Note
To perform this task, you must be the desktop administrator.
-
Open the navigation menu and click Compute. Under Secure Desktops, click Desktop Pools.
-
Under List scope, select the compartment that you want to create the pool in.
The compartment determines which user groups can access the pool. See Understanding Desktop User Access to a Desktop Pool.
-
Click Create desktop pool.
-
Enter a name for the desktop pool, to be used to list desktops in the Secure Desktops interface (1024-character maximum).
Make the value something meaningful to desktop users.
Avoid entering confidential information. You can edit this value later.
-
(Optional) Enter a description for the desktop pool (1024-character maximum).
Users don't see this description.
Avoid entering confidential information. You can edit this value later.
-
(Optional) For Pool start time, select the date and time when the pool becomes accessible.
Specifying this value is useful if you want to configure a pool in advance. All times are in Coordinated Universal Time (UTC) format. If you don’t specify a start time, the pool starts immediately after it’s created. You can edit this value later.
-
(Optional) For Pool stop time, select the date and time when the pool stops and becomes inaccessible.
Specifying this value is useful if you want to restrict pool access to a defined period, for example, a trade show. All times are in Coordinated Universal Time (UTC) format. You can edit this value later.
Note
When a pool stops, it’s shut down but not deleted.
-
(Optional) For Administrator contact details, enter the information that’s displayed to desktop users if they need to contact the administrator (1024-character maximum).
For example, you might want to include the email of the administrator.
Avoid entering confidential information. You can edit this value later.
-
(Optional) Select Enable administrator privileges for users on their desktop to allow the desktop users to have administration privileges on their virtual desktops.
-
Under Pool size, specify the following values:
- Maximum size: The maximum number of desktops in the pool.
- Standby size: The number of available, unassigned desktops. Standby desktops consume resources because they’re running and available for immediate allocation to desktop users.
You can edit these values later.
-
Under Placement, select the availability domain in which to locate the desktop resources.
-
Under Image and Shape, specify the following values:
- Desktop image: The image used for the desktops. This can be a standard image or custom image. See Desktop Images.
- Desktop shape: The compute shape for the desktops.
For Windows desktop pools, which require dedicated virtual machine hosts, use one of the following preferred shapes. They are mapped to DVH shapes for allocation of OCPUs and memory.
- Flex Low (2 OCPUs, 4GB RAM)
- Flex Medium (4 OCPUs, 8GB RAM)
- Flex High (8 OCPUs, 16GB RAM)
-
(Optional) To provide persistent storage to desktop users by creating a block volume associated with a user, select Enable desktop storage and then specify the following values:
-
Under Networking, specify the following values:
- Virtual cloud network: Select the virtual cloud network (VCN) for the desktops in this pool. The VCN is used for connections to the desktop from Secure Desktops and for connections from the desktop.
- Subnet: Select a subnet in the VCN to use for the desktops.
- To specify one or more network security groups (NSGs) that will include the primary virtual network interface card (VNIC) for the desktop, click Show advanced options and select Use network security groups to control traffic. Then, select the network security groups to apply. For Secure Desktops, you can specify a maximum of four network security groups.
Note
When planning networking requirements, be sure to include any necessary ingress and egress rules (for example, to the open internet). After a pool is created, its NSG configuration can’t be changed.
-
Under Device access policy, specify how the virtual desktop and the client device interact:
- Clipboard access: Specify whether and how the virtual desktop can access the clipboard on the client device.
- Audio access: Specify whether and how the virtual desktop can access the speakers and microphone on the client device. This option is supported only when using the installed client, and the Audio In (microphone) value is supported only on Windows desktops.
- Drive mapping access: Specify whether and how the virtual desktop can access drives on the client device. If you select Read/Write, users can move content between their local system and the virtual desktop.
You can edit these values later.
-
Under Regular schedule, specify recurring times and days to start and stop the desktops in the pool. You can edit these values later.
-
Click Show tagging options to add tags to the desktop pool.
If you have permissions to create a resource, then you also have permissions to apply free-form tags to that resource. To apply a defined tag, you must have permissions to use the tag namespace.
Use tags to enable additional features for the desktop pool:
- Optionally, add a tag to set a custom hostname prefix for desktops in the desktop pool.
- For a Windows 11 desktop pool, add required tags to enable Measured Boot and Secure Boot for shielded desktop instances.
-
Click Create.