Solved

terminal services acceptance sheet

Posted on 2010-09-05
6
380 Views
Last Modified: 2012-08-13
Hi there,

I have been working on a project to provide users access to applications via terminal services. I would like to have some questions or report so that the users can check these critical points.
I would like to call it user acceptance list.

I want to know from application point of view what questions to ask and the points to put there so that they can just check it. We are basically comparing this application access with the user experience when they run the same application locally on their desktop.

Can you please assit me on this requirement.
0
Comment
Question by:Zak
  • 3
  • 3
6 Comments
 
LVL 4

Accepted Solution

by:
gozoliet earned 500 total points
Comment Utility
Pretty open-ended. General questions I might ask:
- Does the application work
- Open/Save documents
- Print (to remote printer/ to local user's printer)
- Screen resolution adequate
- Custom Fonts?
- Do they need internet access/ applications through terminal services? (Flash, browser versions, etc)

Biggest challenge we've faced was supporting remote user's printers connected through terminal services.

Also consider user profile questions - are they logging in as themselves, as a remote user.
- Are the programs available through Start Menu?
- Do the users have access to system functions they shouldn't? (shutdown server, restart, task manager, My Computer)
- If you lock everything down on the profile, do they have things they need? (Home Directory, etc).

Hope that helps as a starting point.
0
 
LVL 4

Expert Comment

by:gozoliet
Comment Utility
Couple other questions... Do they ever need to update the application? Does it need administrative access?
Also ensure the application works with more than one person using it at the same time. Some work fine as long as it's only one at a time. Also check if same user needs to and/or can have the application open twice.. often they open a second session, or are logged in twice on the network (i.e. an application like Outlook locks the mailbox file)
0
 

Author Comment

by:Zak
Comment Utility
I am thinking of asking them about performance related as well.
0
What Is Threat Intelligence?

Threat intelligence is often discussed, but rarely understood. Starting with a precise definition, along with clear business goals, is essential.

 
LVL 4

Expert Comment

by:gozoliet
Comment Utility
Agreed. Compare load times when opening, saving, closing, accessing reports. Ask them if slower, the same or Faster. If noticeably different ask for how many seconds (or god forbid minutes)! Locally vs remote. Ask about moving around using keystrokes if thee is a delay and is it acceptable. Same for scrolling around using mouse. Every program will have specific areas that more refresh intensive.

Be sure to get basic hardware/software specs from test client as well as network (lan or wan) connection.  and if possible monitor servers performance monitors in case you have bottleneck needing more CPU or ram or better hd.
0
 

Author Comment

by:Zak
Comment Utility
Thank you for all the points I am still working on this template of questions and will get back to you shortly.
0
 

Author Closing Comment

by:Zak
Comment Utility
nice
0

Featured Post

Complete Microsoft Windows PC® & Mac Backup

Backup and recovery solutions to protect all your PCs & Mac– on-premises or in remote locations. Acronis backs up entire PC or Mac with patented reliable disk imaging technology and you will be able to restore workstations to a new, dissimilar hardware in minutes.

Join & Write a Comment

This is an issue that we can get adding / removing permissions in the vCSA 6.0. We can also have issues searching for users / groups in the AD (using your identify sources). This is how one of the ways to handle this issues and fix it.
HOW TO: Connect to the VMware vSphere Hypervisor 6.5 (ESXi 6.5) using the vSphere (HTML5 Web) Host Client 6.5, and perform a simple configuration task of adding a new VMFS 6 datastore.
Teach the user how to install ESXi 5.5 and configure the management network System Requirements: ESXi Installation:  Management Network Configuration: Management Network Testing:
This Micro Tutorial walks you through using a remote console to access a server and install ESXi 5.1. This example is showing remote access and installation using a Dell server. The hypervisor is the very first component of your virtual infrastructu…

763 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now