"isolate" access to RDSH hosts in RDS farm

Home Forums Virtualization Terminal Services "isolate" access to RDSH hosts in RDS farm

Viewing 1 post (of 1 total)
  • Author

  • mla

    RDS 2012 R2 – 2 Brokers 2 RDSHs and SQL in deployment. Using RemoteApp.
    I have couple of non standard apps.
    I would like to add one more RDSH for the beginning and install on it just non standard apps. Then I want to publish them as RemoteApps.
    1. Let say User1 accessing apps available for him from RDSH1 and RDSH2 in current situation. I add RDSH3 with published Remote App and provide access to User1. If he will access apps published on RDSH1 and 2 I will see one connection in RDS manager to server 1 or 2 and if he will access app that is published from RDSH3 I will see one more connection of this user to server 3.
    I guess it will work without any trouble. Correct?
    2. Then I add 10 more users with the same access rights.
    Connections to RDSH1 and 2 will be split between both as it is now (by load balancing) because they have the same apps availabel. But the connections opened by the app published from RDSH3 will all made to this machine
    In other word can I have different apps on different RDSHs and would it affect brokers? Or everything should be smooth from connection distribution perspectives. Sure Servers load is taking into consideration.
    The reason that I want to go this way is to not pollute clean hosts that don’t have any installed apps. I deliver Virtual Apps on them and then publish by RemoteApp. Only those Virtual Apps that could not be published as RemoteApp must be isolated in my approach.
    Am I on right way by thinking of Apps isolation by RDSHs?

Viewing 1 post (of 1 total)

You must be logged in to reply to this topic.

External Sharing and Guest User Access in Microsoft 365 and Teams

This eBook will dive into policy considerations you need to make when creating and managing guest user access to your Teams network, as well as the different layers of guest access and the common challenges that accompany a more complicated Microsoft 365 infrastructure.

You will learn:

  • Who should be allowed to be invited as a guest?
  • What type of guests should be able to access files in SharePoint and OneDrive?
  • How should guests be offboarded?
  • How should you determine who has access to sensitive information in your environment?

Sponsored by: