Coming Soon: GET:IT Endpoint Management 1-Day Conference on September 28th at 9:30 AM ET Coming Soon: GET:IT Endpoint Management 1-Day Conference on September 28th at 9:30 AM ET

Configure VMware View Persona Management

The management of user profiles is an important function in any virtual End User Computing (EUC) deployment. Without managing and capturing user profiles, the user’s experience cannot be persisted across different services or upon recovering from a disaster. Today I’ll give a walkthrough of the basic setup of the VMware View persona management feature.

VMware View Persona Management: Group Policy

To get things started, you will need to log onto a computer or server on which you can edit Group Policy for the domain that you will be managing. For my example, I am using one of the AD servers. Use the Group Policy Management application as shown below.

VMware View Persona Management: Group Policy


Sponsored Content

Say Goodbye to Traditional PC Lifecycle Management

Traditional IT tools, including Microsoft SCCM, Ghost Solution Suite, and KACE, often require considerable custom configurations by T3 technicians (an expensive and often elusive IT resource) to enable management of a hybrid onsite + remote workforce. In many cases, even with the best resources, organizations are finding that these on-premise tools simply cannot support remote endpoints consistently and reliably due to infrastructure limitations.

If you do not already have a GPO to modify, you will need to create a new one. You may also need to create a new OU for the virtual desktops to exist within to manage the GPOs for them. For the sake of this walkthrough, I used an existing folder and right-clicked Create a GPO.

VMware View Persona Management: Group Policy


Configure VMware View Persona Management

After the test policy was created, I can now begin configuring View persona management. I have chosen to edit the policy that was created in the previous step.

  • Expand the computer polices you can locate the folder for Persona Management, as shown below. Look through the items in the right window and find the Manage user persona selection and edit it.

VMware View Persona Management: Group Policy Management Editor


  • When editing the policy, Enable the feature. The only other value to that can be changed is the upload interval, this is the number of minutes between synchronizations of the users profile. You might need to increase or decrease the interval, depending on your requirements

enable vmware view persona management


  • The next item that must be edited to start managing user profiles is the location to store user profiles. You must edit the Persona repository location item. Choose to Enable the feature, then enter the path to the CIFS share in which they will be stored.

enable vmware view persona repository location

In its simplest form, View Persona Management would used for setting up and capturing user profiles. There are still a number of other features that you may need to adjust. These other options allow features for use of Windows roaming profiles, or the options could be used to control what folders are synchronized in the background and which ones are exempt. The image below shows the other options that I did not cover in this post.

enable vmware view persona other options

Admins are able to setup View Persona Management for both virtual desktops and physical computers. This allows for user profiles to be managed in either environment. I have commonly seen customers use persona management to capture the profiles on physical computers to help in the migration to virtual desktops.

Related Topics:


Don't have a login but want to join the conversation? Sign up for a Petri Account

Comments (0)

Leave a Reply

Live Webinar: Active Directory Security: What Needs Immediate Priority!Live on Tuesday, October 12th at 1 PM ET

Attacks on Active Directory are at an all-time high. Companies that are not taking heed are being punished, both monetarily and with loss of production.

In this webinar, you will learn:

  • How to prioritize vulnerability management
  • What attackers are leveraging to breach organizations
  • Where Active Directory security needs immediate attention
  • Overall strategy to secure your environment and keep it secured

Sponsored by: