestyle. (The trick to make MDM work with virtual desktops? Don't use MDM!)&lt;/p&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="Workspace One will manage servers, too"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Workspace One will manage servers, too&lt;/h2&gt;
 &lt;p&gt;Though I primarily cover endpoint devices and stay out of the data center, there are some indications that organizations are starting to think about the servers that they manage as though they were endpoints, at least in terms of management and security. It appears Omnissa is picking up on this, too, and at the event, the company announced that server management with Workspace One is in limited availability.&lt;/p&gt;
&lt;/section&gt;  
&lt;section class="section main-article-chapter" data-menu-title="Autonomous endpoint management"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Autonomous endpoint management&lt;/h2&gt;
 &lt;p&gt;It's still early days for autonomous endpoint management (AEM). There is a lot to be written on the topic, but it aligns perfectly with one of the main initiatives at the intersection of endpoint management and security: consolidation.&lt;/p&gt;
 &lt;p&gt;Consolidation was a core theme throughout the keynote, and a big part of the consolidation story for Omnissa is its Autonomous Workspace vision. With it, the company is entering the autonomous endpoint management fray alongside the likes of Adaptiva, NinjaOne, &lt;a href="https://www.techtarget.com/searchenterprisedesktop/opinion/Tanium-aims-to-be-first-with-autonomous-endpoint-management"&gt;Tanium&lt;/a&gt; and more. While the actual AEM term was conspicuously absent, I got clarification later that Omnissa views it as a component of Autonomous Workspace, which includes other things like apps, virtual desktops and even servers.&lt;/p&gt;
 &lt;p&gt;Like everyone building AEM technology, this is a mix of vision and reality. The most tangible autonomous capability shown was Workspace One Vulnerability Defense, which ingests vulnerability data, prioritizes it based on risk level, and deploys automations with a degree of autonomy.&lt;/p&gt;
 &lt;p&gt;(This seems like the logical first entry point, and NinjaOne is doing the same thing with its recently announced Autonomous Patch Management.)&lt;/p&gt;
 &lt;p&gt;There's a lot more to unpack here, but AEM is an area I've recently conducted research into, and 96% of organizations expressed some level of interest, deployment, or piloting of AEM. This high level of interest is tied to many factors, which boil down to four key themes:&lt;/p&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;Efficiency and automation.&lt;/li&gt; 
  &lt;li&gt;Security and risk mitigation.&lt;/li&gt; 
  &lt;li&gt;Intelligence and decision-making.&lt;/li&gt; 
  &lt;li&gt;Compliance and visibility.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;Still, if I had to sum up the interest in AEM with one word, it would be "consolidation." There are too many tools. Too many alerts. Too many signals. Too much data. Too many processes. AEM represents a way to get a grip on all of that, increasing visibility, decreasing mean time to repair, and improving the processes and workflows that comprise endpoint management and security.&lt;/p&gt;
 &lt;p&gt;Stay tuned to this space!&lt;/p&gt;
&lt;/section&gt;         
&lt;section class="section main-article-chapter" data-menu-title="App Volumes is a core pillar of Omnissa"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;App Volumes is a core pillar of Omnissa&lt;/h2&gt;
 &lt;p&gt;I've been a big fan of app management in general, and App Volumes specifically, for many years. Historically, App Volumes was treated as an offshoot of Horizon, which makes sense given it was only used in virtual desktops. Version 4 represented a large upgrade that eliminated many of the problems that plagued it in earlier versions, and since then, Omnissa has continued to build out the product.&lt;/p&gt;
 &lt;p&gt;Today's App Volumes includes new features like Apps on Demand and a broader set of tools to help with the entire application lifecycle. With the &lt;a target="_blank" href="https://www.omnissa.com/insights/blog/omnissa-new-offering-apps-essentials/" rel="noopener"&gt;release&lt;/a&gt; of Apps Essentials, it's decoupled from Horizon, so anyone -- even Citrix customers -- can get the benefits without having to buy/deploy the full Horizon stack.&lt;/p&gt;
 &lt;p&gt;At Omnissa One, the team finally announced that App Volumes would work for physical devices in the coming months, and, given its ability to package, deploy and update apps, you can see where this will factor into the broader Autonomous Workspace vision.&lt;/p&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="Conclusion"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Conclusion&lt;/h2&gt;
 &lt;p&gt;There is a lot more to unpack, like what Omnissa has done with digital employee experience, the capabilities in Freestyle, how Omnissa views AI -- and is using it in intentional ways, not just &lt;a href="https://www.techtarget.com/whatis/feature/AI-washing-explained-Everything-you-need-to-know"&gt;AI washing&lt;/a&gt; things -- and the entirely new ModStack architecture upon which everything is going to be built.&lt;/p&gt;
 &lt;p&gt;The key takeaway for me, though, is that Omnissa has a clear, sharp direction now -- something I wasn't able to say a year ago. It seems to have the right pieces to address the top concerns that I observe at the intersection of endpoint management and security. Omnissa is not alone, so its ability to execute on the plan and deliver products that work and show immediate value will be critical, but it sure is an interesting time in this space.&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Gabe Knuth is the principal analyst covering end-user computing for Enterprise Strategy Group, now part of Omdia. &lt;/i&gt;&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Enterprise Strategy Group is part of Omdia. Its analysts have business relationships with technology vendors.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>Omnissa One 2025 highlighted developments like App Volumes for physical devices and server management in Workspace One. This is a big shift from previous vague announcements.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/strategy_g1192721749.jpg</image>
            <link>https://www.techtarget.com/searchenterprisedesktop/opinion/Omnissa-found-its-voice-in-the-post-VMware-era</link>
            <pubDate>Thu, 18 Sep 2025 10:00:00 GMT</pubDate>
            <title>Omnissa found its voice in the post-VMware era</title>
        </item>
        <item>
            <body>&lt;p&gt;The device as a service (DaaS) model offers PCs, smartphones and other mobile computing devices as a paid service. Device as a service eases the IT needs of a company by outsourcing the hardware, software and device management to an external provider. Subscribing to a provider lets an organization update its equipment at the end of the lease period without incurring the costs normally associated with a device refresh.&lt;/p&gt; 
&lt;p&gt;DaaS is considered part of the &lt;a href="https://www.techtarget.com/searchcloudcomputing/definition/XaaS-anything-as-a-service"&gt;anything as a service&lt;/a&gt;. The trend for using these services has grown fast, starting with only one percent of PCs shipped as part of a DaaS program in 2014. Based on Grand View Research's &lt;a target="_blank" href="https://www.grandviewresearch.com/industry-analysis/device-as-a-service-market-report" rel="noopener"&gt;market forecast&lt;/a&gt;, the global DaaS market size was valued at $83 billion in 2022 and is expected to grow to $757 billion by 2030.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="How does DaaS work?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;How does DaaS work?&lt;/h2&gt;
 &lt;p&gt;DaaS services for software and hardware management include device backups, asset tracking, security and end-of-life disposal. Devices offered as a service include hardware, such as PCs, laptops, desktops, tablets and mobile phones.&lt;/p&gt;
 &lt;p&gt;Device-as-a-service vendors provide a contract stating the hardware, software, services and lengths of time covered by their services. Payment is normally on a per-device basis. Some &lt;a href="https://www.techtarget.com/searchitchannel/definition/OEM"&gt;original equipment manufacturers&lt;/a&gt; offer DaaS with a limited number of choices from their overall device lineup. Users can't replace hardware they're using from a vendor when they wish. Typically, a contract states two, three or five-year timelines for device replacement.&lt;/p&gt;
 &lt;p&gt;Devices typically come with the software the organization needs already installed. Usually, vendors also include an upgrade path for patches and updates.&lt;/p&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="Three pillars of DaaS"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Three pillars of DaaS&lt;/h2&gt;
 &lt;p&gt;The following three areas make up DaaS services:&lt;/p&gt;
 &lt;ol class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Device fulfillment.&lt;/b&gt; DaaS providers supply businesses with the latest technology, preconfigured and ready to use. This lets DaaS customer skip large &lt;a href="https://www.techtarget.com/whatis/definition/CAPEX-capital-expenditure"&gt;capital expenditures&lt;/a&gt;.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Device services.&lt;/b&gt; This covers the ongoing support, maintenance, security updates and other IT management capabilities needed to keep devices operational.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Device recovery.&lt;/b&gt; This includes the secure collection, refurbishment or &lt;a href="https://www.techtarget.com/searchenterprisedesktop/tip/How-to-securely-recycle-enterprise-computers"&gt;disposal of outdated devices&lt;/a&gt; while protecting any sensitive business data stored on those devices.&lt;/li&gt; 
 &lt;/ol&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/it_channel-daas_characteristics.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/it_channel-daas_characteristics_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/it_channel-daas_characteristics_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/it_channel-daas_characteristics.png 1280w" alt="List of key characteristics of device as a service offerings" height="353" width="520"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;The flexibility to scale up or down makes the device as a service model an appealing option for small businesses.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="DaaS pricing models"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;DaaS pricing models&lt;/h2&gt;
 &lt;p&gt;DaaS services offer different pricing models. The most common models include the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Subscription-based. &lt;/b&gt;Businesses pay a monthly, quarterly, yearly or other type of recurring fee.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Use-based.&lt;/b&gt; Costs are based on actual device use, which can allow organizations to scale their technology needs without overpaying for unused resources.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Bundled.&lt;/b&gt; This approach combines hardware, software and IT support into a single pricing package.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Full cycle.&lt;/b&gt; This covers the entire &lt;a href="https://www.techtarget.com/searchenterprisedesktop/feature/How-to-create-an-effective-PC-lifecycle-policy"&gt;lifecycle of a device&lt;/a&gt; from purchase to end-of-life recycling and disposal.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Customizable.&lt;/b&gt; This tailored approach lets organizations mix and match hardware and services based on their needs.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Hardware-based.&lt;/b&gt; Customers get new hardware, delivery and setup without the need for upfront purchases.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Service-based.&lt;/b&gt; This approach includes services such as maintenance, repairs and technical support.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="What are the benefits of DaaS?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;What are the benefits of DaaS?&lt;/h2&gt;
 &lt;p&gt;Device as a service can bring various benefits, mostly for smaller &lt;a href="https://www.techtarget.com/searchcio/definition/startup"&gt;startup&lt;/a&gt; organizations. These benefits include the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Organizations can scale devices up and down as needed, although scaling down can often only be done at the end of the contract period.&lt;/li&gt; 
  &lt;li&gt;Costs are changed from capital expenditures to &lt;a href="https://www.techtarget.com/whatis/definition/OPEX-operational-expenditure"&gt;operating expenses&lt;/a&gt;.&lt;/li&gt; 
  &lt;li&gt;IT staff's workload is reduced because device configuration is no longer required.&lt;/li&gt; 
  &lt;li&gt;DaaS includes automatic device management, such as patches and updates.&lt;/li&gt; 
  &lt;li&gt;It gives startups the ability to acquire a collection of devices without the normal, high upfront cost.&lt;/li&gt; 
  &lt;li&gt;It's a good option for smaller companies that lack in-house IT expertise.&lt;/li&gt; 
  &lt;li&gt;DaaS gives organizations the option of trading up for newer devices at the end of the contract period.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="Drawbacks of the DaaS model"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Drawbacks of the DaaS model&lt;/h2&gt;
 &lt;p&gt;Although many potential benefits are associated with the device-as-a-service model, organizations should consider the possible disadvantages. They include the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;The organization never actually owns the devices, even though it is paying for them in perpetuity.&lt;/li&gt; 
  &lt;li&gt;Despite vendor claims to the contrary, the total cost of ownership can be higher in some cases.&lt;/li&gt; 
  &lt;li&gt;Because vendors service and maintain devices, &lt;a href="https://www.techtarget.com/searchcio/definition/data-privacy-information-privacy"&gt;privacy&lt;/a&gt; can be a concern.&lt;/li&gt; 
  &lt;li&gt;DaaS might not be an option in certain regulated industries.&lt;/li&gt; 
  &lt;li&gt;Device selection can be limited to certain models.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="Common DaaS options"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Common DaaS options&lt;/h2&gt;
 &lt;p&gt;Two primary examples of device-as-a-service offerings are from HP and Lenovo. HP offers HP Managed Device Services, which has device options ranging from commercial notebooks, desktops and specialized devices. It has even expanded to offering hardware outside of HP's hardware, such as Apple Macs, iPhones and iPads.&lt;/p&gt;
 &lt;p&gt;Lenovo also has a DaaS initiative called Lenovo TruScale Device as a Service. It offers customers a range of devices such as PCs, tablets, smartphones and video conferencing and collaboration tools.&lt;/p&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="Who uses DaaS?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Who uses DaaS?&lt;/h2&gt;
 &lt;p&gt;DaaS is used in a variety of businesses and industries. The most common include:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Enterprises.&lt;/li&gt; 
  &lt;li&gt;Startups and small and medium businesses.&lt;/li&gt; 
  &lt;li&gt;Healthcare providers.&lt;/li&gt; 
  &lt;li&gt;Online and brick-and-mortar retailers.&lt;/li&gt; 
  &lt;li&gt;Educational institutions.&lt;/li&gt; 
  &lt;li&gt;Financial service providers.&lt;/li&gt; 
  &lt;li&gt;Governments agencies.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="Device as a service vs. desktop as a service"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Device as a service vs. desktop as a service&lt;/h2&gt;
 &lt;p&gt;Device as a service shares the DaaS acronym with &lt;a href="https://www.techtarget.com/searchvirtualdesktop/definition/desktop-as-a-service-DaaS"&gt;desktop as a service&lt;/a&gt;, which can be confusing when using the acronym. With device as a service, physical hardware is offered to customers under a subscription model. This can include PCs, tablets, smartphones and other physical devices.&lt;/p&gt;
 &lt;p&gt;Desktop as a service is a cloud computing offering where a third party offers a virtual desktop running on a cloud-based &lt;a href="https://searchservervirtualization.techtarget.com/definition/virtual-machine"&gt;virtual machine&lt;/a&gt; (VM). The desktop-as-a-service provider hosts the back end of a &lt;a href="https://www.techtarget.com/searchvirtualdesktop/definition/virtual-desktop-infrastructure-VDI"&gt;virtual desktop infrastructure&lt;/a&gt; deployment, and the guest operating system runs inside a VM on a physical server that resides in the cloud service provider's data center.&lt;/p&gt;
 &lt;p&gt;Desktop-as-a-service providers bill their customers monthly, based on the number of virtual desktops they're using. In contrast, device-as-a-service providers usually require an annual or multiyear commitment.&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Device as a service is often compared to PC as a service. &lt;/i&gt;&lt;a href="https://www.techtarget.com/searchenterprisedesktop/tip/PCaaS-vs-DaaS-learn-the-difference-between-these-services"&gt;&lt;i&gt;Learn the difference between DaaS and PCaaS&lt;/i&gt;&lt;/a&gt;&lt;i&gt;.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>The device as a service (DaaS) model offers PCs, smartphones and other mobile computing devices as a paid service.</description>
            <image>https://cdn.ttgtmedia.com/visuals/digdeeper/6.jpg</image>
            <link>https://www.techtarget.com/searchvirtualdesktop/definition/device-as-a-service</link>
            <pubDate>Thu, 11 Sep 2025 14:09:00 GMT</pubDate>
            <title>What is device as a service (DaaS)?</title>
        </item>
        <item>
            <body>&lt;p&gt;A graphics processing unit (GPU) is a computer &lt;a href="https://www.techtarget.com/whatis/definition/microchip"&gt;chip&lt;/a&gt; that renders graphics and images by performing rapid mathematical calculations. GPUs are used for both professional and personal computing. Originally, GPUs were responsible for the rendering of 2D and &lt;a href="https://www.techtarget.com/whatis/definition/3-D-three-dimensions-or-three-dimensional"&gt;3D&lt;/a&gt; images, animations and video, but now they have a wider use range.&lt;/p&gt; 
&lt;p&gt;Like a central processing unit (&lt;a href="https://www.techtarget.com/whatis/definition/processor"&gt;CPU&lt;/a&gt;), a GPU is also a chip component in computing devices. One important difference is that the GPU is specifically designed to handle and accelerate graphics workloads and display graphics content on a device such as a PC or &lt;a href="https://www.techtarget.com/searchmobilecomputing/definition/smartphone"&gt;smartphone&lt;/a&gt;.&lt;/p&gt; 
&lt;p&gt;An electronic device with an &lt;a href="https://www.techtarget.com/whatis/definition/embedded-device"&gt;embedded&lt;/a&gt; or discrete GPU can smoothly render 3D graphics and video content, making it suitable for gaming and other visual applications. Over time, technological improvements have resulted in more flexible and programmable GPUs that can be used for many more applications and workloads other than gaming. GPUs are now used for creative content production, video editing, high-performance computing (&lt;a href="https://www.techtarget.com/searchdatacenter/definition/high-performance-computing-HPC"&gt;HPC&lt;/a&gt;) and artificial intelligence (&lt;a href="https://www.techtarget.com/searchenterpriseai/definition/AI-Artificial-Intelligence"&gt;AI&lt;/a&gt;).&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="What does a GPU do?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;What does a GPU do?&lt;/h2&gt;
 &lt;p&gt;In the early days of computing, the CPU performed the calculations required for graphics applications, such as the rendering of 2D and 3D images, animations and video. As more graphics-intensive applications were developed, however, their demands put a strain on the CPU and decreased the computer's overall performance.&lt;/p&gt;
 &lt;p&gt;Today, a GPU is a specialized computing system that performs these tasks:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Handles graphics-related tasks in lieu of the CPU.&lt;/li&gt; 
  &lt;li&gt;Performs graphics calculations very quickly.&lt;/li&gt; 
  &lt;li&gt;Uses &lt;a href="https://www.techtarget.com/searchdatacenter/definition/parallel-processing"&gt;parallel processing&lt;/a&gt; to increase processing performance.&lt;/li&gt; 
  &lt;li&gt;Delivers graphic content to the computer display.&lt;/li&gt; 
  &lt;li&gt;Frees up the CPU to handle all other processing tasks.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="How does a GPU work?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;How does a GPU work?&lt;/h2&gt;
 &lt;p&gt;GPUs work by using parallel processing, where multiple processors handle separate parts of a single task. A GPU will also have its own &lt;a href="https://www.techtarget.com/searchstorage/definition/RAM-random-access-memory"&gt;RAM&lt;/a&gt; to store the data it is processing. This RAM is designed specifically to hold the large amounts of information coming into the GPU for highly intensive graphics use cases.&lt;/p&gt;
 &lt;p&gt;For graphics applications, the CPU sends instructions to the GPU for drawing the graphics content on a screen. The GPU executes the instructions in parallel and at high speeds to display the content on the device -- a process known as the graphics or rendering &lt;a href="https://www.techtarget.com/whatis/definition/pipelining"&gt;pipeline&lt;/a&gt;.&lt;/p&gt;
 &lt;div class="youtube-iframe-container"&gt;
  &lt;iframe id="ytplayer-0" src="https://www.youtube.com/embed/_DNxgnINNAY?autoplay=0&amp;amp;modestbranding=1&amp;amp;rel=0&amp;amp;widget_referrer=null&amp;amp;enablejsapi=1&amp;amp;origin=https://www.techtarget.com" type="text/html" height="360" width="640" frameborder="0"&gt;&lt;/iframe&gt;
 &lt;/div&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="Are GPUs and graphics cards the same?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Are GPUs and graphics cards the same?&lt;/h2&gt;
 &lt;p&gt;GPU and graphics card are two terms that are sometimes used interchangeably. However, there are some important distinctions between the two. The main difference is that the GPU is a specific unit within a graphics card, among other components. The GPU is what performs the image and graphics processing. The graphics card presents images to the display unit.&lt;/p&gt;
 &lt;h3&gt;GPU use cases: What GPUs are used for today&lt;/h3&gt;
 &lt;p&gt;GPUs are widely used for PC gaming, allowing for smooth, high-quality graphics rendering. Modern GPUs are also adapted to a wider variety of tasks than they were originally designed for, partially because they are more programmable than they were in the past. That's why GPUs are now also used to &lt;a href="https://www.techtarget.com/searchenterpriseai/feature/CPUs-vs-GPUs-for-AI-workloads"&gt;accelerate AI workloads&lt;/a&gt; and for machine learning (&lt;a href="https://www.techtarget.com/searchenterpriseai/definition/machine-learning-ML"&gt;ML&lt;/a&gt;).&lt;/p&gt;
 &lt;p&gt;Some of the most popular applications of GPUs include:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Rendering real-time 2D and 3D graphics&lt;/b&gt;. These devices perform complicated mathematical calculations using &lt;a href="https://www.techtarget.com/whatis/definition/algorithm"&gt;algorithms&lt;/a&gt; that convert moving bits into &lt;a href="https://www.techtarget.com/whatis/definition/pixel"&gt;pixels&lt;/a&gt; on displays.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Video editing and video content creation&lt;/b&gt;. When used for video content creation and editing, GPUs deliver high-resolution images and videos, enhanced video effects using AI, and provide sufficient RAM to handle the computational requirements of video content.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Video game graphics.&lt;/b&gt; Video game GPUs perform the same kinds of complex calculations using parallel processing as for other graphics tasks, and deliver images and videos by managing tasks such as shading, lighting and texturing, each of which is needed for realistic game visuals.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Accelerating AI/ML applications.&lt;/b&gt; GPUs have the processing power needed to support the massive computations and algorithms used in AI and ML applications, such as image recognition and &lt;a href="https://www.techtarget.com/searchenterpriseai/definition/face-detection"&gt;facial detection&lt;/a&gt; and &lt;a href="https://www.techtarget.com/searchenterpriseai/definition/facial-recognition"&gt;recognition&lt;/a&gt;.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Training deep learning neural networks&lt;/b&gt;. GPUs have thousands of smaller core memory units that work in parallel to provide the matrix processing needed for &lt;a href="https://www.techtarget.com/searchenterpriseai/definition/deep-learning-deep-neural-network"&gt;deep learning&lt;/a&gt; training and &lt;a href="https://www.techtarget.com/searchenterpriseai/definition/neural-network"&gt;neural networks&lt;/a&gt;.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Cryptomining. &lt;/b&gt;GPUs support cryptocurrency mining, especially for coins that employ Proof of Work (&lt;a href="https://www.techtarget.com/whatis/feature/Proof-of-work-vs-proof-of-stake-Whats-the-difference"&gt;PoW&lt;/a&gt;) mechanisms for establishing consensus; they also use parallel processing to perform multiple &lt;a href="https://www.techtarget.com/searchdatamanagement/definition/hashing"&gt;hash&lt;/a&gt; functions.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="Types of GPUs"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Types of GPUs&lt;/h2&gt;
 &lt;p&gt;Generally, there are three types of GPUs:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Integrated GPU. A&lt;/b&gt;n integrated GPU is built into the computer's &lt;a href="https://www.techtarget.com/whatis/definition/motherboard"&gt;motherboard&lt;/a&gt; or could be integrated with the CPU. Systems with integrated GPUs are generally small and light because less space is required to incorporate the GPU. The use of an internal GPU also reduces system power consumption. When buying a system with an internal GPU, care must be taken as the internal GPU may not be upgradeable. If buying a gaming computer, the GPU is an essential part of the device and should be carefully researched.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Discrete GPU.&lt;/b&gt; This is a physically separate GPU and is mounted separately from the CPU and other peripherals on the motherboard. While such devices typically offer far more processing power than an integrated GPU, they also increase power usage and generate additional heat, which may necessitate additional cooling. Discrete GPUs are used for resource-intensive, high-performance applications such as 3D games.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Hybrid GPU.&lt;/b&gt; A hybrid GPU arrangement can take different forms, such as combining an integrated GPU with a discrete GPU in the same system, with one used for normal graphics and the discrete unit for high-performance requirements. Another approach is to combine discrete graphics performance with specialized accelerators, such as for AI applications.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="What is a cloud GPU?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;What is a cloud GPU?&lt;/h2&gt;
 &lt;p&gt;Taking advantage of the convenience, &lt;a href="https://www.techtarget.com/searchdatacenter/definition/scalability"&gt;scalability&lt;/a&gt; and costs of &lt;a href="https://www.techtarget.com/searchcloudcomputing/definition/cloud-computing"&gt;cloud computing&lt;/a&gt; services, users can obtain the GPU functionality they need by obtaining it from a cloud vendor. All three major cloud services, AWS, Microsoft Azure and Google Cloud, offer virtual machines (&lt;a href="https://www.techtarget.com/searchitoperations/definition/virtual-machine-VM"&gt;VMs&lt;/a&gt;) with built-in GPU speed and functionality. Cloud GPU services are typically used in compute-intensive situations involving AI, video game development and &lt;a href="https://www.techtarget.com/whatis/definition/Bitcoin-mining"&gt;bitcoin mining&lt;/a&gt;. As with any activity involving cloud services, cybersecurity must be carefully managed.&lt;/p&gt;
&lt;/section&gt;  
&lt;section class="section main-article-chapter" data-menu-title="GPU vs. CPU"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;GPU vs. CPU&lt;/h2&gt;
 &lt;p&gt;A GPU might be found integrated with a CPU on the same electronic circuit, on a graphics card or in the motherboard of a PC or &lt;a href="https://www.techtarget.com/whatis/definition/server"&gt;server&lt;/a&gt;. GPUs and CPUs are fairly similar in construction. However, CPUs are used to respond to and process the basic instructions that drive a computer, while GPUs are designed specifically to quickly render high-resolution images and video.&lt;/p&gt;
 &lt;p&gt;Essentially, CPUs are responsible for interpreting most of a computer's commands, while GPUs perform more complex mathematical and geometric calculations to focus on graphics rendering and other applications that require intensive calculations.&lt;/p&gt;
 &lt;p&gt;Both processors have different numbers of cores and transistors. The core can be thought of as the processor within the processor. Each core can process its own tasks, or &lt;a href="https://www.techtarget.com/whatis/definition/thread"&gt;threads&lt;/a&gt;. A CPU uses fewer cores and performs tasks sequentially. A GPU, in contrast, might have hundreds or thousands of cores, which allow for parallel processing and lightning-fast graphics output.&lt;/p&gt;
 &lt;p&gt;A single-core CPU usually lacks the capability for parallel processing, but &lt;a href="https://www.techtarget.com/searchdatacenter/definition/multi-core-processor"&gt;multicore processors&lt;/a&gt; can perform calculations in parallel by combining more than one CPU onto the same chip. GPUs can also contain more transistors than a CPU.&lt;/p&gt;
 &lt;p&gt;In addition, a CPU has a higher &lt;a href="https://www.techtarget.com/whatis/definition/clock-speed"&gt;clock speed&lt;/a&gt;, meaning it can perform an individual calculation faster than a GPU, so it is often better equipped to handle basic computing tasks.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/enterprise_ai-cpu_vs_gpu_chips.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/enterprise_ai-cpu_vs_gpu_chips_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/enterprise_ai-cpu_vs_gpu_chips_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/enterprise_ai-cpu_vs_gpu_chips.png 1280w" alt="CPU vs. GPU chips" height="370" width="560"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;While their architectures and technologies are similar, CPUs and GPUs perform discrete functions, with GPUs focused on calculation-intensive computations.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;p&gt;&lt;i&gt;Data centers use three processing units: CPU, GPU, and DPU. Each has unique functions that can be combined to enhance data center performance. Explore &lt;/i&gt;&lt;a href="https://www.techtarget.com/searchdatacenter/tip/How-do-CPU-GPU-and-DPU-differ-from-one-another"&gt;&lt;i&gt;how CPU vs. GPU vs. DPU differ from one another&lt;/i&gt;&lt;/a&gt;&lt;i&gt;.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>A graphics processing unit (GPU) is a computer chip that renders graphics and images by performing rapid mathematical calculations.</description>
            <image>https://cdn.ttgtmedia.com/visuals/digdeeper/6.jpg</image>
            <link>https://www.techtarget.com/searchvirtualdesktop/definition/GPU-graphics-processing-unit</link>
            <pubDate>Fri, 05 Sep 2025 13:00:00 GMT</pubDate>
            <title>What is a graphics processing unit (GPU)?</title>
        </item>
        <item>
            <body>&lt;p&gt;Virtual desktop clients play a crucial role for any organization that uses VDI, Desktop as a Service, or cloud desktops because it is what allows an end user to connect to and use their virtual desktop.&lt;/p&gt; 
&lt;p&gt;This client is designed to access, not run the virtual desktop OS, meaning it sends keyboard and mouse inputs to the virtual desktop and receives screen refreshes. Most of the actual computing occurs on the server that is hosting the virtual desktop.&lt;/p&gt; 
&lt;p&gt;Offloading compute and storage from the endpoint device to a server reduces the hardware requirements for end user devices. In fact, an endpoint device does not necessarily have to meet the minimum hardware requirements for the OS and applications that the user works with, because that software is running on a backend server, not on the client device itself.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="Deciding between thin and thick clients"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Deciding between thin and thick clients&lt;/h2&gt;
 &lt;p&gt;Managing and delivering virtual desktops is a significant task for IT administrators to take on, but sometimes choosing the right endpoint for accessing the virtual desktop can go a long way for the user experience.&lt;/p&gt;
 &lt;p&gt;One key decision surrounding virtual desktop delivery is whether end users access their resources via a &lt;a href="https://www.techtarget.com/searchnetworking/definition/thin-client"&gt;thin client&lt;/a&gt; or a PC running thin client software. Such PCs are commonly referred to as thick clients. Both types of endpoints have their benefits and drawbacks, so IT admins and executives should be sure they know the pros and cons of using both thin and thick clients.&lt;/p&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="Differences between thin clients and thick clients"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Differences between thin clients and thick clients&lt;/h2&gt;
 &lt;p&gt;Thin clients and thick clients -- sometimes referred to as &lt;i&gt;fat clients&lt;/i&gt; -- differ across numerous categories, such as hardware cost, licensing and maintenance. Each organization will have different needs and preferences regarding which functions are most important.&lt;/p&gt;
 &lt;h3&gt;Security&lt;/h3&gt;
 &lt;p&gt;One of the primary benefits of &lt;a href="https://www.techtarget.com/searchvirtualdesktop/tip/Evaluating-tablets-as-thin-clients-in-the-enterprise"&gt;using thin client hardware&lt;/a&gt; compared to thick client hardware is security. Thin client devices may not even be equipped with an internal hard drive and removable media ports, which means &lt;a href="https://www.techtarget.com/searchsecurity/feature/Explore-7-data-loss-prevention-tools-for-utmost-security"&gt;users can't copy data from within the network to removable media&lt;/a&gt;. While it is true that some thin client devices do contain a small amount of internal storage, this storage is almost always reserved for use by the device's internal OS and cannot be used for data storage or for installing applications directly onto the device.&lt;/p&gt;
 &lt;p&gt;Because thin client machines typically do not have an accessible hard drive, there is very little risk of malware infecting the client itself, though under the right circumstances the virtual desktop operating system could be infected.&lt;/p&gt;
 &lt;p&gt;Although &lt;a href="https://www.techtarget.com/searchvirtualdesktop/opinion/Is-it-time-for-a-new-name-for-thin-clients"&gt;a desktop PC can function as a thin client computer&lt;/a&gt;, the thin client software typically resides on top of a normal OS. As such, the device would be susceptible to many of the same types of security risks as it would be if it were operating as a regular PC within the virtual environment.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/virt_desktop-thin_vs_thick_vs_zero_clients-f.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/virt_desktop-thin_vs_thick_vs_zero_clients-f_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/virt_desktop-thin_vs_thick_vs_zero_clients-f_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/virt_desktop-thin_vs_thick_vs_zero_clients-f.png 1280w" alt="An illustration comparing thin, thick and zero clients" height="342" width="560"&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;h3&gt;Startup costs&lt;/h3&gt;
 &lt;p&gt;Initial deployment costs are a major consideration for some organizations. While it is true that thin client hardware typically has a very low price tag, the cost of deploying thin clients may be much higher than that of deploying PCs. For example, organizations that already own PCs can reuse them, which will cut down significantly on hardware costs. At the same time, organizations that start from scratch will see lower costs with thin client hardware. Some thin client devices cost as little as $300 or less out of the box. Organizations can opt for even greater savings if they purchase refurbished devices, but this may not be worth the hassle from a support perspective.&lt;/p&gt;
 &lt;h3&gt;Software licensing costs&lt;/h3&gt;
 &lt;p&gt;When comparing thin clients to thick clients to determine which platform is a better fit, an organization absolutely must consider software licensing costs. Traditional PCs acting as thick clients are almost always required to run a full OS, such as Windows 10 or Windows 11. This is in addition to licensing the client software and any other software that might be installed locally on the PC. As such, an organization could end up being forced to pay for two operating system licenses for each device. One of these licenses covers the local OS while the other applies to the operating system running on the virtual desktop.&lt;/p&gt;
 &lt;p&gt;A dedicated thin client device may come with its own light weight operating system. This could be a Linux kernel, or perhaps a copy of Windows Embedded. This can reduce licensing costs, since the organization would only be responsible for licensing the OS that is running on the virtual desktop.&lt;/p&gt;
 &lt;p&gt;Thin client devices could potentially incur licensing costs that thick clients do not. Some vendors offer management software for thin client devices, and this management software is often licensed on a per device basis. However, some vendors bundle the management license into the device's cost.&lt;/p&gt;
 &lt;p&gt;Licensing requirements can vary widely depending on the virtual desktop operating system that in use are using and on how the virtual desktops are being hosted. Windows 365, Microsoft's cloud desktop offering, for example, is licensed on a per user basis, not a per device basis. However, depending on which tier is in use, there may be additional licensing requirements, such as Microsoft Intune, or Entra ID Premium.&lt;/p&gt;
 &lt;h3&gt;Maintenance costs&lt;/h3&gt;
 &lt;p&gt;One of the big selling points of thin client hardware is that it reduces maintenance costs. Thin client devices are essentially proprietary PCs that only have their most basic components in place. As such, IT doesn't have to perform much maintenance. There are almost no moving parts, so thin client devices also tend to last a long time. However, when a problem does occur, there might be nothing that admins can do to fix it. IT may have to replace the device.&lt;/p&gt;
 &lt;p&gt;Conversely, it is usually easier to fix hardware problems that occur on a PC. Admins can replace the failed component, typically for much less than the cost of &lt;a href="https://www.techtarget.com/searchvirtualdesktop/feature/VDI-hardware-comparison-Thin-vs-thick-vs-zero-clients"&gt;replacing an entire thin client device&lt;/a&gt;.&lt;/p&gt;
 &lt;blockquote class="main-article-pullquote"&gt;
  &lt;div class="main-article-pullquote-inner"&gt;
   &lt;figure&gt;
    Zero clients offer the lowest per device cost, fastest boot times, and smallest attack surface of any of the client types.
   &lt;/figure&gt;
   &lt;i class="icon" data-icon="z"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/blockquote&gt;
 &lt;p&gt;Of course, this is only taking hardware maintenance into account. PCs need consistent maintenance at the software level. For example, IT must routinely install patches to keep a PC's OS, applications, and antivirus software up to date.&lt;/p&gt;
 &lt;h3&gt;Power consumption&lt;/h3&gt;
 &lt;p&gt;When comparing thin and thick client's power consumption, thin clients tend to consume far less power than PCs. Of course, power consumption varies among makes and models, but organizations can count on thin clients generally being far more &lt;a target="_blank" href="https://www.scribd.com/document/505807953/Energy-Study" rel="noopener"&gt;energy efficient&lt;/a&gt; if that's a concern for organizations.&lt;/p&gt;
 &lt;h3&gt;Flexibility&lt;/h3&gt;
 &lt;p&gt;Flexibility is the category in which PCs are finally able to make up some ground. It's clear that thin client devices tend to have more advantages than PCs in virtual desktop environments, but in a business environment, the flexibility provided by PCs could make up for all these disadvantages.&lt;/p&gt;
 &lt;p&gt;For example, consider an organization that goes through a corporate buyout. The organization already has a VDI platform in place, but the organization that completed the acquisition uses mainframes. Because some users have to connect to the VDI environment and the mainframe, it is necessary to replace the existing thin client hardware with PCs.&lt;/p&gt;
 &lt;p&gt;One option is to link the PCs' network cards to the VDI environment while a secondary network card links to a mainframe gateway. Users could then run a dual monitor configuration with one screen displaying the VDI session and the other showing the mainframe session.&lt;/p&gt;
 &lt;p&gt;This functionality and level of flexibility are not possible without dedicated thin client hardware and is just one scenario showcasing how the flexibility of PCs helps organizations.&lt;/p&gt;
 &lt;div class="youtube-iframe-container"&gt;
  &lt;iframe id="ytplayer-0" src="https://www.youtube.com/embed/gctocRTgq-U?si=_5vQSfj9cYXSDFGx?autoplay=0&amp;amp;modestbranding=1&amp;amp;rel=0&amp;amp;widget_referrer=null&amp;amp;enablejsapi=1&amp;amp;origin=https://www.techtarget.com" type="text/html" height="360" width="640" frameborder="0"&gt;&lt;/iframe&gt;
 &lt;/div&gt;
&lt;/section&gt;                           
&lt;section class="section main-article-chapter" data-menu-title="What are zero clients and are they an option?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;&lt;br&gt;What are zero clients and are they an option?&lt;/h2&gt;
 &lt;p&gt;&lt;a href="https://www.techtarget.com/searchvirtualdesktop/definition/zero-client"&gt;Zero clients&lt;/a&gt; are a lot like thin clients, but they take things just a step further. While a thin client typically contains an embedded, lightweight operating system and some minimal hardware resources to support that OS, a zero client has no local operating system at all -- though they do contain firmware. Instead, these devices are configured to connect to a specific virtual desktop platform by using a platform specific protocol such as PC over IP or HDX.&lt;/p&gt;
 &lt;p&gt;Zero clients offer the lowest per device cost, fastest boot times, and smallest attack surface of any of the client types. Because zero clients do not include an OS, there is no internal storage device, and thus, nothing that can be infected by malware.&lt;/p&gt;
 &lt;p&gt;The low cost, simplicity, and security associated might on the surface seem to be ideal. However, this convenience and security comes at a cost. Zero clients lack any sort of flexibility. These clients are designed to do one job, and they cannot be repurposed to do something else. As such, zero clients are often a great choice for organizations that have very clearly defined goals for their endpoints. However, they probably aren't going to be the best choice for use in a highly dynamic environment.&lt;/p&gt;
 &lt;p&gt;&lt;em&gt;Brien Posey is a former 22-time Microsoft MVP and a commercial astronaut candidate. In his more than 30 years in IT, he has served as a lead network engineer for the U.S. Department of Defense and a network administrator for some of the largest insurance companies in America.&lt;/em&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>How do thin and thick clients compare for licensing or flexibility? These endpoints have their role in the enterprise, but they fit into organizations in very different ways.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/competition_a110169470.jpg</image>
            <link>https://www.techtarget.com/searchvirtualdesktop/tip/Weighing-the-pros-and-cons-of-thin-clients-vs-thick-clients-for-VDI</link>
            <pubDate>Tue, 02 Sep 2025 00:00:00 GMT</pubDate>
            <title>Understanding the difference between thin and thick clients</title>
        </item>
        <title>Search Virtual Desktop Resources and Information from TechTarget</title>
        <ttl>60</ttl>
        <webMaster>webmaster@techtarget.com</webMaster>
    </channel>
</rss>
