Solved

Terminal Server and Windows Server 2008

Posted on 2014-04-17
4
871 Views
Last Modified: 2014-04-21
Hi Experts,

What are the characteristics of a session in Terminal Server and how are they in Windows Server 2008?  To be more precise, does everyone have their own login name, own user files (like 'C:\Users\username\AppData\Roaming').  And do they all have their own user and local machine registry settings?

Many thanks,
Mike
0
Comment
Question by:thready
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
4 Comments
 
LVL 37

Assisted Solution

by:bbao
bbao earned 167 total points
ID: 40008163
almost same as the local users on console including the username, profile, private registry settings. also by default, the profiles are local rather than roaming if not assigned.

some differences may apply such as audio/video settings from point of view of performance, also printers may be remapped to remote clients if required.

what's your actual concerns about this?
0
 
LVL 15

Assisted Solution

by:joharder
joharder earned 166 total points
ID: 40008597
What you're describing is exactly why Terminal Server is described as a multi-user environment.  Multiple users share access the server in their own isolated environment.

Because the capabilities of Terminal Server are limited, many organizations choose to run Citrix or VMware as well in order to provide a better user experience.
0
 
LVL 25

Accepted Solution

by:
Coralon earned 167 total points
ID: 40009032
As mentioned above, it is a multi-user system.

So, what you have is this:
Each user will have their own profile.  This will be all of their HKCU settings in the registry, along with all the files in c:\users\%username%.   You can (and generally *should*) make use of some form of roaming profile/profile management solution to keep their settings consistent across multiple servers.  

However - for each server, there is only 1 set of Machine settings (HKLM, %programdata%) for each machine.  You will generally manage those by GPO (again to maintain consistency).  

One of the critical aspects of TS/RDS for your users is what is commonly referred to as the 'shadow key'.   When you use install mode to install your applications (this is done by either the command 'change user /install' or by using the Add/Remove Programs wizard), then any registry settings that get created in HKCU are copied into this key under HKLM\Software\Microsoft\Windows NT\Current Version\Terminal Server\Install\Software.  These keys are timestamped.  If a user logs in and does not have these settings or has these settings with an older timestamp, these keys & values are copied to the user's registry.  (This behavior can be modified on a per-application basis also).   (on a 64bit machine, there are separate 32bit & 64bit versions of the shadow key).  

Coralon
0
 
LVL 1

Author Closing Comment

by:thready
ID: 40012379
Thanks everyone!
0

Featured Post

Three Reasons Why Backup is Strategic

Backup is strategic to your business because your data is strategic to your business. Without backup, your business will fail. This white paper explains why it is vital for you to design and immediately execute a backup strategy to protect 100 percent of your data.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

When you try to extract and to view the contents of a Microsoft Update Standalone Package (MSU) for Windows Vista, you cannot extract the files from the MSU. Here we are going to explain how to extract those hotfix details without using any third pa…
A project that enables an administrator to perform actions within a user session context not just at the time of login but any time later on day(s) or week(s) later.
This tutorial will walk an individual through the steps necessary to enable the VMware\Hyper-V licensed feature of Backup Exec 2012. In addition, how to add a VMware server and configure a backup job. The first step is to acquire the necessary licen…
This tutorial will walk an individual through configuring a drive on a Windows Server 2008 to perform shadow copies in order to quickly recover deleted files and folders. Click on Start and then select Computer to view the available drives on the se…

749 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question