Return to blog index

VMware Horizon: Install the VMware Horizon Client on macOS

It’s a breeze to install the VMware Horizon Client on macOS — in this short video, we’ll show you how!

Posted on · Last updated on

Hi. My name is Matt Mulcahy.

I’m the Director of Business Development at ProSource.

And today we’re going to walk through installing

the VMware Horizon agent on a Mac.

The first thing you’ll do is navigate to view2fa.prosourcehosted.com.

It’s very important that you install the agent from our website,

as there’s a specific version that you download.

The first thing you’ll do is click the install VMware Horizon Client button

and it will download the package.

Once the download is complete, go ahead and open it.

And walk through the terms and conditions.

Drag the VMware Horizon Client

icon into your “Applications” folder.

To quickly access your “Applications”

folder with the Finder application open, click “Go”

and “Applications.”

From here, you’ll see the Horizon Client.

You can double-click.

You’ll want to hit “Open,” as this is a trusted download.

And the Horizon application is downloaded.

There are instances where you will have to go to the security pane

under “Security & Privacy.”

And “Full Disk Access.”

You’ll need to unlock or enter a password

— or your thumbprint if you have a newer Mac device.

And enable the VMware Horizon Client

to have access to your full disk.

Click “Quit & Reopen.”

Now once you log in

to Horizon, your disk redirection will work

and you’ll be able to access your local disk from the cloud desktop.

For more VMware Horizon tips,

visit our website or check out our VMware Horizon playlist.

Speak with an IT expert

Schedule a free, 30-min consultation with one of our IT experts — if, after the call, you didn’t get any value, we’ll buy you a coffee!

Check out our resource library

We’re always adding new content to our digital library. Our blog articles, guides, and customer stories cover a broad spectrum of topics like emerging tech, industry-specific regulations, and security best-practices — just to name a few.